SlideShare una empresa de Scribd logo
1 de 17
Descargar para leer sin conexión
Antoine Fressancourt

      17/11/2011
17/11/2011
The case of privacy in social                                    CARTES & IDentification
networks                                                         Antoine Fressancourt



▶ Rising concern around privacy in
  social networks
  – Use of private information for
    advertising purposes
  – Applications gaining access to
    more and more personal
    information
  – Usage tracking using referral
    buttons
  – Access to information directly
    using URL, content not ciphered

▶ More and more complex to
  manage
  – Groups
  – Possibility to specify target groups
    on social network updates                  Adapted from The History Of Facebook’s
                                               Default Privacy Settings by Matt McKeon



                                           2
17/11/2011
A recent case:                   CARTES & IDentification
Europe vs. Facebook
       vs                        Antoine Fressancourt




▶ Case raised by Max
  Schrems, a 24 years old
  law student against
  Facebook



▶ Discovered that
  Facebook keeps track of
  every digital trace of a
  user, even when they
  are “deleted”
        deleted




                             3
17/11/2011
Highlighted issues                      CARTES & IDentification
                                        Antoine Fressancourt




    Those examples tend to highlight two issues


                 Privacy
     inside the social network itself


           Data privacy from
       outside the social network

                             4
17/11/2011
Anatomy of a social network                       CARTES & IDentification
Functional building blocks                        Antoine Fressancourt




                                    Management of user
                   Identity         credentials and attributes
                                       d   i l    d     ib
Privacy policy



                                    Role management for users i.e.
                  Profile(s)        how they want to appear

                                    Management of a user’s
                 Social graph
                        g p         relationships

                                    Synchronous and asynchronous
                 Messaging
                      g g           messages for a user
                                         g
P




                                    Storage of documents
                 Repository         associated to a user


                                5
17/11/2011
Potential solutions               CARTES & IDentification
                                  Antoine Fressancourt




                         Cypher information
      Privacy
      P i             inside the network itself
 inside the social    to protect from the SNS
   network it lf
     t    k itself            provider

                            Use identity
Data privacy from      management concepts
                        and zero knowledge
  outside the
                       approaches to secure
 social network       exchanges with external
                               sites

                       6
17/11/2011
Privacy inside the social network                             CARTES & IDentification
Review of academic solutions                                  Antoine Fressancourt



Mainly two families of approaches:
▶ « add-in » applications
  – FlyByNight: Re-Encryption proxy, El Gamal encryption, AES
  – NOYB: Replace each attribute of a given user by an attribute of another
    member of its social network

  – FaceCloak: Dictionnary, MAC
▶ « Privacy by Design » social networks
  – Persona: Attribute-Based Encryption
  – EASiER: Attribute-Based Encryption
  – A Collaborative Framework for Privacy Protection in Online Social
    Network: El Gamal
  – Cryptographic Treatment of Private User Profiles: Broadcast Encryption


                                             7
17/11/2011
Our proposal                                     CARTES & IDentification
Solving the « inside » privacy issue             Antoine Fressancourt



Using a Cypher text Policy Attribute
Based Encryption (CP-ABE) scheme to
                    (CP ABE)
cypher the data inside the social network
▶ Advantages
  – Allows us to d f
     ll          define privacy policies b
                                  l      based
                                             d
    on fine grained predicates
  – Englobate both Identity-based encryption
    and Identity based broadcast encryptions
  – Ease of deployment given our objectives
▶ Drawback
  – Keys and cypher texts are longer than in
    simpler, IBE schemes
  – Heavy management of cryptographic keys



                                          8
17/11/2011
What is IBE?                                               CARTES & IDentification
Identity based encryption                                  Antoine Fressancourt



▶ Identity based encryption:
  ▶ Proposed by Shamir in 1984
  ▶ Encrypt a message using any
    arbitrary string as the key.                            (Message)bob@mail.com
  ▶ The string can be a
    representation of the user’s
    identity
  ▶ Principle:
    ▶ Alice encrypt a message with
      Bob’s e-mail address
    ▶ Bob asks a PKG (Private Key           Private Key            h
                                                                Authentication
      Generator) to provide a private
      key associated to his e-mail
      address.                                            PKG


                                        9
17/11/2011
What is ABE?                                          CARTES & IDentification
Attribute based encryption                            Antoine Fressancourt




▶ Attribute based encryption is a
  generalisation of identity                             AND
  based encryption

▶ Encryption according
  attributes:
  ▶ Personal: age, town, name…                   OR                +18 y.o
  ▶ Relational: colleague, family,
    friends, …

▶ Ciphertext-policy ABE:
  ▶ Cipher text possesses access
    structure                        Colleague         France
  ▶ Saving structures




                                     10
17/11/2011
Privacy outside the social network        CARTES & IDentification
What is needed                            Antoine Fressancourt



  Possibility to register on
  websites with credentials          Use case of identity
   provided to the social           management systems
           network




 Social network                     External sites

                                     Need to conform to
 Recovery of user data in              regulation, risk
   various ways ( logs,                related to user
       cookies, …)                       acceptance

                               11
17/11/2011
What is Identity Management?                       CARTES & IDentification
                                                   Antoine Fressancourt



▶ Technologies, policies and
  p
  practices used to control
  access to a resource by a
  third party.                                   User
▶ Three entities:
  ▶ Identity Provider (IdP):
    maintains and gives access to
    a user’s credentials
  ▶ S
    Service P
         i  Provider (SP)
                id    (SP):
    Consumes attributes provided
    by an IdP
  ▶ User: Controls the distribution        IdP                   SP
    of its credentials by the IdP




                                      12
17/11/2011
Use of identity management in a                        CARTES & IDentification
social network context                                 Antoine Fressancourt



Use of concepts popularized by
Idemix and Uprove
▶ Anonymous credentials
▶ Zero-knowledge protocol                             Random value
  – P otocol in which a p o e sho s to a
    Protocol      hich prover shows
    verifier that he possesses an




                                                                         erifier
                                              rover
    information without revealing it.                  Challenge
  – Introduced by Goldwasser Micali and
                   Goldwasser,




                                                                        Ve
                                             Pr
    Rackoff in 1984.
▶ Minimal Disclosure                                    Response




                                            Generation on the fly
   How to perform the
                                               using a zero
    proof calculation?
                                            knowledge compiler
                                            k    l d        il

                                       13
17/11/2011
CACE: A zero knowledge compiler    CARTES & IDentification
                                   Antoine Fressancourt




Computer Aided Cryptography
Engineering:
▶   European Project
▶   ∑-protocols
▶   Composition techniques
▶   Certificates




                              14
17/11/2011
Our proposal                                  CARTES & IDentification
Solving the « outside » privacy issue         Antoine Fressancourt



Use of Identity Management
platform and protocols
▶ Ensure minimal disclosure of private
  information
▶ Framework to manage the disclosure of
  user credentials
Integration of a zero knowledge
    g                        g
compiler
▶ Computing zero knowledge proofs on the
    y
  fly
▶ Enhance the protection of private
  information through minimal disclosure.



                                         15
17/11/2011
To conclude                                             CARTES & IDentification
                                                        Antoine Fressancourt



▶ Social networks raise a number of issues related to data security and
  privacy

▶ Two kinds of privacy issues
  – From inside the social network itself
  – From external sites outside the social network

▶ Inside privacy isssues can be solved by using ABE to protect data and
  give it access only to authorized contacts

▶ Outside privacy issues can be solved by using identity management
  protocols and systems

▶ Overall, better management of data privacy in future social network
  services deployed using emerging standards




                                             16
Thank you




Atos, the Atos logo, Atos Consulting, Atos Worldline, Atos Sphere,
Atos Cloud and Atos WorldGrid
are registered trademarks of Atos SA. June 2011

© 2011 Atos. Confidential information owned by Atos, to be used by
                                                y      ,           y
the recipient only. This document, or any part of it, may not be
reproduced, copied, circulated and/or distributed nor quoted without
prior written approval from Atos.


                            17/11/2011

Más contenido relacionado

La actualidad más candente

Mina.Deng.PhD.defense
Mina.Deng.PhD.defenseMina.Deng.PhD.defense
Mina.Deng.PhD.defenseminadeng
 
Explicit vs. latent concept models for cross language information retrieval
Explicit vs. latent concept models for cross language information retrievalExplicit vs. latent concept models for cross language information retrieval
Explicit vs. latent concept models for cross language information retrievalNitish Aggarwal
 
ipas implicit password authentication system ieee 2011
ipas implicit password authentication system ieee 2011ipas implicit password authentication system ieee 2011
ipas implicit password authentication system ieee 2011prasanna9
 
Crowdshare, Secure Resource Sharing in Mobile Crowds
Crowdshare, Secure Resource Sharing in Mobile CrowdsCrowdshare, Secure Resource Sharing in Mobile Crowds
Crowdshare, Secure Resource Sharing in Mobile CrowdsHeinrich Seeger
 
Steven Leahy_IT 543_Unit 1 Assignment
Steven Leahy_IT 543_Unit 1 AssignmentSteven Leahy_IT 543_Unit 1 Assignment
Steven Leahy_IT 543_Unit 1 AssignmentSteven Leahy
 
Information security by biometric waterking
Information security by biometric waterkingInformation security by biometric waterking
Information security by biometric waterkingeSAT Publishing House
 
Iaetsd network security and
Iaetsd network security andIaetsd network security and
Iaetsd network security andIaetsd Iaetsd
 
Implementation of a Biometric Solution Providing Strong Authentication To Gai...
Implementation of a Biometric Solution Providing Strong Authentication To Gai...Implementation of a Biometric Solution Providing Strong Authentication To Gai...
Implementation of a Biometric Solution Providing Strong Authentication To Gai...Sylvain Maret
 
An Approach for Securing Voice Communication via Image Watermarking Technique
An Approach for Securing Voice Communication via Image Watermarking TechniqueAn Approach for Securing Voice Communication via Image Watermarking Technique
An Approach for Securing Voice Communication via Image Watermarking TechniqueCSCJournals
 
A Havoc Proof for Secure and Robust Audio Watermarking
A Havoc Proof for Secure and Robust Audio WatermarkingA Havoc Proof for Secure and Robust Audio Watermarking
A Havoc Proof for Secure and Robust Audio WatermarkingCSCJournals
 
Tutorial 3 peter kustor
Tutorial 3 peter kustorTutorial 3 peter kustor
Tutorial 3 peter kustoregovernment
 

La actualidad más candente (17)

Mina.Deng.PhD.defense
Mina.Deng.PhD.defenseMina.Deng.PhD.defense
Mina.Deng.PhD.defense
 
Explicit vs. latent concept models for cross language information retrieval
Explicit vs. latent concept models for cross language information retrievalExplicit vs. latent concept models for cross language information retrieval
Explicit vs. latent concept models for cross language information retrieval
 
ipas implicit password authentication system ieee 2011
ipas implicit password authentication system ieee 2011ipas implicit password authentication system ieee 2011
ipas implicit password authentication system ieee 2011
 
Digitalwatermarking
DigitalwatermarkingDigitalwatermarking
Digitalwatermarking
 
Crowdshare, Secure Resource Sharing in Mobile Crowds
Crowdshare, Secure Resource Sharing in Mobile CrowdsCrowdshare, Secure Resource Sharing in Mobile Crowds
Crowdshare, Secure Resource Sharing in Mobile Crowds
 
50120130406038
5012013040603850120130406038
50120130406038
 
Steven Leahy_IT 543_Unit 1 Assignment
Steven Leahy_IT 543_Unit 1 AssignmentSteven Leahy_IT 543_Unit 1 Assignment
Steven Leahy_IT 543_Unit 1 Assignment
 
Information security by biometric waterking
Information security by biometric waterkingInformation security by biometric waterking
Information security by biometric waterking
 
Iaetsd network security and
Iaetsd network security andIaetsd network security and
Iaetsd network security and
 
Implementation of a Biometric Solution Providing Strong Authentication To Gai...
Implementation of a Biometric Solution Providing Strong Authentication To Gai...Implementation of a Biometric Solution Providing Strong Authentication To Gai...
Implementation of a Biometric Solution Providing Strong Authentication To Gai...
 
An Approach for Securing Voice Communication via Image Watermarking Technique
An Approach for Securing Voice Communication via Image Watermarking TechniqueAn Approach for Securing Voice Communication via Image Watermarking Technique
An Approach for Securing Voice Communication via Image Watermarking Technique
 
1709 1715
1709 17151709 1715
1709 1715
 
Digitalwatermarking
DigitalwatermarkingDigitalwatermarking
Digitalwatermarking
 
177 181
177 181177 181
177 181
 
A Havoc Proof for Secure and Robust Audio Watermarking
A Havoc Proof for Secure and Robust Audio WatermarkingA Havoc Proof for Secure and Robust Audio Watermarking
A Havoc Proof for Secure and Robust Audio Watermarking
 
280 284
280 284280 284
280 284
 
Tutorial 3 peter kustor
Tutorial 3 peter kustorTutorial 3 peter kustor
Tutorial 3 peter kustor
 

Destacado

Privacy issues in network environments
Privacy issues in network environmentsPrivacy issues in network environments
Privacy issues in network environmentsJosef Noll
 
Privacy and Social Networks
Privacy and Social NetworksPrivacy and Social Networks
Privacy and Social Networksblogzilla
 
Prof. Hendrik Speck - Privacy and Social Networks
Prof. Hendrik Speck - Privacy and Social NetworksProf. Hendrik Speck - Privacy and Social Networks
Prof. Hendrik Speck - Privacy and Social NetworksHendrik Speck
 
Social Networking Security Issues
Social Networking Security IssuesSocial Networking Security Issues
Social Networking Security IssuesMangesh Gunjal
 
The Dark Side of Social Media: Privacy Concerns
The Dark Side of Social Media: Privacy ConcernsThe Dark Side of Social Media: Privacy Concerns
The Dark Side of Social Media: Privacy ConcernsCorinne Weisgerber
 
Privacy issues in social networking
Privacy issues in social networkingPrivacy issues in social networking
Privacy issues in social networkingBryan Tran
 
Social network privacy & security
Social network privacy & securitySocial network privacy & security
Social network privacy & securitynadikari123
 

Destacado (7)

Privacy issues in network environments
Privacy issues in network environmentsPrivacy issues in network environments
Privacy issues in network environments
 
Privacy and Social Networks
Privacy and Social NetworksPrivacy and Social Networks
Privacy and Social Networks
 
Prof. Hendrik Speck - Privacy and Social Networks
Prof. Hendrik Speck - Privacy and Social NetworksProf. Hendrik Speck - Privacy and Social Networks
Prof. Hendrik Speck - Privacy and Social Networks
 
Social Networking Security Issues
Social Networking Security IssuesSocial Networking Security Issues
Social Networking Security Issues
 
The Dark Side of Social Media: Privacy Concerns
The Dark Side of Social Media: Privacy ConcernsThe Dark Side of Social Media: Privacy Concerns
The Dark Side of Social Media: Privacy Concerns
 
Privacy issues in social networking
Privacy issues in social networkingPrivacy issues in social networking
Privacy issues in social networking
 
Social network privacy & security
Social network privacy & securitySocial network privacy & security
Social network privacy & security
 

Similar a Privacy of social network attributes for online services

Meminto as Blockchain Startup
Meminto as Blockchain StartupMeminto as Blockchain Startup
Meminto as Blockchain StartupAlbert Brückmann
 
SmartCard Forum 2009 - New trends in smart-cards technology
SmartCard Forum 2009 - New trends in smart-cards technologySmartCard Forum 2009 - New trends in smart-cards technology
SmartCard Forum 2009 - New trends in smart-cards technologyOKsystem
 
DESIGN AND IMPLEMENTATION OF E-PASSPORT SCHEME USING CRYPTOGRAPHIC ALGORITHM ...
DESIGN AND IMPLEMENTATION OF E-PASSPORT SCHEME USING CRYPTOGRAPHIC ALGORITHM ...DESIGN AND IMPLEMENTATION OF E-PASSPORT SCHEME USING CRYPTOGRAPHIC ALGORITHM ...
DESIGN AND IMPLEMENTATION OF E-PASSPORT SCHEME USING CRYPTOGRAPHIC ALGORITHM ...ijait
 
apidays LIVE Paris 2021 - The GDPR Developer Guide by Jerome Gorin, CNIL
apidays LIVE Paris 2021 - The GDPR Developer Guide by Jerome Gorin, CNIL apidays LIVE Paris 2021 - The GDPR Developer Guide by Jerome Gorin, CNIL
apidays LIVE Paris 2021 - The GDPR Developer Guide by Jerome Gorin, CNIL apidays
 
Cryptograpy Exam
Cryptograpy ExamCryptograpy Exam
Cryptograpy ExamLisa Olive
 
Ricardo Mendez, Technical Director Europe ,Samsung NEXT - Identity, Privacy a...
Ricardo Mendez, Technical Director Europe ,Samsung NEXT - Identity, Privacy a...Ricardo Mendez, Technical Director Europe ,Samsung NEXT - Identity, Privacy a...
Ricardo Mendez, Technical Director Europe ,Samsung NEXT - Identity, Privacy a...Techsylvania
 
Internet Science
Internet ScienceInternet Science
Internet Sciencei_scienceEU
 
Ict project (1)
Ict project (1)Ict project (1)
Ict project (1)spy007s
 
Recognizing  the fact usernames passwords are the weakest link in an.docx
Recognizing  the fact usernames passwords are the weakest link in an.docxRecognizing  the fact usernames passwords are the weakest link in an.docx
Recognizing  the fact usernames passwords are the weakest link in an.docxdanas19
 
Highly Secure Cryptography Algorithm Method to Safeguard Audios and Visuals
Highly Secure Cryptography Algorithm Method to Safeguard Audios and VisualsHighly Secure Cryptography Algorithm Method to Safeguard Audios and Visuals
Highly Secure Cryptography Algorithm Method to Safeguard Audios and Visualsijcisjournal
 
HIGHLY SECURE CRYPTOGRAPHY ALGORITHM METHOD TO SAFEGUARD AUDIOS AND VISUALS
HIGHLY SECURE CRYPTOGRAPHY ALGORITHM METHOD TO SAFEGUARD AUDIOS AND VISUALSHIGHLY SECURE CRYPTOGRAPHY ALGORITHM METHOD TO SAFEGUARD AUDIOS AND VISUALS
HIGHLY SECURE CRYPTOGRAPHY ALGORITHM METHOD TO SAFEGUARD AUDIOS AND VISUALSijcisjournal
 
HIGHLY SECURE CRYPTOGRAPHY ALGORITHM METHOD TO SAFEGUARD AUDIOS AND VISUALS
HIGHLY SECURE CRYPTOGRAPHY ALGORITHM METHOD TO SAFEGUARD AUDIOS AND VISUALSHIGHLY SECURE CRYPTOGRAPHY ALGORITHM METHOD TO SAFEGUARD AUDIOS AND VISUALS
HIGHLY SECURE CRYPTOGRAPHY ALGORITHM METHOD TO SAFEGUARD AUDIOS AND VISUALSijdms
 
Ynamono Hs Lecture
Ynamono Hs LectureYnamono Hs Lecture
Ynamono Hs Lectureynamoto
 
Psdot 3 building and maintaining trust in internet voting with biometrics aut...
Psdot 3 building and maintaining trust in internet voting with biometrics aut...Psdot 3 building and maintaining trust in internet voting with biometrics aut...
Psdot 3 building and maintaining trust in internet voting with biometrics aut...ZTech Proje
 
Biometric security using cryptography
Biometric security using cryptographyBiometric security using cryptography
Biometric security using cryptographySampat Patnaik
 
Biometric encryption
Biometric encryptionBiometric encryption
Biometric encryptionDeepák Soni
 

Similar a Privacy of social network attributes for online services (20)

Meminto as Blockchain Startup
Meminto as Blockchain StartupMeminto as Blockchain Startup
Meminto as Blockchain Startup
 
SmartCard Forum 2009 - New trends in smart-cards technology
SmartCard Forum 2009 - New trends in smart-cards technologySmartCard Forum 2009 - New trends in smart-cards technology
SmartCard Forum 2009 - New trends in smart-cards technology
 
INTERNET PRIVACY
INTERNET PRIVACYINTERNET PRIVACY
INTERNET PRIVACY
 
DESIGN AND IMPLEMENTATION OF E-PASSPORT SCHEME USING CRYPTOGRAPHIC ALGORITHM ...
DESIGN AND IMPLEMENTATION OF E-PASSPORT SCHEME USING CRYPTOGRAPHIC ALGORITHM ...DESIGN AND IMPLEMENTATION OF E-PASSPORT SCHEME USING CRYPTOGRAPHIC ALGORITHM ...
DESIGN AND IMPLEMENTATION OF E-PASSPORT SCHEME USING CRYPTOGRAPHIC ALGORITHM ...
 
apidays LIVE Paris 2021 - The GDPR Developer Guide by Jerome Gorin, CNIL
apidays LIVE Paris 2021 - The GDPR Developer Guide by Jerome Gorin, CNIL apidays LIVE Paris 2021 - The GDPR Developer Guide by Jerome Gorin, CNIL
apidays LIVE Paris 2021 - The GDPR Developer Guide by Jerome Gorin, CNIL
 
Cryptograpy Exam
Cryptograpy ExamCryptograpy Exam
Cryptograpy Exam
 
Ricardo Mendez, Technical Director Europe ,Samsung NEXT - Identity, Privacy a...
Ricardo Mendez, Technical Director Europe ,Samsung NEXT - Identity, Privacy a...Ricardo Mendez, Technical Director Europe ,Samsung NEXT - Identity, Privacy a...
Ricardo Mendez, Technical Director Europe ,Samsung NEXT - Identity, Privacy a...
 
Biometrics
BiometricsBiometrics
Biometrics
 
Internet Science
Internet ScienceInternet Science
Internet Science
 
Ict project (1)
Ict project (1)Ict project (1)
Ict project (1)
 
Recognizing  the fact usernames passwords are the weakest link in an.docx
Recognizing  the fact usernames passwords are the weakest link in an.docxRecognizing  the fact usernames passwords are the weakest link in an.docx
Recognizing  the fact usernames passwords are the weakest link in an.docx
 
Highly Secure Cryptography Algorithm Method to Safeguard Audios and Visuals
Highly Secure Cryptography Algorithm Method to Safeguard Audios and VisualsHighly Secure Cryptography Algorithm Method to Safeguard Audios and Visuals
Highly Secure Cryptography Algorithm Method to Safeguard Audios and Visuals
 
HIGHLY SECURE CRYPTOGRAPHY ALGORITHM METHOD TO SAFEGUARD AUDIOS AND VISUALS
HIGHLY SECURE CRYPTOGRAPHY ALGORITHM METHOD TO SAFEGUARD AUDIOS AND VISUALSHIGHLY SECURE CRYPTOGRAPHY ALGORITHM METHOD TO SAFEGUARD AUDIOS AND VISUALS
HIGHLY SECURE CRYPTOGRAPHY ALGORITHM METHOD TO SAFEGUARD AUDIOS AND VISUALS
 
HIGHLY SECURE CRYPTOGRAPHY ALGORITHM METHOD TO SAFEGUARD AUDIOS AND VISUALS
HIGHLY SECURE CRYPTOGRAPHY ALGORITHM METHOD TO SAFEGUARD AUDIOS AND VISUALSHIGHLY SECURE CRYPTOGRAPHY ALGORITHM METHOD TO SAFEGUARD AUDIOS AND VISUALS
HIGHLY SECURE CRYPTOGRAPHY ALGORITHM METHOD TO SAFEGUARD AUDIOS AND VISUALS
 
Ynamono Hs Lecture
Ynamono Hs LectureYnamono Hs Lecture
Ynamono Hs Lecture
 
Psdot 3 building and maintaining trust in internet voting with biometrics aut...
Psdot 3 building and maintaining trust in internet voting with biometrics aut...Psdot 3 building and maintaining trust in internet voting with biometrics aut...
Psdot 3 building and maintaining trust in internet voting with biometrics aut...
 
Biometric security using cryptography
Biometric security using cryptographyBiometric security using cryptography
Biometric security using cryptography
 
Biometrics poster
Biometrics posterBiometrics poster
Biometrics poster
 
Methods
MethodsMethods
Methods
 
Biometric encryption
Biometric encryptionBiometric encryption
Biometric encryption
 

Último

Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 

Último (20)

Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 

Privacy of social network attributes for online services

  • 1. Antoine Fressancourt 17/11/2011
  • 2. 17/11/2011 The case of privacy in social CARTES & IDentification networks Antoine Fressancourt ▶ Rising concern around privacy in social networks – Use of private information for advertising purposes – Applications gaining access to more and more personal information – Usage tracking using referral buttons – Access to information directly using URL, content not ciphered ▶ More and more complex to manage – Groups – Possibility to specify target groups on social network updates Adapted from The History Of Facebook’s Default Privacy Settings by Matt McKeon 2
  • 3. 17/11/2011 A recent case: CARTES & IDentification Europe vs. Facebook vs Antoine Fressancourt ▶ Case raised by Max Schrems, a 24 years old law student against Facebook ▶ Discovered that Facebook keeps track of every digital trace of a user, even when they are “deleted” deleted 3
  • 4. 17/11/2011 Highlighted issues CARTES & IDentification Antoine Fressancourt Those examples tend to highlight two issues Privacy inside the social network itself Data privacy from outside the social network 4
  • 5. 17/11/2011 Anatomy of a social network CARTES & IDentification Functional building blocks Antoine Fressancourt Management of user Identity credentials and attributes d i l d ib Privacy policy Role management for users i.e. Profile(s) how they want to appear Management of a user’s Social graph g p relationships Synchronous and asynchronous Messaging g g messages for a user g P Storage of documents Repository associated to a user 5
  • 6. 17/11/2011 Potential solutions CARTES & IDentification Antoine Fressancourt Cypher information Privacy P i inside the network itself inside the social to protect from the SNS network it lf t k itself provider Use identity Data privacy from management concepts and zero knowledge outside the approaches to secure social network exchanges with external sites 6
  • 7. 17/11/2011 Privacy inside the social network CARTES & IDentification Review of academic solutions Antoine Fressancourt Mainly two families of approaches: ▶ « add-in » applications – FlyByNight: Re-Encryption proxy, El Gamal encryption, AES – NOYB: Replace each attribute of a given user by an attribute of another member of its social network – FaceCloak: Dictionnary, MAC ▶ « Privacy by Design » social networks – Persona: Attribute-Based Encryption – EASiER: Attribute-Based Encryption – A Collaborative Framework for Privacy Protection in Online Social Network: El Gamal – Cryptographic Treatment of Private User Profiles: Broadcast Encryption 7
  • 8. 17/11/2011 Our proposal CARTES & IDentification Solving the « inside » privacy issue Antoine Fressancourt Using a Cypher text Policy Attribute Based Encryption (CP-ABE) scheme to (CP ABE) cypher the data inside the social network ▶ Advantages – Allows us to d f ll define privacy policies b l based d on fine grained predicates – Englobate both Identity-based encryption and Identity based broadcast encryptions – Ease of deployment given our objectives ▶ Drawback – Keys and cypher texts are longer than in simpler, IBE schemes – Heavy management of cryptographic keys 8
  • 9. 17/11/2011 What is IBE? CARTES & IDentification Identity based encryption Antoine Fressancourt ▶ Identity based encryption: ▶ Proposed by Shamir in 1984 ▶ Encrypt a message using any arbitrary string as the key. (Message)bob@mail.com ▶ The string can be a representation of the user’s identity ▶ Principle: ▶ Alice encrypt a message with Bob’s e-mail address ▶ Bob asks a PKG (Private Key Private Key h Authentication Generator) to provide a private key associated to his e-mail address. PKG 9
  • 10. 17/11/2011 What is ABE? CARTES & IDentification Attribute based encryption Antoine Fressancourt ▶ Attribute based encryption is a generalisation of identity AND based encryption ▶ Encryption according attributes: ▶ Personal: age, town, name… OR +18 y.o ▶ Relational: colleague, family, friends, … ▶ Ciphertext-policy ABE: ▶ Cipher text possesses access structure Colleague France ▶ Saving structures 10
  • 11. 17/11/2011 Privacy outside the social network CARTES & IDentification What is needed Antoine Fressancourt Possibility to register on websites with credentials Use case of identity provided to the social management systems network Social network External sites Need to conform to Recovery of user data in regulation, risk various ways ( logs, related to user cookies, …) acceptance 11
  • 12. 17/11/2011 What is Identity Management? CARTES & IDentification Antoine Fressancourt ▶ Technologies, policies and p practices used to control access to a resource by a third party. User ▶ Three entities: ▶ Identity Provider (IdP): maintains and gives access to a user’s credentials ▶ S Service P i Provider (SP) id (SP): Consumes attributes provided by an IdP ▶ User: Controls the distribution IdP SP of its credentials by the IdP 12
  • 13. 17/11/2011 Use of identity management in a CARTES & IDentification social network context Antoine Fressancourt Use of concepts popularized by Idemix and Uprove ▶ Anonymous credentials ▶ Zero-knowledge protocol Random value – P otocol in which a p o e sho s to a Protocol hich prover shows verifier that he possesses an erifier rover information without revealing it. Challenge – Introduced by Goldwasser Micali and Goldwasser, Ve Pr Rackoff in 1984. ▶ Minimal Disclosure Response Generation on the fly How to perform the using a zero proof calculation? knowledge compiler k l d il 13
  • 14. 17/11/2011 CACE: A zero knowledge compiler CARTES & IDentification Antoine Fressancourt Computer Aided Cryptography Engineering: ▶ European Project ▶ ∑-protocols ▶ Composition techniques ▶ Certificates 14
  • 15. 17/11/2011 Our proposal CARTES & IDentification Solving the « outside » privacy issue Antoine Fressancourt Use of Identity Management platform and protocols ▶ Ensure minimal disclosure of private information ▶ Framework to manage the disclosure of user credentials Integration of a zero knowledge g g compiler ▶ Computing zero knowledge proofs on the y fly ▶ Enhance the protection of private information through minimal disclosure. 15
  • 16. 17/11/2011 To conclude CARTES & IDentification Antoine Fressancourt ▶ Social networks raise a number of issues related to data security and privacy ▶ Two kinds of privacy issues – From inside the social network itself – From external sites outside the social network ▶ Inside privacy isssues can be solved by using ABE to protect data and give it access only to authorized contacts ▶ Outside privacy issues can be solved by using identity management protocols and systems ▶ Overall, better management of data privacy in future social network services deployed using emerging standards 16
  • 17. Thank you Atos, the Atos logo, Atos Consulting, Atos Worldline, Atos Sphere, Atos Cloud and Atos WorldGrid are registered trademarks of Atos SA. June 2011 © 2011 Atos. Confidential information owned by Atos, to be used by y , y the recipient only. This document, or any part of it, may not be reproduced, copied, circulated and/or distributed nor quoted without prior written approval from Atos. 17/11/2011