Download presentation
Presentation is loading. Please wait.
Published byEmil Hood Modified over 9 years ago
1
Anonymity - Background Prof. Newman, instructor CSE-E346 352-505-1579 (don’t leave message) Office Hours (tentative): 10-noon TR nemo@cise.ufl.edu - subject: Anon... nemo@cise.ufl.edu
2
Topics Defining anonymity Defining privacy Need for anonymity Threats to anonymity and privacy Mechanisms to provide anonymity Applications of anonymity technology
3
Reading Read Pfitzman & Waidner Read Chaum Mix paper Start discussion of these Friday Reading list (approximate) on web page
4
Outline Course Outline – what is this subject? Projects and papers Policies
5
Early (pre-computer) uses for social reasons (ability to act more freely, have work accepted without prejudice, etc.) Traffic analysis an issue prior to computers (e.g., Bodyguard of Lies) Computer TAP solvable with cryptography With public-key cryptography, theoretical possibility for anonymity and pseudonymity Anonymity - Beginnings
6
Exercise Take 2 minutes to think about anonymity. Answer these questions in writing: What is anonymity? How is it related to privacy? Give examples of need for anonymity (aiming at volume here) Get into groups of 2-3 and share your answers Try to arrive at a joint definition or agree to disagree Add to your list of examples Share your responses with the class
7
What is Anonymity Literally, lacking a name (a + onyma) Unidentifiability Inability to attribute artifact or actions Related to privacy - how?
8
Topics Defining anonymity Defining privacy Need for anonymity Threats to anonymity and privacy Mechanisms to provide anonymity Applications of anonymity technology
9
Exercise Take a minute or two to define privacy Share with your neighbor(s) Share with the class
10
What is Privacy? Ability of an entity to control its own space Physical space Bodily space Data space Communication space What else?
11
Exercise What are examples of privacy in these spaces? Physical space Bodily space Data space Communication space What other spaces can you think of?
12
Privacy Spaces Physical space: invasion, paparazzi, location (GPS) Bodily space: medical consent, battery Data space: identity, activity, status, records Communication space: email, Internet privacy, correspondents, phone #, address, stalking, harassment Overlap in spaces (e.g., location)
13
Topics Defining anonymity Defining privacy Need for anonymity Threats to anonymity and privacy Mechanisms to provide anonymity Applications of anonymity technology
14
Need for Privacy/Anonymity Planning/execution in competition Fundamental right – voting, celebrities Philosophical necessity (free will) Restarting when past can cripple Statutory requirements (HIPAA, FISMA) Liability issues – data release Freedom/survival in repressive environments Increasing pressure from technologies
15
Privacy/Anonymity Threats Available surveillance technology Identification technology Increasing use of databases Data mining Identity theft Increasing requirements for I&A Increasing governmental desire for surveillance
16
Surveillance Facts 1.5 million CCTV cameras installed in UK post 911 – Londoner on camera ~300 times a day http://epic.org/privacy/surveillance/ http://epic.org/privacy/surveillance/ Face recognition software used in Tampa for Superbowl 5000 public surveillance cameras known in DC Home and work zipcodes give identity in 5% of cases in US http://33bits.org/tag/anonymity/http://33bits.org/tag/anonymity/
17
Homework Count number of video cameras you encounter all day for one day. Record locations, submit when Canvas up. Tally total, share total with class Friday.
18
Data Reidentification Even ”scrubbed” data can be re-identified Characteristics within the data (e.g., word usage in documents) Intersection attacks on k-anonymized database set releases Use of known outside data in combination with released data Data mining – higher dimensional space gives greater specificity!
19
Exercise What are legitmate limitations on anonymity? Write down 1-2 of these Share with neighbor Share with class
20
Limitations on Anonymity Accountability Legal/criminal issues Social expectations Competing need for trust Others?
21
Forms of Anonymity Traffic Analysis Prevention Sender, Recipient, Message Anonymity Voter Anonymity Pseudonymity Revokable anonymity Data anonymity
22
Anonymity Mechanisms Cryptography Steganography Traffic Analysis Prevention (TAP) Mixes, crowds Data sanitization/scrubbing k-anonymity
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.