Encyclopedia of Database Systems

2018 Edition
| Editors: Ling Liu, M. Tamer Özsu

Privacy-Enhancing Technologies

  • Simone Fischer-Hübner
Reference work entry
DOI: https://doi.org/10.1007/978-1-4614-8265-9_271

Synonyms

PETs

Definition

Privacy-enhancing technologies (PETs) can be defined as technologies that are enforcing privacy principles in order to protect and enhance the privacy of users of information technology (IT) and/or of individuals about whom personal data are processed (the so-called data subjects). Privacy principles that PETs are enforcing can be derived from internationally acknowledged privacy guidelines or legislation, such as the OECD Privacy Guidelines, the EU Data Protection Directive 95/46/EC and the EU General Data Protection Regulation (GDPR), and the proposed General EU Data Protection Regulation. One fundamental privacy principle that serves as the foundation for the privacy-enhancing technologies that are aiming at providing anonymity, pseudonymity, or unobservabilityfor users and/or other data subjects is the privacy principles of data minimization. It requires that the collection of personally identifiable data should be minimized (and if possible avoided),...

This is a preview of subscription content, log in to check access.

Recommended Reading

  1. 1.
    Chaum DL. Untraceable electronic mail, return addresses, and digital pseudonyms. Commun ACM. 1981;24(2):84–8.CrossRefGoogle Scholar
  2. 2.
    Chaum DL. Security without identification: card computers to make big brother obsolete. Informatik-Spektrum. 1987;10:262–77.Google Scholar
  3. 3.
    Chaum DL. The dining cryptographers problem: unconditional sender and recipient untraceability. J Cryptol. 1988;1(1):65–75.MathSciNetzbMATHCrossRefGoogle Scholar
  4. 4.
    Registratiekamer, Information and Privacy Commissioner/Ontario. Privacy-enhancing technologies: the path to anonymity. Achtergrondstudies en Verkenningen 5B, vols. I and II, Rijswijk. 1995.Google Scholar
  5. 5.
    Brands S. Rethinking public key infrastructure and digital certificates – building in privacy. PhD thesis. Eindhoven: Institute of Technology; 1999.Google Scholar
  6. 6.
    Camenisch J, Fischer-Hübner S, & Rannenberg K (Eds.). Privacy and identity management for life. Springer Science & Business Media; 2011.Google Scholar
  7. 7.
    Dingledine R, Mathewson N, Syverson P. Tor: the second-generation onion router. In: Proceedings of the 13th USENIX Security Symposium; 2004.Google Scholar
  8. 8.
    Reed MG, Syverson PF, Goldschlag DM. Anonymous connections and onion routing. IEEE J Select Areas Commn. 1998;16(4):482–94.CrossRefGoogle Scholar
  9. 9.
    Reiter M, Rubin A. Anonymous web transactions with crowds. Commun ACM. 1999;42(2):32–48.CrossRefGoogle Scholar
  10. 10.
    Cranor L. Web privacy with P3P. Sebastopol: O’Reilly; 2002.Google Scholar
  11. 11.
    Dwork C. Differential privacy. Automata, languages and programming. Berlin/Heidelberg: Springer; 2006. p. 1–12.zbMATHCrossRefGoogle Scholar
  12. 12.
    Fischer-Hübner S. IT-security and privacy: design and use of privacy enhancing security mechanisms, LNCS, vol. 1958. Berlin: Springer LNCS; 2001. ISBN:3-540-42142-4.zbMATHGoogle Scholar
  13. 13.
    PrimeLife. Privacy and identity management in Europe for life – policy languages. http://primelife.ercim.eu/results/primer/133-policy-languages Accessed 11 Aug 2014.
  14. 14.
    Cooper DA, Birman KP. Preserving privacy in a network of mobile computers. In: Proceedings of the 1995 IEEE Symposium on Security and Privacy; 1995. p. 26–83.Google Scholar
  15. 15.
    Camenisch J, van Herreweghen E. Design and implementation of the idemix anonymous credential system. In: Proceedings of the 9th ACM Conference on Computer and Communications Security; 2002. p. 21–30.Google Scholar
  16. 16.
    Karjoth G, Schunter M, Waidner M. Platform for enterprise privacy practices: privacy-enabled management of customer data. In: Proceedings of the 2nd Workshop on Privacy Enhancing Technologies; 2002. p. 69–84.zbMATHCrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  1. 1.Karlstad UniversityKarlstadSweden

Section editors and affiliations

  • Elena Ferrari
    • 1
  1. 1.DiSTAUniversity of InsubriaVareseItaly