Publicação
Log pseudonymization: Privacy maintenance in practice
| datacite.subject.fos | Engenharia e Tecnologia::Outras Engenharias e Tecnologias | |
| datacite.subject.fos | Ciências Naturais::Ciências da Computação e da Informação | |
| datacite.subject.sdg | 08:Trabalho Digno e Crescimento Económico | |
| datacite.subject.sdg | 09:Indústria, Inovação e Infraestruturas | |
| datacite.subject.sdg | 10:Reduzir as Desigualdades | |
| dc.contributor.author | Varanda, Artur | |
| dc.contributor.author | Santos, Leonel | |
| dc.contributor.author | Costa, Rogério Luís de C. | |
| dc.contributor.author | Oliveira, Adail | |
| dc.contributor.author | Rabadão, Carlos | |
| dc.date.accessioned | 2026-01-06T18:18:19Z | |
| dc.date.available | 2026-01-06T18:18:19Z | |
| dc.date.issued | 2021-12 | |
| dc.description.abstract | Mobile phones, social media, and Internet of Things (IoT) devices are examples of day-to-day technologies that collect large amounts of data, including people's location, habits, and preferences. The first regulations on digital data collection and processing privacy were created decades ago, but such an increased amount of collected digital data and the risks associated with the illegal processing and exposure of personal information led to several new regulations, including the European General Data Protection Regulation. Recent regulations require that personal data controllers implement several technical and organizational measures to protect data privacy. Much attention was given to data gathering, storage, and processing at system and database levels. But at the system administration level, log files usually store data that can lead to the identification of an individual, which means they must be processed to guarantee personal data privacy. In this work, we deal with pseudonymization. We discuss log sources, formats and data, log management architectures, and the log processing pipeline, considering pseudonymization and security requirements. We describe an architecture for log pseudonymization during the ingestion phase and present its implementation using Elasticsearch, Logstash, and Kibana, providing conclusions and helpful insights on log pseudonymization for privacy protection. | eng |
| dc.description.sponsorship | This work is partially funded by National Funds, Portugal through FCT - Fundação para a Ciência e a Tecnologia, I.P., in the context of the project UIDB/04524/2020 and under the Scientific Employment Stimulus - Institutional Call - CEECINST/00051/2018. | |
| dc.identifier.citation | Artur Varanda, Leonel Santos, Rogério Luís de C. Costa, Adail Oliveira, Carlos Rabadão, Log pseudonymization: Privacy maintenance in practice, Journal of Information Security and Applications, Volume 63, 2021, 103021, ISSN 2214-2126, https://doi.org/10.1016/j.jisa.2021.103021. | |
| dc.identifier.doi | 10.1016/j.jisa.2021.103021 | |
| dc.identifier.eissn | 2214-2126 | |
| dc.identifier.issn | 2214-2134 | |
| dc.identifier.uri | http://hdl.handle.net/10400.8/15236 | |
| dc.language.iso | eng | |
| dc.peerreviewed | yes | |
| dc.publisher | Elsevier | |
| dc.relation | Research Center in Informatics and Communications | |
| dc.relation.hasversion | https://www.sciencedirect.com/science/article/pii/S2214212621001915?via%3Dihub | |
| dc.relation.ispartof | Journal of Information Security and Applications | |
| dc.rights.uri | http://creativecommons.org/licenses/by/4.0/ | |
| dc.subject | Log pseudonymization | |
| dc.subject | Privacy | |
| dc.subject | Personal data | |
| dc.subject | GDPR | |
| dc.subject | ELK stack | |
| dc.title | Log pseudonymization: Privacy maintenance in practice | eng |
| dc.type | journal article | |
| dspace.entity.type | Publication | |
| oaire.awardTitle | Research Center in Informatics and Communications | |
| oaire.awardURI | info:eu-repo/grantAgreement/FCT/6817 - DCRRNI ID/UIDB%2F04524%2F2020/PT | |
| oaire.citation.endPage | 11 | |
| oaire.citation.startPage | 1 | |
| oaire.citation.title | Journal of Information Security and Applications | |
| oaire.citation.volume | 63 | |
| oaire.fundingStream | 6817 - DCRRNI ID | |
| oaire.version | http://purl.org/coar/version/c_970fb48d4fbd8a85 | |
| person.familyName | Varanda | |
| person.familyName | Simões Santos | |
| person.familyName | de Carvalho Costa | |
| person.familyName | Oliveira | |
| person.familyName | Rabadão | |
| person.givenName | Artur | |
| person.givenName | Leonel Filipe | |
| person.givenName | Rogério Luís | |
| person.givenName | Adail | |
| person.givenName | Carlos | |
| person.identifier.ciencia-id | C212-374B-3FF1 | |
| person.identifier.ciencia-id | 7717-9573-0C0F | |
| person.identifier.ciencia-id | 2C1C-E900-6A57 | |
| person.identifier.orcid | 0000-0001-9676-4280 | |
| person.identifier.orcid | 0000-0002-6883-7996 | |
| person.identifier.orcid | 0000-0003-2306-7585 | |
| person.identifier.orcid | 0000-0001-7094-5366 | |
| person.identifier.orcid | 0000-0001-7332-4397 | |
| person.identifier.rid | A-7940-2016 | |
| person.identifier.rid | M-3235-2013 | |
| person.identifier.scopus-author-id | 57203544345 | |
| person.identifier.scopus-author-id | 7801604983 | |
| person.identifier.scopus-author-id | 22433497800 | |
| project.funder.identifier | http://doi.org/10.13039/501100001871 | |
| project.funder.name | Fundação para a Ciência e a Tecnologia | |
| relation.isAuthorOfPublication | bd85f19c-46eb-449e-9095-538d0b64d7db | |
| relation.isAuthorOfPublication | 68de522f-fc54-440b-83c2-7374dc26f0b3 | |
| relation.isAuthorOfPublication | 5654d934-3fa0-4afb-9b3b-f2736104924c | |
| relation.isAuthorOfPublication | 1f3b86ad-cf84-4bca-afdc-61ea7adc4207 | |
| relation.isAuthorOfPublication | 99f438ca-9099-4e7e-91ea-1a5cbab7a1ab | |
| relation.isAuthorOfPublication.latestForDiscovery | bd85f19c-46eb-449e-9095-538d0b64d7db | |
| relation.isProjectOfPublication | 67435020-fe0d-4b46-be85-59ee3c6138c7 | |
| relation.isProjectOfPublication.latestForDiscovery | 67435020-fe0d-4b46-be85-59ee3c6138c7 |
Ficheiros
Principais
1 - 1 de 1
Miniatura indisponível
- Nome:
- Log pseudonymization Privacy maintenance in practice.pdf
- Tamanho:
- 2.09 MB
- Formato:
- Adobe Portable Document Format
- Descrição:
- Mobile phones, social media, and Internet of Things (IoT) devices are examples of day-to-day technologies that collect large amounts of data, including people's location, habits, and preferences. The first regulations on digital data collection and processing privacy were created decades ago, but such an increased amount of collected digital data and the risks associated with the illegal processing and exposure of personal information led to several new regulations, including the European General Data Protection Regulation. Recent regulations require that personal data controllers implement several technical and organizational measures to protect data privacy. Much attention was given to data gathering, storage, and processing at system and database levels. But at the system administration level, log files usually store data that can lead to the identification of an individual, which means they must be processed to guarantee personal data privacy. In this work, we deal with pseudonymization. We discuss log sources, formats and data, log management architectures, and the log processing pipeline, considering pseudonymization and security requirements. We describe an architecture for log pseudonymization during the ingestion phase and present its implementation using Elasticsearch, Logstash, and Kibana, providing conclusions and helpful insights on log pseudonymization for privacy protection.
Licença
1 - 1 de 1
Miniatura indisponível
- Nome:
- license.txt
- Tamanho:
- 1.32 KB
- Formato:
- Item-specific license agreed upon to submission
- Descrição:
