Privacy Issues of Applying RFID in Retail Industry
نویسندگان
چکیده
Retail industry poses typical enterprise computing challenges, since a retailer normally deals with multiple parties that belong to different organizations (i.e., suppliers, manufacturers, distributors, end consumers). Capable of enabling retailers to effectively and efficiently manage merchandise transferring among various parties, Radio Frequency Identification (RFID) is an emerging technology that potentially could revolutionize the way retailers do business. With the dramatic price drop of RFID tags, it is possible that RFID could be applied to each item sold by a retailer. However, RFID technology poses critical privacy challenges. If not properly used, the data stored in RFID could be abused and, thus, cause privacy concerns for end consumers. In this article, we first analyze the potential privacy issue of RFID utilization. Then we propose a privacy authorization model that aims to precisely define comprehensive RFID privacy policies. Extended from the role-based access control model, our privacy authorization model ensures the special needs of RFID-related privacy protection. These policies are designed from the perspective of end consumers, whose privacy rights potentially could be violated. Finally, we explore the feasibility of applying Enterprise Privacy Authorization Language (EPAL) as the vehicle for specifying RFID-related privacy rules.
منابع مشابه
RFID Enabled Supply-chain: Harvesting the Opportunities
Implementation of Radio Frequency Identification (RFID) technology stands to save WalMart $750 million dollars per year. The retail giant has mandated that its top 100 suppliers begin using RFID by 2005. It is believed that other retailers will follow Wal-Mart’s lead. RFID holds the promise for a more efficient supply-chain, however, the industry struggles to comply with the cost and logistics ...
متن کاملThe Consumer's View
73 Consumers need to feel they have control over the RFID infrastructure before they routinely trust its services. In his seminal 1991 Scientific American article " The Computer for the 21st Century, " Mark Weiser, an early visionary of ubiquitous computing , wrote " the [social] problem [associated with ubiquitous com-puting], while often couched in terms of privacy, is really one of control. ...
متن کاملRequirement of Authentication between RFID tag and Agent for Applying U-healthcare System
A variety of security and privacy threats to RFID authentication protocols have been widely studied, including eavesdropping, replay attacks, denial of service (DoS) attacks, tracking, and traceability. Considering this RFID security issues, we surveyed the security threats and open problems related to issues by means of information security and privacy. In ubiquitous sensor node, it is possibl...
متن کاملPrivacy-value-control harmonization for RFID adoption in retail
Privacy concerns have, at least in part, impeded the adoption of radio frequency identification (RFID) in retail. The adoption of other automatic identification (auto-ID) applications shows that consumers often are willing to trade their privacy or their control of personal information against some value afforded by the application. In this paper, the interplay between privacy, value, and contr...
متن کاملTraceability improvements of a new RFID protocol based on EPC C1 G2
Radio Frequency Identification (RFID) applications have spread all over the world. In order to provide their security and privacy, researchers proposed different kinds of protocols. In this paper, we analyze the privacy of a new protocol, proposed by Yu-Jehn in 2015 which is based on Electronic Product Code Class1 Generation 2 (EPC C1 G2) standard. By applying the Ouafi_Phan privacy model, we s...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2007