• DocumentCode
    3232489
  • Title

    Shield privacy Hippocratic security method for virtual community

  • Author

    Skinner, G. ; Chang, E. ; McMahon, M. ; Aisbett, J. ; Miller, M.

  • Author_Institution
    Sch. of Inf. Syst., Curtin Univ. of Technol., WA, Australia
  • Volume
    1
  • fYear
    2004
  • fDate
    2-6 Nov. 2004
  • Firstpage
    472
  • Abstract
    Pearlman et al., (2002) defines a virtual community as a large, multiinstitutional group of individuals who use a set of rules, a policy, to specify how to share their resources. With such a large collection of data stores in these resources, each of which could be data mined to different degrees, the privacy of each of the individuals needs to be protected. Within a virtual community, especially one also used to facilitate knowledge discovery, there are a number of privacy issues that must be addressed and resolved in ways other than through privacy laws and policies alone. This is due to the fact that, as to date, these laws have proved mainly ineffective and there is an ever growing concern by individuals about their privacy. Web surveys Srikant R. (2002) have identified that 82% of users have said improved privacy policies and methods would matter in Web environments. Agarwal R. (2002) highlights the fact that a secure collaborative environment, such as a virtual community, needs to provide authentication, authorization, privacy and data integrity. In this paper, we identify the technology issues, followed by the presentation of our proposed solution. We provide a conceptual framework of the Hippocratic security method to provide information security for shield privacy in virtual communities and we describe the architecture and design of the proposed solution. We outline the implementation, testing and evaluation strategies of our solutions. The proposed solution shall monitor the use of personal information as it is passed around the virtual community and protected information paths, data at rest, database and information resources through the use of the Hippocratic database principle to enforce Hippocratic security policies and procedures together with privacy preserving data mining Evfimievski et al., (2003) method for excellent information security in a virtual community environment.
  • Keywords
    authorisation; data integrity; data mining; data privacy; information resources; message authentication; very large databases; virtual reality; Hippocratic database principle; Hippocratic security method; Web surveys; authentication; collaborative environment; data collection; data integrity; data mining; data protection; information resources; information security; knowledge discovery; multiinstitutional group; privacy issues; privacy laws; shield privacy; virtual community; Authentication; Authorization; Collaboration; Data privacy; Data security; Databases; Information resources; Information security; Protection; Testing;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Industrial Electronics Society, 2004. IECON 2004. 30th Annual Conference of IEEE
  • Print_ISBN
    0-7803-8730-9
  • Type

    conf

  • DOI
    10.1109/IECON.2004.1433355
  • Filename
    1433355