Abstract
The evolution of mobile devices, the success of social networks, and the digitalization of business/personal services have resulted in a huge and continuous production of Personal Data (PD). The creation of a balanced ecosystem of PD, where data act as the fuel for novel application scenarios, may drive the shift toward a user-centric paradigm, in which constraints should be imposed on the data usage, to protect the individuals’ privacy. The possibility for people to directly collect, manage and exploit PD introduces both technical and regulatory new issues in PD management. Uncertainty especially arises in the case of PD related to multiple subjects, e.g., containing identifiers referring to more than one person, each of which holds rights to control how these PD are treated. In this paper, we refer to this kind of valuable data as Multiple Subjects Personal Data (MSPD). The protection of MSPD in a user-centric paradigm is an undeniable requirement to ensure privacy to all MSPD right-holders. We discuss the relevance of MSPD, providing a technical approach to regulate their trusted management in a user-centric model context.
The research leading to these results has received funding from the European Union Seventh Framework Programme (FP7/2007-2013) under grant no 610853 (CoCo-Cloud) and the Registro.it funded project MobiCare.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Al-Shaer, E.S., Hamed, H.H.: Firewall policy advisor for anomaly discovery and rule editing. In: IFIP/IEEE Integrated Network Management, pp. 17–30 (2003)
ARTICLE 29 DATA PROTECTION WP136, Opinion 04/2007 on the concept of Personal Data, http://goo.gl/8hO9m (last checked February 21, 2014)
ARTICLE 29 WP191, Opinion 01/2012 on data protection reform proposals (2012), http://goo.gl/9tMKa (last checked February 21, 2014)
ARTICLE 29 WP196, Opinion 05/2012 on Cloud Computing (2012), http://goo.gl/tvKNG (last checked February 21, 2014)
ARTICLE 29 WP199, Opinion 08/2012 providing further input on the data protection reform discussion (2012), http://goo.gl/1AJXB (last checked February 21, 2014)
Brandimarte, L., Acquisti, A., Loewenstein, G., Babcock, L.: Privacy concerns and information disclosure: An illusion of control hypothesis. In: CIST (2010)
Brodie, C., et al.: An Empirical Study of Natural Language Parsingof Privacy Policy Rules using the SPARCLE Policy Workbench. In: SOUPS. ACM (2006)
Brodie, C., et al.: The Coalition Policy Management Portal for PolicyAuthoring, Verification, and Deployment. In: POLICY, pp. 247–249 (2008)
Camenisch, J., Dubovitskaya, M., Lehmann, A., Neven, G., Paquin, C., Preiss, F.-S.: Concepts and Languages for Privacy-Preserving Attribute-Based Authentication. In: Fischer-Hübner, S., de Leeuw, E., Mitchell, C. (eds.) IDMAN 2013. IFIP AICT, vol. 396, pp. 34–52. Springer, Heidelberg (2013)
Chaum, D.: Blind signatures for untraceable payments. Advances in Cryptology Proceedings of Crypto 82(3), 199–203 (1983)
Conti, R., Matteucci, I., Mori, P., Petrocchi M.: An Expertise-driven Authoring Tool of Privacy Policies for e-Health. Technical Report IIT TR-02/2014
de Montjoye, Y.A., Wang, S.S., Pentland, A.: On the trusted use of large-scale personal data. IEEE Data Eng. Bull. 35(4), 4, 5–8
Directive 95/46/EC of the European Parliament and of Council, Official Journal of the European Union, L281/31 (November 23, 1995)
Directive 2009/136/EC of the European Parliament and of the Council. Official Journal of the European Union, L337/11 (November 25, 2009)
Dunlop, N., et al.: Methods for conflict resolution in policy-based management systems. In: IEEE Enterprise Distributed Object Computing, pp. 98–109 (2003)
Hall-May, M., Kelly, T.: Towards conflict detection and resolution of safety policies. In: Intl. System Safety Conf. (2006)
Hardjono, T., Greenwood, D., Pentland, A.: Towards a Trustworthy Digital Infrastructure for Core Identities and Personal Data Stores. Global Forum on Identity (2013)
Jin, J., Ahn, G.-J., Hu, H., Covington, M.J., Zhang, X.: Patient-centric authorization framework for electronic healthcare services. Computers & Security 30(2-3), 116–127
Johnson, M., et al.: Optimizing a policy authoring framework for security and privacy policies. In: SOUPS, pp. 8:1–8:9. ACM (2010)
Jøsang, A., Pope, S.: User centric identity management. In: AusCERT Asia Pacific Information Technology Security Conference (2005)
Kan, Y., Jia, X., Ren, K.: DAC-MACS: Effective Data Access Control for Multi-Authority Cloud Storage Systems. IACR Cryptology ePrint Archive, 419 (2012)
Karat, J., Karat, C.-M., Brodie, C., Feng, J.: Designing Natural Language and Structured Entry Methods for Privacy Policy Authoring. In: Costabile, M.F., Paternó, F. (eds.) INTERACT 2005. LNCS, vol. 3585, pp. 671–684. Springer, Heidelberg (2005)
Korba, L., Kenny, S.: Towards Meeting the Privacy Challenge: Adapting DRM. In: Feigenbaum, J. (ed.) DRM 2002. LNCS, vol. 2696, pp. 118–136. Springer, Heidelberg (2003)
Leenes, R., Schallaböck, J., Hansen, M.: PRIME White Paper, Version 3. PRIME Project (2008)
Liu, X., Zhang, Y., Wang, B., Yan, J.: Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud. IEEE Trans. Parallel Distrib. Syst. 24(6), 1182–1191
Lunardelli, A., Matteucci, I., Mori, P., Petrocchi, M.: A Prototype for Solving Conflicts in XACML-based e-Health Policies. In: Proc. 26th IEEE International Symposium on Computer-Based Medical Systems, pp. 449–452 (2013)
Lupu, E.C., Sloman, M.: Conflicts in policy-based distributed systems management. IEEE Trans. Softw. Eng. 25(6), 852–869 (1999)
McDonald, A., Cranor, L.: The cost of reading privacy policies. ISJLP 4, 543 (2008)
Masoumzadeh, A., Amini, M., Jalili, R.: Conflict detection and resolution in context-aware authorization. In: IEEE SNDS, pp. 505–511 (2007)
Matteucci, I., Mori, P., Petrocchi, M.: Prioritized Execution of Privacy Policies. In: Di Pietro, R., Herranz, J., Damiani, E., State, R. (eds.) DPM 2012 and SETOP 2012. LNCS, vol. 7731, pp. 133–145. Springer, Heidelberg (2013)
Moiso, C., Antonelli, F., Vescovi, M.: How do I manage my Personal Data? – A Telcoperspective. In: Proc. Data 2012, pp. 123–128 (2012)
Moiso, C., Minerva, R.: Towards a User-Centric Personal Data Ecosystem – The Role of the Bank of Individuals’ Data. In: Intelligence in Next Generation Networks (2012)
OASIS, eXtensible Access Control Markup Language (XACML) Ver. 3.0 (January 2013)
Pentland, A.: Society’s Nervous System: Building Effective Government, Energy, and Public Health Systems. IEEE Computer 45(1), 31–38
Reeder, R.W., Karat, C.-M., Karat, J., Brodie, C.: Usability challenges in security and privacy policy-authoring interfaces. In: Baranauskas, C., Abascal, J., Barbosa, S.D.J. (eds.) INTERACT 2007. LNCS, vol. 4663, pp. 141–155. Springer, Heidelberg (2007)
Reuters.com, WhatsApp violates privacy laws over phone numbers: report, http://goo.gl/9tJzF (last checked February 21, 2014)
Roussopoulos, M., et al.: Technology-induced challenges in Privacy & Data Protection in Europe. A report by the ENISA Ad Hoc Working Group on Privacy & Technology (2008)
Syukur, E.: Methods for policy conflict detection and resolution in pervasive computing environments. In: Policy Management for Web (WWW 2005), pp. 10–14. ACM (2005)
Uriel, F., et al.: Zero-knowledge proofs of identity. Journal of Cryptology 1(2), 77–94 (1988)
Vescovi, M., Moiso, C., Antonelli, F., Lepri, B., Clippinger, J.-H.: Toward Personal Big Data passing through User Transparency, Control and Awareness: A Living-Lab experience. In: Proc. European Data Forum (to appear, 2014)
Whitley, E.: Towards effective, consent based control of Personal Data. In: Hildebrandt, M., O’Hare, K., Waidner, M. (eds.) The Value of Personal Data, pp. 165–176 (2013)
World Economic Forum, Rethinking Personal Data: Strengthening Trust (2012), http://www.weforum.org/reports/rethinking-personal-data-strengthening-trust
World Economic Forum, Unlocking the Value of Personal Data: From Collection to Usage (2013), http://www.weforum.org/reports/unlocking-value-personal-data-collection-usage
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Gnesi, S., Matteucci, I., Moiso, C., Mori, P., Petrocchi, M., Vescovi, M. (2014). My Data, Your Data, Our Data: Managing Privacy Preferences in Multiple Subjects Personal Data. In: Preneel, B., Ikonomou, D. (eds) Privacy Technologies and Policy. APF 2014. Lecture Notes in Computer Science, vol 8450. Springer, Cham. https://doi.org/10.1007/978-3-319-06749-0_11
Download citation
DOI: https://doi.org/10.1007/978-3-319-06749-0_11
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-06748-3
Online ISBN: 978-3-319-06749-0
eBook Packages: Computer ScienceComputer Science (R0)