MBIPV: a model-based approach for identifying privacy violations from software requirements

被引:3
作者
Ye, Tong [1 ]
Zhuang, Yi [1 ]
Qiao, Gongzhe [1 ]
机构
[1] Nanjing Univ Aeronaut & Astronaut, Coll Comp Sci & Technol, 29 Jiangjun Ave, Nanjing 211100, Jiangsu, Peoples R China
基金
中国国家自然科学基金;
关键词
UML; Software requirement modeling; Privacy violation; Formal modeling; Formal verification; SECURITY; INFORMATION; HEALTH;
D O I
10.1007/s10270-022-01072-3
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Nowadays, large-scale software systems in many domains, such as smart cities, involve multiple parties whose privacy policies may conflict with each other, and thus, data privacy violations may arise even without users being aware of it. In this context, identifying data security requirements and detecting potential privacy violations are crucial. In the area of model-based security requirements analysis, numerous research efforts have been done. However, few existing studies support automatic privacy violation identification from software requirements. To fill this gap, this paper presents MBIPV, a Model-Based approach for Identifying Privacy Violations from software requirements. First, this paper identifies six types of privacy violations in software requirements. Second, the MBIPV profile is proposed to support modeling software requirements using UML. Third, the MBIPV prototype tool is developed to generate formal models and corresponding privacy properties automatically. Then, the privacy properties are automatically verified by model checking. We evaluated the MBIPV method through case studies of four representative software systems from different domains: smart health, smart transportation, smart home, and e-commerce. The results show that MBIPV has high accuracy and efficiency in identifying the privacy violations from the software requirements. To the best of our knowledge, MBIPV is the first model-based approach that supports the automatic verification of privacy properties of UML software requirement models. The source code of the MBIPV tool and the experimental data are available online at https://github.com/YETONG1219/MBIPV.
引用
收藏
页码:1251 / 1280
页数:30
相关论文
共 57 条
[1]   Scalable Analysis of Interaction Threats in IoT Systems [J].
Alhanahnah, Mohannad ;
Stevens, Clay ;
Bagheri, Hamid .
PROCEEDINGS OF THE 29TH ACM SIGSOFT INTERNATIONAL SYMPOSIUM ON SOFTWARE TESTING AND ANALYSIS, ISSTA 2020, 2020, :272-285
[2]   Parental Controls: Safer Internet Solutions or New Pitfalls? [J].
Ali, Suzan ;
Elgharabawy, Mounir ;
Duchaussoy, Quentin ;
Mannan, Mohammad ;
Youssef, Amr .
IEEE SECURITY & PRIVACY, 2021, 19 (06) :36-46
[3]  
[Anonymous], 2022, 38022022 IEEE, P1, DOI [10.1109/IEEESTD.2022.9745865, DOI 10.1109/IEEESTD.2022.9745865]
[4]  
[Anonymous], Eclipse - papyrus
[5]  
[Anonymous], 2000, Experimentation in Software Engineering-An Introduction
[6]  
[Anonymous], 1999, The Unified Modeling Language Reference Manual
[7]  
Basin D., 2003, Proceedings 8th ACM Symposium on Access Control Models and Technologies (SACMAT '03), P100
[8]   Security modelling and formal verification of survivability properties: Application to cyber-physical systems [J].
Bernardi, S. ;
Gentile, U. ;
Marrone, S. ;
Merseguer, J. ;
Nardone, R. .
JOURNAL OF SYSTEMS AND SOFTWARE, 2021, 171
[9]  
Celik ZB, 2018, PROCEEDINGS OF THE 2018 USENIX ANNUAL TECHNICAL CONFERENCE, P147
[10]   A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements [J].
Deng, Mina ;
Wuyts, Kim ;
Scandariato, Riccardo ;
Preneel, Bart ;
Joosen, Wouter .
REQUIREMENTS ENGINEERING, 2011, 16 (01) :3-32