Strengthening Enforcement in a Comprehensive Architecture for Privacy Enforcement at Internet Websites

1Citations
Citations of this article
7Readers
Mendeley users who have this article in their library.

Abstract

This paper extends previous work to strengthen the enforcement portion of a comprehensive architecture for enforcing privacy when a user needs to submit personal data to an Internet website in order to obtain goods or services. Our extension proposes to use a website's P3P privacy policy (derived in an automated way from its internal XACML access control policy) as a public key to encrypt the user's data using IBE (identity-based encryption) technology. The website will only acquire the corresponding private key to decrypt this data if a trusted 3rd-party auditor (acting as an IBE private key generator) has verified that the P3P policy is an accurate statement of the site's internal privacy practices. We discuss all the components of this model and describe our proof-of-concept implementation which demonstrates that such an architecture is feasible in real-world scenarios.

Cite

CITATION STYLE

APA

Adams, C., Dai, Y., DesOrmeaux, C., McAvoy, S., Nguyen, N. C., & Trindade, F. (2020). Strengthening Enforcement in a Comprehensive Architecture for Privacy Enforcement at Internet Websites. Frontiers in Computer Science, 2. https://doi.org/10.3389/fcomp.2020.00002

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free