Skip to main content

Privacy-Enhancing Technologies

  • Reference work entry
  • First Online:
  • 96 Accesses

Synonyms

PETs

Definition

Privacy-enhancing technologies (PETs) can be defined as technologies that are enforcing privacy principles in order to protect and enhance the privacy of users of information technology (IT) and/or of individuals about whom personal data are processed (the so-called data subjects). Privacy principles that PETs are enforcing can be derived from internationally acknowledged privacy guidelines or legislation, such as the OECD Privacy Guidelines, the EU Data Protection Directive 95/46/EC and the EU General Data Protection Regulation (GDPR), and the proposed General EU Data Protection Regulation. One fundamental privacy principle that serves as the foundation for the privacy-enhancing technologies that are aiming at providing anonymity, pseudonymity, or unobservabilityfor users and/or other data subjects is the privacy principles of data minimization. It requires that the collection of personally identifiable data should be minimized (and if possible avoided),...

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   4,499.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD   6,499.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Recommended Reading

  1. Chaum DL. Untraceable electronic mail, return addresses, and digital pseudonyms. Commun ACM. 1981;24(2):84–8.

    Article  Google Scholar 

  2. Chaum DL. Security without identification: card computers to make big brother obsolete. Informatik-Spektrum. 1987;10:262–77.

    Google Scholar 

  3. Chaum DL. The dining cryptographers problem: unconditional sender and recipient untraceability. J Cryptol. 1988;1(1):65–75.

    Article  MathSciNet  MATH  Google Scholar 

  4. Registratiekamer, Information and Privacy Commissioner/Ontario. Privacy-enhancing technologies: the path to anonymity. Achtergrondstudies en Verkenningen 5B, vols. I and II, Rijswijk. 1995.

    Google Scholar 

  5. Brands S. Rethinking public key infrastructure and digital certificates – building in privacy. PhD thesis. Eindhoven: Institute of Technology; 1999.

    Google Scholar 

  6. Camenisch J, Fischer-Hübner S, & Rannenberg K (Eds.). Privacy and identity management for life. Springer Science & Business Media; 2011.

    Google Scholar 

  7. Dingledine R, Mathewson N, Syverson P. Tor: the second-generation onion router. In: Proceedings of the 13th USENIX Security Symposium; 2004.

    Google Scholar 

  8. Reed MG, Syverson PF, Goldschlag DM. Anonymous connections and onion routing. IEEE J Select Areas Commn. 1998;16(4):482–94.

    Article  Google Scholar 

  9. Reiter M, Rubin A. Anonymous web transactions with crowds. Commun ACM. 1999;42(2):32–48.

    Article  Google Scholar 

  10. Cranor L. Web privacy with P3P. Sebastopol: O’Reilly; 2002.

    Google Scholar 

  11. Dwork C. Differential privacy. Automata, languages and programming. Berlin/Heidelberg: Springer; 2006. p. 1–12.

    Book  MATH  Google Scholar 

  12. Fischer-Hübner S. IT-security and privacy: design and use of privacy enhancing security mechanisms, LNCS, vol. 1958. Berlin: Springer LNCS; 2001. ISBN:3-540-42142-4.

    MATH  Google Scholar 

  13. PrimeLife. Privacy and identity management in Europe for life – policy languages. http://primelife.ercim.eu/results/primer/133-policy-languages Accessed 11 Aug 2014.

  14. Cooper DA, Birman KP. Preserving privacy in a network of mobile computers. In: Proceedings of the 1995 IEEE Symposium on Security and Privacy; 1995. p. 26–83.

    Google Scholar 

  15. Camenisch J, van Herreweghen E. Design and implementation of the idemix anonymous credential system. In: Proceedings of the 9th ACM Conference on Computer and Communications Security; 2002. p. 21–30.

    Google Scholar 

  16. Karjoth G, Schunter M, Waidner M. Platform for enterprise privacy practices: privacy-enabled management of customer data. In: Proceedings of the 2nd Workshop on Privacy Enhancing Technologies; 2002. p. 69–84.

    Chapter  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Simone Fischer-Hübner .

Editor information

Editors and Affiliations

Section Editor information

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Science+Business Media, LLC, part of Springer Nature

About this entry

Check for updates. Verify currency and authenticity via CrossMark

Cite this entry

Fischer-Hübner, S. (2018). Privacy-Enhancing Technologies. In: Liu, L., Özsu, M.T. (eds) Encyclopedia of Database Systems. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-8265-9_271

Download citation

Publish with us

Policies and ethics