Preserving Privacy versus Data Retention

  • Authors:
  • Markus Hinkelmann;Andreas Jakoby

  • Affiliations:
  • Institut für Theoretische Informatik, Universität zu Lübeck, Germany;Institut für Theoretische Informatik, Universität zu Lübeck, Germany

  • Venue:
  • TAMC '09 Proceedings of the 6th Annual Conference on Theory and Applications of Models of Computation
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

The retention of communication data has recently attracted much public interest, mostly because of the possibility of its misuse. In this paper, we present protocols that address the privacy concerns of the communication partners. Our data retention protocols store streams of encrypted data items, some of which may be flagged as critical (representing misbehavior). The frequent occurrence of critical data items justifies the self-decryption of all recently stored data items, critical or not. Our first protocol allows the party gathering the retained data to decrypt all data items collected within, say, the last half year whenever the number of critical data items reaches some threshold within, say, the last month. The protocol ensures that the senders of data remain anonymous but may reveal that different critical data items came from the same sender. Our second, computationally more complex scheme obscures this affiliation of critical data with high probability.