Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1971690.1971694acmotherconferencesArticle/Chapter ViewAbstractPublication PagesmobicaseConference Proceedingsconference-collections
research-article

Capturing P3P semantics using an enforceable lattice-based structure

Published: 25 March 2011 Publication History

Abstract

With the increasing amount of data collected by service providers, privacy concerns increase for data owners who must provide private data to receive services. Legislative acts require service providers to protect the privacy of customers. Privacy policy frameworks, such as P3P, assist the service providers by describing their privacy policies to customers (e.g. publishing privacy policy on websites). Unfortunately, providing the policies alone does not guarantee that they are actually enforced. Furthermore, a privacy-preserving model should consider the privacy preferences of both the data provider and collector. This paper discusses the challenges in development of capturing privacy predicates in a lattice structures. A use case study is presented to show the applicability of the lattice approach to a specific domain. We also present a comprehensive study on applying a lattice-based approach to P3P. We show capturing privacy elements of P3P in a lattice format facilitates managing and enforcing policies presented in P3P and accommodates the customization of privacy practices and preferences of data and service providers. We also propose that the outcome of this approach can be used on lattice-based privacy aware access control models [8].

References

[1]
R. Agrawal, P. Bird, T. Grandison, J. Kiernan, S. Logan, and W. Rjaibi. "Extending relational database systems to automatically enforce privacy policies." In ICDE '05: Proceedings of the 21st International Conference on Data Engineering, pp. 1013--1022, Washington, DC, USA, 2005.
[2]
R. Agrawal, J. Kiernan, R. Srikant, and Y. Xu. "Hippocratic databases." In VLDB '02: Proceedings of the 28th International Conference on Very Large Databases, volume 28, pp. 143--154, Hong Kong, China, 2002.
[3]
P. Ashley, S. Hada, G. Karjoth & M. Schunter, "E-P3P privacy policies and privacy authorization." Proceedings of the 2002 ACM workshop on Privacy in the Electronic Society, pp.103--109, November 21--21, 2002, Washington.
[4]
K. Barker, M. Askari, M. Banerjee, K. Ghazinour, B. Mackas, M. Majedi, S. Pun, and A. Williams. "A data privacy taxonomy." In BNCOD: Proceedings of the 26th British National Conference on Databases, pp. 42--54, Berlin, Heidelberg, July 2009. Springer-Verlag.
[5]
J.-W. Byun and N. Li. "Purpose based access control for privacy protection in relational database systems." The VLDB Journal, the International Journal on Very Large Data Bases, pp. 603--619, September 2006.
[6]
L. Cranor. "The Platform for Privacy Preferences 1.1 (P3P1.1) Specification". 2006. Available at: http://www.w3.org/TR/P3P11/#RECPNT.
[7]
B. A. Davey, and H. A. Priestley, "Introduction to lattices and order." Cambridge University press, pp. 33--35, 2002.
[8]
K. Ghazinour, M. Majedi, K. Barker. "A Lattice-based Privacy Aware Access Control Model", in Proceeding of the IEEE International Conference on Privacy, Security, Risk and Trust, Canada, 2009. pp. 135--141.

Cited By

View all
  • (2021)Lattice-based Contextual Integrity Analysis of Social Network Privacy Policies2021 IEEE 29th International Requirements Engineering Conference Workshops (REW)10.1109/REW53955.2021.00070(394-399)Online publication date: Sep-2021
  • (2020)A Privacy Protection Layer for Wearable DevicesFoundations and Practice of Security10.1007/978-3-030-45371-8_24(363-370)Online publication date: 17-Apr-2020
  • (2018)Understanding privacy policiesEmpirical Software Engineering10.1007/s10664-012-9204-118:2(310-374)Online publication date: 26-Dec-2018
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
PAIS '11: Proceedings of the 4th International Workshop on Privacy and Anonymity in the Information Society
March 2011
62 pages
ISBN:9781450306119
DOI:10.1145/1971690
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 25 March 2011

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. P3P
  2. lattice
  3. privacy model
  4. privacy policy
  5. privacy protection

Qualifiers

  • Research-article

Conference

EDBT/ICDT '11

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)1
  • Downloads (Last 6 weeks)0
Reflects downloads up to 01 Sep 2024

Other Metrics

Citations

Cited By

View all
  • (2021)Lattice-based Contextual Integrity Analysis of Social Network Privacy Policies2021 IEEE 29th International Requirements Engineering Conference Workshops (REW)10.1109/REW53955.2021.00070(394-399)Online publication date: Sep-2021
  • (2020)A Privacy Protection Layer for Wearable DevicesFoundations and Practice of Security10.1007/978-3-030-45371-8_24(363-370)Online publication date: 17-Apr-2020
  • (2018)Understanding privacy policiesEmpirical Software Engineering10.1007/s10664-012-9204-118:2(310-374)Online publication date: 26-Dec-2018
  • (2015)Toy Computing BackgroundMobile Services for Toy Computing10.1007/978-3-319-21323-1_2(9-38)Online publication date: 25-Aug-2015
  • (2014)Accountability for Abstract Component DesignProceedings of the 2014 40th EUROMICRO Conference on Software Engineering and Advanced Applications10.1109/SEAA.2014.68(213-220)Online publication date: 27-Aug-2014
  • (2014)A Model for Privacy Compromisation ValueProcedia Computer Science10.1016/j.procs.2014.08.02337(143-152)Online publication date: 2014
  • (2013)A privacy preserving model bridging data provider and collector preferencesProceedings of the Joint EDBT/ICDT 2013 Workshops10.1145/2457317.2457346(174-178)Online publication date: 18-Mar-2013
  • (2013)Monitoring and recommending privacy settings in social networksProceedings of the Joint EDBT/ICDT 2013 Workshops10.1145/2457317.2457344(164-168)Online publication date: 18-Mar-2013
  • (2011)Quantifying privacy violationsProceedings of the 8th VLDB international conference on Secure data management10.5555/2036996.2036998(1-17)Online publication date: 2-Sep-2011

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media