Privacy-Protecting Mechanisms for Data Escrow and Transaction Monitoring

数据托管和交易监控的隐私保护机制

基本信息

  • 批准号:
    0430622
  • 负责人:
  • 金额:
    --
  • 依托单位:
  • 依托单位国家:
    美国
  • 项目类别:
    Continuing Grant
  • 财政年份:
    2004
  • 资助国家:
    美国
  • 起止时间:
    2004-09-15 至 2008-08-31
  • 项目状态:
    已结题

项目摘要

Collection and monitoring of personal and business data will help government agencies detect crime, fraud, terrorism, natural disasters, and other emergencies. On the other hand, government collection and monitoring of massive mounts of data would create tremendous threats to people's privacy and an unnecessary potential for abuse. While low-tech collection of information by government agencies has been an accepted practice, the increased connectivity and transaction speed enabled by the Internet make centralized oversight of various transactional activities both more desirable and potentially more dangerous. For example, banks and individuals were for a long time required to report transactions involving more than $10,000 in cash. After 9/11, the Patriot Act asked each bank to report more patterns of suspicious activities, including for example series of smaller cash transactions or international transfers adding up to $10,000. However, since Internet banking makes it easier to conduct transactions via multiple financial institutions, what the crime fighters would really like is an ability to collect data from all financial institutions, and moreover, an ability to mine this data at will. Of course, this would be a nightmare to citizens' privacy. Indeed, the availability of all this data at the hands of a government agency is in fact bound to create new threats to the security of the banking system, possibly more serious than the threats the centralized monitoring attempted to solve. And yet, from the standpoint of cryptography, the conflict between the needs for data monitoring and the need for data privacy is not irreconcilable!Our research objective is to create mechanisms that limit the privacy threats posed by the data collection and monitoring applications, while still enabling their efficient operation. We believe that new cryptographic techniques can help resolve the conflicts between the benefits and threats posed by various data collection and monitoring scenarios. Fundamentally, we have no hope of resolving this conflict if the task of monitoring some activity for suspicious patters requires an unconstrained access to all the generated data. However, if the monitoring agency can be restricted in its access to the data, for example it can access only the data that satisfies some pre-defined suspicious patterns, then we can hope to enforce, using cryptographic mechanisms, (1) the correctness of the accessed data, and (2) the secrecy and anonymity of the data that does not meet the searched-for patterns. In other words, if conditions under which the agency should learn the data can be spelled out, then we can design data escrow protocols that allow the agency to do its monitoring work with no more intrusion on citizens' privacy then is absolutely necessary.In the financial monitoring example, the research question is to find an efficient encryption-like escrow scheme with the property that all escrowed transactions remain anonymous and undecipherable by default, except of, for example, transactions which form a pattern of international money transfers originating from the same person and adding up to $10,000.Our approach addresses a general problem of minimizing the threats posed by centralized collection and monitoring of sensitive private data. This is a novel but natural scenario for cryptography. It is also open-ended: Since different monitoring applications have different types of searched-for data patterns, this task will require a variety of approaches which are likely to produce privacy and/or correctness-enforcing mechanisms useful in other cryptographic applications. Our preliminary investigations identified the link between quite simple privacy-protected data escrow applications and deterministic encryptions, unlinkable signatures on ciphertexts, and fair two-party computation of probabilistic functionalities.This project establishes a new area of research on cryptographic tools and applications. While it's clear that centralized monitoring of various distributed activities might bring societal benefits, our research will help determine under what conditions and in what settings such monitoring can be done in a secure and maximally private manner. This research has a strong potential to impact the technical and political feasibility of data escrow and monitoring, strong PKI infrastructures (e.g. electronic IDs), and fault-tolerant cryptographic services.
收集和监控个人和商业数据将有助于政府机构发现犯罪、欺诈、恐怖主义、自然灾害和其他紧急情况。 另一方面,政府收集和监控大量数据将对人们的隐私造成巨大威胁,并可能造成不必要的滥用。 虽然政府机构以低技术手段收集信息已成为一种公认的做法,但互联网所带来的连通性和交易速度的提高,使得对各种交易活动进行集中监督既更可取,也可能更危险。 例如,长期以来,银行和个人必须报告涉及10 000美元以上现金的交易。 9/11事件后,《爱国者法案》要求每家银行报告更多的可疑活动模式,包括例如一系列小额现金交易或总额达1万美元的国际转账。 然而,由于互联网银行使通过多个金融机构进行交易变得更加容易,因此打击犯罪者真正想要的是能够从所有金融机构收集数据,并且能够随意挖掘这些数据。 当然,这对公民的隐私来说是一场噩梦。 事实上,所有这些数据在政府机构手中的可用性实际上必然会对银行系统的安全造成新的威胁,可能比集中监控试图解决的威胁更严重。 然而,从密码学的角度来看,数据监控的需求和数据隐私的需求之间的冲突并不是不可调和的!我们的研究目标是创建一种机制,限制数据收集和监控应用程序所带来的隐私威胁,同时仍然使其能够有效运行。我们相信,新的加密技术可以帮助解决各种数据收集和监控方案所带来的好处和威胁之间的冲突。 从根本上说,如果监视可疑模式的某些活动的任务需要不受约束地访问所有生成的数据,那么我们就没有希望解决这个冲突。 然而,如果监控机构可以限制其对数据的访问,例如它只能访问满足某些预定义的可疑模式的数据,那么我们可以希望使用加密机制来强制执行(1)访问数据的正确性,以及(2)不符合搜索模式的数据的保密性和匿名性。 换句话说,如果机构应该学习数据的条件可以阐明,那么我们可以设计数据托管协议,允许机构在不侵犯公民隐私的情况下进行监控工作,这是绝对必要的。在金融监控的例子中,研究的问题是找到一种有效的加密方法-类似于具有所有托管交易在默认情况下保持匿名和不可破译的属性的托管方案,除了,例如,形成源自同一人的国际汇款模式并总计达10美元的交易,000.我们的方法解决了一个一般性问题,即最大限度地减少集中收集和监视敏感私人数据所带来的威胁。 对于密码学来说,这是一个新颖但自然的场景。 它也是开放式的:由于不同的监控应用程序具有不同类型的搜索数据模式,因此该任务将需要各种可能产生在其他密码应用程序中有用的隐私和/或正确性强制机制的方法。 我们的初步研究发现了相当简单的隐私保护数据托管应用程序与确定性加密、密文上的不可验证签名和概率函数的公平两方计算之间的联系,该项目建立了密码工具和应用的新研究领域。 虽然很明显,对各种分布式活动的集中监控可能会带来社会效益,但我们的研究将有助于确定在什么条件下以及在什么环境下可以以安全和最大限度地私密的方式进行此类监控。 这项研究有很大的潜力,影响数据托管和监控,强大的PKI基础设施(如电子身份证),容错加密服务的技术和政治可行性。

项目成果

期刊论文数量(0)
专著数量(0)
科研奖励数量(0)
会议论文数量(0)
专利数量(0)

数据更新时间:{{ journalArticles.updateTime }}

{{ item.title }}
{{ item.translation_title }}
  • DOI:
    {{ item.doi }}
  • 发表时间:
    {{ item.publish_year }}
  • 期刊:
  • 影响因子:
    {{ item.factor }}
  • 作者:
    {{ item.authors }}
  • 通讯作者:
    {{ item.author }}

数据更新时间:{{ journalArticles.updateTime }}

{{ item.title }}
  • 作者:
    {{ item.author }}

数据更新时间:{{ monograph.updateTime }}

{{ item.title }}
  • 作者:
    {{ item.author }}

数据更新时间:{{ sciAawards.updateTime }}

{{ item.title }}
  • 作者:
    {{ item.author }}

数据更新时间:{{ conferencePapers.updateTime }}

{{ item.title }}
  • 作者:
    {{ item.author }}

数据更新时间:{{ patent.updateTime }}

Stanislaw Jarecki其他文献

Negotiated privacy
协商隐私
  • DOI:
  • 发表时间:
    2002
  • 期刊:
  • 影响因子:
    0
  • 作者:
    Stanislaw Jarecki;P. Lincoln;Vitaly Shmatikov
  • 通讯作者:
    Vitaly Shmatikov
Probabilistic Escrow of Financial Transactions with Cumulative Threshold Disclosure
具有累积阈值披露的金融交易的概率托管
  • DOI:
    10.1007/11507840_17
  • 发表时间:
    2005
  • 期刊:
  • 影响因子:
    0
  • 作者:
    Stanislaw Jarecki;Vitaly Shmatikov
  • 通讯作者:
    Vitaly Shmatikov
Optimal Signcryption from Any Trapdoor Permutation
任何陷门排列的最佳签密
  • DOI:
  • 发表时间:
    2004
  • 期刊:
  • 影响因子:
    0
  • 作者:
    Y. Dodis;M. Freedman;Stanislaw Jarecki;Shabsi Walfish
  • 通讯作者:
    Shabsi Walfish
Efficient Covert Two-Party Computation
  • DOI:
    10.1007/978-3-319-76578-5_22
  • 发表时间:
    2018-03
  • 期刊:
  • 影响因子:
    0
  • 作者:
    Stanislaw Jarecki
  • 通讯作者:
    Stanislaw Jarecki
Three-Party ORAM for Secure Computation
用于安全计算的三方 ORAM

Stanislaw Jarecki的其他文献

{{ item.title }}
{{ item.translation_title }}
  • DOI:
    {{ item.doi }}
  • 发表时间:
    {{ item.publish_year }}
  • 期刊:
  • 影响因子:
    {{ item.factor }}
  • 作者:
    {{ item.authors }}
  • 通讯作者:
    {{ item.author }}

{{ truncateString('Stanislaw Jarecki', 18)}}的其他基金

Collaborative Research: SaTC: TTP: Medium: Intrusion-Tolerant Outsourced Storage for Cyber-Infrastructure
协作研究:SaTC:TTP:中:网络基础设施的耐入侵外包存储
  • 批准号:
    2030575
  • 财政年份:
    2020
  • 资助金额:
    --
  • 项目类别:
    Standard Grant
SaTC: CORE: Small: Secure Computation on Large Data
SaTC:核心:小型:大数据安全计算
  • 批准号:
    1817143
  • 财政年份:
    2018
  • 资助金额:
    --
  • 项目类别:
    Standard Grant
CICI: Secure Data Architecture: Improving the Security and Usability of Two-Factor Authentication for Cyberinfrastructure
CICI:安全数据架构:提高网络基础设施双因素身份验证的安全性和可用性
  • 批准号:
    1547435
  • 财政年份:
    2016
  • 资助金额:
    --
  • 项目类别:
    Standard Grant
CAREER: Secure Multi-Party Protocols
职业:安全多方协议
  • 批准号:
    0747541
  • 财政年份:
    2008
  • 资助金额:
    --
  • 项目类别:
    Continuing Grant

相似海外基金

Novel mechanisms protecting the gut from TNF
保护肠道免受 TNF 侵害的新机制
  • 批准号:
    10752940
  • 财政年份:
    2023
  • 资助金额:
    --
  • 项目类别:
How do changes in the environment alter the mechanisms underlying community assembly: a process based approach to protecting fisheries
环境变化如何改变社区组装的机制:基于过程的渔业保护方法
  • 批准号:
    553711-2020
  • 财政年份:
    2020
  • 资助金额:
    --
  • 项目类别:
    Alexander Graham Bell Canada Graduate Scholarships - Master's
CAREER: Protecting Buildings and Structures from Vibration Damage using Variable Inertance Mechanisms
职业:使用可变惯性机构保护建筑物和结构免受振动损坏
  • 批准号:
    1944513
  • 财政年份:
    2020
  • 资助金额:
    --
  • 项目类别:
    Standard Grant
RI: Small: Protecting Social Choice Mechanisms from Malicious Influence
RI:小:保护社会选择机制免受恶意影响
  • 批准号:
    1903207
  • 财政年份:
    2019
  • 资助金额:
    --
  • 项目类别:
    Standard Grant
Mechanisms of antibiotics biosynthesis in plant-protecting bacteria
植保细菌抗生素生物合成机制
  • 批准号:
    17K08176
  • 财政年份:
    2017
  • 资助金额:
    --
  • 项目类别:
    Grant-in-Aid for Scientific Research (C)
Doctoral Dissertation Research in DRMS: Protecting the Coastline - Optimal Coastal Inundation Adaptation Mechanisms
DRMS 博士论文研究:保护海岸线 - 最佳海岸洪水适应机制
  • 批准号:
    1326783
  • 财政年份:
    2013
  • 资助金额:
    --
  • 项目类别:
    Standard Grant
Protecting the parks: developing a model to assess the mechanisms driving species declines in protected areas
保护公园:开发模型来评估驱动保护区物种减少的机制
  • 批准号:
    420012-2012
  • 财政年份:
    2012
  • 资助金额:
    --
  • 项目类别:
    Alexander Graham Bell Canada Graduate Scholarships - Master's
Self-protecting and survivable ad hoc wireless networks benefiting from the efficiency of mechanisms in the Biological immune system
受益于生物免疫系统机制的效率的自我保护和可生存的特设无线网络
  • 批准号:
    14270754
  • 财政年份:
    2005
  • 资助金额:
    --
  • 项目类别:
    Research Grants
METABOLIC MECHANISMS LIMITING AND PROTECTING LONGEVITY
限制和保护寿命的代谢机制
  • 批准号:
    7176852
  • 财政年份:
    2003
  • 资助金额:
    --
  • 项目类别:
METABOLIC MECHANISMS LIMITING AND PROTECTING LONGEVITY
限制和保护寿命的代谢机制
  • 批准号:
    7014552
  • 财政年份:
    2003
  • 资助金额:
    --
  • 项目类别:
{{ showInfoDetail.title }}

作者:{{ showInfoDetail.author }}

知道了