Defining, Enforcing and Checking Privacy Policies In Data-Intensive Applications

被引:14
作者
Guerriero, Michele [1 ]
Tamburri, Damian Andrew [2 ]
Di Nitto, Elisabetta [1 ]
机构
[1] Politecn Milan, Milan, Italy
[2] TU E JADS, Eindhoven, Netherlands
来源
2018 IEEE/ACM 13TH INTERNATIONAL SYMPOSIUM ON SOFTWARE ENGINEERING FOR ADAPTIVE AND SELF-MANAGING SYSTEMS (SEAMS) | 2018年
关键词
Data Privacy; Dataflow Applications; Big Data; Context-Aware Privacy;
D O I
10.1145/3194133.3194140
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The rise of Big Data is leading to an increasing demand for large-scale data-intensive applications (DIAs), which have to analyse massive amounts of personal data (e.g. customers' location, cars' speed, people heartbeat, etc.), some of which can be sensitive, meaning that its confidentiality has to be protected. In this context, DIA providers are responsible for enforcing privacy policies that account for the privacy preferences of data subjects as well as for general privacy regulations. This is the case, for instance, of data brokers, i.e. companies that continuously collect and analyse data in order to provide useful analytics to their clients. Unfortunately, the enforcement of privacy policies in modern DIAs tends to become cumbersome because (i) the number of policies can easily explode, depending on the number of data subjects, (ii) policy enforcement has to autonomously adapt to the application context, thus, requiring some non-trivial runtime reasoning, and (iii) designing and developing modern DIAs is complex per se. For the above reasons, we need specific design and runtime methods enabling so called privacy-by-design in a Big Data context. In this article we propose an approach for specifying, enforcing and checking privacy policies on DIAs designed according to the Google Dataflow model and we show that the enforcement approach behaves correctly in the considered cases and introduces a performance overhead that is acceptable given the requirements of a typical DIA.
引用
收藏
页码:172 / 182
页数:11
相关论文
共 23 条
  • [1] Akidau T., 2015, P VLDB ENDOWMENT
  • [2] [Anonymous], 2015, The Bulletin of the Technical Committee on Data Engineering
  • [3] [Anonymous], 2015, NSDI
  • [4] Privacy and contextual integrity: Framework and applications
    Barth, Adam
    Datta, Anupam
    Mitchell, John C.
    Nissenbaum, Helen
    [J]. 2006 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2006, : 184 - +
  • [5] Basin D., 2011, Proceedings of the 2011 Eighteenth International Symposium on Temporal Representation and Reasoning (TIME 2011), P88, DOI 10.1109/TIME.2011.14
  • [6] Monitoring Metric First-Order Temporal Properties
    Basin, David
    Klaedtke, Felix
    Mueller, Samuel
    Zalinescu, Eugen
    [J]. JOURNAL OF THE ACM, 2015, 62 (02)
  • [7] Bertino E., COMPSAC 2016 P
  • [8] A Framework to Enforce Access Control over Data Streams
    Carminati, Barbara
    Dicom, Elena Ferrari
    Cao, Jianneng
    Tan, Kian Lee
    [J]. ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2010, 13 (03)
  • [9] Data-intensive applications, challenges, techniques and technologies: A survey on Big Data
    Chen, C. L. Philip
    Zhang, Chun-Yang
    [J]. INFORMATION SCIENCES, 2014, 275 : 314 - 347
  • [10] Big Data: A Survey
    Chen, Min
    Mao, Shiwen
    Liu, Yunhao
    [J]. MOBILE NETWORKS & APPLICATIONS, 2014, 19 (02) : 171 - 209