privacy is linking permission to purposezannone/publication/... · •fact of life –we want...

21
Università degli Studi di Trento Privacy is Linking Permission to Purpose F.Massacci N. Zannone Presented by Fabio Massacci (DIT - University of Trento - www.dit.unitn.it) (Create-NET - www.create-net.it)

Upload: others

Post on 15-Jul-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Privacy is Linking Permission to Purposezannone/publication/... · •Fact of Life –We want something done –We give private information (or access to it) to get it done •If

Università degli Studi diTrento

Privacy isLinking Permission to Purpose

F.Massacci N. Zannone

Presented by Fabio Massacci(DIT - University of Trento - www.dit.unitn.it)

(Create-NET - www.create-net.it)

Page 2: Privacy is Linking Permission to Purposezannone/publication/... · •Fact of Life –We want something done –We give private information (or access to it) to get it done •If

Università degli Studi diTrento

Privacy On the Web

• Regulatory solutions– Mandatory - HIPAA– Third Party Certified - TRUSTe

• Client-based technological solutions– Anonymizers– Remailers

• Server-based technological solutions– VPNs/Firewalls

• Client-Server-based technological solutions– P3P– EPAL(a classification borrowed from IEEE Security & Privacy Magazine)

Page 3: Privacy is Linking Permission to Purposezannone/publication/... · •Fact of Life –We want something done –We give private information (or access to it) to get it done •If

Università degli Studi diTrento

Observation 1

• If private information is not really relevant to theservice…

• No Need of Crypto!– Just create your own fake identity

• My Identity– Babbo Natale (Santa Claus)– Born in Fortezza BZ (Italy) on 25/12/1900 (or 1901 if 1900 not

accepted),– Resident in Fortezza (BZ), via della Stazione 5,– Phone 0472-458772, Fax: 39045,– Email: [email protected]– Social Security Number/Tax Code: NTLBBB00T25D731U (or V)

Page 4: Privacy is Linking Permission to Purposezannone/publication/... · •Fact of Life –We want something done –We give private information (or access to it) to get it done •If

Università degli Studi diTrento

Observation 2

• If private info really relevant for the service– Eg delivery some goods at your house

• No crypto can help…– Server must see the plaintext– And once they have it, they have it…

• Credentials don’t help that much either– Issuer gives credential that somebody has a property– Just shift faith from server to credential issuer– Possibly worse because you are likely to have less

issuers than servers (so concentrating data)

Page 5: Privacy is Linking Permission to Purposezannone/publication/... · •Fact of Life –We want something done –We give private information (or access to it) to get it done •If

Università degli Studi diTrento

Real life

• Delegation of permissions can never be as finegrained as you would need them– Cleaning lady has the key to open the room– She can empty the wastebin or look at papers on the desk.

• Real life contracts or data submissions havepurpose tagged to permissions– Special power of attorney for contracts– Privacy statement according EU or Italian Legislation (Our

starting point defining policy for Genetic Data for localhealth authority)

– You got that (permission, data, thing) to do that

• If you breach trust (use for other purposes) thenyou can be sued

Page 6: Privacy is Linking Permission to Purposezannone/publication/... · •Fact of Life –We want something done –We give private information (or access to it) to get it done •If

Università degli Studi diTrento

Alias Privacy=‘ln -s Purpose Permission’

• Fact of Life– We want something done

– We give private information (or access to it) to get it done

• If private information is used for the purpose wehave given it– Happy user

• If private information can be used for otherpurposes– Consent must be sought (eg according Law)

– Unhappy or unwilling users

Page 7: Privacy is Linking Permission to Purposezannone/publication/... · •Fact of Life –We want something done –We give private information (or access to it) to get it done •If

Università degli Studi diTrento

Privacy & Purpose II

• All interesting proposals add purpose– Hyppocratic Databases

– EPAL

– P3P

• Allow to specify other purposes and otherrecipients of private info– Marketing,

– Analysis etc.

• Also specify what data is added

Page 8: Privacy is Linking Permission to Purposezannone/publication/... · •Fact of Life –We want something done –We give private information (or access to it) to get it done •If

Università degli Studi diTrento

Exercise 1: Spot the Purpose in P3P<POLICIES xmlns="http://www.w3.org/2002/01/P3Pv1">

<POLICY name="forBrowsers” discuri=”someUrl.html” xml:lang="en">

<ENTITY>

<DATA-GROUP><DATA ref="#business.name">CatalogExample</DATA>

</DATA-GROUP>

</ENTITY><ACCESS><nonident/></ACCESS>

<DISPUTES-GROUP><DISPUTES resolution-type="independent” service="http://www.PrivacySeal.example.org"<REMEDIES><correct/></REMEDIES></DISPUTES>

</DISPUTES-GROUP><STATEMENT>

<PURPOSE><admin/><develop/></PURPOSE><RECIPIENT><ours/></RECIPIENT><RETENTION><stated-purpose/></RETENTION>

<DATA-GROUP><DATA ref="#dynamic.clickstream"/><DATA ref="#dynamic.http"/>

</DATA-GROUP>

</STATEMENT>

</POLICY>

Page 9: Privacy is Linking Permission to Purposezannone/publication/... · •Fact of Life –We want something done –We give private information (or access to it) to get it done •If

Università degli Studi diTrento

Solution (??)

• Thick appropriate BoxØ Web site basic.example.com uses a variety of images, all of which it hosts. It also includes some forms,

which are all submitted directly to the site.Ø Web site busy.example.com uses a content distribution network called cdn.example.com to host its

images so as to reduce the load on its servers.Ø Web site busy.example.com also has a contract with an advertising company called

clickads.example.com to provide banner ads on its site.Ø Web site busy.example.com also has a contract with funchat.example.com to host a chat room for its

users. When users enter the chat room they are actually leaving the Busy site. However, the chat roomhas the Busy logo and is actually covered by the Busy privacy policy.

Ø Web site bigsearch.example.com also has a form that allows users to type in a search query and have itsimultaneously performed on ten different search engines. Bigsearch submits the queries, gets back theresults from each search engine, removes the duplicates, and presents the results to the user.

Ø Web site bigsearch.example.com also has banner advertisements provided by a company calledadnetwork.example.com. Adnetwork uses cookies to develop profiles of users across many differentWeb sites so that it can provide them with ads better suited to their interests. Because the data about thesites that users are visiting is being used for purposes other than just serving ads on the Bigsearch Website, Adnetwork cannot be considered an agent in this context. Adnetwork must create its own P3Ppolicy and use its own policy reference file to indicate what content it applies to.

• Answer: you have no clue

Page 10: Privacy is Linking Permission to Purposezannone/publication/... · •Fact of Life –We want something done –We give private information (or access to it) to get it done •If

Università degli Studi diTrento

Requirements Eng. Security & Privacy

• Where’s purpose?– Focus on “modelling and implementing” privacy statements

for other services– Privacy Declaration and Authorizations derives from

(implicit) (dis)trust relationships for some functional goalsdifferent from the original goal the data has been collectedfor

• Modelling Trust/Privacy/Functional Modeltogether– In Model-based Development Architecture appropriate

privacy declarations and authorizations should beautomatically derived from original purpose

– All we need is Functional/Trust/Ownership relations

Page 11: Privacy is Linking Permission to Purposezannone/publication/... · •Fact of Life –We want something done –We give private information (or access to it) to get it done •If

Università degli Studi diTrento

Exercise 2: Spot Purpose in Hipp. DB• Hippocratic Privacy Policy Table

• That’s better…

• Yet not linked to design: ex-post addition

Page 12: Privacy is Linking Permission to Purposezannone/publication/... · •Fact of Life –We want something done –We give private information (or access to it) to get it done •If

Università degli Studi diTrento

Idea…

• Specify (Functional) Requirements from the UserPerspective– Users have certains goals and delegate some of them to the

system

• Explicit purpose when delegating goals to system– Essentially data submission is a credential mentioning not

only the information/permission but also the goal for whichthe permission can be used

• You can even make chain of credentials– Each with a refinement of purpose

• You have the data, but can you show the police avalid chain?

Page 13: Privacy is Linking Permission to Purposezannone/publication/... · •Fact of Life –We want something done –We give private information (or access to it) to get it done •If

Università degli Studi diTrento

Requirements Engineering Methodology

• Agent-Oriented RE Methodology - Tropos– Agents, Roles

– Goals, Tasks, Resources

– Dependency among agents (A depends on B on G, if Awants G to be done and B agrees to look after that)

– Goal Decomposition (AND/OR, positive, negativecontribution)

• Easy to Understand by Users for Early RE

• Good for Modelling Organizations

• Formal Reasoning Tools Available

Page 14: Privacy is Linking Permission to Purposezannone/publication/... · •Fact of Life –We want something done –We give private information (or access to it) to get it done •If

Università degli Studi diTrento

Security-Aware RE Methodology

• Add-ons– Distinction between wanting/offering/owning a goal– Trust relationship on Agent/goals/Agents

• Some agents want some goal/task to be done– Hospital doctor wants to consult medical record

• Other agents offer this goal/task– Nephrology ward locker stores medical records

• Another agent owns this goal/task– Patient owns the medical record

• Agents trust other agents on the goal– Patient trust Hospital to store medical record

Page 15: Privacy is Linking Permission to Purposezannone/publication/... · •Fact of Life –We want something done –We give private information (or access to it) to get it done •If

Università degli Studi diTrento

Security-Aware Tropos - Informal II

• Use Diagram to communicate requirements– Nice drawing with ovals and arrows– Model Dependency and Trust Relationships

Patient

Obtain MedicalTreatment

Clinician

Hospital

Analys Pers. Data Obtain MedicalTreatment

DepDep

Dep

Dep

Dep

Dep

Hosp DelegClinician

Trust

Trust

Trust

Trust

Owns

DepDep

Dep

Dep

Dep

Dep

And now derive permissions automatically

Page 16: Privacy is Linking Permission to Purposezannone/publication/... · •Fact of Life –We want something done –We give private information (or access to it) to get it done •If

Università degli Studi diTrento

Security-Aware Tropos - Informal III

Page 17: Privacy is Linking Permission to Purposezannone/publication/... · •Fact of Life –We want something done –We give private information (or access to it) to get it done •If

Università degli Studi diTrento

Security-Aware Tropos - Informal IV

• Beware: NOT all “permissions” and “auth.processes” are mapped onto digital certificates

• Remember– Fabio’s “Real-Life Dominance Rule”– Some “credentials” will be papers signed by an individual– Others corresponds to oral or physical permissions

• Examples– Permission to use donor’s placenta genetic data for research

and “self” usage (collected on the day of childbirth…)– Parents’ or Guardian approval for blood samples to be used

in case of unexpected outcome in “wet” surgery– University visiting professor’s request for temp. IP address

Page 18: Privacy is Linking Permission to Purposezannone/publication/... · •Fact of Life –We want something done –We give private information (or access to it) to get it done •If

Università degli Studi diTrento

Security-Aware RE Methodology• Design Functional Dependency Model• Design Trust/Ownership Model• Refinements by

– Goal Decomposition– Goal (Functional) Delegation to other agents– Modify Trust Relationship

• Design /Synth Trust Management Implementation– Goal (Permission) Delegation to other agents MENTION functional goal

• (Computer Supported) Analysis– Goal Fulfillment (Functional Delegation Chain)– Trusted Execution (Trust Chain Match Funct. Deleg. Chain)– Trusted Delegation (Trust Chain Match Permis. Deleg. Chain)– Privacy Protection (Permis. Deleg. Chain match Funct. Deleg Chain)

Page 19: Privacy is Linking Permission to Purposezannone/publication/... · •Fact of Life –We want something done –We give private information (or access to it) to get it done •If

Università degli Studi diTrento

Security-Aware Tropos - Formal Model

• Semi-formal Analysis– Annotate diagrams with formulae

• Partial checks at type level• Eliminate already many errors in the chains

• Formal Analysis– Full model at instance level

• Define instances of agents and goals• instantiate delegation in many ways

– Finite State Model checking and (to be done) infinite state analysis– Allows Discovery of subtler relationships between parties

• Patient trusts “her” clinician, and hospital

– Analys relationships with third parties• Delegation of permissions can create unexpected breach of trust• “natural & simple” permission chain may not match “natural” trust chain

Page 20: Privacy is Linking Permission to Purposezannone/publication/... · •Fact of Life –We want something done –We give private information (or access to it) to get it done •If

Università degli Studi diTrento

Implementation

• Submission of data to server is delegation cert– Data– Purpose

• Need common language to define purpose– Semantic web…

• Needed PKI from servers.– Server needs to sign acknolwedgement of data & policy– But they already have it (if they have HTTPS…)

• Is a PKI needed from the client?– Maybe a MAC with a secret value is enough– Maybe a full signature is needed

Page 21: Privacy is Linking Permission to Purposezannone/publication/... · •Fact of Life –We want something done –We give private information (or access to it) to get it done •If

Università degli Studi diTrento

SIC LECTIO FINITA EST

• Questions?

• Suggestions?

• Comments?

• Dead cats?

• …