Anda di halaman 1dari 15

Term paper of int 881

“Privacy on the Web: Facts, Challenges,


and Solutions”

SUBMITTED TO:
SUBMITTED BY:

Mr.Shailendra tiwari
Brishabhsingh

R
oll no:ROE172A78
Reg no:7450070146

Acknowledgement

I owe a great many thanks to many people such as my friend’s teacher’s who helped and supported during
making this term paper.

My deepest thank to lecturer Mr. Shailendra Tiwari who provide this topic and provide their guideline to
correcting various document with attention and care.

I would also thank my institution faculty member without whom this term paper would have been a distant
reality. I also extend my heartfelt thanks to my well wishers who always promote me to complete this term
paper.

Brishabh Kumar
the world population, transcending all
Cyber Law and socioeconomic
levels. The ease of information access,
Forensic Science
coupled with theready availability of
Brishabh Kumar personal data, also made it easier and
Student of B-tech (H)(MBA) more tempting for interested parties
lovely professional university, (individuals, businesses, and
phagwara ,(Punjab). governments) to intrude on people’s
privacyin unprecedented ways. In this
bishopsingh@yahoomail.com
context, researchers haveproposed a
range of techniques to preserve Web
users’privacy.
However, despite considerable attention,

Privacy on the Web privacy continues to pose


significant challenges. Regulatory and
self-regulatory measures addressing one
Web: Facts, or more aspects of this problem have
achieved limited success. Differences
and incompatibilities in privacy
Challenges, and regulations and standards
significant impact on e-business.
have

Solutions
For example, US Web-based businesses
might be unableto trade with millions of
European consumers because their
practices do not conform with the
European
Union’s Data Protection Directive.
Abstract: Clearly, to address these issues, we must
start by synthesizing ideas from various
• Internet privacy is the desire or sources. We tackle this problem by
surveying the issue of Web privacy and
mandate of personal privacy
with respect to transactions or investigating the main sources of privacy
violations on the Web.
transmission of data via the
Internet With a taxonomy of several current
technical and regulatory approaches
• Internet privacy forms a subset aimed at enforcing Web users’
of computer privacy. privacy,we hope to form a
• Do not click on that link you do comprehensive picture of the
not know more about that. Webprivacy problem and its solutions.
• Mustily have the alpha-numeric In this article, we focus on Web privacy
password. from users’
• Always on your firewall. perspectives. Although we recognize that
• Do not share your password different levels f privacy violations exist,
with other person. our discussion on privacy focuses on its
preservation or loss. This
lets us use a lowest-common-
denominator approach toprovide a
meaningful discussion about the various
Introduction: privacy issues and solutions
The Web has spurred an information
revolution,
The privacy problem:
even reaching sectors left untouched by
Two major factors contribute to the
the personal computing boom of the 80s.
privacy problem onthe Web:
It made information ubiquity a reality for
• The inherently open, nondeterministic
sizeable segments of
nature of the
Web and the complex, leakage-prone study estimated that, in 2002, the loss
information flow of many Web-based that resulted
transactions that involve the transfer of from consumers’ concerns over their
sensitive, personal information. privacy might have reached $18 billion.
To comprehend the first factor, we can This confirms the Gartner Group’s view
contrast the that, through 2006, information privacy
Web with traditional, closed, will be the greatest inhibitor for
deterministic multiuser systems, such as consumer-based ebusiness.
enterprise networks. In these systems, Digital government is another class of
only known users with a set of Web applications in which Web privacy
predefined privileges can access data is a crucial issue. Government agencies
sources. On the contrary, the Web is an collect, store, process, and share personal
open environment in which numerous data about millions of individuals. A
and a priori unknown users can access citizen’s privacy is typically protected
information. Examples of the second through regulations that government
factor include applications involving agencies and any business that interacts
citizen–government, customer–business, with them mustimplement. Users tend to
business–business, and business– trust government agencies more than
government interactions. In some of businesses. However, law enforcement
these applications,personal information agencies are at odds with civil
that a Web user submits to a given party libertarians over collecting personal
might, as a result of the application’s information. Law enforcement agencies
intrinsic workflow, be disclosed to one or have avested interest in collecting
more other parties. information about unsuspecting citizens
Preserving privacy on the Web has an for intelligence gathering and
important impact on many Web activities investigations. Although anonymity is
and Web applications. Of these, e- still an option for manypeople,5 most
business and digital government are two Web transactions require information
of the best examples. In the context of e- that can uniquely identify them.
business, privacy violations tend to be Additionally, governments’ foray in
associated mostly with marketing developing techniques for gathering and
practices. Typical cases occur when mining citizens’ personal data has stirred
businesses capture, store, controversy. One example is the US
process, and exchange their customers’ Central Intelligent Agency’s investment
preferences to in
provide customized products and Q-tel, a semiprivate company that
services. In many cases,these customers specializes in mining digital data for
do not explicitly authorize businesses to intelligence purposes. Therefore,
use their personal information. In concerns about privacy are a major factor
addition, a legitimate fear exists that that still prevents large segments of users
companies will be forced to disclose their from interacting with digital government
customer’s personal data in court. For infrastructures.
example, in the Recording Industry
Association of America (RIAA) v. Ve r
izon Defining privacy:
(summer 2002), the music recording Individual privacy is an important
industry forced ISPs to disclose IP dimension of human life. Theneed for
information about users who allegedly privacy is almost as old as the human
illegally downloaded music. species.
These mishaps have negatively affected Definitions of privacy vary according to
businesses and, consequently, the Web- context, culture, and environment. In an
based economy. Consumers’ mistrust 1890 paper, Samuel Warren and Louis
naturally translates into a significant Brandeis defined privacy as “the right to
reluctance to engage in online business be let alone.”1 In a seminal paper
transactions. A Jupiter Communications’ published in 1967, Alan Westin defined
privacy as
“the desire of people to choose freely
under what circumstances and to what
extent they will expose themselves, their
attitude and their behavior to others.”2 Understanding Web privacy:
More recently, Ferdinand Schoeman The Web is often viewed as a huge
defined privacy as the “right to determine repository of information. This
what (personal) information is perception of a passive Web ignores its
communicated to others” or “the control inherently active nature, which is the
an individual has over information about result of the intense volume of Web
himself or herself.”3 One of the earliest transactions. A Web transaction is any
legal references to privacy was made in process that induces a transfer of
the Universal Declaration of Human information among two or more Web
Rights (1948). Its hosts. Examples include online
Article 17 states, “No one shall be purchases, Web sites browsers, and Web
subjected to arbitrary or unlawful search engine use. We refer to the
interference with his privacy, family, information exchanged as a result of a
home, or correspondence, nor to Web transaction as Web information.
unlawful attacks on his honor and The Web information type determines
reputation.” the extent and consequences of a privacy
It also states, “Everyone has the right to violation related to that information.
the protection of the law against such Access to personal or sensitive
interference or attacks.” information through
Generally, privacy is viewed as a social Web transactions is generally subject to
and cultural concept. privacy policies associated with that
With the ubiquity of computers and the information. These policies refer to the
emergence of the Web,privacy has also set of implicit and explicit rules that
become a digital problem. In particular, determine whether and how any Web
with the Web revolution, privacy has transaction can manipulate that
come to the fore as a problem that poses information. A Web transaction is said to
a set of challenges fundamentally be privacy preserving if
different from those of the pre-Web era.
This problem is commonly referred to as
Web privacy. In general, the phrase Web
privacy refers to the right of Web users
to conceal their personal information and
have some degree of control over the use
of any personal information disclosed to
others.
It does not violate any privacy rule information.
before, while, and after it occurs. Privacy • Digital behavior refers to Web users’
policies applicable to Web information activities while using the Web, including
could specify requirements relevant to the sites they visit, frequency and
one or multiple dimensions for Web duration of these visits, and online
privacy. Table 1 enumerates some of the shopping patterns.
most important dimensions. • Communication includes Web users’
We can classify Web users’ personal electronic messages, postings to
information as electronic boards, and votes submitted to
one of three types: online polls and surveys.
• Personal data include information such Understanding Web privacy requires
as a person’s understanding how privacy can be
name, marital status, mailing and email violated and the possible means for
addresses, preventing privacy violation.
phone numbers, financial information,
and health Sources of privacy violation:
Web users’ privacy can be violated in
different ways and with different Unauthorized information
intentions. The four major sources we transfer :
identified are unauthorized information
transfer, weak security,data magnets, and
indirect forms of information collection.

Personal information is increasingly Online registration entails that users


viewed as an important financial asset. providepersonal information such as
Businesses frequently sell individuals’ name, address, telephone number, email
private information to other businesses address, and so on. More importantly, in
and organizations. Often, information is the registration process, users might have
transferred without an individual’s to disclose other sensitive information
explicit consent. For example, in 2002, such as their credit card or checking
medical information Website account numbers to make online
DrKoop.com announced that, as a result payments.
of its bankruptcy, it was selling
customers’ data to vitacost.com. Identifying users through IP
addresses:
Weak security: Generally,each time a person accesses a
The Web’s inherently open nature has Web server, several things about that
led to situations in which individuals and person are revealed to that server. In
organizations exploit the vulnerability of particular,a user’s request to access a
Web-based services and applications to given Web page contains the user’s
access classified or private information. machine’s IP address. Web servers can
In general, unauthorized access is the use that to track the user’s online
result of weak security. A common form behavior. In many situations, the address
of these accesses occurs when foreign can uniquely identify the actual user
entities penetrate (for example, through “behind” it.
hacking) Web users’ computers.
Consequences generally include Software downloads:
exposure of sensitive and private Companies that let their customers
information to unauthorized viewers. The download their software via the Internet
consequences are even more important typically require a uniqueidentifier from
when the attack’s target is a system each user. In some cases, companies use
containing sensitive information about these identifiers to track users’ online
groups of people. For example, in 2000, activity.
a hacker penetrated a For ex-ample, in 1999, RealNetworks
Seattle hospital’s computer network, came underfire for its alleged use of
extracting files containing information on unique identifiers to track the music CDs
more than 5,000 patients. or MP3 files that users played with its
RealPlayer software.

Data magnets: Cookies:


Data magnets are techniques and tools A cookie is a piece of information that a
that any party can use to collect personal server and a client pass back and forth.In
data. a typical scenario, a server sends a
8Users might or might not be aware that cookie to a client that stores it locally.
their information is being collected or do The client then sends it back to the server
notknow how that information is when the server subsequently requests it.
collected. Various datamagnet techniques Cookies are generally used to overcome
exist: the HTTP protocol’s stateless nature;
they let a server remember a client’s state
Explicitly collecting information at the time of their most recent
through online registration: interaction. They also let Web servers
track Web
users’ online activities—for example, the A Web user’s federated identity is a form
Web pages they visit, items accessed, of identity (for example, a user name and
and duration of their access to every Web passwordpair) that lets a user access
page. In many situations, this monitoring several Web resources. Microsoft’s .Net
constitutes a violation of users’ privacy. My Services is an example of one
architecture that provides a federated
Trojan horses: identity mechanism, with which a user
These applications might seem benign can create an identity at one Web site and
but can have destructive effects when use it to access another Web site’s
they run on a user’s computer. Examples services. This extensive sharing of users’
of Trojan horses include programs that private information raises concerns about
users install as antviruses but that the misuse of that information.
actually introduce viruses to their
computers. For example, a Trojan attack Indirectly collecting information:
might start when a user downloads and Users can authorize organizations or
installs free software from a Web site. businesses to collect some of their
The installation procedure might then private information. However, their
launch aprocess that sends back to the privacy can be implicitly violated if their
attack initiator sensitive personal information undergoes analysis processes
information stored on the local computer. that produce new knowledge about their
personality,wealth, behavior, and so on.
Web beacons: This deductive analysis might, for
A Web beacon—also known as a Web example, use data mining techniques to
bug, pixel tag, or clear gif—is a small draw conclusions and produce new facts
transparent graphic about the users’ shop-
image that is used in conjunction with ping patterns, hobbies, or preferences.
cookies to monitor users’ actions. A Web These facts might be used in
beacon is placed in the code of a Web recommender systems through a process
site or a commercial email to let the called personalization, in which the
provider monitor the behavior of Web systems use personalized information
site visitors or those sending an email. (collected and derived from customers’
When the HTML code associated with a past activity) to predict or affect their
Web beacon is invoked (to retrieve the future shopping patterns. Undeniably,
image), it can simultaneously transfer personalization makes users’ shopping
information such as the IP address of the experience more convenient. However,
computer that retrieved the image, when in more aggressive marketing practices
the Web beacon was viewed, for how (such as advertising phone calls) it can
long, and so forth negatively affect customers’ privacy.
Privacy can also be violated through the
Screen scraping: misuse of statistical databases, which
Screen scraping is a process that uses contain information about
programs to capture valuable information numerousindividuals. Examples include
from Web pages. The basic idea is to databases that provide general
parse the Web pages’ HTML content information about the health, education,
with programs designed to recognize or employment of groups of individuals
particular patterns of content, such as living in a city, state, or country. Typical
personal email addresses. A case that queries to statistical databases provide
illustrates how screen scraping can aggregated information such as sums,
violate privacy is the one in which the averages, pth percentiles, and soon. A
US Federal Trade Commission alleged privacy-related challenge is to provide
that ReverseAuction.com had illegally statistical information without disclosing
harvested data from the online auction sensitive information about the
site eBay.com to gain access to eBay’s individuals whose information is part of
customers. the database.

Federated identity:
A taxonomy of privacy:
The two main categories are technology- provide reasonable security against
and regulation-enabled solutions. The external attacks.
implementation approach further refines A remailer is an application that receives
this taxonomy. emails from
senders and forwards them to their
Technology-enabled solutions: respective recipients after it alters them
A typical Web transaction involves a so that the recipients cannot identify the
Web client and a Web server. We actual senders. If necessary, a recipient
classify technology-enabled solutions can send a reply to the remailer, which
according to the type of Web entities that then forwards it to the sender of the
are responsible for their implementation: original message. Babel and Mixminion
clients, servers, or clients/servers. are examples of remailers.
When users navigate through the Web,
Client-based solutions: their browsers
These solutions target privacy aspects or any other external code (such as a
relevant to individual users. Examples downloaded script) can store different
include protecting personal data stored types of information on their computers.
on a personal computer,protecting email This navigation trace provides details of
addresses, deleting any trace of Web users’ surfing behavior, including the
access, and hiding Web surfers’ real sites they visit, the time and duration of
identities. We discuss four types of each visit, what files they download, and
solutions: personal firewalls, remailers, so on. Trace removers are available as a
traceremovers, and anonymizers A conservative measure to prevent
firewall is a software and/or hardware disclosure of users’ Web navigation
system that provides a private network history. Theysimply erase users’
with bidirectional protection from navigation histories from their
external entities gaining unauthorized computers. Examples of trace removers
access. Generally, firewalls protect include Bullet Proof Soft and No Trace.
medium-to-large networks (such as an For many reasons, Web users would like
enterprise’s intranet). A personal firewall to visit a Web site with the guarantee that
is a software firewall that protects a neither that site nor any other party can
single user’s system (typically, a single identify them. Researchers have
machine). It runs in the background on a proposed several techniques to provide
PC or a this anonymous Web surfing. These
server and watches for any malicious solutions’ basic principle is preventing
behavior. A user might even configure requests to a Web site from being linked
the firewall to detect specific type of to specific IP addresses. We can classify
unwanted events—for example, access anonymizing techniques into four types:
from a specific IP address or a given • Proxy-based anonymizers. A proxy-
port.Personal firewalls have recently based anonymizer uses a proxy host to
become a significan market. Many which users’ HTTP requests are first
software firms propose personal firewall submitted. The proxy then transforms the
with different capabilities. requests in such a way that the final
Examples include destination cannot identify its source.
ZoneAlarm, NetBoz, and Outpost. In Requests received at the destination
addition, generalWeb users can also use contain only the anonymizer’s IP
network address translation address. Examples of proxybased
(NAT)devices to help preserve network anonymizers include Anonymizer,
privacy. Developers have initially Lucent Personal Web Assistant (LPWA),
proposed NATs to provide one IP for a iPrivacy, and Web Secure. Some proxy-
set of home machines, thus providing a based anonymizers can also be used to
single point of entry for that network. access registration-based Web sites. For
While providing relative anonymity, its example,
strength is on providing a firewall to LPWA uses alias generators, giving users
consistent access to registration-based
systems without revealing potentially cryptographic transformations on the
sensitive personal data. More effective messages, and then forwards the
proxy-based anonymizers such as messages to the next destination in a
iPrivacy canconceal users’ identity even random order.
while making online purchases that, • Peer-to-peer anonymizers.Mix-based
normally, would require them to disclose anonymizers generally use static sets of
their ac- mixes to route traffic. This obviously
tual identities. poses three major problems: scalability,
• Routing-based anonymizers. This class performance, and reliability. One way to
of anonymizers has Web requests overcome these drawbacks is to use peer-
traverse several hosts before delivering to-peer (P2P) anonymizers, which
them to their final destination so that the distribute the anonymizing tasks
destination cannot determine the uniformly on a set of hosts. Examples of
requests’ sources. An example of a tool P2P anonymizers include Tarzan,
that uses this technique is Crowds.10 Its MorphMix, and P5 (Peer-to-Peer
philosophy is that a good way to become PersonalPrivacy Protocol). For example,
invisible is to get lostin a crowd. The Tarzan uses a pool of voluntary nodes
solution is to group Web users that form mix relays. It operates
geographically into different groups, or transparently at the IP level and,
crowds. A crowd performs Web therefore, works for any Internet
transactions on behalf of its members. application.
When users join a crowd, a process
called jondo starts running on their local
machines. This process represents the Server-based solutions:
users in the crowd. It engages in a Server-based solutions target aspects of
protocol to join the crowd, during which Web privacy relevant to large
it is informed of the current crowd organizations such as enterprises and
members. Once users’ jondos have been government agencies. For example, an
admitted to the crowd, they can use the online business might deploy a server-
crowd to anonymously issue requests to based privacy
Web servers. Users’ requestsare routed preserving solution to protect hospital
through a random sequence of jondos patients’ records ora customers database.
before they are finally delivered to their Privacy preservation in these solutions is
destinations. Neither the Web servers nor a side effect of strong security
any other crowd members can determine mechanisms typically employed in large
who initiated a specific request. organizations. Virtual private networks
• Mix-based anonymizers. Mix-based (VPNs) and firewalls are two
anonymizers aretypically used to protect mechanisms that have been particularly
communication privacy. Inparticular, effective in protecting security and
they protect against traffic-analysis privacy at an enterprise scale. VPNs are
attacks,which aim to identify who is secure virtual networks built on top of
talking to whom but not necessarily to public networks such as the Internet.
directly identify that conversation’s They generally use several security
content. One technique that mechanisms (such as
protectsagainst trafficanalysis attacks is encryption,authentication, and digital
onion routing. It is based on the idea that certificates) and are often used in
mingling connections from different conjunction with firewalls to provide
users and applications makes them more stringent levels of security and
difficult to distinguish. The technique privacy enforcement.
operates by dynamically building
anonymous connections within a network Client–server-based solutions:
of real-time In these solutions, clients and servers
Chaum mixes. cooperate to achieve a given set of
A Chaum mix is a store-and-forward privacy requirements. Two examples
device that accepts fixed-length messages illustrate this: negotiation- and
from numerous sources, performs encryption-based solutions. Negotiation-
based solutions use a protocol on which addressed protecting email is Pretty
both the Web client and server agree. Good Privacy.
Enforcing privacy through a negotiated PGP has become the de facto standard
privacy policy is a viable and practical for email encryption. It enables people to
option only if the negotiation process is securely exchange messages and to
automated. Automatic negotiation of secure files, disk volumes, and network
privacy requirements is generally connections with both privacy and strong
enabled through software agents that authentication. It ensures privacy by
users configure encrypting emails or documents so that
to implement specific privacy only the intended person can read them.
preferences. Client–server negotiation of
privacy requirements is the driving
design paradigm behind the platform for Regulation-enabled solutions:
privacy preferences project (P3P), the Regulation-enabled solutions encompass
World Wide Web Consortium’s standard two types: selfand mandatory-regulation
for privacy preservation. P3P lets users solutions. Self regulation refers to the
automatically manage the use of their information keepers’ ability to
personal information on Web sites they voluntarily guarantee data privacy.
visit. A site implementing P3P expresses Mandatory regulation refers to legislation
its privacy policy in a machine-readable aimed at protecting citizens’ privacy
format. Its users can configure their while they transact on the Web
browsers to automatically determine
whether the Web site’s privacy policy Self regulation:
reflects their personal privacy needs . In the absence of
Typically, negotiation-based Web comprehensiveregulations addressing the
interactions use Web privacy problem,selfdiscipline has
XML to specify and exchange policies. been an alternative approach adopted by
In P3P, Web many Web-based businesses. This
sites’ privacy policies and users’ privacy typically manifests in the form of privacy
preferences are encoded using XML. On statements that businesses post on their
a P3P-enabled Web site, a policy Web sites. An important problem with
reference file provides the P3P privacy self-regulation is that it is also self-
policy file’s location for the different defined—that is, different organizations
parts of the Web site. A user’s agent generally adopt different privacy rules in
first sends an HTTP request to get the handling their customers’ information.
policy reference file. It then fetches the Businesses tend to advocate self-
file, interprets it, and makes decisions regulation to avoid government
according to which user instructed it involvement. Examples of industry
through privacy preferences. Developers groups that push for self-regulating
can build user agents into privacy policies include the Online
Privacy Alliance, NetCoalition, and the
Web browsers, browser plug-ins, or Personalization Consortium. Self-
proxy servers as Javaapplets or scripts. regulated privacy policies can be
Encryption-based solutions encrypt the certified or noncerified. This certification
information exchanged between two or is the process of formally asserting to
more Web hosts so that only legitimate users that a party’s claimed policy is
recipients can decrypt it. Web users actually implemented. A trusted third
might use encryption in different Web party is usually responsible of certifying
activities and to enforce several privacy privacy policies. Upon request, the
requirements. One of these requirements trusted party
is the privacy of personal checks a given Web site’s practices with
communication, or email. Typically, regard to its privacy policy. If the trusted
Internet-based communication is party deems that the Web site
exchanged in clear text. An encryption- does respect its privacy policy, it delivers
based protocol that has particularly a certificate of good conduct that the site
can display, typically in the
form of a trust seal. Major trust seals In fact, most privacy-related laws were
include TRUSTe,BBBOnline, WebTrust, enacted in re-
and SecureBiz. sponse to particular events or needs for a
Different third parties might have specific industry.
different requirements to approve a given
site. For example, to approve a Web Examples include the 1978 Financial
site’s privacy policy, TRUSTe requires Services Privacy Act (FSPA), the 1986
information about what type of Electronic Communications Privacy Act
information is collected, who collects it, (ECPA), the 1996 Health Insurance
how it is used, whether it is shared, a Portability and Accountability Act
minimum ofan opt-out provision for (HIPAA), and the 1998 Child Online
consumer choice, security measures, and Privacy Protection Act
how to correct information (COPPA).Governments might also
impose privacy-related regulations on
Mandatory regulation: their own agencies. The US has passed
Several countries and political entities statutes and laws to regulate its federal
have adopted laws and legal measures to agencies’ data collection. In fact, some of
address the Web privacy problem. A these laws were passed even before the
notable example of privacypreserving Web era. One example is the Privacy
regulations is the European Union’s Data Act passed in 1974. The act aimed at
Protection Directive, adopted in October regulating activities of all agencies that
1995. The directive limits access to collect and maintain personal
electronic data contained in the information.
EUmember nations. According to the
directive, certain personal information Assessing solutions:
(such as an individual’s race, creed, sex- It is useful to provide an assessment on
the adequacy of the proposed Web
privacy solutions. However, this could
not be totally objective because of the
various
perceptions on privacy violations.
Therefore, our assessment (see Table 2)
contains a subjective element that reflects
our perceptions of privacy violations. We
use the taxonomy of issues in Table 1 for
the rows. For brevity’s sake, we use
technology- and regulation-enabled
solutions as the two main categories of
solutions. The values we used are “Yes,”
“No,” “Mostly yes,” and “Mostly no.”
“Yes” indicates that all approaches in
that category address part of or the whole
corresponding issue. “No” indicates that
no approach in that category addresses
the corresponding issue in a meaningful
way. “Mostly yes” indicates that the
majority of approaches in the category
address the corresponding issue in some
ual orientation, or medical records) meaningful way. “Mostly no” indicates
cannot leave the EU unless it is going to that only a minority of approaches in that
a nation with laws offering privacy levels category address the corresponding issue
that the EU has deemed adequate . in some meaningful way.
In the US, the regulatory approach to
preserving privacy is reactive and not
based on a national privacy policy. Privacy in the Semantic Web:
In the vision of the Semantic Web, the propositions to let Web agents carry out
Web evolves into an environment in users’ tasks while preserving their
which “machines become much better privacy. In a recent paper on ontologies,
able to process and ‘understand’ the data researchers presented a privacy
that they merely display at present.”12 In framework for Web services that lets
this environment, Web services and Web user agents automatically negotiate
agents interact. Web services are with Web services on the amount of
applications that expose interfaces personal information they will disclosed.
through which Web clients can In this framework, users specify their
automatically invoke them. Web agents privacy preferences in different
are intelligent software modules that are permission levels on the basis of a
responsible for some specific tasks—for domain-specific ontology based on
example, searching for an appropriate DAMLS, the DARPA Agent Markup
doctor for a user. Language set of ontologies to describe
Web services and Web agents interact to the functionalities of Web services.
carry out so- Another important research direction in
phisticated tasks on users’ behalf. In the solving the Semantic Web’s privacy
course of this interaction, they might problem is based on the reputation
automatically exchange sensitive, private concept . Researchers suggest that using
information about these users. A natural this concept lets
result of this increasing trend toward less Web agents and Web services interact
human involvement and more with better assurances about their mutual
automation is that users will have less conduct. In the highly dynamic Semantic
control over how Web agents and Web Web environment, a service or agent will
services manipulate their personal often be required to disclose sensitive
information. The issues of privacy information to Webbased entities (such
preservation must therefore be as government agencies or businesses)
appropriately tackled before the that are unknown and/or whose
Semantic Web vision fully trustworthiness is uncertain. The
materializes.Two key concepts are reputation-based approach consists of
essential in solving the privacy problem deploying mechanisms through which
in the Semantic Web, namely, ontologies agents can accurately predict services’
and reputation. Artificial intelligence “conduct” with regard to preserving the
researchers first introduced the privacy of personal information that they
ontologies concept to facilitate exchange with other services and agents.
knowledge sharing In another
and reuse. An ontology is a “set of work, 15 we proposed a Web reputation
knowledge terms, including the management system that monitors Web
vocabulary, the semantic services and collects, evaluates,updates,
interconnections, and some simple rules and disseminates information related to
of inference and logic for some particular their reputation for the purpose of
topic.”13 Researchers have widely privacy preservation.
recognized the importance of ontologies
in building the Semantic Web. In Most of the technology-based solutions
particular, ontologies are a central target net work privacy. These solutions
building block in making Web services typically use a combination of encryption
computer interpretable. or request rerouting to provide data
This, in turn, lets us automate the tasks privacy and some anonymity. These
of discovering, invoking, composing, systems have several limitations.
validating, and monitoring the execution Installing, configuring, and using these
ofWeb services. tools might be complicated. Systems
Ontologies will also play a central role in requiring modification of network
solving the protocols or access to proxy servers
Semantic Web’s privacy problem. In might be behind firewalls or inaccessible
fact, building a privacy ontology for the to users of custom Internet access
Semantic Web is one of several recent software. Privacy-enhancing
technologies have not met the challenge 24, no. 2, 1981, pp. 84–88
of safeguarding people’s data on the Web
mostly due to the underlying assumption 7) D. Goldschlag, M. Reed, and P.
that third-party providers can implement Syverson, “Onion Rout-
privacy preservation. As the P3P effort ing,” Comm. ACM, vol. 42, no. 2,
shows, providers have no vested interest 1999, pp. 39–41.
in insuring Web privacy. There fore, the
design of privacy-enhancing techniques
must focus on how to make the privacy-
preservation part of the data it is
supposed to protect. With the emerging
Semantic Web, services and systems will
be able to automatically understand data
seman tics. For some Web users, this
provides a more convenient Web.
Unfortunately, this also provides an
increased incentive to intrude in people’s
privacy because of the enhanced quality
of information available to Web
users.Therefore, more effective
techniques are necessary to protect this
high quality Web information from
illegitimate access and use. Although
legislation can work for paper-based
information, it has limited effect on
Webbased information. A promising
research direction is toexplore the
concept of code shipping to develop
novel mechanisms for data protection.
The objective is to empower users to
have better control over the access and
the use of their data. This approach
meshes well with the Semantic Web. The
idea is to embed user agents with the
data. These agents would travel with the
data, setting access protection
dynamically.

References:

1)www.google.com

2)www.answer.com

3)
http://www.icmrindia.org/casestudies

4) www.eslbee.com

5)www.weekianswer.com

6) D. Chaum, “Untraceable Electronic


Mail, Return
Addresses, and Digital Pseudonyms,”
Comm. ACM, vol.

Anda mungkin juga menyukai