anonymous p2p communications platform for secure mining of personal data with minimum risks on...

14
anonymous P2P communications platform for secure mining of personal data with minimum risks on privacy Mnemonic Security, Inc. Fujitsu Prime Software Technologies Limited Imai Lab, IIS, University of Tokyo

Post on 18-Dec-2015

214 views

Category:

Documents


0 download

TRANSCRIPT

anonymous P2P communications

platform

for secure mining of personal data with minimum risks on privacy

Mnemonic Security, Inc.Fujitsu Prime Software Technologies

LimitedImai Lab, IIS, University of Tokyo

leakage of privacy information

• restoration is just impossible• descendants could be influenced• punishment makes no solution• some corporate data are as critical

risk management

There could be no unbreakable data center,

since men of flesh and blood are in charge.

The key is minimizing the damage to the smallest unit – one individual.

Depend less on centralized managementDevelop distributed management

mining of personal data

mining of piecemeal personal data↓

out-of-mark propositions or spam mails received

pertinent propositions received↓

How much of my privacy is known to them?When/how they gathered it without me

knowing?

nightmare of leaking privacy for data centersnightmare of having privacy leaked for individuals

striking a balance

maximum security

distributed data base

secured anonymity

assurance & usability

Secure user verification

by easy and stress-free

Mnemonic Guard

effects

mining of anonymous personal data

self-responsibility

person-

identification data to be managed by

individuals

健康データ

固定データ・名前・住所・年齢・電話番号

・計測データ(血圧、体重等)・年代・性別

encryption

anonymous health data

user id data

Contained in user’s device

Online user verification

by Mnemonic Guard

user

firewall within personal data

service suppliers

公開サービス

非公開情報

intermediary supplier

disclosed for service

non-disclosure data

health data management center

公開サービス

bulletin board (DB)

anonymous P2P network

by onion routing with backtrack

disclosed for service

anonymous communication

health/medicine/food/sports

Issuance of certificate by

Mnemonic Guard

scheme

onion routed P2P network

Unicast communication by onion routing + multicast communication by P2P protocol

Return routes retained in the packets

Effects  

 ・  Anonymity secured by onion routing and multicasting

 ・  Robustness of and reduced burden on the network

application

Peer

Onion Proxy

Peer

Onion Proxy

P2P Onion node

application

Peer

Onion Proxy

P2P Onion node

application

P2P Onion node

Peer Peer

dynamic dynamic route management•  Peer Router retains public key on routing table

•  Route discovery protocol is onion-encrypted for anonymity

•  Onion Proxy generates Route Onion dynamically

Dual RoutingDual Routing

•  Backtracking enabled by multiple onion routes retained in tree structure

•  Failure by onion routing →   Retrial by P2Pmulticast

failureonion routing

P2Pmulticast

P2P Onion node

PeerS

Onion Proxy

Peer

P2P Onion node

Routing

table, public

key

PeerR

P2P Onion node

Routing protocol Routing protocol

Return route to PeeS held in Route Onion

Route to R encrypted by onetime public key of S

Routing

table, public

key

applications

privacy-protected data-mining

Government to PeopleBusiness to People

Models in progressHealth Care

Nagoya Int’l Exposition

secrecy-protecteddata mining

GovernmentBusiness

Government to BusinessBusiness to Business

health care program- personal data input -

health care program - data to be mined -

a billboard a local Japanese        

A traffic lights   

another foreigner

a shop   

a foreign visitor

May I help you ?

Watch! Do not walk!

Where are you from?

We have good Ukiyoe to offer!

There is an authentic Japanese restaurant 100m ahead.

While roving around the venue, visitors keep receiving propositions and suggestions when their terminals are located by nearby radio transmitters. Privacy-conscious visitors can opt to be anonymous.

Nagoya International Exposition

Barrier-free Model

Hearing-impaired

Sight-impaired

To character

To voice

Mono Rail

TimetableGuidanceVoice

Character

Get timetablein voice

Programmed forcloth ears

Communication with anybody

Guidance everywhere

Entrance Gate

Support anytime

From the RF tag of entrance ticket, the best program for the impaired person is selected and set up.

ハンディキャップの情報もチケットに組み込まれてる

から説明しなくても安心

TicketRecognition

Reception

This allows quick lending of information terminal. No advance setting is required. Management becomes easy.

Conversation is automatically transformed to the other party's understandable form. Lively conversation can be enjoyed irrespective of one's impairment.

ハンディキャップをいちいち説明しなくても誰とでも友達になれる

Even if an attendant is not there in times of need, the nearest attendant is

searched and asked for help.

トイレまで案内してもらえませんか?

これなら会場のどこへでも

行ける!

From the different forms of transmitted information, the best one is automatically selected. Moderating the amount of information relieves the burden of information selection.

Exit Gate

ITで友達が出来た!嬉しいな♪

受付がとてもスムース

端末を返却OK気をつけて!

出合ったお友達と一緒に帰ろう。

the end

Imai Lab, IIS, University of TokyoFujitsu Prime Software Technologies

Limited Mnemonic Security, Inc.