Skip to main content

A Layered Model for Understanding and Enforcing Data Privacy

  • Conference paper
  • First Online:
Information Technology - New Generations

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 558))

  • 3160 Accesses

Abstract

In this paper, we propose a layered model for the understanding and enforcing of information privacy. The proposed model consists of three levels. At the lowest level, called the Read/Write Layer, privacy is defined as the resistance and resilience to Read or Write violations in the information or information source. At the middle level, the sharing layer, a logical privacy connection can be set up between a source and sink based on an embedded privacy agreement (EPA). At the highest layer, the trust layer, privacy is determined based on the history of sharing between directly connected network entities. We describe how the privacy metrics differ at each layer and how they can be combined to have a three-layer information privacy model. This model can be used to assess privacy in a single-hop network and to design a privacy system for sharing data.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Ahmad, A., et al. (2016) Information privacy domain. International Journal of Information Privacy, Security and Integrity. To appear. http://dx.doi.org/10.1504/IJIPSI.2016.082124.

  2. Sweeney, L. (2002). Achieving k-anonymity privacy protection using generalization and suppression. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 10(05), 571–588.

    Article  MathSciNet  MATH  Google Scholar 

  3. Machanavajjhala, A., Kifer, D., Gehrke, J., & Venkitasubramaniam, M. (2007). l-diversity: Privacy beyond k-anonymity. ACM Transactions on Knowledge Discovery from Data (TKDD), 1(1), 3.

    Article  Google Scholar 

  4. Li, N., Li, T. and Venkatasubramanian, S. (2007, April). t-closeness: Privacy beyond k-anonymity and l-diversity. In 2007 I.E. 23rd International Conference on Data Engineering (pp. 106–115). IEEE. Istanbul.

    Google Scholar 

  5. Xiao, X. and Tao, Y. (2006, September). Anatomy: Simple and effective privacy preservation. In Proceedings of the 32nd international conference on Very Large Data Bases (pp. 139–150). VLDB Endowment. Seoul.

    Google Scholar 

  6. Xiao, X. and Tao, Y. (2007, June). M-invariance: towards privacy preserving re-publication of dynamic datasets. In Proceedings of the 2007 ACM SIGMOD international conference on Management of Data (pp. 689–700). ACM. Beijing.

    Google Scholar 

  7. Rajagopalan, S. R., Sankar, L., Mohajer, S., and Poor, H. V. (2011, October). Smart meter privacy: A utility-privacy framework. In Smart Grid Communications (SmartGridComm), 2011 I.E. International Conference on (pp. 190–195). IEEE. Brussel.

    Google Scholar 

  8. Makhdoumi, A., Salamatian, S., Fawaz, N., and Médard, M. (2014, November). From the information bottleneck to the privacy funnel. In Information Theory Workshop (ITW), 2014 IEEE (pp. 501–505). IEEE. Hobart.

    Google Scholar 

  9. Bezzi, M. (2010). An information theoretic approach for privacy metrics. Transactions on Data Privacy, 3(3), 199–215.

    MathSciNet  Google Scholar 

  10. Blanchard, J., Guillet, F., Gras, R., and Briand, H. (2005, November). Using information-theoretic measures to assess association rule interestingness. In Fifth IEEE international conference on Data Mining (ICDM’05) (pp. 8–pp). IEEE.

    Google Scholar 

  11. Solove, D. J. (2008). Understanding privacy. Cambridge: Harvard University Press. Available at http://understanding-privacy.com.

    Google Scholar 

  12. Fromholz, J. M. (2000). The European Union data privacy directive. Berkeley Technology Law Journal, 15, 461–484.

    Google Scholar 

  13. O’Herrin, J. K., Fost, N., & Kudsk, K. A. (2004). Health Insurance Portability Accountability Act (HIPAA) regulations: Effect on medical record research. Annals of Surgery, 239(6), 772–778.

    Article  Google Scholar 

  14. Cuaresma, J. C. (2002). The Gramm-Leach-Bliley Act. Berkeley Technology Law Journal, 17, 497–517. Boca Raton.

    Google Scholar 

  15. Inan, A., Kantarcioglu, M., Ghinita, G., and Bertino, E. (2010, March). Private record matching using differential privacy. International conference on Extending Database Technology (pp. 123–134). ACM. Lausanne.

    Google Scholar 

  16. He, X., Machanavajjhala, A., and Ding, B. (2014, June). Blowfish privacy: Tuning privacy-utility trade-offs using policies. In Proceedings of the 2014 ACM SIGMOD international conference on Management of Data (pp. 1447–1458). ACM. Snowbird.

    Google Scholar 

  17. Kessler, S., Buchmann, E., and Böhm, K. (2015). Deploying and evaluating pufferfish privacy for smart meter data. Karlsruhe Reports in Informatics, 1, 229–238.

    Google Scholar 

  18. Kifer, D., & Machanavajjhala, A. (2014). Pufferfish: A framework for mathematical privacy definitions. ACM Transactions on Database Systems (TODS), 39(1), 3.

    Article  MathSciNet  MATH  Google Scholar 

  19. Mukkamala, R., Ahmad, A. and Nvuluri, K. (2016). Privacy-aware big data warehouse architecture. IEEE International Congress on Big Data, San Francisco, June 2016.

    Google Scholar 

  20. Rutten, W., Rutten, W., Blaas-Franken, J., Blaas-Franken, J., Martin, H., & Martin, H. (2016). The impact of (low) trust on knowledge sharing. Journal of Knowledge Management, 20(2), 199–214.

    Article  Google Scholar 

  21. Papadopoulos, S., Bontcheva, K., Jaho, E., Lupu, M., & Castillo, C. (2016). Overview of the special issue on trust and veracity of information in social media. ACM Transactions on Information Systems (TOIS), 34(3), 14.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ravi Mukkamala .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG

About this paper

Cite this paper

Ahmad, A., Mukkamala, R. (2018). A Layered Model for Understanding and Enforcing Data Privacy. In: Latifi, S. (eds) Information Technology - New Generations. Advances in Intelligent Systems and Computing, vol 558. Springer, Cham. https://doi.org/10.1007/978-3-319-54978-1_29

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-54978-1_29

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-54977-4

  • Online ISBN: 978-3-319-54978-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics