skip to main content
10.1145/2133601.2133627acmconferencesArticle/Chapter ViewAbstractPublication PagescodaspyConference Proceedingsconference-collections
research-article

Privacy analysis using ontologies

Published: 07 February 2012 Publication History

Abstract

As information systems extensively exchange information between participants, privacy concerns may arise from potential misuse. Existing design approaches consider non-technical privacy requirements of different stakeholders during the design and the implementation of a system. However, a technical approach for privacy analysis is largely missing.
This paper introduces a formal approach for technically evaluating an information system with respect to its designed or implemented privacy protection. In particular, we introduce a system model that describes various system aspects such as its information flow. We define the semantics of this system model by using ontologies. Based on the system model together with a given privacy ontology, and given privacy requirements we analyze the modeled system to detect privacy leakages and to calculate privacy indicators. The proposed method provides a technical approach to check whether a system conforms to the privacy requirements of the stakeholders or not.

References

[1]
Carnegie mellon cylab - project nudging users towards privacy. http://www.cylab.cmu.edu/index.html.
[2]
DESWAP (Development Environment for Semantic Web APplications) project., 2007.
[3]
PRECIOSA (Privacy Enabled Capability in Co-operative Systems and Safety Applications) FP7 project., 2010.
[4]
A. Cavoukian (Information & Privacy Commissioner Ontario, Canada). Privacy-by-design. http://www.privacybydesign.ca/.
[5]
R. Agrawal, J. Kiernan, R. Srikant, and Y. Xu. Hippocratic databases. In 28th VLB Conference, Hong Kong, China, 2002.
[6]
A. Aijaz, B. Bochow, F. Dötzer, A. Festag, M. Gerlach, R. Kroh, and T. Leinmüller. Attacks on inter-vehicle communication systems - an analysis. In 3rd Int. Workshop on Intelligent Transportation (WIT 2006), March 2006.
[7]
Y. Asnar, P. Giorgini, and J. Mylopoulos. Goal-driven risk assessment in requirements engineering. Requirements Engineering, 2010.
[8]
E. M. Clarke and E. A. Emerson. Synthesis of synchronization skeletons for branching time temporal logic. In In Logic of Programs: Workshop. Springer-Verlag, 1981.
[9]
D.Gasevic, N.Kaviani, and M.Milanovic. Ontologies and software engineering. In S. Staab and R. Studer, editors, Handbook on Ontologies. Springer Publishing Company, 2009.
[10]
S. F. Gürses, C. Troncoso, and C. Diaz. Engineering privacy by design. In Computers, Privacy & Data Protection, 2011.
[11]
O. Hartig, M. Kost, and J.-C. Freytag. Automatic component selection with semantic technologies. Proc.s of the 4th Int. Workshop on Semantic Web Enabled Software Engineering (SWESE) at ISWC, 2008.
[12]
Q. He and A. I. Anton. A framework for modeling privacy requirements in role engineering. Proc.s of the 9th Int. Workshop on Requirements Engineering: Foundation for Software Quality (REFSQ'03), 2003.
[13]
M. Hecker and T. Dillon. Privacy support and evaluation on an ontological basis. In Proc. of the IEEE 23rd Internat. Conf. on Data Engineering Works., Washington, DC, USA, 2007. IEEE Computer Society.
[14]
ISO TC 204/SC/WG 1. Intelligent transport systems -- system architecture -- privacy aspects in its standards and systems. Technical report, ISO, 2008.
[15]
F. Kargl, F. Schaub, and S. Dietzel. Mandatory Enforcement of Privacy Policies using Trusted Computing Principles. In Intelligent Information Privacy Maangement Symposium, AAAI Spring Symposium Series, Stanford, 2010. AAAI.
[16]
E. Kavakli. Goal oriented requirements engineering: a unifying framework. Requirements Engineering Journal, Springer-Verlag London, 6, 2002.
[17]
M. Kost, B. Wiedersheim, S. Dietzel, F. Schaub, and T. Bachmor. PRECIOSA PeRA: Practical enforcement of privacy policies in intelligent transportation systems. In Proc. of the Demo. Session at the Fourth ACM Conf. on Wireless Network Security, 2011.
[18]
A. Kung, J.C.Freytag, and F.Kargl. Privacy-by-design in its applications. In 2nd Int. Workshop on Data Security and PrivAcy in wireless Networks, Lucca, 2011.
[19]
S. W. Lee and R. A. Gandhi. Ontology-based active requirements engineering framework. Asia-Pacific Software Engineering Conf., 0, 2005.
[20]
I. Linden Consulting. Privacy impact assessment. http://www.ico.gov.uk/for_organisations/data_protection/topic_guides/privacy_impact_assessment.aspx, 2007.
[21]
S. Mauw and M. Oostdijk. Foundations of attack trees. In D. Won and S. Kim, editors, ICISC, volume 3935 of Lecture Notes in Computer Science. Springer, 2005.
[22]
E. C. Michael Hecker, Tharam S. Dillon. Privacy ontology support for e-commerce. IEEE Internet Computing, 12, 2008.
[23]
E. Parliament and of the Council of 24 October 1995. Directive 95/46/ec of the european parliament and of the council of 24 october 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data, online (access july 31, 2009), 1995.
[24]
T. E. PARLIAMENT and T. C. O. T. E. UNION. Directive 2010/40/eu of the european parliament and of the council. Official Journal of the European Union, L 207/1, 2010.
[25]
M. Schumacher. Security engineering with patterns: Toward a security core ontology. Springer-Verlag, LNCS 2754, 2003.
[26]
S. Spiekermann and L. Cranor. Privacy engineering. IEEE Transactions on Software Engineering, 35(1), January/February 2009.
[27]
C. Troncoso, G. Danezis, E. Kosta, and B. Preneel. Pripayd: privacy friendly pay-as-you-drive insurance. In WPES '07: Proc.s of the 2007 ACM workshop on Privacy in electronic society, New York, NY, USA, 2007. ACM.
[28]
M. Tschantz and J. Wing. Formal methods for privacy. In A. Cavalcanti and D. Dams, editors, FM 2009: Formal Methods, volume 5850 of Lecture Notes in Computer Science. Springer Berlin / Heidelberg, 2009.

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
CODASPY '12: Proceedings of the second ACM conference on Data and Application Security and Privacy
February 2012
338 pages
ISBN:9781450310918
DOI:10.1145/2133601
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 07 February 2012

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. analysis
  2. ontologies
  3. privacy
  4. requirements
  5. system model

Qualifiers

  • Research-article

Conference

CODASPY'12
Sponsor:

Acceptance Rates

CODASPY '12 Paper Acceptance Rate 21 of 113 submissions, 19%;
Overall Acceptance Rate 149 of 789 submissions, 19%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)18
  • Downloads (Last 6 weeks)0
Reflects downloads up to 13 Jan 2025

Other Metrics

Citations

Cited By

View all

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media