Sunday, June 16, 2019

Block Chain and Personal Privacy:


In the current culture of the internet and content providers, the use of Personally Identifiable Information (PII) is easily abused because of the ease of transfer, ability to be copied, and can be securely[1] stored.   Content providers, healthcare professionals, and the government all lazily protects this information for the people it serves once an actor agrees with the following enforcement principals: Enforcement of Validity (2) and Enforcement of Separation of Duty (2). 

The mentality that once an entity evaluates the integrity and background of its actors of interaction there is an assumption of Trust.  This establishes the Enforcement of Validity (2) and naively maintains that as long as an entity can guarantee that all actors maintains this level of Trust, Risk can be eliminated.  By establishing a base metric of Trust passing an artifact between actors, with equivalent baselines, allows for a network to be established and maintain a Secure System.  So long as an artifact stays within the rules defining the Enforcement of Separation of Duty, that there is little to no Risk of violations or risk of to be committed in a Secure System by un-trusted actors. 

While great lengths have been made by agencies to maintain the integrity of PII and ensuring that the use of it maintains low risk, the core facets of a system measured by its ability to maintain Reliability, Availability, Maintainability, and Redundancy (3) can be violated when evaluating current implementations of PII as a system(4).  For the context of this post, PII will be thought of as a Secure System. 

An application of the Block Chain can serve as a Trusted System of Personally Identifiable Information, can establish a framework that minimizes risk and adds Reliability, Availability, and Maintainability to a system with its current implementation that cannot do so.

Here is what that application could look like:

The framwork enables the system to establish a Secure System for Personally Identifiable Information (PII).  There are three interactive roles for the system.
  • Actors
  • Requestors
  • Source of Identity[JM1] 
  • Transaction definitions are handled via contracts.
An actor is the lowest privileged of all the users that represents an individual or taxable identity.  This type of user can be used to login throughout the network against sites defined as requestors or request transactions between other actors or requestors.

Requestors have no login privileges.  Requestors can ask for validation against actors and/or requestors to verify their identities.  Requestors can only see information that they have contracted between the privacy application and the requestee.  Requestors must also establish a contract between the Source of Identity they are choosing to use.

Source of Identities(SOI) are the entities that are the true rule of authority.  These entities define what/who PII are and can define their own identifiers.  An example of these entities would be Governments.  New sources are needed but not yet defined.  This type of entity is useful for private networks or to gate access to certain parts of the digital world.  Source of Identities must maintain their contracts between them and the requestors.

Contracts set the rules between the communications.  At a basic level all requestors can use an alias of the privacy application as a method of authentication, but the Requestor cannot get any additional information for the Actor it is serving.  Contracts between requestors that need to use information from a Source of Identity

Requestors can ask for authentication requests between users and if they need to check details about a user, the Source of Identity must have already given them permission to be able to view that information as well as having an agreement between the user and the requestor.  If any link is broken a request is automatically denied.

When a requestor is created, they may choose a Source of Identity, doing so will give the Requestor and the Source of Identity to negotiate what information the Requestor will be able to see about a User or another Requestor.

The goals of this system is to:
Authentication and Verification:

  •  Authenticate actors to actors or actors to requestors while never passing PII
  • Be the Authority of validation to prove identity.
  • Creation of unique links between actors and actors or actors and requestors.
  • Ensure that enforcement of validity is maintained in the system between actors and/or requestors at all times
  • Allow explicit control of actor’s permission of their information between other actors or requestors.
Communication:

  • Allow for validation of information without passing identity revealing information
  • Maintain channels of communication over insecure mediums
  • Ensure transparency of the system and maintaining individual privacy
  • State transitions of the system only act in consensus
Storage:

  • Ledger of interactions between entities.
  • Eliminate the need of PII to be stored externally on system (either the privacy application or by Sources of Identity). 
  • Limit the ability of requestors to store PII.
Recoverability:

  • Recover from PII breaches.
  • Delete aliases between actors and requestors.
Redundancy:

  • No single point of failure.  Distributed processing and storage.
1. Jøsang, Audun and Lo Presti, Stephane. Analysing the Relationship between Risk and Trust. Trust Management. Berlin, Heidelberg : Springer Berlin Heidelberg, 2004, pp. 135--145.
2. A Comparison of Commercial and Military Computer Security Policies. Clark, D. D and Wilson, D. R. s.l. : IEEE, 1987. 1987 IEEE Symposium on Security and Privacy. pp. 184-194.
3. Jackson, Yvonne, et al. The new Department of Defense (DoD) guide for achieving and assessing RAM. Reliability and Maintainability Symposium, 2005. Proceedings. Annual. s.l. : IEEE, 2005, pp. 1--7.

4. Corresponding Security Level with the Risk Factors of Personally Identifiable Information through the Analytic Hierarchy Process. Lin, Iuon-Chang, Lin, Yung-Wang and Wu, Yu-Syuan. 10.1770, s.l. : Journal of Computers, 2016, Vol. 11.


No comments:

Post a Comment

BatchQ - A social infrastructure app to encourage social distancing and maximize customer flow.

I'm pretty excited about this project and hope that you might give it a read. I've coined it BatchQ, if anything I hope it generates...