EEMCS

Home > Publications
Home University of Twente
Education
Research
Prospective Students
Jobs
Publications
Intranet (internal)
 
 Nederlands
 Contact
 Search
 Organisation

EEMCS EPrints Service


14530 The Life-Cycle Policy model
Home Policy Brochure Browse Search User Area Contact Help

Anciaux, N.L.G. and Bouganim, L. and van Heerde, H.J.W. and Pucheral, P. and Apers, P.M.G. (2008) The Life-Cycle Policy model. Research report RR-6577, Institut National de Recherche en Informatique et en Automatique, Rocquencourt, France. ISSN 0249-6399

Full text available as:

PDF

929 Kb
Open Access



Official URL: http://hal.inria.fr/inria-00294718/en/

Exported to Metis

Abstract

Our daily life activity leaves digital trails in an increasing number of databases (commercial web sites, internet service providers, search engines, location tracking systems, etc). Personal digital trails are commonly exposed to accidental disclosures resulting from negligence or piracy and to ill-intentioned scrutinization and abusive usages fostered by fuzzy privacy policies. No one is sheltered because a single event (e.g., applying for a job or a credit) can suddenly make our history a precious asset. By definition, access control fails preventing trail disclosures, motivating the integration of the Limited Data Retention principle in legislations protecting data privacy. By this principle, data is withdrawn from a database after a predefined time period. However, this principle is difficult to apply in practice, leading to retain useless sensitive information for years in databases. In this paper, we propose a simple and practical data degradation model where sensitive data undergoes a progressive and irreversible degradation from an accurate state at collection time, to intermediate but still informative degraded states, up to complete disappearance when the data becomes useless. The benefits of data degradation is twofold: (i) by reducing the amount of accurate data, the privacy offence resulting from a trail disclosure is drastically reduced and (ii) degrading the data in line with the application purposes offers a new compromise between privacy preservation and application reach. We introduce in this paper a data degradation model, analyze its impact over core database techniques like storage, indexation and transaction management and propose degradation-aware techniques.

Item Type:Internal Report (Research report)
Research Group:EWI-DB: Databases
Research Program:CTIT-ISTRICE: Integrated Security and Privacy in a Networked World
Research Project:CADMAI: Towards Context-Aware Data Management for Ambient Intelligence
ID Code:14530
Deposited On:10 December 2008
More Information:statisticsmetis

Export this item as:

To correct this item please ask your editor

Repository Staff Only: edit this item