Skip to main content

Management of Private Data: Addressing User Privacy and Economic, Social, and Ethical Concerns

  • Conference paper
Secure Data Management (SDM 2004)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 3178))

Included in the following conference series:

  • 411 Accesses

Abstract

Coordinated Web services can help alleviate user’s privacy and economic, social, and ethical concerns that arise from third parties’ access and use of user private data. This paper focuses on the requirements and design of such services in support of a client-side private data management system. Appropriate management of private data on the client side can both educate and assure users that their privacy is well guarded, and that their private data is being used by entities which satisfy economic and/or ethical user concerns. Our solutions describe novel Web services, interaction with P3P agents, and a client-side privacy architecture. A preliminary prototype implementation of our Web services using standard UDDI, SOAP, and WSDL technologies and rudimentary delay estimates are briefly discussed.

This work was supported in part by the Canadian National Science and Engineering Research Council (NSERC) Grant #203111.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Agrawal, R., Kiernan, J., Srikant, R., Xu, Y.: Implementing P3P Using Database Technology. In: 19th IEEE International Conference on Data Engineering, India, pp. 595–606 (2003)

    Google Scholar 

  2. Aggarwal, G., Bawa, M., Ganesan, P., Garcia-Molina, H., Kenthapadi, K., Mishra, N., Motwani, R., Srivastava, U., Thomas, D., Widom, J.: Vision Paper: Enabling Privacy for the Paranoids (2004), available at http://dbpubs.stanford.edu:8090/pub/2004-11

  3. Brandt, A.: Privacy Watch: A Little Bird That Guards Your Online Privacy. PCWorld (December 2002), Also: http://privacybird.com

  4. Bayers, S., Cranor, L., Kormann, D.: Automated Analysis of P3P-Enabled Web Sites. In: Proceedings of the 5th International Conference on Electronic Commerce (ICEEC 2003), ACM Press, New York (2003), http://lorrie.cranor.org/pubs/icec03.html

    Google Scholar 

  5. Bayers, S., Cranor, L.F., Lormann, D., McDaniel, P.: Searching for Privacy: Desing and Implementation of a P3P-Enabled Search Engine. In: Martin, D., Serjantov, A. (eds.) PET 2004. LNCS, vol. 3424, pp. 314–328. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  6. Bodorik, P., Jutla, D.N.: Architecture for User-controlled e-Privacy. In: ACM Symposium on Applied Computing, SAC 2003, Technical Track on E-commerce Technologies, pp. 609–616 (2003)

    Google Scholar 

  7. Cingil, I.: Supporting Global User Profiles Through Trusted Authorities. SIGMOD Record 31(1), 1–17 (2002)

    Article  Google Scholar 

  8. Cranor, F.L., Arjula, M., Guduru, P.: Use of a P3P User Agent by Early Adopters. In: Proceedings of the ACM Workshop on Privacy in the Electronic Society (November 2002)

    Google Scholar 

  9. Cranor, F.L.: P3P: Making Privacy Policies More Useful. IEEE Security & Privacy, 50–55 (November/December 2003)

    Google Scholar 

  10. Consumers Will Reshape the Future of CRM Marketing (December 2003)

    Google Scholar 

  11. He, Y.: On-line Negotiation of Private Data. Technical Report SMU-CIS-04, Saint Mary’s University, Halifax, Nova Scotia (2004)

    Google Scholar 

  12. Jendricke, U., Gerd tom Markotten, D.: Usability meets Security – The Identity-Manager as your Personal Security Agent for the Internet. In: 16th Annual Computer Security Applications Conference, New Orleans, Louisiana, pp. 11–15 (2000)

    Google Scholar 

  13. JRC P3P Demonstrator Project: Introduction, http://p3p.jrc.it/presentations.27Mayintro.ppt (last viewed January 12, 2004))

  14. JRContology – Ontology for Data Protection (PRONTO) (2004), http://p3p.jrc.it/presentations/OntologyEOI.doc (last viewed January 12, 2004)

  15. Jutla, D.N.: Online Trust Models:Is Privacy In or Out,? In: Sharma, S.K., Gupta, J. (eds.) e-Business in the 21st Century, pp. 313–336. IDEAS Publishing, Heidelberg Press, Australia (2003)

    Google Scholar 

  16. Jutla, D.N., Bodorik, P.: Socio-Technical Architecture for Online Privacy. IEEE Security and Privacy, accepted (2004a) (in press)

    Google Scholar 

  17. Jutla, D.N., Bodorik, P.: PeCAN: An Architecture for User Privacy and Profiles in Electronic Commerce Contexts on the Semantic Web. Information Systems (2004b) (conditionally accepted)

    Google Scholar 

  18. Jutla, D.N., Kelloway, E.K., Saifi, S.: Evaluation of the Impact of User Intervention Mechanisms for Privacy on Online SME Trust. In: IEEE Conference on E-Commerce, San Diego, July 2004, 8 pages (2004a) (to appear July 2004)

    Google Scholar 

  19. Jutla, D.N., Das, H., Weatherbee, T.: Adding Cultural Variables to a Web Privacy Ontology. In: IADIS e-Society 2004, Avila, Spain, 8 pages (2004b) (to appear July 2004)

    Google Scholar 

  20. Kim, A., Joffman, L.J., Martin, C.D.: Building Privacy into the Semantic Web: An Ontology Needed Now. In: Semantic Web Workshop 2002, Hawaii USA (2002)

    Google Scholar 

  21. Novak, T.P., Hoffman, D.L., Peralta, M.: Building consumer trust online. Communications of the ACM 42(4), 80–85 (2000)

    Google Scholar 

  22. P3P, Platform for Privacy Preferences Project (2004), http://www.w3.org/P3P/ (last viewed on January 12, 2004)

  23. Rezgui, A.M., Eltoweissy, M.Y.: Privacy on the Web: Facts, Challenges, and Solutions. IEEE Security and Privacy, 40-49 (November/December 2003)

    Google Scholar 

  24. Spiekermann, S., Grossklags, J., Berendt, B.: e-Privacy in 2nd Generation Commerce: Privacy Preferences versus Actual Behavior. In: ACM Conference on Electronic Commerce, Florida, USA, October 14-17, pp. 38–47 (2001)

    Google Scholar 

  25. Tumer, A., Dogac, A., Toroslu, H.: A Semantic based Privacy Framework for Web Services. In: WWW 2003 WorkShop on e-Services and the Semantic Web, ESSW 2003, Budapest, Hungary (2003)

    Google Scholar 

  26. W3C WSDL (2003); Web Services Description Language Version 2.0 Part 1: Core Language, Working Draft (November 10, 2003), available at http://www.w3.org/TR/2003/WD-wsdl20-20031110/

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Jutla, D., Bodorik, P., Gao, D. (2004). Management of Private Data: Addressing User Privacy and Economic, Social, and Ethical Concerns. In: Jonker, W., Petković, M. (eds) Secure Data Management. SDM 2004. Lecture Notes in Computer Science, vol 3178. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30073-1_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-30073-1_8

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-22983-4

  • Online ISBN: 978-3-540-30073-1

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics