当前位置: X-MOL 学术ACM SIGCOMM Comput. Commun. Rev. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
What do information centric networks, trusted execution environments, and digital watermarking have to do with privacy, the data economy, and their future?
ACM SIGCOMM Computer Communication Review ( IF 2.8 ) Pub Date : 2021-03-12 , DOI: 10.1145/3457175.3457181
Nikolaos Laoutaris 1 , Costas Iordanou 2
Affiliation  

What if instead of having to implement controversial user tracking techniques, Internet advertising & marketing companies asked explicitly to be granted access to user data by name and category, such as Alice→Mobility→05-11-2020? The technology for implementing this already exists, and is none other than the Information Centric Networks (ICN), developed for over a decade in the framework of Next Generation Internet (NGI) initiatives. Beyond named access to personal data, ICN's in-network storage capability can be used as a substrate for retrieving aggregated, anonymized data, or even for executing complex analytics within the network, with no personal data leaking outside. In this opinion article we discuss how ICNs combined with trusted execution environments and digital watermarking, can be combined to build a personal data overlay inter-network in which users will be able to control who gets access to their personal data, know where each copy of said data is, negotiate payments in exchange for data, and even claim ownership, and establish accountability for data leakages due to malfunctions or malice. Of course, coming up with concrete designs about how to achieve all the above will require a huge effort from a dedicated community willing to change how personal data are handled on the Internet. Our hope is that this opinion article can plant some initial seeds towards this direction.

中文翻译:

以信息为中心的网络、可信执行环境和数字水印与隐私、数据经济及其未来有什么关系?

如果互联网广告和营销公司不必实施有争议的用户跟踪技术,而是明确要求按名称和类别访问用户数据,例如 Alice→Mobility→2020 年 5 月 11 日,该怎么办?实现这一点的技术已经存在,而且是在下一代互联网 (NGI) 计划框架内开发了十多年的信息中心网络 (ICN)。除了对个人数据的命名访问之外,ICN 的网络内存储功能还可以用作检索聚合的匿名数据的基础,甚至可以在网络内执行复杂的分析,而不会泄露个人数据。在这篇观点文章中,我们讨论了 ICN 如何与可信执行环境和数字水印相结合,可以结合起来建立一个个人数据覆盖网络,在这个网络中,用户将能够控制谁可以访问他们的个人数据,知道所述数据的每个副本在哪里,协商付款以换取数据,甚至声称拥有所有权,以及建立因故障或恶意导致的数据泄露的责任。当然,提出如何实现上述所有目标的具体设计将需要一个愿意改变个人数据在互联网上处理方式的专门社区的巨大努力。我们希望这篇观点文章可以朝着这个方向播下一些初步的种子。并对因故障或恶意导致的数据泄露建立问责制。当然,提出如何实现上述所有目标的具体设计将需要一个愿意改变个人数据在互联网上处理方式的专门社区的巨大努力。我们希望这篇观点文章可以朝着这个方向播下一些初步的种子。并对因故障或恶意导致的数据泄露建立问责制。当然,提出如何实现上述所有目标的具体设计将需要一个愿意改变个人数据在互联网上处理方式的专门社区的巨大努力。我们希望这篇观点文章可以朝着这个方向播下一些初步的种子。
更新日期:2021-03-12
down
wechat
bug