Privacy Injector - Automated Privacy Enforcement Through Aspects
نویسندگان
چکیده
Protection of personal data is essential for customer acceptance. Even though existing privacy policies can describe how data shall be handled, privacy enforcement remains a challenge. Especially for existing applications, it is unclear how one can effectively ensure correct data handling without completely redesigning the applications. In this paper we introduce Privacy Injector, which allows us to add privacy enforcement to existing applications. Conceptually Privacy Injector consists of two complementary parts, namely, a privacy metadata tracking and a privacy policy enforcement part. We show how Privacy Injector protects the complete life cycle of personal data by providing us with a practical implementation of the “sticky policy paradigm.” Throughout the collection, transformation, disclosure and deletion of personal data, Privacy Injector will automatically assign, preserve and update privacy metadata as well as enforce the privacy policy. As our approach is policy-agnostic, we can enforce any policy language that describes which actions may be performed on which data.
منابع مشابه
The Right to Prisoners’ Privacy: Dimensions, Effects and Indicators.
The right to privacy is subject was defined by Shariah and law and it refer to exploration prohibition and kind of human life aspects which are called positivism area. Article constitution is known as one of the most important rights for people in community closely linked to the right to privacy. The authors, considering that the prisoners are also human and his conviction should not deprive h...
متن کاملA Systemic Approach to Automate Privacy Policy Enforcement in Enterprises
It is common practice for enterprises and other organisations to ask people to disclose their personal data in order to grant them access to services and engage in transactions. This practice is not going to disappear, at least in the foreseeable future. Most enterprises need personal information to run their businesses and provide the required services, many of whom have turned to identity man...
متن کاملTowards Natural-Language Understanding and Automated Enforcement of Privacy Rules and Regulations in the Cloud: Survey and Bibliography
Towards Natural-Language Understanding and Automated Enforcement of Privacy Rules and Regulations in the Cloud: Survey and Bibliography Nick Papanikolaou, Siani Pearson, Marco Casassa Mont
متن کاملLanguage-Based Enforcement of Privacy Policies
We develop a language-based approach for modeling and verifying aspects of privacy policies. Our approach relies on information-flow control. Concretely, we use the programming language Jif, an extension of Java with information-flow types. We address basic leaks of private information and also consider other aspects of privacy policies supported by the Platform for Privacy Preferences (P3P) an...
متن کاملLinked Data for a Privacy-aware Smart Grid
Recent developments around the Smart Grid promise more efficient power generation and distribution. In contrast to the current design of the electricity grid, the Smart Grid is heavily based on IT for managing communication flows. Given the large number of market participants, data exchanged should be marked up in a way that facilitates flexible modelling, extension and integration. In addition...
متن کامل