Harnessing Pseudonyms with Implicit Attributes for Privacy-Respecting Mission Log Analysis

Many applications in the area of collaborative work can be enhanced by tracking users regularly. Consider a future emergency management application, in which mobile first responders are continuously tracked in order to support a better coordination of the rescue missions and to create a mission log....

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
1. Verfasser: Weber, S.G.
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 126
container_issue
container_start_page 119
container_title
container_volume
creator Weber, S.G.
description Many applications in the area of collaborative work can be enhanced by tracking users regularly. Consider a future emergency management application, in which mobile first responders are continuously tracked in order to support a better coordination of the rescue missions and to create a mission log. However, continuous tracking of individuals and storing the data for later use is often in conflict with individual privacy preferences. Therefore, it is a challenge to deal with conflicting traceability and privacy protection requirements. A common way to implement some kind of privacy protection is to use pseudonyms instead of fixed IDs for each user. However, in order to build a multilateral secure and acceptable solution, a more complex system design w.r.t. to pseudonym linkability is required, that also allows third parties to analyze the logs for organizational and legal reasons. In this paper, we present our approach to deal with this issue: we propose to encode additional information into pseudonyms that are used in location tracking systems and stored in data logs. Our concept comprises both access rights for the user herself and implicit attributes that may be verified by third parties in a privacy-respecting manner. We introduce the cryptographic constructions, which employ cryptographically secure pseudorandom number generators, threshold cryptography and techniques for securely evaluating encrypted data. Moreover, in this paper, we sketch a practical application example in the area of emergency mission log analysis and discuss the main security properties of our concepts.
doi_str_mv 10.1109/INCOS.2009.40
format Conference Proceeding
fullrecord <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_5370929</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>5370929</ieee_id><sourcerecordid>5370929</sourcerecordid><originalsourceid>FETCH-LOGICAL-i175t-f97301f6bfadaffb3b49ab52dd6b90e9f6bd903a3bcf0ba32cfcb7b1b85ad6d83</originalsourceid><addsrcrecordid>eNotjLtOwzAARY0QElAyMrH4B1L8jOMxioBGCrTisbBUdmwXo7wUu6D8PUFwljsc3QPANUZrjJG8rZ7K7cuaICTXDJ2ASyQyyWnOc3YKEilyzAhjHGecnYMkhE-0wDgRGb8A7xs19TYE3x_gLtijGfq5C_Dbxw9YdWPrGx9hEePk9THaAN0wwd3kv1Qzp882jLaJv9dHvySGHtbDARa9aufgwxU4c6oNNvnfFXi7v3stN2m9fajKok49FjymTgqKsMu0U0Y5p6lmUmlOjMm0RFYuxkhEFdWNQ1pR0rhGC411zpXJTE5X4Oav6621-3HynZrmPacCSSLpD1adVfU</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Harnessing Pseudonyms with Implicit Attributes for Privacy-Respecting Mission Log Analysis</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Weber, S.G.</creator><creatorcontrib>Weber, S.G.</creatorcontrib><description>Many applications in the area of collaborative work can be enhanced by tracking users regularly. Consider a future emergency management application, in which mobile first responders are continuously tracked in order to support a better coordination of the rescue missions and to create a mission log. However, continuous tracking of individuals and storing the data for later use is often in conflict with individual privacy preferences. Therefore, it is a challenge to deal with conflicting traceability and privacy protection requirements. A common way to implement some kind of privacy protection is to use pseudonyms instead of fixed IDs for each user. However, in order to build a multilateral secure and acceptable solution, a more complex system design w.r.t. to pseudonym linkability is required, that also allows third parties to analyze the logs for organizational and legal reasons. In this paper, we present our approach to deal with this issue: we propose to encode additional information into pseudonyms that are used in location tracking systems and stored in data logs. Our concept comprises both access rights for the user herself and implicit attributes that may be verified by third parties in a privacy-respecting manner. We introduce the cryptographic constructions, which employ cryptographically secure pseudorandom number generators, threshold cryptography and techniques for securely evaluating encrypted data. Moreover, in this paper, we sketch a practical application example in the area of emergency mission log analysis and discuss the main security properties of our concepts.</description><identifier>ISBN: 9781424451654</identifier><identifier>ISBN: 1424451655</identifier><identifier>EISBN: 0769538584</identifier><identifier>EISBN: 9780769538587</identifier><identifier>DOI: 10.1109/INCOS.2009.40</identifier><language>eng</language><publisher>IEEE</publisher><subject>Collaborative work ; Cryptography ; Data privacy ; Data security ; Disaster management ; Intrusion detection ; Law ; Legal factors ; Permission ; Protection</subject><ispartof>2009 International Conference on Intelligent Networking and Collaborative Systems, 2009, p.119-126</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/5370929$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,776,780,785,786,2052,27902,54895</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/5370929$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Weber, S.G.</creatorcontrib><title>Harnessing Pseudonyms with Implicit Attributes for Privacy-Respecting Mission Log Analysis</title><title>2009 International Conference on Intelligent Networking and Collaborative Systems</title><addtitle>INCOS</addtitle><description>Many applications in the area of collaborative work can be enhanced by tracking users regularly. Consider a future emergency management application, in which mobile first responders are continuously tracked in order to support a better coordination of the rescue missions and to create a mission log. However, continuous tracking of individuals and storing the data for later use is often in conflict with individual privacy preferences. Therefore, it is a challenge to deal with conflicting traceability and privacy protection requirements. A common way to implement some kind of privacy protection is to use pseudonyms instead of fixed IDs for each user. However, in order to build a multilateral secure and acceptable solution, a more complex system design w.r.t. to pseudonym linkability is required, that also allows third parties to analyze the logs for organizational and legal reasons. In this paper, we present our approach to deal with this issue: we propose to encode additional information into pseudonyms that are used in location tracking systems and stored in data logs. Our concept comprises both access rights for the user herself and implicit attributes that may be verified by third parties in a privacy-respecting manner. We introduce the cryptographic constructions, which employ cryptographically secure pseudorandom number generators, threshold cryptography and techniques for securely evaluating encrypted data. Moreover, in this paper, we sketch a practical application example in the area of emergency mission log analysis and discuss the main security properties of our concepts.</description><subject>Collaborative work</subject><subject>Cryptography</subject><subject>Data privacy</subject><subject>Data security</subject><subject>Disaster management</subject><subject>Intrusion detection</subject><subject>Law</subject><subject>Legal factors</subject><subject>Permission</subject><subject>Protection</subject><isbn>9781424451654</isbn><isbn>1424451655</isbn><isbn>0769538584</isbn><isbn>9780769538587</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2009</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNotjLtOwzAARY0QElAyMrH4B1L8jOMxioBGCrTisbBUdmwXo7wUu6D8PUFwljsc3QPANUZrjJG8rZ7K7cuaICTXDJ2ASyQyyWnOc3YKEilyzAhjHGecnYMkhE-0wDgRGb8A7xs19TYE3x_gLtijGfq5C_Dbxw9YdWPrGx9hEePk9THaAN0wwd3kv1Qzp882jLaJv9dHvySGHtbDARa9aufgwxU4c6oNNvnfFXi7v3stN2m9fajKok49FjymTgqKsMu0U0Y5p6lmUmlOjMm0RFYuxkhEFdWNQ1pR0rhGC411zpXJTE5X4Oav6621-3HynZrmPacCSSLpD1adVfU</recordid><startdate>200911</startdate><enddate>200911</enddate><creator>Weber, S.G.</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>200911</creationdate><title>Harnessing Pseudonyms with Implicit Attributes for Privacy-Respecting Mission Log Analysis</title><author>Weber, S.G.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i175t-f97301f6bfadaffb3b49ab52dd6b90e9f6bd903a3bcf0ba32cfcb7b1b85ad6d83</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2009</creationdate><topic>Collaborative work</topic><topic>Cryptography</topic><topic>Data privacy</topic><topic>Data security</topic><topic>Disaster management</topic><topic>Intrusion detection</topic><topic>Law</topic><topic>Legal factors</topic><topic>Permission</topic><topic>Protection</topic><toplevel>online_resources</toplevel><creatorcontrib>Weber, S.G.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Weber, S.G.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Harnessing Pseudonyms with Implicit Attributes for Privacy-Respecting Mission Log Analysis</atitle><btitle>2009 International Conference on Intelligent Networking and Collaborative Systems</btitle><stitle>INCOS</stitle><date>2009-11</date><risdate>2009</risdate><spage>119</spage><epage>126</epage><pages>119-126</pages><isbn>9781424451654</isbn><isbn>1424451655</isbn><eisbn>0769538584</eisbn><eisbn>9780769538587</eisbn><abstract>Many applications in the area of collaborative work can be enhanced by tracking users regularly. Consider a future emergency management application, in which mobile first responders are continuously tracked in order to support a better coordination of the rescue missions and to create a mission log. However, continuous tracking of individuals and storing the data for later use is often in conflict with individual privacy preferences. Therefore, it is a challenge to deal with conflicting traceability and privacy protection requirements. A common way to implement some kind of privacy protection is to use pseudonyms instead of fixed IDs for each user. However, in order to build a multilateral secure and acceptable solution, a more complex system design w.r.t. to pseudonym linkability is required, that also allows third parties to analyze the logs for organizational and legal reasons. In this paper, we present our approach to deal with this issue: we propose to encode additional information into pseudonyms that are used in location tracking systems and stored in data logs. Our concept comprises both access rights for the user herself and implicit attributes that may be verified by third parties in a privacy-respecting manner. We introduce the cryptographic constructions, which employ cryptographically secure pseudorandom number generators, threshold cryptography and techniques for securely evaluating encrypted data. Moreover, in this paper, we sketch a practical application example in the area of emergency mission log analysis and discuss the main security properties of our concepts.</abstract><pub>IEEE</pub><doi>10.1109/INCOS.2009.40</doi><tpages>8</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISBN: 9781424451654
ispartof 2009 International Conference on Intelligent Networking and Collaborative Systems, 2009, p.119-126
issn
language eng
recordid cdi_ieee_primary_5370929
source IEEE Electronic Library (IEL) Conference Proceedings
subjects Collaborative work
Cryptography
Data privacy
Data security
Disaster management
Intrusion detection
Law
Legal factors
Permission
Protection
title Harnessing Pseudonyms with Implicit Attributes for Privacy-Respecting Mission Log Analysis
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-21T17%3A47%3A51IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Harnessing%20Pseudonyms%20with%20Implicit%20Attributes%20for%20Privacy-Respecting%20Mission%20Log%20Analysis&rft.btitle=2009%20International%20Conference%20on%20Intelligent%20Networking%20and%20Collaborative%20Systems&rft.au=Weber,%20S.G.&rft.date=2009-11&rft.spage=119&rft.epage=126&rft.pages=119-126&rft.isbn=9781424451654&rft.isbn_list=1424451655&rft_id=info:doi/10.1109/INCOS.2009.40&rft_dat=%3Cieee_6IE%3E5370929%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&rft.eisbn=0769538584&rft.eisbn_list=9780769538587&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=5370929&rfr_iscdi=true