Advertisement

A Privacy-Enhancing e-Business Model Based on Infomediaries

  • Dimitris Gritzalis
  • Konstantinos Moulinos
  • Konstantinos Kostis
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 2052)

Abstract

Rapid evolution of Internet may largely depend on gaining and maintaining the trust of users. This possibility may especially rule enterprises, whose financial viability depends on electronic commerce. Neither customers will have the time, the ability or the endurance to work out the best deals with vendors, nor will vendors have time to bargain with every customer. In order for customers to strike the best bargain with vendors, they need a privacy supporter, an information intermediary or infomediary. Infomediaries will become the custodians, agents, and brokers of customer personal information exchanged via Internet, while at the same time protecting their privacy. There is a scale between security and privacy that currently leans towards security; security adopts strong user authentication mechanisms in order to control access to personal data, while privacy requires loose authentication in order to provide user anonymity. In this paper we introduce a new infomediaries-based, privacyenhancing business model, which is capable of providing anonymity, privacy and security, to customers and vendors of e-commerce. Using this model, customers of e-commerce can buy goods or services, without revealing their real identity or preferences to vendors, and vendors can sell or advertise goods or services without violating the privacy of their customers.

Keywords

Personal Data Customer Preference User Anonymity Collusion Attack Product Offer 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Sarkar, Butler, Steinfield: Intermediaries and Cybermediaries: A Continuing Role for Mediating Players in the electronic marketplace. Journal of Computer-Mediated Communication, Vol. 1.3 (December 1995)Google Scholar
  2. 2.
    Pfleeger C., Cooper, D.: Security and Privacy: Promising Advances. IEEE Software Magazine, Vol. 14.5 (September/October 1997) 27–32Google Scholar
  3. 3.
    Hagel, Rayport: The new infomediaries. The Mc Kinsey Quarterly, 4 (November 1997)Google Scholar
  4. 4.
    Hagel, J., Singer, M.: Net Worth: Shaping Markets When Customers Make the Rules. HBS Press (1999)Google Scholar
  5. 5.
    De Vivo M., De Vivo G., Isern G.: Internet Security Attacks at the Basic Levels. Operating Systems Review ACM press, Vol. 32.2 (April 1998) 4–15CrossRefGoogle Scholar
  6. 6.
    Crijns, M., et. al.: Issues facing the secure link of Chambers of Commerce. European Commission, COSACC Project, Deliverable No. 3 (December 1998)Google Scholar
  7. 7.
    Berthold, O., Federrath, H., Köhntopp, M.: Project “Anonymity and Unobservability in the Internet”Google Scholar
  8. 8.
    Organization for Economic Co-operation and Development. Inventory Of Instruments and mechanisms contributing to the implementation and enforcement of the OECD privacy guidelines on global networks, DSTI/ICCP/REG(98)12/FINAL (19 May 1999)Google Scholar
  9. 9.
    Goldberg, Wagner: “TAZ Servers and the Rewebber Network: Enabling Anonymous Publishing on the WWW”. First Monday Peer Reviewed Journal on The Internet, Vol. 3.4 (April 1998)Google Scholar
  10. 10.
    Cranor, L.: Internet Privacy. Communications of the ACM, Vol. 42.2 (February 1999) 29–66CrossRefGoogle Scholar
  11. 11.
    Reiter, M., Rubin, A.: Crowds: Anonymity for Web Transactions — AT&T Labs Research, http://www.research.att.com/projects/crowds
  12. 12.
    Bleichenbacher, D., Gabber, E., Gibbons, P., Matias, Y., Mayer, A.: On secure and Pseudonymous Client-Relationships with Multiple Servers (May 1998)Google Scholar
  13. 13.
    Chaum, D.: Untraceable electronic mail, return addresses and digital pseudonyms. Com. of the ACM, 24(2) (February 1981)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2001

Authors and Affiliations

  • Dimitris Gritzalis
    • 1
  • Konstantinos Moulinos
    • 1
    • 2
  • Konstantinos Kostis
    • 1
    • 3
  1. 1.Dept. of Informatics Athens University of Economics & BusinessAthensGreece
  2. 2.Hellenic Data Protection AuthorityGreece
  3. 3.Research and Information Systems Division/CCISGreece

Personalised recommendations