Privacy conscious architecture for personal information transfer from a personal trusted device to an HTTP based service

Modern services request personal information from their customers. The personal information is not needed onlyfor identifying the customer but also for customising the service for each customer. In this paper we first analyse the existing approaches for personal information handling and point out th...

Full description

Bibliographic Details
Main Authors: Pekka Jäppinen, Mika Yrjölä, Jari Porras
Format: Article
Language:English
Published: Croatian Communications and Information Society (CCIS) 2005-12-01
Series:Journal of Communications Software and Systems
Subjects:
Online Access:https://jcomss.fesb.unist.hr/index.php/jcomss/article/view/308
_version_ 1819090479558426624
author Pekka Jäppinen
Mika Yrjölä
Jari Porras
author_facet Pekka Jäppinen
Mika Yrjölä
Jari Porras
author_sort Pekka Jäppinen
collection DOAJ
description Modern services request personal information from their customers. The personal information is not needed onlyfor identifying the customer but also for customising the service for each customer. In this paper we first analyse the existing approaches for personal information handling and point out their weaknesses. We desribe an architecture for the delivery of personal information from the customer to the HTTP based service in the Internet. For personal information storing our architecture relies on a mobile device, such as a customer’s mobile phone. The access of the service is conducted with a traditional desktop computer. The information is transmitted to the serviceon request via a desktop computer that fetches the information from a mobile device over a wireless link.The goal of our approach is to simplify the use of servicesby helping the customer to provide the required personal information. Furthermore our approach is designed so that existing services require only minor changes. We introduce methods for the customer to control his own privacy by providing notation to define the required security measures for automated data transfer. Finally we discuss the possible security risks of our architecture.
first_indexed 2024-12-21T22:24:29Z
format Article
id doaj.art-f629ae0109444db7a6e93a31d6c1ae39
institution Directory Open Access Journal
issn 1845-6421
1846-6079
language English
last_indexed 2024-12-21T22:24:29Z
publishDate 2005-12-01
publisher Croatian Communications and Information Society (CCIS)
record_format Article
series Journal of Communications Software and Systems
spelling doaj.art-f629ae0109444db7a6e93a31d6c1ae392022-12-21T18:48:16ZengCroatian Communications and Information Society (CCIS)Journal of Communications Software and Systems1845-64211846-60792005-12-0112107115Privacy conscious architecture for personal information transfer from a personal trusted device to an HTTP based servicePekka JäppinenMika YrjöläJari PorrasModern services request personal information from their customers. The personal information is not needed onlyfor identifying the customer but also for customising the service for each customer. In this paper we first analyse the existing approaches for personal information handling and point out their weaknesses. We desribe an architecture for the delivery of personal information from the customer to the HTTP based service in the Internet. For personal information storing our architecture relies on a mobile device, such as a customer’s mobile phone. The access of the service is conducted with a traditional desktop computer. The information is transmitted to the serviceon request via a desktop computer that fetches the information from a mobile device over a wireless link.The goal of our approach is to simplify the use of servicesby helping the customer to provide the required personal information. Furthermore our approach is designed so that existing services require only minor changes. We introduce methods for the customer to control his own privacy by providing notation to define the required security measures for automated data transfer. Finally we discuss the possible security risks of our architecture.https://jcomss.fesb.unist.hr/index.php/jcomss/article/view/308personal informationusabilityInternet servicepersonal trusted deviceprivacyservicebluetooth
spellingShingle Pekka Jäppinen
Mika Yrjölä
Jari Porras
Privacy conscious architecture for personal information transfer from a personal trusted device to an HTTP based service
Journal of Communications Software and Systems
personal information
usability
Internet service
personal trusted device
privacy
service
bluetooth
title Privacy conscious architecture for personal information transfer from a personal trusted device to an HTTP based service
title_full Privacy conscious architecture for personal information transfer from a personal trusted device to an HTTP based service
title_fullStr Privacy conscious architecture for personal information transfer from a personal trusted device to an HTTP based service
title_full_unstemmed Privacy conscious architecture for personal information transfer from a personal trusted device to an HTTP based service
title_short Privacy conscious architecture for personal information transfer from a personal trusted device to an HTTP based service
title_sort privacy conscious architecture for personal information transfer from a personal trusted device to an http based service
topic personal information
usability
Internet service
personal trusted device
privacy
service
bluetooth
url https://jcomss.fesb.unist.hr/index.php/jcomss/article/view/308
work_keys_str_mv AT pekkajappinen privacyconsciousarchitectureforpersonalinformationtransferfromapersonaltrusteddevicetoanhttpbasedservice
AT mikayrjola privacyconsciousarchitectureforpersonalinformationtransferfromapersonaltrusteddevicetoanhttpbasedservice
AT jariporras privacyconsciousarchitectureforpersonalinformationtransferfromapersonaltrusteddevicetoanhttpbasedservice