Detecting Repurposing and Over-collection in Multi-Party Privacy Requirements Specifications
Title | Detecting Repurposing and Over-collection in Multi-Party Privacy Requirements Specifications |
Publication Type | Conference Proceedings |
Year of Publication | 2015 |
Authors | Travis Breaux, Daniel Smullen, Hanan Hibshi |
Conference Name | IEEE 23rd International Requirements Engineering Conference (RE'15) |
Date Published | 08/2015 |
Conference Location | Ottawa, Canada |
Keywords | CMU, Oct'15 |
Abstract | Mobile and web applications increasingly leverage service-oriented architectures in which developers integrate third-party services into end user applications. This includes identity management, mapping and navigation, cloud storage, and advertising services, among others. While service reuse reduces development time, it introduces new privacy and security risks due to data repurposing and over-collection as data is shared among multiple parties who lack transparency into third-party data practices. To address this challenge, we propose new techniques based on Description Logic (DL) for modeling multi-party data flow requirements and verifying the purpose specification and collection and use limitation principles, which are prominent privacy properties found in international standards and guidelines. We evaluate our techniques in an empirical case study that examines the data practices of the Waze mobile application and three of their service providers: Facebook Login, Amazon Web Services (a cloud storage provider), and Flurry.com (a popular mobile analytics and advertising platform). The study results include detected conflicts and violations of the principles as well as two patterns for balancing privacy and data use flexibility in requirements specifications. Analysis of automation reasoning over the DL models show that reasoning over complex compositions of multi-party systems is feasible within exponential asymptotic timeframes proportional to the policy size, the number of expressed data, and orthogonal to the number of conflicts found. |
Citation Key | node-25032 |