1 / 32

Hard Problems in Computer Privacy

Hard Problems in Computer Privacy. John Weigelt. Disclaimer. The views expressed in this presentation are my own and are not provided in my capacity as Chief Technology Officer for Microsoft Canada Co. Outline. Privacy Context Implementing for Privacy The Hard Problems. Privacy.

Download Presentation

Hard Problems in Computer Privacy

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Hard Problems in Computer Privacy John Weigelt

  2. Disclaimer The views expressed in this presentation are my own and are not provided in my capacity as Chief Technology Officer for Microsoft Canada Co

  3. Outline • Privacy Context • Implementing for Privacy • The Hard Problems

  4. Privacy • “the right to control access to one's person and information about one's self.” Privacy Commissioner of Canada, speech at the Freedom of Information and Protection of Privacy Conference, June 13, 2002

  5. The Context Of Privacy Compliance Gramm-Leach Bliley Act (GLBA) Privacy of financial information Sarbanes-Oxley Fiscal accountability for all public companies Personal Health Information Protection Act (PHIPA) Ontario law for protection of personal health Information Personal Information Protection Electronic Documents Act (PIPEDA) COMPLIANCE Health Insurance Portability and Accountability Act (HIPAA) U.S. PATRIOT Act Customer documentation requirements in order to “know your customer” Right to carry insurance between job; privacy of patient Information Freedom of Information, Privacy Protection Act BC law for protection of personal information California SB 1386 Law requiring customer notification if their personal data was, or was believed to be , compromised

  6. Impact of Non-Compliance Loss of Revenue Damage to Reputation Damage to Investor Confidence Personal Liability Damage to Customer Confidence Interruption of Business Processes Legal Consequences

  7. Regulatory Penalties & Fines Grid

  8. Privacy Challenges • Spotlight on PIPEDA / PHIPA / FOIPPA • Policy interpretations are still emerging • Relationship to Security services misunderstood • Privacy often implemented in a binary manner • Privacy Metrics Developing • Privacy often driven by popular opinion • Focus on privacy enhancing technologies

  9. Designing for Privacy • Implement for all privacy principles • Privacy implementations require defence in depth • A risk managed approach should be taken • Solutions must provide privacy policy agility • Privacy and security must be viewed as related but not dependent • Use existing technology in privacy enhancing ways

  10. Implement for all Privacy Principles • Accountability • Notice (identification of purpose) • Consent • Limit Collection & Use • Disclosure of transfer • Retention Policies • Accuracy • Safeguards • Openness • Individual Access • Challenging Compliance

  11. Implement a Defence in Depth • Engages the entire business for success • Allows for the allocation of controls outside of IT Legislation Policies Procedures Physical Controls Application Features Inherent System Capabilities

  12. Use a Risk Managed Approach • Privacy Impact Assessments provide insight into how PII is handled in the design or redesign of solutions and identify areas of potential risk • (example: SLAs for privacy principles)

  13. Design for Agility • Interpretations of privacy policy continues to evolve and it is essential that solutions are agile to meet existing and emerging privacy policies • Avoid solutions that are difficult to migrate from • E.g. Bulk encryptions

  14. Privacy Agility Fully Secure Non-Secure Security Full Disclosure Anonymous Privacy Public Opinion Solution Range

  15. Use existing technology in privacy enhancing ways • Tendency to purchase solutions to solve compliance needs • Many privacy compliance activities can be met with the existing technologies • E.g. Notices, consent mechanisms, limiting collection

  16. Security and Privacy Foundations Security Safeguards Security Data Marking Rules based Approach Bell- Lapadula Biba Risk Management Approach Evaluation Scheme Security Policies Threat Risk Assessment Security 50BC 1940 Late 60s 1973 1975 1980s 1983 1986 1993 Privacy Policies Data Marking For Privacy Privacy Enhancing Technologies Rules based approach Privacy Legislation Privacy Impact Assessment Privacy 1983 1994 1996 2002 2001 2002

  17. Hard Problems • In the late 70s a group of computer security experts defined the hard problems in computer security • These were re-assessed in the late 90s by a number of groups

  18. Intrusion and Misuse Detection / Response Security of mobile code Controlled sharing of sensitive information Covert channel control Testability of software Denial of service prevention Security management infrastructure Secure system Composition High assurance development Metrics for security Multi-level security Hard Problems in Computer Security http://www.infosec-research.org/docs_public/IRC-HPL-as-released-990921.docI http://www.nitrd.gov/pubs/200311_grand_challenges.pdf

  19. Why do the same for Privacy? • Provides a foundation for research efforts • Sets a context for system design • Progress has been made on the tough problems in computer security

  20. Work factors (level of effort) for linkability Minimum sets for unlinkability Assurance levels Re-Anonymization Intuitive Consent Ontology for privacy contexts PII location tracing PII Consent revocation Authoritative source definition Information model for Privacy Privacy Hard Problems

  21. Work Factors for Linkability • Not all PII is equally descriptive (e.g. SIN vs Name) • Leveraging different types of PII requires varying degrees of effort • Linking to an individual • Establishing value • Current safeguards tend to treat all PII as equal • As in security safeguards, resource efficiencies may be gained if a work factor approach can be taken to the deployment of safeguards

  22. Minimum Sets for Unlinkability • Aggregation of data presents a significant challenge in the privacy space • Often only a few pieces of individually non-PI data can provide a high probability of identification • Determining the relative probability of identification of sets of data will assist in safer data sharing or automatic ambiguization of data sets

  23. Assurance Levels for Privacy Solutions • Different level of assurance are required for security safeguards, typically depending on the confidence required in the transaction (e.g. trusted policy mediation) • Can the same be philosophy be applied to the privacy environment • E.g. Database perturbation

  24. Re-anonymization • Current safeguards work on the assumption that data leakages are absolute • Some large content providers have been successful in removing licensed content • Can a process be developed to regain anonymity following a data leakage

  25. Intuitive Privacy Consent • While consent is a fundamental tenet for data privacy, users still do not fully understand privacy notices • How can privacy notices provide the user with greater insight into management of their PII

  26. Ontology for Privacy Contexts • Individuals are often comfortable providing PII depending on the context of its use (purpose description) • Entertainment, Financial, Health, Employer • Sharing between contexts provides an opportunity for enhanced services, but must be performed in a structured manner • Defining the contexts for a universal ontology will be required to provide interoperability between solutions (Work has been started in the PRIME project – http://www.prime-project.eu.org/)

  27. PII Location Awareness • An individual’s PII may find its way into a variety of provider repositories often unbeknownst to the data subject • PII location awareness provides the data subject with the ability to determine the data custodian

  28. PII Consent Revocation • Revoking consent for a data is currently a manual process • An automated scheme to revoke access to an individual’s PII will provide greater certainty of completion

  29. Authoritative sources Definition • Several PII submission schemes have the storage of data by the data subject as a premise • What mechanisms are required to determine the certainty of the data submitted (e.g. what organization can attest to which facts with what degree of confidence)

  30. Information Model for Privacy • Bell-LaPadula and Biba developed models on how to move data while preserving confidentiality and integrity • Information models are required to assist in the development of privacy safeguards • For example: can we say that linkability is a function of set size

  31. Conclusion • The hard problems presented today provide a starting point for discussion for those areas where research can be focused to improve our ability to safeguard personal information

  32. Questions

More Related