Resources
Identity Use Cases & Scenarios.
FIDIS Deliverables.
Identity of Identity.
Interoperability.
Profiling.
Forensic Implications.
HighTechID.
Privacy and legal-social content.
D13.1: Identity and impact of privacy enhancing technologie.
D13.1 Addendum: Identity and impact of privacy enhancing technologies.
D13.3: Study on ID number policies.
D13.6 Privacy modelling and identity.
D13.7: Workshop Privacy.
D14.1: Workshop on Privacy in Business Processes.
D14.2: Study on Privacy in Business Processes by Identity Management.
D14.3: Study on the Suitability of Trusted Computing to support Privacy in Business Processes.
D14.4: Workshop on “From Data Economy to Secure.
D16.3: Towards requirements for privacy-friendly identity management in eGovernment.
Mobility and Identity.
Other.
IDIS Journal.
FIDIS Interactive.
Press & Events.
In-House Journal.
Booklets
Identity in a Networked World.
Identity R/Evolution.
Table of Contents
Executive Summary
Privacy in Ambient Intelligence assumes users trust in service providers. Personal as well as context data is collected by sensors, cameras and RFID readers, e.g., in the METRO Extra-Future Store. The use of loyalty cards maps collected data to users and transforms context data to personal data. Users are neither able to decide on the access of personal data nor to verify the collection and use of personal data, since they are not aware of every collection. Current privacy-enhancing technologies focus on the collection of personal data but not on the usage of personal data.
The identification of requirements for mechanisms for the enforcement of privacy policies and the verification of their enforcement regarding the collection and processing of personal data is the objective of WP14. Privacy evidences, to be used in case of dispute between users and service providers, are proposed on this workshop as a step towards the enforcement of privacy policies. A precondition for privacy evidences is the logging of service provider activities concerning the collection and use of personal data.
This workshop has shown that such log data has to be authentic, i.e., it must faithfully reflect reality and not allow parallel realities. Since log data consists of personal data, e.g. the IP address of user’s personal device, the log data itself is personal in nature and must therefore be kept confidential.
The requirements for secure logging will be presented by the WP14 deliverable D14.6 “From Regulating Access Control on Personal Data to Transparency by Secure Logging”.
Workshop on “From Data Economy to Secure Logging as a Step towards Transparency”
Objectives
This workshop was the kick-off meeting for WP14 work on privacy evidences as an instrument for ex post enforcement of privacy policies. It aimed to coordinate the work on deliverables D14.5 “Experimental Study on Profiling in Business Processes” and D14.6 “From Regulating Access Control on Personal Data to Transparency by Secure Logging” by presenting the corresponding contributions of their participants.
The workshop was held during the 2nd FIDIS Research Event on September 11th, 2007 in Athens. The following presentations have been given:
The slides are available at http://internal.fidis.net/interactive/filemanager/files/workpackages/?dir=wp14%2Fworkshop_d14.4.
Results
The contributions of the participants in WP14 have been presented, discussed and fixed. Regarding D14.5, a method for the experimental study has been presented and discussed with regard to the participants in the study (students), the kind of personal data to be given to the service providers (modified e-mail addresses and names) and the point at which usage of this data becomes a violation of privacy in a legal sense. Regarding the latter, it was agreed that legal advice from FIDIS partners should be pursued.
Regarding D14.6, a sketch of the table of contents and the schedule was discussed and fixed by the contributors. Legal requirements will be taken into account regarding whether log data can be used as evidence of the misuse of personal data. Secure logging is the foundation for preserving privacy in logging while generating privacy evidence. A result of the discussion is that log data is also personal in nature and should therefore be kept confidential.
Further Steps
Concerning D14.5, the field study will start in November 2007.
Concerning D14.6, the scenario and trust model for privacy are the starting points of this deliverable and will be written by ALU-FR as an orientation for: the identification of legal (ICRI) and technical requirements (TUD, ALU-FR), the presentation of related work on logging in general (ICPP) and secure logging (ALU-FR), the identification of additional security mechanisms (TUD) and the outlook (TUD, ALU-FR).
Annex 1: Participants
The participants of the workshop are listed in the following table:
Contr. No. | Organisation | Surname | First name |
1 | ICSS | Andronikou | Vassiliki |
2 | TU Dresden | Berthold | Stefan |
3 | ICRI | Coudert | Fanny |
4 | VIP | Dubuis | Eric |
5 | ICRI | Dumortier | Joseph |
6 | NFI | Edelman | Gerda |
7 | SIRRIX | Husseiki | Rani |
8 | ISRI | Kollanyi | Bence |
9 | TU Dresden | Köpsell | Stefan |
10 | ICRI | Kosta | Eleni |
11 | KU | Martucci | Leonardo |
12 | MU | Matyas | Vashek |
13 | ICPP | Meints | Martin |
14 | ICRI | van Alsenoy | Brendan |
15 | VaF | Vyskoc | Jozef |
16 | ALU-FR | Wohlgemuth | Sven |
| 0 / 0 |
