scispace - formally typeset
Open Access

A terminology for talking about privacy by data minimization: Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management

Reads0
Chats0
TLDR
Anonymity, unlinkability, linkability, undetectability, unobservability, pseudonymity, identifiability, identity, partial identity, digital identity and identity management are defined.
Abstract
Based on the nomenclature of the early papers in the field privacy by data minimization, we develop a terminology which is both expressive and precise More particularly, we define anonymity, unlinkability, linkability, undetectability, unobservability, pseudonymity (pseudonyms and digital pseudonyms, and their attributes), identifiability, identity, partial identity, digital identity and identity management In addition, we describe the relationships between these terms, give a rationale why we define them as we do, and sketch the main mechanisms to provide for the properties defined

read more

Content maybe subject to copyright    Report

Citations
More filters
Proceedings ArticleDOI

Smart Grid Privacy via Anonymization of Smart Metering Data

TL;DR: The method described in this paper provides a 3rd party escrow mechanism for authenticated anonymous meter readings which are difficult to associate with a particular smart meter or customer.
Journal ArticleDOI

A survey on Advanced Metering Infrastructure

TL;DR: In this article, the authors present a comprehensive study on Smart Grid and the role of Advanced Metering Infrastructure (AMI) in SG, which is not a single technology; rather it is a combination of different areas of engineering, communication and management.
Proceedings ArticleDOI

Privacy for Smart Meters: Towards Undetectable Appliance Load Signatures

TL;DR: It is suggested that home electrical power routing can be used to moderate the home's load signature in order to hide appliance usage information and set the ground for further research on the subject of optimising home energy management with regards to hiding load signatures.
Journal ArticleDOI

A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements

TL;DR: This paper presents a comprehensive framework to model privacy threats in software-based systems and provides an extensive catalog of privacy-specific threat tree patterns that can be used to detail the threat analysis outlined above.
Journal ArticleDOI

Pseudonym Schemes in Vehicular Networks: A Survey

TL;DR: This survey covers pseudonym schemes based on public key and identity-based cryptography, group signatures and symmetric authentication, and compares the different approaches, gives an overview of the current state of standardization, and identifies open research challenges.
References
More filters
Journal ArticleDOI

A mathematical theory of communication

TL;DR: This final installment of the paper considers the case where the signals or the messages or both are continuously variable, in contrast with the discrete nature assumed until now.
Book

Mind, Self and Society

Journal ArticleDOI

Communication theory of secrecy systems

TL;DR: A theory of secrecy systems is developed on a theoretical level and is intended to complement the treatment found in standard works on cryptography.
Journal ArticleDOI

Untraceable electronic mail, return addresses, and digital pseudonyms

TL;DR: A technique based on public key cryptography is presented that allows an electronic mail system to hide who a participant communicates with as well as the content of the communication - in spite of an unsecured underlying telecommunication system.
Related Papers (5)
Trending Questions (1)
How to deal with the issue of anonymity and privacy in early years practical research?

The paper does not provide information on how to deal with the issue of anonymity and privacy in early years practical research. The paper focuses on developing a terminology for discussing privacy by data minimization.