4 SUMMARY AND OUTLOOK
In this position paper, we presented an approach
(PRIVACY-AVARE) to empower the privacy
enforcements of citizens. The approach is based on
an analysis of existing solutions for privacy
enhancement and the main functional requirements
are presented. We presented the general operating
principle of PRIVACY-AVARE and discussed some
non-functional compliance and usability
requirements. PRIVACY-AVARE enables users to
gain control over their data and thus enhances
confidence in cloud based services.
Currently, we are implementing our approach
(for Android devices) with a focus on privacy
enforcement for German citizens. The code is Open
Source (Apache 2.0) and available on GitHub
1
.
ACKNOWLEDGEMENTS
This work has been financed by the Baden-
Württemberg Stiftung gGmbH within the project
‘AVARE’.
REFERENCES
Alpers, S., Betz, S., Fritsch, A., Oberweis, A., Pieper, M.,
Schiefer, G., Wagner, M., 2017a. Existing Software
[WWW Document]. URL http://projects.aifb.kit.edu/
avare/existing_software/ (accessed 24.01.2018).
Alpers, S., Oberweis, A., Pieper, M., Betz, S., Fritsch, A.,
Schiefer, G., Wagner, M., 2017b. PRIVACY-
AVARE: An Approach to Manage and Distribute
Privacy Settings, in: 3rd IEEE International
Conference on Computer and Communications. pp.
1460–1468.
Backes, M., Bugiel, S., Hammer, C., Schranz, O., Von
Styp-Rekowsky, P., 2015. Boxify: Full-fledged App
Sandboxing for Stock Android, in: Proceedings of the
24th USENIX Conference on Security Symposium,
SEC’15. USENIX Association, Berkeley, CA, USA,
pp. 691–706.
Bishop, M., 2012. Computer security: art and science.
Addison-Wesley, Boston ; Munich
Bodden, E., Rasthofer, S., Richter, P., Roßnagel, A., 2013.
Schutzmaßnahmen gegen datenschutz- unfreundliche
Smartphone-Apps: Technische Möglichkeiten und
rechtliche Zulässigkeit des Selbstdatenschutzes bei
Apps. Datenschutz Datensicherheit - DuD 37, 720–
725. https://doi.org/10.1007/s11623-013-0300-1
1
https://github.com/fzi-forschungszentrum-
informatik/PRIVACY-AVARE
Christl, W., Spiekermann, S., 2016. Networks of control: a
report on corporate surveillance, digital tracking, big
data & privacy. Facultas, Wien.
Felt, A.P., Chin, E., Hanna, S., Song, D., Wagner, D.,
2011a. Android permissions demystified, in:
Proceedings of the 18th ACM Conference on
Computer and Communications Security. ACM, pp.
627–638.
Felt, A.P., Greenwood, K., Wagner, D., 2011b. The
effectiveness of application permissions, in:
Proceedings of the 2nd USENIX Conference on Web
Application Development. pp. 7–7.
Forum Privatheit, 2014. White Paper Selbstdatenschutz.
Goldberg, I., Wagner, D., Thomas, R., Brewer, E.A.,
1996. A Secure Environment for Untrusted Helper
Applications Confining the Wily Hacker, in:
Proceedings of the 6th Conference on USENIX
Security Symposium, Focusing on Applications of
Cryptography - Volume 6, SSYM’96. USENIX
Association, Berkeley, CA, USA, pp. 1–1.
Kelley, P.G., Consolvo, S., Cranor, L.F., Jung, J., Sadeh,
N., Wetherall, D., 2012. A conundrum of permissions:
installing applications on an android smartphone, in:
International Conference on Financial Cryptography
and Data Security. Springer, pp. 68–79.
KG Berlin 17.03.2010 - 24 U 117/08, 2010.
Leibenger, D., Möllers, F., Petrlic, A., Petrlic, R., Sorge,
C., 2016. Privacy Challenges in the Quantified Self
Movement – An EU Perspective. Proc. Priv.
Enhancing Technol. 2016.
https://doi.org/10.1515/popets-2016-0042
Local Court Bad Hersfeld 15.05.2017 - F 120/17 EASO,
2017.
Schreiner, M., Hess, T., 2015. Examining the role of
privacy in virtual migration: The case of whatsapp and
threema.
Smith, E., 2010. iPhone applications & privacy issues: An
analysis of application transmission of iPhone unique
device identifiers (UDIDs). URL Www Pskl Uswpwp-
Contentuploads201009iPhone-Appl.-Priv.-Issues Pdf.
Spindler, G., 2012. Grenzen des Softwareschutzes.
Comput. Recht 28. https://doi.org/10.9785/ovs-cr-
2012-417
Vervier, L., Zeissig, E.-M., Lidynia, C., Ziefle, M., 2017.
Perceptions of Digital Footprints and the Value of
Privacy: SCITEPRESS - Science and Technology
Publications, pp. 80–91.
https://doi.org/10.5220/0006301000800091
Citizen Empowerment by a Technical Approach for Privacy Enforcement
595