Tagging Disclosures of Personal Data to Third Parties to Preserve Privacy

نویسندگان

  • Sven Wohlgemuth
  • Isao Echizen
  • Noboru Sonehara
  • Günter Müller
چکیده

Privacy in cloud computing is at the moment simply a promise to be kept by the software service providers. Users are neither able to control the disclosure of personal data to third parties nor to check if the software service providers have followed the agreed-upon privacy policy. Therefore, disclosure of the users‘ data to the software service providers of the cloud raises privacy risks. In this article, we show a privacy risk by the example of using electronic health records abroad. As a countermeasure by an ex post enforcement of privacy policies, we propose to observe disclosures of personal data to third parties by using data provenance history and digital watermarking.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Privacy-compliant Disclosure of Personal Data to Third Parties (Schutz der Privatsphäre bei der Weitergabe persönlicher Daten an Dritte)

Privacy in cloud computing is at the moment simply a promise to be kept by the software service providers. Users are neither able to control the disclosure of personal data to third parties nor to check if the software service providers have followed the agreed-upon privacy policy. Therefore, disclosure of the users’ data to the software service providers of the cloud raises privacy risks. This...

متن کامل

On Privacy-compliant Disclosure of Personal Data to Third Parties using Digital Watermarking

Privacy in business processes for providing personalized services is currently a matter of trust. Business processes require the disclosure of personal data to third parties and users are not able to control their usage and so their further disclosure. Existing privacy-enhancing technologies consider access control but not usage control of personal data. The current work on usage control mainly...

متن کامل

LiDSec: A Lightweight Pseudonymization Approach for Textual Personal Information

Sharing personal information benefits both users and third parties in many ways. Recent advances in sensor networks and personal archives enable users to record all of their digital objects including emails, social networking activities, or life events (life logging). These information objects are usually privacy sensitive and thus need to be protected adequately when being shared. In this work...

متن کامل

Privacy and Data Mining: New Developments and Challenges

There is little doubt that data mining technologies create new challenges in the area of data privacy. In this talk, we will review some of the new developments in Privacy-preserving Data Mining. In particular, we will discuss techniques in which data mining results can reveal personal data, and how this can be prevented. We will look at the practically interesting situations where data to be m...

متن کامل

Surprise: user-controlled granular privacy and security for personal data in SmarterContext

The Smart Internet relies on the exploitation of information obtained from interactions of users with web applications. A critical aspect for its success is the adoption of mechanisms that guarantee the protection of information sensitive to users. This paper presents Surprise, our solution to empower users with privacy and data security control for the access to their information, stored in Pe...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010