{"title":"Detecting repurposing and over-collection in multi-party privacy requirements specifications","authors":"T. Breaux, Daniel Smullen, Hanan Hibshi","doi":"10.1109/RE.2015.7320419","DOIUrl":null,"url":null,"abstract":"Mobile and web applications increasingly leverage service-oriented architectures in which developers integrate third-party services into end user applications. This includes identity management, mapping and navigation, cloud storage, and advertising services, among others. While service reuse reduces development time, it introduces new privacy and security risks due to data repurposing and over-collection as data is shared among multiple parties who lack transparency into third-party data practices. To address this challenge, we propose new techniques based on Description Logic (DL) for modeling multiparty data flow requirements and verifying the purpose specification and collection and use limitation principles, which are prominent privacy properties found in international standards and guidelines. We evaluate our techniques in an empirical case study that examines the data practices of the Waze mobile application and three of their service providers: Facebook Login, Amazon Web Services (a cloud storage provider), and Flurry.com (a popular mobile analytics and advertising platform). The study results include detected conflicts and violations of the principles as well as two patterns for balancing privacy and data use flexibility in requirements specifications. Analysis of automation reasoning over the DL models show that reasoning over complex compositions of multi-party systems is feasible within exponential asymptotic timeframes proportional to the policy size, the number of expressed data, and orthogonal to the number of conflicts found.","PeriodicalId":132568,"journal":{"name":"2015 IEEE 23rd International Requirements Engineering Conference (RE)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"27","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 IEEE 23rd International Requirements Engineering Conference (RE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/RE.2015.7320419","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 27
Abstract
Mobile and web applications increasingly leverage service-oriented architectures in which developers integrate third-party services into end user applications. This includes identity management, mapping and navigation, cloud storage, and advertising services, among others. While service reuse reduces development time, it introduces new privacy and security risks due to data repurposing and over-collection as data is shared among multiple parties who lack transparency into third-party data practices. To address this challenge, we propose new techniques based on Description Logic (DL) for modeling multiparty data flow requirements and verifying the purpose specification and collection and use limitation principles, which are prominent privacy properties found in international standards and guidelines. We evaluate our techniques in an empirical case study that examines the data practices of the Waze mobile application and three of their service providers: Facebook Login, Amazon Web Services (a cloud storage provider), and Flurry.com (a popular mobile analytics and advertising platform). The study results include detected conflicts and violations of the principles as well as two patterns for balancing privacy and data use flexibility in requirements specifications. Analysis of automation reasoning over the DL models show that reasoning over complex compositions of multi-party systems is feasible within exponential asymptotic timeframes proportional to the policy size, the number of expressed data, and orthogonal to the number of conflicts found.
移动和web应用程序越来越多地利用面向服务的体系结构,在这种体系结构中,开发人员将第三方服务集成到最终用户应用程序中。这包括身份管理、地图和导航、云存储和广告服务等。虽然服务重用减少了开发时间,但由于数据在多方之间共享而对第三方数据实践缺乏透明度,因此由于数据重用和过度收集,它引入了新的隐私和安全风险。为了应对这一挑战,我们提出了基于描述逻辑(DL)的新技术,用于对多方数据流需求进行建模,并验证目的规范以及收集和使用限制原则,这些都是国际标准和指南中突出的隐私属性。我们在一个实证案例研究中评估了我们的技术,该案例研究了Waze移动应用程序及其三家服务提供商的数据实践:Facebook Login, Amazon Web Services(云存储提供商)和Flurry.com(流行的移动分析和广告平台)。研究结果包括检测到的冲突和对原则的违反,以及在需求规范中平衡隐私和数据使用灵活性的两种模式。对DL模型的自动化推理分析表明,在指数渐近时间框架内,对复杂的多方系统组成的推理是可行的,该时间框架与策略大小、表达的数据数量成正比,与发现的冲突数量正交。