Privacy preservation with X.509 standard certificates

Research output: Contribution to journalArticle

14 Citations (Scopus)

Abstract

Privacy preservation has become an essential requirement in today's computing environment; abuse based on anonymity and user-controlled pseudonyms is a serious problem. For prompt deployment in legacy information systems, it would be desirable to develop a new method in the standard paradigm. This paper investigates practical methods for privacy preservation with X.509 standard certificates by providing conditional traceability for both identity and attribute certificates in the legacy systems. We separate certificate authorities, one for verifying identities and the other for validating contents, in a blinded manner without requiring a trusted third party. We design a concrete method with its more generic and applicative extensions, and prove security formally. We also evaluate performance through rigorous experiments and discuss possible applications.

Original languageEnglish
Pages (from-to)2906-2921
Number of pages16
JournalInformation sciences
Volume181
Issue number13
DOIs
Publication statusPublished - 2011 Jul 1

Fingerprint

Privacy Preservation
Certificate
Legacy Systems
Legacy systems
Information systems
Traceability
Anonymity
Information Systems
Paradigm
Attribute
Computing
Evaluate
Experiments
Requirements
Experiment
Standards
Privacy

All Science Journal Classification (ASJC) codes

  • Software
  • Control and Systems Engineering
  • Theoretical Computer Science
  • Computer Science Applications
  • Information Systems and Management
  • Artificial Intelligence

Cite this

@article{aec2a1614e2741739b441b409f4c64e2,
title = "Privacy preservation with X.509 standard certificates",
abstract = "Privacy preservation has become an essential requirement in today's computing environment; abuse based on anonymity and user-controlled pseudonyms is a serious problem. For prompt deployment in legacy information systems, it would be desirable to develop a new method in the standard paradigm. This paper investigates practical methods for privacy preservation with X.509 standard certificates by providing conditional traceability for both identity and attribute certificates in the legacy systems. We separate certificate authorities, one for verifying identities and the other for validating contents, in a blinded manner without requiring a trusted third party. We design a concrete method with its more generic and applicative extensions, and prove security formally. We also evaluate performance through rigorous experiments and discuss possible applications.",
author = "Taekyoung Kwon",
year = "2011",
month = "7",
day = "1",
doi = "10.1016/j.ins.2011.02.016",
language = "English",
volume = "181",
pages = "2906--2921",
journal = "Information Sciences",
issn = "0020-0255",
publisher = "Elsevier Inc.",
number = "13",

}

Privacy preservation with X.509 standard certificates. / Kwon, Taekyoung.

In: Information sciences, Vol. 181, No. 13, 01.07.2011, p. 2906-2921.

Research output: Contribution to journalArticle

TY - JOUR

T1 - Privacy preservation with X.509 standard certificates

AU - Kwon, Taekyoung

PY - 2011/7/1

Y1 - 2011/7/1

N2 - Privacy preservation has become an essential requirement in today's computing environment; abuse based on anonymity and user-controlled pseudonyms is a serious problem. For prompt deployment in legacy information systems, it would be desirable to develop a new method in the standard paradigm. This paper investigates practical methods for privacy preservation with X.509 standard certificates by providing conditional traceability for both identity and attribute certificates in the legacy systems. We separate certificate authorities, one for verifying identities and the other for validating contents, in a blinded manner without requiring a trusted third party. We design a concrete method with its more generic and applicative extensions, and prove security formally. We also evaluate performance through rigorous experiments and discuss possible applications.

AB - Privacy preservation has become an essential requirement in today's computing environment; abuse based on anonymity and user-controlled pseudonyms is a serious problem. For prompt deployment in legacy information systems, it would be desirable to develop a new method in the standard paradigm. This paper investigates practical methods for privacy preservation with X.509 standard certificates by providing conditional traceability for both identity and attribute certificates in the legacy systems. We separate certificate authorities, one for verifying identities and the other for validating contents, in a blinded manner without requiring a trusted third party. We design a concrete method with its more generic and applicative extensions, and prove security formally. We also evaluate performance through rigorous experiments and discuss possible applications.

UR - http://www.scopus.com/inward/record.url?scp=79953837784&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=79953837784&partnerID=8YFLogxK

U2 - 10.1016/j.ins.2011.02.016

DO - 10.1016/j.ins.2011.02.016

M3 - Article

VL - 181

SP - 2906

EP - 2921

JO - Information Sciences

JF - Information Sciences

SN - 0020-0255

IS - 13

ER -