Annual workshop february 5th 2014
Download
1 / 30

Annual Workshop February 5th, 2014 - PowerPoint PPT Presentation


  • 109 Views
  • Uploaded on

Annual Workshop February 5th, 2014. A Formal Approach to Analyze Privacy in Electronic Services. MSEC Koen Decroix. Outline. Introducing Privacy in Loyalty Services Conceptual model of inShopnito Framework for Formal Reasoning on Privacy Privacy Analysis of inShopnito Conclusions.

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about ' Annual Workshop February 5th, 2014' - mercedes-horn


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
Annual workshop february 5th 2014

Annual Workshop

February 5th, 2014


A formal approach to analyze privacy in electronic services

A Formal Approach to Analyze Privacy in Electronic Services

MSEC

Koen Decroix

[Koen Decroix – MSEC - KU Leuven]


Outline
Outline

  • Introducing Privacy in Loyalty Services

  • Conceptual model of inShopnito

  • Framework for Formal Reasoning on Privacy

  • Privacy Analysis of inShopnito

  • Conclusions




… Max Schrems, an Austrian student, did!

Now he sues Facebook for their data practices on the personal data they collected about him.




For the convenience of their customers, loyalty services evolved to electronic services integrated with other online (third-party) services. Is this the full story?

Share your shopping activities with friends on Facebook

Authenticate


Not transparent to users evolved to electronic services integrated with other online (third-party) services. Is this the full story?

When registering to such services, you agreed with their terms and policies and gave them your consentfor collecting, processing, and forwarding your personal data.


Your past online activities leave non-erasable, possibly harmful, traces behind and might get spread around.


Citizens must be protected for these data practices. harmful, traces behind and might get spread around.

This is where the European data protection legislation comes into play.



Need for formal modeling, as a support during requirementsdesign of composite services.


Privacy analysis is based on requirementsuser profiles built from the formal models. Its feedback must be useful for system designers and users as well.


Conceptual model of inshopnito
Conceptual Model of requirementsinShopnito



… but looking into more requirementsdetail …

From specifications of service providers’ data practices (= service policies), we can derive that …


Conceptual model of requirementsinShopnito


Framework for formal reasoning on privacy
Framework for Formal Reasoning requirementson Privacy


System Independent Model requirements

Vocabulary

(Concepts)

Theory

Behavior

Inference Rules

User Model

System Model

Trust Perception

Organizations

Services

Logic Component

Conclusions

Initial State

Service Policies

Input Model

Credentials

Profiles

Storage

Access Control

Identifiability Model

Distribution

Output

Pseudonyms

Identities


Privacy analysis of inshopnito
Privacy Analysis of requirementsinShopnito


Privacy Analysis - Feedback requirements

Linkabilities

Collaborations

Attributes

&

Violations


inShopnito requirements modeled for two user types

Advertisers are not trusted

  • Trusts

  • Grocery Store

  • Loyalty Program Provider

  • inShopnito

No trust in organizations

Loyalty credential: Idemix what if X509 is used?


Linkabilities requirements in inShopnito


Detect violations in inshopnito
Detect Violations in requirementsinShopnito

Advertisers not allowed to have the customer’s his:

Name

Address

eMail address

Violations of rules 1, 2, 3 are found only in case a X509 certificate is used in case of the user model


Conclusions
Conclusions requirements


  • It is a formal approach to analyze privacy requirements power to prove properties

  • Approach is useful during service design

    • privacy by design is one of the principles in EU reform of data protection legislation.

    • analyzing linkabilities, collaborations, attributes in user profiles.

    • verify compliance with legislative and corporate level rules (detecting violations).

  • Approach is useful for education of people

    • EU reform of data protection  authorities get the task to educate people. E.g., model a user that participates to a survey about Facebook. Afterwards, perform a privacy analysis based on his assumptions and present him the difference between what he thinks and what can happen.


Questions
Questions requirements


ad