2009 International Conference on Intelligent Networking and Collaborative Systems 2009
DOI: 10.1109/incos.2009.40
|View full text |Cite
|
Sign up to set email alerts
|

Harnessing Pseudonyms with Implicit Attributes for Privacy-Respecting Mission Log Analysis

Abstract: Abstract-Many applications in the area of collaborative work can be enhanced by tracking users regularly. Consider a future emergency management application, in which mobile first responders are continuously tracked in order to support a better coordination of the rescue missions and to create a mission log. However, continuous tracking of individuals and storing the data for later use is often in conflict with individual privacy preferences. Therefore, it is a challenge to deal with conflicting traceability a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2010
2010
2023
2023

Publication Types

Select...
2
2
1

Relationship

2
3

Authors

Journals

citations
Cited by 7 publications
(7 citation statements)
references
References 26 publications
(28 reference statements)
0
7
0
Order By: Relevance
“…This scenario has the same weakness as the other pseudonymisers, since it may be vulnerable to trac analysis attacks in the intervals between rekeying of the pseudonymiser. Some of the ideas in this scheme have been extended to support multilaterally secure ubiquitous auditing in [27,26]. It combines transaction pseudonyms based on threshold cryptography with secure multiparty computations to support secure and privacy enhanced tracking of mobile rescue units.…”
Section: Related Workmentioning
confidence: 99%
“…This scenario has the same weakness as the other pseudonymisers, since it may be vulnerable to trac analysis attacks in the intervals between rekeying of the pseudonymiser. Some of the ideas in this scheme have been extended to support multilaterally secure ubiquitous auditing in [27,26]. It combines transaction pseudonyms based on threshold cryptography with secure multiparty computations to support secure and privacy enhanced tracking of mobile rescue units.…”
Section: Related Workmentioning
confidence: 99%
“…Also, we assume that potential receivers of messages continuously provide location information to the system. In order to deal with the inherent privacy issues [20,21] of this situation, we propose that location tracking proceeds under transaction pseudonyms. Yet, we also provide a technique for reidentification of role or specialization attributes implicitly attached to pseudonyms.…”
Section: Sketch Of Approachmentioning
confidence: 99%
“…First, in order to generate transaction pseudonyms, a base pseudonym PU i ,B of a user Ui is initially created as an ElGamal encryption of an algebraic representation of the unique base identifier IDi (cp. [20,21]). Thus, ID ∈ Gq is non-deterministically encrypted by choosing r ∈R Zq and by computing (g r , h r IDi).…”
Section: Technique For Re-identificationmentioning
confidence: 99%
“…by sending their GPS positions and further data to a headquarter, a precise coordination of rescue missions is possible [53] and vital signs of first responders can be monitored. Moreover, units can act as mobile sensors to monitor levels of air pollution, also mission auditing can be supported by creating digital mission logs based on the collected GPS traces [52].…”
Section: Perspective: Mission-critical Applicationsmentioning
confidence: 99%
“…We believe that it is a major challenge to design data security mechanisms that allow to reconcile the conflicting goals of accountability for legal and organizational reasons and individual privacy protection [55,54,52]. …”
Section: Inherent Tradeoff: Privacy Versus Accountabilitymentioning
confidence: 99%