Abstract
Both privacy and trust relate to knowledge about an entity. However, there is an inherent conflict between trust and privacy: the more knowledge a first entity knows about a second entity, the more accurate should be the trustworthiness assessment; the more knowledge is known about this second entity, the less privacy is left to this entity. This conflict needs to be addressed because both trust and privacy are essential elements for a smart working world. The solution should allow the benefit of adjunct trust when entities interact without too much privacy loss. We propose to achieve the right trade-off between trust and privacy by ensuring minimal trade of privacy for the required trust. We demonstrate how transactions made under different pseudonyms can be linked and careful disclosure of such links fulfils this right trade-off.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Cahill, V., et al.: Using Trust for Secure Collaboration in Uncertain Environments. Pervasive Computing 2(3), IEEE (2003)
Cooley, T.M.: A Treatise on the Law of Torts. Callaghan, Chicago (1888)
Douceur, J.R.: The Sybil Attack. In: Proceedings of the 1st International Workshop on Peer-to-Peer Systems (2002)
Goldberg, I.: A Pseudonymous Communications Infrastructure for the Internet. PhD Thesis, University of California at Berkeley (2000)
Jiang, X., Hong, J.I., Landay, J.A.: Approximate Information Flows: Socially Based Modeling of Privacy in Ubiquitous Computing. In: Borriello, G., Holmquist, L.E. (eds.) UbiComp 2002. LNCS, vol. 2498, pp. 176–193. Springer, Heidelberg (2002)
Jonker, C.M., Treur, J.: Formal Analysis of Models for the Dynamics of Trust based on Experiences. In: Proceedings of the Workshop on Modelling Autonomous Agents in a Multi-Agent World (1999)
Jøsang, A.: The right type of trust for distributed systems. In: Proceedings of the 1996 New Security Paradigms Workshop, ACM, New York (1996)
Kobsa, A., Schreck, J.: Privacy through Pseudonymity in User-Adaptive Systems. ACM Transactions on Internet Technology 3(2) (2003)
Köpsell, S., Steinbrecher, S.: Modeling Unlinkability. In: Proceedings of the Third Workshop on Privacy Enhancing Technologies (2003)
Langheinrich, M.: Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems. In: Abowd, G.D., Brumitt, B., Shafer, S. (eds.) UbiComp 2001. LNCS, vol. 2201, p. 273. Springer, Heidelberg (2001)
Marsh, S.: Formalising Trust as a Computational Concept. PhD Thesis, Department of Mathematics, University of Stirling (1994)
Maslow, H.: Motivation and Personality. Harper, New York (1954)
McKnight, D., Chervany, N.L.: The Meanings of Trust. MISRC 96-04, University of Minnesota (1996)
SECURE project, Website, http://secure.dsg.cs.tcd.ie
Seigneur, J.-M., Farrell, S., Jensen, C.D., Gray, E., Chen, Y.: End-to-end Trust Starts with Recognition. In: Hutter, D., Müller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol. 2802, pp. 130–142. Springer, Heidelberg (2004)
Seigneur, J.-M., Jensen, C.D.: Privacy Recovery with Disposable Email Addresses. Special Issue on Understanding Privacy 1(6), IEEE Security&Privacy (December 2003)
Seigneur, J.-M., Jensen, C.D.: Trust Enhanced Ubiquitous Payment without Too Much Privacy Loss. In: Proceedings of SAC 2004, ACM, New York (2004)
Spiekermann, S., Grossklags, J., Berendt, B.: E-privacy in 2nd Generation E-Commerce: Privacy Preferences versus actual Behavior. In: Proceedings of the 3rd Conference on Electronic Commerce, ACM, New York (2001)
Wagealla, W., Carbone, M., English, C., Terzis, S., Nixon, P.: A Formal Model of Trust Lifecycle Management. In: Proceedings of FAST 2003 (2003)
Winslett, M.: An Introduction to Trust Negotiation. In: Nixon, P., Terzis, S. (eds.) iTrust 2003. LNCS, vol. 2692, pp. 275–283. Springer, Heidelberg (2003)
Yu, T., Winslett, M.: A Unified Scheme for Resource Protection in Automated Trust Negotiation. In: Proceedings of the IEEE Symposium on Security and Privacy (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Seigneur, JM., Jensen, C.D. (2004). Trading Privacy for Trust. In: Jensen, C., Poslad, S., Dimitrakos, T. (eds) Trust Management. iTrust 2004. Lecture Notes in Computer Science, vol 2995. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-24747-0_8
Download citation
DOI: https://doi.org/10.1007/978-3-540-24747-0_8
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-21312-3
Online ISBN: 978-3-540-24747-0
eBook Packages: Springer Book Archive