Encyclopedia of Big Data Technologies

2019 Edition
| Editors: Sherif Sakr, Albert Y. Zomaya

Privacy-Aware Identity Management

  • Mirosław KutyłowskiEmail author
  • Przemysław Błaśkiewicz
Reference work entry
DOI: https://doi.org/10.1007/978-3-319-77525-8_241

Synonyms

Definitions

Definition 1

Personal data protection means measures aiming to guarantee that processing of data concerning identified or identifiable persons (data subjects):
  • takes place based on a consent of the data subject or is otherwise explicitly permitted by law,

  • is confined solely to the purpose of processing,

  • is secure by design and by default:

whereas processing is any operation on personal data, including in particular storing, removing, and giving access to it.

Definition 2

Pseudonimization is a process of translating identifiers into pseudonyms and replacing the identifiers in a data set with the corresponding pseudonyms. A pseudonymization process should be irreversible, except for a deanonymization procedure (if defined).

Deanonymizationis a process which links back the pseudonyms with the identifiers. It should require the use of...

This is a preview of subscription content, log in to check access.

References

  1. Baldimtsi F, Camenisch J, Hanzlik L, Krenn S, Lehmann A, Neven G (2015) Recovering lost device-bound credentials. In: Malkin T, Kolesnikov V, Lewko AB, Polychronakis M (eds) Applied cryptography and network security – 13th international conference, ACNS 2015, 2–5 June 2015, Revised selected papers. Lecture notes in computer science, vol 9092. Springer, New York, pp 307–327. https://doi.org/10.1007/978-3-319-28166-7_15Google Scholar
  2. Bender J, Dagdelen Ö, Fischlin M, Kügler D (2012) Domain-specific pseudonymous signatures for the german identity card. In: Gollmann D, Freiling FC (eds) Proceedings of the 15th international conference on information security, ISC, 19–21 Sept 2012. Lecture notes in computer science, vol 7483. Springer, Passau, pp 104–119. https://doi.org/10.1007/978-3-642-33383-5_7Google Scholar
  3. Bringer J, Chabanne H, Lescuyer R, Patey A (2014) Efficient and strongly secure dynamic domain-specific pseudonymous signatures for ID documents. In: Christin N, Safavi-Naini R (eds) 18th international conference on financial cryptography and data security, FC 3–7 Mar 2014, Revised selected papers. Lecture notes in computer science, vol 8437. Springer, Christ Church, Barbados, pp 255–272. https://doi.org/10.1007/978-3-662-45472-5_16Google Scholar
  4. BSI (2016) Technical guideline tr-03110 v2.21 – advanced security mechanisms for machine readable travel documents and eIDAS token. Available at: https://www.bsi.bund.de/EN/Publications/Technical Guidelines/TR03110/BSITR03110.html
  5. Fuchsbauer G (2011) Commuting signatures and verifiable encryption. In: Paterson KG (ed) Advances in cryptology – EUROCRYPT 2011–30th annual international conference on the theory and applications of cryptographic techniques, 15–19 May 2011. Proceedings. Lecture notes in computer science, vol 6632. Springer, Tallinn, pp 224–245. https://doi.org/10.1007/978-3-642-20465-4_14Google Scholar
  6. Hanzlik L, Kluczniak K, Kutyłowski M, Dolev S (2016) Local self-organization with strong privacy protection. In: 2016 IEEE Trustcom/BigDataSE/ISPA, 23–26 Aug 2016. IEEE, Tianjin, pp 775–782.  https://doi.org/10.1109/TrustCom.2016.0138
  7. Klonowski M, Kutylowski M, Lauks A, Zagórski F (2005) Conditional digital signatures. In: Katsikas SK, Lopez J, Pernul G (eds) Trust, privacy and security in digital business: second international conference, TrustBus 2005, 22–26 Aug 2005. Proceedings. Lecture notes in computer science, vol 3592. Springer, Copenhagen, pp 206–215. https://doi.org/10.1007/11537878_21CrossRefGoogle Scholar
  8. Kutyłowski M, Krzywiecki Ł, Kubiak P, Koza M (2011) Restricted identification scheme and Diffie-Hellman linking problem. In: Chen L, Yung M, Zhu L (eds) Trusted systems – third international conference, INTRUST, 27–29 Nov 2011, Revised selected papers. Lecture notes in computer science, vol 7222. Springer, Beijing, pp 221–238. https://doi.org/10.1007/978-3-642-32298-3_15Google Scholar
  9. Kutyłowski M, Hanzlik L, Kluczniak K (2016) Pseudonymous signature on eIDAS token – implementation based privacy threats. In: Liu JK, Steinfeld R (eds) Information security and privacy – 21st Australasian conference, ACISP, 4–6 July 2016. Proceedings, Part II. Lecture notes in computer science, vol 9723. Springer, Melbourne, pp 467–477. https://doi.org/10.1007/978-3-319-40367-0_31zbMATHGoogle Scholar
  10. Pedersen TP (1991) Non-interactive and information-theoretic secure verifiable secret sharing. In: Feigenbaum J (ed) Advances in cryptology – CRYPTO ’91, 11th annual international cryptology conference, 11–15 Aug 1991. Proceedings. Lecture notes in computer science, vol 576. Springer, Santa Barbara, pp 129–140. https://doi.org/10.1007/3-540-46766-1_9Google Scholar
  11. The European Parliament and the Council of the European Union (2016) Regulation (EU) 2016/679 of the European parliament and of the council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing directive 95/46/ec (General Data Protection Regulation). Official Journal of the European Union 119(1)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  • Mirosław Kutyłowski
    • 1
    Email author
  • Przemysław Błaśkiewicz
    • 1
  1. 1.Faculty of Fundamental Problems of TechnologyWrocław University of Science and Technology; National Science CenterWrocławPoland