Privacy - Preserving Credit

نویسندگان

  • Keith Frikken
  • Mikhail Atallah
  • Chen Zhang
چکیده

Typically, when a borrower (Bob) wishes to establish a tradeline (e.g., a mortgage, an automobile loan, or a credit card) with a lender (Linda), Bob is subjected to a credit check by Linda. The credit check is done by having Linda obtain financial information about Bob in the form of a credit report. Credit reports are maintained by Credit Report Agencies, and contain a large amount of private information about individuals. Furthermore, Linda’s criteria for loan qualification are also private information. We propose a “privacypreserving” credit check scheme that allows Bob to have his credit checked without divulging private information to Linda while protecting Linda’s interests. We give protocols for achieving the above while: i) protecting Bob’s private information, ii) making sure that Bob cannot lie about his credit (thus Linda is assured that the information is accurate), iii) that Linda’s qualification criteria are protected, and iv) that the CRA does not learn from the protocols anything other than “Bob requested a loan from Linda”. What distinguishes this work from the traditional two-party privacy-preserving framework is (i) the need for secure and privacy-preserving third-party verification of the accuracy of the inputs used, and (ii) the fact that the function being computed is private to the lender and should not be revealed to either the borrower or to the above-mentioned third-party verifier. Although we choose to present the techniques of this paper for the credit checking application domain, they have much broader applicability and in fact work for any situation where there is a repository of public and private information about individuals, that is subsequently used for making decisions that impact the individuals (a credit rating agency is but one example of such a repository). Portions of this work were supported by Grants IIS0325345, IIS-0219560, IIS-0312357, and IIS-0242421 from the National Science Foundation, Contract N00014-02-10364 from the Office of Naval Research, by sponsors of the Center for Education and Research in Information Assurance and Security, and by Purdue Discovery Park’s eenterprise Center. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. To copy otherwise, to republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. EC’05, June 5–8, 2005, Vancouver, British Columbia, Canada. Copyright 2005 ACM 1-59593-049-3/05/0006 ...$5.00.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Effective Incentive Compatible Model for Privacy Preservation of Information in Secure Data Sharing and Publishing

Privacy preserving is one of the most important research topics in the data security field and it has become a serious concern in the secure transformation of personal data in recent years. For example, different credit card companies and disease control centers may try to build better data sharing or publishing models for privacy protection through privacy preserving data mining techniques (PP...

متن کامل

Privacy Preserving Data Mining Techniques in a Distributed Environment

Data storing and retrieving has been important since decades in the world of information. It makes this process prolific, when the retrieved information becomes smartly meaningful. Data mining is this new flavor. In the recent years data mining is a wide spread and active area of research. Its meaningfulness has gained momentum due to its vast area of applications. One of the popular and potent...

متن کامل

A centralized privacy-preserving framework for online social networks

There are some critical privacy concerns in the current online social networks (OSNs). Users' information is disclosed to different entities that they were not supposed to access. Furthermore, the notion of friendship is inadequate in OSNs since the degree of social relationships between users dynamically changes over the time. Additionally, users may define similar privacy settings for their f...

متن کامل

An Anonymous Credit Card System

Credit cards have many important benefits; however, these same benefits often carry with them many privacy concerns. In particular, the need for users to be able to monitor their own transactions, as well as bank’s need to justify its payment requests from cardholders, entitle the latter to maintain a detailed log of all transactions its credit card customers were involved in. A bank can thus b...

متن کامل

Privacy Preserving Payments in Credit Networks: Enabling trust with privacy in online marketplaces

A credit network models trust between agents in a distributed environment and enables payments between arbitrary pairs of agents. With their flexible design and robustness against intrusion, credit networks form the basis of several Sybil-tolerant social networks, spam-resistant communication protocols, and payment systems. Existing systems, however, expose agents’ trust links as well as the ex...

متن کامل

HEMIN: A Cryptographic Approach for Private k-NN Classification

Data mining is frequently obstructed by privacy concerns. In many cases, data is shared with third party for the mining purpose. However, sharing of data for analysis is not possible due to prevailing privacy laws and/or policies. Privacy preserving data mining techniques have been developed to address this issue by providing mechanisms to mine the data while guaranteing certain levels of priva...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007