annual workshop february 5th 2014
Download
Skip this Video
Download Presentation
Annual Workshop February 5th, 2014

Loading in 2 Seconds...

play fullscreen
1 / 30

Annual Workshop February 5th, 2014 - PowerPoint PPT Presentation


  • 109 Views
  • Uploaded on

Annual Workshop February 5th, 2014. A Formal Approach to Analyze Privacy in Electronic Services. MSEC Koen Decroix. Outline. Introducing Privacy in Loyalty Services Conceptual model of inShopnito Framework for Formal Reasoning on Privacy Privacy Analysis of inShopnito Conclusions.

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about ' Annual Workshop February 5th, 2014' - mercedes-horn


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
annual workshop february 5th 2014
Annual Workshop

February 5th, 2014

a formal approach to analyze privacy in electronic services

A Formal Approach to Analyze Privacy in Electronic Services

MSEC

Koen Decroix

[Koen Decroix – MSEC - KU Leuven]

outline
Outline
  • Introducing Privacy in Loyalty Services
  • Conceptual model of inShopnito
  • Framework for Formal Reasoning on Privacy
  • Privacy Analysis of inShopnito
  • Conclusions
slide6

… Max Schrems, an Austrian student, did!

Now he sues Facebook for their data practices on the personal data they collected about him.

slide9

For the convenience of their customers, loyalty services evolved to electronic services integrated with other online (third-party) services. Is this the full story?

Share your shopping activities with friends on Facebook

Authenticate

slide10

Not transparent to users

When registering to such services, you agreed with their terms and policies and gave them your consentfor collecting, processing, and forwarding your personal data.

slide11

Your past online activities leave non-erasable, possibly harmful, traces behind and might get spread around.

slide12

Citizens must be protected for these data practices.

This is where the European data protection legislation comes into play.

slide15

Privacy analysis is based on user profiles built from the formal models. Its feedback must be useful for system designers and users as well.

slide18

… but looking into more detail …

From specifications of service providers’ data practices (= service policies), we can derive that …

slide22

System Independent Model

Vocabulary

(Concepts)

Theory

Behavior

Inference Rules

User Model

System Model

Trust Perception

Organizations

Services

Logic Component

Conclusions

Initial State

Service Policies

Input Model

Credentials

Profiles

Storage

Access Control

Identifiability Model

Distribution

Output

Pseudonyms

Identities

slide24

Privacy Analysis - Feedback

Linkabilities

Collaborations

Attributes

&

Violations

slide25

inShopnito modeled for two user types

Advertisers are not trusted

  • Trusts
  • Grocery Store
  • Loyalty Program Provider
  • inShopnito

No trust in organizations

Loyalty credential: Idemix what if X509 is used?

detect violations in inshopnito
Detect Violations in inShopnito

Advertisers not allowed to have the customer’s his:

Name

Address

eMail address

Violations of rules 1, 2, 3 are found only in case a X509 certificate is used in case of the user model

slide29

It is a formal approach to analyze privacy  power to prove properties

  • Approach is useful during service design
    • privacy by design is one of the principles in EU reform of data protection legislation.
    • analyzing linkabilities, collaborations, attributes in user profiles.
    • verify compliance with legislative and corporate level rules (detecting violations).
  • Approach is useful for education of people
    • EU reform of data protection  authorities get the task to educate people. E.g., model a user that participates to a survey about Facebook. Afterwards, perform a privacy analysis based on his assumptions and present him the difference between what he thinks and what can happen.
ad