Abstract
When considering information security and privacy issues most of the attention has previously focussed on data protection and the privacy of personally identifiable information (PII). What is often overlooked is consideration for the operational and transactional data. Specifically, the security and privacy protection of metadata and metastructure information of computing environments has not been factored in to most methods. Metadata, or data about data, can contain many personal details about an entity. It is subject to the same risks and malicious actions personal data is exposed to. This paper presents a new perspective for information security and privacy. It is termed Meta Privacy and is concerned with the protection and privacy of information system metadata and metastructure details. We first present a formal definition for meta privacy, and then analyse the factors that encompass and influence meta privacy. In addition, we recommend some techniques for the protection of meta privacy within the information systems. Further, the paper highlights the importance of ensuring all informational elements of information systems are adequately protected from a privacy perspective.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Schwartz, P.M.: Privacy and Democracy in Cyberspace. 52 VAND. L. REV. 1609, 1610–1611 (1999)
Agrawal, R., Kiernan, J., Srikant, R., Xu, Y.: Hippocratic Databases. In: Proceedings of the 28th VLDB Conference, Hong Kong, China (2002)
Hes, R., Borking, J.: Privacy-Enhancing Technologies: The path to anonymity. Registratiekamer, The Hague (August 2000)
Goldberg, I.: Privacy-enhancing technologies for the Internet, II: Five years later. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, vol. 2482, pp. 14–15. Springer, Heidelberg (2003)
Clarke, R.: Introduction to Dataveillance and Information Privacy, and Definitions and Terms (1999), http://www.anu.edu.au/people/Roger.Clarke/DV/Intro.html
Common Criteria: Common Criteria for Information Technology Evaluation (January 2004), http://www.commoncriteria.org
W3C: The platform for privacy preferences 1.0 (P3P1.0) specification. W3C Proposed Recommendation (January 2002), http://www.w3.org/TR/P3P
Webopedia: Definition of Metadata – What is Metadata (1998), http://www.webopedia.com/TERM/m/metadata.html
Massacci, F., Zannone, N.: Privacy is Linking Permission to Purpose. Technical Report University of Trento, Italy (2004)
Clarke, R.: Internet Privacy Concerns Confirm the Case for Intervention. ACM 42(2), 60–67 (1999)
Rice, F.C.: Protecting Personal Data in your Microsoft Word Documents. MSDN Online Article (August 2002), http://msdn.microsoft.com/library/default.asp?url=/library/en-us/dnword2k2/html/odc_ProtectWord.asp
Extensible Markup Language (XML), World Wide Web Consortium (W3C), http://www.w3.org/XML/
Ceravolo, P., Damiani, E., De Capitani di Vimercati, S., Fugazza, C., Samarati, P.: Advanced Metadata for Privacy-Aware Representation of Credentials. In: PDM 2005, Tokyo, Japan, April 9 (2005)
RDF Vocabulary Description Language (RDFS). World Wide Web Consortium, http://www.w3.org/TR/rdf-schema/
Web Ontology Language (OWL). World Wide Web Consortium, http://w3.org/2004/OWL/
Agrawal, R., Kini, A., LeFevre, K., Wang, A., Xu, Y., Zhou, D.: Managing Healthcare Data Hippocratically. In: Proc. of ACM SIGMOD Intl. Conf. on Management of Data (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Skinner, G., Han, S., Chang, E. (2005). A New Conceptual Framework Within Information Privacy: Meta Privacy. In: Hao, Y., et al. Computational Intelligence and Security. CIS 2005. Lecture Notes in Computer Science(), vol 3802. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11596981_8
Download citation
DOI: https://doi.org/10.1007/11596981_8
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-30819-5
Online ISBN: 978-3-540-31598-8
eBook Packages: Computer ScienceComputer Science (R0)