Design and Development of Policy Enforcement for the Privacy by Design Framework

被引:0
作者
Lescisin, Michael [1 ]
Mahmoud, Qusay H. [1 ]
机构
[1] Ontario Tech Univ, Dept Elect Comp & Software Engn, Oshawa, ON L1G 0C5, Canada
来源
2023 20TH ACS/IEEE INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS, AICCSA | 2023年
关键词
privacy by design; code tracing; data tracing; privacy; programming languages; security;
D O I
10.1109/AICCSA59173.2023.10479230
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Privacy by Design (PbD) is a set of guiding principles for providing stronger guarantees of privacy protection in systems that handle sensitive information. In this paper, we present the design and development of PbD constructs with a proof of concept prototype in Python, where data variables are tagged with information describing their privacy requirements while common methods are augmented with privacy requirement checking code. With these additions, we demonstrate how the task of writing Privacy by Design compliant code is greatly simplified.
引用
收藏
页数:6
相关论文
共 12 条
  • [1] Austin ThomasH., 2013, P 2013 ACM SIGPLAN W, P15, DOI DOI 10.1145/2465106.2465121
  • [2] Chacon S., 2014, Pro git, DOI 10.1007/978-1-4842-0076-6
  • [3] De Win B., Advances in Network and Distributed Systems Security, V78, DOI [10.1007/0-306-46958-89, DOI 10.1007/0-306-46958-89]
  • [4] Leaking privacy and shadow profiles in online social networks
    Garcia, David
    [J]. SCIENCE ADVANCES, 2017, 3 (08):
  • [5] Formalizing Data Deletion in the Context of the Right to Be Forgotten
    Garg, Sanjam
    Goldwasser, Shafi
    Vasudevan, Prashant Nalini
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2020, PT II, 2020, 12106 : 373 - 402
  • [6] Gupta I, 2022, Arxiv, DOI arXiv:2202.11965
  • [7] TAG: Tagged Architecture Guide
    Jero, Samuel
    Burow, Nathan
    Ward, Bryan
    Skowyra, Richard
    Khazan, Roger
    Shrobe, Howard
    Okhravi, Hamed
    [J]. ACM COMPUTING SURVEYS, 2023, 55 (06)
  • [8] Kiczales G., P 15 EUR C OBJ OR PR
  • [9] MRaihi D., 2011, Internet Request for Comments
  • [10] Multi-Factor Authentication: A Survey
    Ometov, Aleksandr
    Bezzateev, Sergey
    Makitalo, Niko
    Andreev, Sergey
    Mikkonen, Tommi
    Koucheryavy, Yevgeni
    [J]. CRYPTOGRAPHY, 2018, 2 (01) : 1 - 31