Abstract
Every time a user performs a transaction over the Internet, a wealth of personal information is revealed, either voluntarily or involuntarily. This causes serious breach of privacy for the user, in particular, if the personally identifying information is misused by the different players involved in the transaction. Ideally, therefore, the user would like to have a considerable degree of control over what personal information to reveal and to whom. In this paper we propose a new e-commerce protocol that helps the user protect her privacy while purchasing products over the Internet. The proposed scheme provides a flexible and powerful approach for the secure handling of private data and offers the user considerable control over how she wishes to disseminate her personal data.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
The anonymizer, http://anonymizer.com
Ackerman, M.S., Cranor, L.F., Reagle, J.: Privacy in e-commerce: Examining user scenarios and privacy preferences. In: Proceedings of the 1st ACM Conference on Electronic Commerce, Denver, Colorado, pp. 1–8 (1999)
Kobsa, A., Schreck, J.: Privacy through pseudonymity in user-adaptive systems. ACM Transactions on Internet Technology 3(2), 149–183 (2003)
Berthold, O., Federrath, H., Kohntopp, M.: Project anonymity and unobservability in the internet. In: Proceedings of the Workshop on Freedom and Privacy by Design / Conference on Freedom and Privacy 2000 CFPI, Toronto, Canada, April 4-7, pp. 57–65 (2000)
Boucher, P., Shostack, A., Goldberg, I.: Freedom systems 2.0 architecture (December 2000), http://www.freedom.net/info/whitepapers/Freedom_System_2_Architecture.pdf
Molina-Jimenez, C., Marshall, L.: True anonymity without mixes. In: Proceedings of the Second Annual Workshop on Internet Applications, 2001, WIAPP 2001, July 2001, pp. 32–40 (2001)
Chaum, D.L.: Untraceable electronic mail, return address, and digital pseudonyms. Communications of the ACM 24(2), 84–88 (1981)
Kristol, D.M.: Http cookies: Standards, privacy, and policies. ACM Transactions on Internet Technology 1(2), 151–198 (2001)
Cranor, L.F., et al.: The platform for privacy preferences 1.1(p3p 1.1) specification. W3C Consortium (February 2004), http://www.w3.org/TR/2004/WD-P3P11-20040210
Millet, L.I., Friedman, B., Felton, E.: Cookies and web browser design: Toward realizing informed consent online. In: Proccedings of the ACM SIGCHI Conference on Human Factors In Computing Systems, March 2001, pp. 46–52 (2001)
Freedman, M.J., Morris, R.: Tarzan: A peer-to-peer anonymizing network layer. In: Proceedings of the Ninth ACM Conference on Computer and Communications Security (CCS 2002), November 2002, pp. 193–206 (2002)
Reiter, M.K., Rubin, A.D.: Crowds: Anonymity for web transactions. ACM Transactions on Information and Systems Security 1(1), 66–92 (1998)
Rennhard, M., et al.: An architecture for an anonymity network. In: Proceedings of the 10th IEEE International. Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2001), June 2001, pp. 165–170 (2001)
Rennhard, M., et al.: Analysis of an anonymity network for web browsing. In: Proceedings of the 11th IEEE International. Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2002), June 2002, pp. 49–54 (2002)
Clarke, R.: Introduction to dataveillance and information privacy, and definition of terms. Web Page (September 1999), http://www.anu.edu.au/people/Roger.Clarke/DV/Intro.html
Srinivasan, S.: On piracy and privacy. IEEE: Computer, 36–38 (July 2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Ray, I., Geisterfer, M. (2004). Towards a Privacy Preserving e-Commerce Protocol. In: Bauknecht, K., Bichler, M., Pröll, B. (eds) E-Commerce and Web Technologies. EC-Web 2004. Lecture Notes in Computer Science, vol 3182. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30077-9_16
Download citation
DOI: https://doi.org/10.1007/978-3-540-30077-9_16
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-22917-9
Online ISBN: 978-3-540-30077-9
eBook Packages: Springer Book Archive