200 likes | 326 Views
Privacy and Contextual Integrity: Framework and Applications. Adam Barth, Anupam Datta, John C. Mitchell (Stanford) Helen Nissenbaum (NYU). Privacy in Health Care. Doctor. Specialist. Electronic Health Record. Patient Portal. HIPAA Compliance. Insurer. Patient. Broad Goal.
E N D
Privacy and Contextual Integrity:Framework and Applications Adam Barth, Anupam Datta, John C. Mitchell (Stanford) Helen Nissenbaum (NYU)
Privacy in Health Care Doctor Specialist Electronic Health Record Patient Portal HIPAA Compliance Insurer Patient
Broad Goal • Protect privacy • Can a banker tell a marketer a customer’s address? • Express policy precisely • Enterprise privacy policies • Privacy provisions from legislation • Analyze privacy policies • Action complies with policy? • Policy enforces law?
Approach • Privacy model • Agents communicating about each other • Logic over model • Linear temporal logic • Policies as logical formulas • Control expressive power • Apply logical tools • Leverage LTL research
Contextual Integrity • Philosophical account of privacy • Transfer of personal information • Describes what people care about • Flow governed by norms • Agents act in roles in social contexts • Rejects public/private dichotomy • Principles of transmission • Confidentiality, reciprocity, dessert, etc
Privacy Model for CI Charlie’s SSN is 078-05-1120 Alice Bob • Restrict messages • Messages about subjects • Judgments over traces • Past and future relevant • Agents reason about attributes
Access control Subject (= actor) Object Action Stateless Except Chinese wall Discrete elements Privacy policies Sender Recipient Subject (of message) Attribute Transmission principle Temporal Past: Opt-in / opt-out Future: Notification Structured attributes Access Control vs. Privacy
Syntax • Grammar for logic • ::= send(p1,p2,m) p1 sends p2 message m | contains(m, q, t) m contains attrib t about q | inrole(p, r) p is active in role r | incontext(p, c) p is active in context c | t t’ Attrib t is part of attrib t’ | | | x:. Classical operators | U | S | O Temporal operators • Policies use a restricted class of formulas
CI Norms and Policies • Policy consists of norms (+) inrole(p1, r1) inrole(p2, r2) inrole(q, r) tt’ () inrole(p1, r1) inrole(p2, r2) inrole(q, r) tt’ • is an agent constraint • is a temporal condition • Norms assembled into policy formula • p1,p2,q:P.m:M.t:T.incontext(p1, c) send(p1, p2, m) contains(m, q, t) { + | + norms+(c) } { | norms(c) }
Sender role Attribute Subject role Transmission principle Recipient role Gramm-Leach-Bliley Example Financial institutions must notify consumers if they share their non-public personal information with non-affiliated companies, but the notification may occur either before or after the information sharing occurs
Expressiveness of CI • Evaluated on privacy laws • HIPAA, GLBA, and COPPA • Captured most privacy provisions • Missed de-identified health info in HIPAA • Laws used most features • Roughly as expressive as required
Health Information Health Information Psychotherapy Notes Psychotherapy Notes Test Results Structure of Attributes Health Information Date of Birth Psychotherapy Notes Test Results Age Zodiac Sign Heath care providers can tell patients their health information Sender role Recipient role Subject role Attribute Heath care providers can tell patients their psychotherapy notes only if a psychiatrist has approved
Extensional vs. Intentional • Extensional semantics • Equates policies with judgments • Ignores why judgments reached • Intentional semantics • Policies as list of rules • Reason for judgment preserved • Extensional combination tricky • Attribute inheritance
Date of Birth Date of Birth Age Zodiac Sign Age Zodiac Sign Date of Birth Date of Birth Age Zodiac Sign Age Zodiac Sign Difficulties in Combination AND Age = Date of Birth OR Age =
Refinement and Combination • Policy refinement • Basic policy relation • Does hospital policy enforce HIPAA? • P1 refines P2 if P1 P2 • Requires careful handling of attribute inheritance • Combination becomes logical conjunction • Defined in terms of refinement
Compliance Contemplated Action Judgment Policy Future Reqs History • Strong compliance • Future requirements after action can be met • PSPACE • Weak compliance • Present requirements met by action • Polynomial time
Related Languages • Legend: unsupported o partially supported full supported • CI fully supports attributes and combination
Conclusions • Privacy about agents communicating • Different model than access control • Sender, recipient, subject, attribute, transmission principle • Past and future important • CI: A language for privacy policies • Based on linear temporal logic • Expresses most privacy laws • Combination and compliance tractable