A Privacy-Enhancing e-Business Model Based on Infomediaries
Rapid evolution of Internet may largely depend on gaining and maintaining the trust of users. This possibility may especially rule enterprises, whose financial viability depends on electronic commerce. Neither customers will have the time, the ability or the endurance to work out the best deals with vendors, nor will vendors have time to bargain with every customer. In order for customers to strike the best bargain with vendors, they need a privacy supporter, an information intermediary or infomediary. Infomediaries will become the custodians, agents, and brokers of customer personal information exchanged via Internet, while at the same time protecting their privacy. There is a scale between security and privacy that currently leans towards security; security adopts strong user authentication mechanisms in order to control access to personal data, while privacy requires loose authentication in order to provide user anonymity. In this paper we introduce a new infomediaries-based, privacyenhancing business model, which is capable of providing anonymity, privacy and security, to customers and vendors of e-commerce. Using this model, customers of e-commerce can buy goods or services, without revealing their real identity or preferences to vendors, and vendors can sell or advertise goods or services without violating the privacy of their customers.
KeywordsPersonal Data Customer Preference User Anonymity Collusion Attack Product Offer
Unable to display preview. Download preview PDF.
- 1.Sarkar, Butler, Steinfield: Intermediaries and Cybermediaries: A Continuing Role for Mediating Players in the electronic marketplace. Journal of Computer-Mediated Communication, Vol. 1.3 (December 1995)Google Scholar
- 2.Pfleeger C., Cooper, D.: Security and Privacy: Promising Advances. IEEE Software Magazine, Vol. 14.5 (September/October 1997) 27–32Google Scholar
- 3.Hagel, Rayport: The new infomediaries. The Mc Kinsey Quarterly, 4 (November 1997)Google Scholar
- 4.Hagel, J., Singer, M.: Net Worth: Shaping Markets When Customers Make the Rules. HBS Press (1999)Google Scholar
- 6.Crijns, M., et. al.: Issues facing the secure link of Chambers of Commerce. European Commission, COSACC Project, Deliverable No. 3 (December 1998)Google Scholar
- 7.Berthold, O., Federrath, H., Köhntopp, M.: Project “Anonymity and Unobservability in the Internet”Google Scholar
- 8.Organization for Economic Co-operation and Development. Inventory Of Instruments and mechanisms contributing to the implementation and enforcement of the OECD privacy guidelines on global networks, DSTI/ICCP/REG(98)12/FINAL (19 May 1999)Google Scholar
- 9.Goldberg, Wagner: “TAZ Servers and the Rewebber Network: Enabling Anonymous Publishing on the WWW”. First Monday Peer Reviewed Journal on The Internet, Vol. 3.4 (April 1998)Google Scholar
- 11.Reiter, M., Rubin, A.: Crowds: Anonymity for Web Transactions — AT&T Labs Research, http://www.research.att.com/projects/crowds
- 12.Bleichenbacher, D., Gabber, E., Gibbons, P., Matias, Y., Mayer, A.: On secure and Pseudonymous Client-Relationships with Multiple Servers (May 1998)Google Scholar
- 13.Chaum, D.: Untraceable electronic mail, return addresses and digital pseudonyms. Com. of the ACM, 24(2) (February 1981)Google Scholar