Definitions
Privacy-enhancing technologies (PET) aim to design information and communication systems in accordance with privacy law such as the European General Data Protection Regulation (GDPR, 2016). PET consist of technical and organizational building blocks to minimizing the collection of personal data as well as their protection against unauthorized access, modification and/or destruction.
Background
Technical building blocks of PET consist of (1) general security mechanisms of modern computer systems, such as access control, cryptographic protection (encryption, message authentication codes, digital signatures) and redundancies, in order to fulfil the classical protection goals confidentiality, integrity, authenticity and availability, and (2) advanced protection measureswhich eliminate or minimize the use of personal data (and thereby prevent unnecessary or...
References
Blarkom G, Borking J, Verhaar P (2003) The case of intelligent software agents. In: Handbook of privacy and privacy-enhancing technologies. The Hague, pp 33–54. https://www.andrewpatrick.ca/pisa/handbook/Handbook_Privacy_and_PET_final.pdf
Cavoukian A (2011) Privacy by design – the 7 foundational principles. Revised version. https://www. ipc.on.ca/wp-content/uploads/resources/7foundational principles.pdf
Chaum D (1981) Untraceable electronic mail, return addresses, and digital pseudonyms. Commun ACM 24(2):84–88
Dingledine R, Mathewson N, Syverson P (2004) Tor: the second-generation onion router. In: Proceedings of 13th Conference on USENIX Security Symposium (SSYM’04), vol 13, Aug 2004. https://dl.acm.org/doi/10.5555/1251375.1251396
Federrath H (2005) Privacy enhanced technologies: methods – markets – misuse. In: Proceedings of 2nd International Conference on Trust, Privacy, and Security in Digital Business (TrustBus’05). LNCS 3592, Springer, pp 1–9
GDPR (2016) Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC (General Data Protection Regulation). https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:32016R0679
Hes R, Borking J (1995) Privacy-enhancing technologies: the path to anonymity. Registratiekamer 1995. Revised version (2000) at https://www.researchgate.net/pub- lication/243777645_Privacy-Enhancing_Technologies_ The_Path_to_Anonymity
Hoepman JH (2014) Privacy design strategies. In: Proceedings of 29th IFIP TC 11 International Information Security and Privacy Conference (SEC’14). AICT 428. Springer, pp 446–459
Pfitzmann A, Hansen M (2010) A terminology for talking about privacy by data minimization: anonymity, unlinkability, undetectability, unobservability, pseudonymity, and identity management. Version 0.34, 10 Aug 2010. https://dud.inf.tu-dresden.de/Anon_Terminology.shtml
Wagner I, Eckhoff D (2018) Technical privacy metrics: a systematic survey. ACM Comput Surv 51(3):Article 57. https://arxiv.org/abs/1512.00327
Solms von S, Naccache D (1992) Blind signatures and perfect crimes. Comput Secur 11(6):581–583
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Section Editor information
Rights and permissions
Copyright information
© 2021 Springer Science+Business Media LLC
About this entry
Cite this entry
Federrath, H. (2021). Privacy-Enhancing Technologies (PET). In: Jajodia, S., Samarati, P., Yung, M. (eds) Encyclopedia of Cryptography, Security and Privacy. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-27739-9_1597-1
Download citation
DOI: https://doi.org/10.1007/978-3-642-27739-9_1597-1
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-27739-9
Online ISBN: 978-3-642-27739-9
eBook Packages: Springer Reference Computer SciencesReference Module Computer Science and Engineering