Privacy Impact Tree Analysis (PITA): A Tree-Based Privacy Threat Modeling Approach

被引:0
作者
Van Landuyt, Dimitri [1 ]
机构
[1] Fac Business & Econ FEB, LIRIS, B-3000 Leuven, Belgium
关键词
Privacy; Threat modeling; Data privacy; Safety; Prevention and mitigation; Systematics; Pragmatics; Fault trees; Artificial intelligence; Taxonomy; Attack trees; privacy by design; privacy impact; privacy footprint; privacy threat modeling; privacy engineering budget; OF-THE-ART; REQUIREMENTS; SOFTWARE;
D O I
10.1109/TSE.2025.3573380
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Threat modeling involves the early identification, prioritization and mitigation of relevant threats and risks, during the design and conceptualization stages of the software development life-cycle. Tree-based analysis is a structured risk analysis technique that starts from the articulation of possible negative outcomes and then systematically refines these into sub-goals, events or intermediate steps that contribute to this outcome becoming reality. While tree-based analysis techniques are widely adopted in the area of safety (fault tree analysis) or in cybersecurity (attack trees), this type of risk analysis approach is lacking in the area of privacy. To alleviate this, we present privacy impact tree analysis (PITA), a novel tree-based approach for privacy threat modeling. Instead of starting from safety hazards or attacker goals, PITA starts from listing the potential privacy impacts of the system under design, i.e., specific scenarios in which the system creates or contributes to specific privacy harms. To accommodate this, PITA provides a taxonomy, distinguishing between privacy impact types that pertain (i) data subject identity, (ii) data subject treatment, (iii) data subject control and (iv) treatment of personal data. In addition, a pragmatic methodology is presented that leverages both the hierarchical nature of the tree structures and the early ranking of impacts to focus the privacy engineering efforts. Finally, building upon the privacy impact notion as captured in the privacy impact trees, we provide a refinement of the foundational concept of the overall or aggregated 'privacy footprint' of a system. The approach is demonstrated and validated in three complex and contemporary real-world applications, through which we highlight the added value of this tree-based privacy threat analysis approach that refocuses on privacy harms and impacts.
引用
收藏
页码:2102 / 2124
页数:23
相关论文
共 119 条
[1]   Supporting Privacy Impact Assessment by Model-Based Privacy Analysis [J].
Ahmadian, Amir Shayan ;
Strueber, Daniel ;
Riediger, Volker ;
Juerjens, Jan .
33RD ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, 2018, :1467-1474
[2]  
AL-Badareen AB, 2011, COMM COM INF SC, V179, P46
[3]  
Al-Hadhrami N., 2020, P INT C RISKS SEC IN, P201
[4]  
[Anonymous], 2017, Guidelines on Data Protection Impact Assessment (DPIA) (wp248rev.01)
[5]   The use of goals to surface requirements for evolving systems [J].
Anton, AI ;
Potts, C .
PROCEEDINGS OF THE 1998 INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, 1998, :157-166
[6]  
Argyropoulos N, 2017, PROCEEDINGS OF THE 50TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, P4827
[7]   Pareto efficient solutions of attack-defence trees [J].
Aslanyan, Zaruhi ;
Nielson, Flemming .
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2015, 9036 :95-114
[8]  
Aslanyan Z, 2016, P IEEE CSFW, P105, DOI 10.1109/CSF.2016.15
[9]   Is My Attack Tree Correct? [J].
Audinot, Maxime ;
Pinchinat, Sophie ;
Kordy, Barbara .
COMPUTER SECURITY - ESORICS 2017, PT I, 2018, 10492 :83-102
[10]  
Bass L., 2012, SEI S SOFTW, V3