Schutz der Privatsphäre bei der Weitergabe persönlicher Daten an Dritte; [Privacy-compliant Disclosure of Personal Data to Third Parties]

被引:0
作者
Wohlgemuth S. [1 ]
Echizen I. [1 ]
Müller G. [2 ]
Sonehara N. [1 ]
机构
[1] National Institute of Informatics, Hitotsubashi, Chiyoda-ku, 2-1-2, Tokyo
[2] Institute for Computer Science and Social Studies, Albert-Ludwig University of Freiburg, Friedrichstr. 50, Freiburg
来源
IT - Information Technology | 2010年 / 52卷 / 06期
关键词
business processes; data provenance; personalized services; unauthorized access;
D O I
10.1524/itit.2010.0614
中图分类号
学科分类号
摘要
Privacy in cloud computing is at the moment simply a promise to be kept by the software service providers. Users are neither able to control the disclosure of personal data to third parties nor to check if the software service providers have followed the agreed-upon privacy policy. Therefore, disclosure of the userś data to the software service providers of the cloud raises privacy risks. This project focuses on enhancing the trust model of the practice so that users and auditors, e. g., data protection officers, can check whether software service providers have followed the agreed-upon privacy policy for a disclosure of personal data to third parties. As a countermeasure by an ex post enforcement of privacy policies, we propose to observe disclosures of personal data to third parties by using data provenance history and digital watermarking. © 2010 by Oldenbourg Wissenschaftsverlag, 101-8430 Tokyo, Germany.
引用
收藏
页码:350 / 355
页数:5
相关论文
共 21 条
  • [1] Alpern B., Schneider F., Dening Liveness, Information Processing Letters, 21, 4, pp. 181-185, (1985)
  • [2] Accorsi R., Automated privacy audits to complement the notion of control for identity management, Proc. IFIP Conf. On Policies and Research in Identity Management, 261, pp. 39-48, (2008)
  • [3] Amazon EC2 Service Level Agreement, (2010)
  • [4] Buneman P., Khanna S., Tan W.-C., Why and where: A char-acterization of data provenance, Int'l Conf. On Database Theory ICDT 2001 LNCS 1973, pp. 316-330, (2001)
  • [5] Cox I.J., Miller M.L., Bloom J.A., Fridrich J., Kalker T., Dig-ital watermarking and steganography, Morgan Kaufmann, (2008)
  • [6] The protection of individuals with regard to the processing of personal data and on the free movement of such data, Ofcial Journal of the European Communities L, 281, pp. 31-50, (1995)
  • [7] Google. Google Health Privacy Policy, (2009)
  • [8] Google. Terms of Service, (2010)
  • [9] Hilty M., Basin D., Pretschner A., On obligations, Euro-pean Symp. On Research in Computer Security ESORICS, 3679, pp. 98-117, (2005)
  • [10] Kerschbaum F., Building a privacy-preserving benchmarking en-terprise system, Enterprise Information Systems, 2, 4, pp. 421-441, (2008)