Abstract
Many ICT applications involve the collection of personal information or information on the behaviour of customers, users, employees, citizens, or patients. The organisations that collect this data need to manage the privacy of these individuals. In many organisations there are insufficient data protection measures and a low level of trust among those whose data are concerned. It is often difficult and burdensome for organisations to prove privacy compliance and accountability especially in situations that cross national boundaries and involve a number of different legal systems governing privacy. In response to these obstacles, we describe instruments facilitating accountability, audit, and meaningful certification. These instruments are based on a set of fundamentaldata protection goals (DPG): availability, integrity, confidentiality, transparency, intervenability, and unlinkability. By using the data protection goals instead of focusing on fragmented national privacy regulations, a well defined set of privacy metrics can be identified recognising privacy by design requirements and widely accepted certification criteria. We also describe a novel conceptual framework and architecture for defining comprehensive privacy compliance metrics and providingassessment tools for ICT applications and services using as much automation as possible. The proposed metrics and tools will identify gaps, provide clear suggestions and will assist audit and certification to support informed decisions on the trustworthiness of ICT for citizens and businesses.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Unabhaengiges Landeszentrum fuer Datenschutz (ULD). Juristische Fragen im Bereich Altersgerechter Assistenzsysteme, pre-study on behalf of VDI/VDE-IT, funded by the German Bundesministerium fuer Bildung und Forschung, https://www.datenschutzzentrum.de/projekte/aal/
Acunetix Web Vulnerability Scanner, http://www.acunetix.com/vulnerability-scanner/
IBM Rational AppScan, http://www-01.ibm.com/software/awdtools/appscan/
The Article 29 Data Protection Working Party was set up under Article 29 of Directive 95/46/EC, http://ec.europa.eu/justice/policies/privacy/index_en.htm
Bezzi, M.: Expressing privacy metrics as one-symbol information. In: Proc. of the 2010 EDBT/ICDT Workshops (2010)
Byun, J.-W., Li, N.: Purpose based access control for privacy protection in relational database systems. VLDB J. 17(4), 603–619 (2008)
Bock, K., Meissner, S.: Datenschutz-Schutzziele im Recht. DuD – Datenschutz und Datensicherheit 36(6), 425–431 (2012)
German Federal Office for Information Security, http://www.bsi.bund.de
Xiao, X., Wang, G., Gehrke, J.: Interactive Anonymization of Sensitive Data. In: SIGMOD 2009 (2009)
ISACA: COBIT Framework for IT Governance and Control, http://www.isaca.org/Knowledge-Center/COBIT/Pages/Overview.aspx
The Compliance Meter, http://www.compliancehelper.com/compliance-meter/
Colombo, P., Ferrari, E.: Towards a modeling and analysis framework for privacy aware systems. Technical report, University of Insubria (2012) (submitted for publication)
Datta, A., et al.: Understanding and Protecting Privacy: Formal Semantics and Principled Audit Mechanisms. In: Proc. of the International Conference on Information Systems Security (2011)
Datta, A., Franklin, J., Garg, D., Kaynar, D.K.: A Logic of Secure Systems and its Application to Trusted Computing. In: Proc. of the IEEE Symposium on Security and Privacy (2009)
DeYoung, H., Garg, D., Jia, L., Kaynar, D., Datta, A.: Experiences in the Logical Specification of the HIPAA and GLBA Privacy Laws. In: Proc. of 9th ACM Workshop on Privacy in the Electronic Society (October 2010)
Ein modernes Datenschutzrecht fuer das 21. Jahrhundert, Eckpunkte; Konferenz der Datenschutzbeauftragten des Bundes und der Laender, http://www.lfd.m-v.de/dschutz/beschlue/Eckpunkte.pdf (presented on March 18, 2010)
Dwork, C.: Differential Privacy: A Survey of Results. In: Agrawal, M., Du, D.-Z., Duan, Z., Li, A. (eds.) TAMC 2008. LNCS, vol. 4978, pp. 1–19. Springer, Heidelberg (2008)
Evesti, A., Ovaska, E., Savola, R.: From Security Modelling to Run-time Security Monitoring. In: Proc. of the Fifth European Conference on Model-driven Architecture Foundations and Applications, Enchede, The Netherlands (June 2009)
EuroPriSe, the European Privacy Seal for IT Products and IT-Based Services, http://www.european-privacy-seal.eu
Geisberger, E., Broy, M. (eds.): AgendaCPS, Integrierte Forschungsagenda Cyber-Physical Systems, acatech Studie, Deutsche Akademie der Technikwissenschaften (2012)
IBM Hippocratic Database (HDB) Technology Projects, http://www.almaden.ibm.com/cs/projects/iis/hdb/hdb_projects.shtml
Herrmann, D.S.: Complete guide to security and privacy metrics – measuring regulatory compliance, operational resilience and ROI. Auerbach Publications (2007)
Heyman, T., Scandariato, R., Huygens, C., Joosen, W.: Using security patterns to combine security metrics. In: Proc. of the 3rd Int. Conf. on Availability, Reliability and Security (ARES) (2008)
The Privacy Management Toolkit, http://www.informationshield.com/privacy_main.html
Arraj, V.: ITIL - IT Infrastructure Library, The Basics, White Paper, http://www.itil-officialsite.com/AboutITIL/WhatisITIL.aspx (downloaded January 1, 2012)
Jaquith, A.: Security metrics: replacing fear, uncertainty and doubt. Addison-Wesley (2007)
Jouault, F., Allilaire, F., Bézivin, J., Kurtev, I.: Atl: A model transformation tool. Science of Computer Programming 72(1-2) (2008)
Schleswig-Holstein Act on the Protection of Personal Information of February 9, 2000 last amended by Article 1 of the Act to amend the State Data Protection Act (January 11, 2012) (GVOBl. Schl.-H. p. 78)
Li, N., Li, T., Venkatasubramanian, S.: t-closeness: Privacy beyond k-anonymity and l-diversity. In: Proc. of the 23rd IEEE International Conference on Data Engineering (ICDE 2007). IEEE Computer Society (April 2007)
Martin, E.: Testing and Analysis of Access Control Policies. In: ICSE 2007 (2007)
Managing Assurance, Security and Trust for Services, European research project, http://cordis.europa.eu/fetch?CALLER=PROJ_ICT&ACTION=D&CAT=PROJ&RCN=85559
Machanavajjhala, A., Gehrke, J., Kifer, D., Venkitasubramaniam, M.: l-diversity: Privacy beyond k-anonymity. In: Proc. of the 22nd IEEE International Conference on Data Engineering (ICDE 2006). IEEE Computer Society, Washington, DC (2006)
OMG, Object Constraint Language (OCL) (2012), http://www.omg.org/spec/OCL/2.3.1
European Commission (EC): The Privacy Impact Assessment Framework for RFID Applications: PIA Framework (January 2011), http://ec.europa.eu/information_society/policy/rfid/pia/index_en.htm
Privacy and Identity Management for Community Services, European research project, http://cordis.europa.eu/fetch?CALLER=PROJ_ICT&ACTION=D&CAT=PROJ&RCN=85533
Ni, Q., Bertino, E., Lobo, J., Brodie, C., Karat, C.-M., Karat, J., Trombeta, A.: Privacy-aware role-based access control. ACM Trans. Inf. Syst. Secur. 13(3), Article 24 (July 2010)
Generische Schutzmassnahmen für Datenschutz-Schutzziele. DuD – Datenschutz und Datensicherheit 36(6), 439–444 (2012), https://www.european-privac-seal.eu/results/articles/201206-DuD-Probst.pdf
OMG, Meta Object Facility (MOF) 2.0 Query/View/Transformation (QVT) (2011), http://www.omg.org/spec/QVT/1.1
Rebollo-Monedero, D., Forne, J., Domingo-Ferrer, J.: From t-closeness-like privacy to postrandomization via information theory. IEEE Transactions on Knowledge and Data Engineering 99(1) (2009)
Rost, M., Pfitzmann, A.: Datenschutz-Schutzziele – revisited. DuD – Datenschutz und Datensicherheit 33(6), 353–358 (2009)
Rost, M.: Datenschutz in 3D. DuD – Datenschutz und Datensicherheit 35(5), 351–353 (2011)
Rost, M., Bock, K.: Privacy by Design und die neuen Schutzziele. DuD – Datenschutz und Datensicherheit 35(1), 30–35 (2011)
Savola, R., Abie, H.: Development of Measurable Security for a Distributed Messaging System. International Journal on Advances in Security 2(4), 358–380 (2010) ISSN 1942-2636
Savola, R.: A Requirement Centric Framework for Information Security Evaluation. In: Yoshiura, H., Sakurai, K., Rannenberg, K., Murayama, Y., Kawamura, S.-i. (eds.) IWSEC 2006. LNCS, vol. 4266, pp. 48–59. Springer, Heidelberg (2006)
Savola, R.: Towards a Risk-Driven Methodology for Privacy Metrics Development. In: Proc. of the Symposium on Privacy and Security Applications (PSA 2010) (August 2010)
Schmidt, D.C.: Model-Driven Engineering. IEEE Computer 39(2) (2006)
Seddigh, N., Pieda, P., Matrawy, A., Nandy, B., Lambadaris, J., Hatfield, A.: Current trends and advances in information assurance metrics. In: Proc. of the 2nd Annual Conference on Privacy Security and Trust (2004)
Sweeney, L.: k-anonymity: a model for protecting privacy. International Journal on Uncertainty, Fuzziness and Knowledge-based Systems 10(5), 557–570 (2002)
TRUSTe, http://www.truste.com/privacy_seals_and_services/enterprise_privacy/web_privacy_seal
OMG, Unified Modeling Language, v2.4.1 (2011), http://www.omg.org/spec/UML/2.4.1/
UTD Anonymization ToolBox, http://cs.utdallas.edu/dspl/cgi-bin/toolbox/index.php
Vaniea, K., Ni, Q., Cranor, L., Bertino, E.: Access control policy analysis and visualization tools for security professionals. In: USM 2008: Workshop on Usable IT Security Management (2008)
OASIS eXtensible Access Control Markup Language (XACML), http://www.oasis-open.org/committees/xacml/
Zwingelberg, H., Hansen, M.: Privacy Protection Goals and Their Implications for eID Systems. In: Camenisch, J., Crispo, B., Fischer-Hübner, S., Leenes, R., Russello, G. (eds.) Privacy and Identity Management for Life – 7th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6 International Summer School Trento, Italy (September 2011); Revised Selected Papers. Springer, Boston (2012) (to appear)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kveler, K., Bock, K., Colombo, P., Domany, T., Ferrari, E., Hartman, A. (2014). Conceptual Framework and Architecture for Privacy Audit. In: Preneel, B., Ikonomou, D. (eds) Privacy Technologies and Policy. APF 2012. Lecture Notes in Computer Science, vol 8319. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-54069-1_2
Download citation
DOI: https://doi.org/10.1007/978-3-642-54069-1_2
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-54068-4
Online ISBN: 978-3-642-54069-1
eBook Packages: Computer ScienceComputer Science (R0)