Definitions
Definition 1
Personal data protection means measures aiming to guarantee that processing of data concerning identified or identifiable persons (data subjects):
takes place based on a consent of the data subject or is otherwise explicitly permitted by law,
is confined solely to the purpose of processing,
is secure by design and by default:
whereas processing is any operation on personal data, including in particular storing, removing, and giving access to it.
Definition 2
Pseudonimization is a process of translating identifiers into pseudonyms and replacing the identifiers in a data set with the corresponding pseudonyms. A pseudonymization process should be irreversible, except for a deanonymization procedure (if defined).
Deanonymizationis a process which links back the pseudonyms with the identifiers. It should require the use of appropriate...
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Baldimtsi F, Camenisch J, Hanzlik L, Krenn S, Lehmann A, Neven G (2015) Recovering lost device-bound credentials. In: Malkin T, Kolesnikov V, Lewko AB, Polychronakis M (eds) Applied cryptography and network security – 13th international conference, ACNS 2015, 2–5 June 2015, Revised selected papers. Lecture notes in computer science, vol 9092. Springer, New York, pp 307–327. https://doi.org/10.1007/978-3-319-28166-7_15
Bender J, Dagdelen Ö, Fischlin M, Kügler D (2012) Domain-specific pseudonymous signatures for the german identity card. In: Gollmann D, Freiling FC (eds) Proceedings of the 15th international conference on information security, ISC, 19–21 Sept 2012. Lecture notes in computer science, vol 7483. Springer, Passau, pp 104–119. https://doi.org/10.1007/978-3-642-33383-5_7
Bringer J, Chabanne H, Lescuyer R, Patey A (2014) Efficient and strongly secure dynamic domain-specific pseudonymous signatures for ID documents. In: Christin N, Safavi-Naini R (eds) 18th international conference on financial cryptography and data security, FC 3–7 Mar 2014, Revised selected papers. Lecture notes in computer science, vol 8437. Springer, Christ Church, Barbados, pp 255–272. https://doi.org/10.1007/978-3-662-45472-5_16
BSI (2016) Technical guideline tr-03110 v2.21 – advanced security mechanisms for machine readable travel documents and eIDAS token. Available at: https://www.bsi.bund.de/EN/Publications/Technical Guidelines/TR03110/BSITR03110.html
Fuchsbauer G (2011) Commuting signatures and verifiable encryption. In: Paterson KG (ed) Advances in cryptology – EUROCRYPT 2011–30th annual international conference on the theory and applications of cryptographic techniques, 15–19 May 2011. Proceedings. Lecture notes in computer science, vol 6632. Springer, Tallinn, pp 224–245. https://doi.org/10.1007/978-3-642-20465-4_14
Hanzlik L, Kluczniak K, Kutyłowski M, Dolev S (2016) Local self-organization with strong privacy protection. In: 2016 IEEE Trustcom/BigDataSE/ISPA, 23–26 Aug 2016. IEEE, Tianjin, pp 775–782. https://doi.org/10.1109/TrustCom.2016.0138
Klonowski M, Kutylowski M, Lauks A, Zagórski F (2005) Conditional digital signatures. In: Katsikas SK, Lopez J, Pernul G (eds) Trust, privacy and security in digital business: second international conference, TrustBus 2005, 22–26 Aug 2005. Proceedings. Lecture notes in computer science, vol 3592. Springer, Copenhagen, pp 206–215. https://doi.org/10.1007/11537878_21
Kutyłowski M, Krzywiecki Ł, Kubiak P, Koza M (2011) Restricted identification scheme and Diffie-Hellman linking problem. In: Chen L, Yung M, Zhu L (eds) Trusted systems – third international conference, INTRUST, 27–29 Nov 2011, Revised selected papers. Lecture notes in computer science, vol 7222. Springer, Beijing, pp 221–238. https://doi.org/10.1007/978-3-642-32298-3_15
Kutyłowski M, Hanzlik L, Kluczniak K (2016) Pseudonymous signature on eIDAS token – implementation based privacy threats. In: Liu JK, Steinfeld R (eds) Information security and privacy – 21st Australasian conference, ACISP, 4–6 July 2016. Proceedings, Part II. Lecture notes in computer science, vol 9723. Springer, Melbourne, pp 467–477. https://doi.org/10.1007/978-3-319-40367-0_31
Pedersen TP (1991) Non-interactive and information-theoretic secure verifiable secret sharing. In: Feigenbaum J (ed) Advances in cryptology – CRYPTO ’91, 11th annual international cryptology conference, 11–15 Aug 1991. Proceedings. Lecture notes in computer science, vol 576. Springer, Santa Barbara, pp 129–140. https://doi.org/10.1007/3-540-46766-1_9
The European Parliament and the Council of the European Union (2016) Regulation (EU) 2016/679 of the European parliament and of the council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing directive 95/46/ec (General Data Protection Regulation). Official Journal of the European Union 119(1)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this entry
Cite this entry
Kutyłowski, M., Błaśkiewicz, P. (2019). Privacy-Aware Identity Management. In: Sakr, S., Zomaya, A.Y. (eds) Encyclopedia of Big Data Technologies. Springer, Cham. https://doi.org/10.1007/978-3-319-77525-8_241
Download citation
DOI: https://doi.org/10.1007/978-3-319-77525-8_241
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-77524-1
Online ISBN: 978-3-319-77525-8
eBook Packages: Computer ScienceReference Module Computer Science and Engineering