DIGITAL PRIVACY OTHER INFORMATION SECURITY BOOKS FROM AUERBACH 802.1X Port-Based Authentication Information Security Cost Management Edwin Lyle Brown Ioana V. Bazavan and Ian Lim ISBN: 1-4200-4464-8 ISBN: 0-8493-9275-6 Audit and Trace Log Management: Information Security Fundamentals Consolidation and Analysis Thomas R. Peltier, Justin Peltier, and John A. Blackley Phillip Q. Maier ISBN: 0-8493-1957-9 ISBN: 0-8493-2725-3 Information Security Management Handbook, The CISO Handbook: A Practical Guide to Sixth Edition Securing Your Company Harold F. Tipton and Micki Krause Michael Gentile, Ron Collette and Thomas D. August ISBN: 0-8493-7495-2 ISBN: 0-8493-1952-8 Information Security Risk Analysis, Complete Guide to Security and Privacy Second Edition Metrics: Measuring Regulatory Compliance, Thomas R. Peltier Operational Resilience, and ROI ISBN: 0-8493-3346-6 Debra S. Herrmann ISBN: 0-8493-5402-1 Investigations in the Workplace Eugene F. Ferraro Crisis Management Planning and Execution ISBN: 0-8493-1648-0 Edward S. Devlin ISBN: 0-8493-2244-8 IT Security Governance Guidebook with Security Program Metrics on CD-ROM Computer Forensics: Evidence Collection Fred Cohen and Management ISBN: 0-8493-8435-4 Robert C. Newman ISBN: 0-8493-0561-6 Managing an Information Security and Privacy Awareness and Training Program Curing the Patch Management Headache Rebecca Herold Felicia M Nicastro ISBN: 0-8493-2963-9 ISBN: 0-8493-2854-3 Mechanics of User Identification and Cyber Crime Investigator's Field Guide, Authentication: Fundamentals of Identity Second Edition Management Bruce Middleton Dobromir Todorov ISBN: 0-8493-2768-7 ISBN: 1-4200-5219-5 Database and Applications Security: Integrating Practical Hacking Techniques and Information Security and Data Management Countermeasures Bhavani Thuraisingham Mark D. Spivey ISBN: 0-8493-2224-3 ISBN: 0-8493-7057-4 Guide to Optimal Operational Risk and BASEL II Securing Converged IP Networks Ioannis S. Akkizidis and Vivianne Bouchereau Tyson Macaulay ISBN: 0-8493-3813-1 ISBN: 0-8493-7580-0 How to Achieve 27001 Certification: An The Security Risk Assessment Handbook: Example of Applied Compliance Management A Complete Guide for Performing Security Sigurjon Thor Arnason and Keith D. Willett Risk Assessments ISBN: 0-8493-3648-1 Douglas J. Landoll ISBN: 0-8493-2998-1 Information Security: Design, Implementation, Measurement, and Compliance Testing Code Security Timothy P. Layton Maura A. van der Linden ISBN: 0-8493-7087-6 ISBN: 0-8493-9251-9 Information Security Architecture: An Wireless Crime and Forensic Investigation Integrated Approach to Security in the Gregory Kipper Organization, Second Edition ISBN: 0-8493-3188-9 Jan Killmeyer ISBN: 0-8493-1549-2 AUERBACH PUBLICATIONS www.auerbach-publications.com To Order Call: 1-800-272-7737 • Fax: 1-800-374-3401 E-mail: [email protected] DIGITAL PRIVACY Theory, Technologies, and Practices Edited by (cid:33)(cid:76)(cid:69)(cid:83)(cid:83)(cid:65)(cid:78)(cid:68)(cid:82)(cid:79)(cid:0)(cid:33)(cid:67)(cid:81)(cid:85)(cid:73)(cid:83)(cid:84)(cid:73)(cid:0)(cid:115)(cid:0)(cid:51)(cid:84)(cid:69)(cid:70)(cid:65)(cid:78)(cid:79)(cid:83)(cid:0)(cid:39)(cid:82)(cid:73)(cid:84)(cid:90)(cid:65)(cid:76)(cid:73)(cid:83) (cid:35)(cid:79)(cid:83)(cid:84)(cid:65)(cid:83)(cid:0)(cid:44)(cid:65)(cid:77)(cid:66)(cid:82)(cid:73)(cid:78)(cid:79)(cid:85)(cid:68)(cid:65)(cid:75)(cid:73)(cid:83)(cid:0)(cid:0)(cid:115)(cid:0)(cid:51)(cid:65)(cid:66)(cid:82)(cid:73)(cid:78)(cid:65)(cid:0)(cid:36)(cid:69)(cid:0)(cid:35)(cid:65)(cid:80)(cid:73)(cid:84)(cid:65)(cid:78)(cid:73)(cid:0)(cid:68)(cid:73)(cid:0)(cid:54)(cid:73)(cid:77)(cid:69)(cid:82)(cid:67)(cid:65)(cid:84)(cid:73) New York London Auerbach Publications Taylor & Francis Group 6000 Broken Sound Parkway NW, Suite 300 Boca Raton, FL 33487-2742 © 2008 by Taylor & Francis Group, LLC Auerbach is an imprint of Taylor & Francis Group, an Informa business No claim to original U.S. Government works Printed in the United States of America on acid-free paper 10 9 8 7 6 5 4 3 2 1 International Standard Book Number-13: 978-1-4200-5217-6 (Hardcover) This book contains information obtained from authentic and highly regarded sources. Reprinted material is quoted with permission, and sources are indicated. A wide variety of references are listed. Reasonable efforts have been made to publish reliable data and information, but the author and the publisher cannot assume responsibility for the validity of all materials or for the conse- quences of their use. Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced, transmitted, or utilized in any form by any electronic, mechanical, or other means, now known or hereafter invented, including photocopying, microfilming, and recording, or in any information storage or retrieval system, without written permission from the publishers. For permission to photocopy or use material electronically from this work, please access www. copyright.com (http://www.copyright.com/) or contact the Copyright Clearance Center, Inc. (CCC) 222 Rosewood Drive, Danvers, MA 01923, 978-750-8400. CCC is a not-for-profit organization that provides licenses and registration for a variety of users. For organizations that have been granted a photocopy license by the CCC, a separate system of payment has been arranged. Trademark Notice: Product or corporate names may be trademarks or registered trademarks, and are used only for identification and explanation without intent to infringe. Visit the Taylor & Francis Web site at http://www.taylorandfrancis.com and the Auerbach Web site at http://www.auerbach-publications.com P1:Binod November17,2007 10:15 AU5217 AU5217˙C000 Contents Preface............................................................ix Acknowledgments..............................................xiii AbouttheEditors................................................xv Contributors....................................................xix PART I: THE PRIVACY SPACE 1 Privacy-EnhancingTechnologiesfortheInternetIII: TenYearsLater.................................................3 IanGoldberg 2 CommunicationPrivacy......................................19 AndreasPfitzmann,AndreasJuschka,Anne-KatrinStange, SandraSteinbrecher,andStefanKo¨psell 3 Privacy-PreservingCryptographicProtocols.................47 MikhailJ.AtallahandKeithB.Frikken PART II: PRIVACY ATTACKS 4 ByzantineAttacksonAnonymitySystems....................73 NikitaBorisov,GeorgeDanezis,andParisaTabriz 5 IntroducingTrafficAnalysis..................................95 GeorgeDanezisandRichardClayton v P1:Binod November17,2007 10:15 AU5217 AU5217˙C000 vi (cid:1) Contents 6 Privacy,Profiling,TargetedMarketing,andDataMining...117 JaideepVaidyaandVijayAtluri PART III: PRIVACY-ENHANCING TECHNOLOGIES 7 EnterprisePrivacyPoliciesandLanguages..................135 MichaelBackesandMarkusDu¨rmuth 8 UncircumventableEnforcementofPrivacyPolicies viaCryptographicObfuscation..............................155 ArvindNarayananandVitalyShmatikov 9 PrivacyProtectionwithUncertainty andIndistinguishability......................................173 X.SeanWangandSushilJajodia 10 Privacy-PreservationTechniquesinDataMining...........187 ChunhuaSu,JianyingZhou,FengBao,GuilinWang, andKouichiSakurai PART IV: USER PRIVACY 11 HCIDesignsforPrivacy-EnhancingIdentity Management ................................................. 229 SimoneFischer-Hu¨bner,JohnSo¨renPettersson, MikeBergmann,MaritHansen,SianiPearson, andMarcoCasassaMont 12 PrivacyPerceptionsamongMembers ofOnlineCommunities......................................253 MariaKarydaandSpyrosKokolakis 13 PerceivedControl:ScalesforPrivacy inUbiquitousComputing....................................267 SarahSpiekermann PART V: PRIVACY IN UBIQUITOUS COMPUTING 14 RFID:TechnologicalIssuesandPrivacyConcerns..........285 PabloNajeraandJavierLopez 15 Privacy-EnhancedLocationServicesInformation...........307 ClaudioA.Ardagna,MarcoCremonini, ErnestoDamiani,SabrinaDeCapitanidiVimercati, andPierangelaSamarati P1:Binod November17,2007 10:15 AU5217 AU5217˙C000 Contents (cid:1) vii 16 BeyondConsent:PrivacyinUbiquitous Computing(Ubicomp).......................................327 JeanCampandKayConnelly PART VI: THE ECONOMICS OF PRIVACY 17 ARiskModelforPrivacyInsurance.........................347 AthanassiosN.Yannacopoulos,SokratisKatsikas, CostasLambrinoudakis,StefanosGritzalis, andSteliosZ.Xanthopoulos 18 WhatCanBehavioralEconomicsTeach UsaboutPrivacy?............................................363 AlessandroAcquistiandJensGrossklags PART VII: PRIVACY AND POLICY 19 PrivacyofOutsourcedData..................................381 SabrinaDeCapitanidiVimercati,SaraForesti, StefanoParaboschi,andPierangelaSamarati 20 CommunicationsDataRetention:APandora’sBox forRightsandLiberties?.....................................409 LilianMitrou 21 SurveillanceofEmergentAssociations:Freedom ofAssociationinaNetworkSociety.........................435 KatherineJ.Strandburg Index..............................................................459 P1:Binod November17,2007 10:15 AU5217 AU5217˙C000 P1:Binod November17,2007 10:15 AU5217 AU5217˙C000 Preface Privacy Issues in the Digital Era Privacy as a social and legal issue has been a concern of social scientists, philosophers, and lawyers for a long time. Back in 1890, two American lawyers, S. Warren and L. Brandeis, defined privacy as the right of an in- dividual to be alone, and it has been recognized as a fundamental human right by the United Nations Declaration of Human Rights, the International Convenant on Civil and Political Rights, the Charter of Fundamental Rights of the European Union, and many other international treaties. Therefore, in democratic societies the protection of privacy is a crucial issue. Meanwhile, the intensive development of information and communi- cation technologies has resulted in numerous new electronic services that aim to improve people’s lives by allowing them to communicate and ex- change data through the Internet, advertise their ideas through the World Wide Web, and purchase goods and services. To a large extent, the raw material for most of these electronic services is the personal data of indi- viduals. Alongside the benefits for the people, these developments have introduced new risks such as identity theft, discriminatory profiling, con- tinuous surveillance, and fraud. According to recent surveys, privacy and (especially) anonymity, are the fundamental issues of concern for most In- ternet users, ranked higher than issues like ease-of-use, spam-mail, cost, and security. In view of the above, the OECD Declaration on the Protec- tion of Privacy on Global Networks (for developing a culture of privacy in the Global Village) is especially well timed. In this volume, privacy is considered as the indefeasible right of an individual to control the ways in which personal information is obtained, processed, distributed, shared, and used by any other entity. ix