Exploring privacy-enhancing technologies in the automotive value chain
Privacy-enhancing technologies (PETs) are becoming increasingly crucial for addressing customer needs, security, privacy (e.g., enhancing anonymity and confidentiality), and regulatory requirements. However, applying PETs in organizations requires a precise understanding of use cases, technologies,...
Gespeichert in:
Veröffentlicht in: | arXiv.org 2022-09 |
---|---|
Hauptverfasser: | , , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | arXiv.org |
container_volume | |
creator | Gonzalo Munilla Garrido Schmidt, Kaja Harth-Kitzerow, Christopher Klepsch, Johannes Luckow, Andre Matthes, Florian |
description | Privacy-enhancing technologies (PETs) are becoming increasingly crucial for addressing customer needs, security, privacy (e.g., enhancing anonymity and confidentiality), and regulatory requirements. However, applying PETs in organizations requires a precise understanding of use cases, technologies, and limitations. This paper investigates several industrial use cases, their characteristics, and the potential applicability of PETs to these. We conduct expert interviews to identify and classify uses cases, a gray literature review of relevant open-source PET tools, and discuss how the use case characteristics can be addressed using PETs' capabilities. While we focus mainly on automotive use cases, the results also apply to other use case domains. |
doi_str_mv | 10.48550/arxiv.2209.05085 |
format | Article |
fullrecord | <record><control><sourceid>proquest_arxiv</sourceid><recordid>TN_cdi_arxiv_primary_2209_05085</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2713854182</sourcerecordid><originalsourceid>FETCH-LOGICAL-a522-579098eb0b4fc2e814a541fb02347b97027954936d573316b864b8212cf006a3</originalsourceid><addsrcrecordid>eNotj8tqwzAQRUWh0JDmA7qqoWu7o5FkycsSkjYQ6KLdG8mVYwVHSuUHyd_XSbq6cLnMnEPIE4WMKyHgVceTGzNEKDIQoMQdmSFjNFUc8YEsum4PAJhLFILNyHp1OrYhOr9LjtGNujqn1jfaV5emt1XjQxt2znaJ80nf2EQPfTiE3o02GXU72KRqtPOP5L7WbWcX_zknX-vV9_Ij3X6-b5Zv21QLxFTIAgplDRheV2gV5VpwWhtAxqUpJKAsBC9Y_iPkhJwblXOjkGJVA-Sazcnz7erVsZyADzqey4treXWdFi-3xTGG38F2fbkPQ_QTUomSMjW9U8j-AA-1Ve0</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2713854182</pqid></control><display><type>article</type><title>Exploring privacy-enhancing technologies in the automotive value chain</title><source>arXiv.org</source><source>Open Access Journals</source><creator>Gonzalo Munilla Garrido ; Schmidt, Kaja ; Harth-Kitzerow, Christopher ; Klepsch, Johannes ; Luckow, Andre ; Matthes, Florian</creator><creatorcontrib>Gonzalo Munilla Garrido ; Schmidt, Kaja ; Harth-Kitzerow, Christopher ; Klepsch, Johannes ; Luckow, Andre ; Matthes, Florian</creatorcontrib><description>Privacy-enhancing technologies (PETs) are becoming increasingly crucial for addressing customer needs, security, privacy (e.g., enhancing anonymity and confidentiality), and regulatory requirements. However, applying PETs in organizations requires a precise understanding of use cases, technologies, and limitations. This paper investigates several industrial use cases, their characteristics, and the potential applicability of PETs to these. We conduct expert interviews to identify and classify uses cases, a gray literature review of relevant open-source PET tools, and discuss how the use case characteristics can be addressed using PETs' capabilities. While we focus mainly on automotive use cases, the results also apply to other use case domains.</description><identifier>EISSN: 2331-8422</identifier><identifier>DOI: 10.48550/arxiv.2209.05085</identifier><language>eng</language><publisher>Ithaca: Cornell University Library, arXiv.org</publisher><subject>Computer Science - Cryptography and Security ; Industrial applications ; Literature reviews ; Privacy</subject><ispartof>arXiv.org, 2022-09</ispartof><rights>2022. This work is published under http://arxiv.org/licenses/nonexclusive-distrib/1.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><rights>http://arxiv.org/licenses/nonexclusive-distrib/1.0</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>228,230,777,781,882,27906</link.rule.ids><backlink>$$Uhttps://doi.org/10.48550/arXiv.2209.05085$$DView paper in arXiv$$Hfree_for_read</backlink><backlink>$$Uhttps://doi.org/10.1109/BigData52589.2021.9671528$$DView published paper (Access to full text may be restricted)$$Hfree_for_read</backlink></links><search><creatorcontrib>Gonzalo Munilla Garrido</creatorcontrib><creatorcontrib>Schmidt, Kaja</creatorcontrib><creatorcontrib>Harth-Kitzerow, Christopher</creatorcontrib><creatorcontrib>Klepsch, Johannes</creatorcontrib><creatorcontrib>Luckow, Andre</creatorcontrib><creatorcontrib>Matthes, Florian</creatorcontrib><title>Exploring privacy-enhancing technologies in the automotive value chain</title><title>arXiv.org</title><description>Privacy-enhancing technologies (PETs) are becoming increasingly crucial for addressing customer needs, security, privacy (e.g., enhancing anonymity and confidentiality), and regulatory requirements. However, applying PETs in organizations requires a precise understanding of use cases, technologies, and limitations. This paper investigates several industrial use cases, their characteristics, and the potential applicability of PETs to these. We conduct expert interviews to identify and classify uses cases, a gray literature review of relevant open-source PET tools, and discuss how the use case characteristics can be addressed using PETs' capabilities. While we focus mainly on automotive use cases, the results also apply to other use case domains.</description><subject>Computer Science - Cryptography and Security</subject><subject>Industrial applications</subject><subject>Literature reviews</subject><subject>Privacy</subject><issn>2331-8422</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2022</creationdate><recordtype>article</recordtype><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GOX</sourceid><recordid>eNotj8tqwzAQRUWh0JDmA7qqoWu7o5FkycsSkjYQ6KLdG8mVYwVHSuUHyd_XSbq6cLnMnEPIE4WMKyHgVceTGzNEKDIQoMQdmSFjNFUc8YEsum4PAJhLFILNyHp1OrYhOr9LjtGNujqn1jfaV5emt1XjQxt2znaJ80nf2EQPfTiE3o02GXU72KRqtPOP5L7WbWcX_zknX-vV9_Ij3X6-b5Zv21QLxFTIAgplDRheV2gV5VpwWhtAxqUpJKAsBC9Y_iPkhJwblXOjkGJVA-Sazcnz7erVsZyADzqey4treXWdFi-3xTGG38F2fbkPQ_QTUomSMjW9U8j-AA-1Ve0</recordid><startdate>20220912</startdate><enddate>20220912</enddate><creator>Gonzalo Munilla Garrido</creator><creator>Schmidt, Kaja</creator><creator>Harth-Kitzerow, Christopher</creator><creator>Klepsch, Johannes</creator><creator>Luckow, Andre</creator><creator>Matthes, Florian</creator><general>Cornell University Library, arXiv.org</general><scope>8FE</scope><scope>8FG</scope><scope>ABJCF</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>HCIFZ</scope><scope>L6V</scope><scope>M7S</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>PTHSS</scope><scope>AKY</scope><scope>GOX</scope></search><sort><creationdate>20220912</creationdate><title>Exploring privacy-enhancing technologies in the automotive value chain</title><author>Gonzalo Munilla Garrido ; Schmidt, Kaja ; Harth-Kitzerow, Christopher ; Klepsch, Johannes ; Luckow, Andre ; Matthes, Florian</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-a522-579098eb0b4fc2e814a541fb02347b97027954936d573316b864b8212cf006a3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2022</creationdate><topic>Computer Science - Cryptography and Security</topic><topic>Industrial applications</topic><topic>Literature reviews</topic><topic>Privacy</topic><toplevel>online_resources</toplevel><creatorcontrib>Gonzalo Munilla Garrido</creatorcontrib><creatorcontrib>Schmidt, Kaja</creatorcontrib><creatorcontrib>Harth-Kitzerow, Christopher</creatorcontrib><creatorcontrib>Klepsch, Johannes</creatorcontrib><creatorcontrib>Luckow, Andre</creatorcontrib><creatorcontrib>Matthes, Florian</creatorcontrib><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>Materials Science & Engineering Collection</collection><collection>ProQuest Central (Alumni)</collection><collection>ProQuest Central</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central</collection><collection>SciTech Premium Collection (Proquest) (PQ_SDU_P3)</collection><collection>ProQuest Engineering Collection</collection><collection>Engineering Database</collection><collection>Publicly Available Content Database (Proquest) (PQ_SDU_P3)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>Engineering collection</collection><collection>arXiv Computer Science</collection><collection>arXiv.org</collection><jtitle>arXiv.org</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Gonzalo Munilla Garrido</au><au>Schmidt, Kaja</au><au>Harth-Kitzerow, Christopher</au><au>Klepsch, Johannes</au><au>Luckow, Andre</au><au>Matthes, Florian</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Exploring privacy-enhancing technologies in the automotive value chain</atitle><jtitle>arXiv.org</jtitle><date>2022-09-12</date><risdate>2022</risdate><eissn>2331-8422</eissn><abstract>Privacy-enhancing technologies (PETs) are becoming increasingly crucial for addressing customer needs, security, privacy (e.g., enhancing anonymity and confidentiality), and regulatory requirements. However, applying PETs in organizations requires a precise understanding of use cases, technologies, and limitations. This paper investigates several industrial use cases, their characteristics, and the potential applicability of PETs to these. We conduct expert interviews to identify and classify uses cases, a gray literature review of relevant open-source PET tools, and discuss how the use case characteristics can be addressed using PETs' capabilities. While we focus mainly on automotive use cases, the results also apply to other use case domains.</abstract><cop>Ithaca</cop><pub>Cornell University Library, arXiv.org</pub><doi>10.48550/arxiv.2209.05085</doi><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | EISSN: 2331-8422 |
ispartof | arXiv.org, 2022-09 |
issn | 2331-8422 |
language | eng |
recordid | cdi_arxiv_primary_2209_05085 |
source | arXiv.org; Open Access Journals |
subjects | Computer Science - Cryptography and Security Industrial applications Literature reviews Privacy |
title | Exploring privacy-enhancing technologies in the automotive value chain |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-17T14%3A25%3A05IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_arxiv&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Exploring%20privacy-enhancing%20technologies%20in%20the%20automotive%20value%20chain&rft.jtitle=arXiv.org&rft.au=Gonzalo%20Munilla%20Garrido&rft.date=2022-09-12&rft.eissn=2331-8422&rft_id=info:doi/10.48550/arxiv.2209.05085&rft_dat=%3Cproquest_arxiv%3E2713854182%3C/proquest_arxiv%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2713854182&rft_id=info:pmid/&rfr_iscdi=true |