Skip to main content

2018 | OriginalPaper | Buchkapitel

29. A Layered Model for Understanding and Enforcing Data Privacy

verfasst von : Aftab Ahmad, Ravi Mukkamala

Erschienen in: Information Technology - New Generations

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In this paper, we propose a layered model for the understanding and enforcing of information privacy. The proposed model consists of three levels. At the lowest level, called the Read/Write Layer, privacy is defined as the resistance and resilience to Read or Write violations in the information or information source. At the middle level, the sharing layer, a logical privacy connection can be set up between a source and sink based on an embedded privacy agreement (EPA). At the highest layer, the trust layer, privacy is determined based on the history of sharing between directly connected network entities. We describe how the privacy metrics differ at each layer and how they can be combined to have a three-layer information privacy model. This model can be used to assess privacy in a single-hop network and to design a privacy system for sharing data.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
2.
Zurück zum Zitat Sweeney, L. (2002). Achieving k-anonymity privacy protection using generalization and suppression. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 10(05), 571–588.MathSciNetCrossRefMATH Sweeney, L. (2002). Achieving k-anonymity privacy protection using generalization and suppression. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 10(05), 571–588.MathSciNetCrossRefMATH
3.
Zurück zum Zitat Machanavajjhala, A., Kifer, D., Gehrke, J., & Venkitasubramaniam, M. (2007). l-diversity: Privacy beyond k-anonymity. ACM Transactions on Knowledge Discovery from Data (TKDD), 1(1), 3.CrossRef Machanavajjhala, A., Kifer, D., Gehrke, J., & Venkitasubramaniam, M. (2007). l-diversity: Privacy beyond k-anonymity. ACM Transactions on Knowledge Discovery from Data (TKDD), 1(1), 3.CrossRef
4.
Zurück zum Zitat Li, N., Li, T. and Venkatasubramanian, S. (2007, April). t-closeness: Privacy beyond k-anonymity and l-diversity. In 2007 I.E. 23rd International Conference on Data Engineering (pp. 106–115). IEEE. Istanbul. Li, N., Li, T. and Venkatasubramanian, S. (2007, April). t-closeness: Privacy beyond k-anonymity and l-diversity. In 2007 I.E. 23rd International Conference on Data Engineering (pp. 106–115). IEEE. Istanbul.
5.
Zurück zum Zitat Xiao, X. and Tao, Y. (2006, September). Anatomy: Simple and effective privacy preservation. In Proceedings of the 32nd international conference on Very Large Data Bases (pp. 139–150). VLDB Endowment. Seoul. Xiao, X. and Tao, Y. (2006, September). Anatomy: Simple and effective privacy preservation. In Proceedings of the 32nd international conference on Very Large Data Bases (pp. 139–150). VLDB Endowment. Seoul.
6.
Zurück zum Zitat Xiao, X. and Tao, Y. (2007, June). M-invariance: towards privacy preserving re-publication of dynamic datasets. In Proceedings of the 2007 ACM SIGMOD international conference on Management of Data (pp. 689–700). ACM. Beijing. Xiao, X. and Tao, Y. (2007, June). M-invariance: towards privacy preserving re-publication of dynamic datasets. In Proceedings of the 2007 ACM SIGMOD international conference on Management of Data (pp. 689–700). ACM. Beijing.
7.
Zurück zum Zitat Rajagopalan, S. R., Sankar, L., Mohajer, S., and Poor, H. V. (2011, October). Smart meter privacy: A utility-privacy framework. In Smart Grid Communications (SmartGridComm), 2011 I.E. International Conference on (pp. 190–195). IEEE. Brussel. Rajagopalan, S. R., Sankar, L., Mohajer, S., and Poor, H. V. (2011, October). Smart meter privacy: A utility-privacy framework. In Smart Grid Communications (SmartGridComm), 2011 I.E. International Conference on (pp. 190–195). IEEE. Brussel.
8.
Zurück zum Zitat Makhdoumi, A., Salamatian, S., Fawaz, N., and Médard, M. (2014, November). From the information bottleneck to the privacy funnel. In Information Theory Workshop (ITW), 2014 IEEE (pp. 501–505). IEEE. Hobart. Makhdoumi, A., Salamatian, S., Fawaz, N., and Médard, M. (2014, November). From the information bottleneck to the privacy funnel. In Information Theory Workshop (ITW), 2014 IEEE (pp. 501–505). IEEE. Hobart.
9.
Zurück zum Zitat Bezzi, M. (2010). An information theoretic approach for privacy metrics. Transactions on Data Privacy, 3(3), 199–215.MathSciNet Bezzi, M. (2010). An information theoretic approach for privacy metrics. Transactions on Data Privacy, 3(3), 199–215.MathSciNet
10.
Zurück zum Zitat Blanchard, J., Guillet, F., Gras, R., and Briand, H. (2005, November). Using information-theoretic measures to assess association rule interestingness. In Fifth IEEE international conference on Data Mining (ICDM’05) (pp. 8–pp). IEEE. Blanchard, J., Guillet, F., Gras, R., and Briand, H. (2005, November). Using information-theoretic measures to assess association rule interestingness. In Fifth IEEE international conference on Data Mining (ICDM’05) (pp. 8–pp). IEEE.
12.
Zurück zum Zitat Fromholz, J. M. (2000). The European Union data privacy directive. Berkeley Technology Law Journal, 15, 461–484. Fromholz, J. M. (2000). The European Union data privacy directive. Berkeley Technology Law Journal, 15, 461–484.
13.
Zurück zum Zitat O’Herrin, J. K., Fost, N., & Kudsk, K. A. (2004). Health Insurance Portability Accountability Act (HIPAA) regulations: Effect on medical record research. Annals of Surgery, 239(6), 772–778.CrossRef O’Herrin, J. K., Fost, N., & Kudsk, K. A. (2004). Health Insurance Portability Accountability Act (HIPAA) regulations: Effect on medical record research. Annals of Surgery, 239(6), 772–778.CrossRef
14.
Zurück zum Zitat Cuaresma, J. C. (2002). The Gramm-Leach-Bliley Act. Berkeley Technology Law Journal, 17, 497–517. Boca Raton. Cuaresma, J. C. (2002). The Gramm-Leach-Bliley Act. Berkeley Technology Law Journal, 17, 497–517. Boca Raton.
15.
Zurück zum Zitat Inan, A., Kantarcioglu, M., Ghinita, G., and Bertino, E. (2010, March). Private record matching using differential privacy. International conference on Extending Database Technology (pp. 123–134). ACM. Lausanne. Inan, A., Kantarcioglu, M., Ghinita, G., and Bertino, E. (2010, March). Private record matching using differential privacy. International conference on Extending Database Technology (pp. 123–134). ACM. Lausanne.
16.
Zurück zum Zitat He, X., Machanavajjhala, A., and Ding, B. (2014, June). Blowfish privacy: Tuning privacy-utility trade-offs using policies. In Proceedings of the 2014 ACM SIGMOD international conference on Management of Data (pp. 1447–1458). ACM. Snowbird. He, X., Machanavajjhala, A., and Ding, B. (2014, June). Blowfish privacy: Tuning privacy-utility trade-offs using policies. In Proceedings of the 2014 ACM SIGMOD international conference on Management of Data (pp. 1447–1458). ACM. Snowbird.
17.
Zurück zum Zitat Kessler, S., Buchmann, E., and Böhm, K. (2015). Deploying and evaluating pufferfish privacy for smart meter data. Karlsruhe Reports in Informatics, 1, 229–238. Kessler, S., Buchmann, E., and Böhm, K. (2015). Deploying and evaluating pufferfish privacy for smart meter data. Karlsruhe Reports in Informatics, 1, 229–238.
18.
Zurück zum Zitat Kifer, D., & Machanavajjhala, A. (2014). Pufferfish: A framework for mathematical privacy definitions. ACM Transactions on Database Systems (TODS), 39(1), 3.MathSciNetCrossRefMATH Kifer, D., & Machanavajjhala, A. (2014). Pufferfish: A framework for mathematical privacy definitions. ACM Transactions on Database Systems (TODS), 39(1), 3.MathSciNetCrossRefMATH
19.
Zurück zum Zitat Mukkamala, R., Ahmad, A. and Nvuluri, K. (2016). Privacy-aware big data warehouse architecture. IEEE International Congress on Big Data, San Francisco, June 2016. Mukkamala, R., Ahmad, A. and Nvuluri, K. (2016). Privacy-aware big data warehouse architecture. IEEE International Congress on Big Data, San Francisco, June 2016.
20.
Zurück zum Zitat Rutten, W., Rutten, W., Blaas-Franken, J., Blaas-Franken, J., Martin, H., & Martin, H. (2016). The impact of (low) trust on knowledge sharing. Journal of Knowledge Management, 20(2), 199–214.CrossRef Rutten, W., Rutten, W., Blaas-Franken, J., Blaas-Franken, J., Martin, H., & Martin, H. (2016). The impact of (low) trust on knowledge sharing. Journal of Knowledge Management, 20(2), 199–214.CrossRef
21.
Zurück zum Zitat Papadopoulos, S., Bontcheva, K., Jaho, E., Lupu, M., & Castillo, C. (2016). Overview of the special issue on trust and veracity of information in social media. ACM Transactions on Information Systems (TOIS), 34(3), 14.CrossRef Papadopoulos, S., Bontcheva, K., Jaho, E., Lupu, M., & Castillo, C. (2016). Overview of the special issue on trust and veracity of information in social media. ACM Transactions on Information Systems (TOIS), 34(3), 14.CrossRef
Metadaten
Titel
A Layered Model for Understanding and Enforcing Data Privacy
verfasst von
Aftab Ahmad
Ravi Mukkamala
Copyright-Jahr
2018
DOI
https://doi.org/10.1007/978-3-319-54978-1_29