Skip to main content

Operational Pseudonymization and Pseudonym Disclosure

  • Chapter
Privacy-Respecting Intrusion Detection

Part of the book series: Advances in Information Security ((ADIS,volume 35))

  • 439 Accesses

In the following, we tie together the solutions presented in the previous Chapters of this Part and describe how to generate the pseudonym mapping and the data in the pseudonymity-layer as well as how pseudonym disclosure works. The associations and dependencies between the elements in the application-layer, in the decision tree, in the pseudonymity-layer, and in the pseudonym mapping are depicted in Fig. 15.1, already respecting the extensions in Sect. 16.3 and Sect. 16.6. Figure 15.2 depicts an abstraction of the respective data flow, showing for a given triplet of identity, disclosure context and weight the cryptographic operations for data in the pseudonymity-layer and in the pseudonym mapping, as well as the mismatch avoidance/detection and the selection of the pseudonym mapping entry corresponding to a recovered secret. In the gap between the pseudonymizer and the reidentifier in Fig. 15.2 the data is shown, which is actually transmitted from the pseudonymizer to the reidentifier. Considering this data, the encrypted features c i and the entry verifiers v i are components of the pseudonym mapping, whereas the remaining data resides in the pseudonymity-layer. Note, that Fig. 15.2 omits operations in the application-layer, the linkage to the application-layer, the initialization, the use of the decision tree and some further details.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 159.00
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer Science+Business Media, LLC

About this chapter

Cite this chapter

(2007). Operational Pseudonymization and Pseudonym Disclosure. In: Privacy-Respecting Intrusion Detection. Advances in Information Security, vol 35. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-68254-9_15

Download citation

  • DOI: https://doi.org/10.1007/978-0-387-68254-9_15

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-0-387-34346-4

  • Online ISBN: 978-0-387-68254-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics