Download presentation
Presentation is loading. Please wait.
1
Enterprise Privacy Promises and Enforcement Adam Barth John C. Mitchell
2
Formal Languages for Privacy One approach to protecting privacy is to articulate and enforce restrictions on data practices One approach to protecting privacy is to articulate and enforce restrictions on data practices Several formal languages for privacy Several formal languages for privacy W3C’s Platform for Privacy Preferences (P3P) IBM’s Enterprise Privacy Authorization Language (EPAL) Lack a connection between announced P3P policies and operative EPAL policies Lack a connection between announced P3P policies and operative EPAL policies We make this connection through a unified, data- centric model for privacy policies We make this connection through a unified, data- centric model for privacy policies
3
Usage Scenario Service ProviderConsumer DPAL Policy P3P Policy Compact P3P Generates Enforces APPEL Preference User Agent or Accept
4
Overview Motivate and describe our model Motivate and describe our model Perspectives on privacy Data hierarchies and levels of detail Policies as sets of promises Enforcement Apply our model to existing languages Apply our model to existing languages Anomalies in APPEL and XPref Semantics for P3P compact policies Connecting privacy promises and enforcement Policy summarization using projection
5
Perspectives on Privacy Two types of principals in privacy Two types of principals in privacy Service providers Consumers Service providers impose a lower bound Service providers impose a lower bound Consumers impose an upper bound Consumers impose an upper bound A privacy policy satisfying both these bounds is acceptable to both parties A privacy policy satisfying both these bounds is acceptable to both parties
6
Example: Privacy Perspectives Service provider lower bound: Service provider lower bound: “I want to use a consumer’s home address in delivering my product.” Consumer upper bound: Consumer upper bound: “I don’t want my home telephone number to be used for telemarketing.”
7
Data Hierarchies for Privacy Privacy policies summarize data practices Privacy policies summarize data practices Different policies (and different languages) summarize practices at different levels of detail Different policies (and different languages) summarize practices at different levels of detail Levels of detail represented in a data hierarchy Levels of detail represented in a data hierarchy T-cell CountBlood Cholesterol Level Blood Test Results
8
Policies as Sets of Promises View a privacy policy as a set of promises a service provider makes to a consumer View a privacy policy as a set of promises a service provider makes to a consumer “I will not disclose your blood cholesterol level.” Can the service provider disclose blood test results? Can the service provider disclose blood test results? Not all blood test results But some (T-cell count) Service provider uses a lower bound, answers No Service provider uses a lower bound, answers No Consumer uses an upper bound, answers Yes Consumer uses an upper bound, answers Yes
9
Modal Reasoning about Policies Formalize reasoning using modal logic Formalize reasoning using modal logic Modalities ( and ◊) over data hierarchy Modalities ( and ◊) over data hierarchy Blood test results ||- Disclose Blood test results ||- Disclose Service provider may disclose all components of blood test results Blood test results ||- ◊ Disclose Blood test results ||- ◊ Disclose Service provider may disclose some components of blood test results
10
Enforcing Privacy Promises Motivation: If an EPAL policy enforces a P3P policy and a consumer accepts the P3P policy, then the consumer accepts the EPAL policy Motivation: If an EPAL policy enforces a P3P policy and a consumer accepts the P3P policy, then the consumer accepts the EPAL policy Formally defined in our model using modal logic Formally defined in our model using modal logic Consumers use a class of modal formulae in reasoning about a policy Ensure that reasoning carries over from enforced to enforcing policy Generalizes previous privacy policy relations Generalizes previous privacy policy relations
11
Overview Motivate and describe our model Motivate and describe our model Perspectives on privacy Data hierarchies and levels of detail Policies as sets of promises Enforcement Apply our model to existing languages Apply our model to existing languages Anomalies in APPEL and XPref Semantics for P3P compact policies Connecting privacy promises and enforcement Policy summarization using projection
12
Privacy Preferences Several languages exist for expressing consumer privacy preferences about P3P Several languages exist for expressing consumer privacy preferences about P3P A P3P user agent compares received policy with user’s preferences and may block web site A P3P user agent compares received policy with user’s preferences and may block web site APPEL proposed by the W3C APPEL proposed by the W3C XPref was proposed in response XPref was proposed in response Based on XPath Both APPEL and XPref can express anomalous preferences Both APPEL and XPref can express anomalous preferences “Block web sites that do not telemarket.”
13
P3P Compact Policies Compact policies are terse policy summaries Compact policies are terse policy summaries Included in HTTP headers with cookies Included in HTTP headers with cookies Interpreted by Internet Explorer We give compact policies clear semantics We give compact policies clear semantics Represent the value of certain ◊ terms Answer common consumer queries
14
Example: Compact Semantics P3P policy states: P3P policy states: “Service provider may use your purchase history for telemarketing.” Represented in compact policy as: Represented in compact policy as: TEL Semantics of TEL term: Semantics of TEL term: Personal information ||- ◊ Telemarketing
15
Enforcing Privacy Promises Detailed policy descriptions used for enforcement Detailed policy descriptions used for enforcement EPAL proposed as one such enforcement language EPAL proposed as one such enforcement language EPAL geared towards answering service provider queries (evaluating terms) EPAL geared towards answering service provider queries (evaluating terms) -invariance: d ||- a d ||- a -invariance equivalent to safety -invariance equivalent to safety A policy is safe iff less detailed questions do not lead to more rights EPAL not actually safe (but that’s another topic) EPAL not actually safe (but that’s another topic)
16
Transitivity of Enforcement EPAL Policy P3P Policy Compact Policy Enforces
17
Projection Algorithm Motivation: Leverage effort spent writing detailed enforcement policy to generate P3P policy Motivation: Leverage effort spent writing detailed enforcement policy to generate P3P policy Criteria for generated policy summary Criteria for generated policy summary Enforced by detailed policy Is the least permissive such policy (at a given level of detail) We provide an algorithm for generating such policy summaries We provide an algorithm for generating such policy summaries
18
Projection Algorithm (con’t)
19
Conclusion Proposed a uniform model for privacy Proposed a uniform model for privacy Discovered anomalies in APPEL and XPath Discovered anomalies in APPEL and XPath Defined clear semantics for P3P compact policies Defined clear semantics for P3P compact policies Connected privacy promises with privacy enforcement Connected privacy promises with privacy enforcement Provided an algorithm for summarizing detailed policies (e.g. translating EPAL into P3P) Provided an algorithm for summarizing detailed policies (e.g. translating EPAL into P3P) In privacy, it is important to consider the differing perspectives of the principals involved In privacy, it is important to consider the differing perspectives of the principals involved
20
Questions?
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.