%0 Conference Proceedings %T Ontology-Based Modeling of Privacy Vulnerabilities for Data Sharing %+ University of Southern Denmark (SDU) %A Schwee, Jens, Hjort %A Sangogboye, Fisayo, Caleb %A Johansen, Aslak %A Kjærgaard, Mikkel, Baun %Z Part 3: Language and Privacy %< avec comité de lecture %( IFIP Advances in Information and Communication Technology %B 14th IFIP International Summer School on Privacy and Identity Management (Privacy and Identity) %C Windisch, Switzerland %Y Michael Friedewald %Y Melek Önen %Y Eva Lievens %Y Stephan Krenn %Y Samuel Fricker %I Springer International Publishing %3 Privacy and Identity Management. Data for Better Living: AI and Privacy %V AICT-576 %P 109-125 %8 2019-08-19 %D 2019 %R 10.1007/978-3-030-42504-3_8 %K Open data %K Data anonymization %K Modeling methodologies %K Data publishing %K Data privacy %K Privacy-Preserving Data Publishing %Z Computer Science [cs]Conference papers %X When several parties want to share sensor-based datasets it can be difficult to know exactly what kinds of information can be extracted from the shared data. This is because many types of sensor data can be used to estimate indirect information, e.g., in smart buildings a $$\text {CO}_2$$ stream can be used to estimate the presence and number of occupants in each room. If a data publisher does not consider these transformations of data their privacy protection of the data might be problematic. It currently requires a manual inspection by a knowledge expert of each dataset to identify possible privacy vulnerabilities for estimating indirect information. This manual process does not scale with the increasing availability of data due to the general lack of experts and the associated cost with their work. To improve this process, we propose a privacy vulnerability ontology that helps highlight the specific privacy challenges that can emerge when sharing a dataset. The ontology is intended to model data transformations, privacy attacks, and privacy risks regarding data streams. In the paper, we have used the ontology for modeling the findings of eight papers in the smart building domain. Furthermore, the ontology is applied to a case study scenario using a published dataset. The results show that the ontology can be used to highlight privacy risks in datasets. %G English %Z TC 9 %Z TC 11 %Z WG 9.2 %Z WG 9.6 %Z WG 11.7 %Z WG 11.6 %2 https://inria.hal.science/hal-03378967/document %2 https://inria.hal.science/hal-03378967/file/496005_1_En_8_Chapter.pdf %L hal-03378967 %U https://inria.hal.science/hal-03378967 %~ IFIP %~ IFIP-AICT %~ IFIP-TC %~ IFIP-WG %~ IFIP-TC9 %~ IFIP-TC11 %~ IFIP-WG9-2 %~ IFIP-WG9-6 %~ IFIP-WG11-7 %~ IFIP-WG11-6 %~ IFIP-PRIMELIFE %~ IFIP-AICT-576