1 / 30

Annual Workshop February 5th, 2014

Annual Workshop February 5th, 2014. A Formal Approach to Analyze Privacy in Electronic Services. MSEC Koen Decroix. Outline. Introducing Privacy in Loyalty Services Conceptual model of inShopnito Framework for Formal Reasoning on Privacy Privacy Analysis of inShopnito Conclusions.

Télécharger la présentation

Annual Workshop February 5th, 2014

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Annual Workshop February 5th, 2014

  2. A Formal Approach to Analyze Privacy in Electronic Services MSEC Koen Decroix [Koen Decroix – MSEC - KU Leuven]

  3. Outline • Introducing Privacy in Loyalty Services • Conceptual model of inShopnito • Framework for Formal Reasoning on Privacy • Privacy Analysis of inShopnito • Conclusions

  4. Introducing Privacy in Loyalty Systems

  5. Ever wondered what companies know about you?

  6. … Max Schrems, an Austrian student, did! Now he sues Facebook for their data practices on the personal data they collected about him.

  7. Once, there were small local family-run stores binding customers with …

  8. … with the years, they were replaced by big chains also binding customers …

  9. For the convenience of their customers, loyalty services evolved to electronic services integrated with other online (third-party) services. Is this the full story? Share your shopping activities with friends on Facebook Authenticate

  10. Not transparent to users When registering to such services, you agreed with their terms and policies and gave them your consentfor collecting, processing, and forwarding your personal data.

  11. Your past online activities leave non-erasable, possibly harmful, traces behind and might get spread around.

  12. Citizens must be protected for these data practices. This is where the European data protection legislation comes into play.

  13. … designers have to consider multiple types of requirements Complex

  14. Need for formal modeling, as a support during design of composite services.

  15. Privacy analysis is based on user profiles built from the formal models. Its feedback must be useful for system designers and users as well.

  16. Conceptual Model of inShopnito

  17. Collecting loyalty points at first glance.

  18. … but looking into more detail … From specifications of service providers’ data practices (= service policies), we can derive that …

  19. Conceptual model of inShopnito

  20. Framework for Formal Reasoning on Privacy

  21. System Independent Model Vocabulary (Concepts) Theory Behavior Inference Rules User Model System Model Trust Perception Organizations Services Logic Component Conclusions Initial State Service Policies Input Model Credentials Profiles Storage Access Control Identifiability Model Distribution Output Pseudonyms Identities

  22. Privacy Analysis of inShopnito

  23. Privacy Analysis - Feedback Linkabilities Collaborations Attributes & Violations

  24. inShopnito modeled for two user types Advertisers are not trusted • Trusts • Grocery Store • Loyalty Program Provider • inShopnito No trust in organizations Loyalty credential: Idemix what if X509 is used?

  25. Linkabilities in inShopnito

  26. Detect Violations in inShopnito Advertisers not allowed to have the customer’s his: Name Address eMail address Violations of rules 1, 2, 3 are found only in case a X509 certificate is used in case of the user model

  27. Conclusions

  28. It is a formal approach to analyze privacy  power to prove properties • Approach is useful during service design • privacy by design is one of the principles in EU reform of data protection legislation. • analyzing linkabilities, collaborations, attributes in user profiles. • verify compliance with legislative and corporate level rules (detecting violations). • Approach is useful for education of people • EU reform of data protection  authorities get the task to educate people. E.g., model a user that participates to a survey about Facebook. Afterwards, perform a privacy analysis based on his assumptions and present him the difference between what he thinks and what can happen.

  29. Questions

More Related