A taxonomy for privacy enhancing technologies

被引:71
作者
Heurix, Johannes [1 ]
Zimmermann, Peter [1 ]
Neubauer, Thomas [2 ]
Fenz, Stefan [2 ]
机构
[1] Vienna Univ Technol, Inst Software Technol & Interact Syst, A-1040 Vienna, Austria
[2] SBA Res, A-1040 Vienna, Austria
关键词
Privacy; Taxonomy; Privacy-enhancing technologies; Survey; Classification; Categorization; INFORMATION SECURITY; MODEL;
D O I
10.1016/j.cose.2015.05.002
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Privacy-enhancing technologies (PETs) belong to a class of technical measures which aim at preserving the privacy of individuals or groups of individuals. Numerous PETs have been proposed for all kinds of purposes, but are difficult to be compared with each other. The challenge here lies in the fact that information privacy is a comprehensive concept with solutions being diverse, with different focus and aims. As existing taxonomies cover information security-related aspects, while neglecting privacy-specific properties, this work aims at filling this gap by describing a universal taxonomy of PETs where the taxonomy aspects are selected such that they allow the categorization of PETs in different dimensions and properties to cover a wide area of privacy (e.g., user privacy, data privacy). It provides the reader with a tool for the systematic comparison of different PETs. This helps in identifying limitations of existing PETs, complementary technologies, and potential research directions. To demonstrate its applicability, the proposed taxonomy is applied to a set of key technologies covering different disciplines such as data anonymization, privacy-preserving data querying, communication protection, and identity hiding. (C) 2015 Elsevier Ltd. All rights reserved.
引用
收藏
页码:1 / 17
页数:17
相关论文
共 73 条
[1]   A Review on the State-of-the-Art Privacy-Preserving Approaches in the e-Health Clouds [J].
Abbas, Assad ;
Khan, Samee U. .
IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS, 2014, 18 (04) :1431-1441
[2]   A new taxonomy of Web attacks suitable for efficient encoding [J].
Alvarez, G ;
Petrovic, S .
COMPUTERS & SECURITY, 2003, 22 (05) :435-449
[3]   On the limits of steganography [J].
Anderson, RJ ;
Petitcolas, FAP .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 1998, 16 (04) :474-481
[4]  
[Anonymous], 2004, P 13 C USENIX SEC S, DOI [DOI 10.5555/1251375.1251396, DOI 10.1186/1476-0711-3-21]
[5]  
[Anonymous], 2014, NEW YORK TIMES
[6]  
[Anonymous], ADV CRYPTOLOGY EUROC
[7]  
[Anonymous], 2013, Summary of the HIPAA Privacy Rule
[8]  
[Anonymous], 2007, OPENPGP MESSAGE FORM
[9]  
[Anonymous], 2007, FDN CRYPTOGRAPHY
[10]  
[Anonymous], 2002, P 9 ACM C COMPUTER C