compliance monitoring of third party applicatjons in
play

Compliance Monitoring of Third-Party Applicatjons in Online Social - PowerPoint PPT Presentation

Compliance Monitoring of Third-Party Applicatjons in Online Social Networks Florian Kelbert, Imperial College London Alexander Fromm, Technical University of Munich Problem Problem How to ensure that data is used in correspondence with


  1. Compliance Monitoring of Third-Party Applicatjons in Online Social Networks Florian Kelbert, Imperial College London Alexander Fromm, Technical University of Munich

  2. Problem

  3. Problem How to ensure that data is used in correspondence with policies?

  4. Problem How to ensure that data is used in correspondence with policies?

  5. Problem How to ensure that data is used in correspondence with policies?

  6. Problem How to ensure that data is used in correspondence with policies?

  7. Problem How to ensure that data is used in correspondence with policies?

  8. Problem How to ensure that data is used in correspondence with policies? “You may cache the content for up to 24 hours”

  9. Problem How to ensure that data is used in correspondence with policies? “You may cache the content for up to 24 hours” “Only use friend data in the person’s experience in your app”

  10. Problem How to ensure that data is used in correspondence with policies? “You may cache the content for up to 24 hours” “Only use friend data in the person’s experience in your app” “You may not disclose confidential information to a third party without the prior explicit consent of Tumblr.”

  11. To start with ...

  12. To start with ... Social Networks are trusted

  13. To start with ... Social Networks are trusted

  14. To start with ... Social Networks are trusted Third Party Applications are not

  15. To start with ... Social Networks are trusted Third Party Applications are not Thousands of apps and developers

  16. Overview

  17. Overview User Data OSN Operator (trusted)

  18. Overview User Data OSN Operator (trusted)

  19. Overview User Data 1. Policy Provisioning Policy Database OSN Operator (trusted)

  20. Overview Applications (untrusted) User Data 1. Policy Provisioning Policy Database OSN Operator (trusted)

  21. Overview Applications (untrusted) User Data 1. Policy Provisioning PaaS / SEE (trusted) Policy Database PaaS Provider (trusted) OSN Operator (trusted)

  22. Overview Applications (untrusted) User Data Libraries 1. Policy Provisioning PaaS / SEE (trusted) Policy Database PaaS Provider (trusted) OSN Operator (trusted)

  23. Overview Applications (untrusted) User Data Libraries Monitor 1. Policy Provisioning PaaS / SEE (trusted) Policy Database PaaS Provider (trusted) OSN Operator (trusted)

  24. Overview Applications (untrusted) User 2. Request Data Libraries Monitor 1. Policy Provisioning PaaS / SEE (trusted) Policy Database PaaS Provider (trusted) OSN Operator (trusted)

  25. Overview Applications (untrusted) User 2. Request Data Libraries Monitor 1. Policy Provisioning PaaS / SEE (trusted) 3. Request Policy Database Coordinator PaaS Provider (trusted) OSN Operator (trusted)

  26. Overview Applications (untrusted) User 2. Request Data Libraries Monitor 1. Policy Provisioning PaaS / SEE (trusted) 3. Request 4. getPolicies Policy Database Coordinator PaaS Provider (trusted) OSN Operator (trusted)

  27. Overview Applications (untrusted) User 2. Request Data Libraries Monitor 1. Policy Provisioning PaaS / SEE (trusted) 3. Request 4. getPolicies Policy 5. Policies Database Coordinator PaaS Provider (trusted) OSN Operator (trusted)

  28. Overview Applications (untrusted) User 2. Request Data Libraries Monitor 1. Policy Provisioning PaaS / SEE (trusted) 3. Request 4. getPolicies Policy 5. Policies Database Coordinator Decision Engine PaaS Provider (trusted) OSN Operator (trusted)

  29. Overview Applications (untrusted) User 2. Request Data Libraries Monitor 1. Policy Provisioning PaaS / SEE (trusted) 3. Request 4. getPolicies Policy 5. Policies Database 6. deployPolicy Coordinator Decision Engine PaaS Provider (trusted) OSN Operator (trusted)

  30. Overview 7. Request Applications (untrusted) User 2. Request Data Libraries Monitor 1. Policy Provisioning PaaS / SEE (trusted) 3. Request 4. getPolicies Policy 5. Policies Database 6. deployPolicy Coordinator Decision Engine PaaS Provider (trusted) OSN Operator (trusted)

  31. Overview 7. Request 8. Response Applications (untrusted) User 2. Request Data Libraries Monitor 1. Policy Provisioning PaaS / SEE (trusted) 3. Request 4. getPolicies Policy 5. Policies Database 6. deployPolicy Coordinator Decision Engine PaaS Provider (trusted) OSN Operator (trusted)

  32. Overview 7. Request 8. Response Applications (untrusted) User 2. Request Data Libraries Monitor 1. Policy Provisioning PaaS / SEE (trusted) 3. Request 4. getPolicies 9. Response Policy 5. Policies Database 6. deployPolicy Coordinator Decision Engine PaaS Provider (trusted) OSN Operator (trusted)

  33. Overview 7. Request 8. Response Applications (untrusted) User 2. Request 10. Response Data Libraries Monitor 1. Policy Provisioning PaaS / SEE (trusted) 3. Request 4. getPolicies 9. Response Policy 5. Policies Database 6. deployPolicy Coordinator Decision Engine PaaS Provider (trusted) OSN Operator (trusted)

  34. Overview 7. Request 8. Response Applications (untrusted) User 2. Request 10. Response Data Continuous policy evaluation Libraries Monitor 1. Policy Provisioning PaaS / SEE (trusted) 3. Request 4. getPolicies 9. Response Policy 5. Policies Database 6. deployPolicy Coordinator Decision Engine PaaS Provider (trusted) OSN Operator (trusted)

  35. Some details follow ...

  36. Some details follow ... Policy Provisioning

  37. Some details follow ... Policy Provisioning

  38. Some details follow ... Policy Provisioning

  39. Policy Provisioning

  40. Policy Provisioning “If you cache data you receive from us, [. . . ] keep it up to date”

  41. Policy Provisioning “If you cache data you receive from us, [. . . ] keep it up to date” →

  42. Policy Provisioning “If you cache data you receive from us, [. . . ] keep it up to date” → “Whenever some data is processed by the application, then it must have been received from the OSN within the last 24 hours”

  43. Policy Provisioning “If you cache data you receive from us, [. . . ] keep it up to date” → “Whenever some data is processed by the application, then it must have been received from the OSN within the last 24 hours” →

  44. Policy Provisioning “If you cache data you receive from us, [. . . ] keep it up to date” → “Whenever some data is processed by the application, then it must have been received from the OSN within the last 24 hours” → Event: Condition: Action:

  45. Policy Provisioning “If you cache data you receive from us, [. . . ] keep it up to date” → “Whenever some data is processed by the application, then it must have been received from the OSN within the last 24 hours” → Event: process(data) Condition: Action:

  46. Policy Provisioning “If you cache data you receive from us, [. . . ] keep it up to date” → “Whenever some data is processed by the application, then it must have been received from the OSN within the last 24 hours” → Event: process(data) Condition: Action: <inhibit>

  47. Policy Provisioning “If you cache data you receive from us, [. . . ] keep it up to date” → “Whenever some data is processed by the application, then it must have been received from the OSN within the last 24 hours” → Event: process(data) Condition: not(repmin(24[hours], 1, receive(data))) Action: <inhibit>

  48. Policy Provisioning “If you cache data you receive from us, [. . . ] keep it up to date” → “Whenever some data is processed by the application, then it must have been received from the OSN within the last 24 hours” Complex LTL formulas: → ● propositional ● temporal ● cardinal Event: process(data) ● spatial constraints Condition: not(repmin(24[hours], 1, receive(data))) Action: <inhibit>

  49. Policy Provisioning “If you cache data you receive from us, [. . . ] keep it up to date” → “Whenever some data is processed by the application, then it must have been received from the OSN within the last 24 hours” Complex LTL formulas: → ● propositional ● temporal ● cardinal Event: process(data) ● spatial constraints Condition: not(repmin(24[hours], 1, receive(data))) Action: <inhibit>

  50. Some details follow ... Policy Provisioning Application Deployment

  51. Some details follow ... Policy Provisioning Application Deployment

  52. Some details follow ... Policy Provisioning Application Deployment

  53. Applicatjon Deployment

  54. Applicatjon Deployment Analysis of binary app to find

  55. Applicatjon Deployment Analysis of binary app to find Data sources e.g., retrieve from OSN

  56. Applicatjon Deployment Analysis of binary app to find Data sources e.g., retrieve from OSN Data sinks e.g., data usage/sharing

  57. Applicatjon Deployment Analysis of binary app to find Data sources e.g., retrieve from OSN Data sinks e.g., data usage/sharing Dependencies between them

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend