首页> 外文OA文献 >A technical approach to privacy based on mobile agents protected by tamper-resistant hardware
【2h】

A technical approach to privacy based on mobile agents protected by tamper-resistant hardware

机译:一种基于受防篡改硬件保护的移动代理的隐私技术方法

摘要

We address the problem of protecting the privacy of individuals in the information society. Our goal is to devise technical means that allow users to actively participate in the management and use of information related to them. The advent of the information society creates serious challenges for the privacy of individuals. Due to the drastically improving communication infrastructure, ever larger amounts of ever more precise information become available. The problem with the free availability of this information is not only the risk that the information can be abused by powerful institutions, but also that this can lead to an unconfined mutual surveillance of individuals, which can have adverse effects on society as a whole. We argue that individuals should be empowered to define for themselves the level of privacy they are comfortable with. This can be achieved by notifying them whenever information on them is created, accessed, or modified and by giving them some control over the use of this information. The notification informs individuals who is using what information on them and allows to detect possible problems with this use. The control allows individuals to resolve most (or at least some) of these problems. Obviously this requires that the individuals can trust the users of information to properly implement these notifications and to offer an effective control. We analyze the concept of trust more closely and distinguish between the optimistic and the pessimistic approach to trust, which can both provide the foundation for the protection of privacy. The former is based on the classical concepts of control and sanctions, while the latter tries to prevent malicious behaviour. We choose to pursue the pessimistic approach and investigate in technical means that can be used for this purpose. A promising technology is the mobile agent paradigm, which is a new approach to structure distributed applications. Its main idea is to move both the code and the state of an object to another principal for remote execution. This indicates that the mobile agent paradigm also embraces the object-oriented programming paradigm, which allows us to encapsulate a data item and to specify an access control policy on it. Since the mobile agent is physically moved to a remote location that is under the control of a different principal, it needs to be protected from this principal who is responsible for its execution. This problem constitutes the major diffculty for using the mobile agent paradigm for privacy protection and is explored in great detail. Based on the discussion in the relevant literature, we decide on an approach that relies on a trusted and tamper-resistant hardware device, which is developed on a conceptual level. The approach is further explored in the context of the mobile agent paradigm, where it allows us to realize more elaborate protection goals that may be desirable for the owner of the mobile agent. These are developed in the form of conducts, which regroup the goal, the requirements, as well as a specification of the necessary collaboration to achieve this goal. Finally, we return to the original problem and describe how the presented technology can be used to improve the protection of privacy. This results in a rather complex framework, in which information on individuals cannot be used freely, but where this use is constrained by the level of privacy desired by the subject of the information. The major problem of this framework is the increased complexity that individuals have to deal with. This problem is addressed with an additional level of indirection that attempts to confine the complexity and to delegate it to trusted experts. We believe that this approach, despite its complexity, is a viable means to address the urgent problems of privacy protection, which do not lend themselves to simple solutions.
机译:我们解决了在信息社会中保护个人隐私的问题。我们的目标是设计技术手段,使用户能够积极参与与他们相关的信息的管理和使用。信息社会的到来给个人隐私带来了严峻的挑战。由于通讯基础设施的大大改善,越来越多的越来越精确的信息变得可用。免费获得此信息的问题不仅是强大的机构可能滥用该信息的风险,而且还可能导致对个人进行无限制的相互监视,这可能对整个社会产生不利影响。我们认为,应该授权个人为自己定义适合的隐私级别。这可以通过在创建,访问或修改有关它们的信息时通知它们,并通过控制这些信息的使用来实现。该通知会通知正在使用哪些个人的个人信息,并允许检测此使用中可能存在的问题。该控件允许个人解决大多数(或至少一些)这些问题。显然,这要求个人可以信任信息的用户,以正确实施这些通知并提供有效的控制。我们将更仔细地分析信任的概念,并区分乐观和悲观的信任方法,这两种方法都可以为保护隐私提供基础。前者基于控制和制裁的经典概念,而后者则试图防止恶意行为。我们选择追求悲观的方法,并研究可用于此目的的技术手段。一种有前途的技术是移动代理范例,它是一种结构化分布式应用程序的新方法。其主要思想是将对象的代码和状态都移动到另一个主体以进行远程执行。这表明移动代理范例还包含面向对象的编程范例,这使我们可以封装数据项并在其上指定访问控制策略。由于移动代理实际上是移动到受其他委托人控制的远程位置,因此需要保护该代理免受负责其执行的委托人的攻击。这个问题构成了使用移动代理范例进行隐私保护的主要困难,并且对此进行了详细的探讨。基于相关文献中的讨论,我们决定采用一种在概念级别上开发的,依赖于受信任且防篡改的硬件设备的方法。在移动代理范式的上下文中进一步探讨了该方法,在该方法中,我们可以实现移动代理所有者可能需要的更为详尽的保护目标。这些行为是以行为的形式制定的,这些行为重新组合了目标,要求以及实现该目标所需的协作规范。最后,我们回到原始问题并描述所提出的技术如何可以用来改善对隐私的保护。这导致了一个相当复杂的框架,其中关于个人的信息不能自由使用,但是这种使用受到信息主体所希望的隐私级别的限制。该框架的主要问题是个人必须应对的复杂性增加。此问题通过附加级别的间接寻址解决,该级别试图限制复杂性并将其委派给受信任的专家。我们认为,尽管这种方法很复杂,但却是解决隐私保护这一迫切问题的可行方法,而这些问题并不能提供简单的解决方案。

著录项

  • 作者

    Wilhelm Uwe Georg;

  • 作者单位
  • 年度 1999
  • 总页数
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 入库时间 2022-08-31 15:50:45

相似文献

  • 外文文献
  • 中文文献
  • 专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号