Skip to main content

Privacy in Social Collective Intelligence Systems

  • Chapter
  • First Online:
Social Collective Intelligence

Part of the book series: Computational Social Sciences ((CSS))

Abstract

The impact of Social Collective Intelligent Systems (SCIS) on the individual right of privacy is discussed in this chapter under the light of the relevant privacy principles of the European Data Protection Legal Framework and the OECD Privacy Guidelines. This chapter analyzes the impact and limits of profiling, provenance and reputation on the right of privacy and review the legal privacy protection for profiles. From the technical perspective, we discuss opportunities and challenges for designing privacy-preserving systems for SCIS concerning collectives and decentralized systems. Furthermore, we present a selection of privacy-enhancing technologies that are relevant for SCIS including anonymous credentials, transparency-enhancing tools and the PrimeLife Policy Language (PPL) and discuss how these technologies can help to enforce the main legal principles of the European Data Protection Legal Framework.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 54.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    The Article 29 Working Party consists of a representative from the data protection authority of each EU Member State, the European Data Protection Supervisor and the European Commission.

  2. 2.

    The Article 29 Working Party statement is close to the definition of anonymity from Pfitzmann and Hansen [37]: “anonymity of a subject from an attackers perspective means that the attacker cannot sufficiently identify the subject within a set of subjects, the anonymity set”, which is commonly used in the computer security and privacy area.

  3. 3.

    According to EU Data Protection Directive 95/46/EC, a data controller is defined as the entity that alone or jointly with others determines the purposes and means of personal data processing.

  4. 4.

    According to EU Data Protection Directive 95/46/EC, a data subject is a natural person about whom personal data are processed has in regard to his personal data.

  5. 5.

    Role pseudonyms are pseudonyms that are limited to a specific role or context [37].

References

  1. Andersson, C., Kohlweiss, M., Martucci, L.A., Panchenko, A.: A self-certified and Sybil-free framework for secure digital identity domain buildup. In: Information Security Theory and Practices: Smart Devices, Convergence and Next Generation Networks. Proceedings of the 2nd IFIP WG 11.2 International Workshop (WISTP 2008). Lecture Notes in Computer Science (LNCS), vol. 5019, pp. 64–77. Springer, Berlin (2008)

    Google Scholar 

  2. Angulo, J., Fischer-Hübner, S., Pulls, T., Wästlund, E.: Towards usable privacy policy display & management for primeLife. Inf. Manag. Comput. Secur. 20(1), 4–17 (2012)

    Google Scholar 

  3. Art. 29 Data Protection Working Party: Advise paper on essential elements of a definition and a provision on profiling within the EU General Data Protection Regulation. Available at http://ec.europa.eu/justice/data-protection/article-29/documentation/other-document/files/2013/20130513_advice-paper-on-profiling_en.pdf (2013). Accessed 13 May 2013

  4. Bonabeau, E.: Decisions 2.0: The power of collective intelligence. MIT Sloan Manag. Rev. 50(2), 45–52 (2009)

    Google Scholar 

  5. Buchegger, S., Schiöberg, D., Vu, L.H., Datta, A.: PeerSoN: P2P social networking - early experiences and insights. In: Proceedings of the 2nd ACM Workshop on Social Network Systems Social Network Systems 2009, co-located with Eurosys 2009, pp. 46–52. Nürnberg, Germany (2009)

    Google Scholar 

  6. Buchegger, S., Crowcroft, J., Krishnamurthy, B., Strufe, T.: Decentralized systems for privacy preservation (Dagstuhl Seminar 13062). Dagstuhl Rep. 3(2), 22–44 (2013). doi:http://dx.doi.org/10.4230/DagRep.3.2.22. http://drops.dagstuhl.de/opus/volltexte/2013/4017

  7. Camenisch, J., van Herreweghen, E.: Design and implementation of the idemix anonymous credential system. In: Proceedings of the 9th ACM Conference on Computer and Communications Security, pp. 21–30 (2002)

    Google Scholar 

  8. Camenisch, J., Fischer-Hübner, S., Rannenberg, K. (eds.): Privacy and Identity Management for Life. Springer, Berlin (2011)

    Google Scholar 

  9. Christin, D., Roßkopf, C., Hollick, M., Martucci, L.A., Kanhere, S.S.: Incognisense: An anonymity-preserving reputation framework for participatory sensing applications. Pervasive Mob. Comput. 9(3), 353–371 (2013)

    Article  Google Scholar 

  10. Council of Europe: Recommendation cm/rec(2010)13 of the committee of ministers to member states on the protection of individuals with regard to automatic processing of personal data in the context of profiling. Available at https://wcd.coe.int/ViewDoc.jsp?id=1710949 (2010)

  11. Cutillo, L.A., Molva, R., Strufe, T.: Safebook: Feasibility of transitive cooperation for privacy on a decentralized social network. In: WOWMOM, pp. 1–6. IEEE, New York (2009)

    Google Scholar 

  12. Dellarocas, C.: Online reputation systems: How to design one that does what you need. Sloan Manag. Rev. 51(3), 33–38 (2010)

    Google Scholar 

  13. Dingledine, R., Mathewson, N., Syverson, P.F.: Tor: The second-generation onion router. In: USENIX Security Symposium, pp. 303–320. USENIX (2004)

    Google Scholar 

  14. Douceur, J.R.: The Sybil Attack. In: Druschel, P., Kaashoek, F., Rowstron, A. (eds.) Peer-to-Peer Systems: Proceedings of the 1st International Peer-to-Peer Systems Workshop (IPTPS), vol. 2429, pp. 251–260. Springer, Berlin (2002)

    Chapter  Google Scholar 

  15. Dwork, C.: Differential privacy: A survey of results. In: Agrawal, M., Du, D.Z., Duan, Z., Li, A. (eds.) TAMC. Lecture Notes in Computer Science, vol. 4978, pp. 1–19. Springer, Berlin (2008)

    Google Scholar 

  16. European Commission: Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data. Available at http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:31995L0046:en:HTML (1995). Accessed 23 Nov 1995

  17. European Commission: Proposal for a Regulation of the European Parliament and of the Council on the protection of individuals with regard to the processing of personal data and on the free movement of such data (General Data Protection Regulation), COM(2012) 11 final 2012/0011 (COD). Available at http://ec.europa.eu/justice/data-protection/document/review2012/com_2012_11_en.pdf (2012). Accessed 25 Jan 2012

  18. European Commission: Proposal for a regulation of the European Parliament and of the Council on the protection of individual with regard to the processing of personal data and on the free movement of such data (General Data Protection Regulation) (COM(2012)0011 C7 0025/2012 2012/0011(COD)) Compromise amendments on Articles 1–29. Available at http://www.europarl.europa.eu/meetdocs/2009_2014/documents/libe/dv/comp_am_art_01-29/comp_am_art_01-29en.pdf (2013). Accessed 21 Oct 2013

  19. Feldman, M., Chuang, J.: Overcoming free-riding behavior in peer-to-peer systems. SIGecom Exch. 5(4), 41–50 (2005)

    Article  Google Scholar 

  20. Fischer-Hübner, S.: IT-Security and Privacy – Design and Use of Privacy-Enhancing Security Mechanisms. Lecture Notes in Computer Science, vol. 1958. Springer, Berlin (2001)

    Google Scholar 

  21. Friedman, A., Schuster, A.: Data mining with differential privacy. In: Rao, B., Krishnapuram, B., Tomkins, A., Yang, Q. (eds.) KDD, pp. 493–502. ACM, New York (2010)

    Google Scholar 

  22. Gedik, B., Liu, L.: Protecting location privacy with personalized k-anonymity: Architecture and algorithms. IEEE Trans. Mob. Comput. 7(1), 1–18 (2008)

    Article  Google Scholar 

  23. Giunchiglia, F., Maltese, V., Anderson, S., Miorandi, D.: Towards hybrid and diversity-aware collective adaptive systems. In: Proceedings of FOCAS Workshop on Fundamentals of Collective Systems @ECAL 2013 (2013)

    Google Scholar 

  24. Goffman, E.: The Presentation of Self in Everyday Life. Doubleday Anchor Books, Doubleday (1959)

    Google Scholar 

  25. Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: Proceedings of the 1st International Conference on Mobile Systems, Applications, and Services (MobiSys 2003), pp. 31–42. USENIX (2003)

    Google Scholar 

  26. Hedbom, H., Pulls, T., Hjärtquist, P., Lavén, A.: Adding secure transparency logging to the prime core. In: Bezzi, M., Duquenoy, P., Fischer-Hübner, S., Hansen, M., Zhang, G. (eds.) The Future of Identity in the Information Society. Proceedings of the 5th IFIP WG 9.2, 9.6/11.4, 11.6, 11.7/PrimeLife International Summer School, vol. 320, pp. 299–314. Springer, Berlin (2009)

    Google Scholar 

  27. Hildebrandt, M.: FIDIS Deliverable D7.12: Behavioural biometric profiling and transparency enhancing tools. Available at http://www.fidis.net/resources/fidis-deliverables/profiling/#c2369 (2009)

  28. Kosinski, M., Stillwell, D., Graepel, T.: Private traits and attributes are predictable from digital records of human behavior. Proc. Natl. Acad. Sci. 110(15), 5802–5805 (2013)

    Article  Google Scholar 

  29. Li, N., Li, T., Venkatasubramanian, S.: t-closeness: Privacy beyond k-anonymity and l-diversity. In: Chirkova, R., Dogac, A., Özsu, M.T., Sellis, T.K. (eds.) ICDE, pp. 106–115. IEEE, New York (2007)

    Google Scholar 

  30. Machanavajjhala, A., Kifer, D., Gehrke, J., Venkitasubramaniam, M.: L-diversity: Privacy beyond k-anonymity. TKDD 1(1). Available at http://dl.acm.org/citation.cfm?id=1217302 (2007)

  31. Martucci, L.A., Andersson, C., Fischer-Hübner, S.: Chameleon and the identity-anonymity paradox: Anonymity in mobile ad hoc networks. In: Proceedings of the 1st International Workshop on Security (IWSEC 2006), pp. 123–134. Information Processing Society of Japan (IPSJ) (2006)

    Google Scholar 

  32. Martucci, L.A., Kohlweiss, M., Andersson, C., Panchenko, A.: Self-certified Sybil-free pseudonyms. In: Proceedings of the 1st ACM Conference on Wireless Network Security (WiSec’08), pp. 154–159. ACM Press, New York (2008)

    Google Scholar 

  33. Martucci, L.A., Ries, S., Mühlhäuser, M.: Sybil-free pseudonyms, privacy and trust: Identity management in the internet of services. J. Inf. Process. 19, 317–331 (2011)

    Google Scholar 

  34. Merriam-Webster.com: Profile. Available at http://www.m-w.com/dictionary/profile (2013)

  35. Narayanan, A., Shmatikov, V.: De-anonymizing social networks. In: 30th IEEE Symposium on Security and Privacy, 2009, pp. 173–187. IEEE, New York (2009)

    Google Scholar 

  36. Organisation for Economic Cooperation and Development (OECD): Recommendation of the Council concerning Guidelines governing the Protection of Privacy and Transborder Flows of Personal Data (2013) [C(80)58/FINAL, as amended on 11 July 2013 by C(2013)79]

    Google Scholar 

  37. Pfitzmann, A., Hansen, M.: A terminology for talking about privacy by data minimization: Anonymity, unlinkability, undetectability, unobservability, pseudonymity, and identity management. Available at http://dud.inf.tu-dresden.de/literatur/Anon_Terminology_v0.34.pdf (2010). V0.34

  38. PrimeLife: PrimeLife – Privacy and Identity Management in Europe for Life: Policy Languages. Available at http://primelife.ercim.eu/images/stories/primer/policylanguage-plb.pdf (2011)

  39. Pulls, T.: Privacy-Preserving Transparency-Enhancing Tools. Licentiate Thesis, Karlstad University, p. 57 (2012)

    Google Scholar 

  40. Pulls, T., Peeters, R., Wouters, K.: Distributed privacy-preserving transparency logging. In: Proceedings of the 12th Annual ACM Workshop on Privacy in the Electronic Society, WPES 2013, Berlin. ACM, New York (2013)

    Google Scholar 

  41. Reiter, M.K., Rubin, A.D.: Crowds: Anonymity for web transactions. ACM Trans. Inf. Syst. Secur. (TISSEC) 1(1), 66–92 (1998). doi:http://doi.acm.org/10.1145/290163.290168

  42. Ries, S., Fischlin, M., Martucci, L.A., Mühlhäuser, M.: Learning whom to trust in a privacy-friendly way. In: Proceedings of the 10th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2011), pp. 214–225. IEEE Computer Society, Silver Spring (2011). doi:10.1109/TrustCom.2011.30

  43. Sweeney, L.: k-anonymity: A model for protecting privacy. Int. J. Uncertain. Fuzziness Knowl. Based Syst. 10(5), 557–570 (2002)

    Google Scholar 

  44. W3C: Platform for privacy preferences (P3P) project. Available at http://www.w3.org/P3P/ (2006)

  45. Warren, S., Brandeis, L.: The right to privacy. Harv. Law Rev. 4(5) (1890)

    Google Scholar 

  46. Wästlund, E., Fischer-Hübner, S.: PrimeLife Deliverable D4.2.2: End user transparency tools: UI prototypes. Available at http://primelife.ercim.eu/ (2010)

  47. Westin, A.F.: Privacy and Freedom. Atheneum, New York (1967)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Leonardo A. Martucci .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Fischer-Hübner, S., Martucci, L.A. (2014). Privacy in Social Collective Intelligence Systems. In: Miorandi, D., Maltese, V., Rovatsos, M., Nijholt, A., Stewart, J. (eds) Social Collective Intelligence. Computational Social Sciences. Springer, Cham. https://doi.org/10.1007/978-3-319-08681-1_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-08681-1_6

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-08680-4

  • Online ISBN: 978-3-319-08681-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics