scispace - formally typeset
Search or ask a question
Topic

Information privacy

About: Information privacy is a research topic. Over the lifetime, 25412 publications have been published within this topic receiving 579611 citations. The topic is also known as: data privacy & data protection.


Papers
More filters
Book ChapterDOI
18 Sep 2006
TL;DR: This paper study efficient and provably secure methods for queries on encrypted data stored in an outsourced database that may be susceptible to compromise, and shows that, in this system, even if an intruder breaks into the database, he only learns very little about the data storage in the database and the queries performed on the data.
Abstract: Data confidentiality is a major concern in database systems. Encryption is a useful tool for protecting the confidentiality of sensitive data. However, when data is encrypted, performing queries becomes more challenging. In this paper, we study efficient and provably secure methods for queries on encrypted data stored in an outsourced database that may be susceptible to compromise. Specifically, we show that, in our system, even if an intruder breaks into the database and observes some interactions between the database and its users, he only learns very little about the data stored in the database and the queries performed on the data. Our work consists of several components. First, we consider databases in which each attribute has a finite domain and give a basic solution for certain kinds of queries on such databases. Then, we present two enhanced solutions, one with a stronger security guarantee and the other with accelerated queries. In addition to providing proofs of our security guarantees, we provide empirical performance evaluations. Our experiments demonstrate that our solutions are fast on large-sized real data.

149 citations

Journal ArticleDOI
01 Sep 1997
TL;DR: This paper contends that while biometric concerns may pose legitimate privacy concerns, these issues can be adequately addressed and in the final analysis, biometrics emerges as privacy's friend.
Abstract: From the INS to ATM's, both the public and private sectors are making extensive use of biometrics for human recognition. As this technology becomes more economically viable and technically perfected, and thus more commonplace, the field of biometrics will spark legal and policy concerns. Critics inevitably compare biometrics to Big Brother and the loss of individual privacy. The probiometric lobby generally stresses the greater security and improved service that the technology provides. Is biometrics privacy's friend or privacy's foe? This paper explores the various arguments for and against biometrics and contends that while biometrics may pose legitimate privacy concerns, these issues can be adequately addressed. In the final analysis, biometrics emerges as privacy's friend.

149 citations

Journal ArticleDOI
TL;DR: Survey results relating to Internet users’ demographic characteristics using data from 1998 online Internet surveys conducted at the Graphics, Visualization, and Usability Center at the Georgia Institute of Technology indicate that there are small differences among degrees of Internet privacy concerns across groups divided by sex, education level, income level, and race.
Abstract: As the Internet permeates almost every aspect of our daily lives, some argue that the benefits of its use are diminished by threats to personal privacy. Privacy concern is a desire to keep personal information out of the hands of others. Online privacy is becoming an increasingly important policy issue as consumer groups rally to protect what they perceive to be basic privacy rights whereas others argue for freedom of information. This article presents an overview of the literature on privacy studies and examines survey results relating to Internet users’ demographic characteristics using data from 1998 online Internet surveys conducted at the Graphics, Visualization, and Usability Center at the Georgia Institute of Technology. Results indicate that there are small differences among degrees of Internet privacy concerns across groups divided by sex, education level, income level, and race, with all groups preferring privacy to convenience.

149 citations

Journal ArticleDOI
TL;DR: The rapid deployment of privacy-destroying technologies by governments and businesses threatens to make informational privacy obsolete as mentioned in this paper, but despite the warnings of information privacy pessimists, all is not lost.
Abstract: The rapid deployment of privacy-destroying technologies by governments and businesses threatens to make informational privacy obsolete. The first part of this article describes a range of current technologies to which the law has yet to respond effectively. These include: routine collection of transactional data, growing automated surveillance in public places, deployment of facial recognition technology and other biometrics, cell-phone tracking, vehicle tracking, satellite monitoring, workplace surveillance, internet tracking from cookies to “clicktrails,” hardware-based identifiers, intellectual property protecting “snitchware,” and sense-enhanced searches that allow observers to see through everything from walls to clothes. The cumulative and reinforcing effect of these technologies may make modern life completely visible and permeable to observers; there could be nowhere to hide. The second part of the article discusses leading attempts to craft legal responses to the assault on privacy – including self-regulation, privacy-enhancing technologies, data-protection law, and property-rights based solutions – in the context of three structural obstacles to privacy enhancement: consumers’ privacy myopia; important First Amendment protections of rights to collect and repeat information; and fear of what other people may do if not monitored. The article concludes that despite the warnings of information privacy pessimists, all is not lost – yet.

149 citations

Journal ArticleDOI
TL;DR: An anonymous routing framework (ALARM) is designed that uses nodes' current locations to construct a secure MANET map and takes advantage of some advanced cryptographic primitives to achieve node authentication, data integrity, anonymity and untraceability.
Abstract: In most common mobile ad hoc networking (MANET) scenarios, nodes establish communication based on long-lasting public identities. However, in some hostile and suspicious settings, node identities must not be exposed and node movements should be untraceable. Instead, nodes need to communicate on the basis of their current locations. While such MANET settings are not very common, they do occur in military and law enforcement domains and require high security and privacy guarantees. In this paper, we address a number of issues arising in suspicious location-based MANET settings by designing and analyzing a privacy-preserving and secure link-state based routing protocol (ALARM). ALARM uses nodes' current locations to securely disseminate and construct topology snapshots and forward data. With the aid of advanced cryptographic techniques (e.g., group signatures), ALARM provides both security and privacy features, including node authentication, data integrity, anonymity, and untraceability (tracking-resistance). It also offers protection against passive and active insider and outsider attacks. To the best of our knowledge, this work represents the first comprehensive study of security, privacy, and performance tradeoffs in the context of link-state MANET routing.

149 citations


Network Information
Related Topics (5)
The Internet
213.2K papers, 3.8M citations
88% related
Server
79.5K papers, 1.4M citations
85% related
Encryption
98.3K papers, 1.4M citations
84% related
Social network
42.9K papers, 1.5M citations
83% related
Wireless network
122.5K papers, 2.1M citations
82% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
2023562
20221,226
20211,535
20201,634
20191,255
20181,277