skip to main content
10.1145/2187980.2188006acmotherconferencesArticle/Chapter ViewAbstractPublication PageswwwConference Proceedingsconference-collections
research-article

Augmenting the web with accountability

Published:16 April 2012Publication History

ABSTRACT

Given the ubiquity of data on the web, and the lack of usage restriction enforcement mechanisms, stories of personal, creative and other kinds of data misuses are on the rise. There should be both sociological and technological mechanisms that facilitate accountability on the web that would prevent such data misuses. Sociological mechanisms appeal to the data consumer's self-interest in adhering to the data provider's desires. This involves a system of rewards such as recognition and financial incentives, and deterrents such as prohibitions by laws for any violations and social pressure. Bur there is no well-defined technological mechanism for the discovery of accountability or the lack of it on the web. As part of my PhD thesis I propose a solution to this problem by designing a web protocol called HTTPA (Accountable HTTP). This protocol will enable data consumers and data producers to agree to specific usage restrictions, preserve the provenance of data transferred from a web server to a client and back to another web server, and more importantly provide a mechanism to derive an `audit trail' for the data reuse with the help of a trusted intermediary called a `Provenance Tracker Network'.

References

  1. Ching man Au Yeung, Ilaria Liccardi, Kanghao Lu, Oshani Seneviratne, and Tim Berners-Lee, "Decentralization: The Future of Online Social Networking," in W3C Mobile Social Network Workshop, September 2008.Google ScholarGoogle Scholar
  2. Wanhong Xu, Xi Zhou, and Lei Li, "Inferring privacy information via social relations," in Data Engineering Workshop, 2008. ICDEW 2008. IEEE 24th International Conference on, april 2008, pp. 525 --530.Google ScholarGoogle Scholar
  3. Daniel J. Weitzner, Harold Abelson, Tim Berners-Lee, Joan Feigenbaum, James Hendler, and Gerald Jay Sussman, "Information Accountability," Communications of the ACM, vol. 51, pp. 82--87, June 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Ronald Leenes, "Context is everything: Sociality and Privacy in Online Social Network Sites," Privacy and Identity, IFIP AICT 320, pp. 48--65, 2010.Google ScholarGoogle ScholarCross RefCross Ref
  5. Picot, Arnold and Fiedler, Marina, "Impacts of DRM on Internet Based Innovation," in Digital Rights Management, Becker, Eberhard and Buhse, Willms and Günnewig, Dirk and Rump, Niels, Ed. 2003, vol. 2770 of Lecture Notes in Computer Science, pp. 288--300, Springer Berlin / Heidelberg.Google ScholarGoogle Scholar
  6. Lorrie Faith Cranor, "Web privacy with Platform for Privacy Preferences," Oreilly Books, Jan 2002.Google ScholarGoogle Scholar
  7. Electronic Privacy Information Center, "Pretty Poor Privacy: An Assessment of P3P and Internet Privacy," June 2000.Google ScholarGoogle Scholar
  8. P. Kumari, A. Pretschner, J. Peschla, , and J.-M. Kuhn, "Distributed data usage control for web applications: a social network implementation.," in Proceedings of the First ACM Conference on Data and Application Security and Privacy, 2011, pp. 85--96. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Susan Landau, "Support for Fair Use with Project DReaM," Sun Microsystems Laboratories, vol. Version 1.0 Rev A, April 2008.Google ScholarGoogle Scholar
  10. Jorge R. Cuellar, John B. Morris, Deirdre K. Mulligan, Jon Peterson, and James M. Polk, "Geopriv Requirements. Internet RFC 3693," . Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Andrei Popescu, "Geolocation API Specification," .Google ScholarGoogle Scholar
  12. Nick Doty and Erik Wilde, "Geolocation privacy and application platforms," in Proceedings of the 3rd ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS, New York, NY, USA, 2010, SPRINGL '10, pp. 65--69, ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. E Wilde, "Simple policy negotiation for location disclosure," w3.org.Google ScholarGoogle Scholar
  14. Aza Raskin and Arun Ranganathan, "Privacy: A Pictographic Approach," W3C Workshop on Privacy for Advanced Web APIs, 2010.Google ScholarGoogle Scholar
  15. Primelife, "D. Dashboard," http://www.primelife.eu/results/opensource/76-dashboard.Google ScholarGoogle Scholar
  16. Manu Sporny, Toby Inkster, Henry Story, Bruno Harbulot, and Reto Bachmann-Gmur, "Web Identification and Discovery," W3C Editor's Draft, 2011.Google ScholarGoogle Scholar
  17. Ted Kang and Lalana Kagal, "Enabling Privacy-awareness in Social Networks," in Intelligent Information Privacy Management Symposium at the AAAI Spring Symposium 2010, March 2010.Google ScholarGoogle Scholar
  18. Brent Chun, David Culler, Timothy Roscoe, Andy Bavier, Larry Peterson, Mike Wawrzoniak, and Mic Bowman, "Planetlab: an overlay testbed for broad-coverage services," SIGCOMM Comput. Commun. Rev., vol. 33, pp. 3--12, July 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Mark Kinsey, "Keeping Count of Sharing Across the Web," The Facebook Blog, 2009.Google ScholarGoogle Scholar
  20. Oshani Seneviratne, Lalana Kagal, and Tim Berners-Lee, "Policy-Aware Content Reuse on the Web," in ISWC 2009, 2009, pp. 553--568. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Oshani Seneviratne and Andres Monroy-Hernandez, "Remix culture on the web: A survey of content reuse on different User-Generated content websites," in Web Science Conference at World Wide Web Conference 2010, April 2010.Google ScholarGoogle Scholar
  22. Oshani Seneviratne and Lalana Kagal, "Addressing Data Reuse Issues at the Protocol Level," in POLICY 2011, IEEE International Symposium on Policies for Distributed Systems and Networks, 2011, pp. 141--144. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Marc Langheinrich and Lorrie Cranor and Massimo Marchiori, "APPEL: A P3P Preference Exchange Language," W3C Working Draft, 2002.Google ScholarGoogle Scholar
  24. Owen Sacco and Alexandre Passant, "A Privacy Preference Ontology (PPO) for Linked Data," in Linked Data on the Web Workshop at the World Wide Web Conference 2011, April 2011.Google ScholarGoogle Scholar
  25. Doc Searls, "Emancipay: A Relationship Management and Voluntary Payment Framework," Harvard Law Blog, 2010.Google ScholarGoogle Scholar
  26. Berners-Lee, Timothy J, "Information Management: A proposal -- oai:cds.cern.ch:369245," Tech. Rep. CERN-DD-89-001-OC, CERN, Geneva, Mar 1989.Google ScholarGoogle Scholar
  27. Catherine Dwyer, Starr Hiltz, and Katia Passerini, "Trust and Privacy Concern Within Social Networking Sites: A Comparison of Facebook and MySpace," in Proceedings of the Thirteenth Americas Conference on Information Systems, Keystone, Colorado, 2007.Google ScholarGoogle Scholar
  28. danah m. boyd and Nicole B. Ellison, "Social Network Sites: Definition, History, and Scholarship," Journal of Computer-Mediated Communication, vol. 13, no. 1, pp. 210--230, 2007.Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Prema Nakra, "Consumer privacy rights: CPR and the age of the Internet," Management Decision, vol. 39, no. 4, pp. 272--279, 2001.Google ScholarGoogle ScholarCross RefCross Ref
  30. Mozilla, "Privacy Icons," https://wiki.mozilla.org/Drumbeat/Challenges/Privacy_Icons.Google ScholarGoogle Scholar

Index Terms

  1. Augmenting the web with accountability

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      WWW '12 Companion: Proceedings of the 21st International Conference on World Wide Web
      April 2012
      1250 pages
      ISBN:9781450312301
      DOI:10.1145/2187980

      Copyright © 2012 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 16 April 2012

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      Overall Acceptance Rate1,899of8,196submissions,23%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader