Analysing and Extending Privacy Patterns with Architectural Context

被引:3
作者
Chia, Su Yen [1 ,2 ]
Xu, Xiwei [1 ,2 ]
Paik, Hye-Young [2 ]
Zhu, Liming [1 ,2 ]
机构
[1] CSIRO, Data61, Canberra, ACT, Australia
[2] UNSW, Sch Comp Sci & Engn, Sydney, NSW, Australia
来源
36TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, SAC 2021 | 2021年
关键词
Privacy pattern; Architectural pattern; Design; DESIGN;
D O I
10.1145/3412841.3442014
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Privacy is now an increasingly important software quality. Software architects and developers should consider privacy from the early stages of system design to prevent privacy breaches. Both industry and academia have proposed privacy patterns as reusable design solutions to address common privacy problems. However, from the system development perspective, the existing privacy patterns do not provide architectural context to assist software design for privacy. More specifically, the current privacy patterns lack proper analysis with regards to privacy properties - the well-established software traits relating to privacy (e.g., unlinkability, identifiability). Furthermore, the impacts of privacy patterns on other quality attributes such as performance are yet to be investigated. Our paper aims to provide guidance to software architects and developers for considering privacy patterns, by adding new perspectives to the existing privacy patterns. First, we provide a new structural and interaction view of the patterns by relating privacy regulation contexts. Then, we analyse the patterns in architectural contexts and map available privacy-preserving techniques for implementing each privacy pattern. We also give an analysis of privacy patterns with regard to their impact on privacy properties, and the trade-off between privacy and other quality attributes.
引用
收藏
页码:1390 / 1398
页数:9
相关论文
共 34 条
[1]   Toward Applying Online Privacy Patterns Based on the Design Problem: A Systematic Review [J].
Aljohani, Maha ;
Blustein, James ;
Hawkey, Kirstie .
DESIGN, USER EXPERIENCE, AND USABILITY: THEORY AND PRACTICE, DUXU 2018, PT I, 2018, 10918 :608-627
[2]   Efficient metadata management in large distributed storage systems [J].
Brandt, SA ;
Miller, EL ;
Long, DDE ;
Xue, L .
20TH IEEE/11TH NASA GODDARD CONFERENCE ON MASS STORAGE AND TECHNOLOGIES (MSST 2003), PROCEEDINGS, 2003, :290-298
[3]  
Bruegger Bud P, 2016, Towards a decentralized identity management ecosystem for Europe and beyond
[4]  
Camenisch J, 2002, LECT NOTES COMPUT SC, V2442, P61
[5]   A Critical Analysis of Privacy Design Strategies [J].
Colesky, Michael ;
Hoepman, Jaap-Henk ;
Hillen, Christiaan .
2016 IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2016), 2016, :33-40
[6]  
Damiani Maria Luisa., 2013, European Data Protection: Coming of Age, chapter Privacy Enhancing Techniques for the Protection of Mobility Patterns in LBS: Research Issues and Trends, P223
[7]   Mixminion: Design of a type III anonymous remailer protocol [J].
Danezis, G ;
Dingledine, R ;
Mathewson, N .
2003 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2003, :2-15
[8]   A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements [J].
Deng, Mina ;
Wuyts, Kim ;
Scandariato, Riccardo ;
Preneel, Bart ;
Joosen, Wouter .
REQUIREMENTS ENGINEERING, 2011, 16 (01) :3-32
[9]  
Dingledine R, 2004, USENIX ASSOCIATION PROCEEDINGS OF THE 13TH USENIX SECURITY SYMPOSIUM, P303
[10]  
Fan Lu, 2012, eTELEMED, V2012, P99