skip to main content
10.1145/1102486.1102495acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
Article

Cryptographic alias e-mail addresses for privacy enforcement in business outsourcing

Published: 11 November 2005 Publication History

Abstract

This paper proposes a method of anonymizing e-mail addresses for privacy enforcement in business outsourcing. By means of a cryptographic encoding scheme, the method generates an alias address containing a tracking ID for traceability and revocation. This feature helps an enterprise identify leakage path and revoke a cluster of leaked alias addresses in case of an address leakage incident.

References

[1]
A news article on November 19 2003, Nikkei Computer, http://itpro.nikkeibp.co.jp/free/ NC/NEWS/20031119/136657/
[2]
A news article on March 26 2004, Nikkei IT Pro, http://itpro.nikkeibp.co.jp/free/ITPro/NEWS/ 20040326/142021/
[3]
General Principles for the Protection of Personal Data, a law in Japan, 2003
[4]
Guidelines for the Protection of Personal Data in Financial Areas, Financial Services Agency in Japan
[5]
Guidelines about Laws concerning the Protection of Personal Data for Commerce and Trade Areas, Ministry of Economy, Trade, and Industry
[6]
Guidelines for the Adequate Handling of Personal Data by Medical and Healthcare Businesses, Ministry of Health, Labour, and Welfare
[7]
C.S. Powers, Paul Ashley, and Matthias Schunter, Privacy Promises, Access Control, and Privacy Management, Proc. of the 3rd Int. Symp. on Electronic Commerce (ISEC '02)
[8]
Gunter Karjoth, and Matthias Schunter, A Privacy Model for Enterprises, Proc. of the 15th IEEE Computer Security Foundations Workshop (CSFW 02)
[9]
IBM, Enterprise Privacy Authorization Language (EPAL 1.1), http://www.zurich.ibm.com/ security/ enterprise-privacy/epal/ Specification/index.html
[10]
Dickson K. W. Chiu and Patrick C. K. Hung, Privacy and Access Control in Financial Enterprise Content Management, Proc. of the 38th Hawaii International Conference on System Sciences (2005)
[11]
Elisa Bertino, Beng Chin Ooi, Yanjiang Yang, and Robert H. Deng, Privacy and Ownership Preserving of Outsourced Medical Data, Proc. of the 21st Int. Conf. on Data Engineering (ICDE 2005)
[12]
Radu Sion, Mikhail Atallah, and Sunil Prabhakar, Rights Protection for Relational Data, IEEE Trans. on Knowledge and Data Engineering, Vol. 16, No. 12, 2004
[13]
David L. Chaum, Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms, Communications of ACM, Vol. 24, No. 2, 1981
[14]
Jean-Marc Seigneur and Christian Damsgaard Jensen, Privacy Recovery with Disposable Email Address, IEEE Security and Privacy, 2003
[15]
K. Aoki, T. Ichikawa, M. Kanda, M. Matsui, S. Moriai, J. Nakajima, and T. Tokita. Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms, http://info.isl.ntt.co.jp/camellia/Publications/camellia.pdf, 2000

Cited By

View all
  • (2020)No Phishing With the Wrong Bait: Reducing the Phishing Risk by Address Separation2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)10.1109/EuroSPW51379.2020.00093(646-652)Online publication date: Sep-2020
  • (2009)Autonomic E-mail Services for Better Storage ManagementProceedings of the 2009 World Conference on Services - II10.1109/SERVICES-2.2009.13(25-32)Online publication date: 21-Sep-2009
  • (2009)Scalable Client Features to Handle High Volume E-mailProceedings of the 2009 International Conference on Scalable Computing and Communications; Eighth International Conference on Embedded Computing10.1109/EmbeddedCom-ScalCom.2009.59(291-297)Online publication date: 25-Sep-2009
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
DIM '05: Proceedings of the 2005 workshop on Digital identity management
November 2005
120 pages
ISBN:1595932321
DOI:10.1145/1102486
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 11 November 2005

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. anonymous
  2. disposable address
  3. e-mail
  4. outsourcing
  5. privacy
  6. pseudonymous
  7. watermarking

Qualifiers

  • Article

Conference

CCS05
Sponsor:

Acceptance Rates

Overall Acceptance Rate 16 of 34 submissions, 47%

Upcoming Conference

CCS '25

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)2
  • Downloads (Last 6 weeks)1
Reflects downloads up to 15 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2020)No Phishing With the Wrong Bait: Reducing the Phishing Risk by Address Separation2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)10.1109/EuroSPW51379.2020.00093(646-652)Online publication date: Sep-2020
  • (2009)Autonomic E-mail Services for Better Storage ManagementProceedings of the 2009 World Conference on Services - II10.1109/SERVICES-2.2009.13(25-32)Online publication date: 21-Sep-2009
  • (2009)Scalable Client Features to Handle High Volume E-mailProceedings of the 2009 International Conference on Scalable Computing and Communications; Eighth International Conference on Embedded Computing10.1109/EmbeddedCom-ScalCom.2009.59(291-297)Online publication date: 25-Sep-2009
  • (2008)Assessing anti-phishing preparednessDecision Support Systems10.1016/j.dss.2008.03.00145:4(897-912)Online publication date: 1-Nov-2008
  • (2006)Internet Shopping System using Cryptographic ID Technology and ID Compression Methods2006 International Conference on Software in Telecommunications and Computer Networks10.1109/SOFTCOM.2006.329775(315-319)Online publication date: Sep-2006

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media