Abstract
Privacy-Enhancing Identity Management (PIM) enables users to control which personal data they provide to whom by partitioning this information into subsets called partial identities. Since these partial identities should not be linkable except by their owner, randomly generated pseudonyms that are unique are used as their identifiers instead of real names. Randomly generated pseudonyms do not leak any information about the corresponding user, but their handling is not easy for human beings. Users should therefore be enabled to assign local aliases according to their individual preferences to such pseudonyms to allow for a better recognizability in interaction scenarios. However, the use of local aliases requires a reasonable support to ensure both privacy and usability.
This paper introduces an architecture that enables users to manage local aliases in a reasonable and usable way. Possible solutions for alias assignment, alias improvement, and replacement between aliases and pseudonyms are discussed. The suggested approach was realized within a collaborative eLearning environment but is also applicable for other collaborative applications.
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Borcea, K., et al.: Intra-Application Partitioning of Personal Data. In: Proc. of PEP, Edinburgh, UK, pp. 67–74 (2005)
Borcea, K., Franz, E., Pfitzmann, A.: Usable Presentation of Secure Pseudonyms. In: Proc. of DIM 2005, Alexandria, Virginia, USA (November 2005)
Borcea-Pfitzmann, K., Liesebach, K.: The Concept of Workspaces – Re-defined for eLearning. Advanced Technology for Learning (ATL) International Journal, Special Issue on Technology for Collaborative Learning 4(1) (2007)
Clauß, S., et al.: Privacy Enhancing Identity Management: Protection Against Re-identification and Profiling. In: Proc. of DIM 2005, Alexandria, Virginia, USA (November 2005)
Clauß, S., Pfitzmann, A., Hansen, M., Herreweghen, E.V.: Privacy-Enhancing Identity Management. The IPTS Report 67, 8–16 (2002), http://www.jrc.es/pages/iptsreport/vol67/english/IPT2E676.html
Eurobarometer. Flash Eurobarometer, Citizens’ perceptions, N225 (2008)
Franz, E., Groba, C., Springer, T., Bergmann, M.: A Comprehensive Approach for Context-dependent Privacy Management. In: Proc. of ARES 2008, Barcelona (2008)
Kobsa, A.: Privacy-enhanced web personalization. In: Brusilovsky, P., Kobsa, A., Nejdl, W. (eds.) Adaptive Web 2007. LNCS, vol. 4321, pp. 628–670. Springer, Heidelberg (2007)
Levenshtein algorithm website, http://www.levenshtein.net
Narayanan, A., Shmatikov, V.: De-anonymizing Social Networks. To appear at IEEE Security & Privacy 2009 (2009), http://randomwalker.info/social-networks/
Novak, J., Raghavan, P., Tomkins, A.: Anti-Aliasing on the Web. In: Proceedings of the 13th Int. Conference on the World Wide Web, pp. 30–39 (2004)
Pfitzmann, A., Hansen, M.: Anonymity, unlinkability, undetectability, unobservability, pseudonymity, and identity management – a consolidated proposal for terminology, v0.31, http://dud.inf.tu-dresden.de/Anon_Terminology.shtml
Rao, J.R., Rohatgi, P.: Can Pseudonymity Really Guarantee Privacy? In: Proc. of the 9th USENIX Security Symposium, August 2000, pp. 85–96 (2000)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Franz, E., Liesebach, K. (2009). Supporting Local Aliases as Usable Presentation of Secure Pseudonyms. In: Fischer-Hübner, S., Lambrinoudakis, C., Pernul, G. (eds) Trust, Privacy and Security in Digital Business. TrustBus 2009. Lecture Notes in Computer Science, vol 5695. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-03748-1_3
Download citation
DOI: https://doi.org/10.1007/978-3-642-03748-1_3
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-03747-4
Online ISBN: 978-3-642-03748-1
eBook Packages: Computer ScienceComputer Science (R0)