Skip to main content

Towards a Privacy Preserving e-Commerce Protocol

  • Conference paper
Book cover E-Commerce and Web Technologies (EC-Web 2004)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 3182))

Included in the following conference series:

Abstract

Every time a user performs a transaction over the Internet, a wealth of personal information is revealed, either voluntarily or involuntarily. This causes serious breach of privacy for the user, in particular, if the personally identifying information is misused by the different players involved in the transaction. Ideally, therefore, the user would like to have a considerable degree of control over what personal information to reveal and to whom. In this paper we propose a new e-commerce protocol that helps the user protect her privacy while purchasing products over the Internet. The proposed scheme provides a flexible and powerful approach for the secure handling of private data and offers the user considerable control over how she wishes to disseminate her personal data.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. The anonymizer, http://anonymizer.com

  2. Ackerman, M.S., Cranor, L.F., Reagle, J.: Privacy in e-commerce: Examining user scenarios and privacy preferences. In: Proceedings of the 1st ACM Conference on Electronic Commerce, Denver, Colorado, pp. 1–8 (1999)

    Google Scholar 

  3. Kobsa, A., Schreck, J.: Privacy through pseudonymity in user-adaptive systems. ACM Transactions on Internet Technology 3(2), 149–183 (2003)

    Article  Google Scholar 

  4. Berthold, O., Federrath, H., Kohntopp, M.: Project anonymity and unobservability in the internet. In: Proceedings of the Workshop on Freedom and Privacy by Design / Conference on Freedom and Privacy 2000 CFPI, Toronto, Canada, April 4-7, pp. 57–65 (2000)

    Google Scholar 

  5. Boucher, P., Shostack, A., Goldberg, I.: Freedom systems 2.0 architecture (December 2000), http://www.freedom.net/info/whitepapers/Freedom_System_2_Architecture.pdf

  6. Molina-Jimenez, C., Marshall, L.: True anonymity without mixes. In: Proceedings of the Second Annual Workshop on Internet Applications, 2001, WIAPP 2001, July 2001, pp. 32–40 (2001)

    Google Scholar 

  7. Chaum, D.L.: Untraceable electronic mail, return address, and digital pseudonyms. Communications of the ACM 24(2), 84–88 (1981)

    Article  Google Scholar 

  8. Kristol, D.M.: Http cookies: Standards, privacy, and policies. ACM Transactions on Internet Technology 1(2), 151–198 (2001)

    Article  Google Scholar 

  9. Cranor, L.F., et al.: The platform for privacy preferences 1.1(p3p 1.1) specification. W3C Consortium (February 2004), http://www.w3.org/TR/2004/WD-P3P11-20040210

  10. Millet, L.I., Friedman, B., Felton, E.: Cookies and web browser design: Toward realizing informed consent online. In: Proccedings of the ACM SIGCHI Conference on Human Factors In Computing Systems, March 2001, pp. 46–52 (2001)

    Google Scholar 

  11. Freedman, M.J., Morris, R.: Tarzan: A peer-to-peer anonymizing network layer. In: Proceedings of the Ninth ACM Conference on Computer and Communications Security (CCS 2002), November 2002, pp. 193–206 (2002)

    Google Scholar 

  12. Reiter, M.K., Rubin, A.D.: Crowds: Anonymity for web transactions. ACM Transactions on Information and Systems Security 1(1), 66–92 (1998)

    Article  Google Scholar 

  13. Rennhard, M., et al.: An architecture for an anonymity network. In: Proceedings of the 10th IEEE International. Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2001), June 2001, pp. 165–170 (2001)

    Google Scholar 

  14. Rennhard, M., et al.: Analysis of an anonymity network for web browsing. In: Proceedings of the 11th IEEE International. Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2002), June 2002, pp. 49–54 (2002)

    Google Scholar 

  15. Clarke, R.: Introduction to dataveillance and information privacy, and definition of terms. Web Page (September 1999), http://www.anu.edu.au/people/Roger.Clarke/DV/Intro.html

  16. Srinivasan, S.: On piracy and privacy. IEEE: Computer, 36–38 (July 2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Ray, I., Geisterfer, M. (2004). Towards a Privacy Preserving e-Commerce Protocol. In: Bauknecht, K., Bichler, M., Pröll, B. (eds) E-Commerce and Web Technologies. EC-Web 2004. Lecture Notes in Computer Science, vol 3182. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30077-9_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-30077-9_16

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-22917-9

  • Online ISBN: 978-3-540-30077-9

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics