A. A. E. Kalam, Y. Deswarte, G. Trouessin, E. Cordonnier
{"title":"Personal data anonymization for security and privacy in collaborative environments","authors":"A. A. E. Kalam, Y. Deswarte, G. Trouessin, E. Cordonnier","doi":"10.1109/ISCST.2005.1553294","DOIUrl":null,"url":null,"abstract":"Nowadays, more and more applications use sensitive and personal information. Subsequently, hiding identities and respecting citizens' privacy are becoming extremely important. Dedicated to this issue, this paper is organized as follows: after defining the topic through an example of collaborative complex and heterogeneous system, this paper analyzes the most typical anonymization procedures. Afterwards it proposes a rigorous approach to define anonymization requirements, as well as how to characterize, select and build solutions. Finally, a new generic procedure to anonymize and link identities is proposed. We suggest that a critical part of this procedure is carried out in a smart card. According to needs, anonymized data are processed through cryptographic transformations in several organizations. Our solution is suitable to collaborative environments; guarantees the user's consent; resists dictionary attacks; respects the least privilege principle and thus fulfils the legislation requirements. Moreover, it remains flexible, adaptable to different fields, and supports some organizational changes like the merging of several systems","PeriodicalId":283620,"journal":{"name":"Proceedings of the 2005 International Symposium on Collaborative Technologies and Systems, 2005.","volume":"67 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2005-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 2005 International Symposium on Collaborative Technologies and Systems, 2005.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISCST.2005.1553294","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4
Abstract
Nowadays, more and more applications use sensitive and personal information. Subsequently, hiding identities and respecting citizens' privacy are becoming extremely important. Dedicated to this issue, this paper is organized as follows: after defining the topic through an example of collaborative complex and heterogeneous system, this paper analyzes the most typical anonymization procedures. Afterwards it proposes a rigorous approach to define anonymization requirements, as well as how to characterize, select and build solutions. Finally, a new generic procedure to anonymize and link identities is proposed. We suggest that a critical part of this procedure is carried out in a smart card. According to needs, anonymized data are processed through cryptographic transformations in several organizations. Our solution is suitable to collaborative environments; guarantees the user's consent; resists dictionary attacks; respects the least privilege principle and thus fulfils the legislation requirements. Moreover, it remains flexible, adaptable to different fields, and supports some organizational changes like the merging of several systems