Abstract
In a time where more and more information about people is collected, especially in the digital domain, the right to be left alone and to be free of surveillance, i.e., privacy, is no longer as self-evident as it once was. Therefore, it is important that new systems are designed with privacy in mind. This chapter explores the notion of privacy and how to design “privacy-preserving” systems: systems that are designed with privacy for the end users in mind. Several design approaches that address this issue, such as “Privacy by Design,” “Value Sensitive Design,” and “Privacy Enhancing Technologies,” are discussed. Examples of privacy-preserving (and breaking) systems, ranging from smart meters to electronic health records, are used to illustrate the main difficulties of designing such systems.
Keywords
This is a preview of subscription content, log in via an institution.
Notes
- 1.
As an example, consider the case of Wolfgang Werle. Werle has been convicted for murder in Germany. He used German privacy laws to sue Wikipedia to get this information removed from his German Wikipedia page. After winning the case, Werle’s German Wikipedia page no longer exists, but the information is still accessible from, among others, the English and Dutch Wikipedia pages.
- 2.
Or indeed, how to verify the absence of bugs in computer systems.
- 3.
For example, the NSA can almost certainly indentify users of the TOR network. See https://www.eff.org/deeplinks/2012/03/https-and-tor-working-together-protect-your-privacy-and-security-online (retrieved 3/3/2012).
- 4.
http://freenetproject.org/faq.html#childporn (retrieved 3/3/2012).
References
Ackerman M, Darrell T, Weitzner D (2001) Privacy in context. Hum Comput Interact 16:167–176
Anderson RJ (2010) Security engineering: a guide to building dependable distributed systems. Wiley, New York
Annecharico D (2002) Notes & comments: V. Privacy after GLBA: online transactions: squaring the Gramm-Leach-Bliley act privacy provisions with the FTC fair information practice principles. NC Bank Inst 6:637–695
Atlas RM, Dando M (2006) The dual-use dilemma for the life sciences: perspectives, conundrums, and global solutions. Biosecur Bioterror Biodefense Strateg Pract Sci 4(3):276–286
Atzori L, Iera A, Morabito G (2010) The internet of things: a survey. Comput Netw 54(15):2787–2805
Back A, Möller U, Stiglic A (2001) Traffic analysis attacks and trade-offs in anonymity providing systems. In: Sadeghi AR, Katzenbeisser S (eds) Information hiding. Springer, Berlin, pp 245–257
Barrows RC Jr, Clayton PD (1996) Privacy, confidentiality, and electronic medical records. J Am Med Inform Assoc 3(2):139–148
Berlin I (1958) Two concepts of liberty. Clarendon Press, Oxford
Birnhack M (2008) The EU data protection directive: an engine of a global regime. Comput Law Sec Rep 24(6):508–520
Boekema J (2011) Assessment of the implementation regulations for Smart Meters, TNO Technical Report, Delft, TNO-RPT-DTS-2011-00463-E
Brazier FMT, Oskamp A, Prins JEJ, Schellekens MHM, Wijngaards NJE (2004) Anonymity and software agents: an interdisciplinary challenge. AI Law 1–2(12):137–157
Cavoukian A (2009) Privacy by design. IPC, Ottawa
Cavoukian A (2010) Privacy by design: the definitive workshop. Identity Inf Soc 3(2):121–126
Clarke I, Sandberg O, Wiley B, Hong T (2001) Freenet: a distributed anonymous information storage and retrieval system. In: Federrath H (ed) Designing privacy enhancing technologies. Springer, Heidelberg, pp 46–66
Danezis G, Diaz C, Troncoso C (2007) Two-sided statistical disclosure attack. In: Proceedings of the 7th international conference on privacy enhancing technologies, Springer, pp 30–44
Denning DE, Branstad DK (1996) Key escrow encryption systems. Commun ACM 39(3):35
Dingledine R, Mathewson N, Syverson P (2004) Tor: the second-generation onion router. In: Proceedings of the 13th conference on USENIX security symposium, Washington DC, vol 13, p 21
Douceur J (2002) The Sybil attack. In: Peter D, Frans K, Antony R (eds.) Peer-to-peer systems. Springer, Berlin, pp 251–260
Efthymiou C, Kalogridis G (2010) Smart grid privacy via anonymization of smart metering data. In: First IEEE international conference on smart grid communications (SmartGridComm), New York, pp 238–243
EU Data Protection Directive (1995) Directive 95/46/EC of the European parliament and of the council of 24 Oct 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data
EU Proposal (2012) Proposal for a regulation of the European parliament and of the council on the protection of individuals with regard to the processing of personal data and on the free movement of such data (General Data Protection Regulation), Brussels
ESMA (2009) Annual report on the progress in smart metering, Version 2.0
Evans NS, Dingledine R, Grothoff C (2009) A practical congestion attack on Tor using long paths. In: Proceedings of the 18th conference on USENIX security symposium, pp 33–50
Fan Z, Kulkarni P, Gormus S, Efthymiou C, Kalogridis G, Sooriyabandara M, Zhu Z, Lambotharan S, Chin W (2011) Smart grid communications: overview of research challenges, solutions, and standardization activities. IEEE Commun Surv Tutor 99:1–18
Feistel H (1973) Cryptography and computer privacy. Sci Am 228(5):15–23
Friedman B, Kahn Jr PH (2002). Human values, ethics, and design. In: Julie AJ, Andrew S (eds.) The human-computer interaction handbook. Lawrence Erlbaum Associates, Hillsdale, NJ, USA, pp 1177–1201
Friedman B, Kahn PH Jr, Borning A (2006) Value sensitive design and information systems. Hum Comput Interact Manag Inf Syst Found 5:348–372
Froomkin AM (1995) The metaphor is the key: cryptography, the clipper chip, and the constitution. Univ Pa Law Rev 143(3):709–897
Garcia FD, Jacobs BPF (2011) Privacy-friendly energy-metering via homomorphic encryption. In: 6th Workshop on Security and Trust Management (STM 2010) Lecture Notes in Computer Science, vol 6710. Springer, pp 226–238
Garcia FD, de Koning Gans G, Muijrers R, van Rossum P, Verdult R, Wichers Schreur R, Jacobs BPF (2008) Dismantling MIFARE classic. In: Jajodia S, Lopez J (eds) 13th European symposium on research in computer security (ESORICS 2008). Lecture Notes in Computer Science, vol 5283. Springer, pp 97–114
Gellings CW, Chamberlin JH (1987) Demand-side management: concepts and methods. The Fairmont, Lilburn
Gentry C (2009) Fully homomorphic encryption using ideal lattices. In: Proceedings of the 41st annual ACM symposium on theory of computing, ACM, pp169–178
Greveler U, Justus B, Loehr D (2012) Multimedia content identification through smart meter power usage proles. In: Gutwirth S, Leenes R, de Hert P, Poullet Y (eds.) Computers, privacy and data protection. Springer, Berlin
Gross R, Acquisti A (2005) Information revelation and privacy in online social networks. In: Proceedings of the 2005 ACM workshop on Privacy in the electronic society, ACM, pp 71–80
HIPAA (1996) Health insurance portability and accountability act of 1996
Hoare T (2003) The verifying compiler: a grand challenge for computing research. In: Proceedings of the 12th international conference on compiler construction. Springer, pp 262–272
Hone K, Eloff JHP (2002) Information security policy–what do international information security standards say? Comput Sec 21(5):402–409
Janger EJ, Schwartz PM (2001) The Gramm-Leach-Bliley act, information privacy, and the limits of default rules, Minnesota Law Review 86
Jones H, Soltren H (2005) Facebook: threats to privacy. Soc Sci Res 1:1–76
Juels A (2006) RFID security and privacy: a research survey. IEEE J Sel Area Commun 24(2):381–394
Kursawe K, Danezis G, Kohlweiss M (2011) Privacy-friendly aggregation for the smart-grid. In: Privacy enhancing technologies. Springer, pp 175–191
Liu C, Marchewka JT, Ku C (2004) American and Taiwanese perceptions concerning privacy, trust, and behavioral intentions in electronic commerce. J Glob Inf Manag 12:18–40
Loeckx J, Sieber K, Stansifer RD (1985) The foundations of program verification. Wiley, New York
Massoud SA, Wollenberg B (2005) Toward a smart grid: power delivery for the 21st century. Power Energy Mag IEEE 3(5):34–41
McDaniel P, McLaughlin S (2009) Security and privacy challenges in the smart grid. IEEE Sec Priv 7(3):75–77
Movius L, Krup N (2009) U.S. and EU privacy policy: comparison of regulatory approaches. Int J Commun 3:169–187
Nagenborg M (2009) Designing spheres of informational justice. Ethics Inf Technol 11:175–179
Nissenbaum H (2010) Privacy in context. Stanford University Press, Palo Alto
Ogston EFY, Brazier FMT (2009) Apportionment of control in virtual power stations. In: Proceedings of the international conference on infrastructure systems and services 2009: developing 21st century infrastructure networks, IEEE computer society, pp 1–6
PCI (2009) PCI security standards council, payment card industry (PCI) data security standard – requirements and security assessment procedures version 1.2
Phelps J, Nowak G, Ferrell E (2000) Privacy concerns and consumer willingness to provide personal information. J Public Policy Market 19:27–41
Rosen J (2010) The end of forgetting, The New York Times Magazine, July 25
Rosenblum D (2007) What anyone can know: the privacy risks of social networking sites. IEEE Sec Priv IEEE Comput Soc 5:40–49
Schorceman FD (ed) (1984) Philosophical dimensions of privacy: an anthology. Cambridge University Press, Cambridge
van den Hoven MJ (1999) Privacy or informational injustice? In: Pourcia L (ed) Ethics and information in the twenty-first century. Purdue University Press, West Lafayette, pp 140–150
van den Hoven J, Vermaas PE (2007) Nano-technology and privacy: on continuous surveillance outside the panopticon. J Med Philos 32(3):283–297
van ’t Noordende G (2010) Security in the Dutch electronic patient record system, 2nd ACM Workshop on Security and Privacy in Medical and Home-Care Systems (SPIMACS), pp 21–31
Warnier ME (2006) Language based security for Java and JML. PhD thesis, Radboud University, Nijmegen
Warnier ME, Brazier FMT, Oskamp A (2008) Security of distributed digital criminal dossiers. J Softw 3(3):21–29, Academy Publisher
Warren SD, Brandeis LD (1890) The right to privacy. Harv Law Rev 4(5):193–220
Winters N (2004) Personal privacy and popular ubiquitous technology. In: Proceedings of Ubiconf, London
Zakaria N, Stanton JM, Sarkar-Barney STM (2003) Designing and implementing culturally-sensitive IT applications: the interaction of culture values and privacy issues in the middle east. Inf Technol People 16(1):49–75
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer Science+Business Media Dordrecht
About this entry
Cite this entry
Warnier, M., Dechesne, F., Brazier, F. (2013). Design for the Value of Privacy. In: van den Hoven, J., Vermaas, P., van de Poel, I. (eds) Handbook of Ethics, Values, and Technological Design. Springer, Dordrecht. https://doi.org/10.1007/978-94-007-6994-6_17-1
Download citation
DOI: https://doi.org/10.1007/978-94-007-6994-6_17-1
Received:
Accepted:
Published:
Publisher Name: Springer, Dordrecht
Online ISBN: 978-94-007-6994-6
eBook Packages: Springer Reference Religion and PhilosophyReference Module Humanities and Social SciencesReference Module Humanities