A Framework for Privacy and Security Requirements Analysis and Conflict Resolution for Supporting GDPR Compliance Through Privacy-by-Design

被引:0
|
作者
Alkubaisy, Duaa [1 ]
Piras, Luca [2 ]
Al-Obeidallah, Mohammed Ghazi [3 ]
Cox, Karl [4 ]
Mouratidis, Haralambos [4 ,5 ]
机构
[1] Imam Abdulrahman Bin Faisal Univ, Coll Appl Studies & Community Serv, Dept MIS, Dammam, Saudi Arabia
[2] Robert Gordon Univ, Sch Comp, Aberdeen, Scotland
[3] Al Ain Univ, Fac Engn, Abu Dhabi, U Arab Emirates
[4] Univ Brighton, Ctr Secure Intelligent & Usable Syst, Brighton, E Sussex, England
[5] Stockholm Univ, Dept Comp & Syst Sci, Stockholm, Sweden
来源
EVALUATION OF NOVEL APPROACHES TO SOFTWARE ENGINEERING (ENASE 2021) | 2022年 / 1556卷
基金
欧盟地平线“2020”;
关键词
Security requirements; Privacy requirements; Requirements conflicts; GDPR; Requirements modelling; Privacy by design; GOAL;
D O I
10.1007/978-3-030-96648-5_4
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Requirements elicitation, analysis, and, above all, early detection of conflicts and resolution, are among the most important, strategic, complex and crucial activities for preventing software system failures, and reducing costs related to reengineering/fixing actions. This is especially important when critical Requirements Classes are involved, such as Privacy and Security Requirements. Recently, organisations have been heavily fined for lack of compliance with data protection regulations, such as the EU General Data Protection Regulation (GDPR). GDPR requires organisations to enforce privacy-by-design activities from the early stages and for the entire software engineering cycle. Accordingly, requirements engineers need methods and tools for systematically identifying privacy and security requirements, detecting and solving related conflicts. Existing techniques support requirements identification without detecting or mitigating conflicts. The framework and tool we propose in this paper, called Confls, fills this gap by supporting engineers and organisations in these complex activities, with its systematic and interactive process. We applied ConfIs to a realistic GDPR example from the DEFeND EU Project, and evaluated its supportiveness, with positive results, by involving privacy and security requirements experts (This research is an extension of the study conducted by Alkubaisy et al. [1] - which itself is a continuation of earlier studies [2, 3] and aims to aid the reader in comprehensively grasping the concepts laid out).
引用
收藏
页码:67 / 87
页数:21
相关论文
共 50 条
  • [1] ConfIs: A Tool for Privacy and Security Analysis and Conflict Resolution for Supporting GDPR Compliance through Privacy-by-Design
    Alkubaisy, Duaa
    Piras, Luca
    Al-Obeidallah, Mohammed Ghazi
    Cox, Karl
    Mouratidis, Haralambos
    ENASE: PROCEEDINGS OF THE 16TH INTERNATIONAL CONFERENCE ON EVALUATION OF NOVEL APPROACHES TO SOFTWARE ENGINEERING, 2021, : 80 - 91
  • [2] Privacy, Security, Legal and Technology Acceptance Requirements for a GDPR Compliance Platform
    Tsohou, Aggeliki
    Magkos, Manos
    Mouratidis, Haralambos
    Chrysoloras, George
    Piras, Luca
    Pavlidis, Michalis
    Debussche, Julien
    Rotoloni, Marco
    Gallego-Nicasio Crespo, Beatriz
    COMPUTER SECURITY, ESORICS 2019, 2020, 11980 : 204 - 223
  • [3] privacyTracker: A Privacy-by-Design GDPR-Compliant Framework with Verifiable Data Traceability Controls
    Gjermundrod, Harald
    Dionysiou, Ioanna
    Costa, Kyriakos
    CURRENT TRENDS IN WEB ENGINEERING, ICWE 2016 INTERNATIONAL WORKSHOPS, 2016, 9881 : 3 - 15
  • [4] Privacy Implication and Technical Requirements Toward GDPR Compliance
    Huang, Ching-Chun
    Yuan, Zih-shiuan
    PROCEEDINGS OF THE FUTURE TECHNOLOGIES CONFERENCE (FTC) 2019, VOL 2, 2020, 1070 : 353 - 367
  • [5] A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements
    Deng, Mina
    Wuyts, Kim
    Scandariato, Riccardo
    Preneel, Bart
    Joosen, Wouter
    REQUIREMENTS ENGINEERING, 2011, 16 (01) : 3 - 32
  • [6] A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements
    Mina Deng
    Kim Wuyts
    Riccardo Scandariato
    Bart Preneel
    Wouter Joosen
    Requirements Engineering, 2011, 16 : 3 - 32
  • [7] Privacy, security, legal and technology acceptance elicited and consolidated requirements for a GDPR compliance platform
    Tsohou, Aggeliki
    Magkos, Emmanouil
    Mouratidis, Haralambos
    Chrysoloras, George
    Piras, Luca
    Pavlidis, Michalis
    Debussche, Julien
    Rotoloni, Marco
    Crespo, Beatriz Gallego-Nicasio
    INFORMATION AND COMPUTER SECURITY, 2020, 28 (04) : 531 - 553
  • [8] Mapping 'Security Safeguard' Requirements in a Data Privacy legislation to an International Privacy Framework: A Compliance Methodology
    Govender, I.
    2015 INFORMATION SECURITY FOR SOUTH AFRICA - PROCEEDINGS OF THE ISSA 2015 CONFERENCE, 2015,
  • [9] DEFeND Architecture: A Privacy by Design Platform for GDPR Compliance
    Piras, Luca
    Al-Obeidallah, Mohammed Ghazi
    Praitano, Andrea
    Tsohou, Aggeliki
    Mouratidis, Haralambos
    Gallego-Nicasio Crespo, Beatriz
    Bernard, Jean Baptiste
    Fiorani, Marco
    Magkos, Emmanouil
    Castillo Sanz, Andres
    Pavlidis, Michalis
    D'Addario, Roberto
    Zorzino, Giuseppe Giovanni
    TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS, TRUSTBUS 2019, 2019, 11711 : 78 - 93
  • [10] From GDPR to Privacy Design Patterns: The MATERIALIST Framework
    Barletta, Vita
    Desolda, Giuseppe
    Gigante, Domenico
    Lanzilotti, Rosa
    Saltarella, Marco
    SECRYPT : PROCEEDINGS OF THE 19TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2022, : 642 - 648