Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2307729.2307752acmotherconferencesArticle/Chapter ViewAbstractPublication Pagesdg-oConference Proceedingsconference-collections
research-article

Trusted third parties for secure and privacy-preserving data integration and sharing in the public sector

Published: 04 June 2012 Publication History

Abstract

For public organizations data integration and sharing are important in delivering better services. However, when sensitive data are integrated and shared, privacy protection and information security become key issues. This means that information systems must be secured and that access to sensitive data must be controlled. In this paper, a framework is presented to support data sharing between public organizations for collaboration purposes. The framework focuses on solutions towards optimal data sharing and integration while ensuring the security and privacy of individuals. Data sharing is based on the need-to-know principle, that is, data are only made available when they are required to perform core processes. To facilitate this, an approach is introduced in the form of a trusted third party that manages access control to personal information and thus helps to protect the privacy of individuals. It is argued that the proposed framework is suitable for data integration and sharing on various levels. An example of best practices of data sharing in the Netherlands shows how this framework facilitates data sharing to perform knowledge transfer and other higher-level tasks.

References

[1]
6, P., Bellamy, C., and Raab, C. 2004. Data sharing and confidentiality: spurs, barriers and theories. In: Political Studies Association Annual Conference.
[2]
Belanger, F., Hiller, S. J., and Smith, W. J. 2002. Trustworthiness in electronic commerce: the role of privacy, security, and site attributes. Journal of Strategic Information Systems, 11(3-4): 245--270. doi=10.1016/S0963-8687(02)00018-5.
[3]
Bellamy, C., 6, P., Raab, C., Warren, A., and Heeney, C. 2008. Information-sharing and confidentiality in social policy: regulating multi-agency working. Public Administration, 86(3): 737--759. doi=10.1111/j.1467-9299.2008.00723.x.
[4]
Bertino, E., and Sandhu, R. 2005. Database security concepts, approaches, and challenges. IEEE Transactions on Dependable and Secure Computing, 2(1): 2--19.
[5]
Choenni, S., and van Dijk, J. 2009. Towards privacy preserving data reconciliation for criminal justice chains. In Proceedings of the 10th International Conference on Digital Government Research: Social Networks: Making Connections between Citizens, Data and Government (d.go '09, pages 223--229.
[6]
Choenni, S., and Leertouwer, E. 2010. Public safety mashups to support policy makers. In K. Andersen, E. Francesconi, Å. Grönlund, and T. van Engers, editors, Electronic Government and the Information Systems Perspective vol 6267 of Lecture Notes in Computer Science, pages 234--248. Springer, Berlin. doi=10.1007/978-3-642-15172-9_22.
[7]
Elmasri, R., and Navathe, S. Fundamentals of Database Systems, 5th International Edition, 2007, Pearson/Addison-Wesley.
[8]
Joshi, J., Ghafoor, A., Aref., W. G., and Spafford, E. H. 2001. Digital government security infrastructure design challenges. Computer, 34(2): 66--72.
[9]
Kalidien, S., Choenni, S., and Meijer, R. 2010. Crime statistics online: potentials and challenges. In Proceedings of the 11th Annual International Digital Government Research Conference on Public Administration Online: Challenges and Opportunities (dg.o '10), pages 131--137.
[10]
Ouwehand, A. W., Wisselink, D. J., Kuijpers, W. G. T., van Delden, E. B., and Mol, A. 2011. Key Figures Addiction Care 2010: National Alcohol and Drugs Information System. Stichting IVZ, Houten, the Netherlands.
[11]
Rezgui, A., Wen, Z., and Bouguettaya, A. 2002. Enforcing privacy in interoperable e-government applications. In: Proceedings of the 2002 Annual National Conference on Digital Government Research (dg.o '02), pages 1--10.
[12]
Sauerwein, L. B., and Linnemann, J. J. 2001. Guidelines for Personal Data Processors: Personal Data Protection Act. Ministry of Justice, The Hague.
[13]
Svirskas, A., Isachenkova, J., and Molva, R. 2007. Towards secure and trusted collaboration environment for European public sector. In Proceedings of the 3rd International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2007), pages 49--56.
[14]
Temürhan, M., Meijer, R., Choenni, S., van Ooyen-Houben, M., Cruts, G., and van Laar, M. 2011. Capture-recapture method for estimating the number of problem drug users: the case of the Netherlands. In Proceedings of the 2011 European Intelligence and Security Informatics Conference (EISIC), pages 46--51. doi=10.1109/EISIC.2011.26.
[15]
van Veenstra, A. F., Janssen, M., and Klievink, B. 2009. Strategies for orchestrating and managing supply chains in public service networks. Electronic Journal of e-Government, 7(4): 425--432.
[16]
van Veenstra, A. F., and Ramilli, M. 2011. Exploring information security issues in public sector inter-organizational collaboration. In M. Janssen, H. J. Scholl, M. A. Wimmer, and Y.-H. Tan, editors, Proceedings of the 10th IFIP WG 8.5 international conference on Electronic government (EGOV'11), pages 355--366, Springer-Verlag, Berlin.
[17]
Zhang, J., Dawes, S. S., and Sarkis, J. 2005. Exploring stakeholders' expectations of the benefits and barriers of e-government knowledge sharing. Journal of Enterprise Information Management, 18(5), 548--567.

Cited By

View all
  • (2024)Secure and Privacy-Compliant Data Sharing: An Essential Framework for Healthcare OrganizationsProceedings of the Tenth International Conference on Mathematics and Computing10.1007/978-981-97-2066-8_2(15-26)Online publication date: 30-Jun-2024
  • (2022)Complementary set encryption for privacy-preserving data consolidationInformation Sciences: an International Journal10.1016/j.ins.2022.02.002593:C(271-288)Online publication date: 1-May-2022
  • (2021)Security Mechanisms of a Mobile Health Application for Promoting Physical Activity among Older AdultsSensors10.3390/s2121732321:21(7323)Online publication date: 3-Nov-2021
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
dg.o '12: Proceedings of the 13th Annual International Conference on Digital Government Research
June 2012
324 pages
ISBN:9781450314039
DOI:10.1145/2307729
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

  • Elsevier
  • iSchool: College of Information Studies, University of Maryland
  • iPAC: Information Policy and Access Center

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 04 June 2012

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. data integration
  2. data sharing
  3. public sector
  4. trusted third parties

Qualifiers

  • Research-article

Conference

dg.o '12
Sponsor:
  • iSchool
  • iPAC

Acceptance Rates

Overall Acceptance Rate 150 of 271 submissions, 55%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)35
  • Downloads (Last 6 weeks)3
Reflects downloads up to 13 Sep 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Secure and Privacy-Compliant Data Sharing: An Essential Framework for Healthcare OrganizationsProceedings of the Tenth International Conference on Mathematics and Computing10.1007/978-981-97-2066-8_2(15-26)Online publication date: 30-Jun-2024
  • (2022)Complementary set encryption for privacy-preserving data consolidationInformation Sciences: an International Journal10.1016/j.ins.2022.02.002593:C(271-288)Online publication date: 1-May-2022
  • (2021)Security Mechanisms of a Mobile Health Application for Promoting Physical Activity among Older AdultsSensors10.3390/s2121732321:21(7323)Online publication date: 3-Nov-2021
  • (2021)IaaS Signature Change Detection with Performance NoiseService-Oriented Computing10.1007/978-3-030-91431-8_32(516-530)Online publication date: 18-Nov-2021
  • (2021)Exploiting Big Data for Smart Government: Facing the ChallengesHandbook of Smart Cities10.1007/978-3-030-69698-6_82(1035-1057)Online publication date: 10-Jul-2021
  • (2021)Exploiting Big Data for Smart Government: Facing the ChallengesHandbook of Smart Cities10.1007/978-3-030-15145-4_82-1(1-23)Online publication date: 16-Jan-2021
  • (2020)Integrating Semi-Open Data in a Criminal Judicial SettingOpen Government10.4018/978-1-5225-9860-2.ch041(872-891)Online publication date: 2020
  • (2020)Event-based Detection of Changes in IaaS Performance Signatures2020 IEEE International Conference on Services Computing (SCC)10.1109/SCC49832.2020.00035(210-217)Online publication date: Nov-2020
  • (2020)Signature-based Selection of IaaS Cloud Services2020 IEEE International Conference on Web Services (ICWS)10.1109/ICWS49710.2020.00014(50-57)Online publication date: Oct-2020
  • (2019)Opening Privacy Sensitive Microdata Sets in Light of GDPRProceedings of the 20th Annual International Conference on Digital Government Research10.1145/3325112.3325222(314-323)Online publication date: 18-Jun-2019
  • Show More Cited By

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media