Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3155133.3155181acmotherconferencesArticle/Chapter ViewAbstractPublication PagessoictConference Proceedingsconference-collections
research-article

Entrusting a Responsibility of Personal Information Management to Users from a Service Provider

Published: 07 December 2017 Publication History

Abstract

Nowadays, various network services, such as online shops and reservation of facilities, have been used with the spread of the Internet. Some of these services request users to offer personal information. However, incidents such as information leakage are occurring frequently. Thus, the responsibility of personal information management is burden for service providers. On the other hand, users cannot know how service providers use their offered personal information. Thus, the users feel uneasy to offering personal information to the service providers. Therefore, we propose a framework that a user can designate the usage procedure of his/her personal information. A service provider can entrust the responsibility of personal information management to a user because the service provider does not determine usage procedures but the user determines. Additionally, since the user can know the usage procedure of his/her personal information, the user feels easy to offering personal information. In this paper, we discuss policies (a protection policy and a use policy) defined in this framework.

References

[1]
2007. W3C. "Platform for Privacy Preferences (P3P) Project". (2007). http://www.w3.org/P3P/.
[2]
G. R. Blakley. 1979. Safeguarding cryptographic keys. In Proceedings of the 1979 AFIPS National Computer Conference, Vol. 48. 313--317.
[3]
Tomohiro Hasegawa, Yuuichi Teranishi, Yoshihiro Umemoto, and Tetsuji Satoh. 1999. The Development of Privacy Policy Manager. Proc.59th National Convention of IPSJ (September 1999), 211--212.
[4]
JUMBO gyoumu 2017. JUMBO. "Customer Data Management Agent". (2017). https://www.jmb.co.jp/gyomu/Gyo/umu/CRM.html.
[5]
kokyakubank.com 2017. Customer BANK.com. "Customer Data Management". (2017). http://www.kokyakubank.com/index.html.
[6]
Takahide Matsunaga, Ryouta Yagi, Kenichi Takahashi, Takao Kawamura, and Kazunori Sugahara. 2017. Implementation of a Framework that Protects Personal Information by Program Conversion. ICECCT2017, Coimbatore, Tamil Nadu, India, 1299--1304.
[7]
Takeshi Miyamoto, Susumu Takeuchi, Kaname Harumoto, Yusuke Ariyoshi, and Shinji Shimojo. 2005. A Proposal for Profile Control Mechanism Considering Privacy and Quality of Personalization Service. DBSJ Journal 4, 1 (June 2005), 145--148.
[8]
Toru Nakamura, Shinsaku Kiyomoto, Ryu Watanabe, and Yutaka Miyake. 2013. The Development of Privacy Policy Manager. In FIT2013, Vol. 12. 225--226.
[9]
Adi Shamir. 1979. How to share a secret. In Communications of the ACM, Vol. 22. 612--613.
[10]
Kenichi Takahashi, Takanori Matsuzaki, Tsunenori Mine, Takao Kawamura, and Kazunori Sugahara. 2011. Protection of Personal Information based on User Preference. International Journal of New Computer Architectures and Their Applications 1 (2011), 13.
[11]
Syuhei Tamura, Akiko Iwaya, Kazu Takashio, and Hideyuki Tokuda. 2003. An Application Framework for Personalized Public Space Considering Privacy. Technical Report 2003-OS-093. IPSJSIG Technical Report.
[12]
Masayuki Yoshino, Hisayoshi Sato, and Ken Naganuma. 2012. Searchable encryption processing system. (June 2012).

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
SoICT '17: Proceedings of the 8th International Symposium on Information and Communication Technology
December 2017
486 pages
ISBN:9781450353281
DOI:10.1145/3155133
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

In-Cooperation

  • SOICT: School of Information and Communication Technology - HUST
  • NAFOSTED: The National Foundation for Science and Technology Development

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 07 December 2017

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. personal information
  2. privacy
  3. program conversion
  4. protection policy
  5. use policy

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

SoICT 2017

Acceptance Rates

Overall Acceptance Rate 147 of 318 submissions, 46%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 56
    Total Downloads
  • Downloads (Last 12 months)2
  • Downloads (Last 6 weeks)0
Reflects downloads up to 26 Sep 2024

Other Metrics

Citations

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media