2019
DOI: 10.1007/978-3-030-16744-8_11
|View full text |Cite
|
Sign up to set email alerts
|

Privacy Patterns for Pseudonymity

Abstract: To implement the principle of Privacy by Design mentioned in the European General Data Protection Regulation one important measurement stated there is pseudonymisation. Pseudonymous data is widely used in medical applications and is investigated e.g. for vehicular adhoc networks and Smart Grid. The concepts used there address a broad range of important aspects and are therefore often specific and complex. Some privacy patterns are already addressing pseudonymity, but they are mostly abstract or rather very spe… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 29 publications
0
4
0
Order By: Relevance
“…A recent literature study on privacy patterns research [17] identified 148 privacy patterns in total, recognizing that privacy patterns are a relatively young field compared to others. Some more recent works continue to expand the available privacy patterns (e.g., the work of Gabel et al [18] on pseudonymity patterns). Other indicative resources for the retrieval of privacy-related patterns include works from Chung et al [19], Hafiz [20,21], Drozd [22], Schümmer [23], Schumacher [24], and Graf et al [25].…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…A recent literature study on privacy patterns research [17] identified 148 privacy patterns in total, recognizing that privacy patterns are a relatively young field compared to others. Some more recent works continue to expand the available privacy patterns (e.g., the work of Gabel et al [18] on pseudonymity patterns). Other indicative resources for the retrieval of privacy-related patterns include works from Chung et al [19], Hafiz [20,21], Drozd [22], Schümmer [23], Schumacher [24], and Graf et al [25].…”
Section: Related Workmentioning
confidence: 99%
“…Implementation techniques that can be used to provide the unlinkability property are, for the most part, common to those providing anonymity (e.g., Mix networks [46], DC-nets [68], and Onion Routing [69]). Other pertinent tools include various track and evident erasers [49] (e.g., spyware detection and removal tools, browser cleaning tools, activity traces erasers, and hard disk data erasers), as well as identity federation and data fragmentation techniques [18]. Finally, the use of dummies (be it dummy traffic, dummy activity traces, and any other dummy data and actions) can be used to provide unlinkability between a user and their actions [21,57,66].…”
Section: Unlinkabilitymentioning
confidence: 99%
See 1 more Smart Citation
“…privacy pattern collections The concept of design patterns from software engineering was later extended to security [172] and privacy [173,174]. Continuous efforts by the research community have resulted in a comprehensive collection of privacy patterns being available today, covering a multitude of topics including but not limited to anonymity [174] and pseudonymity [175], the development and application of PETs [176],…”
Section: Privacy (Design) Patternsmentioning
confidence: 99%