Privacy enhancing technologies for solving the privacy-personalization paradox: Taxonomy and survey

被引:75
作者
Kaaniche, Nesrine [1 ,2 ]
Laurent, Maryline [2 ,3 ]
Belguith, Sana [4 ]
机构
[1] Univ Sheffield, Dept Comp Sci, Sheffield, S Yorkshire, England
[2] Chair Values & Policies Personal Informat, Paris, France
[3] Inst Polytech Paris, Telecom SudParis, SAMOVAR, Paris, France
[4] Univ Salford, Sch Sci Engn & Environm, Manchester, Lancs, England
关键词
Privacy enhancing technologies; Recommendation services; Web-search engines; Pervasive applications; Location-based services; Profile-based services; Cryptographic trends; Secure communications; Anonymous certification; Private information retrieval; Secure multi-party computation; Homomorphic encryption; Trust models; FULLY HOMOMORPHIC ENCRYPTION; K-ANONYMITY; DIFFERENTIAL PRIVACY; PROTECTION; SECURITY; THREATS; KEY; SUPPRESSION; CHALLENGES; SIGNATURES;
D O I
10.1016/j.jnca.2020.102807
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Personal data are often collected and processed in a decentralized fashion, within different contexts. For instance, with the emergence of distributed applications, several providers are usually correlating their records, and providing personalized services to their clients. Collected data include geographical and indoor positions of users, their movement patterns as well as sensor-acquired data that may reveal users' physical conditions, habits and interests. Consequently, this may lead to undesired consequences such as unsolicited advertisement and even to discrimination and stalking. To mitigate privacy threats, several techniques emerged, referred to as Privacy Enhancing Technologies, PETs for short. On one hand, the increasing pressure on service providers to protect users' privacy resulted in PETs being adopted. One the other hand, service providers have built their business model on personalized services, e.g. targeted ads and news. The objective of the paper is then to identify which of the PETs have the potential to satisfy both usually divergent - economical and ethical - purposes. This paper identifies a taxonomy classifying eight categories of PETs into three groups, and for better clarity, it considers three categories of personalized services. After defining and presenting the main features of PETs with illustrative examples, the paper points out which PETs best fit each personalized service category. Then, it discusses some of the inter-disciplinary privacy challenges that may slow down the adoption of these techniques, namely: technical, social, legal and economic concerns. Finally, it provides recommendations and highlights several research directions.
引用
收藏
页数:32
相关论文
共 243 条
[51]  
Camenisch J., 2001, P INT C THEOR APPL C
[52]   (Un)linkable Pseudonyms for Governmental Databases [J].
Camenisch, Jan ;
Lehmann, Anja .
CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, :1467-1479
[53]   Privacy-Preserving User-Auditable Pseudonym Systems [J].
Camenisch, Jan ;
Lehmann, Anja .
2017 IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P), 2017, :269-284
[54]  
Canard S., 2012, P 5 INT C CRYPT AFR
[55]  
Canard S., 2010, P 2010 INT C TOP CRY
[56]  
Canard S., 2013, P 8 ACM SIGSAC S INF
[57]   Universally composable security: A new paradigm for cryptographic protocols [J].
Canetti, R .
42ND ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS, 2001, :136-145
[58]   Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data [J].
Cao, Ning ;
Wang, Cong ;
Li, Ming ;
Ren, Kui ;
Lou, Wenjing .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014, 25 (01) :222-233
[59]  
Cas J, 2011, COMPUTERS, PRIVACY AND DATA PROTECTION: AN ELEMENT OF CHOICE, P139, DOI 10.1007/978-94-007-0641-5_7
[60]  
Chase M., 2014, P 2014 IEEE 27 COMP