Abstract
We propose a Bayesian model of privacy in e-authentication and develop associated entropy-based metrics. A major contribution of this work is the application of weighted entropy to characterize the user’s privacy preferences. Further, we model the effects of side information on privacy and relate it to self-disclosure on Internet web sites and social networks. Specifically, our empirical study of Internet users’ information disclosure habits within social networks along with the theoretical results provide insights into building a regulatory framework to address privacy concerns in e-authentication.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Belis, M., Guiasu, S.: Quantitative-Qualitative Measure of Information in Cybernetic Systems. IEEE Transactions on Information Theory 14, 593–594 (1968)
Bennett, C.H., Brassard, G., Crépeau, C., Maurer, U.M.: Generalized Privacy Amplification. IEEE Transactions on Information Theory 41, 1915–1923 (1995)
Burr, W.E., Dodson, D.F., Polk, W.T.: Electronic Authentication Guideline: Recommendations of the National Institute of Standards and Technology. NIST Special Publication 800-63 Version 1.0.2, National Institute of Standards and Technology, NIST (2006)
Caroline, H.: Comparison of Insiders’ Optimal Strategies Depending on the Type of Side-Information. Stochastic Processes and their Applications 115, 1603–1627 (2005)
Chen, Y., Liginlal, D.: Bayesian Networks for Knowledge-Based Authentication. IEEE Transactions on Knowledge and Data Engineering 19, 695–710 (2007)
Chen, Y., Liginlal, D.: Information Disclosure on the Internet-A Machine Learning Perspective. Working Paper, University of Wisconsin-Madison (2008)
Chokhani, S.: Knowledge Based Authentication (KBA) Metrics. In: KBA Symposium-Knowledge Based Authentication: Is It Quantifiable?, Gaithersburg, MD (2004)
Cover, T., Thomas, J.: Elements of Information Theory. Wiley, Chichester (2006)
Dunbar, R.I.M.: Neocortex Size as a Constraint on Group Size in Primates. Journal of Human Evolution 20, 469–493 (1992)
Ellison, C., Hall, C., Milbert, R., Schneier, B.: Protecting Secret Keys with Personal Entropy. Future Generation Computer Systems 16, 311–318 (2000)
Guiasu, S.: Weighted Entropy. Reports on Mathematical Physics 2, 165–179 (1971)
Haga, W.J., Zviran, M.: Cognitive passwords: from theory to practice. Data Processing and Communications Security 3, 19–23 (1989)
Hastings, N.E., Dodson, D.F.: Quantifying Assurance of Knowledge Based Authentication. In: 3rd European Conference on Information Warfare and Security, ECIW 2004 (2004)
He, J., Chu, W.W., Liu, Z.: Inferring Privacy Information from Social Networks. In: Mehrotra, S., Zeng, D.D., Chen, H., Thuraisingham, B., Wang, F.-Y. (eds.) ISI 2006. LNCS, vol. 3975, pp. 154–165. Springer, Heidelberg (2006)
Hillairet, C.: Comparison of Insiders’ Optimal Strategies Depending on the Type of Side-Information. Stochastic Processes and their Applications 114, 1603–1627 (2005)
Karmeshu, J.: Entropy Measures, Maximum Entropy Principle and Emerging Applications. Springer, Heidelberg (2003)
Lawler, B.: Models of Knowledge Based Authentication (KBA). In: KBA Symposium-Knowledge Based Authentication: Is It Quantifiable?, Gaithersburg, MD (2004)
Lowry, S.: Challenge & Response within E-Authentication Framework. In: KBA Symposium-Knowledge Based Authentication: Is It Quantifiable?, Gaithersburg, MD (2004)
Milgram, S.: The Small-World Problem. Psychology Today 1, 61–67 (1967)
Millett, L.I., Holden, H.S.: Authentication and its Privacy Effects. IEEE Internet Computing 6, 54–58 (2003)
Pearl, J.: Probabilistic Reasoning in Intelligence Systems. Morgan, San Maleo (1988)
Shannon, C.E.: Channels with Side Information at the Transmitter. IBM J. Res. Develop, 289–293 (1958)
Theil, H.: Disutility as a Probability. Management Science 20, 109–116 (1980)
US National Research Council. Who Goes There? Authentication through the Lens of Privacy. Nat’l Academy Press, Washington (2003)
Watts, D.J., Dodds, P.S., Newman, M.E.J.: Identity and Search in Social Networks. Science 296, 1302–1305 (2002)
Westin, A.: Privacy and Freedom. Atheneum, New York (1967)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Liginlal, D., Khansa, L. (2010). Privacy and E-Authentication: The Dangers of Self-disclosure in Social Networks. In: Sharman, R., Rao, H.R., Raghu, T.S. (eds) Exploring the Grand Challenges for Next Generation E-Business. WEB 2009. Lecture Notes in Business Information Processing, vol 52. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-17449-0_16
Download citation
DOI: https://doi.org/10.1007/978-3-642-17449-0_16
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-17448-3
Online ISBN: 978-3-642-17449-0
eBook Packages: Computer ScienceComputer Science (R0)