Top Banner
Annual Workshop February 5th, 2014
30

Annual Workshop February 5th, 2014. A Formal Approach to Analyze Privacy in Electronic Services MSEC Koen Decroix [Koen Decroix – MSEC - KU Leuven]

Dec 28, 2015

Download

Documents

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Annual Workshop February 5th, 2014. A Formal Approach to Analyze Privacy in Electronic Services MSEC Koen Decroix [Koen Decroix – MSEC - KU Leuven]

Annual WorkshopFebruary 5th, 2014

Page 2: Annual Workshop February 5th, 2014. A Formal Approach to Analyze Privacy in Electronic Services MSEC Koen Decroix [Koen Decroix – MSEC - KU Leuven]

[Koen Decroix – MSEC - KU Leuven]

A Formal Approach to Analyze Privacy in Electronic Services

MSECKoen Decroix

Page 3: Annual Workshop February 5th, 2014. A Formal Approach to Analyze Privacy in Electronic Services MSEC Koen Decroix [Koen Decroix – MSEC - KU Leuven]

3

Outline

• Introducing Privacy in Loyalty Services• Conceptual model of inShopnito• Framework for Formal Reasoning on Privacy• Privacy Analysis of inShopnito• Conclusions

Page 4: Annual Workshop February 5th, 2014. A Formal Approach to Analyze Privacy in Electronic Services MSEC Koen Decroix [Koen Decroix – MSEC - KU Leuven]

4

Introducing Privacy in Loyalty Systems

Page 5: Annual Workshop February 5th, 2014. A Formal Approach to Analyze Privacy in Electronic Services MSEC Koen Decroix [Koen Decroix – MSEC - KU Leuven]

5

Ever wondered what companies know about you?

Page 6: Annual Workshop February 5th, 2014. A Formal Approach to Analyze Privacy in Electronic Services MSEC Koen Decroix [Koen Decroix – MSEC - KU Leuven]

6

… Max Schrems, an Austrian student, did!

Now he sues Facebook for their data practices on the personal data they collected about him.

Page 7: Annual Workshop February 5th, 2014. A Formal Approach to Analyze Privacy in Electronic Services MSEC Koen Decroix [Koen Decroix – MSEC - KU Leuven]

7

Once, there were small local family-run stores binding customers with …

Page 8: Annual Workshop February 5th, 2014. A Formal Approach to Analyze Privacy in Electronic Services MSEC Koen Decroix [Koen Decroix – MSEC - KU Leuven]

8

… with the years, they were replaced by big chains also binding customers …

Page 9: Annual Workshop February 5th, 2014. A Formal Approach to Analyze Privacy in Electronic Services MSEC Koen Decroix [Koen Decroix – MSEC - KU Leuven]

9

Authenticate

Share your shopping activities with friends on Facebook

For the convenience of their customers, loyalty services evolved to electronic services integrated with other online (third-party) services. Is this the full story?

Page 10: Annual Workshop February 5th, 2014. A Formal Approach to Analyze Privacy in Electronic Services MSEC Koen Decroix [Koen Decroix – MSEC - KU Leuven]

10

When registering to such services, you agreed with their terms and policies and gave them your consent for collecting, processing, and forwarding your personal data.

Not transparent to users

Page 11: Annual Workshop February 5th, 2014. A Formal Approach to Analyze Privacy in Electronic Services MSEC Koen Decroix [Koen Decroix – MSEC - KU Leuven]

11

Your past online activities leave non-erasable, possibly harmful, traces behind and might get spread around.

Page 12: Annual Workshop February 5th, 2014. A Formal Approach to Analyze Privacy in Electronic Services MSEC Koen Decroix [Koen Decroix – MSEC - KU Leuven]

12

Citizens must be protected for these data practices.

This is where the European data protection legislation comes into play.

Page 13: Annual Workshop February 5th, 2014. A Formal Approach to Analyze Privacy in Electronic Services MSEC Koen Decroix [Koen Decroix – MSEC - KU Leuven]

… designers have to consider multiple types of requirements

Complex

13

Page 14: Annual Workshop February 5th, 2014. A Formal Approach to Analyze Privacy in Electronic Services MSEC Koen Decroix [Koen Decroix – MSEC - KU Leuven]

14

Need for formal modeling, as a support during design of composite services.

Page 15: Annual Workshop February 5th, 2014. A Formal Approach to Analyze Privacy in Electronic Services MSEC Koen Decroix [Koen Decroix – MSEC - KU Leuven]

15

Privacy analysis is based on user profiles built from the formal models. Its feedback must be useful for system designers and users as well.

Page 16: Annual Workshop February 5th, 2014. A Formal Approach to Analyze Privacy in Electronic Services MSEC Koen Decroix [Koen Decroix – MSEC - KU Leuven]

16

Conceptual Model of inShopnito

Page 17: Annual Workshop February 5th, 2014. A Formal Approach to Analyze Privacy in Electronic Services MSEC Koen Decroix [Koen Decroix – MSEC - KU Leuven]

17

Collecting loyalty points at first glance.

Page 18: Annual Workshop February 5th, 2014. A Formal Approach to Analyze Privacy in Electronic Services MSEC Koen Decroix [Koen Decroix – MSEC - KU Leuven]

18

From specifications of service providers’ data practices (= service policies), we can derive that …

… but looking into more detail …

Page 19: Annual Workshop February 5th, 2014. A Formal Approach to Analyze Privacy in Electronic Services MSEC Koen Decroix [Koen Decroix – MSEC - KU Leuven]
Page 20: Annual Workshop February 5th, 2014. A Formal Approach to Analyze Privacy in Electronic Services MSEC Koen Decroix [Koen Decroix – MSEC - KU Leuven]

20

Conceptual model of inShopnito

Page 21: Annual Workshop February 5th, 2014. A Formal Approach to Analyze Privacy in Electronic Services MSEC Koen Decroix [Koen Decroix – MSEC - KU Leuven]

21

Framework for Formal Reasoning on Privacy

Page 22: Annual Workshop February 5th, 2014. A Formal Approach to Analyze Privacy in Electronic Services MSEC Koen Decroix [Koen Decroix – MSEC - KU Leuven]

Conc

lusi

ons

Logi

c Co

mpo

nent

Vocabulary(Concepts) Behavior Inference Rules

System Independent Model

Inpu

t Mod

el

Identifiability Model

User Model System Model

Trust Perception

Credentials Profiles

Identities Pseudonyms

Initial State

Organizations Services

Service Policies

Access Control

Storage

Distribution Output

Theory

Page 23: Annual Workshop February 5th, 2014. A Formal Approach to Analyze Privacy in Electronic Services MSEC Koen Decroix [Koen Decroix – MSEC - KU Leuven]

24

Privacy Analysis of inShopnito

Page 24: Annual Workshop February 5th, 2014. A Formal Approach to Analyze Privacy in Electronic Services MSEC Koen Decroix [Koen Decroix – MSEC - KU Leuven]

25

Privacy Analysis - Feedback

Linkabilities

CollaborationsAttributes&

Violations

Page 25: Annual Workshop February 5th, 2014. A Formal Approach to Analyze Privacy in Electronic Services MSEC Koen Decroix [Koen Decroix – MSEC - KU Leuven]

26

inShopnito modeled for two user types

No trust in organizationsTrusts• Grocery Store• Loyalty Program Provider• inShopnito

Advertisers are not trusted

Loyalty credential: Idemix what if X509 is used?

Page 26: Annual Workshop February 5th, 2014. A Formal Approach to Analyze Privacy in Electronic Services MSEC Koen Decroix [Koen Decroix – MSEC - KU Leuven]

28

Linkabilities in inShopnito

Scan Product

No Collab No Collab GS <->LP X509

Grocery Store Anon Pseudo Pseudo Ident

inShopnito Anon Pseudo Pseudo Ident

Loyalty Provider Anon Pseudo Pseudo Ident

Advertiser Anon Pseudo Pseudo Ident

Page 27: Annual Workshop February 5th, 2014. A Formal Approach to Analyze Privacy in Electronic Services MSEC Koen Decroix [Koen Decroix – MSEC - KU Leuven]

29

Detect Violations in inShopnito

Advertisers not allowed to have the customer’s his:1. Name2. Address3. eMail address

Violations of rules 1, 2, 3 are found only in case a X509 certificate is used in case of the user model

Page 28: Annual Workshop February 5th, 2014. A Formal Approach to Analyze Privacy in Electronic Services MSEC Koen Decroix [Koen Decroix – MSEC - KU Leuven]

30

Conclusions

Page 29: Annual Workshop February 5th, 2014. A Formal Approach to Analyze Privacy in Electronic Services MSEC Koen Decroix [Koen Decroix – MSEC - KU Leuven]

31

• It is a formal approach to analyze privacy power to prove properties

• Approach is useful during service design– privacy by design is one of the principles in EU reform of

data protection legislation.– analyzing linkabilities, collaborations, attributes in user

profiles.– verify compliance with legislative and corporate level

rules (detecting violations).

• Approach is useful for education of people– EU reform of data protection authorities get the task to

educate people. E.g., model a user that participates to a survey about Facebook. Afterwards, perform a privacy analysis based on his assumptions and present him the difference between what he thinks and what can happen.

Page 30: Annual Workshop February 5th, 2014. A Formal Approach to Analyze Privacy in Electronic Services MSEC Koen Decroix [Koen Decroix – MSEC - KU Leuven]

32

Questions