Browse > Article
http://dx.doi.org/10.13089/JKIISC.2013.23.4.629

A Study on the Self-destructing Data for Information Privacy  

Kim, Jonguk (Ajou University)
Kang, Sukin (Ajou University)
Hong, Manpyo (Ajou University)
Abstract
Recently the interest in the information privacy has been growing. Digital data can be easily transferred via Internet. Service providers ask users for private data to give customized services. Users believe that their shared data are protected as they deliver their private data securely. However, their private data may be leaked if service providers do not delete or initialize them when they expire. The possibility of information leak may lower if the service providers deal with users' private data properly. In this paper, we study the self-destruction of private data for information privacy and propose the glass-box model.
Keywords
Information Privacy; Information Security; Digital Forensic; Data Privacy Model;
Citations & Related Records
연도 인용수 순위
  • Reference
1 D.L. Chaum, "Untraceable electronic mail, return addresses, and digital pseudonyms," Communications of the ACM, vol. 24, no. 2, pp. 84-90. Feb. 1981.   DOI   ScienceOn
2 R. Dingledine, N. Mathewson, and P. Syverson, "Tor: the second-generation onion router," In Proceedings of the 13th conference on USENIX Security Symposium(SSYM'04), vol. 13. pp. 21, June-July 2004.
3 A. Pfitzmann and M. Hansen, "A terminology for talking about privacy by data minimization: Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management v0.34,", http://dud.inf.tu-dresden.de/literatur/Anon_Terminology_v0.34.pdf, 2010년 8월 10일
4 W3C, "Platform for Privacy Preferences (P3P) Project," http://www.w3.org/P3P, 2013년 7월 25일
5 K.G. Shin, X. Ju, Z. Chen, and X. Hu, "Privacy protection for users of location- based services," Wireless Communications, IEEE, vol. 19, no. 1, pp. 30-39, Feb. 2012.
6 F. Stajano and R. Anderson, "The grenade timer: Fortifying the watchdog timer against malicious mobile code," In Proceedings of 7th International Workshop on Mobile Multimedia Communications (MoMuC 2000), pp. 1-5, Oct. 2000.
7 B. Blakley, "The emperor's old armor," In Proceedings of the 1996 workshop on New security paradigms(NSPW '96), pp. 2-16, Sept. 1996.
8 Sun Microsystems, Inc. "The Java Language Specification," 3rd Ed., http://docs.oracle.com/javase/specs/jls/se5.0/html/j3TOC.html, 2013년 7월 16일
9 K.D. Mitnick and W.L. Simon, The Art of Deception: Controlling the Human Element of Security, John Wiley & Sons, Inc., 2003.
10 D. Boneh and R.J. Lipton, "A revocable backup system," In Proceedings of the 6th conference on USENIX Security Symposium, Focusing on Applications of Cryptography(SSYM'96), vol. 6. pp. 9. 1996.
11 R. Cardoso and V. Issarny, "Architecting pervasive computing systems for privacy: A survey," In Proceedings of the Sixth Working IEEE/IFIP Conference on Software Architecture(WICSA '07), pp. 26, Jan. 2007.
12 S. Bellovin, "Security and Privacy: Enemies or Allies?," Security & Privacy, IEEE, vol. 3, no. 3, pp. 92, June 2005.   DOI   ScienceOn
13 S. Oaks, Java Security, 2nd Ed., O'Reilly Media, Inc., Jun. 2013.
14 R. Geambasu, T. Kohno, A.A. Levy, and H.M. Levy, "Vanish: increasing data privacy with self-destructing data," In Proceedings of the 18th conference on USENIX security symposium(SSYM'09), pp. 299-316, Aug. 2009.
15 A. Shamir, "How to share a secret," Communications of the ACM, vol. 22, no. 11, pp. 612-613, Nov. 1979.   DOI   ScienceOn
16 L. Gong and R. Schemers, "Signing, Sealing, and Guarding Java Objects," In Mobile Agents and Security, Springer- Verlag, UK, pp. 206-216, Aug. 1998.