Skip to main content

Advertisement

SpringerLink
Book cover

The Future Internet Assembly

FIA 2011: The Future Internet pp 223–231Cite as

  1. Home
  2. The Future Internet
  3. Conference paper
Data Usage Control in the Future Internet Cloud

Data Usage Control in the Future Internet Cloud

  • Michele Bezzi18 &
  • Slim Trabelsi18 
  • Conference paper
  • Open Access
  • 31k Accesses

  • 6 Citations

Part of the Lecture Notes in Computer Science book series (LNCCN,volume 6656)

Abstract

The increasing collection of private information from individuals is becoming a very sensitive issue for citizens, organizations, and regulators. Laws and regulations are evolving and new ones are continuously cropping up in order to try to control the terms of usage of these collected data, but generally not providing a real efficient solution. Technical solutions are missing to help and support the legislator, the data owners and the data collectors to verify the compliance of the data usage conditions with the regulations. Recent studies address these issues by proposing a policy-based framework to express data handling conditions and enforce the restrictions and obligations related to the data usage. In this paper, we first review recent research findings in this area, outlining the current challenges. In the second part of the paper, we propose a new perspective on how the users can control and visualize the use of their data stored in a remote server or in the cloud. We introduce a trusted event handler and a trusted obligation engine, which monitors and informs the user on the compliance with a previously agreed privacy policy.

Keywords

  • Privacy
  • Usage control
  • Privacy Policy

Download conference paper PDF

References

  1. Ardagna, C.A., Cremonini, M., De Capitani di Vimercati, S., Samarati, P.: A privacy-aware access control system. J. Comput. Secur. 16, 369–397 (2008)

    CrossRef  Google Scholar 

  2. Ashley, P., Hada, S., Karjoth, G., Powers, C., Schunter, M.: Enterprise privacy authorization language (EPAL 1.1). IBM Research Report (2003)

    Google Scholar 

  3. Bonneau, J., Preibusch, S.: The privacy jungle:on the market for data protection in social networks. In: Moore, T., Pym, D., Ioannidis, C. (eds.) Economics of Information Security and Privacy, pp. 121–167. Springer, New York (2010)

    CrossRef  Google Scholar 

  4. Bussard, L., Neven, G., Preiss, F.S.: Downstream usage control. In: IEEE International Workshop on Policies for Distributed Systems and Networks, pp. 22–29 (2010)

    Google Scholar 

  5. Karjoth, G., Schunter, M., Waidner, M.: Platform for enterprise privacy practices: Privacy-enabled management of customer data. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, vol. 2482, pp. 69–84. Springer, Heidelberg (2003)

    CrossRef  Google Scholar 

  6. Naedele, M., Koch, T.E.: Trust and tamper-proof software delivery. In: Proceedings of the 2006 international workshop on Software engineering for secure systems. SESS ’06, New York, NY, USA, pp. 51–58. ACM Press, New York (2006), doi:10.1145/1137627.1137636

    CrossRef  Google Scholar 

  7. Reagle, J., Cranor, L.F.: The platform for privacy preferences. Commun. ACM 42, 48–55 (1999), doi:10.1145/293411.293455

    CrossRef  Google Scholar 

  8. Rissanen, E.: extensible access control markup language (xacml) version 3.0, extensible access control markup language (xacml) version 3.0, oasis (August 2008)

    Google Scholar 

  9. Shostack, A., Syverson, P.: What price privacy? In: Camp, L., Lewis, S. (eds.) Economics of Information Security, Advances in Information Security, vol. 12, pp. 129–142. Springer, New York (2004)

    CrossRef  Google Scholar 

  10. Trabelsi, S., Njeh, A., Bussard, L., Neven, G.: The ppl engine: A symmetric architecture for privacy policy handling. W3C Workshop on Privacy and data usage control p. 5 (October 2010), http://www.w3.org/2010/policy-ws/

  11. Tsai, J.Y., Egelman, S., Cranor, L., Acquisti, A.: The Effect of Online Privacy Information on Purchasing Behavior: An Experimental Study. In: ICIS 2007 Proceedings, p. 20 (2007)

    Google Scholar 

Download references

Author information

Authors and Affiliations

  1. SAP Labs, 06253, Mougins, France

    Michele Bezzi & Slim Trabelsi

Authors
  1. Michele Bezzi
    View author publications

    You can also search for this author in PubMed Google Scholar

  2. Slim Trabelsi
    View author publications

    You can also search for this author in PubMed Google Scholar

Editor information

Editors and Affiliations

  1. Knowledge Media Institute (KMi), The Open University, Milton Keynes, UK

    John Domingue

  2. Dept. of Electronic and Electrical Engineering, University College London, London, UK

    Alex Galis

  3. Eurescom GmbH, Heidelberg, Germany

    Anastasius Gavras

  4. Synelixis/TEI of Chalkida, Greece

    Theodore Zahariadis

  5. Knowledge Media Institute, The Open University, Milton Keynes, UK

    Dave Lambert

  6. Waterford Institute of Technology –TSSG, Waterford, Ireland

    Frances Cleary

  7. CERTH-ITI, Thessaloniki, Greece

    Petros Daras

  8. Ericsson Serbia, Belgrade, Serbia

    Srdjan Krco

  9. Business Information Systems, University of Applied Sciences Western Switzerland, Sierre, Switzerland

    Henning Müller

  10. IC Focus, London, UK

    Man-Sze Li

  11. ESoCE Net, Dialogic, Aalto University School of Economics (CKIR), Aalto, Finland

    Hans Schaffers

  12. SAP Research, Sophia Antipolis, France

    Volkmar Lotz

  13. Universidad Politécnica de Madrid, Spain

    Federico Alvarez

  14. University of Zurich, Switzerland

    Burkhard Stiller

  15. SAP Research, Karlsruhe, Germany

    Stamatis Karnouskos

  16. Université Pierre et Marie Curie (UPMC), Paris, France

    Susanna Avessta

  17. Lulea University of Technology, Lulea, Sweden

    Michael Nilsson

Rights and permissions

Open Access This chapter is licensed under the terms of the Creative Commons Attribution-NonCommercial 2.5 International License (http://creativecommons.org/licenses/by-nc/2.5/), which permits any noncommercial use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license and indicate if changes were made.

The images or other third party material in this chapter are included in the chapter’s Creative Commons license, unless indicated otherwise in a credit line to the material. If material is not included in the chapter's Creative Commons license and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder.

Reprints and Permissions

Copyright information

© 2011 The Author(s)

About this paper

Cite this paper

Bezzi, M., Trabelsi, S. (2011). Data Usage Control in the Future Internet Cloud. In: , et al. The Future Internet. FIA 2011. Lecture Notes in Computer Science, vol 6656. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-20898-0_16

Download citation

  • .RIS
  • .ENW
  • .BIB
  • DOI: https://doi.org/10.1007/978-3-642-20898-0_16

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-20897-3

  • Online ISBN: 978-3-642-20898-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Share this paper

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

Over 10 million scientific documents at your fingertips

Switch Edition
  • Academic Edition
  • Corporate Edition
  • Home
  • Impressum
  • Legal information
  • Privacy statement
  • California Privacy Statement
  • How we use cookies
  • Manage cookies/Do not sell my data
  • Accessibility
  • FAQ
  • Contact us
  • Affiliate program

Not affiliated

Springer Nature

© 2023 Springer Nature Switzerland AG. Part of Springer Nature.