scispace - formally typeset
Search or ask a question
Topic

Information privacy

About: Information privacy is a research topic. Over the lifetime, 25412 publications have been published within this topic receiving 579611 citations. The topic is also known as: data privacy & data protection.


Papers
More filters
Journal ArticleDOI
TL;DR: The mix zone is introduced-a new construction inspired by anonymous communication techniques-together with metrics for assessing user anonymity, based on frequently changing pseudonyms.
Abstract: As location-aware applications begin to track our movements in the name of convenience, how can we protect our privacy? This article introduces the mix zone-a new construction inspired by anonymous communication techniques-together with metrics for assessing user anonymity. It is based on frequently changing pseudonyms.

1,553 citations

Journal ArticleDOI
TL;DR: In this article, the authors investigated the tension between the collection and use of personal information that people provide in the course of most consumer transactions, and privacy and found that consumers will be willing to disclose personal information and have that information subsequently used to create consumer profiles for business use when there are fair procedures in place to protect individual privacy.
Abstract: This research addresses the tensions that arise between the collection and use of personal information that people provide in the course of most consumer transactions, and privacy. In today's electronic world, the competitive strategies of successful firms increasingly depend on vast amounts of customer data. Ironically, the same information practices that provide value to organizations also raise privacy concerns for individuals. This study hypothesized that organizations can address these privacy concerns and gain business advantage through customer retention by observing procedural fairness: customers will be willing to disclose personal information and have that information subsequently used to create consumer profiles for business use when there are fair procedures in place to protect individual privacy. Because customer relationships are characterized by social distance, customers must depend on strangers to act on their behalf. Procedural fairness serves as an intermediary to build trust when interchang eable organizational agents exercise considerable delegated power on behalf of customers who cannot specify or constrain their behavior. Our hypothesis was supported as we found that when customers are explicitly told that fair information practices are employed, privacy concerns do not distinguish consumers who are willing to be profiled from those who are unwilling to have their personal information used in this way.

1,549 citations

Journal ArticleDOI
27 Jun 1994
TL;DR: This paper provides a general treatment of privacy amplification by public discussion, a concept introduced by Bennett, Brassard, and Robert for a special scenario, and yields results on wiretap and broadcast channels for a considerably strengthened definition of secrecy capacity.
Abstract: This paper, provides a general treatment of privacy amplification by public discussion, a concept introduced by Bennett, Brassard, and Robert for a special scenario. Privacy amplification is a process that allows two parties to distil a secret key from a common random variable about which an eavesdropper has partial information. The two parties generally know nothing about the eavesdropper's information except that it satisfies a certain constraint. The results have applications to unconditionally secure secret-key agreement protocols and quantum cryptography, and they yield results on wiretap and broadcast channels for a considerably strengthened definition of secrecy capacity.

1,493 citations

01 Jan 2014
TL;DR: In this paper, the authors proposed a nationally recognized licensing framework for AVs, determining appropriate standards for liability, security, and data privacy for personal travel in the United States, which is based on the work of the authors of this paper.
Abstract: Autonomous vehicles (AVs) represent a potentially disruptive yet beneficial change to the transportation system This new technology has the potential to impact vehicle safety, congestion, and travel behavior All told, major social AV impacts in the form of crash savings, travel time reduction, fuel efficiency and parking benefits are estimated to approach $2,000 to per year per AV, and may eventually approach nearly $4,000 when comprehensive crash costs are accounted for Yet barriers to implementation and mass-market penetration remain Initial costs will likely be unaffordable Licensing and testing standards in the US are being developed at the state level, rather than nationally, which may lead to inconsistencies across states Liability details remain undefined, security concerns linger, and without new privacy standards, a default lack of privacy for personal travel may become the norm The impacts and interactions with other components of the transportation system, as well as implementation details, remain uncertain To address these concerns, the federal government should expand research in these areas and create a nationally recognized licensing framework for AVs, determining appropriate standards for liability, security, and data privacy

1,436 citations

Proceedings ArticleDOI
14 Mar 2010
TL;DR: This paper utilize and uniquely combine the public key based homomorphic authenticator with random masking to achieve the privacy-preserving public cloud data auditing system, which meets all above requirements.
Abstract: Cloud Computing is the long dreamed vision of computing as a utility, where users can remotely store their data into the cloud so as to enjoy the on-demand high quality applications and services from a shared pool of configurable computing resources. By data outsourcing, users can be relieved from the burden of local data storage and maintenance. However, the fact that users no longer have physical possession of the possibly large size of outsourced data makes the data integrity protection in Cloud Computing a very challenging and potentially formidable task, especially for users with constrained computing resources and capabilities. Thus, enabling public auditability for cloud data storage security is of critical importance so that users can resort to an external audit party to check the integrity of outsourced data when needed. To securely introduce an effective third party auditor (TPA), the following two fundamental requirements have to be met: 1) TPA should be able to efficiently audit the cloud data storage without demanding the local copy of data, and introduce no additional on-line burden to the cloud user; 2) The third party auditing process should bring in no new vulnerabilities towards user data privacy. In this paper, we utilize and uniquely combine the public key based homomorphic authenticator with random masking to achieve the privacy-preserving public cloud data auditing system, which meets all above requirements. To support efficient handling of multiple auditing tasks, we further explore the technique of bilinear aggregate signature to extend our main result into a multi-user setting, where TPA can perform multiple auditing tasks simultaneously. Extensive security and performance analysis shows the proposed schemes are provably secure and highly efficient.

1,408 citations


Network Information
Related Topics (5)
The Internet
213.2K papers, 3.8M citations
88% related
Server
79.5K papers, 1.4M citations
85% related
Encryption
98.3K papers, 1.4M citations
84% related
Social network
42.9K papers, 1.5M citations
83% related
Wireless network
122.5K papers, 2.1M citations
82% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
2023562
20221,226
20211,535
20201,634
20191,255
20181,277