Privacy Preservation Approach in Service Ecosystems

被引:2
作者
Shen, Yiyun [1 ]
Miettinen, Markus [2 ]
Moen, Pirjo [1 ]
Kutvonen, Lea [1 ]
机构
[1] Univ Helsinki, Dept Comp Sci, Helsinki, Finland
[2] Nokia Res Ctr Lausanne, Lausanne, Switzerland
来源
2011 15TH IEEE INTERNATIONAL ENTERPRISE DISTRIBUTED OBJECT COMPUTING CONFERENCE WORKSHOPS (EDOC 2011) | 2011年
关键词
privacy; service ecosystem; architecture; MIDDLEWARE;
D O I
10.1109/EDOCW.2011.59
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Emergence of business networking and social networking increases the exchange of sensitive information and creation of behaviour traces in the network. However, the current computing and communication solutions do not provide sufficient conceptual, architectural or technical facilities to preserve privacy while collaborating in the network. This paper enhances definition on privacy-related concepts to become sufficient for open service ecosystems, and finally introduces a privacy-preservation architecture with emphasis on usability, sustain-ability against threats, and reasonable cost of establishment and utilisation. As this architecture introduces new categories of tools for privacy preservation, it is significant also as a roadmap or maturity model.
引用
收藏
页码:283 / 292
页数:10
相关论文
共 35 条
  • [1] Privacy and rationality in individual decision making
    Acquisti, A
    Grossklags, J
    [J]. IEEE SECURITY & PRIVACY, 2005, 3 (01) : 26 - 33
  • [2] Anderson Anne., 2005, COMP 2 PRIVACY POLIC
  • [3] [Anonymous], 2006, ACM T KNOWL DISCOV D
  • [4] [Anonymous], 1890, Harvard Law Review, DOI DOI 10.2307/1321160
  • [5] Analyzing website privacy requirements using a privacy goal taxonomy
    Antón, AI
    Earp, JB
    Reese, A
    [J]. IEEE JOINT INTERNATIONAL CONFERENCE ON REQUIREMENTS ENGINEERING, PROCEEDINGS, 2002, : 23 - 31
  • [6] Barth A., 2005, Proceedings of the 2005 workshop on Issues in the theory of security, P58
  • [7] Privacy and utility in business processes
    Barth, Adam
    Datta, Anupam
    Mitchell, John C.
    Sundaram, Sharada
    [J]. 20TH IEEE COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSFS20), PROCEEDINGS, 2007, : 279 - +
  • [8] Becker A., 2008, P 8 ACM WORKSH DIG R, P77
  • [9] Mix zones: User privacy in location-aware services
    Beresford, AR
    Stajano, F
    [J]. SECOND IEEE ANNUAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS, PROCEEDINGS, 2004, : 127 - 131
  • [10] UNTRACEABLE ELECTRONIC MAIL, RETURN ADDRESSES, AND DIGITAL PSEUDONYMS
    CHAUM, DL
    [J]. COMMUNICATIONS OF THE ACM, 1981, 24 (02) : 84 - 88