Exploring privacy-enhancing technologies in the automotive value chain

Privacy-enhancing technologies (PETs) are becoming increasingly crucial for addressing customer needs, security, privacy (e.g., enhancing anonymity and confidentiality), and regulatory requirements. However, applying PETs in organizations requires a precise understanding of use cases, technologies,...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:arXiv.org 2022-09
Hauptverfasser: Gonzalo Munilla Garrido, Schmidt, Kaja, Harth-Kitzerow, Christopher, Klepsch, Johannes, Luckow, Andre, Matthes, Florian
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title arXiv.org
container_volume
creator Gonzalo Munilla Garrido
Schmidt, Kaja
Harth-Kitzerow, Christopher
Klepsch, Johannes
Luckow, Andre
Matthes, Florian
description Privacy-enhancing technologies (PETs) are becoming increasingly crucial for addressing customer needs, security, privacy (e.g., enhancing anonymity and confidentiality), and regulatory requirements. However, applying PETs in organizations requires a precise understanding of use cases, technologies, and limitations. This paper investigates several industrial use cases, their characteristics, and the potential applicability of PETs to these. We conduct expert interviews to identify and classify uses cases, a gray literature review of relevant open-source PET tools, and discuss how the use case characteristics can be addressed using PETs' capabilities. While we focus mainly on automotive use cases, the results also apply to other use case domains.
doi_str_mv 10.48550/arxiv.2209.05085
format Article
fullrecord <record><control><sourceid>proquest_arxiv</sourceid><recordid>TN_cdi_arxiv_primary_2209_05085</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2713854182</sourcerecordid><originalsourceid>FETCH-LOGICAL-a522-579098eb0b4fc2e814a541fb02347b97027954936d573316b864b8212cf006a3</originalsourceid><addsrcrecordid>eNotj8tqwzAQRUWh0JDmA7qqoWu7o5FkycsSkjYQ6KLdG8mVYwVHSuUHyd_XSbq6cLnMnEPIE4WMKyHgVceTGzNEKDIQoMQdmSFjNFUc8YEsum4PAJhLFILNyHp1OrYhOr9LjtGNujqn1jfaV5emt1XjQxt2znaJ80nf2EQPfTiE3o02GXU72KRqtPOP5L7WbWcX_zknX-vV9_Ij3X6-b5Zv21QLxFTIAgplDRheV2gV5VpwWhtAxqUpJKAsBC9Y_iPkhJwblXOjkGJVA-Sazcnz7erVsZyADzqey4treXWdFi-3xTGG38F2fbkPQ_QTUomSMjW9U8j-AA-1Ve0</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2713854182</pqid></control><display><type>article</type><title>Exploring privacy-enhancing technologies in the automotive value chain</title><source>arXiv.org</source><source>Open Access Journals</source><creator>Gonzalo Munilla Garrido ; Schmidt, Kaja ; Harth-Kitzerow, Christopher ; Klepsch, Johannes ; Luckow, Andre ; Matthes, Florian</creator><creatorcontrib>Gonzalo Munilla Garrido ; Schmidt, Kaja ; Harth-Kitzerow, Christopher ; Klepsch, Johannes ; Luckow, Andre ; Matthes, Florian</creatorcontrib><description>Privacy-enhancing technologies (PETs) are becoming increasingly crucial for addressing customer needs, security, privacy (e.g., enhancing anonymity and confidentiality), and regulatory requirements. However, applying PETs in organizations requires a precise understanding of use cases, technologies, and limitations. This paper investigates several industrial use cases, their characteristics, and the potential applicability of PETs to these. We conduct expert interviews to identify and classify uses cases, a gray literature review of relevant open-source PET tools, and discuss how the use case characteristics can be addressed using PETs' capabilities. While we focus mainly on automotive use cases, the results also apply to other use case domains.</description><identifier>EISSN: 2331-8422</identifier><identifier>DOI: 10.48550/arxiv.2209.05085</identifier><language>eng</language><publisher>Ithaca: Cornell University Library, arXiv.org</publisher><subject>Computer Science - Cryptography and Security ; Industrial applications ; Literature reviews ; Privacy</subject><ispartof>arXiv.org, 2022-09</ispartof><rights>2022. This work is published under http://arxiv.org/licenses/nonexclusive-distrib/1.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><rights>http://arxiv.org/licenses/nonexclusive-distrib/1.0</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>228,230,777,781,882,27906</link.rule.ids><backlink>$$Uhttps://doi.org/10.48550/arXiv.2209.05085$$DView paper in arXiv$$Hfree_for_read</backlink><backlink>$$Uhttps://doi.org/10.1109/BigData52589.2021.9671528$$DView published paper (Access to full text may be restricted)$$Hfree_for_read</backlink></links><search><creatorcontrib>Gonzalo Munilla Garrido</creatorcontrib><creatorcontrib>Schmidt, Kaja</creatorcontrib><creatorcontrib>Harth-Kitzerow, Christopher</creatorcontrib><creatorcontrib>Klepsch, Johannes</creatorcontrib><creatorcontrib>Luckow, Andre</creatorcontrib><creatorcontrib>Matthes, Florian</creatorcontrib><title>Exploring privacy-enhancing technologies in the automotive value chain</title><title>arXiv.org</title><description>Privacy-enhancing technologies (PETs) are becoming increasingly crucial for addressing customer needs, security, privacy (e.g., enhancing anonymity and confidentiality), and regulatory requirements. However, applying PETs in organizations requires a precise understanding of use cases, technologies, and limitations. This paper investigates several industrial use cases, their characteristics, and the potential applicability of PETs to these. We conduct expert interviews to identify and classify uses cases, a gray literature review of relevant open-source PET tools, and discuss how the use case characteristics can be addressed using PETs' capabilities. While we focus mainly on automotive use cases, the results also apply to other use case domains.</description><subject>Computer Science - Cryptography and Security</subject><subject>Industrial applications</subject><subject>Literature reviews</subject><subject>Privacy</subject><issn>2331-8422</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2022</creationdate><recordtype>article</recordtype><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GOX</sourceid><recordid>eNotj8tqwzAQRUWh0JDmA7qqoWu7o5FkycsSkjYQ6KLdG8mVYwVHSuUHyd_XSbq6cLnMnEPIE4WMKyHgVceTGzNEKDIQoMQdmSFjNFUc8YEsum4PAJhLFILNyHp1OrYhOr9LjtGNujqn1jfaV5emt1XjQxt2znaJ80nf2EQPfTiE3o02GXU72KRqtPOP5L7WbWcX_zknX-vV9_Ij3X6-b5Zv21QLxFTIAgplDRheV2gV5VpwWhtAxqUpJKAsBC9Y_iPkhJwblXOjkGJVA-Sazcnz7erVsZyADzqey4treXWdFi-3xTGG38F2fbkPQ_QTUomSMjW9U8j-AA-1Ve0</recordid><startdate>20220912</startdate><enddate>20220912</enddate><creator>Gonzalo Munilla Garrido</creator><creator>Schmidt, Kaja</creator><creator>Harth-Kitzerow, Christopher</creator><creator>Klepsch, Johannes</creator><creator>Luckow, Andre</creator><creator>Matthes, Florian</creator><general>Cornell University Library, arXiv.org</general><scope>8FE</scope><scope>8FG</scope><scope>ABJCF</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>HCIFZ</scope><scope>L6V</scope><scope>M7S</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>PTHSS</scope><scope>AKY</scope><scope>GOX</scope></search><sort><creationdate>20220912</creationdate><title>Exploring privacy-enhancing technologies in the automotive value chain</title><author>Gonzalo Munilla Garrido ; Schmidt, Kaja ; Harth-Kitzerow, Christopher ; Klepsch, Johannes ; Luckow, Andre ; Matthes, Florian</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-a522-579098eb0b4fc2e814a541fb02347b97027954936d573316b864b8212cf006a3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2022</creationdate><topic>Computer Science - Cryptography and Security</topic><topic>Industrial applications</topic><topic>Literature reviews</topic><topic>Privacy</topic><toplevel>online_resources</toplevel><creatorcontrib>Gonzalo Munilla Garrido</creatorcontrib><creatorcontrib>Schmidt, Kaja</creatorcontrib><creatorcontrib>Harth-Kitzerow, Christopher</creatorcontrib><creatorcontrib>Klepsch, Johannes</creatorcontrib><creatorcontrib>Luckow, Andre</creatorcontrib><creatorcontrib>Matthes, Florian</creatorcontrib><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>Materials Science &amp; Engineering Collection</collection><collection>ProQuest Central (Alumni)</collection><collection>ProQuest Central</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central</collection><collection>SciTech Premium Collection (Proquest) (PQ_SDU_P3)</collection><collection>ProQuest Engineering Collection</collection><collection>Engineering Database</collection><collection>Publicly Available Content Database (Proquest) (PQ_SDU_P3)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>Engineering collection</collection><collection>arXiv Computer Science</collection><collection>arXiv.org</collection><jtitle>arXiv.org</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Gonzalo Munilla Garrido</au><au>Schmidt, Kaja</au><au>Harth-Kitzerow, Christopher</au><au>Klepsch, Johannes</au><au>Luckow, Andre</au><au>Matthes, Florian</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Exploring privacy-enhancing technologies in the automotive value chain</atitle><jtitle>arXiv.org</jtitle><date>2022-09-12</date><risdate>2022</risdate><eissn>2331-8422</eissn><abstract>Privacy-enhancing technologies (PETs) are becoming increasingly crucial for addressing customer needs, security, privacy (e.g., enhancing anonymity and confidentiality), and regulatory requirements. However, applying PETs in organizations requires a precise understanding of use cases, technologies, and limitations. This paper investigates several industrial use cases, their characteristics, and the potential applicability of PETs to these. We conduct expert interviews to identify and classify uses cases, a gray literature review of relevant open-source PET tools, and discuss how the use case characteristics can be addressed using PETs' capabilities. While we focus mainly on automotive use cases, the results also apply to other use case domains.</abstract><cop>Ithaca</cop><pub>Cornell University Library, arXiv.org</pub><doi>10.48550/arxiv.2209.05085</doi><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier EISSN: 2331-8422
ispartof arXiv.org, 2022-09
issn 2331-8422
language eng
recordid cdi_arxiv_primary_2209_05085
source arXiv.org; Open Access Journals
subjects Computer Science - Cryptography and Security
Industrial applications
Literature reviews
Privacy
title Exploring privacy-enhancing technologies in the automotive value chain
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-17T14%3A25%3A05IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_arxiv&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Exploring%20privacy-enhancing%20technologies%20in%20the%20automotive%20value%20chain&rft.jtitle=arXiv.org&rft.au=Gonzalo%20Munilla%20Garrido&rft.date=2022-09-12&rft.eissn=2331-8422&rft_id=info:doi/10.48550/arxiv.2209.05085&rft_dat=%3Cproquest_arxiv%3E2713854182%3C/proquest_arxiv%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2713854182&rft_id=info:pmid/&rfr_iscdi=true