Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Unlinking Database Entries: Implementation Issues in Privacy Preserving Secure Logging
Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. (PriSec)
2010 (English)Conference paper, (Refereed)
Abstract [en]

This paper discusses implementation issues related to using relational databases as storage when implementing privacy preserving secure logs. In these types of logs it is important to keep the unlinkability properties of log entries intact when the entries are stored. We briefly describe the concept of privacy preserving secure logging and give the rational for it. The problems of using relational database systems as storage is discussed and we suggest three solutions to the problem. Two of the solutions are analyzed and compared and we show that at least one of the solutions is feasible in a real live setting and that the added overhead of the solution is very small.

Place, publisher, year, edition, pages
IEEE conference proceedings, 2010. 16-22 p.
Keyword [en]
privacy, privacy preserving secure logging, transparency, unlinkability, Ambient intelligence, Computer science, Data privacy, Identity management systems, Intelligent sensors, Relational databases, Secure storage, Social network services, Warranties, Web and internet services
National Category
Computer Science
Research subject
Computer Science
Identifiers
URN: urn:nbn:se:kau:diva-9987DOI: 10.1109/IWSCN.2010.5497998ISBN: 978-1-4244-6939-0 (online) 978-1-4244-6938-3 (print) (print)OAI: oai:DiVA.org:kau-9987DiVA: diva2:493501
Conference
Post Proceedings of 2nd International Workshop on Security and Communication Networks (to appear)
Projects
PrimeLife
Available from: 2012-02-08 Created: 2012-02-08 Last updated: 2012-12-17Bibliographically approved
In thesis
1. Privacy-Preserving Transparency-Enhancing Tools
Open this publication in new window or tab >>Privacy-Preserving Transparency-Enhancing Tools
2012 (English)Licentiate thesis, comprehensive summary (Other academic)
Abstract [en]

Transparency is a key principle in democratic societies. For example, the public sector is in part kept honest and fair with the help of transparency through different freedom of information (FOI) legislations. In the last decades, while FOI legislations have been adopted by more and more countries worldwide, we have entered the information age enabled by the rapid development of information technology. This has led to the need for technological solutions that enhance transparency, for example to ensure that FOI legislation can be adhered to in the digital world. These solutions are called transparency-enhancing tools (TETs), and consist of both technological and legal tools. TETs, and transparency in general, can be in conflict with the privacy principle of data minimisation.

The goal of transparency is to make information available, while the goal of data minimisation is to minimise the amount of available information. This thesis presents two privacy-preserving TETs: one cryptographic system forenabling transparency logging, and one cryptographic scheme for storing the data for the so called Data Track tool at a cloud provider. The goal of the transparency logging TET is to make data processing by data controllers transparent to the user whose data is being processed. Our work ensures that the process in which the data processing is logged does not leak sensitive information about the user, and thatthe user can anonymously read the information logged on their behalf. The goal of the Data Track is to make it transparent to users which data controllers they have disclosed data to under which conditions. Furthermore, the Data Track intends to empower users to exercise their rights, online and potentially anonymously, with regard to their disclosed data at the recipient data controllers. Our work ensures that the data kept by the Data Track can be stored at acloud storage provider, enabling easy synchronisation across multiple devices, while preserving the privacy of users by making their storage anonymous toward the provider and by enabling users to hold the provider accountable for the data it stores.

Place, publisher, year, edition, pages
Karlstad: Karlstads universitet, 2012. 22 p.
Series
Karlstad University Studies, ISSN 1403-8099 ; 2012:57
National Category
Computer Science
Research subject
Computer Science
Identifiers
urn:nbn:se:kau:diva-15685 (URN)978-91-7063-469-7 (ISBN)
Presentation
2013-01-08, 21A342, Karlstad Universitet, Karlstad, 09:15 (English)
Opponent
Supervisors
Available from: 2012-12-17 Created: 2012-11-20 Last updated: 2013-05-02Bibliographically approved

Open Access in DiVA

No full text

Other links

Publisher's full text

Search in DiVA

By author/editor
Hedbom, HansPulls, Tobias
By organisation
Department of Computer ScienceCentre for HumanIT
Computer Science

Search outside of DiVA

GoogleGoogle Scholar

Altmetric score

Total: 387 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf