A Semantic Model for Personal Consent Management

  • Ozgu Can
Part of the Communications in Computer and Information Science book series (CCIS, volume 390)

Abstract

Data protection and privacy has a significant importance in information sharing mechanisms, especially in domains that handle with sensitive information. The knowledge that can be inferred from this sensitive information may unveil the consumer’s personal information. Consumers should control who can access their consent data and for what purposes this data will be used. Therefore, information sharing requires effective policies to protect the personal data and to ensure the consumer’s privacy needs. As different consumers have different privacy levels, each consumer should determine one’s own consent policy. Besides ensuring personal privacy, information sharing to obtain personal data usage for acceptable reasons should be endorsed. This work proposes a semantic web based personal consent management model. In this model, consumers specify their consent data and create their personal consent policy for their consent data according to their privacy concerns. Thus, personalized consumer privacy for consent management will be ensured and reasonable information sharing for the personal data usage will be supported.

Keywords

Consent Management Privacy Semantic Web 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Sweeney, L.: Uniqueness of Simple Demographics in the U.S. Population. Technical Report, Carnegie Mellon University (2000)Google Scholar
  2. 2.
    Cooper, T., Collman, J.: Managing Information Security and Privacy in Healthcare Data Mining: State of the Art. Medical Informatics: Knowledge Management and Data Mining in Biomedicine 8, 95–137 (2005)Google Scholar
  3. 3.
    Kluge, E.-H.W.: Informed consent and the security of the electronic health record (EHR): Some policy considerations. International Journal of Medical Informatics 73(3), 229–234 (2004)CrossRefGoogle Scholar
  4. 4.
    Sweeney, L.: k-Anonymity: A Model for Protecting Privacy. International Journal on Uncertainty, Fuzziness and Knowledge-based Systems 10(5), 557–570 (2002)Google Scholar
  5. 5.
    Machanavajjhala, A., Gehrke, J., Kifer, D., Venkitasubramaniam, M.: ℓ-Diversity: Privacy Beyond k-Anonymity. In: Proceedings of the 22nd International Conference on Data Engineering (ICDE 2006), p. 24 (2006)Google Scholar
  6. 6.
    Li, N., Li, T., Venkatasubramanian, S.: t-Closeness: Privacy Beyond k-Anonymity and ℓ-Diversity. In: Proc. of Int. Conf. on Data Engineering (ICDE 2007) (2007)Google Scholar
  7. 7.
    Coiera, E., Clarke, R.: e-Consent: The Design and Implementation of Consumer Consent Mechanisms in an Electronic Environment. Journal of the American Medical Informatics Association 11(2), 129–140 (2004)Google Scholar
  8. 8.
    Anderson, R.J.: A Security Policy Model for Clinical Information Systems. In: Proceedings of the 1996 IEEE Symposium on Security and Privacy (1996)Google Scholar
  9. 9.
    Blobel, B.: Authorisation and Access Control for Electronic Health Record Systems. International Journal of Medical Informatics 73(3), 251–257 (2004)CrossRefGoogle Scholar
  10. 10.
    Khan, A., Nadi, S.: Consentir: An Electronic Patient Consent Management System. In: 4th Annual Symposium of Health Technology (2010)Google Scholar
  11. 11.
    Becker, M.Y., Sewell, P.: Cassandra: Flexible Trust Management, Applied to Electronic Health Records. In: Proceedings of the 17th IEEE Computer Security Foundations Workshop (CSFW 2004), pp. 139–154 (2004)Google Scholar
  12. 12.
    Ko, Y.-Y., Liou, D.-M.: The Study of Managing the Personal Consent in the Electronic Healthcare Environment. World Academy of Science, Engineering and Technology 65, 314 (2010)Google Scholar
  13. 13.
    Russello, G., Dong, C., Dulay, N.: Consent-based Workflows for Healthcare Management. In: Proceedings of the 2008 IEEE Workshop on Policies for Distributed Systems and Networks (2008)Google Scholar
  14. 14.
    Samarati, P.: Protecting Respondents Identities in Microdata Release. IEEE Transactions on Knowledge and Data Engineering 13(6), 1010–1027 (2001)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2013

Authors and Affiliations

  • Ozgu Can
    • 1
  1. 1.Department of Computer EngineeringEge UniversityBornova-IzmirTurkey

Personalised recommendations