7 Conclusions
The increasing migration to the web of transactions and services made urgent to have
in place effective technologies for data privacy management. As the emerging
scenarios are characterized by high dynamism and untrustworthiness, it is necessary
that such technologies allow scalability, be not invasive, and foster evolution of
technology and architecture.
This paper proposes a solution to be applied in highly dynamic, untrustworthy and
scalable contexts, which implement the paradigm of front end trust filter. The data
privacy policy is considered as a three-layered process consisting in the statement of
the policy, the strategies for realizing such policy and the implementation, which
applies the strategy at the level of applications and database.
This three-layered structure confers a high degree of flexibility which permits: (i)
the reuse of strategies or implementations cross organizations and cross policies; and
(ii) the reduction of the change impact due to modifications to database, technology,
strategy, and regulations.
A case study was carried out in order to obtain preliminary validation of the
system. The outcomes confirm the usefulness of the system in supporting the data
privacy policy definition and maintenance. Two preliminary lessons emerged from
the case studies. As first, privacy objectives should not be too generic, otherwise the
automatic generation of rules could fail. As second, the set of privacy objectives
derived from a regulation often needs to be enriched with additional ones, implicitly
assumed by the regulation itself, or the automatic generation will leave a part of the
database uncovered by mechanisms for preserving privacy.
Future directions include: (i) a larger investigation which focuses on further
aspects of the system’s effectiveness; and (ii) features for data domain modelling
tailored on the processes of data privacy preservation.
References
1. Agrawal R., Kiernan,J., Srikant R., and Xu Y., 2002, Hippocratic databases. In VLDB, the
28
th
Int’l Conference on Very Large Database.
2. Agrawal R., Bird P., Grandison T., Kiernan J., Logan S., Rjaibt W., 2005 Extending
Relational Database Systems to Automatically Enforce Privacy Policies. In ICDE’05 Int’l
Conference on Data Engineering, IEEE Computer Society.
3. Ashley P., Hada S., Karjoth G., Powers C., Schunter M., 2003. Enterprise Privacy
Authorization Language (EPAL 1.1). IBM Reserach Report. (available at:
http://www.zurich.ibm.com/security/enterprice-privacy/epal – last access on 19.02.07).
4. Bayardo R.J., and Srikant R., 2003. Technology Solutions for Protecting Privacy. In
Computer. IEEE Computer Society.
5. Fung C.M:, Wang K., and Yu S.P., 2005. Top-Down Specialization for information and
Privacy Preservation. In ICDE’05, 21st International Conference on Data Engineering.
IEEE Computer Society.
6. Langheinrich M.,2005. Personal privacy in ubiquitous computing –Tools and System
Support. PhD. Dissertation, ETH Zurich.
164