Privacy Threats in E-Shopping

被引:1
作者
Diaz, Jesus [1 ]
Choi, Seung Geol [2 ]
Arroyo, David [1 ]
Keromytis, Angelos D. [3 ]
Rodriguez, Francisco B. [1 ]
Yung, Moti [3 ,4 ]
机构
[1] Univ Autonoma Madrid, Madrid, Spain
[2] US Naval Acad, Annapolis, MD 21402 USA
[3] Columbia Univ, New York, NY USA
[4] Google Inc, New York, NY USA
来源
DATA PRIVACY MANAGEMENT, AND SECURITY ASSURANCE | 2016年 / 9481卷
关键词
Privacy; Online shopping; Payment systems; Purchase systems;
D O I
10.1007/978-3-319-29883-2_14
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
E-shopping has grown considerably in the last years, providing customers with convenience, merchants with increased sales, and financial entities with an additional source of income. However, it may also be the source of serious threats to privacy. In this paper, we review the e-shopping process, discussing attacks or threats that have been analyzed in the literature for each of its stages. By showing that there exist threats to privacy in each of them, we argue our following position: "It is not enough to protect a single independent stage, as is usually done in privacy respectful proposals in this context. Rather, a complete solution is necessary spanning the overall process, dealing also with the required interconnections between stages." Our overview also reflects the diverse types of information that e-shopping manages, and the benefits (e.g., such as loyalty programs and fraud prevention) that system providers extract from them. This also endorses the need for solutions that, while privacy preserving, do not limit or remove these benefits, if we want prevent all the participating entities from rejecting it.
引用
收藏
页码:217 / 225
页数:9
相关论文
共 28 条
[1]  
Anderson R., 2012, WEIS 2012
[2]  
Anderson R., 2012, RISK PRIVACY IMPLICA
[3]  
Androulaki E, 2009, LECT NOTES COMPUT SC, V5695, P42, DOI 10.1007/978-3-642-03748-1_5
[4]  
Androulaki E, 2009, LECT NOTES COMPUT SC, V5672, P202, DOI 10.1007/978-3-642-03168-7_12
[5]   E-commerce: protecting purchaser privacy to enforce trust [J].
Antoniou, Giannakis ;
Batten, Lynn .
ELECTRONIC COMMERCE RESEARCH, 2011, 11 (04) :421-456
[6]  
Blaze M, 2002, LECT NOTES COMPUT SC, V2339, P21
[7]  
Chen LQ, 2007, LECT NOTES COMPUT SC, V4886, P29, DOI 10.1007/978-3-540-77366-5_4
[8]   Unique in the shopping mall: On the reidentifiability of credit card metadata [J].
de Montjoye, Yves-Alexandre ;
Radaelli, Laura ;
Singh, Vivek Kumar ;
Pentland, Alex Sandy .
SCIENCE, 2015, 347 (6221) :536-539
[9]  
Dingledine R., 2004, USENIX SEC S
[10]  
Eurostat, 2014, E COMM IND ENT