Fundamental Limits on a Model of Privacy-Trust Tradeoff: Information Theoretic Approach

نویسنده

  • Garimella Rama Murthy
چکیده

Zhong et al. formulated the problem of disclosing credentials (associated with privacy) for building trust in an open environment like Internet. Thus, one form of privacy-trust problem is formulated in [17]. In [17], an entropy measure is defined to quantify privacy loss. In this research paper, by a proper formulation (modelling), the privacy-trust tradeoff is attacked from the Information Theoretic view point. It is shown that as long as privacy loss (or more accurately a measure related to privacy loss) is below a limit, through the use of properly coded credentials, it is possible to achieve arbitrarily good trust. The approach presented here will lead to several practical schemes in trading privacy for trust.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

تأثیر حریم خصوصی، امنیت و اعتماد ادراک شده بر رفتار به اشتراک‌گذاری اطلاعات در شبکه‌های اجتماعی موبایل: نقش تعدیل‌کننده متغیر جنسیت

The appearance of social networks has been one of the most important events in recent decades. One of the issues raised in these networks, is how to trust. The purpose of this paper is to examine the impact of security, trust and privacy about information sharing on mobile social networks. The study also describes how users' gender moderates the privacy and security impact on trust. The current...

متن کامل

Context-Aware Generative Adversarial Privacy

Preserving the utility of published datasets while simultaneously providing provable privacy guarantees is a well-known challenge. On the one hand, context-free privacy solutions, such as differential privacy, provide strong privacy guarantees, but often lead to a significant reduction in utility. On the other hand, context-aware privacy solutions, such as information theoretic privacy, achieve...

متن کامل

Lossy data compression: nonasymptotic fundamental limits

The basic tradeoff in lossy compression is that between the compression ratio (rate) and the fidelity of reproduction of the object that is compressed. Traditional (asymptotic) information theory seeks to describe the optimum tradeoff between rate and fidelity achievable in the limit of infinite length of the source block to be compressed. A perennial question in information theory is how relev...

متن کامل

The Relationship Between Patients’ Perceived Health Status and Trust Propensity With Privacy Calculus

Background: Patients need peace of mind to disclose their information to medical staff and with the lack of trust or in specific health status, they may avoid providing sensitive information for their care or might change the information. This research aims to examine the impact of perceived health status and trust propensity on privacy calculus. Methods: This research was analytical-study. 3 ...

متن کامل

Combination of real options and game-theoretic approach in investment analysis

Investments in technology create a large amount of capital investments by major companies. Assessing such investment projects is identified as critical to the efficient assignment of resources. Viewing investment projects as real options, this paper expands a method for assessing technology investment decisions in the linkage existence of uncertainty and competition. It combines the game-theore...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • I. J. Network Security

دوره 3  شماره 

صفحات  -

تاریخ انتشار 2006