Top Banner
1 © Nokia Solutions and Networks 2014 Privacy Engineering PUBLIC Dr Ian Oliver Security Research, Nokia Networks 7 April 2015
61

Privacy Engineering Tutorial (TrustCom2015)

Jan 10, 2017

Download

Technology

Ian Oliver
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Privacy Engineering Tutorial  (TrustCom2015)

1 © Nokia Solutions and Networks 2014

Privacy Engineering

PUBLIC

Dr Ian Oliver

Security Research, Nokia Networks

7 April 2015

Page 2: Privacy Engineering Tutorial  (TrustCom2015)

2 © Nokia Solutions and Networks 2014

Contents

•Quick Introduction & Contents

• A note of Privacy by Design

•Data Flow Modelling

• Language and its semantics

• Analysis

•Ontology and Terminology

• What’s wrong with ”PII” and ”Personal Data”

• Ontologies of Information, Requirements and RIsk

•Requirements Engineering

• Aspects, Development Flow and Privacy Ontologies

PUBLIC

•Risk

• Information classes

• The role of modelling and terminology

• Analysis, FMEA, RCA

• Metrics

• Differential Privacy, k-Anon, l-Div etc

• Hashing, and the identifier problem

• Encryption

•Culture

• Aviation, Surgery (!)

• Privacy as a safety-critical concern

•Summary and Questions

Page 3: Privacy Engineering Tutorial  (TrustCom2015)

3 © Nokia Solutions and Networks 2014

Dataflow Modelling

<Change information classification in footer>

Page 4: Privacy Engineering Tutorial  (TrustCom2015)

4 © Nokia Solutions and Networks 2014

Data Flow Modelling – Basic Syntax and Semantics

PUBLIC

Page 5: Privacy Engineering Tutorial  (TrustCom2015)

5 © Nokia Solutions and Networks 2014

Data Flow Modelling - Partitioning

PUBLIC

Page 6: Privacy Engineering Tutorial  (TrustCom2015)

6 © Nokia Solutions and Networks 2014

Data Flow Modelling - Annotations

PUBLIC

Page 7: Privacy Engineering Tutorial  (TrustCom2015)

7 © Nokia Solutions and Networks 2014

Data Flow Modelling - Analysis

PUBLIC

•Processes ’preserve’ information

•Boundary Crossing

•Policy Calculation

• (and therefore Policy Generation)

Page 8: Privacy Engineering Tutorial  (TrustCom2015)

8 © Nokia Solutions and Networks 2014

Data Flow Modelling - Annotations

PUBLIC

Page 9: Privacy Engineering Tutorial  (TrustCom2015)

9 © Nokia Solutions and Networks 2014

Ontology and Terminology

<Change information classification in footer>

Page 10: Privacy Engineering Tutorial  (TrustCom2015)

10 © Nokia Solutions and Networks 2014

Ontology and Terminology

PUBLIC

Personal Data and PII

Page 11: Privacy Engineering Tutorial  (TrustCom2015)

11 © Nokia Solutions and Networks 2014

Ontology and Terminology

PUBLIC

Personal Data and PII

are the worst terms you can have for describing data

Page 12: Privacy Engineering Tutorial  (TrustCom2015)

12 © Nokia Solutions and Networks 2014

Ontology and Terminology

PUBLIC

Personal Data and PII

are the worst terms you can have for describing data

these terms should be banned! never use them!

Page 13: Privacy Engineering Tutorial  (TrustCom2015)

13 © Nokia Solutions and Networks 2014

Ontology and Terminology

PUBLIC

Page 14: Privacy Engineering Tutorial  (TrustCom2015)

14 © Nokia Solutions and Networks 2014

Ontology and Terminology

PUBLIC

Page 15: Privacy Engineering Tutorial  (TrustCom2015)

15 © Nokia Solutions and Networks 2014

Ontology and Terminology

PUBLIC

Page 16: Privacy Engineering Tutorial  (TrustCom2015)

16 © Nokia Solutions and Networks 2014

Ontology and Terminology

PUBLIC

Page 17: Privacy Engineering Tutorial  (TrustCom2015)

17 © Nokia Solutions and Networks 2014

Ontology and Terminology

PUBLIC

Page 18: Privacy Engineering Tutorial  (TrustCom2015)

18 © Nokia Solutions and Networks 2014

Ontology and Terminology

PUBLIC

Page 19: Privacy Engineering Tutorial  (TrustCom2015)

19 © Nokia Solutions and Networks 2014

Ontology and Terminology

PUBLIC

Page 20: Privacy Engineering Tutorial  (TrustCom2015)

20 © Nokia Solutions and Networks 2014

Ontology and Terminology

PUBLIC

Personal Data and PII

Page 21: Privacy Engineering Tutorial  (TrustCom2015)

21 © Nokia Solutions and Networks 2014

Ontology and Terminology

PUBLIC

Personal Data and PII

that fact that an information set contains

is derived or calculated from:

the information type, usage, purpose, provenance, jurisdiction etc. of the information set’s contents

Page 22: Privacy Engineering Tutorial  (TrustCom2015)

22 © Nokia Solutions and Networks 2014

Ontology and Terminology

PUBLIC

Common Terminology and Meaning

is CRITICAL

to a shared understanding between all privacy parties

(lawyers, engineers, advocates)

Page 23: Privacy Engineering Tutorial  (TrustCom2015)

23 © Nokia Solutions and Networks 2014

Requirements Engineering

<Change information classification in footer>

Page 24: Privacy Engineering Tutorial  (TrustCom2015)

24 © Nokia Solutions and Networks 2014

Requirements Engineering

PUBLIC

Scary truth for privacy lawyers:

Page 25: Privacy Engineering Tutorial  (TrustCom2015)

25 © Nokia Solutions and Networks 2014

Requirements Engineering

PUBLIC

Scary truth for privacy lawyers: You are all requirements engineers!

Page 26: Privacy Engineering Tutorial  (TrustCom2015)

26 © Nokia Solutions and Networks 2014

Requirements Engineering

PUBLIC

Page 27: Privacy Engineering Tutorial  (TrustCom2015)

27 © Nokia Solutions and Networks 2014

Requirements Engineering

PUBLIC

Page 28: Privacy Engineering Tutorial  (TrustCom2015)

28 © Nokia Solutions and Networks 2014

Requirements Engineering

PUBLIC

Ontology class x Requirements Aspect x Level of Abstraction

Page 29: Privacy Engineering Tutorial  (TrustCom2015)

29 © Nokia Solutions and Networks 2014

Requirements Engineering

PUBLIC

Ontology class x Requirements Aspect x Level of Abstraction

x Specific/Edge Cases

Page 30: Privacy Engineering Tutorial  (TrustCom2015)

30 © Nokia Solutions and Networks 2014

Requirements Engineering

PUBLIC

Ontology class x Requirements Aspect x Level of Abstraction

x Specific/Edge Cases

Patterns

Page 31: Privacy Engineering Tutorial  (TrustCom2015)

31 © Nokia Solutions and Networks 2014

Requirements Engineering

PUBLIC

Another scary truth for privacy lawyers:

Page 32: Privacy Engineering Tutorial  (TrustCom2015)

32 © Nokia Solutions and Networks 2014

Requirements Engineering

PUBLIC

Another scary truth for privacy lawyers: Policies are Requirements

Page 33: Privacy Engineering Tutorial  (TrustCom2015)

33 © Nokia Solutions and Networks 2014

Requirements Engineering

PUBLIC

Another scary truth for privacy lawyers: Policies are Requirements furthermore!

Page 34: Privacy Engineering Tutorial  (TrustCom2015)

34 © Nokia Solutions and Networks 2014

Requirements Engineering

PUBLIC

Another scary truth for privacy lawyers: Policies are Requirements furthermore! Requirements are Policies!

Page 35: Privacy Engineering Tutorial  (TrustCom2015)

35 © Nokia Solutions and Networks 2014

Requirements Engineering

PUBLIC

increasing strength of requirements or

decreasing risk

Page 36: Privacy Engineering Tutorial  (TrustCom2015)

36 © Nokia Solutions and Networks 2014

Requirements Engineering

PUBLIC

increasing strength of requirements or

decreasing risk

beyond here we can not construct a system

Page 37: Privacy Engineering Tutorial  (TrustCom2015)

37 © Nokia Solutions and Networks 2014

Requirements Engineering

PUBLIC

increasing strength of requirements or

decreasing risk

beyond here we can not construct a system

the sum of all our requirements

Page 38: Privacy Engineering Tutorial  (TrustCom2015)

38 © Nokia Solutions and Networks 2014

Requirements Engineering

PUBLIC

increasing strength of requirements or

decreasing risk

beyond here we can not construct a system

the sum of all our requirements

zone of acceptable

risk

retrenchment of requirements

Page 39: Privacy Engineering Tutorial  (TrustCom2015)

39 © Nokia Solutions and Networks 2014

Risk

<Change information classification in footer>

Page 40: Privacy Engineering Tutorial  (TrustCom2015)

40 © Nokia Solutions and Networks 2014

Risk

PUBLIC

•Information classes •The role of modelling and terminology •Analysis, FMEA, RCA •Metrics •Differential Privacy, k-Anon, l-Div etc •Hashing, and the identifier problem •Encryption

Privacy Engineering is about managing risk through a well-defined, rigorous process of construction and measurement encompassing all abstraction levels

Page 41: Privacy Engineering Tutorial  (TrustCom2015)

41 © Nokia Solutions and Networks 2014

Risk

PUBLIC

•Information classes •The role of modelling and terminology •Analysis, FMEA, RCA •Metrics •Differential Privacy, k-Anon, l-Div etc •Hashing, and the identifier problem •Encryption

Privacy Engineering is about managing risk through a well-defined, rigorous process of construction and measurement encompassing all abstraction levels •lawyers call this due dilligence •engineers call this ”good engineering” •privacy advocates call this ”woo yeah!! privacy baby!!”

Page 42: Privacy Engineering Tutorial  (TrustCom2015)

42 © Nokia Solutions and Networks 2014

Risk

PUBLIC

We do not have simple metrics for risk Other than potential cost in financial terms

Page 43: Privacy Engineering Tutorial  (TrustCom2015)

43 © Nokia Solutions and Networks 2014

Risk

PUBLIC

The role of modelling and terminology

Page 44: Privacy Engineering Tutorial  (TrustCom2015)

44 © Nokia Solutions and Networks 2014

Risk

PUBLIC

Failure Mode and Effect Analysis

Page 45: Privacy Engineering Tutorial  (TrustCom2015)

45 © Nokia Solutions and Networks 2014

Risk

PUBLIC

Anonymisation •k-anonymisation •l-diversity •Differential Privacy •Hashing •Encryption

Page 46: Privacy Engineering Tutorial  (TrustCom2015)

46 © Nokia Solutions and Networks 2014

Risk

PUBLIC

Syntactical Changes eg: Hashing

Page 47: Privacy Engineering Tutorial  (TrustCom2015)

47 © Nokia Solutions and Networks 2014

Culture

<Change information classification in footer>

Page 48: Privacy Engineering Tutorial  (TrustCom2015)

48 © Nokia Solutions and Networks 2014

Culture

PUBLIC

•Information classes •The role of modelling and terminology •Analysis, FMEA, RCA •Metrics •Differential Privacy, k-Anon, l-Div etc •Hashing, and the identifier problem •Encryption

Privacy should be a safety-critical aspect of engineering

Page 49: Privacy Engineering Tutorial  (TrustCom2015)

49 © Nokia Solutions and Networks 2014

Culture

PUBLIC

•Information classes •The role of modelling and terminology •Analysis, FMEA, RCA •Metrics •Differential Privacy, k-Anon, l-Div etc •Hashing, and the identifier problem •Encryption

Privacy should be, must become a safety-critical aspect of engineering

Page 50: Privacy Engineering Tutorial  (TrustCom2015)

50 © Nokia Solutions and Networks 2014

Culture

PUBLIC

Page 51: Privacy Engineering Tutorial  (TrustCom2015)

51 © Nokia Solutions and Networks 2014

Culture

PUBLIC

Page 52: Privacy Engineering Tutorial  (TrustCom2015)

52 © Nokia Solutions and Networks 2014

Culture

PUBLIC

Page 53: Privacy Engineering Tutorial  (TrustCom2015)

53 © Nokia Solutions and Networks 2014

Culture

PUBLIC

Page 54: Privacy Engineering Tutorial  (TrustCom2015)

54 © Nokia Solutions and Networks 2014

Culture

PUBLIC

Page 55: Privacy Engineering Tutorial  (TrustCom2015)

55 © Nokia Solutions and Networks 2014

Culture

PUBLIC

Privacy Engineering Culture is about managinging, quantifying and qualifying risk

not eliminating it

Page 56: Privacy Engineering Tutorial  (TrustCom2015)

56 © Nokia Solutions and Networks 2014

Summary

<Change information classification in footer>

Page 57: Privacy Engineering Tutorial  (TrustCom2015)

57 © Nokia Solutions and Networks 2014

•Quick Introduction

•Data Flow Modelling

• Language and its semantics

• Analysis

•Ontology and Terminology

• What’s wrong with ”PII” and ”Personal Data”

• Ontologies of Information, Requirements and RIsk

•Requirements Engineering

• Aspects, Development Flow and Privacy Ontologies

PUBLIC

•Risk

• Information classes

• The role of modelling and terminology

• Analysis, FMEA, RCA

• Metrics

• Differential Privacy, k-Anon, l-Div etc

• Hashing, and the identifier problem

• Encryption

•Culture

• Aviation, Surgery (!)

• Privacy as a safety-critical concern

Page 58: Privacy Engineering Tutorial  (TrustCom2015)

58 © Nokia Solutions and Networks 2014

The End

<Change information classification in footer>

Page 59: Privacy Engineering Tutorial  (TrustCom2015)

59 © Nokia Solutions and Networks 2014

Colors and fonts Use sentence case for slide titles

<Change information classification in footer>

Core and background colors

18 65 145

0 201 255

104 113 122

168 187 192

216 217 218

R G B

We use blue and white predominantly, and selectively call out key points in light blue. If necessary, we use our palette of grays to help highlight supporting information.

Document fonts Nokia Pure is our business font and should be used as a priority.

If you do not have this font installed, Arial is the

acceptable alternative.

the presentation title should be in lower case using Nokia Pure Headline Light. Slide titles should be in sentence case using Nokia Pure Headline Light.

Body copy text should be sentence case using Nokia Pure Text Light.

Page 60: Privacy Engineering Tutorial  (TrustCom2015)

60 © Nokia Solutions and Networks 2014

Colors and text combinations

<Change information classification in footer>

A a A a A a A a A a

A a

A a

A a

A a

A a

A a

A a

A a

A a

A a

A a

A a

A a

A a

A a

A a

A a

A a

A a

A a

A a

A a

A a

A a

A a

X

X

X

X

X X X

!

X

!

!

!

! !

X

X

!

A a

A a

A a

A a

A a

X

!

!

X

!

Do not use.

Avoid using with small text.

!

Page 61: Privacy Engineering Tutorial  (TrustCom2015)