Abstract
Protection of personal data is essential for customer acceptance. Even though existing privacy policies can describe how data shall be handled, privacy enforcement remains a challenge. Especially for existing applications, it is unclear how one can effectively ensure correct data handling without completely redesigning the applications. In this paper we introduce Privacy Injector, which allows us to add privacy enforcement to existing applications.
Conceptually Privacy Injector consists of two complementary parts, namely, a privacy metadata tracking and a privacy policy enforcement part. We show how Privacy Injector protects the complete life cycle of personal data by providing us with a practical implementation of the “sticky policy paradigm.” Throughout the collection, transformation, disclosure and deletion of personal data, Privacy Injector will automatically assign, preserve and update privacy metadata as well as enforce the privacy policy. As our approach is policy-agnostic, we can enforce any policy language that describes which actions may be performed on which data.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Agrawal, R., Kiernan, J., Srikant, R., Xu, Y.: Hippocratic databases. In: Proceedings of the 28th Int’l Conf. on Very Large Databases (VLDB), Hong Kong (2002)
Backes, M., Bagga, W., Karjoth, G., Schunter, M.: Efficient comparison of enterprise privacy policies. In: 19th ACM Symposium on Applied Computing, Special Track Security, Nicosia, Cyprus (2004)
Backes, M., Pfitzmann, B., Schunter, M.: A toolkit for managing enterprise privacy policies. In: Snekkenes, E., Gollmann, D. (eds.) ESORICS 2003. LNCS, vol. 2808, pp. 162–180. Springer, Heidelberg (2003)
Bettini, C., Jajodia, S., Wang, X.S., Wijesekerat, D.: Obligation monitoring in policy management. In: Proceedings of the 3rd IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY), pp. 2–12 (2002)
Bonatti, P.A., Damiani, E., De Capitani di Vimercati, S., Samarati, P.: A component-based architecture for secure data publication. In: Proceedings of the 17th Annual Computer Security Applications Conference, pp. 309–318 (2001)
Booch, G., Rumbaugh, J., Jacobson, I.: The Unified Modeling Language User Guide. Addison-Wesley, Reading (1998)
Damianou, N., Dulay, N., Lupo, E., Sloman, M.: The ponder policy specification language. In: Sloman, M., Lobo, J., Lupu, E.C. (eds.) POLICY 2001. LNCS, vol. 1995, pp. 18–39. Springer, Heidelberg (2001)
Egelman, S., Cranor, L., Chowdhury, A.: An analysis of p3p-enabled web sites among top-20 search results. In: Proceedings of the Eighth International Conference on Electronic Commerce (2006)
Filman, R., Elrad, T., Clarke, S., Akşit, M.: Aspect-Oriented Software Development. Addison-Wesley, Reading (2004)
Fischer-Hübner, S. (ed.): IT-Security and Privacy. LNCS, vol. 1958. Springer, Heidelberg (2001)
Gamma, E., Helm, R., Johnson, R., Vlissides, J.: Design Patterns: Elements of Reusable Object-Oriented Software. Addison-Wesley, Reading (1995)
IBM. Declarative privacy monitoring. Web page at: http://alphaworks.ibm.com/tech/dpm
Jajodia, S., Kudo, M., Subrahmanian., V.S.: Provisional authorization. In: Proceedings of the E-commerce Security and Privacy, pp. 133–159. Kluwer Academic Publishers, Dordrecht (2001)
Karjoth, G., Schunter, M.: A privacy policy model for enterprises. In: Proceedings of the 15th IEEE Computer Security Foundations Workshop (CSFW), pp. 271–281 (2002)
Karjoth, G., Schunter, M., Van Herreweghen, E.: Enterprise privacy practices vs. privacy promises - how to promise what you can keep. In: 4th IEEE International Workshop on Policies for Distributed Systems and Networks (Policy 2003), Lake Como, Italy, pp. 135–146 (2003)
Karjoth, G., Schunter, M., Waidner, M.: The platform for enterprise privacy practices – privacy-enabled management of customer data. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, vol. 2482, pp. 69–84. Springer, Heidelberg (2003)
Kiczales, G., Hilsdale, E., Hugunin, J., Kersten, M., Palm, J., Griswold, W.G.: An overview of AspectJ. In: Knudsen, J.L. (ed.) ECOOP 2001. LNCS, vol. 2072, pp. 327–355. Springer, Heidelberg (2001)
Kiczales, G., Lamping, J., Menhdhekar, A., Maeda, C., Lopes, C., Loingtier, J.-M., Irwin, J.: Aspect-oriented programming. In: Akşit, M., Matsuoka, S. (eds.) Proceedings of the European Conference on Object-Oriented Programming, vol. 1241, pp. 220–242. Springer, Berlin, Heidelberg, and New York (1997)
Myers, A., Liskov, B.: Protecting privacy using the decentralized label model. ACM Transactions on Software Engineering and Methodology, 410–442 (2000)
Myers, A.C.: JFlow: Practical mostly-static information flow control. In: Proceedings of the Symposium on Principles of Programming Languages, pp. 228–241 (1999)
Oasis. eXtensible Access Control Markup Language (XACML). Web page at: http://www.oasis-open.org/committees/tc_home.php?wg_abbrev=xacml
Platform for Privacy Preferences (P3P). W3C Recommendation (April 2002), http://www.w3.org/TR/2002/REC-P3P-20020416/
Parnas, D.L.: On the criteria to be used in decomposing systems into modules (1972)
Pietraszek, T., Venden Berghe, C.: Defending against injection attacks through context-sensitive string evaluation. In: Proceedings of the 8th International Symposium on Recent Advances in Intrusion Detection (RAID 2005), pp. 124–145 (2005)
AspectJ Project. The AspectJ home page, Web page at: http://eclipse.org/aspectj/
Hibernate Project. Hibernate, Web page at: http://hibernate.org/
Ribeiro, C., Zuquete, A., Ferreira, P., Guedes, P.: SPL: An access control language for security policies with complex constraints. In: Proceedings of the Network and Distributed System Security Symposium (NDSS) (2001)
Sabelfeld, A., Myers, A.: Language-based information-flow security (2003)
Sweene, L.: k-anonymity: A model for protecting privacy. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 10(5), 557–570 (2002)
Watchfire. Watchfire, Web page at: http://watchfire.com/
De Win, B., Piessens, F., Joosen, W., Verhanneman, T.: On the importance of the separation-of-concerns principle in secure software engineering. In: Proceedings of the ACSA Workshop on the Application of Engineering Principles to System Security Design, pp. 1–10 (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Berghe, C.V., Schunter, M. (2006). Privacy Injector — Automated Privacy Enforcement Through Aspects. In: Danezis, G., Golle, P. (eds) Privacy Enhancing Technologies. PET 2006. Lecture Notes in Computer Science, vol 4258. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11957454_6
Download citation
DOI: https://doi.org/10.1007/11957454_6
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-68790-0
Online ISBN: 978-3-540-68793-1
eBook Packages: Computer ScienceComputer Science (R0)