Linkability estimation between subjects and message contents using formal concepts

In this paper, we examine how conclusions about linkability threats can be drawn by analyzing message contents and subject knowledge in arbitrary communication systems. At first, we define messages described by their contents as formal contexts. Then, we define subjects described by their knowledge as further formal contexts. Finally, we show that concept lattices, which are achieved by applying Formal Concept Analysis to the concatenation of these formal contexts, can be used in order to draw conclusions about correlations, and therefore linkability, between contents of messages and knowledge of subjects. The goal is to define formal specifications which can be utilized in privacy enhancing identity management systems in order to support users in the choice of data items which are to be disclosed to a communication partner.

[1]  Gerd Stumme,et al.  ToscanaJ – An Open Source Tool for Qualitative Data Analysis , 2002 .

[2]  Paul F. Syverson,et al.  Group Principals and the Formalization of Anonymity , 1999, World Congress on Formal Methods.

[3]  Stefan Berthold,et al.  Linkability of communication contents : Keeping track of disclosed data using Formal Concept Analysis , 2006 .

[4]  Stefan Köpsell,et al.  Modelling Unlinkability , 2003, Privacy Enhancing Technologies.

[5]  Sebastian Clauß,et al.  Identity management and its support of multilateral security , 2001, Comput. Networks.

[6]  Bernhard Ganter,et al.  Formal Concept Analysis: Mathematical Foundations , 1998 .

[7]  Christian Lindig Fast Concept Analysis , 2000 .

[8]  Latanya Sweeney,et al.  k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[9]  Marit Hansen,et al.  Privacy-enhancing identity management , 2004, Inf. Secur. Tech. Rep..

[10]  Steve A. Schneider,et al.  CSP and Anonymity , 1996, ESORICS.

[11]  Uta Priss Formal concept analysis in information science , 2006 .

[12]  Bart Preneel,et al.  Towards Measuring Anonymity , 2002, Privacy Enhancing Technologies.

[13]  Olivier Ridoux,et al.  A File System Based on Concept Analysis , 2000, Computational Logic.

[14]  Simone Fischer Hübner IT-Security and Privacy : Design and Use of Privacy-Enhancing Security Mechanisms , 2001 .

[15]  A. Pfitzmann,et al.  Anonymity, Unlinkability, Unobservability, Pseudonymity, and Identity Management – A Consolidated Proposal for Terminology , 2002 .

[16]  Sören Öman Avidentifiera jobbansökningar : en metod för mångfald: betänkande , 2005 .

[17]  S. Fischer-Hübner IT-Security and Privacy: Design and Use of Privacy-Enhancing Security Mechanisms , 2001 .

[18]  Rudolf Wille,et al.  The Lattice of Concept Graphs of a Relationally Scaled Context , 1999, ICCS.

[19]  Sang Joon Kim,et al.  A Mathematical Theory of Communication , 2006 .