Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Privacy through pseudonymity in user-adaptive systems
Kobsa A., Schreck J. ACM Transactions on Internet Technology3 (2):149-183,2003.Type:Article
Date Reviewed: Jun 12 2003

Maintaining a user model in a user-adaptive system (UAS) may be in conflict with privacy laws and regulations, and more importantly, with user concerns about privacy. Given that privacy laws consider data personal when it can be linked to an identifiable person, the solution often proposed is to enable users to remain anonymous to Web sites. The main contribution of this paper is that it proves that personalization and anonymity are not antagonistic, as many UAS designers believe. Anonymity can even allow for a more frank interaction, more extensive information about the user, and, hence, a better basis for personalization.

The proposed reference architecture for pseudonymous and secure user modeling offers three main services: encryption, provided by two function libraries, the Skunkworks application programming interface (SKAPI), and the secure knowledge query manipulation language (SKQML); application-independent anonymization, provided by the KQMLmix framework, implementing the mix technique through new performative “mix-it” additions to the knowledge query manipulation language (KQML); and selective access to the user model, provided by a hierarchical, role-based access control model.

This architecture is generic and flexible enough to allow for a specific UAS to select required components according to its privacy requirements. The only demand on the internal design of a UAS is that communication between the user modeling clients and servers is carried out using KQML.

The first, introductory, part of this paper clearly presents all the concepts about secrecy, anonymity, and pseudonymity necessary to allow a non-expert in security to understand the proposed solution. A final analysis of potential privacy threats to the architecture and possible countermeasures, promising extensions, and obstacles to its deployment in practice provides a better understanding of the architecture’s scope and limitations.

Reviewer:  Angelica de Antonio Review #: CR127776 (0309-0940)
Bookmark and Share
 
Miscellaneous (H.4.m )
 
Would you recommend this review?
yes
no
Other reviews under "Miscellaneous": Date
A coding scheme as a basis for the production of customized abstracts
Craven T. Journal of Information Science 13(1): 51-58, 1987. Type: Article
Mar 1 1988
Charting the unknown: how computer mapping at Harvard became GIS
Chrisman N., ESRI Press, 2006.  280, Type: Book (9781589481183)
Oct 18 2006
Investigating value-based decision bias and mediation: Do you do as you think?
Hall D., Paradice D. Communications of the ACM 50(4): 81-85, 2007. Type: Article
Jun 7 2007
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy