2016
DOI: 10.1007/978-3-319-45741-3_7
|View full text |Cite
|
Sign up to set email alerts
|

Insynd: Improved Privacy-Preserving Transparency Logging

Abstract: Abstract. Service providers collect and process more user data then ever, while users of these services remain oblivious to the actual processing and utility of the processed data to the service providers. This leads users to put less trust in service providers and be more reluctant to share data. Transparency logging is about service providers continuously logging descriptions of the data processing on their users' data, where each description is intended for a particular user. We propose Insynd, a new crypto… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 14 publications
0
3
0
Order By: Relevance
“…Informed privacy settings [35] Consent Management Platforms [36]- [38] Privacy nudges [39]- [42] Data Management Data minimization [24] De-identification [43] Differential privacy [44] Local differential privacy [45] Compliant database [46] Policies P3P [47], [48] Enterprise privacy policies [49] Sticky policies [50]- [52] Access Control (Data User) [53], [54] Access Control (Data Subject) [55] Privacy API [56] Monitoring Minimization monitoring [57] Logging [58]- [60] Workflow auditing [61] Legend: D design time decision, R runtime decision, primary principle the technology contributes to (not necessarily complete so other technologies can still be required), other principles the technology can contribute to.…”
Section: User Preferencesmentioning
confidence: 99%
“…Informed privacy settings [35] Consent Management Platforms [36]- [38] Privacy nudges [39]- [42] Data Management Data minimization [24] De-identification [43] Differential privacy [44] Local differential privacy [45] Compliant database [46] Policies P3P [47], [48] Enterprise privacy policies [49] Sticky policies [50]- [52] Access Control (Data User) [53], [54] Access Control (Data Subject) [55] Privacy API [56] Monitoring Minimization monitoring [57] Logging [58]- [60] Workflow auditing [61] Legend: D design time decision, R runtime decision, primary principle the technology contributes to (not necessarily complete so other technologies can still be required), other principles the technology can contribute to.…”
Section: User Preferencesmentioning
confidence: 99%
“…A prefix tree and a history tree can be combined into a single system to form a verifiable log-backed map [8], [83] (see also Key Transparency [82] and the proposed enhanced certificate transparency [163]). (The prefix tree can alternatively be a hash treap [151], [156]. )…”
Section: Logging Mechanismmentioning
confidence: 99%
“…Extended Certificate Transparency [43] adds a second log to efficiently handle certificate revocation and presents an application to secure email. Finally, a number of works have focused on building general transparent data structures and enabling computation over them [40,41,37,49].…”
Section: Related Workmentioning
confidence: 99%