Citizen Empowerment by a Technical Approach for Privacy Enforcement

被引:7
作者
Alpers, Sascha [1 ]
Betz, Stefanie [2 ]
Fritsch, Andreas [2 ]
Oberweis, Andreas [1 ,2 ]
Schiefer, Gunther [2 ]
Wagner, Manuela [2 ]
机构
[1] FZI Forschungszentrum Informat, Karlsruhe, Germany
[2] Karlsruher Inst Technol KIT, Karlsruhe, Germany
来源
CLOSER: PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND SERVICES SCIENCE | 2018年
关键词
Data Protection; Mobile Apps; Privacy Enhancing Technologies; Data Sovereignty; Legal Conformity; Usability;
D O I
10.5220/0006789805890595
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
It is a fundamental right of every natural person to control which personal information is collected, stored and processed by whom, for what purposes and how long. In fact, many (cloud based) services can only be used if the user allows them broad data collection and analysis. Often, users can only decide to either give their data or not to participate in communities. The refusal to provide personal data results in significant drawbacks for social interaction. That is why we believe that there is a need for tools to control one's own data in an easy and effective way as protection against economic interest of global companies and their cloud computing systems (as data collector from apps, mobiles and services). Especially, as nowadays everybody is permanently online using different services and devices, users are often lacking the means to effectively control the access to their private data. Therefore, we present an approach to manage and distribute privacy settings: PRIVACY-AVARE is intended to enable users to centrally determine their data protection preferences and to apply them on different devices. Thus, users gain control over their data when using cloud based services. In this paper, we present the main idea of PRIVACY-AVARE.
引用
收藏
页码:589 / 595
页数:7
相关论文
共 17 条
[1]  
Alpers S, 2018, EXISTING SOFTWARE WW
[2]  
Alpers S, 2017, PROCEEDINGS OF 2017 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), P1460, DOI 10.1109/CompComm.2017.8322784
[3]  
[Anonymous], 2012, Financial cryptography and data security
[4]  
[Anonymous], 2017, LOCAL COURT BAD HERS
[5]  
Backes M, 2015, PROCEEDINGS OF THE 24TH USENIX SECURITY SYMPOSIUM, P691
[6]  
Bishop M., 2002, Computer Security: Art and Science
[7]  
Bodden E., 2013, DATENSCHUTZ DATENSIC, V37, P720
[8]  
Christl Wolfie., 2016, NETWORKS CONTROL REP
[9]  
Felt AP, 2011, PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11), P627
[10]  
Felt AdriennePorter., 2011, P 2 USENIX C WEB APP, P7