This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Moving E-Commerce with PIVOTS: Private Information Viewing Offering Total Safety
June 2004 (vol. 16 no. 6)
pp. 641-652

Abstract—We present a technology which enables wide-scale deployment of a unique and powerful data access and search tool. This tool makes it possible for content owners on the Internet to offer end-users the ability to search, assess, or otherwise examine their nondisclosable private data. The end-users may use arbitrary, distrusted assessment algorithms and receive the results which are produced. These results take the form of a meaningful digest, e.g., a useful statistic, a relevance assessment, etc. There exists some controllable danger of information theft which, however, is quantitatively dependent on system parameters and can be tuned accordingly. We consider a broad class of practical applications where brute force attacks exist which are easier and cheaper to implement than an attack through appropriately configured PIVOTS, making our system, effectively, very trustworthy. The actual creation of the search algorithm may be performed by the end-users themselves in specialized applications, or by third-party search-engine operators who offer their services to end-users. Sophisticated data mining technologies which are very often not directly available to content owners can thus be exploited to mine even private data collections. Users discovering interesting items in private data sets may purchase this specific data, but other desirable exploitation possibilities are also analyzed. A novel business model is presented and its potential for great impact on e-commerce is explored. Three diverse and important real-world applications are presented in conclusion.

[1] B. Rosenblatt, B. Trippe, and S. Mooney, Digital Rights Management: Business and Technology. New York: John Wiley&Sons, 2001.
[2] P. Samuelson, Good News and Bad News on the Intellectual Property Front Comm. ACM, vol. 42, no. 3, pp. 335-342, 1999.
[3] S. Kenny and L. Korba, Applying Digital Rights Management Systems to Privacy Rights Management Computers&Security, vol. 21, no. 7, pp. 648-664, 2002.
[4] S.H. Kwok et al., Digital Rights Management in Internet Open Trading Protocol (IOTP) Proc. Int'l Conf. Electronic Commerce (ICEC 2000), pp. 179-185, 2000.
[5] L. Gong, Inside Java 2 Platform Security. Addison-Wesley, 1999.
[6] T. Lindholm and F. Yellin, The Java Virtual Machine Specification. Addison-Wesley, 2001.
[7] http://java.sun.comsecurity/, Mar. 2003.
[8] Agent Communication Language, FIPA 2000 Specification,http:/www.FIPA.org, Mar. 2003.
[9] G. Wagner, Foundations of Knowledge Systems with Applications to Databases and Agents. New York: Kluwer Academic Publishers, 1998.
[10] H. Nwana and D. Ndumu, A Perspective on Software Agents Research The Knowledge Eng. Rev., Cambridge Univ. Press, vol. 14, no. 2, pp 1-18, 1999.
[11] G. Wagner, Towards Agent-Oriented Information Systems technical report, Freie Universität Berlin,http://www.inf. fu-berlin.de/~wagnergindex.html , 1999.
[12] N.R. Jennings, K. Sycara, and M. Wooldridge, A Roadmap of Agent Research and Development Autonomous Agents and Multi-Agent Systems, vol. 1, no. 1, pp. 7-38, 1998.
[13] M.J. Huber, Jam Agents in a Nutshell,http://members.home. net:80/marcushIRS/, Dec. 2002.
[14] S. Haykin, Neural Networks: A Comprehensive Foundation, second ed., Upper Saddle River, N.J.: Prentice-Hall, 1999.
[15] http://java.sun.com/j2se/1.3docs/, Mar. 2003.
[16] Sun Microsystems, Security and Signed Applet, 2001,http://jsp2.java.sun.com/products/plugin/ 1.3/docsnetscape.html, Mar. 2003.
[17] http://www.ikv.de/productsgrasshopper/, Sept. 2002. for newer versions,http://www.ikv.de/content/Produkteos p_e.htm , Mar. 2003.
[18] http://edit.yahoo.com/configeval_register /, Feb. 2003.
[19] E.A. Ladroy, Securing Electronic Text against Optical Character Recognition Proc. Second WOSAT Int'l Conf. Image Processing (WOSAT'02), pp. 70-91, 2002.
[20] MEMPHIS Technical Annex, Project Reference IST-2000-25045.
[21] http:/www.ist-memphis.org/, July 2003.
[22] P.D. Wasserman, Advanced Methods in Neural Computing. New York: Van Nostrand Reinhold, 1993.
[23] C.M. Bishop, Neural Networks for Pattern Recognition. Oxford: Clarendon Press, 1995.
[24] S. Brin and L. Page, The Anatomy of a Large-Scale Hypertextual Web Search Engine Computer Networks and ISDN Systems, vol. 30, nos. 1-7, pp. 107-117, 1998.
[25] http:/www.google.com/, July 2003.
[26] http:/www.sciencedirect.com/, July 2003.

Index Terms:
Internet search, relevance feedback, security, access control, e-commerce.
Citation:
Angelos Yannopoulos, Yiannis Stavroulas, Theodora A. Varvarigou, "Moving E-Commerce with PIVOTS: Private Information Viewing Offering Total Safety," IEEE Transactions on Knowledge and Data Engineering, vol. 16, no. 6, pp. 641-652, June 2004, doi:10.1109/TKDE.2004.10
Usage of this product signifies your acceptance of the Terms of Use.