File Formats Security – Proprietary vs. Open-Source

  • Edmund Laugasson
  • Kaido Kikkas
Part of the Lecture Notes in Computer Science book series (LNCS, volume 8523)


Privacy and confidentiality are important components of digital literacy. Yet nowadays documents can be found online, which apparently consist only of one or two pages yet have huge file size - even several megabytes. Such documents may contain sensitive data that has been deleted but actually is still there. Our study provides an analysis of such cases in public sector of Estonia. Based on experiments and public sector web page analysis we describe security threats and features of different file formats and offer suggestions for their use, e.g. we found that using open-source formats like OpenDocument may help prevention of accidental disclosure of data.


privacy confidentiality file format proprietary open-source vendor lock-in 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    van Hamel, A.: The Privacy Piece: Report on Privacy Competencies in Digital Literacy Programs in Canada, Britain, Australia, America, and Brazil. University of Ottawa (November 2011), (retrieved)
  2. 2.
    RISO. Estonian Interoperability Framework (2011), (retrieved)
  3. 3.
    RISO. Estonian state it architecture (2007), (retrieved)
  4. 4.
    Weir, R.: OpenDocument Format: The Standard for Office Documents. IEEE Internet Computing 13(2), 83 (2009)CrossRefMathSciNetGoogle Scholar
  5. 5.
    PC Magazine. PDF File Format to Become Open Standard (2007); PC Magazine Online (2007),,2817,2088283,00.asp (retrieved)
  6. 6.
    Park, E.G., Oh, S.: Examining Attributes of Open Standard File Formats for Long-term Preservation and Open Access. Information Technology & Libraries 31(4), 44–65 (2012)CrossRefMathSciNetGoogle Scholar
  7. 7.
    Microsoft, 3. Differences between the opendocument text (.odt) format and the word (.docx) format (2013), (retrieved)
  8. 8.
    Fu, Z., Liu, Y., Li, B., Sun, X.: Text split-based steganography in OOXML format documents for covert communication. Security and Communication Networks 5(9), 957–968 (2012), doi:10.1002/sec.378CrossRefGoogle Scholar
  9. 9.
    Microsoft, 1. Inspect documents for hidden data and personal information (2013), (retrieved)
  10. 10.
    Microsoft, 2. Remove hidden data and personal information by inspecting documents (2013), (retrieved)

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  • Edmund Laugasson
    • 1
  • Kaido Kikkas
    • 1
    • 2
  1. 1.Institute of InformaticsTallinn UniversityTallinnEstonia
  2. 2.Estonian Information Technology CollegeTallinnEstonia

Personalised recommendations