Logo do repositório
 
Publicação

Log pseudonymization: Privacy maintenance in practice

datacite.subject.fosEngenharia e Tecnologia::Outras Engenharias e Tecnologias
datacite.subject.fosCiências Naturais::Ciências da Computação e da Informação
datacite.subject.sdg08:Trabalho Digno e Crescimento Económico
datacite.subject.sdg09:Indústria, Inovação e Infraestruturas
datacite.subject.sdg10:Reduzir as Desigualdades
dc.contributor.authorVaranda, Artur
dc.contributor.authorSantos, Leonel
dc.contributor.authorCosta, Rogério Luís de C.
dc.contributor.authorOliveira, Adail
dc.contributor.authorRabadão, Carlos
dc.date.accessioned2026-01-06T18:18:19Z
dc.date.available2026-01-06T18:18:19Z
dc.date.issued2021-12
dc.description.abstractMobile phones, social media, and Internet of Things (IoT) devices are examples of day-to-day technologies that collect large amounts of data, including people's location, habits, and preferences. The first regulations on digital data collection and processing privacy were created decades ago, but such an increased amount of collected digital data and the risks associated with the illegal processing and exposure of personal information led to several new regulations, including the European General Data Protection Regulation. Recent regulations require that personal data controllers implement several technical and organizational measures to protect data privacy. Much attention was given to data gathering, storage, and processing at system and database levels. But at the system administration level, log files usually store data that can lead to the identification of an individual, which means they must be processed to guarantee personal data privacy. In this work, we deal with pseudonymization. We discuss log sources, formats and data, log management architectures, and the log processing pipeline, considering pseudonymization and security requirements. We describe an architecture for log pseudonymization during the ingestion phase and present its implementation using Elasticsearch, Logstash, and Kibana, providing conclusions and helpful insights on log pseudonymization for privacy protection.eng
dc.description.sponsorshipThis work is partially funded by National Funds, Portugal through FCT - Fundação para a Ciência e a Tecnologia, I.P., in the context of the project UIDB/04524/2020 and under the Scientific Employment Stimulus - Institutional Call - CEECINST/00051/2018.
dc.identifier.citationArtur Varanda, Leonel Santos, Rogério Luís de C. Costa, Adail Oliveira, Carlos Rabadão, Log pseudonymization: Privacy maintenance in practice, Journal of Information Security and Applications, Volume 63, 2021, 103021, ISSN 2214-2126, https://doi.org/10.1016/j.jisa.2021.103021.
dc.identifier.doi10.1016/j.jisa.2021.103021
dc.identifier.eissn2214-2126
dc.identifier.issn2214-2134
dc.identifier.urihttp://hdl.handle.net/10400.8/15236
dc.language.isoeng
dc.peerreviewedyes
dc.publisherElsevier
dc.relationResearch Center in Informatics and Communications
dc.relation.hasversionhttps://www.sciencedirect.com/science/article/pii/S2214212621001915?via%3Dihub
dc.relation.ispartofJournal of Information Security and Applications
dc.rights.urihttp://creativecommons.org/licenses/by/4.0/
dc.subjectLog pseudonymization
dc.subjectPrivacy
dc.subjectPersonal data
dc.subjectGDPR
dc.subjectELK stack
dc.titleLog pseudonymization: Privacy maintenance in practiceeng
dc.typejournal article
dspace.entity.typePublication
oaire.awardTitleResearch Center in Informatics and Communications
oaire.awardURIinfo:eu-repo/grantAgreement/FCT/6817 - DCRRNI ID/UIDB%2F04524%2F2020/PT
oaire.citation.endPage11
oaire.citation.startPage1
oaire.citation.titleJournal of Information Security and Applications
oaire.citation.volume63
oaire.fundingStream6817 - DCRRNI ID
oaire.versionhttp://purl.org/coar/version/c_970fb48d4fbd8a85
person.familyNameVaranda
person.familyNameSimões Santos
person.familyNamede Carvalho Costa
person.familyNameOliveira
person.familyNameRabadão
person.givenNameArtur
person.givenNameLeonel Filipe
person.givenNameRogério Luís
person.givenNameAdail
person.givenNameCarlos
person.identifier.ciencia-idC212-374B-3FF1
person.identifier.ciencia-id7717-9573-0C0F
person.identifier.ciencia-id2C1C-E900-6A57
person.identifier.orcid0000-0001-9676-4280
person.identifier.orcid0000-0002-6883-7996
person.identifier.orcid0000-0003-2306-7585
person.identifier.orcid0000-0001-7094-5366
person.identifier.orcid0000-0001-7332-4397
person.identifier.ridA-7940-2016
person.identifier.ridM-3235-2013
person.identifier.scopus-author-id57203544345
person.identifier.scopus-author-id7801604983
person.identifier.scopus-author-id22433497800
project.funder.identifierhttp://doi.org/10.13039/501100001871
project.funder.nameFundação para a Ciência e a Tecnologia
relation.isAuthorOfPublicationbd85f19c-46eb-449e-9095-538d0b64d7db
relation.isAuthorOfPublication68de522f-fc54-440b-83c2-7374dc26f0b3
relation.isAuthorOfPublication5654d934-3fa0-4afb-9b3b-f2736104924c
relation.isAuthorOfPublication1f3b86ad-cf84-4bca-afdc-61ea7adc4207
relation.isAuthorOfPublication99f438ca-9099-4e7e-91ea-1a5cbab7a1ab
relation.isAuthorOfPublication.latestForDiscoverybd85f19c-46eb-449e-9095-538d0b64d7db
relation.isProjectOfPublication67435020-fe0d-4b46-be85-59ee3c6138c7
relation.isProjectOfPublication.latestForDiscovery67435020-fe0d-4b46-be85-59ee3c6138c7

Ficheiros

Principais
A mostrar 1 - 1 de 1
Miniatura indisponível
Nome:
Log pseudonymization Privacy maintenance in practice.pdf
Tamanho:
2.09 MB
Formato:
Adobe Portable Document Format
Descrição:
Mobile phones, social media, and Internet of Things (IoT) devices are examples of day-to-day technologies that collect large amounts of data, including people's location, habits, and preferences. The first regulations on digital data collection and processing privacy were created decades ago, but such an increased amount of collected digital data and the risks associated with the illegal processing and exposure of personal information led to several new regulations, including the European General Data Protection Regulation. Recent regulations require that personal data controllers implement several technical and organizational measures to protect data privacy. Much attention was given to data gathering, storage, and processing at system and database levels. But at the system administration level, log files usually store data that can lead to the identification of an individual, which means they must be processed to guarantee personal data privacy. In this work, we deal with pseudonymization. We discuss log sources, formats and data, log management architectures, and the log processing pipeline, considering pseudonymization and security requirements. We describe an architecture for log pseudonymization during the ingestion phase and present its implementation using Elasticsearch, Logstash, and Kibana, providing conclusions and helpful insights on log pseudonymization for privacy protection.
Licença
A mostrar 1 - 1 de 1
Miniatura indisponível
Nome:
license.txt
Tamanho:
1.32 KB
Formato:
Item-specific license agreed upon to submission
Descrição: