Obligations of trust for privacy and confidentiality in distributed transactions

被引:2
|
作者
Mbanaso, U. M. [1 ]
Cooper, G. S. [1 ]
Chadwick, David [2 ]
Anderson, Anne [3 ]
机构
[1] Univ Salford, IRIS, Salford M5 4WT, Lancs, England
[2] Univ Kent, Comp Lab, Canterbury, Kent, England
[3] Sun Microsyst Inc, Burlington, MA USA
关键词
Trust; Privacy; Distributed parameter control systems; Data security;
D O I
10.1108/10662240910952328
中图分类号
F [经济];
学科分类号
02 ;
摘要
Purpose - This paper aims to describe a bilateral symmetric approach to authorization, privacy protection and obligation enforcement in distributed transactions. The authors introduce the concept of the obligation Of trust (OoT) protocol as a privacy assurance and authorization mechanism that is built upon the XACML standard. The OoT allows two communicating pal-ties to dynamically exchange their privacy and authorization requirements and capabilities, which the authors term a notification of obligation (NoB), as well as their commitments to fulfilling each other's requirements, which the authors term signed acceptance of obligations (SAO). The authors seek to describe some applicability of these concepts and to show how they can be integrated into distributed authorization systems for stricter privacy and confidentiality control. Design/methodology/approach - Existing access control and privacy protection systems are typically unilateral and provider-centric, in that the enterprise service provider assigns the access rights, makes the access control decisions, and determines the privacy policy. There is no negotiation between the client and the service provider about which access control or privacy policy to use. The authors adopt a symmetric, more user-centric approach to privacy protection and authorization, which treats the client and service provider as peers, in which both can stipulate their requirements and capabilities, and hence negotiate terms which are equally acceptable to both parties. Findings - The authors demonstrate how the obligation of trust protocol can be used in a number of different scenarios to improve upon the mechanisms that are currently available today. Practical implications - This approach will serve to increase trust in distributed transactions since each communicating party receives a difficult to repudiate digitally signed acceptance of obligations, in a standard language (XACML), which can be automatically enforced by their respective computing machinery. Originality/value - The paper adds to current research in trust negotiation, privacy protection and authorization by combining all three together into one set of standardized protocols. Furthermore, by providing hard to repudiate signed acceptance of obligations messages, this strengthens the legal case of the injured party should a dispute arise.
引用
收藏
页码:153 / 173
页数:21
相关论文
共 50 条
  • [41] REPORT ON PRIVACY AND CONFIDENTIALITY
    DAVIS, JH
    AMERICAN STATISTICIAN, 1978, 32 (02): : 76 - 76
  • [42] Privacy: Beyond Confidentiality
    Clifton, Christopher W.
    CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2014, : 1156 - 1156
  • [43] EROSION OF CONFIDENTIALITY AND PRIVACY
    TOLLEFSO.DL
    AMERICAN PSYCHOLOGIST, 1973, 28 (10) : 942 - 942
  • [44] Data Concealing of Supply Chain Transactions using the Distributed Trust Backbone
    Pruksasri, Potchara
    van den Berg, Jan
    Hofman, Wout
    Tan, Yao-hua
    2014 9TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2014, : 151 - 156
  • [45] The moral obligations of trust
    Faulkner, Paul
    PHILOSOPHICAL EXPLORATIONS, 2014, 17 (03) : 332 - 345
  • [46] CONFIDENTIALITY OBLIGATIONS - A 2ND VIEW
    ZUSMAN, J
    HOSPITAL AND COMMUNITY PSYCHIATRY, 1982, 33 (06): : 435 - 436
  • [47] Special Issue on Privacy and Trust Management in Cloud and Distributed Systems
    Cheung, Sen-Ching Samson
    Sun, Yan Lindsay
    Aberer, Karl
    Haritsa, Jayant
    Horne, Bill
    Hwang, Kai
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (06) : 835 - 837
  • [48] Split-Ballot Voting: Everlasting Privacy With Distributed Trust
    Moran, Tal
    Naor, Moni
    CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2007, : 246 - 255
  • [49] A Distributed Trust Framework for Privacy-Preserving Machine Learning
    Abramson, Will
    Hall, Adam James
    Papadopoulos, Pavlos
    Pitropakis, Nikolaos
    Buchanan, William J.
    TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS, TRUSTBUS 2020, 2020, 12395 : 205 - 220
  • [50] Special Issue on Privacy and Trust Management in Cloud and Distributed Systems
    Kuo, C. -C. Jay
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (02) : 357 - 358