Synonyms
PETs
Definition
Privacy-enhancing technologies (PETs) can be defined as technologies that are enforcing privacy principles in order to protect and enhance the privacy of users of information technology (IT) and/or of individuals about whom personal data are processed (the so-called data subjects). Privacy principles that PETs are enforcing can be derived from internationally acknowledged privacy guidelines or legislation, such as the OECD Privacy Guidelines, the EU Data Protection Directive 95/46/EC and the EU General Data Protection Regulation (GDPR), and the proposed General EU Data Protection Regulation. One fundamental privacy principle that serves as the foundation for the privacy-enhancing technologies that are aiming at providing anonymity, pseudonymity, or unobservabilityfor users and/or other data subjects is the privacy principles of data minimization. It requires that the collection of personally identifiable data should be minimized (and if possible avoided),...
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsRecommended Reading
Chaum DL. Untraceable electronic mail, return addresses, and digital pseudonyms. Commun ACM. 1981;24(2):84–8.
Chaum DL. Security without identification: card computers to make big brother obsolete. Informatik-Spektrum. 1987;10:262–77.
Chaum DL. The dining cryptographers problem: unconditional sender and recipient untraceability. J Cryptol. 1988;1(1):65–75.
Registratiekamer, Information and Privacy Commissioner/Ontario. Privacy-enhancing technologies: the path to anonymity. Achtergrondstudies en Verkenningen 5B, vols. I and II, Rijswijk. 1995.
Brands S. Rethinking public key infrastructure and digital certificates – building in privacy. PhD thesis. Eindhoven: Institute of Technology; 1999.
Camenisch J, Fischer-Hübner S, & Rannenberg K (Eds.). Privacy and identity management for life. Springer Science & Business Media; 2011.
Dingledine R, Mathewson N, Syverson P. Tor: the second-generation onion router. In: Proceedings of the 13th USENIX Security Symposium; 2004.
Reed MG, Syverson PF, Goldschlag DM. Anonymous connections and onion routing. IEEE J Select Areas Commn. 1998;16(4):482–94.
Reiter M, Rubin A. Anonymous web transactions with crowds. Commun ACM. 1999;42(2):32–48.
Cranor L. Web privacy with P3P. Sebastopol: O’Reilly; 2002.
Dwork C. Differential privacy. Automata, languages and programming. Berlin/Heidelberg: Springer; 2006. p. 1–12.
Fischer-Hübner S. IT-security and privacy: design and use of privacy enhancing security mechanisms, LNCS, vol. 1958. Berlin: Springer LNCS; 2001. ISBN:3-540-42142-4.
PrimeLife. Privacy and identity management in Europe for life – policy languages. http://primelife.ercim.eu/results/primer/133-policy-languages Accessed 11 Aug 2014.
Cooper DA, Birman KP. Preserving privacy in a network of mobile computers. In: Proceedings of the 1995 IEEE Symposium on Security and Privacy; 1995. p. 26–83.
Camenisch J, van Herreweghen E. Design and implementation of the idemix anonymous credential system. In: Proceedings of the 9th ACM Conference on Computer and Communications Security; 2002. p. 21–30.
Karjoth G, Schunter M, Waidner M. Platform for enterprise privacy practices: privacy-enabled management of customer data. In: Proceedings of the 2nd Workshop on Privacy Enhancing Technologies; 2002. p. 69–84.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Section Editor information
Rights and permissions
Copyright information
© 2018 Springer Science+Business Media, LLC, part of Springer Nature
About this entry
Cite this entry
Fischer-Hübner, S. (2018). Privacy-Enhancing Technologies. In: Liu, L., Özsu, M.T. (eds) Encyclopedia of Database Systems. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-8265-9_271
Download citation
DOI: https://doi.org/10.1007/978-1-4614-8265-9_271
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4614-8266-6
Online ISBN: 978-1-4614-8265-9
eBook Packages: Computer ScienceReference Module Computer Science and Engineering