slides - IEEE Computer Society's Technical Committee on Security [PDF]

L. Bass, P. Clements, and R. Kazman, Software Architecture in Practice, 3rd ed. Addison-Wesley Professional, 2012. C. Bi

1 downloads 7 Views 1MB Size

Recommend Stories


Technical Committee on Heliports
If you want to go quickly, go alone. If you want to go far, go together. African proverb

Ovarian Cancer Committee Slides
Learning never exhausts the mind. Leonardo da Vinci

2011 Reviewers List - IEEE Computer Society [PDF]
Johnson Agbinya. Vaneet Aggarwal. Piyush Agrawal. Sheikh Ahamed .... Per Johannson. David Johnson. Matthew Johnson. Thienne Johnson. Changhee Joo.

COMPUTER SECURITY
I tried to make sense of the Four Books, until love arrived, and it all became a single syllable. Yunus

Committee on Finance (pdf)
Pretending to not be afraid is as good as actually not being afraid. David Letterman

WQMP_Presentation Technical Guidance - Training Slides
If you are irritated by every rub, how will your mirror be polished? Rumi

Slides on UK technical note on temporary customs arrangements
Just as there is no loss of basic energy in the universe, so no thought or action is without its effects,

Committee on Social Security CV Disability Criteria
We may have all come on different ships, but we're in the same boat now. M.L.King

52 Committee on Technical Barriers to Trade
You're not going to master the rest of your life in one day. Just relax. Master the day. Than just keep

2019 IEEE Technical Field Awards
And you? When will you begin that long journey into yourself? Rumi

Idea Transcript


1

A Critical Analysis of Privacy Design Strategies Michael Colesky

Our Goals 1: Translate data protection legislation into architectural goals which system engineers can understand 2: Make these goals achievable to help them actually happen

2

A Critical Analysis of Privacy Design Strategies Michael Colesky

State of the Art making Privacy by Design more concrete like Cavoukian; Thought organization tool like Wuyts, Scandariato, De Decker, & Joosen; Urquhart, Rodden, & Golembewski using Privacy Patterns like using Hoepman’s strategies Doty & Gupta; Bier & Krempel; in particular Hafiz; and Hoepman 3

A Critical Analysis of Privacy Design Strategies Michael Colesky

Privacy, Patterns & Strategy data protection laws protect privacy privacy design strategies translate these laws privacy patterns implement data protection Engineers use ‘privacy’, the EU uses ‘data protection’ We (and ISO) bridge the two as ‘privacy protection’ 15944-8

4

A Critical Analysis of Privacy Design Strategies Michael Colesky

Satisfying Our Goals 1: strategies (translate) distinct architectural goals in privacy by design, facilitating privacy protection

2: patterns (achieve) best practice solutions to recurring problems, tested by time and public scrutiny

5

A Critical Analysis of Privacy Design Strategies Michael Colesky

(translation to achievability)

Mapping Strategies to Patterns in our collection of privacy patterns, opportunity for another level of abstraction resulted in privacy design tactics: approaches to privacy by design which contribute to the goals of overarching strategies this links to ‘tactics’ from the software architecture domain – where privacy is a system quality attribute

6

A Critical Analysis of Privacy Design Strategies Michael Colesky

Software Architecture the highest level of abstraction, consisting of structures which include elements, their properties, and their relationships (like security and privacy)

Quality Attributes

important non-functional properties of a system not whether the system functions, but how well it functions

our architectural tactics enhance privacy protection They are grouped by strategies

7

A Critical Analysis of Privacy Design Strategies Michael Colesky

The Privacy Design Strategies and theirentities tactics definition e.g. and their

HIDE preventing exposure as much as possible by mixing, obfuscating, dissociating, or restricting access to any storage, sharing, or operation on personal data, within the constraints of the agreed upon purposes

8

A Critical Analysis of Privacy Design Strategies Michael Colesky

(and their mapped privacy patterns)

Some of the HIDE Strategy’s Tactics processing personal data randomly

MIX within a large enough group to reduce correlation Constant Length Padding; Delayed Routing/Random Wait; Guarantee Anonymous Access when Un-authenticated; Oblivious Transfer; Random Exit; Link Padding

removing the correlation between different DISSOCIATE pieces of personal data Anonymity Set/Probable Suspect/Mix Networks; Batched Routing; Chaining; K-anonymity; Layered Encryption/Onion Routing; Morphed Representation/Werewolf/Gate of Heaven/Dr. Jekyll and Mr. Hyde/Amoeboid Shape/Psuedo Identities/Identity Separation; Cover Traffic/Use of Dummies 9

A Critical Analysis of Privacy Design Strategies Michael Colesky

Shorter Strategy Definitions the ‘concise’ definitions follow some rules preventing exposure of access, association, visibility, and e.g. HIDE understandability of personal information to reduce the likelihood of privacy violations

- personal information concerns all kinds of processing (collecting, recording, use etc.)

- provide as much protection as possible - purposes must have freely given, specific informed consent (or be required by indicated legitimate grounds) 10

A Critical Analysis of Privacy Design Strategies Michael Colesky

per Strategy the GDPR examples Kinds of Processing from

Share

Invasion

Change Breach

Solove’s Taxonomy 11

opposite to (Erasure/Destruction)

HIDE

MINIMIZE

CONTROL

INFORM

Organization/Structuring/Storage

SEPA RATE

Dissemination

A BST RACT

Collect

DEMONSTRATE

Collection

ENFORCE

Processing

Operate Store Retain

Adaptation/Alteration/Retrieval/Consultation/ Use/Alignment/Combination

Collection/Recording Transmission/Dissemination/Making Available/opposite to (Restriction/Blocking) (Adaptation/Alteration/Use/Alignment/Combination) (Retrieval/Consultation) GDPR Processing Examples

A Critical Analysis of Privacy Design Strategies Michael Colesky

Conclusions We introduced tactics between our amended strategies and cataloged patterns goals

allowing us to connect requirements to design & implementation (and system architecture)

this presents a more accessible medium for stakeholders and engineers to achieve privacy 12

A Critical Analysis of Privacy Design Strategies Michael Colesky

Thank you for your time feel free to ask any questions, or make any comments or criticism

13

References L. Bass, P. Clements, and R. Kazman, Software Architecture in Practice, 3rd ed. Addison-Wesley Professional, 2012. C. Bier and E. Krempel, “Common Privacy Patterns in Video Surveillance and Smart Energy,” in ICCCT-2012, 2012, pp. 610–615. A. Cavoukian, “Operationalizing Privacy by Design : A Guide to Implementing Strong Privacy Practices,” pp. 1–72, 2012.

A. Cavoukian, “Privacy by Design The 7 Foundational Principles Implementation and Mapping of Fair Information Practices,” Information and Privacy Commissioner of Ontario, Canada, 2009. Committee on Civil Liberties Justice and Home Affairs, “Draft Report on the proposal for a regulation of the European Parliament and of the Council on the protection of individual with regard to the processing of personal data and on the free movement of such data,” 2014. European Commission, EU Commission and United States agree on new framework for transatlantic data flows: EU-US Privacy Shield, February. Strasbourg, 2016. European Commission, “Proposal for a Regulation of the European Parliament and of the Council on the protection of individuals with regard to the processing of personal data and on the free movement of such data (General Data Protection Regulation),” COM(2012) 11 final including SEC (2012) 72 final and SEC (2012) 73 final, vol. 2015, June, pp. 1–201, 2015. European Parliament and Council of European Union, “Directive 95/46/EC of the European Parliament and of the Council,” Official Journal of the European Communities, vol. 281, no. 31, pp. 31–50, 1995. M. Hafiz, “A Pattern Language for Developing Privacy Enhancing Technologies,” Software - Practice and Experience, vol. 43, pp. 769–787, 2013. J.-H. Hoepman, “Privacy Design Strategies,” IFIP SEC 2014, pp. 446–459, 2014. ISO/IEC, “ISO/IEC 15944-8:2012 Information technology -- Business Operational View -- Part 8: Identification of privacy protection requirements as external constraints on business transactions,” 2012. ISO/IEC, “ISO/IEC 29100:2011 Information technology -- Security techniques -- Privacy Framework,” 2011. “privacypatterns.eu - collecting patterns for better privacy.” [Online]. Available: https://privacypatterns.eu/. [Accessed: 20-Oct-2015].” L. Urquhart, T. Rodden, and M. Golembewski, “Playing the Legal Card : Using Ideation Cards to Raise Data Protection Issues within the Design Process,” Proc. CHI’15, pp. 457–466, 2015. K. Wuyts, R. Scandariato, B. De Decker, and W. Joosen, “Linking privacy solutions to developer goals,” in Proceedings – International Conference on Availability, Reliability and Security, ARES 2009, 2009, pp. 847–852.

Smile Life

When life gives you a hundred reasons to cry, show life that you have a thousand reasons to smile

Get in touch

© Copyright 2015 - 2024 PDFFOX.COM - All rights reserved.