Abstract
Large amounts of privacy-critical data are transferred,
processed and stored in services like cloud computing.
Sufficient and credible evidence of the actual privacy
level of these kinds of services is needed to be able
meet the increased privacy requirements. In this study,
we propose a generic risk-driven methodology for
development of privacy metrics. The methodology is based
on privacy threat analysis, utilization of taxonomical
information, and decomposition of privacy and system
requirements. The stages of the methodology are discussed
using cloud services as an example. Moreover, feasibility
of the proposed approach is discussed. (28 refs.)
Original language | English |
---|---|
Title of host publication | Proceedings of the IEEE Second International Conference on Social Computing, SocialCom 2010 |
Subtitle of host publication | Second IEEE International Conference on Privacy, Security, Risk and Trust, PASSAT 2010 |
Place of Publication | Los Alamitos, CA, USA |
Publisher | IEEE Institute of Electrical and Electronic Engineers |
Pages | 1086-1092 |
ISBN (Print) | 978-1-4244-8439-3, 978-0-7695-4211-9 |
DOIs | |
Publication status | Published - 2010 |
MoE publication type | A4 Article in a conference publication |
Event | IEEE Second International Conference on Social Computing, SocialCom 2010, Second IEEE International Conference on Privacy, Security, Risk and Trust, PASSAT 2010 - Minneapolis, MN, United States Duration: 20 Aug 2010 → 22 Aug 2010 |
Conference
Conference | IEEE Second International Conference on Social Computing, SocialCom 2010, Second IEEE International Conference on Privacy, Security, Risk and Trust, PASSAT 2010 |
---|---|
Abbreviated title | SocialCom 2010 ; PASSAT 2010 |
Country/Territory | United States |
City | Minneapolis, MN |
Period | 20/08/10 → 22/08/10 |