SlideShare ist ein Scribd-Unternehmen logo
1 von 6
Downloaden Sie, um offline zu lesen
The Theory of Regulated Anonymity

                                     Naavi


The theory of regulated anonymity as propounded by Naavi advocates a conflict
resolution solution for preserving the democratic principles of Privacy
Protection in Cyber Space along with the need of the law enforcement to be able
to prevent misuse of “Privacy” as a cover for Cyber Crimes.

Internet developed in the 70’s because of its ability to provide an opportunity
for anonymous expression by individuals. Even today Privacy activists are
fighting for anonymity as a matter of right. “Right to be Forgotten” is the new
prescription of privacy laws under development in EU.

There is admittedly, a strong case for “Anonymity” and also “Pseudonomity” as
means of protecting the privacy of an individual on the Internet. However
looking from the perspective of increasing Cyber Crimes and their escalation to
Cyber Terrorism and Cyber Wars, there is an equally strong case for the
demand of the law enforcement for absolute surveillance and need to identify
individuals conducting any transaction on the Internet. The new laws in most
countries including India and US try to provide for such “ Authorized Invasion
of Privacy”. This brings forth the direct conflict between Privacy and Crime
Prevention while formulating regulations.


If we agree that even “Democracy” needs to defend Cyber attacks on its
individuals and therefore do everything within its powers to identify criminals
and punish them if they are hiding behind the privacy rights, then it is necessary
to find a solution to this conflict of interest.


The biggest problem in Privacy advocates accepting to any form of surveillance
is the proven fact that a power meant to secure the society is always misused by
the Government to secure its own power to rule. Thus, surveillance will be used
to gather information on the activities of the political opponents and to
intimidate the opponents. Thus a dictatorship under the garb of democracy can
always use the powers assumed for national security of the security of the
political party.

                                                                                 1
It is in this context of both “Anonymity” and “Regulation” having their own
justification that I suggest a system of “Regulated Anonymity”. This could be a
solution to resolving the conflict between Privacy advocates and the regulators.


The system of “Regulated Anonymity” envisages that a “Non-Governmental”
body of the Netizens will regulate the anonymity. The system would be similar
to the presently available “Anonimizer” services. However, at present the
anonimizers are either run with a profit motive by a private company or known
groups of law evaders. While an anonimizer run by a private company will only
replace the Government with a private entity who can be corrupted for an
organized breach of information, an anonimizer run by law evaders will not
cooperate with the regulators even when it is necessary in the interest of the
society.

We therefore need to have an agency which is not a Government body with
political interests, nor a private body with profit interest nor a criminal body
with self protective interests. It is a challenge of the “Regulated Anonymity”
system to find such an agency.

The control should be with a distributed set of persons committed to Privacy
and Safe Internet. The interaction of the law enforcement agency should be
with people who are another set of persons who can evaluate the requirements
of the law enforcement and invoke a trusted cooperation from the technical
team to reveal the identity of persons behind any offending transaction.

Essence of the Theory

Naavi’s Theory of Regulated Anonymity is built on the premise that “Absolute
Anonymity of the Netizen is impractical as it would be completely opposed by
all law enforcement authorities and is against the current laws in most countries.

Under the theory, Anonymity should be regulated by providing every Netizen
with a “Cyber Space Avatar ID” to substitute the “Physical Space Citizen ID”.

The Netizen may use his Netizen ID whenever he wants to be anonymous while
he is free to do any transaction in Cyber Space also with the Citizen ID of the
Physical Society. Whenever a justification arises for the Privacy wail to be

                                                                                 2
lifted, a      due      process     outside     the     control       of     the
Government/Politicians/Corporate interests would be applied.

The assumptions under this theory are

      a)   Government of the day is not absolutely trusted by the Citizens and

      b)    Privacy law in most countries advocate a “Due Process” for lifting
      the privacy wail in the interest of national security etc. However the “Due
      Process” has a tendency to get corrupted in favour of an aggressive
      Government or influential corporate authority.

      c)    There is a need for an agency to act as an “Ombudsman” (Privacy
      Protection Group or PPG) between the Law enforcement authorities and
      the Citizen to decide when privacy wail can be lifted in the interest of
      national security and in accordance with the due process of law.

      d)    PPG has to be constituted outside the control of the major stake
      holders in privacy breach namely the Government, Politicians, and the
      Corporate powers.

      e)     Anonymity can be better preserved by distributing data across
      multiple persons and locations so that no single country or single person
      has all the data that are necessary for identifying a Netizen of the Cyber
      Society to a corresponding Citizen in the Physical world.

      f)    Necessary and Sufficient Penalties can be imposed on the Netizens
      applicable to Cyber Society independent of the penalties that can be
      imposed on the Citizen mapped to an offending the Netizen ID.




                                                                                 3
Suggested Process

In pursuance of the above principles, the system of Regulated Anonymity
recommended by Naavi is depicted in the following diagrams.

The first diagram shows the suggested architecture for converting the Citizen ID
to a Netizen ID and the second diagram shows how the request for the lifting of
the privacy wail will function.




                                  Diagram 1




                                                                               4
Diagram 2




In the above process, only for a brief period, private data will be available in
unencrypted form at any stage of anonymization. It will be encrypted before the
end of the initial session in “Cache” form and moved into S2. The decryption
key is not sent to S2 but is sent to S3. Once the session is closed, the
unencrypted data gets deleted from S1. S4 gets only the RID and generates the
Avatar ID.

The decryption occurs only at the time of disclosure after the approval of the
PPG when S1 collates the RID from S4, Encrypted Data from S2 and
decryption key from S3. This is sent to the law enforcement agency after which
it again gets deleted from cache memory itself.

The servers would be in different countries other than the country of residence
of the user.


                                                                               5
This system ensures that data gets distributed over three/four different countries
and servers and hence it would be difficult to forcefully access the data by any
Governmental authority.

The process of revealing the personal data in case of a genuine need would be
handled with a strong mechanism for filtering fake requests and unlawful
requests. The body which filters the requests from law enforcement agencies
will consist of experts in privacy law in different countries. It should be as
strong as the ICANN and should be removed from the administrative control of
any single Government. A body of multiple Governments such as the “Cyber-
UNO” may be conceived to deal with any conflict between the physical society
and the digital society arising out of the anonymity issues.

This process of Regulated Anonymity is expected to satisfy the Privacy
requirements as well as the law enforcement needs.

It remains to be seen however who will venture into setting up the above
system. It would be ideal that an organization like ICANN should take the lead
in establishing such a system.


                                                                         Naavi
                                                                naavi@vsnl.com
                                                                 www.naavi.org
                                                                +919343554943




                                                                                 6

Weitere ähnliche Inhalte

Was ist angesagt?

Cyber Claims Brief Summer 2016
Cyber Claims Brief Summer 2016Cyber Claims Brief Summer 2016
Cyber Claims Brief Summer 2016Anthony Rapa
 
Social media legislation
Social media legislationSocial media legislation
Social media legislationyayayaya76
 
Death and Social Media Research Paper
Death and Social Media Research PaperDeath and Social Media Research Paper
Death and Social Media Research PaperJacqui Brauman
 
Privacy PPT by Axel Kloth_March 18 2021
Privacy PPT by Axel Kloth_March 18 2021Privacy PPT by Axel Kloth_March 18 2021
Privacy PPT by Axel Kloth_March 18 2021Nicole Fucile-Borsian
 
It act 2000 & cyber crime 111111
It act 2000 & cyber crime 111111It act 2000 & cyber crime 111111
It act 2000 & cyber crime 111111Yogendra Wagh
 
Impact of GDPR on the pre dominant business model for digital economies
Impact of GDPR on the pre dominant business model for digital economiesImpact of GDPR on the pre dominant business model for digital economies
Impact of GDPR on the pre dominant business model for digital economiesEquiGov Institute
 
1.03 ethics and_security_review_ppt (1)
1.03 ethics and_security_review_ppt (1)1.03 ethics and_security_review_ppt (1)
1.03 ethics and_security_review_ppt (1)wright1908
 
Cybercrime act of Pakistan 2015 Report
Cybercrime act of Pakistan 2015 ReportCybercrime act of Pakistan 2015 Report
Cybercrime act of Pakistan 2015 ReportAbdul Rehman
 
Whitepaper_Publicism_06122016
Whitepaper_Publicism_06122016Whitepaper_Publicism_06122016
Whitepaper_Publicism_06122016John Olivieira
 
Cyber laws and patents
Cyber laws and patentsCyber laws and patents
Cyber laws and patentsravijain90
 
Use of blockchain in telecom and media industry
Use of blockchain in telecom and media industryUse of blockchain in telecom and media industry
Use of blockchain in telecom and media industryBlockchain Council
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crimefiza209
 
Online Identity Theft: Changing the Game
Online Identity Theft: Changing the GameOnline Identity Theft: Changing the Game
Online Identity Theft: Changing the Game- Mark - Fullbright
 

Was ist angesagt? (19)

Cyber Claims Brief Summer 2016
Cyber Claims Brief Summer 2016Cyber Claims Brief Summer 2016
Cyber Claims Brief Summer 2016
 
Social media legislation
Social media legislationSocial media legislation
Social media legislation
 
Death and Social Media Research Paper
Death and Social Media Research PaperDeath and Social Media Research Paper
Death and Social Media Research Paper
 
Cybercrimeppt
Cybercrimeppt Cybercrimeppt
Cybercrimeppt
 
Privacy PPT by Axel Kloth_March 18 2021
Privacy PPT by Axel Kloth_March 18 2021Privacy PPT by Axel Kloth_March 18 2021
Privacy PPT by Axel Kloth_March 18 2021
 
IC3 2019 Internet Crime Report
IC3 2019 Internet Crime ReportIC3 2019 Internet Crime Report
IC3 2019 Internet Crime Report
 
It act 2000 & cyber crime 111111
It act 2000 & cyber crime 111111It act 2000 & cyber crime 111111
It act 2000 & cyber crime 111111
 
Impact of GDPR on the pre dominant business model for digital economies
Impact of GDPR on the pre dominant business model for digital economiesImpact of GDPR on the pre dominant business model for digital economies
Impact of GDPR on the pre dominant business model for digital economies
 
1.03 ethics and_security_review_ppt (1)
1.03 ethics and_security_review_ppt (1)1.03 ethics and_security_review_ppt (1)
1.03 ethics and_security_review_ppt (1)
 
Cybercrime act of Pakistan 2015 Report
Cybercrime act of Pakistan 2015 ReportCybercrime act of Pakistan 2015 Report
Cybercrime act of Pakistan 2015 Report
 
Whitepaper_Publicism_06122016
Whitepaper_Publicism_06122016Whitepaper_Publicism_06122016
Whitepaper_Publicism_06122016
 
BlockchainPaper
BlockchainPaperBlockchainPaper
BlockchainPaper
 
Cyber laws and patents
Cyber laws and patentsCyber laws and patents
Cyber laws and patents
 
Red Flag Rules
Red Flag RulesRed Flag Rules
Red Flag Rules
 
Use of blockchain in telecom and media industry
Use of blockchain in telecom and media industryUse of blockchain in telecom and media industry
Use of blockchain in telecom and media industry
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Online Identity Theft: Changing the Game
Online Identity Theft: Changing the GameOnline Identity Theft: Changing the Game
Online Identity Theft: Changing the Game
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 

Andere mochten auch

Webinar Smile et WSO2 ESB, vers une architecture orientée service, ouverte et...
Webinar Smile et WSO2 ESB, vers une architecture orientée service, ouverte et...Webinar Smile et WSO2 ESB, vers une architecture orientée service, ouverte et...
Webinar Smile et WSO2 ESB, vers une architecture orientée service, ouverte et...Smile I.T is open
 
Meet Magento 2015 Utrecht - ElasticSearch - Smile
Meet Magento 2015 Utrecht - ElasticSearch - SmileMeet Magento 2015 Utrecht - ElasticSearch - Smile
Meet Magento 2015 Utrecht - ElasticSearch - SmileSmile I.T is open
 
Bargento 2014 : conférence Smile « ElasticSearch booste la recherche Magento »
Bargento 2014 : conférence Smile « ElasticSearch booste la recherche Magento »Bargento 2014 : conférence Smile « ElasticSearch booste la recherche Magento »
Bargento 2014 : conférence Smile « ElasticSearch booste la recherche Magento »Smile I.T is open
 
Séminaire Smile - Réussir son application Métier
Séminaire Smile - Réussir son application MétierSéminaire Smile - Réussir son application Métier
Séminaire Smile - Réussir son application MétierSmile I.T is open
 
Séminaire Smile & Akeneo : e-commerce - J'ai mal à mon catalogue
Séminaire Smile & Akeneo : e-commerce - J'ai mal à mon catalogueSéminaire Smile & Akeneo : e-commerce - J'ai mal à mon catalogue
Séminaire Smile & Akeneo : e-commerce - J'ai mal à mon catalogueSmile I.T is open
 
Webinar SMILE : "Découvrez Alfresco 5.1, la solution pour une gestion documen...
Webinar SMILE : "Découvrez Alfresco 5.1, la solution pour une gestion documen...Webinar SMILE : "Découvrez Alfresco 5.1, la solution pour une gestion documen...
Webinar SMILE : "Découvrez Alfresco 5.1, la solution pour une gestion documen...Smile I.T is open
 
A high profile project with Symfony and API Platform: beIN SPORTS
A high profile project with Symfony and API Platform: beIN SPORTSA high profile project with Symfony and API Platform: beIN SPORTS
A high profile project with Symfony and API Platform: beIN SPORTSSmile I.T is open
 

Andere mochten auch (17)

How to Set Up a WordPress Blog for Your Business
How to Set Up a WordPress Blog for Your BusinessHow to Set Up a WordPress Blog for Your Business
How to Set Up a WordPress Blog for Your Business
 
How to Set Up a Facebook Business Page
How to Set Up a Facebook Business PageHow to Set Up a Facebook Business Page
How to Set Up a Facebook Business Page
 
Twitter for Nonprofits
Twitter for NonprofitsTwitter for Nonprofits
Twitter for Nonprofits
 
How to Use Twitter for Your Business
How to Use Twitter for Your BusinessHow to Use Twitter for Your Business
How to Use Twitter for Your Business
 
Write Submission Guidelines That Get Results
Write Submission Guidelines That Get ResultsWrite Submission Guidelines That Get Results
Write Submission Guidelines That Get Results
 
Front-end performances
Front-end performancesFront-end performances
Front-end performances
 
Getting published in the age of ebooks
Getting published in the age of ebooksGetting published in the age of ebooks
Getting published in the age of ebooks
 
An Intro to Social Media
An Intro to Social MediaAn Intro to Social Media
An Intro to Social Media
 
Set Up a Facebook Page for Your Business
Set Up a Facebook Page for Your BusinessSet Up a Facebook Page for Your Business
Set Up a Facebook Page for Your Business
 
LinkedIn for Nonprofits
LinkedIn for NonprofitsLinkedIn for Nonprofits
LinkedIn for Nonprofits
 
Webinar Smile et WSO2 ESB, vers une architecture orientée service, ouverte et...
Webinar Smile et WSO2 ESB, vers une architecture orientée service, ouverte et...Webinar Smile et WSO2 ESB, vers une architecture orientée service, ouverte et...
Webinar Smile et WSO2 ESB, vers une architecture orientée service, ouverte et...
 
Meet Magento 2015 Utrecht - ElasticSearch - Smile
Meet Magento 2015 Utrecht - ElasticSearch - SmileMeet Magento 2015 Utrecht - ElasticSearch - Smile
Meet Magento 2015 Utrecht - ElasticSearch - Smile
 
Bargento 2014 : conférence Smile « ElasticSearch booste la recherche Magento »
Bargento 2014 : conférence Smile « ElasticSearch booste la recherche Magento »Bargento 2014 : conférence Smile « ElasticSearch booste la recherche Magento »
Bargento 2014 : conférence Smile « ElasticSearch booste la recherche Magento »
 
Séminaire Smile - Réussir son application Métier
Séminaire Smile - Réussir son application MétierSéminaire Smile - Réussir son application Métier
Séminaire Smile - Réussir son application Métier
 
Séminaire Smile & Akeneo : e-commerce - J'ai mal à mon catalogue
Séminaire Smile & Akeneo : e-commerce - J'ai mal à mon catalogueSéminaire Smile & Akeneo : e-commerce - J'ai mal à mon catalogue
Séminaire Smile & Akeneo : e-commerce - J'ai mal à mon catalogue
 
Webinar SMILE : "Découvrez Alfresco 5.1, la solution pour une gestion documen...
Webinar SMILE : "Découvrez Alfresco 5.1, la solution pour une gestion documen...Webinar SMILE : "Découvrez Alfresco 5.1, la solution pour une gestion documen...
Webinar SMILE : "Découvrez Alfresco 5.1, la solution pour une gestion documen...
 
A high profile project with Symfony and API Platform: beIN SPORTS
A high profile project with Symfony and API Platform: beIN SPORTSA high profile project with Symfony and API Platform: beIN SPORTS
A high profile project with Symfony and API Platform: beIN SPORTS
 

Ähnlich wie Naavi theory regulated_anonymity

The Self-Invasion Of Privacy
The Self-Invasion Of PrivacyThe Self-Invasion Of Privacy
The Self-Invasion Of PrivacyDiane Allen
 
Write My Research Paper. Online assignment writing service.
Write My Research Paper. Online assignment writing service.Write My Research Paper. Online assignment writing service.
Write My Research Paper. Online assignment writing service.Amber Butler
 
Cybercrime
CybercrimeCybercrime
Cybercrimepromit
 
Lofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and EncryptionLofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and EncryptionSean Whalen
 
Five Considerations for Blockchain Applied to Data Privacy & GDPR
Five Considerations for Blockchain Applied to Data Privacy & GDPRFive Considerations for Blockchain Applied to Data Privacy & GDPR
Five Considerations for Blockchain Applied to Data Privacy & GDPRDivyaConsagous
 
Legal and regulatory environment e commerce
Legal and regulatory environment e commerceLegal and regulatory environment e commerce
Legal and regulatory environment e commerceDr Vijay Vishwakarma
 
Iot privacy vs convenience
Iot privacy vs  convenienceIot privacy vs  convenience
Iot privacy vs convenienceDon Lovett
 
Court for legal issues - presentation
Court for legal issues - presentationCourt for legal issues - presentation
Court for legal issues - presentationgabrieldegraauw
 
Report of cyber crime
Report of cyber crimeReport of cyber crime
Report of cyber crimeAlisha Korpal
 
Disruptive technologies - Session 2 - Blockchain smart_contracts
Disruptive technologies - Session 2 - Blockchain smart_contractsDisruptive technologies - Session 2 - Blockchain smart_contracts
Disruptive technologies - Session 2 - Blockchain smart_contractsBohitesh Misra, PMP
 
Ethical issues and social issues related to systems upload
Ethical issues and social issues related to systems uploadEthical issues and social issues related to systems upload
Ethical issues and social issues related to systems uploadwaiforchi Wagiteerhh
 
Bitcoin Fog Social Media Defense
Bitcoin Fog Social Media DefenseBitcoin Fog Social Media Defense
Bitcoin Fog Social Media DefenseInvestingTips
 
State of Encryption in Kenya
State of Encryption in KenyaState of Encryption in Kenya
State of Encryption in KenyaCollinsKimathi
 
Israel Privacy Protection Regulations - Duty To Report A Severe Security Event
Israel Privacy Protection Regulations - Duty To Report A Severe Security EventIsrael Privacy Protection Regulations - Duty To Report A Severe Security Event
Israel Privacy Protection Regulations - Duty To Report A Severe Security EventBarry Schuman
 

Ähnlich wie Naavi theory regulated_anonymity (20)

The Self-Invasion Of Privacy
The Self-Invasion Of PrivacyThe Self-Invasion Of Privacy
The Self-Invasion Of Privacy
 
Write My Research Paper. Online assignment writing service.
Write My Research Paper. Online assignment writing service.Write My Research Paper. Online assignment writing service.
Write My Research Paper. Online assignment writing service.
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Lofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and EncryptionLofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and Encryption
 
Internet Privacy Essay
Internet Privacy EssayInternet Privacy Essay
Internet Privacy Essay
 
Human identity inforg
Human identity   inforgHuman identity   inforg
Human identity inforg
 
Cyber law and cyber-crime
Cyber law and cyber-crimeCyber law and cyber-crime
Cyber law and cyber-crime
 
Five Considerations for Blockchain Applied to Data Privacy & GDPR
Five Considerations for Blockchain Applied to Data Privacy & GDPRFive Considerations for Blockchain Applied to Data Privacy & GDPR
Five Considerations for Blockchain Applied to Data Privacy & GDPR
 
Legal and regulatory environment e commerce
Legal and regulatory environment e commerceLegal and regulatory environment e commerce
Legal and regulatory environment e commerce
 
Iot privacy vs convenience
Iot privacy vs  convenienceIot privacy vs  convenience
Iot privacy vs convenience
 
Court for legal issues - presentation
Court for legal issues - presentationCourt for legal issues - presentation
Court for legal issues - presentation
 
Report of cyber crime
Report of cyber crimeReport of cyber crime
Report of cyber crime
 
Disruptive technologies - Session 2 - Blockchain smart_contracts
Disruptive technologies - Session 2 - Blockchain smart_contractsDisruptive technologies - Session 2 - Blockchain smart_contracts
Disruptive technologies - Session 2 - Blockchain smart_contracts
 
Cyber2
Cyber2Cyber2
Cyber2
 
Ethical issues and social issues related to systems upload
Ethical issues and social issues related to systems uploadEthical issues and social issues related to systems upload
Ethical issues and social issues related to systems upload
 
Bitcoin Fog Social Media Defense
Bitcoin Fog Social Media DefenseBitcoin Fog Social Media Defense
Bitcoin Fog Social Media Defense
 
5
55
5
 
5
55
5
 
State of Encryption in Kenya
State of Encryption in KenyaState of Encryption in Kenya
State of Encryption in Kenya
 
Israel Privacy Protection Regulations - Duty To Report A Severe Security Event
Israel Privacy Protection Regulations - Duty To Report A Severe Security EventIsrael Privacy Protection Regulations - Duty To Report A Severe Security Event
Israel Privacy Protection Regulations - Duty To Report A Severe Security Event
 

Kürzlich hochgeladen

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024The Digital Insurer
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024SynarionITSolutions
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 

Kürzlich hochgeladen (20)

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 

Naavi theory regulated_anonymity

  • 1. The Theory of Regulated Anonymity Naavi The theory of regulated anonymity as propounded by Naavi advocates a conflict resolution solution for preserving the democratic principles of Privacy Protection in Cyber Space along with the need of the law enforcement to be able to prevent misuse of “Privacy” as a cover for Cyber Crimes. Internet developed in the 70’s because of its ability to provide an opportunity for anonymous expression by individuals. Even today Privacy activists are fighting for anonymity as a matter of right. “Right to be Forgotten” is the new prescription of privacy laws under development in EU. There is admittedly, a strong case for “Anonymity” and also “Pseudonomity” as means of protecting the privacy of an individual on the Internet. However looking from the perspective of increasing Cyber Crimes and their escalation to Cyber Terrorism and Cyber Wars, there is an equally strong case for the demand of the law enforcement for absolute surveillance and need to identify individuals conducting any transaction on the Internet. The new laws in most countries including India and US try to provide for such “ Authorized Invasion of Privacy”. This brings forth the direct conflict between Privacy and Crime Prevention while formulating regulations. If we agree that even “Democracy” needs to defend Cyber attacks on its individuals and therefore do everything within its powers to identify criminals and punish them if they are hiding behind the privacy rights, then it is necessary to find a solution to this conflict of interest. The biggest problem in Privacy advocates accepting to any form of surveillance is the proven fact that a power meant to secure the society is always misused by the Government to secure its own power to rule. Thus, surveillance will be used to gather information on the activities of the political opponents and to intimidate the opponents. Thus a dictatorship under the garb of democracy can always use the powers assumed for national security of the security of the political party. 1
  • 2. It is in this context of both “Anonymity” and “Regulation” having their own justification that I suggest a system of “Regulated Anonymity”. This could be a solution to resolving the conflict between Privacy advocates and the regulators. The system of “Regulated Anonymity” envisages that a “Non-Governmental” body of the Netizens will regulate the anonymity. The system would be similar to the presently available “Anonimizer” services. However, at present the anonimizers are either run with a profit motive by a private company or known groups of law evaders. While an anonimizer run by a private company will only replace the Government with a private entity who can be corrupted for an organized breach of information, an anonimizer run by law evaders will not cooperate with the regulators even when it is necessary in the interest of the society. We therefore need to have an agency which is not a Government body with political interests, nor a private body with profit interest nor a criminal body with self protective interests. It is a challenge of the “Regulated Anonymity” system to find such an agency. The control should be with a distributed set of persons committed to Privacy and Safe Internet. The interaction of the law enforcement agency should be with people who are another set of persons who can evaluate the requirements of the law enforcement and invoke a trusted cooperation from the technical team to reveal the identity of persons behind any offending transaction. Essence of the Theory Naavi’s Theory of Regulated Anonymity is built on the premise that “Absolute Anonymity of the Netizen is impractical as it would be completely opposed by all law enforcement authorities and is against the current laws in most countries. Under the theory, Anonymity should be regulated by providing every Netizen with a “Cyber Space Avatar ID” to substitute the “Physical Space Citizen ID”. The Netizen may use his Netizen ID whenever he wants to be anonymous while he is free to do any transaction in Cyber Space also with the Citizen ID of the Physical Society. Whenever a justification arises for the Privacy wail to be 2
  • 3. lifted, a due process outside the control of the Government/Politicians/Corporate interests would be applied. The assumptions under this theory are a) Government of the day is not absolutely trusted by the Citizens and b) Privacy law in most countries advocate a “Due Process” for lifting the privacy wail in the interest of national security etc. However the “Due Process” has a tendency to get corrupted in favour of an aggressive Government or influential corporate authority. c) There is a need for an agency to act as an “Ombudsman” (Privacy Protection Group or PPG) between the Law enforcement authorities and the Citizen to decide when privacy wail can be lifted in the interest of national security and in accordance with the due process of law. d) PPG has to be constituted outside the control of the major stake holders in privacy breach namely the Government, Politicians, and the Corporate powers. e) Anonymity can be better preserved by distributing data across multiple persons and locations so that no single country or single person has all the data that are necessary for identifying a Netizen of the Cyber Society to a corresponding Citizen in the Physical world. f) Necessary and Sufficient Penalties can be imposed on the Netizens applicable to Cyber Society independent of the penalties that can be imposed on the Citizen mapped to an offending the Netizen ID. 3
  • 4. Suggested Process In pursuance of the above principles, the system of Regulated Anonymity recommended by Naavi is depicted in the following diagrams. The first diagram shows the suggested architecture for converting the Citizen ID to a Netizen ID and the second diagram shows how the request for the lifting of the privacy wail will function. Diagram 1 4
  • 5. Diagram 2 In the above process, only for a brief period, private data will be available in unencrypted form at any stage of anonymization. It will be encrypted before the end of the initial session in “Cache” form and moved into S2. The decryption key is not sent to S2 but is sent to S3. Once the session is closed, the unencrypted data gets deleted from S1. S4 gets only the RID and generates the Avatar ID. The decryption occurs only at the time of disclosure after the approval of the PPG when S1 collates the RID from S4, Encrypted Data from S2 and decryption key from S3. This is sent to the law enforcement agency after which it again gets deleted from cache memory itself. The servers would be in different countries other than the country of residence of the user. 5
  • 6. This system ensures that data gets distributed over three/four different countries and servers and hence it would be difficult to forcefully access the data by any Governmental authority. The process of revealing the personal data in case of a genuine need would be handled with a strong mechanism for filtering fake requests and unlawful requests. The body which filters the requests from law enforcement agencies will consist of experts in privacy law in different countries. It should be as strong as the ICANN and should be removed from the administrative control of any single Government. A body of multiple Governments such as the “Cyber- UNO” may be conceived to deal with any conflict between the physical society and the digital society arising out of the anonymity issues. This process of Regulated Anonymity is expected to satisfy the Privacy requirements as well as the law enforcement needs. It remains to be seen however who will venture into setting up the above system. It would be ideal that an organization like ICANN should take the lead in establishing such a system. Naavi naavi@vsnl.com www.naavi.org +919343554943 6