Compliance with data protection laws using Hippocratic Database active enforcement and auditing
نویسندگان
چکیده
C. M. Johnson T. W. A. Grandison Governments worldwide are enacting data protection laws that restrict the disclosure and processing of personal information. These laws impose administrative and financial burdens on companies that manage personal information and may hinder the legitimate and valuable sharing and analysis of this information. In this paper we describe an integrated set of technologies, known as the Hippocratic Database (HDB), which enables compliance with security and privacy regulations without impeding the legitimate flow of information. HDB’s Control Center allows companies to specify finegrained disclosure policies based on the role of the user, the purpose of the access, the intended recipient, and other disclosure conditions. Its Active Enforcement component transparently enforces these policies by transforming user queries in a middleware layer to ensure that the database returns only policy-compliant information. HDB’s Compliance Auditing system efficiently tracks all database accesses and allows auditors to formulate precise audit queries to monitor compliance with privacy and security policies. In this paper, we outline the basic architecture of the HDB solution, discuss the advantages of our approach, and illustrate the features of each component with practical compliance scenarios from the financial services industry.
منابع مشابه
Securing electronic health records without impeding the flow of information
OBJECTIVE We present an integrated set of technologies, known as the Hippocratic Database, that enable healthcare enterprises to comply with privacy and security laws without impeding the legitimate management, sharing, and analysis of personal health information. APPROACH The Hippocratic Database approach to securing electronic health records involves (1) active enforcement of fine-grained d...
متن کاملAuditing Compliance with a Hippocratic Database
We introduce an auditing framework for determining whether a database system is adhering to its data disclosure policies. Users formulate audit expressions to specify the (sensitive) data subject to disclosure review. An audit component accepts audit expressions and returns all queries (deemed “suspicious”) that accessed the specified data during their execution. The overhead of our approach on...
متن کاملDo wildlife laws work? Species protection and the application of a prey choice model to poaching decisions.
Legislation for the protection of species is a global conservation tool. However, in many developing countries lack of resources means that effectiveness relies on voluntary compliance, leading to contradictory assumptions. On one hand, laws introduced without effective enforcement mechanisms carry an implicit assumption that voluntary compliance will occur. On the other hand, it is often openl...
متن کاملAuditing with Incomplete Logs
The protection of sensitive information is of utmost importance for organizations. The complexity and dynamism of modern businesses are forcing a re-think of traditional protection mechanisms. In particular, a priori policy enforcement mechanisms are often complemented with auditing mechanisms that rely on an a posteriori analysis of logs recording users’ activities to prove conformity to polic...
متن کاملAutomating Compliance for Cloud Computing Services
We present an integrated approach for automating service providers’ compliance with data protection laws and regulations, business and technical requirements in cloud computing. The techniques we propose in particular include: natural-language analysis (of legislative and regulatory texts, and corporate security rulebooks) and extraction of enforceable rules, use of sticky policies, automated p...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IBM Systems Journal
دوره 46 شماره
صفحات -
تاریخ انتشار 2007