Abstract
The laws of identity and privacy protection goals are major requirements of user-centric personalized service environments. The goal is that users can send master data, preferences, attributes and claims together with policies to relying parties such as Cloud Services Providers in order to control purpose, usage, and availability of personally identifiable information. In order to meet the requirements and to establish a trusted end point this paper introduces a virtual representation of a user called LifeApp that can be downloaded and installed by relying partners. On the one hand this approach aims at empowering the user to control access, enforce policies, minimize misusage and enjoy – nonetheless – personalized contextual services. On the other hand relying parties benefit from synchronizing data whenever it changes at the user’s or the requester’s side. The advantages are up-to-date and authentic user data, simplified customer relationship management, and if needed compliance to local data protection. The paper introduces the app approach to personalized service environments based on the Kantara-UMA protocol.
Keywords
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Hansen, M.: Top 10 Mistakes in System Design from a Privacy Perspective and Privacy Protection Goals. In: Camenisch, J., Crispo, B., Fischer-Hübner, S., Leenes, R., Russello, G. (eds.) Privacy and Identity 2011. IFIP AICT, vol. 375, pp. 14–31. Springer, Heidelberg (2012) http://www.csc.kth.se/~buc/PPC/Slides/marit.pdf
Rost, M., Bock, K.: Privacy by Design and the New Protection Goals. Datenschutz und Datensicherheit 35, 30–35 (2011), https://www.european-privacy-seal.eu/results/articles/BockRost-PbD-DPG-en.pdf
Hardjono, T. (ed.): User Managed Access (UMA) Profile of OAuth 2.0. IETF Internet-Draft (2013), http://docs.kantarainitiative.org/uma/draft-uma-core.html
Cameron, K.: The Laws of Identity (2005), http://www.identityblog.com/stories/2005/05/13/TheLawsOfIdentity.pdf
Albrecht (Rapp.), J.P.: Draft Report on the proposal for a regulation with regard to the processing of personal data and on the free movement of such data (General Data Protection Regulation) (December 2011), http://www.europarl.europa.eu/meetdocs/2009_2014/documents/libe/pr/922/922387/922387en.pdf
Article 29 Data Protection Working Party, Opinion 05/2012 on Cloud Computing (July 2012), http://ec.europa.eu/justice/data-protection/article-29/documentation/opinion-recommendation/files/2012/wp196_en.pdf
González-Tablas, A.I., Alam, M., Hoffmann, M.: An architecture for user-managed location sharing in the Future Internet of Services. In: The 4th International Workshop on Trustworthy Internet of People, Things & Services, co-located with the Internet of Things 2010 Conference, Tokyo, Japan, November 29-December 1 (2010), http://www.seg.inf.uc3m.es/papers/2010tiopts.pdf
Fischer-Hübner, S., Hoofnagle, C., Krontiris, I., Rannenberg, K., Waidner, M. (eds.): Online Privacy: Towards Informational Self-Determination on the Internet, http://drops.dagstuhl.de/opus/volltexte/2011/3205/
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Hoffmann, M. (2013). An App Approach Towards User Empowerment in Personalized Service Environments. In: Lau, KK., Lamersdorf, W., Pimentel, E. (eds) Service-Oriented and Cloud Computing. ESOCC 2013. Lecture Notes in Computer Science, vol 8135. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-40651-5_12
Download citation
DOI: https://doi.org/10.1007/978-3-642-40651-5_12
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-40650-8
Online ISBN: 978-3-642-40651-5
eBook Packages: Computer ScienceComputer Science (R0)