• DocumentCode
    2939809
  • Title

    Harnessing Pseudonyms with Implicit Attributes for Privacy-Respecting Mission Log Analysis

  • Author

    Weber, Stefan G.

  • Author_Institution
    Telecooperation Group, Tech. Univ. Darmstadt, Darmstadt, Germany
  • fYear
    2009
  • fDate
    4-6 Nov. 2009
  • Firstpage
    119
  • Lastpage
    126
  • Abstract
    Many applications in the area of collaborative work can be enhanced by tracking users regularly. Consider a future emergency management application, in which mobile first responders are continuously tracked in order to support a better coordination of the rescue missions and to create a mission log. However, continuous tracking of individuals and storing the data for later use is often in conflict with individual privacy preferences. Therefore, it is a challenge to deal with conflicting traceability and privacy protection requirements. A common way to implement some kind of privacy protection is to use pseudonyms instead of fixed IDs for each user. However, in order to build a multilateral secure and acceptable solution, a more complex system design w.r.t. to pseudonym linkability is required, that also allows third parties to analyze the logs for organizational and legal reasons. In this paper, we present our approach to deal with this issue: we propose to encode additional information into pseudonyms that are used in location tracking systems and stored in data logs. Our concept comprises both access rights for the user herself and implicit attributes that may be verified by third parties in a privacy-respecting manner. We introduce the cryptographic constructions, which employ cryptographically secure pseudorandom number generators, threshold cryptography and techniques for securely evaluating encrypted data. Moreover, in this paper, we sketch a practical application example in the area of emergency mission log analysis and discuss the main security properties of our concepts.
  • Keywords
    cryptography; data privacy; groupware; mobile computing; random number generation; collaborative work; cryptographically secure pseudorandom number generators; data encryption evaluation; emergency management application; location tracking systems; mobile first responders; privacy protection; privacy-respecting mission log analysis; pseudonyms; threshold cryptography; Collaborative work; Cryptography; Data privacy; Data security; Disaster management; Intrusion detection; Law; Legal factors; Permission; Protection;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Intelligent Networking and Collaborative Systems, 2009. INCOS '09. International Conference on
  • Conference_Location
    Barcelona
  • Print_ISBN
    978-1-4244-5165-4
  • Electronic_ISBN
    978-0-7695-3858-7
  • Type

    conf

  • DOI
    10.1109/INCOS.2009.40
  • Filename
    5370929