设计保护隐私的电子服务

George Yee
{"title":"设计保护隐私的电子服务","authors":"George Yee","doi":"10.4018/JSSE.2010040102","DOIUrl":null,"url":null,"abstract":"The growth of electronic services (e-services) has resulted in large amounts of personal information in the hands of service organizations like banks, insurance companies, and online retailers. This has led to the realization that such information must be protected, not only to comply with privacy regulations but also and more importantly, to attract clients. One important dimension of this goal is to design e-services that protect privacy. In this paper, the author proposes a design approach that incorporates privacy risk analysis of UML diagrams to minimize privacy risks in the final design. The approach iterates between the risk analysis and design modifications to eliminate the risks until a design is obtained that is close to being risk free. problem and then bringing the tools of access control to bear for privacy control (Adams & Barbieri, 2006), treating privacy protection as a privacy rights management problem using the techniques of digital rights management (Kenny & Korba, 2002), and considering privacy protection as a privacy policy compliance problem, verifying compliance with secure logs (Yee & Korba, 2004). However, most e-services today do not use the above approaches, preferring to rely instead on stating a privacy policy and then trying to follow that policy manually, without any of the above techniques or tools or any automated checks in place. As a result, the public is often the victim, as privacy leaks (e.g., credit card files stolen) are discovered and reported in the media. Thus, today’s e-services do a poor job of protecting consumer privacy and new effective approaches for such protection are always needed. This is the motivation for this work. DOI: 10.4018/jsse.2010040102 International Journal of Secure Software Engineering, 1(2), 18-34, April-June 2010 19 Copyright © 2010, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited. The area of e-services has been chosen for this work because it probably holds the highest risk for the loss of privacy today, in terms of the amount of private information held and the growth of that information. Consider the following. E-services probably require the most consumer private information in order to function than any other type of application. This can be seen once one realizes that if an application requires consumer private information, it can probably be categorized as an e-service. E-services include e-health services where privacy is critical. E-services are growing very rapidly, along with the Internet. The various approaches for protecting privacy described above all presume to know where and what protection is needed. They presume that some sort of analysis has been done that answers the question of “where” and “what” with respect to privacy risks. Without such answers, the effectiveness of the protection comes into question. For example, protection against house break-ins is totally ineffective if the owner only secures the front door without securing other vulnerable spots such as windows (the “where”). Of course, how the owner secures these spots is critical too (“what” protection). A more effective break-in risk analysis would have identified the windows as being vulnerable to break-ins as well, resulting in better protection against break-ins if the owner additionally secures the windows. In the same way, privacy risk analysis of service systems, considering “where” and “what”, is essential to effective privacy protection. The objective of this paper is to propose an e-services design approach that incorporates privacy risk analysis to obtain designs that are more likely to preserve privacy than designs that did not use privacy risk analysis. The final design is obtained as the culmination of a series of alternative designs where each alternative design is obtained by re-design to avoid or lessen privacy risks identified through a privacy risk analysis on the last design. Each design is comprised of UML diagrams and the privacy risk analysis is done on a Personal Information Map (PIM, explained below) that is derived from UML diagrams. UML has been chosen for its widespread use among software developers. Basing this approach on UML will make it easier to adopt this approach in practice. Note that the approach does not guarantee that the system implemented from the final design is totally free of privacy risks. Such risks can arise due to implementation errors or the final design itself was not totally risk free (a totally risk free design may not have been feasible due to other constraints, e.g., tight financial budget). This design approach is based on the principal that it is more effective to design privacy protection into a software system from the beginning, rather than to add it later after the system has been implemented. This is the same principal that it is more effective to design in security from the beginning rather than adding it after implementation, as described in McGraw (2002). This paper is organized into the following sections: “Privacy and E-Services” defines privacy, privacy policies, privacy risks, and what they mean for e-services. “Approach for Designing E-Services that Protect Privacy” presents the proposed design approach. “Related Work”, “Evaluation of Approach” and “Conclusions and Future Research” are as suggested by their names. PrIvaCy aND E-SErvICES As defined by Goldberg et al. (1997), privacy refers to the ability of individuals to control the collection, retention, and distribution of information about themselves. This leads to the following definitions for this work. DEFINITION 1: Privacy refers to the ability of individuals to control the collection, use, retention, and distribution of information about themselves. DEFINITION 2: A user’s privacy policy is a statement that expresses the user’s desired control over an e-service’s collection, use, retention, and distribution of information about the user. 15 more pages are available in the full version of this document, which may be purchased using the \"Add to Cart\" button on the publisher's webpage: www.igi-global.com/article/towards-designing-servicesprotect-privacy/43924","PeriodicalId":89158,"journal":{"name":"International journal of secure software engineering","volume":"196 1","pages":"18-34"},"PeriodicalIF":0.0000,"publicationDate":"2010-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":"{\"title\":\"Towards Designing E-Services that Protect Privacy\",\"authors\":\"George Yee\",\"doi\":\"10.4018/JSSE.2010040102\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The growth of electronic services (e-services) has resulted in large amounts of personal information in the hands of service organizations like banks, insurance companies, and online retailers. This has led to the realization that such information must be protected, not only to comply with privacy regulations but also and more importantly, to attract clients. One important dimension of this goal is to design e-services that protect privacy. In this paper, the author proposes a design approach that incorporates privacy risk analysis of UML diagrams to minimize privacy risks in the final design. The approach iterates between the risk analysis and design modifications to eliminate the risks until a design is obtained that is close to being risk free. problem and then bringing the tools of access control to bear for privacy control (Adams & Barbieri, 2006), treating privacy protection as a privacy rights management problem using the techniques of digital rights management (Kenny & Korba, 2002), and considering privacy protection as a privacy policy compliance problem, verifying compliance with secure logs (Yee & Korba, 2004). However, most e-services today do not use the above approaches, preferring to rely instead on stating a privacy policy and then trying to follow that policy manually, without any of the above techniques or tools or any automated checks in place. As a result, the public is often the victim, as privacy leaks (e.g., credit card files stolen) are discovered and reported in the media. Thus, today’s e-services do a poor job of protecting consumer privacy and new effective approaches for such protection are always needed. This is the motivation for this work. DOI: 10.4018/jsse.2010040102 International Journal of Secure Software Engineering, 1(2), 18-34, April-June 2010 19 Copyright © 2010, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited. The area of e-services has been chosen for this work because it probably holds the highest risk for the loss of privacy today, in terms of the amount of private information held and the growth of that information. Consider the following. E-services probably require the most consumer private information in order to function than any other type of application. This can be seen once one realizes that if an application requires consumer private information, it can probably be categorized as an e-service. E-services include e-health services where privacy is critical. E-services are growing very rapidly, along with the Internet. The various approaches for protecting privacy described above all presume to know where and what protection is needed. They presume that some sort of analysis has been done that answers the question of “where” and “what” with respect to privacy risks. Without such answers, the effectiveness of the protection comes into question. For example, protection against house break-ins is totally ineffective if the owner only secures the front door without securing other vulnerable spots such as windows (the “where”). Of course, how the owner secures these spots is critical too (“what” protection). A more effective break-in risk analysis would have identified the windows as being vulnerable to break-ins as well, resulting in better protection against break-ins if the owner additionally secures the windows. In the same way, privacy risk analysis of service systems, considering “where” and “what”, is essential to effective privacy protection. The objective of this paper is to propose an e-services design approach that incorporates privacy risk analysis to obtain designs that are more likely to preserve privacy than designs that did not use privacy risk analysis. The final design is obtained as the culmination of a series of alternative designs where each alternative design is obtained by re-design to avoid or lessen privacy risks identified through a privacy risk analysis on the last design. Each design is comprised of UML diagrams and the privacy risk analysis is done on a Personal Information Map (PIM, explained below) that is derived from UML diagrams. UML has been chosen for its widespread use among software developers. Basing this approach on UML will make it easier to adopt this approach in practice. Note that the approach does not guarantee that the system implemented from the final design is totally free of privacy risks. Such risks can arise due to implementation errors or the final design itself was not totally risk free (a totally risk free design may not have been feasible due to other constraints, e.g., tight financial budget). This design approach is based on the principal that it is more effective to design privacy protection into a software system from the beginning, rather than to add it later after the system has been implemented. This is the same principal that it is more effective to design in security from the beginning rather than adding it after implementation, as described in McGraw (2002). This paper is organized into the following sections: “Privacy and E-Services” defines privacy, privacy policies, privacy risks, and what they mean for e-services. “Approach for Designing E-Services that Protect Privacy” presents the proposed design approach. “Related Work”, “Evaluation of Approach” and “Conclusions and Future Research” are as suggested by their names. PrIvaCy aND E-SErvICES As defined by Goldberg et al. (1997), privacy refers to the ability of individuals to control the collection, retention, and distribution of information about themselves. This leads to the following definitions for this work. DEFINITION 1: Privacy refers to the ability of individuals to control the collection, use, retention, and distribution of information about themselves. DEFINITION 2: A user’s privacy policy is a statement that expresses the user’s desired control over an e-service’s collection, use, retention, and distribution of information about the user. 15 more pages are available in the full version of this document, which may be purchased using the \\\"Add to Cart\\\" button on the publisher's webpage: www.igi-global.com/article/towards-designing-servicesprotect-privacy/43924\",\"PeriodicalId\":89158,\"journal\":{\"name\":\"International journal of secure software engineering\",\"volume\":\"196 1\",\"pages\":\"18-34\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2010-04-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"7\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International journal of secure software engineering\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.4018/JSSE.2010040102\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International journal of secure software engineering","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.4018/JSSE.2010040102","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 7

摘要

电子服务(e-services)的发展导致银行、保险公司和在线零售商等服务机构掌握了大量的个人信息。这让人们意识到,这些信息必须受到保护,不仅是为了遵守隐私法规,更重要的是为了吸引客户。这一目标的一个重要方面是设计保护隐私的电子服务。在本文中,作者提出了一种结合UML图的隐私风险分析的设计方法,以最大限度地减少最终设计中的隐私风险。该方法在风险分析和设计修改之间迭代,以消除风险,直到获得接近无风险的设计。问题,然后引入访问控制工具来承担隐私控制(Adams & Barbieri, 2006),使用数字版权管理技术将隐私保护视为隐私权管理问题(Kenny & Korba, 2002),并将隐私保护视为隐私政策合规问题,验证安全日志的合规性(Yee & Korba, 2004)。然而,今天的大多数电子服务并不使用上述方法,而是倾向于依赖于声明隐私策略,然后尝试手动遵循该策略,而不使用上述任何技术或工具或任何自动检查。因此,公众往往是受害者,因为隐私泄露(例如,信用卡文件被盗)被发现并在媒体上报道。因此,今天的电子服务在保护消费者隐私方面做得很差,总是需要新的有效的保护方法。这就是这项工作的动机。DOI: 10.4018 / jsse.2010040102国际安全软件工程学报,1(2),18- 34,2010年4月19版权所有©2010,IGI Global。未经IGI Global书面许可,禁止以印刷或电子形式复制或分发。之所以选择电子服务领域进行这项工作,是因为就所持有的私人信息的数量和这些信息的增长而言,它可能是当今隐私丧失风险最高的领域。考虑以下问题。与任何其他类型的应用程序相比,电子服务可能需要最多的消费者私有信息才能运行。一旦意识到如果应用程序需要消费者私有信息,就可以将其归类为电子服务。电子服务包括隐私至关重要的电子保健服务。随着互联网的发展,电子服务正在迅速发展。上面描述的各种保护隐私的方法都假定知道需要保护的位置和内容。他们假定已经进行了某种分析,回答了关于隐私风险的“在哪里”和“什么”问题。没有这样的答案,保护的有效性就成问题了。例如,如果业主只锁住前门,而没有锁住其他易受攻击的地方,如窗户(“哪里”),防止入室盗窃的保护是完全无效的。当然,所有者如何保护这些地点也很关键(“什么”保护)。一个更有效的闯入风险分析应该识别出易被闯入的窗户,如果业主额外保护窗户,就能更好地防止闯入。同样,对服务系统进行隐私风险分析,考虑“在哪里”和“是什么”,对有效的隐私保护至关重要。本文的目的是提出一种结合隐私风险分析的电子服务设计方法,以获得比未使用隐私风险分析的设计更有可能保护隐私的设计。最终的设计是一系列备选设计的高潮,每个备选设计都是通过重新设计获得的,以避免或减少通过对最后一个设计的隐私风险分析确定的隐私风险。每个设计都由UML图组成,隐私风险分析是在源自UML图的个人信息图(PIM)上完成的。选择UML是因为它在软件开发人员中的广泛使用。将此方法建立在UML上将使在实践中采用此方法变得更容易。请注意,该方法不能保证从最终设计开始实现的系统完全没有隐私风险。这种风险可能是由于执行错误或最终设计本身并非完全无风险(完全无风险的设计可能由于其他限制因素而不可行,例如紧张的财务预算)。这种设计方法是基于这样一个原则,即从一开始就将隐私保护设计到软件系统中,而不是在系统实现之后再添加隐私保护,这样会更有效。 正如McGraw(2002)所描述的那样,从一开始就设计安全性比在实现后添加安全性更有效,这是相同的原则。本文分为以下几个部分:“隐私和电子服务”定义了隐私、隐私政策、隐私风险,以及它们对电子服务的含义。“设计保护隐私的电子服务的方法”提出了建议的设计方法。“相关工作”、“方法评价”和“结论与未来研究”顾名思义。根据Goldberg等人(1997)的定义,隐私是指个人控制收集、保留和分发关于自己的信息的能力。这导致了这项工作的以下定义。定义1:隐私是指个人控制收集、使用、保留和分发关于自己的信息的能力。定义2:用户隐私政策是一种声明,表达了用户对电子服务收集、使用、保留和分发用户信息的期望控制。本文档的完整版还有15页,可通过出版商网页www.igi-global.com/article/towards-designing-servicesprotect-privacy/43924上的“添加到购物车”按钮购买
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Towards Designing E-Services that Protect Privacy
The growth of electronic services (e-services) has resulted in large amounts of personal information in the hands of service organizations like banks, insurance companies, and online retailers. This has led to the realization that such information must be protected, not only to comply with privacy regulations but also and more importantly, to attract clients. One important dimension of this goal is to design e-services that protect privacy. In this paper, the author proposes a design approach that incorporates privacy risk analysis of UML diagrams to minimize privacy risks in the final design. The approach iterates between the risk analysis and design modifications to eliminate the risks until a design is obtained that is close to being risk free. problem and then bringing the tools of access control to bear for privacy control (Adams & Barbieri, 2006), treating privacy protection as a privacy rights management problem using the techniques of digital rights management (Kenny & Korba, 2002), and considering privacy protection as a privacy policy compliance problem, verifying compliance with secure logs (Yee & Korba, 2004). However, most e-services today do not use the above approaches, preferring to rely instead on stating a privacy policy and then trying to follow that policy manually, without any of the above techniques or tools or any automated checks in place. As a result, the public is often the victim, as privacy leaks (e.g., credit card files stolen) are discovered and reported in the media. Thus, today’s e-services do a poor job of protecting consumer privacy and new effective approaches for such protection are always needed. This is the motivation for this work. DOI: 10.4018/jsse.2010040102 International Journal of Secure Software Engineering, 1(2), 18-34, April-June 2010 19 Copyright © 2010, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited. The area of e-services has been chosen for this work because it probably holds the highest risk for the loss of privacy today, in terms of the amount of private information held and the growth of that information. Consider the following. E-services probably require the most consumer private information in order to function than any other type of application. This can be seen once one realizes that if an application requires consumer private information, it can probably be categorized as an e-service. E-services include e-health services where privacy is critical. E-services are growing very rapidly, along with the Internet. The various approaches for protecting privacy described above all presume to know where and what protection is needed. They presume that some sort of analysis has been done that answers the question of “where” and “what” with respect to privacy risks. Without such answers, the effectiveness of the protection comes into question. For example, protection against house break-ins is totally ineffective if the owner only secures the front door without securing other vulnerable spots such as windows (the “where”). Of course, how the owner secures these spots is critical too (“what” protection). A more effective break-in risk analysis would have identified the windows as being vulnerable to break-ins as well, resulting in better protection against break-ins if the owner additionally secures the windows. In the same way, privacy risk analysis of service systems, considering “where” and “what”, is essential to effective privacy protection. The objective of this paper is to propose an e-services design approach that incorporates privacy risk analysis to obtain designs that are more likely to preserve privacy than designs that did not use privacy risk analysis. The final design is obtained as the culmination of a series of alternative designs where each alternative design is obtained by re-design to avoid or lessen privacy risks identified through a privacy risk analysis on the last design. Each design is comprised of UML diagrams and the privacy risk analysis is done on a Personal Information Map (PIM, explained below) that is derived from UML diagrams. UML has been chosen for its widespread use among software developers. Basing this approach on UML will make it easier to adopt this approach in practice. Note that the approach does not guarantee that the system implemented from the final design is totally free of privacy risks. Such risks can arise due to implementation errors or the final design itself was not totally risk free (a totally risk free design may not have been feasible due to other constraints, e.g., tight financial budget). This design approach is based on the principal that it is more effective to design privacy protection into a software system from the beginning, rather than to add it later after the system has been implemented. This is the same principal that it is more effective to design in security from the beginning rather than adding it after implementation, as described in McGraw (2002). This paper is organized into the following sections: “Privacy and E-Services” defines privacy, privacy policies, privacy risks, and what they mean for e-services. “Approach for Designing E-Services that Protect Privacy” presents the proposed design approach. “Related Work”, “Evaluation of Approach” and “Conclusions and Future Research” are as suggested by their names. PrIvaCy aND E-SErvICES As defined by Goldberg et al. (1997), privacy refers to the ability of individuals to control the collection, retention, and distribution of information about themselves. This leads to the following definitions for this work. DEFINITION 1: Privacy refers to the ability of individuals to control the collection, use, retention, and distribution of information about themselves. DEFINITION 2: A user’s privacy policy is a statement that expresses the user’s desired control over an e-service’s collection, use, retention, and distribution of information about the user. 15 more pages are available in the full version of this document, which may be purchased using the "Add to Cart" button on the publisher's webpage: www.igi-global.com/article/towards-designing-servicesprotect-privacy/43924
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信