Online user's registration respecting privacy

The explosion of Internet concerns a lot of domains from e-commerce to social networks. Various data, including personal data, are exchanged and stored in large databases or possibly in cloud storage, by numerous websites or online merchants. However, these service providers do not necessarily propose a clear policy on their personal data collection and storage. At the same time, users of the Internet need to understand how these recordings are being carried out. In this paper, a new solution is proposed for the registration to a website which helps the user to control his/her data. This solution is easy to use, user centric and privacy compliant.

[1]  Marc Langheinrich,et al.  The platform for privacy preferences 1.0 (p3p1.0) specification , 2002 .

[2]  Paul F. Syverson,et al.  Anonymous connections and onion routing , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).

[3]  Sébastien Gambs,et al.  Towards a Privacy-Preserving National Identity Card , 2009, DPM/SETOP.

[4]  Lynn A. Karoly,et al.  Health Insurance Portability and Accountability Act of 1996 (HIPAA) Administrative Simplification , 2010, Practice Management Consultant.

[5]  Alan O. Freier,et al.  Internet Engineering Task Force (ietf) the Secure Sockets Layer (ssl) Protocol Version 3.0 , 2022 .

[6]  H. Elsheshtawy,et al.  Personal Information Protection and Electronic Documents Act , 2015 .

[7]  Tim Dierks,et al.  The Transport Layer Security (TLS) Protocol Version 1.2 , 2008 .

[8]  Riley Davis Health Insurance Portability and Accountability Act , 2011 .

[9]  Evgeniy Gabrilovich,et al.  The homograph attack , 2002, CACM.

[10]  Paul F. Syverson,et al.  Anonymous connections and onion routing , 1998, IEEE J. Sel. Areas Commun..

[11]  Paul F. Syverson,et al.  Onion routing , 1999, CACM.

[12]  S. Fischer-Hübner,et al.  Anonymity , Unlinkability , Unobservability , Pseudonymity , and Identity Management – A Consolidated Proposal for Terminology , 2002 .

[13]  J. Camenisch,et al.  Title: First Annual Research Report the Prime Project Receives Research Funding from the Community's Sixth Framework Programme and the Swiss Federal Office for Education and Science. Privacy and Identity Management for Europe Prime Privacy and Identity Management for Europe , 2005 .

[14]  Claus-Peter Schnorr,et al.  Efficient signature generation by smart cards , 2004, Journal of Cryptology.

[15]  Sonja Buchegger,et al.  PeerSoN: P2P social networking: early experiences and insights , 2009, SNS '09.

[16]  Lynda L. McGhie,et al.  Health Insurance Portability and Accountability Act (HIPAA) , 2011, Encyclopedia of Information Assurance.

[17]  Onur Aciiçmez,et al.  Improving Brumley and Boneh timing attack on unprotected SSL implementations , 2005, CCS '05.

[18]  Jolina C. Cuaresma The Gramm-Leach-Bliley Act , 2002 .

[19]  Shaogang Gong,et al.  Audio- and Video-based Biometric Person Authentication , 1997, Lecture Notes in Computer Science.

[20]  Prateek Mittal,et al.  DECENT: A decentralized architecture for enforcing privacy in online social networks , 2011, 2012 IEEE International Conference on Pervasive Computing and Communications Workshops.

[21]  Bruce Schneier,et al.  Analysis of the SSL 3.0 protocol , 1996 .

[22]  Eric Rescorla,et al.  The Transport Layer Security (TLS) Protocol Version 1.1 , 2006, RFC.

[23]  P. Samarati,et al.  PrimeLife Policy Language , 2010 .

[24]  Louis Joinet,et al.  Guidelines for the Regulation of Computerized Personal Data Files , 1988 .

[25]  Cynthia J. Larose,et al.  Children's Online Privacy Protection Act , 2015 .

[26]  U. S. Code,et al.  Gramm-Leach-Bliley Act , 1999 .

[27]  Amos Fiat,et al.  How to Prove Yourself: Practical Solutions to Identification and Signature Problems , 1986, CRYPTO.

[28]  Refik Molva,et al.  Safebook: Feasibility of transitive cooperation for privacy on a decentralized social network , 2009, 2009 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks & Workshops.

[29]  K. Cameron The Laws of Identity , 2005 .