Economic Barriers to the Deployment of Existing Privacy Technologies (Position Paper)

نویسندگان

  • Joan Feigenbaum
  • Michael J. Freedman
  • Tomas Sander
  • Adam Shostack
چکیده

Internet-based commerce provides great opportunities for merchants, consumers, and business aÆliates, but it may seriously threaten users' privacy. Some of the paths to loss of privacy are quite familiar (e.g., mining of credit-card data), but some are new or much more serious than they were in earlier regimes. We present two points about the economics of electronic commerce: There are economic barriers to the adoption of privacy-enabling technology; furthermore, it is unclear that most of the privacy-enabling technology studied by the cryptology R&D community would address users' actual privacy concerns even if it were widely adopted. More details can be found in [2], which focuses on digital rights management (DRM) systems. Twentyve years of cryptographic research has yielded a vast array of privacy-enabling technologies that support many types of two-party and multi-party interactions. Thus, cryptographic researchers might wish to believe that user privacy in e-commerce and content distribution is a solved problem. You pay for content or services with anonymous electronic cash. You connect to content or service providers via an anonymizing mixnet. You authenticate yourself with anonymous credential schemes or zero-knowledge identication protocols. You download content via private information retrieval or oblivious transfer. You use secure function evaluation when interacting with services that require some information. Despite the fact that many of the impressive techniques in the cryptographic research literature have been extensively and rigorously analyzed, and some have even been commercially developed, few are in widespread use. It is our thesis that there are straightforward economic and business reasons for this apparent contradiction. The major constituencies involved in a privacy-enabling protocol or system must be willing to sacri ce the information that could be collected about the other parties or their inputs. In the absence of legal requirements { that are generally understood, technologically feasible, and consistently enforced { use of such protocols and systems must be voluntary and bilateral. However, in e-commerce transactions, these constituencies have con icting interests and asymmetric power. Why should a powerful content/service provider wanting to learn information about his users agree to run a protocol that deprives him of this very information? Industry is likely to the follow the \Know your customer" mantra. Many of the problems facing privacy-technology adoption can be framed in microeconomic terms, e.g., network externalities, asymmetric information, and moral hazard. See Anderson [1] and Shapiro and Varian [3] for similar arguments about related domains.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Privacy and Security of Big Data in THE Cloud

Big data has been arising a growing interest in both scien- tific and industrial fields for its potential value. However, before employing big data technology into massive appli- cations, a basic but also principle topic should be investigated: security and privacy. One of the biggest concerns of big data is privacy. However, the study on big data privacy is still at a very early stage. Many or...

متن کامل

Third party geolocation services in LBS: privacy requirements and research issues

The advances in positioning technologies and the emergence of geolocation standards opens up to the development of innovative location-based services (LBS), e.g., web-based LBS. These services challenge existing privacy protection solutions. For example, the position information is provided by a third party, the location provider, and this party may be not fully trusted. In this paper, we analy...

متن کامل

Privacy and Security of Big Data in THE Cloud

Big data has been arising a growing interest in both scien- tific and industrial fields for its potential value. However, before employing big data technology into massive appli- cations, a basic but also principle topic should be investigated: security and privacy. One of the biggest concerns of big data is privacy. However, the study on big data privacy is still at a very early stage. Many or...

متن کامل

Economics, Security and Innovation

This paper takes into account an economic perspective of security and innovation. In particular, it discusses aspects of economics that may be relevant in order to assess and deploy security technologies. At the micro level of analysis, as an example, this paper highlights discussions on the economics of security in the cloud. Do we really understand the economics of security in the cloud? Are ...

متن کامل

Privacy-Preserving Friendship Relations for Mobile Social Networking

This position paper explores the dual nature of friendship relations as an enabler but also as a pitfall for privacy in social networks. The privacy-deteriorating consequences of unilateral friendship disclosure are quantified for an existing medium-sized social network site. A lightweight implementation of hidden friendship using existing standards is proposed and assessed for practicable and ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2002