From Privacy Policies to Privacy Threats: A Case Study in Policy-Based Threat Modeling

被引:0
|
作者
Dimova, Yana [1 ]
Kode, Mrunmayee [1 ]
Kalantari, Shirin [1 ]
Wuyts, Kim [1 ]
Joosen, Wouter [1 ]
Muhlberg, Jan Tobias [2 ]
机构
[1] Katholieke Univ Leuven, DistriNet, Leuven, Belgium
[2] Univ Libre Bruxelles, Brussels, Belgium
关键词
privacy; privacy policy; threat modeling; case study; LINDDUN;
D O I
10.1145/3603216.3624962
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Privacy threat modeling is a systematic approach to assess potential privacy risks which are a consequence of a given system design. Eliciting privacy threats requires a detailed understanding of system components and the ways in which these components interact. This makes it hard to impossible for any user, e.g., parties who interact with the system but do not possess knowledge about the inner workings of that system, to meaningfully engage in threat modeling and risk assessment. We explore an approach to address this problem by relying on information from a system's publicly available privacy policies to derive system models and apply threat modeling analyses. We chose the WhatsApp instant messaging system as a case study for privacy threat modeling from the perspective of a "regular" user. We apply the LINDDUN GO methodology and evaluate how threats evolved with time in two significant territorial areas, the European Union and India. Our study illustrates the impact of regulations and court cases and our approach may aid practitioners without inside knowledge to make informed choices regarding privacy risks when adopting third-party services.
引用
收藏
页码:17 / 29
页数:13
相关论文
共 50 条
  • [1] A policy-based privacy storage approach
    Nowalczyk, Julien
    Tastet-Cherel, Frederique
    ICEIS 2007: PROCEEDINGS OF THE NINTH INTERNATIONAL CONFERENCE ON ENTERPRISE INFORMATION SYSTEMS: DATABASES AND INFORMATION SYSTEMS INTEGRATION, 2007, : 605 - 608
  • [2] Privacy in context: an evaluation of policy-based approaches to location privacy protection
    Cottrill, Caitlin D.
    Thakuriah, Piyushimita 'Vonu'
    INTERNATIONAL JOURNAL OF LAW AND INFORMATION TECHNOLOGY, 2014, 22 (02): : 178 - 207
  • [3] Towards privacy enhancement in policy-based system
    Khurat, Assadarat
    Abendroth, Joerg
    WSEAS Transactions on Information Science and Applications, 2007, 4 (03): : 576 - 583
  • [4] END USER PRIVACY AND POLICY-BASED NETWORKING
    Paterson, Nancy E.
    JOURNAL OF INFORMATION POLICY, 2014, 4 : 28 - 43
  • [5] Design and implementation of a policy-based privacy authorization system
    Choi, HyangChang
    Lee, SeungYong
    Lee, HyungHyo
    INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 3975 : 129 - 140
  • [6] Privacy-Preserving Policy-Based Information Transfer
    De Cristofaro, Emiliano
    Jarecki, Stanislaw
    Kim, Jihye
    Tsudik, Gene
    PRIVACY ENHANCING TECHNOLOGIES, PROCEEDINGS, 2009, 5672 : 164 - +
  • [7] Mitigation of Privacy Threats due to Encrypted Traffic Analysis through a Policy-Based Framework and MUD Profiles
    Baldini, Gianmarco
    Hernandez-Ramos, Jose L.
    Nowak, Slawomir
    Neisse, Ricardo
    Nowak, Mateusz
    SYMMETRY-BASEL, 2020, 12 (09):
  • [8] Enhancing privacy in cloud computing via policy-based obfuscation
    Miranda Mowbray
    Siani Pearson
    Yun Shen
    The Journal of Supercomputing, 2012, 61 : 267 - 291
  • [9] Enhancing privacy in cloud computing via policy-based obfuscation
    Mowbray, Miranda
    Pearson, Siani
    Shen, Yun
    JOURNAL OF SUPERCOMPUTING, 2012, 61 (02): : 267 - 291
  • [10] Privacy Preserving Policy-Based Content Sharing in Public Clouds
    Nabeel, Mohamed
    Shang, Ning
    Bertino, Elisa
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2013, 25 (11) : 2602 - 2614