Please use this identifier to cite or link to this item: https://hdl.handle.net/20.500.14279/22760
DC FieldValueLanguage
dc.contributor.authorLaoutaris, Nikolaos-
dc.contributor.authorIordanou, Costas-
dc.date.accessioned2021-06-23T07:05:55Z-
dc.date.available2021-06-23T07:05:55Z-
dc.date.issued2021-01-31-
dc.identifier.citationComputer Communication Review, 2021, vol. 51, no. 1, pp. 32 - 38en_US
dc.identifier.issn19435819-
dc.identifier.urihttps://hdl.handle.net/20.500.14279/22760-
dc.description.abstractWhat if instead of having to implement controversial user tracking techniques, Internet advertising & marketing companies asked explicitly to be granted access to user data by name and category, such as Alice?Mobility?05-11-2020? The technology for implementing this already exists, and is none other than the Information Centric Networks (ICN), developed for over a decade in the framework of Next Generation Internet (NGI) initiatives. Beyond named access to personal data, ICN’s in-network storage capability can be used as a substrate for retrieving aggregated, anonymized data, or even for executing complex analytics within the network, with no personal data leaking outside. In this opinion article we discuss how ICNs combined with trusted execution environments and digital watermarking, can be combined to build a personal data overlay inter-network in which users will be able to control who gets access to their personal data, know where each copy of said data is, negotiate payments in exchange for data, and even claim ownership, and establish accountability for data leakages due to malfunctions or malice. Of course, coming up with concrete designs about how to achieve all the above will require a huge effort from a dedicated community willing to change how personal data are handled on the Internet. Our hope is that this opinion article can plant some initial seeds towards this direction.en_US
dc.formatpdfen_US
dc.language.isoenen_US
dc.relation.ispartofComputer Communication Reviewen_US
dc.rights© Association for Computing Machineryen_US
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/4.0/*
dc.subjectInformation Centric Networkingen_US
dc.subjectOnline Privacyen_US
dc.subjectOverlay Networken_US
dc.subjectPersonal Data Management Systemen_US
dc.titleWhat do information centric networks, trusted execution environments, and digital watermarking have to do with privacy, the data economy, and their future?en_US
dc.typeArticleen_US
dc.collaborationIMDEA Networks Instituteen_US
dc.collaborationCyprus University of Technologyen_US
dc.subject.categoryComputer and Information Sciencesen_US
dc.journalsSubscriptionen_US
dc.countrySpainen_US
dc.countryCyprusen_US
dc.subject.fieldNatural Sciencesen_US
dc.publicationPeer Revieweden_US
dc.identifier.doi10.1145/3457175.3457181en_US
dc.relation.issue1en_US
dc.relation.volume51en_US
cut.common.academicyear2020-2021en_US
dc.identifier.spage32en_US
dc.identifier.epage38en_US
item.fulltextWith Fulltext-
item.cerifentitytypePublications-
item.grantfulltextopen-
item.openairecristypehttp://purl.org/coar/resource_type/c_6501-
item.openairetypearticle-
item.languageiso639-1en-
crisitem.journal.journalissn1943-5819-
crisitem.journal.publisherACM-
crisitem.author.deptDepartment of Electrical Engineering, Computer Engineering and Informatics-
crisitem.author.facultyFaculty of Engineering and Technology-
crisitem.author.parentorgFaculty of Engineering and Technology-
Appears in Collections:Άρθρα/Articles
Files in This Item:
File Description SizeFormat
PD_ICN_editorial.pdfPreprint710.73 kBAdobe PDFView/Open
CORE Recommender
Show simple item record

WEB OF SCIENCETM
Citations

1
Last Week
0
Last month
0
checked on Oct 29, 2023

Page view(s)

262
Last Week
2
Last month
17
checked on May 11, 2024

Download(s)

434
checked on May 11, 2024

Google ScholarTM

Check

Altmetric


This item is licensed under a Creative Commons License Creative Commons