Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Inter-temporal Privacy Metrics
Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science. (PriSec)
2014 (English)Doctoral thesis, comprehensive summary (Other academic)
Abstract [en]

Informational privacy of individuals has significantly gained importance after information technology has become widely deployed. Data, once digitalised, can be copied, distributed, and long-term stored at negligible costs. This has dramatic consequences for individuals that leave traces in the form of personal data whenever they interact with information technology, for instance, computers and phones; or even when information technology is recording the personal data of aware or unaware individuals. The right of individuals for informational privacy, in particular to control the flow and use of their personal data, is easily undermined by those controlling the information technology.

The objective of this thesis is to study the measurement of informational privacy with a particular focus on scenarios where an individual discloses personal data to a second party which uses this data for re-identifying the individual within a set of other individuals. We contribute with privacy metrics for several instances of this scenario in the publications included in this thesis, most notably one which adds a time dimension to the scenario for modelling the effects of the time passed between data disclosure and usage. The result is a new framework for inter-temporal privacy metrics.

Place, publisher, year, edition, pages
Karlstad: Karlstad University Press, 2014. , p. 20
Series
Karlstad University Studies, ISSN 1403-8099 ; 2014:63
Keywords [en]
privacy, unlinkability, metrics, uncertainty, valuation process, domain-specific language, anonymous communication
National Category
Computer Systems Communication Systems Probability Theory and Statistics
Research subject
Computer Science
Identifiers
URN: urn:nbn:se:kau:diva-33972ISBN: 978-91-7063-603-5 (print)OAI: oai:DiVA.org:kau-33972DiVA, id: diva2:757291
Public defence
2014-12-16, Karlstad University, 21A342 (Eva Erikssonsalen), Universitetsgatan 2, 651 87 Karlstad, 08:15 (English)
Opponent
Supervisors
Available from: 2014-11-25 Created: 2014-10-03 Last updated: 2014-11-25Bibliographically approved
List of papers
1. Re-identification revisited
Open this publication in new window or tab >>Re-identification revisited
(English)Manuscript (preprint) (Other academic)
National Category
Computer Systems Communication Systems Probability Theory and Statistics
Research subject
Computer Science
Identifiers
urn:nbn:se:kau:diva-33970 (URN)
Available from: 2014-10-03 Created: 2014-10-03 Last updated: 2015-10-02Bibliographically approved
2. Linkability Estimation Between Subjects and Message Contents Using Formal Concepts
Open this publication in new window or tab >>Linkability Estimation Between Subjects and Message Contents Using Formal Concepts
2007 (English)In: Proceedings of the 2007 ACM Workshop on Digital identity management (DIM), New York: ACM , 2007, p. 36-45Conference paper, Published paper (Refereed)
Place, publisher, year, edition, pages
New York: ACM, 2007
National Category
Computer Sciences
Research subject
Computer Science
Identifiers
urn:nbn:se:kau:diva-7443 (URN)10.1145/1314403.1314410 (DOI)978-1-59593-889-3 (ISBN)
Available from: 2011-05-23 Created: 2011-05-23 Last updated: 2018-01-12Bibliographically approved
3. Data Retention and Anonymity Services: Introducing a New Class of Realistic Adversary Models
Open this publication in new window or tab >>Data Retention and Anonymity Services: Introducing a New Class of Realistic Adversary Models
2009 (English)In: The Future of Identity in the Information Society, Springer , 2009, p. 92-106Conference paper, Published paper (Refereed)
Place, publisher, year, edition, pages
Springer, 2009
Series
IFIP Advances in Information and Communication Technology, ISSN 1868-4238 ; vol 298
National Category
Computer Sciences
Research subject
Computer Science
Identifiers
urn:nbn:se:kau:diva-7452 (URN)10.1007/978-3-642-03315-5_7 (DOI)978-3-642-03314-8 (ISBN)
Conference
4th IFIP WG 9.2, 9.6/11.6, 11.7/FIDIS International Summer School
Available from: 2011-05-25 Created: 2011-05-25 Last updated: 2018-01-12Bibliographically approved
4. Hidden VoIP Calling Records from Networking Intermediaries
Open this publication in new window or tab >>Hidden VoIP Calling Records from Networking Intermediaries
2010 (English)Conference paper, Published paper (Refereed)
Abstract

While confidentiality of telephone conversation contents has recently received considerable attention in Internet telephony (VoIP), the protection of the caller--callee relation is largely unexplored. From the privacy research community we learn that this relation can be protected by Chaum's mixes. In early proposals of mix networks, however, it was reasonable to assume that high latency is acceptable. While the general idea has been deployed for low latency networks as well, important security measures had to be dropped for achieving performance. The result is protection against a considerably weaker adversary model in exchange for usability. In this paper, we show that it is unjustified to conclude that low latency network applications imply weak protection. On the contrary, we argue that current Internet telephony protocols provide a range of promising preconditions for adopting anonymity services with security properties similar to those of high latency anonymity networks. We expect that implementing anonymity services becomes a major challenge as customer privacy becomes one of the most important secondary goals in any (commercial) Internet application.

Place, publisher, year, edition, pages
Munich, Germany: ACM, 2010
Keywords
anonymity, voip, mix networks
National Category
Computer Sciences
Research subject
Computer Science
Identifiers
urn:nbn:se:kau:diva-11443 (URN)
Conference
Principles, System and Applications of IP Telecommunications (IPTCOMM2010)
Available from: 2012-02-08 Created: 2012-02-08 Last updated: 2018-01-12Bibliographically approved
5. Valuating Privacy with Option Pricing Theory
Open this publication in new window or tab >>Valuating Privacy with Option Pricing Theory
2010 (English)In: Economics of Information Security and Privacy / [ed] Tyler Moore, David Pym, and Christos Ioannidis, New York: Springer , 2010, p. 187-193Chapter in book (Refereed)
Abstract

One of the key challenges in the information society is responsible handling of personal data. An often-cited reason why people fail to make rational decisions regarding their own informational privacy is the high uncertainty about future consequences of information disclosures today. This chapter builds an analogy to financial options and draws on principles of option pricing to account for this uncertainty in the valuation of privacy. For this purpose, the development of a data subject's personal attributes over time and the development of the attribute distribution in the population are modelled as two stochastic processes, which fit into the Binomial Option Pricing Model (BOPM). Possible applications of such valuation methods to guide decision support in future privacy-enhancing technologies (PETs) are sketched

Place, publisher, year, edition, pages
New York: Springer, 2010
Keywords
privacy, metrics, option pricing theory
National Category
Computer Sciences
Research subject
Computer Science
Identifiers
urn:nbn:se:kau:diva-10132 (URN)9781441969668 (ISBN)
Available from: 2012-02-08 Created: 2012-02-08 Last updated: 2018-01-12Bibliographically approved
6. Towards a Formal Language for Privacy Options
Open this publication in new window or tab >>Towards a Formal Language for Privacy Options
2011 (English)In: Privacy and Identity Management for Life / [ed] Simone Fischer-Hübner, Penny Duquenoy, Marit Hansen, Ronald Leenes & Ge Zhang, Springer, 2011, p. 27-40Conference paper, Published paper (Refereed)
Place, publisher, year, edition, pages
Springer, 2011
Series
IFIP Advances in Information and Communication Technology ; 352
National Category
Computer Sciences
Research subject
Computer Science
Identifiers
urn:nbn:se:kau:diva-7454 (URN)10.1007/978-3-642-20769-3_3 (DOI)000300068100003 ()
Conference
6th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6/PrimeLife International Summer School, Helsingborg, Sweden, August 2-6, 2010
Available from: 2011-05-25 Created: 2011-05-25 Last updated: 2018-01-12Bibliographically approved
7. The Privacy Option Language: Specification & Implementation
Open this publication in new window or tab >>The Privacy Option Language: Specification & Implementation
2013 (English)Report (Other academic)
Abstract [en]

The data protection laws in Europe require that data controllers provide privacy policies to inform individuals about the prospective processing of their personal data. The ever growing expressiveness of privacy policy languages allows to specify policies in a growing number of details. This and new options for policy negotiations transformed rather general privacy policies into specific privacy contracts between the data controller and the individual.

In this report, we specify a privacy contract language and call it the Privacy Option Language. It is modelled after the analogy between financial option contracts and data disclosures which has been presented in previous work and led to the Privacy Option notion. The language specification provides privacy by design through its data minimisation provisions, i.e., all contracts are automatically reduced to their canonical form so that individual differences in the contract formulation are inherently normalised. The language specification is extensible in two ways. First, hooks are specified in the core language and can be used to connect sublanguages. The freedom to choose any suitable sublanguage allows to specify language details independent of the core language. Second, the Privacy Option Language itself can be used as a sublanguage within a more general-domain language. We give examples for both types of extensions. Additionally, we provide tools for evaluating semantics such as human-readable presentations of Privacy Options and contract management. The definitions of the semantics are kept simple and serve as templates for more practical ones.

All functionality can be checked by interactive tests in a standard multi-purpose programming language interpreter, since the Privacy Option Language is specified as an embedded domain-specific language within Haskell. Hands-on examples are provided along with the language specification.

Publisher
p. 70
Series
Karlstad University Studies, ISSN 1403-8099 ; 2013:29
Keywords
privacy policy language, inter-temporal privacy
National Category
Computer Sciences
Research subject
Computer Science
Identifiers
urn:nbn:se:kau:diva-27396 (URN)978-91-7063-507-6 (ISBN)
Projects
PETweb II
Available from: 2013-05-27 Created: 2013-05-27 Last updated: 2018-01-11Bibliographically approved

Open Access in DiVA

fulltext(1282 kB)423 downloads
File information
File name FULLTEXT01.pdfFile size 1282 kBChecksum SHA-512
7cca5f89b51cf483d0fbc41d5e10bd0350dbb7178bb7ddcdda9290c4fb09b7f60ab79c9d2d47f7683c3433e1867f7e0b5336ad97256d560cb4f82620aaa931c3
Type fulltextMimetype application/pdf

Search in DiVA

By author/editor
Berthold, Stefan
By organisation
Department of Mathematics and Computer Science
Computer SystemsCommunication SystemsProbability Theory and Statistics

Search outside of DiVA

GoogleGoogle Scholar
Total: 423 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

isbn
urn-nbn

Altmetric score

isbn
urn-nbn
Total: 507 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf