SlideShare ist ein Scribd-Unternehmen logo
1 von 1
Downloaden Sie, um offline zu lesen
Prof. Dr. Isao EchizenDr. Sven Wohlgemuth Prof. Dr. Günter MüllerProf. Dr. Noboru Sonehara
National Institute of Informatics, Tokyo, Japan University of Freiburg, Germany
Solutions for Coping with Privacy and Usability
- Privacy-compliant Disclosure of Personal Data to Third Parties -
Contact: Dr. Sven WOHLGEMUTH – DAAD Postdoctoral Scholar at the Digital Content and Media Sciences Research Division
TEL : 03-4212-2594 FAX : 03-3556-1916 (c/o Prof. Dr. Echizen) E-mail : wohlgemuth@nii.ac.jp WWW: www.nii.ac.jp
Cloud Computing and Disclosure of Personal Data to 3rd Parties
Service providers act as data consumers and data
providers
• Some service providers (e.g. advertisement company, online
book store) offer on premise large databases and runtime
environments with application framework
• Services of cloud users’ run on service providers’ environment
• Privacy promise: Service providers handle personal data according
to the agreed upon privacy policy
• Cloud users cannot enforce policy-compliant disclosure to 3rd
parties
• Cloud is a black box
Safety of Data or Liveness of Services
Controllable Disclosure of Personal Data by DETECTIVE
Identity Management and Disclosure to 3rd Parties
• Privacy by non-linkable credentials
• All credentials and pseudonyms are based on secret key
• All-or-nothing delegation Loss of control
Digital Watermarking and Disclosure to 3rd Parties
• Copyright protection by labeling digital content
• Symmetric watermarking scheme: Both service providers get the
same watermark Non-distinction of last data provider
Evaluation: Proof-of-concept implementation for medical services with electronic health records (x-ray images)
DETECTIVE: Protocols for Data Provenance
• Ex-post enforcement of obligations by identifying last data provider
• Linking the identities of data provider and consumer to disclosure
by cryptographic commitments and digital watermarking
• Verification by auditor due to delegated rights as watermarking key
User Service providers Service providers
Need medical
help
Therapy
X-Ray Image of P
Result
…
Driving
licence
Stella Freiburger
Classes: ABE
Friedrichstr. 50
D-79098 Freiburg
Germany
IP: 132.15.16.3
Driving
licence
Stella Freiburger
Classes: ABE
Friedrichstr. 50
D-79098 Freiburg
Germany
IP: 132.15.16.3
Driving
licence
Stella Freiburger
Classes: ABE
Friedrichstr. 50
D-79098 Freiburg
Germany
IP: 132.15.16.3
Driving
licence
Stella Freiburger
Classes: ABE
Friedrichstr. 50
D-79098 Freiburg
Germany
IP: 132.15.16.3
DC / DP
Big Brother
DC / DP
Person
Person
Profile
1+2+…
DP
Profile
1+2+…
Access control No usage control for the disclosure of personal data
User
d
DP = Data provider
DC = Data consumer
d, d’ = Personal data
Disclosure of personal data
to third parties
d, d’
d
Service provider
d, d’
d, d’
DP
DC / DP
DC / DP
DC / DP
DC
Medical
Data
Local clinic
Advertiser
Medical
Data
Local
clinic
Advertise
r
Medical
Data
Local clinic
Advertiser
Clinic
abroad
Medical
Data
Local clinic
Advertiser
Clinic
abroad
Data
Provenance
AdvertiserClinic abroadPharm. company Pharm. company
Usage Control by Data Provenance
• Usage control: Enforcement of usage rules (obligations)
• Data provenance: Information to determine the derivation
history of data
• In an audit, data provenance can be used to restore the
information flow of personal data
Data provider Data consumer
Apply Tag
Auditpr Data provider
Verify Tag
Data consumer
Local clinic
Advertiser
Clinic abroad
Patient
(rights)
Advertiser Clinic abroad Patient
(rights)
Local clinic
Advertiser
Clinic abroad
Advertiser
Clinic abroad
Clinic abroad
Advertiser
寿
Local clinic
Advertiser
Clinic abroad
Clinic
abroad
Advertiser
寿
Pharmaceutical company
Advertiser
Clinic
abroad
Local clinic
Advertiser
Clinic abroad
Local clinic
Advertiser
Clinic abroad
Local clinic

Weitere ähnliche Inhalte

Andere mochten auch

EN 6.3: 1 IT-Sicherheit und Technischer Datenschutz
EN 6.3: 1 IT-Sicherheit und Technischer DatenschutzEN 6.3: 1 IT-Sicherheit und Technischer Datenschutz
EN 6.3: 1 IT-Sicherheit und Technischer DatenschutzSven Wohlgemuth
 
Persönlichkeitsrechte und Datenschutz in der Wolke?
Persönlichkeitsrechte und Datenschutz in der Wolke?Persönlichkeitsrechte und Datenschutz in der Wolke?
Persönlichkeitsrechte und Datenschutz in der Wolke?Hochschule Weserbergland
 
ATUS - A Toolkit for Usable Security
ATUS - A Toolkit for Usable SecurityATUS - A Toolkit for Usable Security
ATUS - A Toolkit for Usable SecuritySven Wohlgemuth
 
Nachhaltigkeit in IT-Verträgen: Vertragsfreiheit vs. Vergaberecht
Nachhaltigkeit in IT-Verträgen: Vertragsfreiheit vs. VergaberechtNachhaltigkeit in IT-Verträgen: Vertragsfreiheit vs. Vergaberecht
Nachhaltigkeit in IT-Verträgen: Vertragsfreiheit vs. VergaberechtSascha Kremer
 
Bernd Fuhlert: Vortrag an der FOM Hochschule - Dezember 2011
Bernd Fuhlert: Vortrag an der FOM Hochschule - Dezember 2011Bernd Fuhlert: Vortrag an der FOM Hochschule - Dezember 2011
Bernd Fuhlert: Vortrag an der FOM Hochschule - Dezember 2011Bernd Fuhlert
 
Facebook Recht & Datenschutz
Facebook Recht & DatenschutzFacebook Recht & Datenschutz
Facebook Recht & DatenschutzFuturebiz
 
Social Media, der Datenschutz und das Urheberrecht - 8.4.2014 - marketing for...
Social Media, der Datenschutz und das Urheberrecht - 8.4.2014 - marketing for...Social Media, der Datenschutz und das Urheberrecht - 8.4.2014 - marketing for...
Social Media, der Datenschutz und das Urheberrecht - 8.4.2014 - marketing for...Sascha Kremer
 
Community Camp 2015 - Rechtsupdate 2015 #ccb15
Community Camp 2015 - Rechtsupdate 2015 #ccb15Community Camp 2015 - Rechtsupdate 2015 #ccb15
Community Camp 2015 - Rechtsupdate 2015 #ccb15Thomas Schwenke
 
Graph API und Datenschutz - Grenzen zulässiger Nutzung der Facebook-Mitgliede...
Graph API und Datenschutz - Grenzen zulässiger Nutzung der Facebook-Mitgliede...Graph API und Datenschutz - Grenzen zulässiger Nutzung der Facebook-Mitgliede...
Graph API und Datenschutz - Grenzen zulässiger Nutzung der Facebook-Mitgliede...Thomas Schwenke
 

Andere mochten auch (9)

EN 6.3: 1 IT-Sicherheit und Technischer Datenschutz
EN 6.3: 1 IT-Sicherheit und Technischer DatenschutzEN 6.3: 1 IT-Sicherheit und Technischer Datenschutz
EN 6.3: 1 IT-Sicherheit und Technischer Datenschutz
 
Persönlichkeitsrechte und Datenschutz in der Wolke?
Persönlichkeitsrechte und Datenschutz in der Wolke?Persönlichkeitsrechte und Datenschutz in der Wolke?
Persönlichkeitsrechte und Datenschutz in der Wolke?
 
ATUS - A Toolkit for Usable Security
ATUS - A Toolkit for Usable SecurityATUS - A Toolkit for Usable Security
ATUS - A Toolkit for Usable Security
 
Nachhaltigkeit in IT-Verträgen: Vertragsfreiheit vs. Vergaberecht
Nachhaltigkeit in IT-Verträgen: Vertragsfreiheit vs. VergaberechtNachhaltigkeit in IT-Verträgen: Vertragsfreiheit vs. Vergaberecht
Nachhaltigkeit in IT-Verträgen: Vertragsfreiheit vs. Vergaberecht
 
Bernd Fuhlert: Vortrag an der FOM Hochschule - Dezember 2011
Bernd Fuhlert: Vortrag an der FOM Hochschule - Dezember 2011Bernd Fuhlert: Vortrag an der FOM Hochschule - Dezember 2011
Bernd Fuhlert: Vortrag an der FOM Hochschule - Dezember 2011
 
Facebook Recht & Datenschutz
Facebook Recht & DatenschutzFacebook Recht & Datenschutz
Facebook Recht & Datenschutz
 
Social Media, der Datenschutz und das Urheberrecht - 8.4.2014 - marketing for...
Social Media, der Datenschutz und das Urheberrecht - 8.4.2014 - marketing for...Social Media, der Datenschutz und das Urheberrecht - 8.4.2014 - marketing for...
Social Media, der Datenschutz und das Urheberrecht - 8.4.2014 - marketing for...
 
Community Camp 2015 - Rechtsupdate 2015 #ccb15
Community Camp 2015 - Rechtsupdate 2015 #ccb15Community Camp 2015 - Rechtsupdate 2015 #ccb15
Community Camp 2015 - Rechtsupdate 2015 #ccb15
 
Graph API und Datenschutz - Grenzen zulässiger Nutzung der Facebook-Mitgliede...
Graph API und Datenschutz - Grenzen zulässiger Nutzung der Facebook-Mitgliede...Graph API und Datenschutz - Grenzen zulässiger Nutzung der Facebook-Mitgliede...
Graph API und Datenschutz - Grenzen zulässiger Nutzung der Facebook-Mitgliede...
 

Ähnlich wie Solutions for Coping with Privacy and Usability

Tagging Disclosure of Personal Data to Third Parties to Preserve Privacy
Tagging Disclosure of Personal Data to Third Parties to Preserve PrivacyTagging Disclosure of Personal Data to Third Parties to Preserve Privacy
Tagging Disclosure of Personal Data to Third Parties to Preserve PrivacySven Wohlgemuth
 
Privacy in Business Processes by Identity Management
Privacy in Business Processes by Identity ManagementPrivacy in Business Processes by Identity Management
Privacy in Business Processes by Identity ManagementSven Wohlgemuth
 
Privacy in Business Processes - Disclosure of Personal Data to 3rd Parties
Privacy in Business Processes - Disclosure of Personal Data to 3rd PartiesPrivacy in Business Processes - Disclosure of Personal Data to 3rd Parties
Privacy in Business Processes - Disclosure of Personal Data to 3rd PartiesSven Wohlgemuth
 
Privacy, Accountability and Trust Privacy, Accountability and Trust Privacy, ...
Privacy, Accountability and Trust Privacy, Accountability and Trust Privacy, ...Privacy, Accountability and Trust Privacy, Accountability and Trust Privacy, ...
Privacy, Accountability and Trust Privacy, Accountability and Trust Privacy, ...Karlos Svoboda
 
Protecting Personal Data in a IoT Network with UMA
Protecting Personal Data in a IoT Network with UMAProtecting Personal Data in a IoT Network with UMA
Protecting Personal Data in a IoT Network with UMADomenico Catalano
 
Protecting Personal Data in a IoT Network with UMA
 Protecting Personal Data in a IoT Network with UMA Protecting Personal Data in a IoT Network with UMA
Protecting Personal Data in a IoT Network with UMAkantarainitiative
 
Data science and pending EU privacy laws - a storm on the horizon
Data science and pending EU privacy laws - a storm on the horizonData science and pending EU privacy laws - a storm on the horizon
Data science and pending EU privacy laws - a storm on the horizonDavid Stephenson, Ph.D.
 
GDPR Are you ready for auditing privacy ?
GDPR Are you ready for auditing privacy ?GDPR Are you ready for auditing privacy ?
GDPR Are you ready for auditing privacy ?Patrick Soenen
 
Digital Rights Management
Digital Rights ManagementDigital Rights Management
Digital Rights ManagementSabrina Kirrane
 
Towards Statistical Queries over Distributed Private User Data
Towards Statistical Queries over Distributed Private User Data Towards Statistical Queries over Distributed Private User Data
Towards Statistical Queries over Distributed Private User Data Serafeim Chatzopoulos
 
IRJET- Personalised Privacy-Preserving Social Recommendation based on Ranking...
IRJET- Personalised Privacy-Preserving Social Recommendation based on Ranking...IRJET- Personalised Privacy-Preserving Social Recommendation based on Ranking...
IRJET- Personalised Privacy-Preserving Social Recommendation based on Ranking...IRJET Journal
 
BODYPASS first result
BODYPASS first resultBODYPASS first result
BODYPASS first resultJuan V. Dura
 
Self-Organized e-Health Application using IEEE 11073: An Experimental Appro...
Self-Organized e-Health Application using IEEE 11073: An Experimental Appro...Self-Organized e-Health Application using IEEE 11073: An Experimental Appro...
Self-Organized e-Health Application using IEEE 11073: An Experimental Appro...Syed Hassan Ahmed
 
IHE / RSNA Image Sharing Project - IHE Colombia Workshop (12/2014) Module 5b
IHE / RSNA Image Sharing Project - IHE Colombia Workshop (12/2014) Module 5bIHE / RSNA Image Sharing Project - IHE Colombia Workshop (12/2014) Module 5b
IHE / RSNA Image Sharing Project - IHE Colombia Workshop (12/2014) Module 5bIHE Brasil
 
Digital Credentials Enabling Mobility and Verification of Educational Achieve...
Digital Credentials Enabling Mobility and Verification of Educational Achieve...Digital Credentials Enabling Mobility and Verification of Educational Achieve...
Digital Credentials Enabling Mobility and Verification of Educational Achieve...Brandon Muramatsu
 
20180305 the dayafter_bavovdh_cranium_dpo_pro
20180305 the dayafter_bavovdh_cranium_dpo_pro20180305 the dayafter_bavovdh_cranium_dpo_pro
20180305 the dayafter_bavovdh_cranium_dpo_proKoenraad FLAMANT
 
Data Security & Data Privacy: Data Anonymization
Data Security & Data Privacy: Data AnonymizationData Security & Data Privacy: Data Anonymization
Data Security & Data Privacy: Data AnonymizationPatric Dahse
 
Guidelines for the technological development in the e-health application domain
Guidelines for the technological development in the e-health application domainGuidelines for the technological development in the e-health application domain
Guidelines for the technological development in the e-health application domainIvano Malavolta
 
Presentation On Mass Data Privacy Law
Presentation On Mass Data Privacy LawPresentation On Mass Data Privacy Law
Presentation On Mass Data Privacy LawIreneWachsler
 

Ähnlich wie Solutions for Coping with Privacy and Usability (20)

Privacy in e-Health
Privacy in e-HealthPrivacy in e-Health
Privacy in e-Health
 
Tagging Disclosure of Personal Data to Third Parties to Preserve Privacy
Tagging Disclosure of Personal Data to Third Parties to Preserve PrivacyTagging Disclosure of Personal Data to Third Parties to Preserve Privacy
Tagging Disclosure of Personal Data to Third Parties to Preserve Privacy
 
Privacy in Business Processes by Identity Management
Privacy in Business Processes by Identity ManagementPrivacy in Business Processes by Identity Management
Privacy in Business Processes by Identity Management
 
Privacy in Business Processes - Disclosure of Personal Data to 3rd Parties
Privacy in Business Processes - Disclosure of Personal Data to 3rd PartiesPrivacy in Business Processes - Disclosure of Personal Data to 3rd Parties
Privacy in Business Processes - Disclosure of Personal Data to 3rd Parties
 
Privacy, Accountability and Trust Privacy, Accountability and Trust Privacy, ...
Privacy, Accountability and Trust Privacy, Accountability and Trust Privacy, ...Privacy, Accountability and Trust Privacy, Accountability and Trust Privacy, ...
Privacy, Accountability and Trust Privacy, Accountability and Trust Privacy, ...
 
Protecting Personal Data in a IoT Network with UMA
Protecting Personal Data in a IoT Network with UMAProtecting Personal Data in a IoT Network with UMA
Protecting Personal Data in a IoT Network with UMA
 
Protecting Personal Data in a IoT Network with UMA
 Protecting Personal Data in a IoT Network with UMA Protecting Personal Data in a IoT Network with UMA
Protecting Personal Data in a IoT Network with UMA
 
Data science and pending EU privacy laws - a storm on the horizon
Data science and pending EU privacy laws - a storm on the horizonData science and pending EU privacy laws - a storm on the horizon
Data science and pending EU privacy laws - a storm on the horizon
 
GDPR Are you ready for auditing privacy ?
GDPR Are you ready for auditing privacy ?GDPR Are you ready for auditing privacy ?
GDPR Are you ready for auditing privacy ?
 
Digital Rights Management
Digital Rights ManagementDigital Rights Management
Digital Rights Management
 
Towards Statistical Queries over Distributed Private User Data
Towards Statistical Queries over Distributed Private User Data Towards Statistical Queries over Distributed Private User Data
Towards Statistical Queries over Distributed Private User Data
 
IRJET- Personalised Privacy-Preserving Social Recommendation based on Ranking...
IRJET- Personalised Privacy-Preserving Social Recommendation based on Ranking...IRJET- Personalised Privacy-Preserving Social Recommendation based on Ranking...
IRJET- Personalised Privacy-Preserving Social Recommendation based on Ranking...
 
BODYPASS first result
BODYPASS first resultBODYPASS first result
BODYPASS first result
 
Self-Organized e-Health Application using IEEE 11073: An Experimental Appro...
Self-Organized e-Health Application using IEEE 11073: An Experimental Appro...Self-Organized e-Health Application using IEEE 11073: An Experimental Appro...
Self-Organized e-Health Application using IEEE 11073: An Experimental Appro...
 
IHE / RSNA Image Sharing Project - IHE Colombia Workshop (12/2014) Module 5b
IHE / RSNA Image Sharing Project - IHE Colombia Workshop (12/2014) Module 5bIHE / RSNA Image Sharing Project - IHE Colombia Workshop (12/2014) Module 5b
IHE / RSNA Image Sharing Project - IHE Colombia Workshop (12/2014) Module 5b
 
Digital Credentials Enabling Mobility and Verification of Educational Achieve...
Digital Credentials Enabling Mobility and Verification of Educational Achieve...Digital Credentials Enabling Mobility and Verification of Educational Achieve...
Digital Credentials Enabling Mobility and Verification of Educational Achieve...
 
20180305 the dayafter_bavovdh_cranium_dpo_pro
20180305 the dayafter_bavovdh_cranium_dpo_pro20180305 the dayafter_bavovdh_cranium_dpo_pro
20180305 the dayafter_bavovdh_cranium_dpo_pro
 
Data Security & Data Privacy: Data Anonymization
Data Security & Data Privacy: Data AnonymizationData Security & Data Privacy: Data Anonymization
Data Security & Data Privacy: Data Anonymization
 
Guidelines for the technological development in the e-health application domain
Guidelines for the technological development in the e-health application domainGuidelines for the technological development in the e-health application domain
Guidelines for the technological development in the e-health application domain
 
Presentation On Mass Data Privacy Law
Presentation On Mass Data Privacy LawPresentation On Mass Data Privacy Law
Presentation On Mass Data Privacy Law
 

Mehr von Sven Wohlgemuth

A Secure Decision-Support Scheme for Self-Sovereign Identity Management
A Secure Decision-Support Scheme for Self-Sovereign Identity ManagementA Secure Decision-Support Scheme for Self-Sovereign Identity Management
A Secure Decision-Support Scheme for Self-Sovereign Identity ManagementSven Wohlgemuth
 
Competitive Compliance with Blockchain
Competitive Compliance with BlockchainCompetitive Compliance with Blockchain
Competitive Compliance with BlockchainSven Wohlgemuth
 
Secure Sharing of Design Information with Blockchains
Secure Sharing of Design Information with BlockchainsSecure Sharing of Design Information with Blockchains
Secure Sharing of Design Information with BlockchainsSven Wohlgemuth
 
個人情報の有効活用を可能にする (Enabling effective use of personal information)
 個人情報の有効活用を可能にする (Enabling effective use of personal information) 個人情報の有効活用を可能にする (Enabling effective use of personal information)
個人情報の有効活用を可能にする (Enabling effective use of personal information)Sven Wohlgemuth
 
Privacy-Enhancing Trust Infrastructure for Process Mining
Privacy-Enhancing Trust Infrastructure for Process MiningPrivacy-Enhancing Trust Infrastructure for Process Mining
Privacy-Enhancing Trust Infrastructure for Process MiningSven Wohlgemuth
 
EN 6.3: 3 Sicherheitsmodelle
EN 6.3: 3 SicherheitsmodelleEN 6.3: 3 Sicherheitsmodelle
EN 6.3: 3 SicherheitsmodelleSven Wohlgemuth
 
Privacy in Business Processes by User-Centric Identity Management
Privacy in Business Processes by User-Centric Identity ManagementPrivacy in Business Processes by User-Centric Identity Management
Privacy in Business Processes by User-Centric Identity ManagementSven Wohlgemuth
 
WP14 Workshop "From Data Economy to Secure Logging as a Step towards Transpar...
WP14 Workshop "From Data Economy to Secure Logging as a Step towards Transpar...WP14 Workshop "From Data Economy to Secure Logging as a Step towards Transpar...
WP14 Workshop "From Data Economy to Secure Logging as a Step towards Transpar...Sven Wohlgemuth
 
On Privacy in Medical Services with Electronic Health Records
On Privacy in Medical Services with Electronic Health RecordsOn Privacy in Medical Services with Electronic Health Records
On Privacy in Medical Services with Electronic Health RecordsSven Wohlgemuth
 
EN 6.3: 2 IT-Compliance und IT-Sicherheitsmanagement
EN 6.3: 2 IT-Compliance und IT-SicherheitsmanagementEN 6.3: 2 IT-Compliance und IT-Sicherheitsmanagement
EN 6.3: 2 IT-Compliance und IT-SicherheitsmanagementSven Wohlgemuth
 
Privacy with Secondary Use of Personal Information
Privacy with Secondary Use of Personal InformationPrivacy with Secondary Use of Personal Information
Privacy with Secondary Use of Personal InformationSven Wohlgemuth
 
International Workshop on Information Systems for Social Innovation (ISSI) 2009
International Workshop on Information Systems for Social Innovation (ISSI) 2009International Workshop on Information Systems for Social Innovation (ISSI) 2009
International Workshop on Information Systems for Social Innovation (ISSI) 2009Sven Wohlgemuth
 
Durchsetzung von Privacy Policies in Dienstenetzen
Durchsetzung von Privacy Policies in DienstenetzenDurchsetzung von Privacy Policies in Dienstenetzen
Durchsetzung von Privacy Policies in DienstenetzenSven Wohlgemuth
 
Privacy in Business Processes by User-Centric Identity Management
Privacy in Business Processes by User-Centric Identity ManagementPrivacy in Business Processes by User-Centric Identity Management
Privacy in Business Processes by User-Centric Identity ManagementSven Wohlgemuth
 
Schlüsselverwaltung - Objektorientierter Entwurf und Implementierung
Schlüsselverwaltung - Objektorientierter Entwurf und ImplementierungSchlüsselverwaltung - Objektorientierter Entwurf und Implementierung
Schlüsselverwaltung - Objektorientierter Entwurf und ImplementierungSven Wohlgemuth
 
Resilience by Usable Security
Resilience by Usable SecurityResilience by Usable Security
Resilience by Usable SecuritySven Wohlgemuth
 
PersoApp - Secure and User-Friendly Internet Applications
PersoApp - Secure and User-Friendly Internet ApplicationsPersoApp - Secure and User-Friendly Internet Applications
PersoApp - Secure and User-Friendly Internet ApplicationsSven Wohlgemuth
 
PersoApp - An Open Source Community for the new German national ID card
PersoApp - An Open Source Community for the new German national ID cardPersoApp - An Open Source Community for the new German national ID card
PersoApp - An Open Source Community for the new German national ID cardSven Wohlgemuth
 
FIDIS D3.3 Study on Mobile Identity Management
FIDIS D3.3 Study on Mobile Identity ManagementFIDIS D3.3 Study on Mobile Identity Management
FIDIS D3.3 Study on Mobile Identity ManagementSven Wohlgemuth
 

Mehr von Sven Wohlgemuth (20)

A Secure Decision-Support Scheme for Self-Sovereign Identity Management
A Secure Decision-Support Scheme for Self-Sovereign Identity ManagementA Secure Decision-Support Scheme for Self-Sovereign Identity Management
A Secure Decision-Support Scheme for Self-Sovereign Identity Management
 
Competitive Compliance with Blockchain
Competitive Compliance with BlockchainCompetitive Compliance with Blockchain
Competitive Compliance with Blockchain
 
Secure Sharing of Design Information with Blockchains
Secure Sharing of Design Information with BlockchainsSecure Sharing of Design Information with Blockchains
Secure Sharing of Design Information with Blockchains
 
個人情報の有効活用を可能にする (Enabling effective use of personal information)
 個人情報の有効活用を可能にする (Enabling effective use of personal information) 個人情報の有効活用を可能にする (Enabling effective use of personal information)
個人情報の有効活用を可能にする (Enabling effective use of personal information)
 
Privacy-Enhancing Trust Infrastructure for Process Mining
Privacy-Enhancing Trust Infrastructure for Process MiningPrivacy-Enhancing Trust Infrastructure for Process Mining
Privacy-Enhancing Trust Infrastructure for Process Mining
 
EN 6.3: 4 Kryptographie
EN 6.3: 4 KryptographieEN 6.3: 4 Kryptographie
EN 6.3: 4 Kryptographie
 
EN 6.3: 3 Sicherheitsmodelle
EN 6.3: 3 SicherheitsmodelleEN 6.3: 3 Sicherheitsmodelle
EN 6.3: 3 Sicherheitsmodelle
 
Privacy in Business Processes by User-Centric Identity Management
Privacy in Business Processes by User-Centric Identity ManagementPrivacy in Business Processes by User-Centric Identity Management
Privacy in Business Processes by User-Centric Identity Management
 
WP14 Workshop "From Data Economy to Secure Logging as a Step towards Transpar...
WP14 Workshop "From Data Economy to Secure Logging as a Step towards Transpar...WP14 Workshop "From Data Economy to Secure Logging as a Step towards Transpar...
WP14 Workshop "From Data Economy to Secure Logging as a Step towards Transpar...
 
On Privacy in Medical Services with Electronic Health Records
On Privacy in Medical Services with Electronic Health RecordsOn Privacy in Medical Services with Electronic Health Records
On Privacy in Medical Services with Electronic Health Records
 
EN 6.3: 2 IT-Compliance und IT-Sicherheitsmanagement
EN 6.3: 2 IT-Compliance und IT-SicherheitsmanagementEN 6.3: 2 IT-Compliance und IT-Sicherheitsmanagement
EN 6.3: 2 IT-Compliance und IT-Sicherheitsmanagement
 
Privacy with Secondary Use of Personal Information
Privacy with Secondary Use of Personal InformationPrivacy with Secondary Use of Personal Information
Privacy with Secondary Use of Personal Information
 
International Workshop on Information Systems for Social Innovation (ISSI) 2009
International Workshop on Information Systems for Social Innovation (ISSI) 2009International Workshop on Information Systems for Social Innovation (ISSI) 2009
International Workshop on Information Systems for Social Innovation (ISSI) 2009
 
Durchsetzung von Privacy Policies in Dienstenetzen
Durchsetzung von Privacy Policies in DienstenetzenDurchsetzung von Privacy Policies in Dienstenetzen
Durchsetzung von Privacy Policies in Dienstenetzen
 
Privacy in Business Processes by User-Centric Identity Management
Privacy in Business Processes by User-Centric Identity ManagementPrivacy in Business Processes by User-Centric Identity Management
Privacy in Business Processes by User-Centric Identity Management
 
Schlüsselverwaltung - Objektorientierter Entwurf und Implementierung
Schlüsselverwaltung - Objektorientierter Entwurf und ImplementierungSchlüsselverwaltung - Objektorientierter Entwurf und Implementierung
Schlüsselverwaltung - Objektorientierter Entwurf und Implementierung
 
Resilience by Usable Security
Resilience by Usable SecurityResilience by Usable Security
Resilience by Usable Security
 
PersoApp - Secure and User-Friendly Internet Applications
PersoApp - Secure and User-Friendly Internet ApplicationsPersoApp - Secure and User-Friendly Internet Applications
PersoApp - Secure and User-Friendly Internet Applications
 
PersoApp - An Open Source Community for the new German national ID card
PersoApp - An Open Source Community for the new German national ID cardPersoApp - An Open Source Community for the new German national ID card
PersoApp - An Open Source Community for the new German national ID card
 
FIDIS D3.3 Study on Mobile Identity Management
FIDIS D3.3 Study on Mobile Identity ManagementFIDIS D3.3 Study on Mobile Identity Management
FIDIS D3.3 Study on Mobile Identity Management
 

Kürzlich hochgeladen

Unlocking the Potential: Deep dive into ocean of Ceramic Magnets.pptx
Unlocking  the Potential: Deep dive into ocean of Ceramic Magnets.pptxUnlocking  the Potential: Deep dive into ocean of Ceramic Magnets.pptx
Unlocking the Potential: Deep dive into ocean of Ceramic Magnets.pptxanandsmhk
 
Cultivation of KODO MILLET . made by Ghanshyam pptx
Cultivation of KODO MILLET . made by Ghanshyam pptxCultivation of KODO MILLET . made by Ghanshyam pptx
Cultivation of KODO MILLET . made by Ghanshyam pptxpradhanghanshyam7136
 
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...Lokesh Kothari
 
Artificial Intelligence In Microbiology by Dr. Prince C P
Artificial Intelligence In Microbiology by Dr. Prince C PArtificial Intelligence In Microbiology by Dr. Prince C P
Artificial Intelligence In Microbiology by Dr. Prince C PPRINCE C P
 
Nanoparticles synthesis and characterization​ ​
Nanoparticles synthesis and characterization​  ​Nanoparticles synthesis and characterization​  ​
Nanoparticles synthesis and characterization​ ​kaibalyasahoo82800
 
Caco-2 cell permeability assay for drug absorption
Caco-2 cell permeability assay for drug absorptionCaco-2 cell permeability assay for drug absorption
Caco-2 cell permeability assay for drug absorptionPriyansha Singh
 
Grafana in space: Monitoring Japan's SLIM moon lander in real time
Grafana in space: Monitoring Japan's SLIM moon lander  in real timeGrafana in space: Monitoring Japan's SLIM moon lander  in real time
Grafana in space: Monitoring Japan's SLIM moon lander in real timeSatoshi NAKAHIRA
 
Biological Classification BioHack (3).pdf
Biological Classification BioHack (3).pdfBiological Classification BioHack (3).pdf
Biological Classification BioHack (3).pdfmuntazimhurra
 
Hubble Asteroid Hunter III. Physical properties of newly found asteroids
Hubble Asteroid Hunter III. Physical properties of newly found asteroidsHubble Asteroid Hunter III. Physical properties of newly found asteroids
Hubble Asteroid Hunter III. Physical properties of newly found asteroidsSérgio Sacani
 
Presentation Vikram Lander by Vedansh Gupta.pptx
Presentation Vikram Lander by Vedansh Gupta.pptxPresentation Vikram Lander by Vedansh Gupta.pptx
Presentation Vikram Lander by Vedansh Gupta.pptxgindu3009
 
Nightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43b
Nightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43bNightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43b
Nightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43bSérgio Sacani
 
A relative description on Sonoporation.pdf
A relative description on Sonoporation.pdfA relative description on Sonoporation.pdf
A relative description on Sonoporation.pdfnehabiju2046
 
G9 Science Q4- Week 1-2 Projectile Motion.ppt
G9 Science Q4- Week 1-2 Projectile Motion.pptG9 Science Q4- Week 1-2 Projectile Motion.ppt
G9 Science Q4- Week 1-2 Projectile Motion.pptMAESTRELLAMesa2
 
Disentangling the origin of chemical differences using GHOST
Disentangling the origin of chemical differences using GHOSTDisentangling the origin of chemical differences using GHOST
Disentangling the origin of chemical differences using GHOSTSérgio Sacani
 
SOLUBLE PATTERN RECOGNITION RECEPTORS.pptx
SOLUBLE PATTERN RECOGNITION RECEPTORS.pptxSOLUBLE PATTERN RECOGNITION RECEPTORS.pptx
SOLUBLE PATTERN RECOGNITION RECEPTORS.pptxkessiyaTpeter
 
Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |
Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |
Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |aasikanpl
 
Recombination DNA Technology (Nucleic Acid Hybridization )
Recombination DNA Technology (Nucleic Acid Hybridization )Recombination DNA Technology (Nucleic Acid Hybridization )
Recombination DNA Technology (Nucleic Acid Hybridization )aarthirajkumar25
 
Work, Energy and Power for class 10 ICSE Physics
Work, Energy and Power for class 10 ICSE PhysicsWork, Energy and Power for class 10 ICSE Physics
Work, Energy and Power for class 10 ICSE Physicsvishikhakeshava1
 

Kürzlich hochgeladen (20)

Unlocking the Potential: Deep dive into ocean of Ceramic Magnets.pptx
Unlocking  the Potential: Deep dive into ocean of Ceramic Magnets.pptxUnlocking  the Potential: Deep dive into ocean of Ceramic Magnets.pptx
Unlocking the Potential: Deep dive into ocean of Ceramic Magnets.pptx
 
Cultivation of KODO MILLET . made by Ghanshyam pptx
Cultivation of KODO MILLET . made by Ghanshyam pptxCultivation of KODO MILLET . made by Ghanshyam pptx
Cultivation of KODO MILLET . made by Ghanshyam pptx
 
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
 
Artificial Intelligence In Microbiology by Dr. Prince C P
Artificial Intelligence In Microbiology by Dr. Prince C PArtificial Intelligence In Microbiology by Dr. Prince C P
Artificial Intelligence In Microbiology by Dr. Prince C P
 
Nanoparticles synthesis and characterization​ ​
Nanoparticles synthesis and characterization​  ​Nanoparticles synthesis and characterization​  ​
Nanoparticles synthesis and characterization​ ​
 
Caco-2 cell permeability assay for drug absorption
Caco-2 cell permeability assay for drug absorptionCaco-2 cell permeability assay for drug absorption
Caco-2 cell permeability assay for drug absorption
 
9953056974 Young Call Girls In Mahavir enclave Indian Quality Escort service
9953056974 Young Call Girls In Mahavir enclave Indian Quality Escort service9953056974 Young Call Girls In Mahavir enclave Indian Quality Escort service
9953056974 Young Call Girls In Mahavir enclave Indian Quality Escort service
 
Grafana in space: Monitoring Japan's SLIM moon lander in real time
Grafana in space: Monitoring Japan's SLIM moon lander  in real timeGrafana in space: Monitoring Japan's SLIM moon lander  in real time
Grafana in space: Monitoring Japan's SLIM moon lander in real time
 
Biological Classification BioHack (3).pdf
Biological Classification BioHack (3).pdfBiological Classification BioHack (3).pdf
Biological Classification BioHack (3).pdf
 
Hubble Asteroid Hunter III. Physical properties of newly found asteroids
Hubble Asteroid Hunter III. Physical properties of newly found asteroidsHubble Asteroid Hunter III. Physical properties of newly found asteroids
Hubble Asteroid Hunter III. Physical properties of newly found asteroids
 
Presentation Vikram Lander by Vedansh Gupta.pptx
Presentation Vikram Lander by Vedansh Gupta.pptxPresentation Vikram Lander by Vedansh Gupta.pptx
Presentation Vikram Lander by Vedansh Gupta.pptx
 
Nightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43b
Nightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43bNightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43b
Nightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43b
 
A relative description on Sonoporation.pdf
A relative description on Sonoporation.pdfA relative description on Sonoporation.pdf
A relative description on Sonoporation.pdf
 
G9 Science Q4- Week 1-2 Projectile Motion.ppt
G9 Science Q4- Week 1-2 Projectile Motion.pptG9 Science Q4- Week 1-2 Projectile Motion.ppt
G9 Science Q4- Week 1-2 Projectile Motion.ppt
 
Disentangling the origin of chemical differences using GHOST
Disentangling the origin of chemical differences using GHOSTDisentangling the origin of chemical differences using GHOST
Disentangling the origin of chemical differences using GHOST
 
SOLUBLE PATTERN RECOGNITION RECEPTORS.pptx
SOLUBLE PATTERN RECOGNITION RECEPTORS.pptxSOLUBLE PATTERN RECOGNITION RECEPTORS.pptx
SOLUBLE PATTERN RECOGNITION RECEPTORS.pptx
 
Engler and Prantl system of classification in plant taxonomy
Engler and Prantl system of classification in plant taxonomyEngler and Prantl system of classification in plant taxonomy
Engler and Prantl system of classification in plant taxonomy
 
Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |
Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |
Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |
 
Recombination DNA Technology (Nucleic Acid Hybridization )
Recombination DNA Technology (Nucleic Acid Hybridization )Recombination DNA Technology (Nucleic Acid Hybridization )
Recombination DNA Technology (Nucleic Acid Hybridization )
 
Work, Energy and Power for class 10 ICSE Physics
Work, Energy and Power for class 10 ICSE PhysicsWork, Energy and Power for class 10 ICSE Physics
Work, Energy and Power for class 10 ICSE Physics
 

Solutions for Coping with Privacy and Usability

  • 1. Prof. Dr. Isao EchizenDr. Sven Wohlgemuth Prof. Dr. Günter MüllerProf. Dr. Noboru Sonehara National Institute of Informatics, Tokyo, Japan University of Freiburg, Germany Solutions for Coping with Privacy and Usability - Privacy-compliant Disclosure of Personal Data to Third Parties - Contact: Dr. Sven WOHLGEMUTH – DAAD Postdoctoral Scholar at the Digital Content and Media Sciences Research Division TEL : 03-4212-2594 FAX : 03-3556-1916 (c/o Prof. Dr. Echizen) E-mail : wohlgemuth@nii.ac.jp WWW: www.nii.ac.jp Cloud Computing and Disclosure of Personal Data to 3rd Parties Service providers act as data consumers and data providers • Some service providers (e.g. advertisement company, online book store) offer on premise large databases and runtime environments with application framework • Services of cloud users’ run on service providers’ environment • Privacy promise: Service providers handle personal data according to the agreed upon privacy policy • Cloud users cannot enforce policy-compliant disclosure to 3rd parties • Cloud is a black box Safety of Data or Liveness of Services Controllable Disclosure of Personal Data by DETECTIVE Identity Management and Disclosure to 3rd Parties • Privacy by non-linkable credentials • All credentials and pseudonyms are based on secret key • All-or-nothing delegation Loss of control Digital Watermarking and Disclosure to 3rd Parties • Copyright protection by labeling digital content • Symmetric watermarking scheme: Both service providers get the same watermark Non-distinction of last data provider Evaluation: Proof-of-concept implementation for medical services with electronic health records (x-ray images) DETECTIVE: Protocols for Data Provenance • Ex-post enforcement of obligations by identifying last data provider • Linking the identities of data provider and consumer to disclosure by cryptographic commitments and digital watermarking • Verification by auditor due to delegated rights as watermarking key User Service providers Service providers Need medical help Therapy X-Ray Image of P Result … Driving licence Stella Freiburger Classes: ABE Friedrichstr. 50 D-79098 Freiburg Germany IP: 132.15.16.3 Driving licence Stella Freiburger Classes: ABE Friedrichstr. 50 D-79098 Freiburg Germany IP: 132.15.16.3 Driving licence Stella Freiburger Classes: ABE Friedrichstr. 50 D-79098 Freiburg Germany IP: 132.15.16.3 Driving licence Stella Freiburger Classes: ABE Friedrichstr. 50 D-79098 Freiburg Germany IP: 132.15.16.3 DC / DP Big Brother DC / DP Person Person Profile 1+2+… DP Profile 1+2+… Access control No usage control for the disclosure of personal data User d DP = Data provider DC = Data consumer d, d’ = Personal data Disclosure of personal data to third parties d, d’ d Service provider d, d’ d, d’ DP DC / DP DC / DP DC / DP DC Medical Data Local clinic Advertiser Medical Data Local clinic Advertise r Medical Data Local clinic Advertiser Clinic abroad Medical Data Local clinic Advertiser Clinic abroad Data Provenance AdvertiserClinic abroadPharm. company Pharm. company Usage Control by Data Provenance • Usage control: Enforcement of usage rules (obligations) • Data provenance: Information to determine the derivation history of data • In an audit, data provenance can be used to restore the information flow of personal data Data provider Data consumer Apply Tag Auditpr Data provider Verify Tag Data consumer Local clinic Advertiser Clinic abroad Patient (rights) Advertiser Clinic abroad Patient (rights) Local clinic Advertiser Clinic abroad Advertiser Clinic abroad Clinic abroad Advertiser 寿 Local clinic Advertiser Clinic abroad Clinic abroad Advertiser 寿 Pharmaceutical company Advertiser Clinic abroad Local clinic Advertiser Clinic abroad Local clinic Advertiser Clinic abroad Local clinic