Visible to the public Detecting Repurposing and Over-Collection in Multi-party Privacy Requirements SpecificationsConflict Detection Enabled

TitleDetecting Repurposing and Over-Collection in Multi-party Privacy Requirements Specifications
Publication TypeConference Proceedings
Year of Publication2015
AuthorsTravis Breaux, Daniel Smullen, Hanan Hibshi
Conference NameRE 2015: Requirement Engineering Conference
Date Published08/2015
Conference LocationOttawa, Canada
KeywordsCMU, data flow analysis, July'15, privacy principles, requirements validation
Abstract

Mobile and web applications increasingly leverage service-oriented architectures in which developers integrate third-party services into end user applications. This includes identity management, mapping and navigation, cloud storage, and advertising services, among others. While service reuse reduces development time, it introduces new privacy and security risks due to data repurposing and over-collection as data is shared among multiple parties who lack transparency into thirdparty data practices. To address this challenge, we propose new techniques based on Description Logic (DL) for modeling multiparty data flow requirements and verifying the purpose specification and collection and use limitation principles, which are prominent privacy properties found in international standards and guidelines. We evaluate our techniques in an empirical case study that examines the data practices of the Waze mobile application and three of their service providers: Facebook Login, Amazon Web Services (a cloud storage provider), and Flurry.com (a popular mobile analytics and advertising platform). The study results include detected conflicts and violations of the principles as well as two patterns for balancing privacy and data use flexibility in requirements specifications. Analysis of automation reasoning over the DL models show that reasoning over complex compositions of multi-party systems is feasible within exponential asymptotic timeframes proportional to the policy size, the number of expressed data, and orthogonal to the number of conflicts found.

Citation Keynode-30325

Other available formats:

Breaux_Detect_Repurpose_TB.pdf
AttachmentTaxonomyKindSize
Breaux_Detect_Repurpose_TB.pdfPDF document8.96 MBDownloadPreview
AttachmentSize
bytes