Skip to main content

Privacy Reference Architecture for Personal Information Life Cycle

  • Conference paper
Book cover Advanced Communication and Networking (ACN 2011)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 199))

Included in the following conference series:

Abstract

The increased commercial use (and value) of PII(Privacy Identifiable information), the sharing of PII across legal jurisdictions, and the growing complexity of ICT systems, makes it extremely difficult for an organization to ensure privacy and to achieve compliance with the various laws and regulations. Additionally, the open nature and characteristics of the Internet and its communication protocols can lead to a loss of information privacy when PII is used in a way that was not originally intended. Uncertainty or distrust can arise as a result of how an organization or other entity handles information privacy matters and as a result of cases of PII misuse. This paper proposes a security model for the management of personal information by each lifecycle stage, so that the information and communication service providers, which collect, store, manage, and use personal information, can manage their customers’ personal information more securely and efficiently. However, as the policy and technology designed to protect personal information vary in terms of application depending on the environment of each organization and enterprise, this paper presents general criteria. Therefore, the security requirements for each personal information lifecycle stage may be selectively applied to the environment appropriately for each organization and enterprise.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Chang, Y.F., Chen, C.S., Zhou, H.: Smart phone for mobile commerce. Computers & Security, Elsevier Advanced Technology (31), 740–747 (2009)

    Google Scholar 

  2. Mobile phone users wary about privacy, the nielsen company (April 2011)

    Google Scholar 

  3. ISO/IEC JTC1 JCT1 SC27 WG5, CD Information technology – Security techniques- Privacy Framework (April 2011)

    Google Scholar 

  4. ISO/IEC JTC1 JCT1 SC27 WG5, WD Information technology – Security techniques- Privacy Reference Architecture (April 2011)

    Google Scholar 

  5. Blaze, M., Feigenbaum, J., Keromytis, A.D.: KeyNote: Trust Management for Public-Key Infrastructures (Position Paper). In: Proceedings of the 6th International Workshop on Security Protocols, April 15-17, pp. 59–63 (1998)

    Google Scholar 

  6. Scott Saponas, T.: Devices that tell on you: privacy trends in consumer ubiquitous computing (2007)

    Google Scholar 

  7. Bellare, M., Boldyreva, A., Desai, A., Pointcheval, D.: Key-Privacy in Public-Key Encryption. In: Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology, December 9-13, pp. 566–582 (2001)

    Google Scholar 

  8. Collins, J.: Lost and Found in Legoland. RFID Journal (2004), http://www.rfidjournal.com/article/articleview/921/1/1/

  9. Andrew senior, blinkering surveillance: enabling video privacy through computer vision. Surveillance & Society (2002)

    Google Scholar 

  10. OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Data, http://www.oecd.org/document/18/0,3746,en_2649_34255_1815186_1_1_1_1,00.html#introduction

  11. APEC, Privacy Framework (2008), http://www.ema.gov.au/www/agd/rwpattach.nsf/VAP/03995EABC73F94816C2AF4AA2645824B~APEC+Privacy+Framework.pdf/$file/APEC+Privacy+Framework.pdf

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Shin, YN., Chun, W.B., Jung, H.S., Chun, M.G. (2011). Privacy Reference Architecture for Personal Information Life Cycle. In: Kim, Th., Adeli, H., Robles, R.J., Balitanas, M. (eds) Advanced Communication and Networking. ACN 2011. Communications in Computer and Information Science, vol 199. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-23312-8_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-23312-8_10

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-23311-1

  • Online ISBN: 978-3-642-23312-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics