Escrowed Data and the Digital Envelope

نویسندگان

  • King Ables
  • Mark Ryan
چکیده

As computers continue to permeate all aspects of our lives, there is a growing tension between the requirements of societal security and individual privacy. Societal security encompasses all ways in which we try to make the world more secure, including transport security, financial security, infrastructure security, etc. A prime mechanism for achieving this security involves collecting quantities of data about individuals, for example via ISP logs, mobile phone logs, ticketing systems, and banking systems. As a result, massive databases about every aspect of our lives are being collected by organisations in all the major industrial sectors (financial, transport, retail, telecom, internet, and health care). These data collection has an impact on individual privacy. The unprecedented longevity, searchability, and especially the composability from different sources of these records imply a radical reduction in the level of individual privacy we can expect to enjoy over the coming decades. Numerous reports have documented this impact and its detrimental consequences to society’s well-being (e.g., in the UK, [3, 2]). There is no easy solution to this problem, because the security uses of the data are too important to be denied. Their use in crime detection is an example. About 440,000 requests by the police, local authorities and other permitted organisations to monitor telephone calls, emails and text messages were made in a 15 month period in 2005-06 in the UK [3, pp.32-33]. The “Intercept Modernisation Programme” is a UK Government initiative to centralise electronic communications traffic data in the UK in a single database [5, 8]. In another example, the UK intelligence agencies MI5 and MI6 have have sought full automated access to Transport for London’s ‘Oyster’ smartcard database [10]. Debate about balancing security and privacy is taking place at all levels of society [9, 3, 2, 4, 1, 7], and will likely continue for many more years.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Veriiable Escrowed Signature

We combine a publicly veriiable encryption technique and a Schnorr type signature scheme to achieve a veriiable escrowed signature scheme. The scheme allows a signer to convince a veriier the validity of a signature without letting him see the signature value. The unavailable but veriiable signature is encrypted under a public key of someone (e.g., a trusted third party) who stays oo-line. The ...

متن کامل

Ghost Image Mapping of Palatal Bone of Maxilla and Nasal Cavity in Panoramic View Using Cranex D Digital Machine

Introdouction: The mapping of ghost images of the maxilla and the nasal cavity, which are complex structures, is very important. The position of objects that create a ghost image can differ when using various devices. The purpose of this investigation was to study the mapping of ghost images of the maxilla and the nasal cavity using a Cranex D digital panoramic machine. Materials and methods: ...

متن کامل

The Efficiency of MSBM Model with Imprecise Data (Interval)

Data Envelopment Analysis (DEA) is a mathematical programming-based approach for evaluates the relative efficiency of a set of DMUs (Decision Making Units). The relative efficiency of a DMU is the result of comparing the inputs and outputs of the DMU and those of other DMUs in the PPS (Production Possibility Set). Also, in Data Envelopment Analysis various models have been developed in order to...

متن کامل

Escrowed Deniable Identification Schemes

Generally, the goal of identification schemes is to provide security assurance against impersonation attacks. Identification schemes based on zero knowledge protocols have more advantages, for example, deniability, which enables the prover to deny an identification proof so that the verifier couldn’t persuade others that it is indeed the prover who identified itself to him. This kind of identif...

متن کامل

RSA-Based Auto-recoverable Cryptosystems

The deployment of a “public-key infrastructure” (PKI) has recently started. Another recent concern in business and on the national level is the issue of escrowed encryption, key recovery, and emergency access to information (e.g., in the medical record area). Independent development of a PKI and an escrowed PKI (whenever required or desired) will pose a lot of constraints, duplication efforts a...

متن کامل

Dynamic Envelope and Control Shading Pattern to Visual Comfort of Office Building in Tehran

This work reviews the effect of parametric programming on visual performance, daylighting and shading in office buildings in Tehran-Iran and studies their influences that help not only to reduce the glare but also to promote useful daylight illuminance through promoting visual comfort. It starts by establishing a review of the effective parameters on visual comfort indices, glare indices, and d...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010