TY - GEN
T1 - COP
T2 - 8th International Conference on Applied Cryptography and Network Security, ACNS 2010
AU - Xu, Wei
AU - Zhu, Sencun
AU - Xu, Heng
PY - 2010
Y1 - 2010
N2 - We propose COP, a client-side system for protecting children's online privacy and empowering parental control over children's information disclosure with little manual effort. COP is compliant with the Children's Online Privacy Protection Act (COPPA) in the United States and it implements acquisition of parental consent before any private information submitted online by children, e.g., registration to aWeb service. Instead of restricting access to certainWeb services or blocking sensitive data from websites, COP employs perturbation techniques over personal data with the goal of concealing the sensitive information while providing certain usability of the data to the websites. We address several challenges in the implementation of COP, e.g., perturbation of different types of data, parsing user input and retaining transparency to children without obstructing their normal Web surfing activities.We apply COP in registrations to 23 most popular websites. The results indicate COP's effectiveness as a privacy protection tool. We also discuss some potential security attacks against COP's design and provide our countermeasures.
AB - We propose COP, a client-side system for protecting children's online privacy and empowering parental control over children's information disclosure with little manual effort. COP is compliant with the Children's Online Privacy Protection Act (COPPA) in the United States and it implements acquisition of parental consent before any private information submitted online by children, e.g., registration to aWeb service. Instead of restricting access to certainWeb services or blocking sensitive data from websites, COP employs perturbation techniques over personal data with the goal of concealing the sensitive information while providing certain usability of the data to the websites. We address several challenges in the implementation of COP, e.g., perturbation of different types of data, parsing user input and retaining transparency to children without obstructing their normal Web surfing activities.We apply COP in registrations to 23 most popular websites. The results indicate COP's effectiveness as a privacy protection tool. We also discuss some potential security attacks against COP's design and provide our countermeasures.
UR - http://www.scopus.com/inward/record.url?scp=79956318200&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=79956318200&partnerID=8YFLogxK
U2 - 10.1007/978-3-642-13708-2_31
DO - 10.1007/978-3-642-13708-2_31
M3 - Conference contribution
AN - SCOPUS:79956318200
SN - 3642137075
SN - 9783642137075
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 529
EP - 544
BT - Applied Cryptography and Network Security - 8th International Conference, ACNS 2010, Proceedings
Y2 - 22 June 2010 through 25 June 2010
ER -