scispace - formally typeset
Search or ask a question
Topic

Information privacy

About: Information privacy is a research topic. Over the lifetime, 25412 publications have been published within this topic receiving 579611 citations. The topic is also known as: data privacy & data protection.


Papers
More filters
Journal ArticleDOI
TL;DR: It is argued for a move away from narrow views of privacy and security and toward a holistic view of situated and collective information practice.
Abstract: As everyday life is increasingly conducted online, and as the electronic world continues to move out into the physical, the privacy of information and action and the security of information systems are increasingly a focus of concern both for the research community and the public at large. Accordingly, privacy and security are active topics of investigation from a wide range of perspectives--institutional, legislative, technical, interactional, and more. In this article, we wish to contribute toward a broad understanding of privacy and security not simply as technical phenomena but as embedded in social and cultural contexts. Privacy and security are difficult concepts to manage from a technical perspective precisely because they are caught up in larger collective rhetorics and practices of risk, danger, secrecy, trust, morality, identity, and more. Reductive attempts to deal with these issues separately produce incoherent or brittle results. We argue for a move away from narrow views of privacy and security and toward a holistic view of situated and collective information practice.

264 citations

Journal ArticleDOI
TL;DR: In this paper, a survey of blockchain-based approaches for several security services including authentication, confidentiality, privacy and access control list, data and resource provenance, and integrity assurance is presented.
Abstract: This paper surveys blockchain-based approaches for several security services. These services include authentication, confidentiality, privacy and access control list, data and resource provenance, and integrity assurance. All these services are critical for the current distributed applications, especially due to the large amount of data being processed over the networks and the use of cloud computing. Authentication ensures that the user is who he/she claims to be. Confidentiality guarantees that data cannot be read by unauthorized users. Privacy provides the users the ability to control who can access their data. Provenance allows an efficient tracking of the data and resources along with their ownership and utilization over the network. Integrity helps in verifying that the data has not been modified or altered. These services are currently managed by centralized controllers, for example, a certificate authority. Therefore, the services are prone to attacks on the centralized controller. On the other hand, blockchain is a secured and distributed ledger that can help resolve many of the problems with centralization. The objectives of this paper are to give insights on the use of security services for current applications, to highlight the state of the art techniques that are currently used to provide these services, to describe their challenges, and to discuss how the blockchain technology can resolve these challenges. Further, several blockchain-based approaches providing such security services are compared thoroughly. Challenges associated with using blockchain-based security services are also discussed to spur further research in this area.

263 citations

Book ChapterDOI
22 Nov 2009
TL;DR: A privacy manager for cloud computing is described, which reduces the risk to the cloud computing user of their private data being stolen or misused, and also assists the cloud Computing provider to conform to privacy law.
Abstract: We describe a privacy manager for cloud computing, which reduces the risk to the cloud computing user of their private data being stolen or misused, and also assists the cloud computing provider to conform to privacy law. We describe different possible architectures for privacy management in cloud computing; give an algebraic description of obfuscation, one of the features of the privacy manager; and describe how the privacy manager might be used to protect private metadata of online photos.

263 citations

Journal ArticleDOI
TL;DR: In this article, the authors explored the nature of privacy in economic behavior; the economic effects of privacy and its relationship with economic behavior, and the relationship between privacy and economic behavior.
Abstract: THE enormous increase in interest in privacy in our society is evident in the public press and in the statute books In some respects this interest in privacy is paradoxical, for the average citizen has more privacy-more areas of his life in which his behavior is not known by his fellows-than ever before He lives in a large city, where no one is his keeper; in the small towns of former times privacy was won only by the cleverest people He works in large organizations, and indeed he (or, more likely, some self-appointed spokesman) laments his alienation He can shake off most of his past simply by moving-to the South, the West-and no earlier generation except the immigrant waves before World War I was as mobile If then the privacy issue is a real issue, and not one of those contrived issues that march across the headlines for a time, it probably exists because of the vast growth of government Governments (at all levels) are now collecting information of a quantity and in a personal detail unknown in history Consider: it would have been quite impossible for a public official in 1860 to learn anything of the income of a citizen chosen at random without leaving Washington, DC Today the files of Social Security, the Internal Revenue Service, the Securities and Exchange Commission, the microfilms of banking transactions, and other sources are potentially available to answer the question, to say nothing of the fact that perhaps one family in three or four receives payments directly or indirectly from the federal government In addition the government has become the major instrument by which the information-collecting and information-using practices of private citizens are controlled Technology has enormously changed the mechanics of gathering and disseminating information, but it is politics and economics that direct the uses of the machinery Three topics in this large subject are explored here: the nature of privacy in economic behavior; the economic effects of

263 citations

Proceedings ArticleDOI
11 May 2007
TL;DR: A probabilistic signature verification scheme that can efficiently detect the tampered messages or the messages from an unauthorized node and describe a scalable role-based access control approach for vehicular networks.
Abstract: We propose a novel group signature based security framework for vehicular communications. Compared to the traditional digital signature scheme, the new scheme achieves authenticity, data integrity, anonymity, and accountability at the same time. Furthermore, we describe a scalable role-based access control approach for vehicular networks. Finally, we present a probabilistic signature verification scheme that can efficiently detect the tampered messages or the messages from an unauthorized node.

262 citations


Network Information
Related Topics (5)
The Internet
213.2K papers, 3.8M citations
88% related
Server
79.5K papers, 1.4M citations
85% related
Encryption
98.3K papers, 1.4M citations
84% related
Social network
42.9K papers, 1.5M citations
83% related
Wireless network
122.5K papers, 2.1M citations
82% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
2023562
20221,226
20211,535
20201,634
20191,255
20181,277