Engineering Privacy By Design
Seda Gürses COSIC, ESAT K.U. Leuven Belgium
1
Engineering Privacy By Design Seda Grses COSIC, ESAT K.U. Leuven - - PowerPoint PPT Presentation
Engineering Privacy By Design Seda Grses COSIC, ESAT K.U. Leuven Belgium 1 Outline - Introduction and Approach - Privacy Requirements Definition Problem - Privacy Requirements Analysis Problem - Policy and Compliance - Privacy By Design -
Seda Gürses COSIC, ESAT K.U. Leuven Belgium
1
2
2
3
3
4
4
5
2004
2005 PUBLIC 2006 2007
Canadian Privacy Commissioner
LIVE FEED
protests
1.600.000
Highschools
xss attacks
protests 740.000
newsfeed
Facebook API Mobile BEACON
protests 50.000 in 3 days
bans
2008
cyberbullying unlimited license to user content
user voting
protests
friends lists
2009
CONNECTIONS
chat leak
NOYB FACECLOAK SCRAMBLE
1m 5m 12m 50m 100m
2011
500m
NHS reveals data to Facebook
Discriminatory Behavioral Profiling
User IDs revealed to Third Parties
Homeland Security friends Aliens
User telephone numbers and addresses revealed to Third Parties
1 in 5 divorces due to facebook data
2010
universal “comment” and “send” buttons on 50K sites in addition to “like”
680m 350m
5
the design of the system
developing systems?
6
6
environment
information for the engineer to implement the system
7
ENVIRONMENT SYSTEM
7
behavior of the environment
the behavior of the environment or define certain desired qualities of the environment
8
8
multilateral privacy requirements engineering
9
9
10
privacy data protection
10
10
privacy data protection
non-absolute relational contextual
10
10
privacy data protection
non-absolute relational contextual
procedural safeguards
accountability
transparency personal data
10
11
11
11
11
11
sousveillance
dataveillance
11
12
lack of universality lack of satisfiability subjectivity legal compliance contrivability environmental factors counter - factuality temporality agonism negotiability
12
multilateral privacy requirements engineering
13
13
14
data confidentiality anonymous communications database anonymization IDMS Differential Privacy Privacy Policy Languages Feedback and Awareness Systems anonymous certificates Discrimination aware data mining anonymous certificates
14
15
privacy as confidentiality the right to be let alone.
Warren & Brandeis (1890) hiding information and identity
15
16
privacy as confidentiality the right to be let alone.
Warren & Brandeis (1890) hiding information and identity
privacy as control
separation of identities, data protection principles right of the individual to decide what information about himself should be communicated to
16
17
privacy as confidentiality the right to be let alone.
Warren & Brandeis (1890) hiding information and identity
privacy as control
separation of identities, data protection principles right of the individual to decide what information about himself should be communicated to
privacy as practice
the freedom from unreasonable constraints on the construction of
transparency and feedback
17
18
privacy as confidentiality
hiding information and identity
privacy as control
separation of identities, data protection principles
privacy as practice
transparency and feedback
18
SECURITY ENGINEERING
19
privacy as control privacy as practice privacy as confidentiality
19
multilateral privacy requirements engineering
20
20
privacy and the Zave & Jackson Model
not absolutely satisfiable
specifications
emotions (only beliefs, desires and intentions)
21
21
environment
information for the engineer to implement the system
22
ENVIRONMENT SYSTEM
22
behavior of the environment
the behavior of the environment or define certain desired qualities of the environment
23
23
24
quality privacy constraint Q privacy concern Σ quality space
well-defined structured ill-defined subjective
24
25
quality privacy constraint Q privacy concern Σ quality space
well-defined structured ill-defined subjective color: red munsell color notation: 10 red hue 7 chroma 8
25
26
quality privacy constraint Q privacy concern Σ quality space
well-defined structured ill-defined subjective justified approximation
evaluation
26
27
stakeholder arbitration surveillance information privacy concerns
due to experiences or expectations of harms due to informational constraints on info. self-determination due to significance of information
functionality
27
27
stakeholder arbitration surveillance information privacy concerns
due to experiences or expectations of harms due to informational constraints on info. self-determination due to significance of information
functionality functionality
27
SECURITY ENGINEERING
28
stakeholder arbitration surveillance information privacy concerns privacy goals confidentiality practice control
justified designation
functionality
28
29
stakeholder arbitration surveillance information privacy concerns privacy goals
justified designation
privacy constraints
justified approximation
functionality
29
30
stakeholder arbitration surveillance information privacy concerns privacy goals
justified designation
privacy constraints
justified approximation
communication analysis confidentiality strength of anonymity
functionality
30
SECURITY ENGINEERING
31
privacy as control privacy as practice privacy as confidentiality
31
32
adversary threats
privacy concerns
functionality usability information
justified designation
privacy goals
justified approximation
trust assumptions stakeholder data protection
privacy constraints
32
33
33
34
communication of the ec
data protection compliance throughout the entire life cycle of technologies and procedures
data security, reasonable collection limits, sound retention practices, data accuracy
FTC report
34
35
define the purpose generally to collect any data
further legitimize collection through consent and “technical control”
vulnerabilities
as compliance
limit the scope of “personal data”
35
36
PbyD as compliance leaves out security engineering
centralized databases “trust us, we do not do evil” engineer introduces symbolic mimicry
increase consumer confidence
36
37
privacy by design is
privacy embedded into design
37
37
privacy by design is
privacy embedded into design
privacy by design is embedded into the design and architecture of it systems...it is not
bolted on as an add on, after the fact. The result is that privacy becomes
an essential component of the core functionality being delivered.
37
38
Cavoukian states privacy by design includes from the principles of data protection you can infer
DATA MINIMIZATION
38
39
SYSTEM
DATA
DATA
39
40
SYSTEM
functionality: charge customers based on driving
fees location data
service providers customers
ID
40
41
SYSTEM
functionality: charge customers based on driving
fees location data
service providers customers
ID
excluded functionality: law enforcement LBS
41
42
SYSTEM
fees location data
service providers customers
ID
functionality: charge customers based on driving
42
43
SYSTEM
fees location data
service providers customers
ID
functionality: charge customers
43
44
SYSTEM
fees location data
service providers customers
ID
threat 1: SP profiles customers threat 1I: attacker compromises SP DB threat III: attacker compromises OBU
functionality: charge customers
44
45
SYSTEM
fees location data
service providers customers
ID
security req
fees are correct
functionality: charge customers
45
46
SYSTEM
fees location data
service providers customers
ID
revealed that is known to SP
no additional vulnerabilities through implementation
functionality: charge customers
46
47
SYSTEM
DATA
DATA
47
48
SYSTEM
minimize centralization
keep data in user controlled domain
minimize observation, storage, and disclosure
minimize identifiable data
minimize trust minimize risk
48
49
SYSTEM
fees location data
service providers customers
ID
functionality: charging customers, LBS
location data
threat 1: SP profiles customers threat 1I: attacker compromises SP DB threat III: attacker compromises OBU threat IV: SP profiles customers threat V: law enforcement abuses DB
49
50
SYSTEM
fees location data
service providers customers
ID
revealed that is known to SP
no additional vulnerabilities through implementation
functionality: charge customers
minimize trust
50
51
SYSTEM
fees location data
service providers customers
ID
revealed that is known to SP
no additional vulnerabilities through implementation
functionality: charge customers
minimize risk
51
52
SYSTEM
fees location data
service providers customers
ID
revealed that is known to SP
no additional vulnerabilities through implementation
functionality: charge customers
minimize centralization
52
53
SYSTEM
fees location data
service providers customers
ID
revealed that is known to SP
no additional vulnerabilities through implementation
functionality: charge customers
data in user controlled domain
53
54
SYSTEM
fees location data
service providers customers
ID
revealed that is known to SP
no additional vulnerabilities through implementation
functionality: charge customers
minimize observation, storage, disclosure
54
55
SYSTEM
fees location data
service providers customers
ID
revealed that is known to SP
no additional vulnerabilities through implementation
functionality: charge customers
minimize identifiable data
55
56
56
57
57