Privacy Issues in an Insecure World

نویسنده

  • W. Timothy Strayer
چکیده

We all have a notion of privacy and understand that we trade some of it away in order to have normal social interactions and communal security. Networked computer systems are no different. The notion of privacy is running squarely against the need for security in an increasingly networked world. Is it possible to have secure systems that honor privacy? There are two basic ways to secure a network: prevent bad things from happening, and watch closely for bad things and prosecute those who commit them. Since our current preventative measures like authentication and authorization seem to be failing to adequately protect the network, we have turned more toward auditing and monitoring—first as a complement, and now increasingly as a substitute—for prevention. The emphasis is on using threat of stiff penalties as the detenant, but for those perpetrators of intrusion, the auditing systems are required to collect enough forensic information for legal prosecution. The operative questions are: 1. Is this effective? 2. What impact is this having on otherwise law abiding citizens? Storage is very cheap, so monitoring systems can record a great deal of information, and recent legislation allows employers and the government to do so liberally. New research in data mining techniques and sophisticated analysis make them increasingly effective. And visualization tools allow investigators to notice subtle patterns that would otherwise be lost in the aggregate. Given that the vast majority of the traffic being monitored is legitimate, the very act of searching for evil-doers exposes things we have generally considered private. The new and effective monitoring tools encourage snooping, and the laws so far do little to discourage it. In this talk I discuss the impact security concerns is having on privacy, and suggest that today’s trend of solving security by detecting intrusions through monitoring is a reaction to institutional paranoia as well as woefully inadequate software development processes. I argue that monitoring alone can’t provide sufficient protection, and that in fact the trend of relying increasingly on intrusion detection systems tells us that we are really losing ground—not gaining—on providing computer security. And it doesn’t have to be this way. Strong authentication and authorization systems do not necessarily have to rely on positive identity to work. Yes, networked computer systems must be monitored and audited for inappropriate use, but the key phrase must be to the minimum extent possible in order to strike the proper balance between privacy and security. Views and conclusions contained in this talk are those of the author and should not be interpreted as representing BBN official policies, either expressed or implied. Proceedings of the Second IEEE International Symposium on Network Computing and Applications (NCA’03) 0-7695-1938-5/03 $17.00 © 2003 IEEE

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Architecture for Security and Protection of Big Data

The issue of online privacy and security is a challenging subject, as it concerns the privacy of data that are increasingly more accessible via the internet. In other words, people who intend to access the private information of other users can do so more efficiently over the internet. This study is an attempt to address the privacy issue of distributed big data in the context of cloud computin...

متن کامل

Privacy and Security of Big Data in THE Cloud

Big data has been arising a growing interest in both scien- tific and industrial fields for its potential value. However, before employing big data technology into massive appli- cations, a basic but also principle topic should be investigated: security and privacy. One of the biggest concerns of big data is privacy. However, the study on big data privacy is still at a very early stage. Many or...

متن کامل

Identifying and Ranking Ethical Issues of the Internet of Things in Medical Sciences using Stepwise Weight Assessment Ratio Analysis

Background and Objectives: The Internet of Things (IoT) refers to billions of physical devices around the world that are now connected to the internet, all collecting and sharing data. The IoT has been widely applied to interconnect available medical resources and provide reliable, effective and smart healthcare service to the people. The social acceptance of IoT applications and services stron...

متن کامل

Privacy and Security of Big Data in THE Cloud

Big data has been arising a growing interest in both scien- tific and industrial fields for its potential value. However, before employing big data technology into massive appli- cations, a basic but also principle topic should be investigated: security and privacy. One of the biggest concerns of big data is privacy. However, the study on big data privacy is still at a very early stage. Many or...

متن کامل

On Indistinguishability in Remote Data Integrity Checking

With a rapid growth of data storage in the cloud, data integrity checking in a remote data storage system has become an important issue. A number of protocols, which allow remote integrity checking by a third party, have been proposed. Although those protocols are provably secure, the data privacy issues in those protocols have not been considered. We believe that these issues are equally impor...

متن کامل

A centralized privacy-preserving framework for online social networks

There are some critical privacy concerns in the current online social networks (OSNs). Users' information is disclosed to different entities that they were not supposed to access. Furthermore, the notion of friendship is inadequate in OSNs since the degree of social relationships between users dynamically changes over the time. Additionally, users may define similar privacy settings for their f...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003