Presentation 2004-07-21
A Privacy Protection Method using Information Entropy : LooM
Miyuki IMADA, Koichi TAKASUGI, Masakatsu OHTA,
PDF Download Page PDF download Page Link
Abstract(in Japanese) (See Japanese page)
Abstract(in English) We propose a privacy protection method for use by service providers supplying users with services where user information requires privacy in the ubiquitous networking environments. The main feature is the use of an entropy value as a criteria for the evaluation of anonymity. This prevents loss of the convenience of services in the target environment. Objects in the ubiquitous environments will include more private information. This is because information gathered by sensors and so on will be added to static information such as sex and age. Furthermore the end-to-end communication assurance that are conventionally used become more complicated. In the new method, privacy information is managed in a database on a server. The novel idea behind the method is that a calculated by using this database decides whether or not the provider is given access to private information. The entropy value is independent of the number of people listed in the database, so the values are consistent over time. We implement the proposed method and evaluate it though simulations, thus confirming its anonymity feasibility.
Keyword(in Japanese) (See Japanese page)
Keyword(in English) information entropy / privacy protection / ubiquitous networking environment / decision tree
Paper # ISEC2004-54
Date of Issue

Conference Information
Committee ISEC
Conference Date 2004/7/14(1days)
Place (in Japanese) (See Japanese page)
Place (in English)
Topics (in Japanese) (See Japanese page)
Topics (in English)
Chair
Vice Chair
Secretary
Assistant

Paper Information
Registration To Information Security (ISEC)
Language JPN
Title (in Japanese) (See Japanese page)
Sub Title (in Japanese) (See Japanese page)
Title (in English) A Privacy Protection Method using Information Entropy : LooM
Sub Title (in English)
Keyword(1) information entropy
Keyword(2) privacy protection
Keyword(3) ubiquitous networking environment
Keyword(4) decision tree
1st Author's Name Miyuki IMADA
1st Author's Affiliation NTT Network Innovation labs.()
2nd Author's Name Koichi TAKASUGI
2nd Author's Affiliation NTT Network Innovation labs.
3rd Author's Name Masakatsu OHTA
3rd Author's Affiliation NTT Network Innovation labs.
Date 2004-07-21
Paper # ISEC2004-54
Volume (vol) vol.104
Number (no) 200
Page pp.pp.-
#Pages 8
Date of Issue