Privacy conscious architecture for personal information transfer from a personal trusted device to an HTTP based service
Modern services request personal information from their customers. The personal information is not needed onlyfor identifying the customer but also for customising the service for each customer. In this paper we first analyse the existing approaches for personal information handling and point out th...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Croatian Communications and Information Society (CCIS)
2005-12-01
|
Series: | Journal of Communications Software and Systems |
Subjects: | |
Online Access: | https://jcomss.fesb.unist.hr/index.php/jcomss/article/view/308 |
_version_ | 1819090479558426624 |
---|---|
author | Pekka Jäppinen Mika Yrjölä Jari Porras |
author_facet | Pekka Jäppinen Mika Yrjölä Jari Porras |
author_sort | Pekka Jäppinen |
collection | DOAJ |
description | Modern services request personal information from their customers. The personal information is not needed onlyfor identifying the customer but also for customising the service for each customer. In this paper we first analyse the existing approaches for personal information handling and point out their weaknesses. We desribe an architecture for the delivery of personal information from the customer to the HTTP based service in the Internet. For personal information storing our architecture relies on a mobile device, such as a customer’s mobile phone. The access of the service is conducted with a traditional desktop computer. The information is transmitted to the serviceon request via a desktop computer that fetches the information from a mobile device over a wireless link.The goal of our approach is to simplify the use of servicesby helping the customer to provide the required personal information. Furthermore our approach is designed so that existing services require only minor changes. We introduce methods for the customer to control his own privacy by providing notation to define the required security measures for automated data transfer. Finally we discuss the possible security risks of our architecture. |
first_indexed | 2024-12-21T22:24:29Z |
format | Article |
id | doaj.art-f629ae0109444db7a6e93a31d6c1ae39 |
institution | Directory Open Access Journal |
issn | 1845-6421 1846-6079 |
language | English |
last_indexed | 2024-12-21T22:24:29Z |
publishDate | 2005-12-01 |
publisher | Croatian Communications and Information Society (CCIS) |
record_format | Article |
series | Journal of Communications Software and Systems |
spelling | doaj.art-f629ae0109444db7a6e93a31d6c1ae392022-12-21T18:48:16ZengCroatian Communications and Information Society (CCIS)Journal of Communications Software and Systems1845-64211846-60792005-12-0112107115Privacy conscious architecture for personal information transfer from a personal trusted device to an HTTP based servicePekka JäppinenMika YrjöläJari PorrasModern services request personal information from their customers. The personal information is not needed onlyfor identifying the customer but also for customising the service for each customer. In this paper we first analyse the existing approaches for personal information handling and point out their weaknesses. We desribe an architecture for the delivery of personal information from the customer to the HTTP based service in the Internet. For personal information storing our architecture relies on a mobile device, such as a customer’s mobile phone. The access of the service is conducted with a traditional desktop computer. The information is transmitted to the serviceon request via a desktop computer that fetches the information from a mobile device over a wireless link.The goal of our approach is to simplify the use of servicesby helping the customer to provide the required personal information. Furthermore our approach is designed so that existing services require only minor changes. We introduce methods for the customer to control his own privacy by providing notation to define the required security measures for automated data transfer. Finally we discuss the possible security risks of our architecture.https://jcomss.fesb.unist.hr/index.php/jcomss/article/view/308personal informationusabilityInternet servicepersonal trusted deviceprivacyservicebluetooth |
spellingShingle | Pekka Jäppinen Mika Yrjölä Jari Porras Privacy conscious architecture for personal information transfer from a personal trusted device to an HTTP based service Journal of Communications Software and Systems personal information usability Internet service personal trusted device privacy service bluetooth |
title | Privacy conscious architecture for personal information transfer from a personal trusted device to an HTTP based service |
title_full | Privacy conscious architecture for personal information transfer from a personal trusted device to an HTTP based service |
title_fullStr | Privacy conscious architecture for personal information transfer from a personal trusted device to an HTTP based service |
title_full_unstemmed | Privacy conscious architecture for personal information transfer from a personal trusted device to an HTTP based service |
title_short | Privacy conscious architecture for personal information transfer from a personal trusted device to an HTTP based service |
title_sort | privacy conscious architecture for personal information transfer from a personal trusted device to an http based service |
topic | personal information usability Internet service personal trusted device privacy service bluetooth |
url | https://jcomss.fesb.unist.hr/index.php/jcomss/article/view/308 |
work_keys_str_mv | AT pekkajappinen privacyconsciousarchitectureforpersonalinformationtransferfromapersonaltrusteddevicetoanhttpbasedservice AT mikayrjola privacyconsciousarchitectureforpersonalinformationtransferfromapersonaltrusteddevicetoanhttpbasedservice AT jariporras privacyconsciousarchitectureforpersonalinformationtransferfromapersonaltrusteddevicetoanhttpbasedservice |