Safeguarding and Charging for Information on the Internet
ICDE '98 Proceedings of the Fourteenth International Conference on Data Engineering
Access Control Infrastructure for Digital Objects
ICICS '02 Proceedings of the 4th International Conference on Information and Communications Security
Location Privacy in the Alipes Platform
HICSS '03 Proceedings of the 36th Annual Hawaii International Conference on System Sciences (HICSS'03) - Track 9 - Volume 9
A framework for secure execution of software
International Journal of Information Security
Privacy Protection in Mobile Agent Based Service Domain
ICITA '05 Proceedings of the Third International Conference on Information Technology and Applications (ICITA'05) Volume 2 - Volume 02
Automated Negotiation of Privacy Contracts
COMPSAC '05 Proceedings of the 29th Annual International Computer Software and Applications Conference - Volume 01
Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking
Proceedings of the 1st international conference on Mobile systems, applications and services
Hi-index | 0.00 |
Privacy issues are becoming more and more important especially since the cyber and the real world are converging up to certain extent when using mobile devices. Means that really protect privacy are still missing. The problem is, as soon as a user provides data to a service provider the user looses control over her data. The simple solution is not to provide any data but then a lot of useful services e.g. navigation applications cannot be used. In order to remedy this problem we propose privacy guaranteeing execution containers (PGEC). Basically the concept is that the application gets access to the user data in a specially protected and certified environment, the PGEC. PGECs enable applications to access private user data locally and guarantee that the user data is deleted as soon as the service is quit. Thus, the PGEC guarantees a "one time use" of the provided private data. The PGECs also restrict the communication between the application and the service provider to what is explicitly allowed by the service user. In order to highlight the security provided by the PGEC, we discuss potential attacks such as modified execution environments as well as appropriate countermeasures.