This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Achieving Privacy in Trust Negotiations with an Ontology-Based Approach
January-March 2006 (vol. 3 no. 1)
pp. 13-30
The increasing use of Internet in a variety of distributed multiparty interactions and transactions with strong real-time requirements has pushed the search for solutions to the problem of attribute-based digital interactions. A promising solution today is represented by automated trust negotiation systems. Trust negotiation systems allow subjects in different security domains to securely exchange protected resources and services. These trust negotiation systems, however, by their nature, may represent a threat to privacy in that credentials, exchanged during negotiations, often contain sensitive personal information that may need to be selectively released. In this paper, we address the problem of preserving privacy in trust negotiations. We introduce the notion of privacy preserving disclosure, that is, a set that does not include attributes or credentials, or combinations of these, that may compromise privacy. To obtain privacy preserving disclosure sets, we propose two techniques based on the notions of substitution and generalization. We argue that formulating the trust negotiation requirements in terms of disclosure policies is often restrictive. To solve this problem, we show how trust negotiation requirements can be expressed as property-based policies that list the properties needed to obtain a given resource. To better address this issue, we introduce the notion of reference ontology, and formalize the notion of trust requirement. Additionally, we develop an approach to derive disclosure policies from trust requirements and formally state some semantics relationships (i.e., equivalence, stronger than) that may hold between policies. These relationships can be used by a credential requestor to reason about which disclosure policies he/she should use in a trust negotiation.

[1] E. Bertino, E. Ferrari, and A. Squicciarini, “Privacy Preserving Trust Negotiations,” Proc. Fourth Int'l Workshop Privacy Enhancing Technologies, 2004.
[2] E Bertino, E. Ferrari, and A. Squicciarini, “$Trust{\hbox{-}}{\cal{X}}$ — A Peer to Peer Framework for Trust Establishment,” IEEE Trans. Knowledge and Data Eng., vol. 16, no. 7, pp. 827-842, Apr. 2004.
[3] E. Bertino, E. Ferrari, and A. Squicciarini, “Trust Negotiations: Concepts, Systems, and Languages,” IEEE Computing in Science and Eng., vol. 6, no. 4, pp. 27-34, 2004.
[4] P. Bonatti and S. Kraus, “Foundations on Secure Deductive Databases,” IEEE Trans. Knowledge and Data Eng., vol. 7, no. 3, pp. 406-422, 1995.
[5] P. Bonatti and P. Samarati, “Regulating Access Services and Information Release on the Web,” Proc. Seventh ACM Conf. Computer and Comm. Security, 2000.
[6] R. Brand, “Microdata Protection through Noise Addition,” Inference Control in Statistical Databases, from Theory to Practice, pp. 97-116. London: Springer-Verlag, 2002.
[7] S. Brands, Rethinking Public Key Infrastructure and Digital Credentials. MIT Press, 2000.
[8] A. Doan, J. Madhavan, P. Domingos, and A. Halevy, Ontology Matching: Machine Learning Approach, Springer-Velag, 2003.
[9] J. Domingo-Ferrer, Inference Control in Statistical Databases from Theory to Practice, vol. 2316. Springer, 2002.
[10] T.R. Gruber, “A Translation Approach to Portable Ontology Specifications,” Knowledge Acquisition, vol. 5, no 2, pp. 199-220, 1993.
[11] A. Herzberg et al., “Access Control Meets Public Key Infrastructure, or: Assigning Roles to Strangers,” Proc. IEEE Symp. Security and Privacy, 2000.
[12] J. Holt, R. Bradshaw, K.E. Seamons, and H. Orman, “Hidden Credentials,” Proc. Second ACM Workshop Privacy in the Electronic Soc., 2003.
[13] R.D. Jarvis, “Selective Disclosure of Credential Content during Trust Negotiation,” master of science thesis, Brigham Young Univ., Apr. 2003.
[14] L. Khan, D. McLeod, and E. Hovy, “Retrieval Effectiveness of an Ontology-Based Model for Information Selection,” The VLDB J., vol. 13, no. 1, pp. 71-85, 2004.
[15] M. Marchiori, L. Cranor, and M. Langheirich, “The Platform for Privacy Preferences 1.0 (p3p1.0) Specification,” W3C Reccomandation, Apr. 2002, http://www.w3.org/P3Pbrochure.html.
[16] M. Naor, “Bit Commitment Using Pseudorandomness,” Advances in Cryptology-89, vol. 435, Lecture Notes in Computer Science, New York, 1990.
[17] I. Visconti and P. Persiano, “User Privacy Issues Regarding Certificates and the TLS Protocol,” Proc. ACM Conf. Computer and Comm. Security, 2000.
[18] P. Samarati and L. Sweeney, “Generalizing Data to Provide Anonymity When Disclosing Information,” Proc. 17th ACM SIGACT-SIGMOD-SIGART Symp. Principles of Database Systems, June 1998.
[19] K.E. Seamons, M. Winslett, and T. Yu, “Requirements for Policy Languages for Trust Negotiation,” Proc. Third IEEE Int'l Workshop Policies for Distributed Systems and Networks, 2002.
[20] L. Sweeney, “$k{\hbox{-}}{\rm{anonymity}}$ : A Model for Protecting Privacy,” Int'l J. Uncertainty, Fuziness and Knowledge-Based Systems, vol. 10, no. 5, pp. 557-570, 2002.
[21] M. Uschold and M. Gruninger, “Ontologies: Principles, Methods, and Applications,” Knowledge Eng. Rev., vol. 11, no. 2, pp. 93-155, 1996.
[22] M. Winsborough and N. Li, “Safety in Automated Trust Negotiation,” Proc. IEEE Symp. Security and Privacy, 2004.
[23] W.H. Winsborough and N. Li, “Protecting Sensitive Attributes in Automated Trust Negotiation,” Proc. ACM Workshop Privacy in the Electronic Soc., 2002.
[24] W.H. Winsborough, K.E. Seamons, and V. Jones, “Automated Trust Negotiation,” Proc. DARPA Information Survivability Conf. and Exposition, vol. I, pp. 88-102, 2000.
[25] T. Yu and M. Winslett, “A Unified Scheme for Resource Protection in Automated Trust Negotiation,” Proc. IEEE Symp. Security and Privacy, 2003.
[26] T. Yu, M. Winslett, and K.E. Seamons, “Supporting Structured Credentials and Sensitive Policies through Interoperable Strategies for Automated Trust Negotiation,” ACM Trans. Information and System Security, vol. 6, no. 1, 2003.

Index Terms:
Privacy, trust negotiations, ontology.
Citation:
Anna C. Squicciarini, Elisa Bertino, Elena Ferrari, Indrakshi Ray, "Achieving Privacy in Trust Negotiations with an Ontology-Based Approach," IEEE Transactions on Dependable and Secure Computing, vol. 3, no. 1, pp. 13-30, Jan.-March 2006, doi:10.1109/TDSC.2006.3
Usage of this product signifies your acceptance of the Terms of Use.