skip to main content
10.1145/3548606.3563521acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
poster

Poster: A Systems Approach to GDPR Compliance-by-Design in Web Development Stacks

Authors Info & Claims
Published:07 November 2022Publication History

ABSTRACT

Pressured by existing regulations such as the EU GDPR, online services must advertise a personal data protection policy declaring the types and purposes of collected personal data, which must then be strictly enforced as per the consent decisions made by the users. However, due to the lack of system-level support, obtaining strong guarantees of policy enforcement is hard, leaving the door open for software bugs and vulnerabilities to cause GDPR-compliance violations. We present ongoing work on building a GDPR-aware personal data policy compliance system for web development frameworks. Currently prototyped for the MERN framework, our system allows web developers to specify a GDPR manifest from which the data protection policy of the web application is automatically generated and is transparently enforced through static code analysis and runtime access control mechanisms. GDPR compliance is checked in a cross-cutting manner requiring few changes to the application code. We evaluate our prototype with four real-world applications. Our system can model realistic GDPR data protection requirements, adds modest performance overheads to the web application, and can detect GDPR violation bugs.

References

  1. Análises Clínicas LEB - Laboratórios Elisabeth Barreto. 2022. Retrieved January 14, 2022 from https://www.leb-analises.com/.Google ScholarGoogle Scholar
  2. Basir. 2020. Amazona - Build ECommerce Website Like Amazon. Retrieved April 13, 2022 from https://github.com/basir/node-react-ecommerce.Google ScholarGoogle Scholar
  3. Abhishek Bichhawat, Matt Fredrikson, Jean Yang, and Akash Trehan. 2020. Contextual and Granular Policy Enforcement in Database-Backed Applications. In AsiaCCS'20.Google ScholarGoogle Scholar
  4. gothinkster. 2018. Blog - RealWorld Example App. Retrieved April 13, 2022 from https://github.com/gothinkster/node-express-realworld-example-app.Google ScholarGoogle Scholar
  5. Marco Guarnieri, Musard Balliu, Daniel Schoepe, David Basin, and Andrei Sabelfeld. 2019. Information-Flow Control for Database-Backed Applications. In EuroS&P'19.Google ScholarGoogle Scholar
  6. HabitRPG. 2021. habitica - Release v4.189.0. Retrieved January 14, 2022 from https://github.com/HabitRPG/habitica/releases/tag/v4.189.0.Google ScholarGoogle Scholar
  7. Rishabh Khandelwal, Thomas Linden, Hamza Harkous, and Kassem Fawaz. 2021. PriSEC: A Privacy Settings Enforcement Controller. In USENIX Security'21.Google ScholarGoogle Scholar
  8. Nico Lehmann, Rose Kunkel, Jordan Brown, Jean Yang, Niki Vazou, Nadia Polikarpova, Deian Stefan, and Ranjit Jhala. 2021. STORM: Refinement Types for Secure Web Applications. In OSDI'21.Google ScholarGoogle Scholar
  9. Célestin Matte, Nataliia Bielova, and Cristiana Santos. 2020. Do Cookie Banners Respect my Choice? Measuring Legal Compliance of Banners from IAB Europe's Transparency and Consent Framework. In S&P'20.Google ScholarGoogle Scholar
  10. Aastha Mehta, Eslam Elnikety, Katura Harvey, Deepak Garg, and Peter Druschel. 2017. Qapla: Policy compliance for database-backed systems. In USENIX Security'17.Google ScholarGoogle Scholar
  11. Tamjid Al Rahat, Yu Feng, and Yuan Tian. 2019. OAUTHLINT: An Empirical Study on OAuth Bugs in Android Applications. In ASE'19.Google ScholarGoogle Scholar
  12. Frank Wang, Ronny Ko, and James Mickens. 2019. Riverbed: Enforcing User-defined Privacy Constraints in Distributed Web Services. In NSDI'19.Google ScholarGoogle Scholar
  13. Lun Wang, Usmann Khan, Joseph Near, Qi Pang, Jithendaraa Subramanian, Neel Somani, Peng Gao, Andrew Low, and Dawn Song. 2022. PrivGuard: Privacy Regulation Compliance Made Easier. In USENIX Security'22.Google ScholarGoogle Scholar
  14. Sebastian Zimmeck, Rafael Goldstein, and David Baraka. 2021. PrivacyFlash Pro: automating privacy policy generation for mobile apps. In NDSS'21.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Poster: A Systems Approach to GDPR Compliance-by-Design in Web Development Stacks

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        CCS '22: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security
        November 2022
        3598 pages
        ISBN:9781450394505
        DOI:10.1145/3548606

        Copyright © 2022 Owner/Author

        Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 7 November 2022

        Check for updates

        Qualifiers

        • poster

        Acceptance Rates

        Overall Acceptance Rate1,261of6,999submissions,18%

        Upcoming Conference

        CCS '24
        ACM SIGSAC Conference on Computer and Communications Security
        October 14 - 18, 2024
        Salt Lake City , UT , USA
      • Article Metrics

        • Downloads (Last 12 months)87
        • Downloads (Last 6 weeks)9

        Other Metrics

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader