Adding Secure Transparency Logging to the PRIME Core

  title={Adding Secure Transparency Logging to the PRIME Core},
  author={Hans Hedbom and Tobias Pulls and Peter Hj{\"a}rtquist and Andreas Lav{\'e}n},
This paper presents a secure privacy preserving log. These types of logs are useful (if not necessary) when constructing transparency services for privacy enhancement. The solution builds on and extends previous work within the area and tries to address the shortcomings of previous solutions regarding privacy issues. 
Implementing a Privacy-Friendly Secure Logging Module into the PRIME Core
This study highlights the need for greater transparency in the way that personally identifiable information is disclosed and used in the provision of online services. Expand
Preserving Privacy in Transparency Logging
The subject of this dissertation is the construction of privacy-enhancing technologies (PETs) for transparency logging, a technology at the intersection of privacy, transparency, and accountabilityExpand
Enhancing Transparency with Distributed Privacy-Preserving Logging
Transparency of data processing is often a requirement for compliance to legislation and/or business requirements, but should be limited to the users involved in order to minimise the leakage of sensitive business information and privacy of the employees performing the data processing. Expand
Unlinking database entries: Implementation issues in privacy preserving secure logging
  • Hans Hedbom, T. Pulls
  • Computer Science
  • 2010 2nd International Workshop on Security and Communication Networks (IWSCN)
  • 2010
This paper discusses implementation issues related to using relational databases as storage when implementing privacy preserving secure logs, and suggests three solutions to the problem. Expand
Distributed Privacy-Preserving Log Trails
In the online world, increasing amounts of personal data of users are processed by service providers and other third party data processors, and the privacy principle of transparency means that users are informed of their data processing activities. Expand
Distributed privacy-preserving transparency logging
This work presents a transparency-enhancing tool in the form of a cryptographic scheme that enables data processors to inform users about the actual data processing that takes place on their personal data, and is the first to formalise the required security and privacy properties in this setting in a general manner. Expand
Privacy-Preserving Transparency-Enhancing Tools
Transparency is a key principle in democratic societies. For example, the public sector is in part kept honest and fair with the help of transparency through different freedom of information (FOI) ...
Implementing Transparency Logging for an Issue Tracking System
On the Internet today, users are accustomed to disclosing personal information when accessing a new service. When a user does so, there is rarely a system in place which allows the user to monitorExpand
Chapter 43 – Privacy-Enhancing Technologies1
This chapter provides an overview to the area of privacy-enhancing technologies (PETs), which help to protect privacy by technically enforcing legal privacy principles, and presents a classification of PETs as well as a definition of traditional privacy properties that PETs are addressing and metrics for measuring the level of privacy thatPETs are providing. Expand
A Technique for Enhanced Provision of Appropriate Access to Evidence Across Service Provision Chains
Two cryptographic-based techniques that may address the issue of restricted views within service provision chains on accountability evidence, including logs, available to other actors with specific governance roles are proposed and assessed. Expand


Logcrypt: Forward Security and Public Verification for Secure Audit Logs
This work builds on prior work by showing how log creation can be separated from log verification, and describing several additional performance and convenience features not previously considered. Expand
A new approach to secure logging
This article examines the state of the art in secure logging and identifies some problems inherent to systems based on trusted third-party servers, and proposes a different approach to secure logging based upon recently developed Forward-Secure Sequential Aggregate authentication techniques. Expand
Cryptographic Support for Secure Logs on Untrusted Machines
A computationally cheap method is described for making all log entries generated prior to the logging machine's compromise impossible for the attacker to read, and also impossible to undetectably modify or destroy. Expand
Secure and Privacy-Friendly Logging for eGovernment Services
This paper presents a scheme for building a logging- trail for processes related to eGovernment services, which is privacy-friendly in the sense that only the authorised subject, i.e. the citizen, can link the different log entries related to one specific process. Expand
Personalization in privacy-aware highly dynamic systems
This research presents novel ways to personalize the relationship with customers without sacrificing their privacy through the use of artificial intelligence, machine learning and other technologies. Expand
Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management
The Rationale Secure UP Security Patterns for J2EE, Web Services, Identity Management, and Service Provisioning Reality Checks Security Testing Adopting a Security Framework Refactoring Security Design Service Continuity and Recovery Conclusion References V. Expand
Digital privacy : theory, technologies, and practices
THE PRIVACY SPACE Privacy Enhancing Technologies for the Internet III: Ten Years Later, I. Goldberg Communication Privacy, A. Pfitzmann, A. Juschka, A.-K. Stange, S. Steinbrecher, and S. Kopsell, andExpand
Architecture v2
  • PRIME Deliverable D14.2.c, March
  • 2007
PRIME Project.
  • PRIME Project.