Privacy Policy

2321 Words5 Pages

Privacy Policy

Privacy policy is the rules that define how the user’s personal data is collected, used, disclosed and managed by the web service provider. It is highly significant to the information assurance of the privacy data.

The privacy policy settings reflect the user’s attitude to the privacy protection and quality of service. It can be classified into three types: optimistic policy, pessimistic policy and dynamic policy[1]. When choosing optimistic policy, the user allows LBSN to collect any user data to guarantee quality of service, which leads to high quality and system efficiency, but also high risk. While when choosing pessimistic policy, the user constrains both quality and quantity of the data collection of LBSN, which leads to low quality of service, heavy overhead and high privacy protection. Dynamic policy means the user does not want to always stay on the same policy, but adjusts it periodically, which result in high risk of privacy leakage and high load of adjustment for the user. Privacy policy is very important to privacy protection in LBSN. Now the research in privacy policy mainly concentrates in the following areas: (1) appropriate privacy policy models, architectures or solutions to increase the protection capacity of privacy policy; (2) architectures to implement privacy policy enforcement or compliance; (3) architectures or protocols that allow user and service providers to negotiate the privacy policy.

1.1 Privacy Policy Model/Architecture/Protocol
Many models, architectures and protocols have been proposed to precisely define privacy policy and increase the protection capacity.

One of the problems impacting the effectiveness of privacy policy is how to express it with a way that is easy for both...

... middle of paper ...

... web services[16]. This architecture extended Role-Based Access Control(RBAC) with location constraints, and applied it as the access control middleware. When a service sends a request for the privacy data, the privacy access control middleware will be invoked and enforced by the location constraints. It will make the decision based on the purposes, recipients, obligations, retentions and other components of the core RBAC model, to grant or reject the access request, and send obligations and retention in the response. The entire mechanism is depicted in the Fig.9.
Fig.9 Privacy Access Control Middleware with Location Constraints

In summary, the novel technologies mentioned above, including privacy description, privacy negotiation and privacy compliance, will largely improve the security of location privacy, and protect them from being leaked or accessed illegally.

Open Document