Shred your bits for safety's sake

March 09, 2007 (IDG News Service) -- Jeff Jonas, the chief scientist and distinguished engineer at IBM Corp.'s entity analytic solutions group, has developed a means of sharing corporate data without revealing what that data contains.
This technology, called anonymization, effectively "shreds" information, making it possible for companies to share information about their customers with governments or other companies without giving away any personal data. Over time, Jonas believes companies will increasingly use anonymization to defend their data, and corporate well-being, from competitors and identity thieves.
Jonas recently sat down with IDG News Service in Singapore to discuss anonymization and how protecting customer privacy will make companies more competitive.
IDG News Service: How does anonymization work?
Jeff Jonas: Normally, somebody with data encrypts it, and then they transfer it. Then, the recipient decrypts the data to use it. But while it's in transit -- in flight -- it's encrypted. Cryptographers have invented math that allows you to shred something, and then unshred it: encrypt it, and then decrypt it.
Part of cryptography is something else that creates digital signatures. Smart math people have invented algorithms that are called one-way hashes. It looks like encryption because you put in data and what comes out is not readable to humans. But there's no way to take what came out and take the math and run it backwards, and get the input value. That's why I use the example of a pig and a sausage. If I give you the sausage and the grinder, you can't go backwards and make a pig.
I just took advantage of something that someone else has made, and I just used it in a slightly different way to get a new result.
IDGNS: In effect, the process of anonymization creates digital signatures of information that can be compared against other signatures for possible matches. At the same time, the signatures cannot be used to recreate the original data.
Jonas: Normally, I have data and you have data and we want to figure out what our data means together. But I don't want to give you mine and you don't want to give me yours. This is why information sharing will fail: everyone wants to be the recipient.
Sometimes a government may pass a law that says I, as a company, have to give you my data. Maybe you have a watch list, and you don't want me to see it. That's how I ended up creating this. I was getting ready to take my kids on a cruise. I made the reservations and then saw in a newspaper that there was a threat against Port Canaveral, Florida, from terrorist scuba divers. I was thinking, "Oh no, I'm taking my kids on a cruise."
分享至
一键收藏,随时查看,分享好友!
0人
了这篇文章
类别:未分类┆阅读( 0)┆评论( 0) ┆ 返回博主首页┆ 返回博客首页
上一篇 Crack! Security expert hacks RFID in UK pas.. 下一篇 How dangerous is Skype?

你可能感兴趣的:(for,bits,Your,safety's,Shred)