Abstract
Digital storage in the information society allows perfect and unlimited remembering. Yet, the right of an individual to enforce oblivion for pieces of information about her is part of her fundamental right to privacy. In this chapter, we detail a co-utile solution to digital forgetting based on anonymously fingerprinting expiration dates. Due to co-utility, people who learn information about an individual are rationally interested in helping the individual enforce her oblivion policy. Thanks to this rational involvement, even services for content spreading like Facebook or YouTube would be interested in fingerprinting downloads, thereby effectively enforcing the right of content owners to canceling content.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Bo, Y., Piyuan, L., Wenzheng, Z.: An efficient anonymous fingerprinting protocol. In: Computational Intelligence and Security, LNCS 4456, pp. 824–832. Springer, Berlin (2007)
Boneh, D., Shaw, J.: Collusion-secure fingerprinting for digital data. In: Advances in Cryptology, LNCS 963, pp. 452–465. Springer, Berlin (1995)
Camenisch, J.: Efficient anonymous fingerprinting with group signatures. In: Asiacrypt, LNCS 1976, pp. 415–428. Springer, Berlin (2000)
Cohen, J.E.: DRM and privacy. Berkeley Technol. Law J. 18, 575–617 (2003)
Cox, I.J., Miller, M.L., Bloom, J.A., Fridrich, J., Kalker, T.: Digital Watermarking and Steganography. Morgan Kaufmann, Burlington MA (2008)
Domingo-Ferrer, J.: Multi-application smart cards and encrypted data processing. Future Gen. Comput. Syst. 13(1), 65–74 (1997)
Domingo-Ferrer, J.: Anonymous fingerprinting of electronic information with automatic identification of redistributors. Electron. Lett. 34(13), 1303–1304 (1998)
Domingo-Ferrer, J.: Anonymous fingerprinting based on committed oblivious transfer. In: Public Key Cryptography-PKC 1999, LNCS 1560, pp. 43–52. Springer, Berlin (1999)
Domingo-Ferrer, J.: Rational enforcement of digital oblivion. In: Proceedings of the 4th International Workshop on Privacy and Anonymity in the Information Society, ACM, Art. no. 2 (2011)
Domingo-Ferrer, J., Martínez, S., Sánchez, D., Soria-Comas, J.: Co-utility: self-enforcing protocols for the mutual benefit of participants. Eng. Appl. Artif. Intell. 59, 148–158 (2017)
Domingo-Ferrer, J., Megías, D.: Distributed multicast of fingerprinted content based on a rational peer-to-peer community. Comput. Commun. 36, 542–550 (2013)
Domingo-Ferrer, J., Sánchez, D., Soria-Comas, J.: Co-utility: self-enforcing collaborative protocols with mutual help. Prog. Artif. Intell. 5(2), 105–110 (2016)
Facebook Terms of Service, revision dated 30 Jan 2015. Checked 2017/05/18 11:59:56. http://www.facebook.com/terms.php
Furon, T., Duhamel, P.: An asymmetric public detection watermarking technique. In: Information Hiding IH’99, LNCS 1768, pp. 88–100. Springer, Berlin (1999)
Furon, T., Duhamel, P.: An asymmetric watermarking method. IEEE Trans. Signal Process. 51(4), 981–994 (2003)
Gui, G.-F., Jiang, L.-G., He, C.: A robust asymmetric watermarking scheme using multiple public watermarks. IEICE Trans. Fundam. E88-A(7):2026–2029 (2005)
ITU-R.: Recommendation BS.1387. Method for Objective Measurements of Perceived Audio Quality (1998)
Mayer-Schönberger, V.: Beyond copyright: managing information rights with DRM. Denver Univ. Law Rev. 84, 181–198 (2006)
Mayer-Schönberger, V.: The Virtue of Forgetting in the Digital Age. Princeton University Press, Princeton (2009)
Megías, D., Serra-Ruiz, J., Fallahpour, M.: Efficient self-synchronised blind audio watermarking system based on time domain and FFT amplitude modification. Signal Process. 90(12), 3078–3092 (2010)
Opticom. Opera software (2015). http://www.opticom.de/products/opera.html. Accessed 18 Nov 2015
Pfitzmann, B., Waidner, M.: Anonymous fingerprinting. In: Advances in Cryptology-EUROCRYPT’96, LNCS 1233, pp. 88–102. Springer, Berlin (1997)
Thiede, T., Treurniet, W.C., Bitto, R., Schmidmer, C., Sporer, T., Beerends, J.G., Colomes, C., Keyhl, M., Stoll, G., Brandeburg, K., Feiten, B.: PEAQ - the ITU standard for objective measurement of perceived audio quality. J. Audio Eng. Soc. 48(1–2), 3–29 (2000)
Yan-Jun, H., Xiao-Ping, M., Li, G.: A robust public-key image watermarking scheme based on weakness signal detection using chaos system. In: International Conference on Cyberworlds, pp. 477–480 (2009)
YouTube Terms of Service, revision dated 9 June 2010. http://www.youtube.com/static?gl=US&template=terms. Accessed 20 Feb 2017
Acknowledgements
Funding by the Templeton World Charity Foundation (grant TWCF0095/ AB60 “CO-UTILITY”) is gratefully acknowledged. Also, partial support to this work has been received from the Government of Catalonia (ICREA Acadèmia Prize to J. Domingo-Ferrer and grant 2014 SGR 537), the Spanish Government (projects TIN2014-57364-C2-1-R “SmartGlacis”, TIN2015-70054-REDC and TIN2016-80250-R “Sec-MCloud”) and the European Commission (projects H2020-644024 “CLARUS” and H2020-700540 “CANVAS”). The authors are with the UNESCO Chair in Data Privacy, but the views in this work are the authors’ own and are not necessarily shared by UNESCO or any of the funding bodies.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG
About this chapter
Cite this chapter
Domingo-Ferrer, J. (2018). Co-utile Enforcement of Digital Oblivion. In: Domingo-Ferrer, J., Sánchez, D. (eds) Co-utility. Studies in Systems, Decision and Control, vol 110. Springer, Cham. https://doi.org/10.1007/978-3-319-60234-9_5
Download citation
DOI: https://doi.org/10.1007/978-3-319-60234-9_5
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-60233-2
Online ISBN: 978-3-319-60234-9
eBook Packages: EngineeringEngineering (R0)