Abstract
Privacy in online collection of personal data is currently a much debated topic considering, amongst other reasons, the incidents with well known digital organisations, such as social networks and, in Europe, the recent EU/GDPR regulation. Among other required practices, explicit and simply worded consent from individuals must be obtained before collecting and using personal information. Further, individuals must also be given detailed information about what, how and what for data is collected. Consent is typically obtained at the collection point and, at a single point in time (ignoring updates), associated with Privacy Policies or End-User Agreements. At any moment, both the user and the organization should be able to produce evidence of this consent. This proof should not be disputable which leads us to strong cryptographic properties.
The problem we discuss is how to robustly demonstrate such consent was given. We adapt fair-exchange protocols to this particular problem and, upon an exchange of personal data, we are able to produce a cryptographic receipt of acceptance that any party can use to prove consent and elicit non-repudiation. We discuss two broad strategies: a pure peer-to-peer scheme and the use of a Trusted Third Party.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
We are working with Privacy organisations towards piloting the ideas on this paper in a real-world scenario.
- 2.
See https://tldrlegal.com/ for software licenses.
References
Millett, L.I., Friedmann, B., Felten, E.: Cookies and web browser design: toward realizing informed consent online. In: Proceedings of the Conference on Human Factors in Computing Systems (2001)
Sandholm, T.W.: Unenforced E-commerce transactions. IEEE Internet Comput. 1(6), 47–54 (1997)
Rajaretnam, T.: The problem to consent to the collection, use, and disclosure of personal information in cyberspace. In: International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec) (2012)
Maurer, U.: New approaches to digital evidence. Proc. IEEE 92(6), 933–947 (2004)
Laurie, B., Bohm, N.: Signatures: an interface between law and technology, January 2003. http://www.apache-ssl.org/tech-legal.pdf
Zhou, J., Gollmann, D.: A fair non-repudiation protocol. In: Proceedings of the 1996 IEEE Conference on Security and Privacy, SP 1996, Washington, DC, USA (1996)
Watrobski, J., Karczmarczyk, A.: Application of the fair secret exchange protocols in the distribution of electronic invoices. Proc. Comput. Sci. 112, 1819–1828 (2017)
Paulin, A., Welzer, T.: A universal system for fair non-repudiable certified e-mail without a trusted third party. Comput. Secur. 32, 207–218 (2013)
Neville, W., Horie, M.: Efficiently achieving full three-way non-repudiation in consumer-level ecommerce and M-Commerce transactions. In: IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications, Changsha (2011)
Garbinato, B., Rickebusch, I.: Secure multiparty computation vs. fair exchange: Bridging the gap, Technical Report DOP-20070123, University of Lausanne, DOP Lab (2007). http://www.hec.unil.ch/dop/Download/articles/DOP-20070123.pdf
Onieva, J.A., Zhou, J., Lopez, J.: Multiparty nonrepudiation: a survey. ACM Comput. Surv. 41(1), 5:1–5:43 (2009). https://doi.org/10.1145/1456650.1456655. ISSN: 0360-0300
McDonald, A., Cranor, L.F.: The cost of reading privacy policies. J. Law Policy Inf. Soc. 4(3), 543–568 (2008). Privacy Year in Review issue I/S
Markowitch, O., Kremer, S.: An optimistic non-repudiation protocol with transparent trusted third party. In: Davida, G.I., Frankel, Y. (eds.) ISC 2001. LNCS, vol. 2200, pp. 363–378. Springer, Heidelberg (2001). https://doi.org/10.1007/3-540-45439-X_25
Zhou, J., Deng, R., Bao, F.: Evolution of fair non-repudiation with TTP. In: Proceedings of the 4th Australasian Conference on Information Security and Privacy, ACISP 1999, London, UK (1999)
Garbinato, B., Rickebusch, I.: Impossibility results on fair exchange. In: Proceedings of the 6th International Workshop on Innovative Internet Community Systems, I2CS 2006, vol. LNI. German Societyof Informatics (2006)
Acknowledgments
We would like to thank Professor Peter Sommer, of Birmingham City University, for his insights into the legal aspects.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Jesus, V., Mustare, S. (2019). I Did Not Accept That: Demonstrating Consent in Online Collection of Personal Data. In: Gritzalis, S., Weippl, E., Katsikas, S., Anderst-Kotsis, G., Tjoa, A., Khalil, I. (eds) Trust, Privacy and Security in Digital Business. TrustBus 2019. Lecture Notes in Computer Science(), vol 11711. Springer, Cham. https://doi.org/10.1007/978-3-030-27813-7_3
Download citation
DOI: https://doi.org/10.1007/978-3-030-27813-7_3
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-27812-0
Online ISBN: 978-3-030-27813-7
eBook Packages: Computer ScienceComputer Science (R0)