Privacy Engineering Technologies

14
Privacy Engineering Technologies Ian Oliver Privacy Officer & Architect, HERE Research Fellow, University of Brighton

description

 

Transcript of Privacy Engineering Technologies

Page 1: Privacy Engineering Technologies

Privacy Engineering Technologies

Ian Oliver Privacy Officer & Architect, HERE Research Fellow, University of Brighton

Page 2: Privacy Engineering Technologies

Areas

!  Foundations !  Privacy by x ◦  Where x \in { design, architecture, coding, brute force, surveillance,…} ◦  Metrics for Privacy

!  Notice and Consent to Usage !  Privacy Engineering ◦  Modelling and Methodology ◦  Consent Tracking and Integration ◦  Programming Language Support

!  Human Factors

Page 3: Privacy Engineering Technologies

Foundational Aspects of Privacy

Privacy Legal

Economic

Engineering

Human Factors

Foundations

Legal is well-defined and well represented Economics realities of Privacy are similarly understood if not with absolute certainty Engineering aspects are now, finally, starting to be tackled in detail Human factors are known in the security domain, but less so in privacy engineering, cf: safety-critical system design The mathematical foundations are known but there is a huge semantic gap between this and the rest.

Page 4: Privacy Engineering Technologies

Privacy by <X> 7 Principles Privacy’s “Agile Manifesto” No implementation specified

Tools, metrics and techniques for the practicing software engineer

Process, metrics and techniques for the software engineering process

wel

l-def

ined

un

defin

ed

Page 5: Privacy Engineering Technologies

Metrics

Audits Complete Complexity Risk Compliance

Management & Process

Metrics

Information Theory Metrics

Software Engineering

Metrics

K-anonymyty L-diversity

Differential Privacy Semantics

? Missing link

Data set analysis, Data set combination

BigData Analytics Metrics

Anonymisation and Reidentification

The implementation…

Page 6: Privacy Engineering Technologies

Notice and Consent !  Upfront admission of

all currently known: ◦  Data points ◦  Purposes ◦  Usages ◦  Flows

!  Requires: ◦  Frequent updates ◦  Active consent ◦  Consumer understanding ◦  Supplemental Notices

Page 7: Privacy Engineering Technologies

Notice and Consent !  Upfront admission of all

currently known: ◦  Data points ◦  Purposes ◦  Usages ◦  Flows

!  Requires: ◦  Frequent updates ◦  Active consent ◦  Consumer understanding ◦  Supplemental Notices

!  Move away from N&C to active consumer participation

!  Emphasis on usage of data !  Allows more freedom and

granularity than N&C !  Consumer oriented

Page 8: Privacy Engineering Technologies

Notice and Consent !  Upfront admission of all

currently known ◦  Data points ◦  Purposes ◦  Usages ◦  Flows

!  Requires ◦  Frequent updates ◦  Active consent ◦  Consumer understanding ◦  Supplemental Notices

!  Move away from N&C to active consumer participation

!  Emphasis on usage of data

!  Allows more freedom and granularity than N&C

!  Consumer oriented

!  Problem: ◦  How will this actually work? ◦  Legal Challenges

Page 9: Privacy Engineering Technologies

Privacy Engineering !  Modelling and Methodology ◦  Data Flow ◦  Ontologies for Privacy

◦  Analysis Techniques

◦  Definitions of Risk ◦  Definitions of Information Content

◦  Metrics!

Page 10: Privacy Engineering Technologies

Privacy Engineering !  Modelling and Methodology ◦  Data Flow ◦  Ontologies for Privacy

◦  Analysis Techniques

◦  Definitions of Risk ◦  Definitions of Information Content

◦  Metrics!

!  Consent Tracking ◦  DNT 2.0?

◦  Formalisation and Semantics of consent (we have the languages: XACML etc)

◦  Usage based consent

Page 11: Privacy Engineering Technologies

Privacy Engineering !  Modelling and Methodology ◦  Data Flow ◦  Ontologies for Privacy ◦  Analysis Techniques ◦  Definitions of Risk ◦  Definitions of Information Content ◦  Metrics!

!  Consent Tracking ◦  DNT 2.0? ◦  Formalisation and Semantics of consent (we

have the languages: XACML etc) ◦  Usage based consent

!  Programming Language Support ◦  Machine types to Information Types and Aspects ◦  Consent as “Type Checking” ◦  Dynamic Languages, Data Flow Languages

(BigData)

Page 12: Privacy Engineering Technologies

Human Factors

!  90% of Privacy Breaches are due to humans

!  Phones, USB sticks, unencrypted laptops, poor access control, system configuration, misclassification of data, naivety, key management, cloud, data mixing and reidentification, etc etc etc…

!  Learnings from Aviation, Anaesthesia, Surgery, Chemical Plant Design

!  Privacy is a SAFTEY CRITICAL concern

!  Change of culture

Boeing Model 299 30 Oct 1935

WHO Surgical Safety Checklist (Provnost, Gawande et al)

Page 13: Privacy Engineering Technologies

Privacy & Customers !  Privacy inherent in the system

design and functionality !  Consumer choice is always present

through the data flows, by default and on demand: ◦  Identification ◦  Anonymisation ◦  Aggregation ◦  Forgetting

!  Privacy is never a zero-sum game! !  Data quality improvement !  Enables the question “Why?!”

Image ©2014 Innorange Oy, Used with permission

Page 14: Privacy Engineering Technologies

Contact Privacy Engineering – A Data Flow and Ontological Approach.

Amazon, Early July 2014. ISBN 978-1497569713(print edition)

PrivacyEngineeringBook.net

Facebook.com/privacyengineering

i_j_oliver

http://ijosblog.blogspot.com

Image ©2014 Innorange Oy, Used with permission