Skip to main content

Trading Privacy for Trust

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2995))

Abstract

Both privacy and trust relate to knowledge about an entity. However, there is an inherent conflict between trust and privacy: the more knowledge a first entity knows about a second entity, the more accurate should be the trustworthiness assessment; the more knowledge is known about this second entity, the less privacy is left to this entity. This conflict needs to be addressed because both trust and privacy are essential elements for a smart working world. The solution should allow the benefit of adjunct trust when entities interact without too much privacy loss. We propose to achieve the right trade-off between trust and privacy by ensuring minimal trade of privacy for the required trust. We demonstrate how transactions made under different pseudonyms can be linked and careful disclosure of such links fulfils this right trade-off.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Cahill, V., et al.: Using Trust for Secure Collaboration in Uncertain Environments. Pervasive Computing 2(3), IEEE (2003)

    Google Scholar 

  2. Cooley, T.M.: A Treatise on the Law of Torts. Callaghan, Chicago (1888)

    Google Scholar 

  3. Douceur, J.R.: The Sybil Attack. In: Proceedings of the 1st International Workshop on Peer-to-Peer Systems (2002)

    Google Scholar 

  4. Goldberg, I.: A Pseudonymous Communications Infrastructure for the Internet. PhD Thesis, University of California at Berkeley (2000)

    Google Scholar 

  5. Jiang, X., Hong, J.I., Landay, J.A.: Approximate Information Flows: Socially Based Modeling of Privacy in Ubiquitous Computing. In: Borriello, G., Holmquist, L.E. (eds.) UbiComp 2002. LNCS, vol. 2498, pp. 176–193. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  6. Jonker, C.M., Treur, J.: Formal Analysis of Models for the Dynamics of Trust based on Experiences. In: Proceedings of the Workshop on Modelling Autonomous Agents in a Multi-Agent World (1999)

    Google Scholar 

  7. Jøsang, A.: The right type of trust for distributed systems. In: Proceedings of the 1996 New Security Paradigms Workshop, ACM, New York (1996)

    Google Scholar 

  8. Kobsa, A., Schreck, J.: Privacy through Pseudonymity in User-Adaptive Systems. ACM Transactions on Internet Technology 3(2) (2003)

    Google Scholar 

  9. Köpsell, S., Steinbrecher, S.: Modeling Unlinkability. In: Proceedings of the Third Workshop on Privacy Enhancing Technologies (2003)

    Google Scholar 

  10. Langheinrich, M.: Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems. In: Abowd, G.D., Brumitt, B., Shafer, S. (eds.) UbiComp 2001. LNCS, vol. 2201, p. 273. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  11. Marsh, S.: Formalising Trust as a Computational Concept. PhD Thesis, Department of Mathematics, University of Stirling (1994)

    Google Scholar 

  12. Maslow, H.: Motivation and Personality. Harper, New York (1954)

    Google Scholar 

  13. McKnight, D., Chervany, N.L.: The Meanings of Trust. MISRC 96-04, University of Minnesota (1996)

    Google Scholar 

  14. SECURE project, Website, http://secure.dsg.cs.tcd.ie

  15. Seigneur, J.-M., Farrell, S., Jensen, C.D., Gray, E., Chen, Y.: End-to-end Trust Starts with Recognition. In: Hutter, D., Müller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol. 2802, pp. 130–142. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  16. Seigneur, J.-M., Jensen, C.D.: Privacy Recovery with Disposable Email Addresses. Special Issue on Understanding Privacy 1(6), IEEE Security&Privacy (December 2003)

    Google Scholar 

  17. Seigneur, J.-M., Jensen, C.D.: Trust Enhanced Ubiquitous Payment without Too Much Privacy Loss. In: Proceedings of SAC 2004, ACM, New York (2004)

    Google Scholar 

  18. Spiekermann, S., Grossklags, J., Berendt, B.: E-privacy in 2nd Generation E-Commerce: Privacy Preferences versus actual Behavior. In: Proceedings of the 3rd Conference on Electronic Commerce, ACM, New York (2001)

    Google Scholar 

  19. Wagealla, W., Carbone, M., English, C., Terzis, S., Nixon, P.: A Formal Model of Trust Lifecycle Management. In: Proceedings of FAST 2003 (2003)

    Google Scholar 

  20. Winslett, M.: An Introduction to Trust Negotiation. In: Nixon, P., Terzis, S. (eds.) iTrust 2003. LNCS, vol. 2692, pp. 275–283. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  21. Yu, T., Winslett, M.: A Unified Scheme for Resource Protection in Automated Trust Negotiation. In: Proceedings of the IEEE Symposium on Security and Privacy (2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Seigneur, JM., Jensen, C.D. (2004). Trading Privacy for Trust. In: Jensen, C., Poslad, S., Dimitrakos, T. (eds) Trust Management. iTrust 2004. Lecture Notes in Computer Science, vol 2995. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-24747-0_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-24747-0_8

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-21312-3

  • Online ISBN: 978-3-540-24747-0

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics