Addressing the Location in Spontaneous Networks



Ähnliche Dokumente
p^db=`oj===pìééçêíáåñçêã~íáçå=

Exercise (Part VIII) Anastasia Mochalova, Lehrstuhl für ABWL und Wirtschaftsinformatik, Kath. Universität Eichstätt-Ingolstadt 1

Elektronische Identifikation und Vertrauensdienste für Europa

Big Data Analytics. Fifth Munich Data Protection Day, March 23, Dr. Stefan Krätschmer, Data Privacy Officer, Europe, IBM

VGM. VGM information. HAMBURG SÜD VGM WEB PORTAL USER GUIDE June 2016

General info on using shopping carts with Ogone

Mock Exam Behavioral Finance

How to access licensed products from providers who are already operating productively in. General Information Shibboleth login...

PONS DIE DREI??? FRAGEZEICHEN, ARCTIC ADVENTURE: ENGLISCH LERNEN MIT JUSTUS, PETER UND BOB

Modul 6 Virtuelle Private Netze (VPNs) und Tunneling

VGM. VGM information. HAMBURG SÜD VGM WEB PORTAL - USER GUIDE June 2016

Harry gefangen in der Zeit Begleitmaterialien

herzberg social housing complex green living

Exercise (Part II) Anastasia Mochalova, Lehrstuhl für ABWL und Wirtschaftsinformatik, Kath. Universität Eichstätt-Ingolstadt 1

Product Lifecycle Manager

Security of IoT. Generalversammlung 21. März 2017

Causal Analysis in Population Studies

Netzwerke und Sicherheit auf mobilen Geräten

NEWSLETTER. FileDirector Version 2.5 Novelties. Filing system designer. Filing system in WinClient

Exercise (Part XI) Anastasia Mochalova, Lehrstuhl für ABWL und Wirtschaftsinformatik, Kath. Universität Eichstätt-Ingolstadt 1

Level 1 German, 2016

Wenn Marketing zum Service wird! Digitales Marketing verbindet Analyse & Online Marketing

Non users after Cochlear Implantation in Single Sided Deafness

PONS DIE DREI??? FRAGEZEICHEN, ARCTIC ADVENTURE: ENGLISCH LERNEN MIT JUSTUS, PETER UND BOB

Routing in WSN Exercise

Schachaufgabe 05: Ma-Übung Chess Problem 05: Mate training

Level 2 German, 2016

Anleitung Händlerbewerbung und File-Exchange- Server. Instruction How To Become a Dealer and File-Exchange-Server

Gemeinde Gilching. Registration kindergarten for the school year 2018/2019

Ratiodata IT-Lösungen & Services GmbH Gustav-Stresemann-Weg 29 D Münster mit den Standorten gemäß Anlage.

Gemeinde Gilching. Registration kindergarten for the school year 2016/2017

H o c h s c h u l e D e g g e n d o r f H o c h s c h u l e f ü r a n g e w a n d t e W i s s e n s c h a f t e n

Creating OpenSocial Gadgets. Bastian Hofmann

Konfiguration von eduroam. Configuring eduroam

Magic Figures. We note that in the example magic square the numbers 1 9 are used. All three rows (columns) have equal sum, called the magic number.

GRIPS - GIS basiertes Risikoanalyse-, Informations- und Planungssystem

Ein Stern in dunkler Nacht Die schoensten Weihnachtsgeschichten. Click here if your download doesn"t start automatically

Exercise (Part V) Anastasia Mochalova, Lehrstuhl für ABWL und Wirtschaftsinformatik, Kath. Universität Eichstätt-Ingolstadt 1

Materialien zu unseren Lehrwerken

OPERATING INSTRUCTIONS Test pump ZG 5.1. and ZG 5.2.

Newest Generation of the BS2 Corrosion/Warning and Measurement System

p^db=`oj===pìééçêíáåñçêã~íáçå=

Unit 1. Motivation and Basics of Classical Logic. Fuzzy Logic I 6

SuisseID Digital passport and signature

Antrag gemäß Art. 16 DSGVO auf Berichtigung Request for the Right to Rectification (Article 16 GDPR)

Can I use an older device with a new GSD file? It is always the best to use the latest GSD file since this is downward compatible to older versions.

rot red braun brown rot red RS-8 rot red braun brown R S V~

benötigen eine sichere Technologieumgebung

Stand der Recherche nach publizierten Identity Management Standards - ISO/IEC, DIN, BSI, CEN/ISSS und OASIS

WAS IST DER KOMPARATIV: = The comparative

The Solar Revolution New Ways for Climate Protection with Solar Electricity

RATAVA. COMPUTER: Mission Berlin. November 9, 2006, ten thirty am. You ve got 75 minutes, 2 lives and some help:

Vorgehensweise Ersteinschreibung über CAMPUSonline in MY USI DATA

1.1 VoIP - Kein Notruf möglich. 1.2 VoIP - Vorrang von Notrufen

Titelbild1 ANSYS. Customer Portal LogIn

IoT Scopes and Criticisms

Cycling and (or?) Trams

HIR Method & Tools for Fit Gap analysis

Wissenschaftliche Dienste. Sachstand. Payment of value added tax (VAT) (EZPWD-Anfrage ) 2016 Deutscher Bundestag WD /16

Geometrie und Bedeutung: Kap 5

Ressourcenmanagement in Netzwerken SS06 Vorl. 12,

Die Bedeutung neurowissenschaftlicher Erkenntnisse für die Werbung (German Edition)

Level 2 German, 2015

Abteilung Internationales CampusCenter

Martin Luther. Click here if your download doesn"t start automatically

Mitglied der Leibniz-Gemeinschaft

FEM Isoparametric Concept

SIMATIC ET 200SP Produktinformation für Makros für 2-fach BaseUnit Produktinformation

KAN session on "Transformations" Transformative indicators and the transformation of work

TomTom WEBFLEET Tachograph

Level 1 German, 2014

Lukas Hydraulik GmbH Weinstraße 39 D Erlangen. Mr. Sauerbier. Lukas Hydraulik GmbH Weinstraße 39 D Erlangen. edraulic rescue equipment

Attention: Give your answers to problem 1 and problem 2 directly below the questions in the exam question sheet. ,and C = [ ].

Providers of climate services in Germany

Level 1 German, 2012

Franke & Bornberg award AachenMünchener private annuity insurance schemes top grades

DAS ERSTE MAL UND IMMER WIEDER. ERWEITERTE SONDERAUSGABE BY LISA MOOS

LOC Pharma. Anlage. Lieferantenfragebogen Supplier Questionnaire. 9. Is the warehouse temperature controlled or air-conditioned?

Lukas Hydraulik GmbH Weinstraße 39 D Erlangen. Mr. Sauerbier. Lukas Hydraulik GmbH Weinstraße 39 D Erlangen

Cameraserver mini. commissioning. Ihre Vision ist unsere Aufgabe

FEM Isoparametric Concept

Vasco Tonack Network and Communication, ZEDAT. Cisco UC Licensing. Und die Nachteile von Extension Mobility

Kybernetik Intelligent Agents- Decision Making

EtherNet/IP Topology and Engineering MPx06/07/08VRS

Safety action Inspection of welds

Digicomp Microsoft Evolution Day ADFS Oliver Ryf. Partner:

CA_MESSAGES_ORS_HDTV_IRD_GUIDELINE

PROFIBUS-DP Repeater 1 to 1 and 1 to 5 with optional level converter module

CA_MESSAGES_ORS_HDTV_IRD_GUIDELINE

Datensicherheit und Privatsphäre im Cyberspace: Einblick in die aktuelle Forschung und Ausblick

Die Dokumentation kann auf einem angeschlossenen Sartorius Messwertdrucker erfolgen.

SUISSEID DIGITAL PASSPORT AND SIGNATURE

Carsten Berkau: Bilanzen Solution to Chapter 13

Tube Analyzer LogViewer 2.3

Microsoft Azure Fundamentals MOC 10979

Konfiguration von Trusted Peer Authentication für die Mindbreeze Search Appliance. Version 2017 Summer Release

Comparison of the WB- and STAMP-Analyses. Analyses of the Brühl accident. 2. Bieleschweig Workshop. Dipl.-Ing. Oliver Lemke. Lemke,

Transkript:

Addressing the Location in Spontaneous Networks Enabling BOTH: Privacy and E-Commerce Design by Moritz Strasser 1

Disappearing computers Trends Mobility and Spontaneous Networks (MANET = Mobile Ad hoc Network) E-Commerce 2

UC Paradigm Spontane Vernetzung: Überall, alles, jederzeit Privacy? 3

Security: Authenticity, Trust: Identity IDENTITY AUTHENTICITY shopping behavior criminal record family status vita / career health finances Name Server ID Information - marriage - children -divorce -etc. - income - credit lines - insurances - real estate -etc. 4

Security: Authenticity, Trust: Identity Privacy: Right of disposition Trust Predictability of subjects actions through identity IDENTITY shopping behavior criminal record family status vita / carrer health finances Privacy Disposition about collection, access, transformation and distribution of private data? reputation i? reputation j? reputation k Security AUTHENTICITY Reference: Holger Eggs, Günter Müller: Security and Trust, Added Value for E-Commerce, Berlin 2001 Name Server ID Information 5

Desired... Protecting the identity in a spontaneous network of small mobile devices (Privacy!). Remaining anonymous during roaming and information retrieval. Revealing the identity not until the exchange of values (i.e. not until authentication and other security mechanisms are really necessary). 6

Classical Means to Protect the Identity Mixes (Chaum) Onion Routing (Goldschlag, Reed, Syverson) Crowds (Reiter and Rubin) Hordes (Shields, Levine) Anonymizer: Proxies... They all have one severe disadvantage: They need a complex infrastructure! 7

Device Privacy Diamond Action Action Action t Location Location Location t User The Diamond shows how to cope with Pervasive Computing! 8

Relationships in the Privacy Diamond Relationships can be strengthened or weakened! Strengthen to from Action Action Location Which action was performed at the location? Device Which action was performed with this device? User Which action was performed by the user? Weaken Accountability Privacy Location Device User From where was the action initiated? Which device have been used? Which user performed the action? Which device was at the location? Which user was at the location? Where was the device? Which user operated the device? Where was the user? Which device did the user use? 9

Strengthen: PKI in the Internet Action [[ a ]] CA Device [[ d ]] CA CA Location [[ l l ]] User [[ u ]] 10

Strengthen: Location Stamp Action [[ a ]] CA CA Device [[ d ]] CA Location [[ l l ]] CA User [[ u ]] 11

Relationships that threaten Privacy Action [[ a ]] Device [[ d ]] Location [[ l l ]] User [[ u ]] RED: Privacy threatened! 12

Device [[ d ]] Mixes in the Internet Requires a Complexe Infrastructure Action [[ a ]] Location [[ l l ]] User [[ u ]] Trying to weaken [Device Action]! 13

Internet Café Action [[ a ]] Device [[ d ]] Location [[ l l ]] User [[ u ]] Trying to weaken [User Location]! 14

Location Addressing Action [[ a ]] Device [[ d ]] Location [[ l l ]] User [[ u ]] [Device Location] is weakened for a mobile user! 15

Natural Pseudonym Location/Time Asahi Shinbun und BZ? Asahi Shinbun und BZ! Anonymity partially possible Controlled transparency 16

Transactional Security Mobile Device 1. Request Shop / Service Provider 2. Value without certificate, Nonce 3. Token based money, signed Nonce 4. Certificate to unlock value A = Atomicity: all or none C = Consistency: valid state to valid state I = Isolation: no concurrent access to same data D = Durability: changes are permanent 17