Skip to main content

Privacy Injector — Automated Privacy Enforcement Through Aspects

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 4258))

Abstract

Protection of personal data is essential for customer acceptance. Even though existing privacy policies can describe how data shall be handled, privacy enforcement remains a challenge. Especially for existing applications, it is unclear how one can effectively ensure correct data handling without completely redesigning the applications. In this paper we introduce Privacy Injector, which allows us to add privacy enforcement to existing applications.

Conceptually Privacy Injector consists of two complementary parts, namely, a privacy metadata tracking and a privacy policy enforcement part. We show how Privacy Injector protects the complete life cycle of personal data by providing us with a practical implementation of the “sticky policy paradigm.” Throughout the collection, transformation, disclosure and deletion of personal data, Privacy Injector will automatically assign, preserve and update privacy metadata as well as enforce the privacy policy. As our approach is policy-agnostic, we can enforce any policy language that describes which actions may be performed on which data.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Agrawal, R., Kiernan, J., Srikant, R., Xu, Y.: Hippocratic databases. In: Proceedings of the 28th Int’l Conf. on Very Large Databases (VLDB), Hong Kong (2002)

    Google Scholar 

  2. Backes, M., Bagga, W., Karjoth, G., Schunter, M.: Efficient comparison of enterprise privacy policies. In: 19th ACM Symposium on Applied Computing, Special Track Security, Nicosia, Cyprus (2004)

    Google Scholar 

  3. Backes, M., Pfitzmann, B., Schunter, M.: A toolkit for managing enterprise privacy policies. In: Snekkenes, E., Gollmann, D. (eds.) ESORICS 2003. LNCS, vol. 2808, pp. 162–180. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  4. Bettini, C., Jajodia, S., Wang, X.S., Wijesekerat, D.: Obligation monitoring in policy management. In: Proceedings of the 3rd IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY), pp. 2–12 (2002)

    Google Scholar 

  5. Bonatti, P.A., Damiani, E., De Capitani di Vimercati, S., Samarati, P.: A component-based architecture for secure data publication. In: Proceedings of the 17th Annual Computer Security Applications Conference, pp. 309–318 (2001)

    Google Scholar 

  6. Booch, G., Rumbaugh, J., Jacobson, I.: The Unified Modeling Language User Guide. Addison-Wesley, Reading (1998)

    Google Scholar 

  7. Damianou, N., Dulay, N., Lupo, E., Sloman, M.: The ponder policy specification language. In: Sloman, M., Lobo, J., Lupu, E.C. (eds.) POLICY 2001. LNCS, vol. 1995, pp. 18–39. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  8. Egelman, S., Cranor, L., Chowdhury, A.: An analysis of p3p-enabled web sites among top-20 search results. In: Proceedings of the Eighth International Conference on Electronic Commerce (2006)

    Google Scholar 

  9. Filman, R., Elrad, T., Clarke, S., Akşit, M.: Aspect-Oriented Software Development. Addison-Wesley, Reading (2004)

    Google Scholar 

  10. Fischer-Hübner, S. (ed.): IT-Security and Privacy. LNCS, vol. 1958. Springer, Heidelberg (2001)

    MATH  Google Scholar 

  11. Gamma, E., Helm, R., Johnson, R., Vlissides, J.: Design Patterns: Elements of Reusable Object-Oriented Software. Addison-Wesley, Reading (1995)

    Google Scholar 

  12. IBM. Declarative privacy monitoring. Web page at: http://alphaworks.ibm.com/tech/dpm

  13. Jajodia, S., Kudo, M., Subrahmanian., V.S.: Provisional authorization. In: Proceedings of the E-commerce Security and Privacy, pp. 133–159. Kluwer Academic Publishers, Dordrecht (2001)

    Google Scholar 

  14. Karjoth, G., Schunter, M.: A privacy policy model for enterprises. In: Proceedings of the 15th IEEE Computer Security Foundations Workshop (CSFW), pp. 271–281 (2002)

    Google Scholar 

  15. Karjoth, G., Schunter, M., Van Herreweghen, E.: Enterprise privacy practices vs. privacy promises - how to promise what you can keep. In: 4th IEEE International Workshop on Policies for Distributed Systems and Networks (Policy 2003), Lake Como, Italy, pp. 135–146 (2003)

    Google Scholar 

  16. Karjoth, G., Schunter, M., Waidner, M.: The platform for enterprise privacy practices – privacy-enabled management of customer data. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, vol. 2482, pp. 69–84. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  17. Kiczales, G., Hilsdale, E., Hugunin, J., Kersten, M., Palm, J., Griswold, W.G.: An overview of AspectJ. In: Knudsen, J.L. (ed.) ECOOP 2001. LNCS, vol. 2072, pp. 327–355. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  18. Kiczales, G., Lamping, J., Menhdhekar, A., Maeda, C., Lopes, C., Loingtier, J.-M., Irwin, J.: Aspect-oriented programming. In: Akşit, M., Matsuoka, S. (eds.) Proceedings of the European Conference on Object-Oriented Programming, vol. 1241, pp. 220–242. Springer, Berlin, Heidelberg, and New York (1997)

    Google Scholar 

  19. Myers, A., Liskov, B.: Protecting privacy using the decentralized label model. ACM Transactions on Software Engineering and Methodology, 410–442 (2000)

    Google Scholar 

  20. Myers, A.C.: JFlow: Practical mostly-static information flow control. In: Proceedings of the Symposium on Principles of Programming Languages, pp. 228–241 (1999)

    Google Scholar 

  21. Oasis. eXtensible Access Control Markup Language (XACML). Web page at: http://www.oasis-open.org/committees/tc_home.php?wg_abbrev=xacml

  22. Platform for Privacy Preferences (P3P). W3C Recommendation (April 2002), http://www.w3.org/TR/2002/REC-P3P-20020416/

  23. Parnas, D.L.: On the criteria to be used in decomposing systems into modules (1972)

    Google Scholar 

  24. Pietraszek, T., Venden Berghe, C.: Defending against injection attacks through context-sensitive string evaluation. In: Proceedings of the 8th International Symposium on Recent Advances in Intrusion Detection (RAID 2005), pp. 124–145 (2005)

    Google Scholar 

  25. AspectJ Project. The AspectJ home page, Web page at: http://eclipse.org/aspectj/

  26. Hibernate Project. Hibernate, Web page at: http://hibernate.org/

  27. Ribeiro, C., Zuquete, A., Ferreira, P., Guedes, P.: SPL: An access control language for security policies with complex constraints. In: Proceedings of the Network and Distributed System Security Symposium (NDSS) (2001)

    Google Scholar 

  28. Sabelfeld, A., Myers, A.: Language-based information-flow security (2003)

    Google Scholar 

  29. Sweene, L.: k-anonymity: A model for protecting privacy. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 10(5), 557–570 (2002)

    Article  MathSciNet  Google Scholar 

  30. Watchfire. Watchfire, Web page at: http://watchfire.com/

  31. De Win, B., Piessens, F., Joosen, W., Verhanneman, T.: On the importance of the separation-of-concerns principle in secure software engineering. In: Proceedings of the ACSA Workshop on the Application of Engineering Principles to System Security Design, pp. 1–10 (2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Berghe, C.V., Schunter, M. (2006). Privacy Injector — Automated Privacy Enforcement Through Aspects. In: Danezis, G., Golle, P. (eds) Privacy Enhancing Technologies. PET 2006. Lecture Notes in Computer Science, vol 4258. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11957454_6

Download citation

  • DOI: https://doi.org/10.1007/11957454_6

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-68790-0

  • Online ISBN: 978-3-540-68793-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics