Towards Practical Privacy Policy Enforcement

نویسندگان

  • William H. Winsborough
  • Jeffery von Ronne
  • Omar Chowdhury
  • Jianwei Niu
  • Md. Shamim Ashik
چکیده

Organizations that use private information typically must provide assurances to regulators that their practices ensure that regulations are met. However, to the extent that they rely on electronic information systems for the management of private information, they really have no basis for providing those assurances. This paper proposes a framework for the design and implementation of information systems that provably enforce privacy policies. The privacy policies we aim to enforce are expressed in first-order temporal logic (FOTL). They capture not only safety, but also liveness requirements, which are essential in privacy policy. For a variety of reasons, prior work in runtime monitoring is of limited use in privacy policy enforcement. Among these reasons are the need to support liveness requirements, a desire to ensure through static verification that runtime policy violations do not occur, and above all, a recognition that users of electronic information systems require meaningful explanations when actions they attempt to initiate are denied. The latter is particularly relevant in the context of privacy policy because the (human) subject of information often needs to consent to having their personal information shared. So when a denial occurs, it may be that the user needs to seek permission from the subject to share his/her information. For all these reasons, our approach requires us to draw on and solve problems in diverse areas of computer science. We inventory open problems that must be solved, several of which we solve here.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Privacy Injector - Automated Privacy Enforcement Through Aspects

Protection of personal data is essential for customer acceptance. Even though existing privacy policies can describe how data shall be handled, privacy enforcement remains a challenge. Especially for existing applications, it is unclear how one can effectively ensure correct data handling without completely redesigning the applications. In this paper we introduce Privacy Injector, which allows ...

متن کامل

Limiting Disclosure in Hippocratic Databases

We present a practical and efficient approach to incorporating privacy policy enforcement into an existing application and database environment, and we explore some of the semantic tradeoffs introduced by enforcing these privacy policy rules at cell-level granularity. Through a comprehensive set of performance experiments, we show that the cost of privacy enforcement is small, and scalable to l...

متن کامل

PRECIOSA PeRA: Practical Enforcement of Privacy Policies in Intelligent Transportation Systems

Cooperative Intelligent Transportation Systems must incorporate privacy enhancing mechanisms to gain acceptance by all involved parties. The PRECIOSA Privacy-enforcing Runtime Architecture (PeRA) provides a holistic privacy protection approach, which implements user-defined privacy policies. A data-centric protection chain ensures that ITS components process data according to attached privacy p...

متن کامل

An Algebra for Composing Enterprise Privacy Policies

Enterprise privacy enforcement allows enterprises to internally enforce a privacy policy that the enterprise has decided to comply to. To facilitate the compliance with different privacy policies when several parts of an organization or different enterprises cooperate, it is crucial to have tools at hand that allow for a practical management of varying privacy requirements. We propose an algebr...

متن کامل

Towards User Defined Privacy in Location- Aware Platforms

The basic concept of the “Wireless Internet” is a system by which users are offered easy and efficient access to the Internet from small, convenient handheld devices. It is predicted that this will open a huge market for location-aware services. But Internet subscribers are already concerned about their privacy. Therefore location-aware services will only succeed if the privacy of the user can ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011