47 <ob:DenyAllAndDeleteNow/>
48 </ob:Obligation>
49 </ ob:ObligationsSet>
6 CONCLUSION
Data protection, especially for personal information,
has a growing attention and demand. For example,
the EU General Data Privacy Regulation require sig-
nificant changes in the way entities collect personal
data of EU citizens, anywhere in the world. In this
paper we presented our effort towards the expression
of data protection policies to achieve compliance as
combination of access and usage control measures.
Our policy language, UPOL, was developed in the
context of the EU FP7 Coco Cloud project. Its main
aim is to obtain a unique language that is powerful
enough to express, legal, security, and privacy con-
straints in automatically enforceable policies, focus-
sed on the sharing and management of (personal or
otherwise sensitive) data over the Cloud. Now, our
development continues in the EU H2020 C3ISP pro-
ject, extending data protection also to Big Data ana-
lytics scenario, especially considering cyber security
information sharing.
Our preliminary results, with obligations enforced
automatically by the policy engine are promising es-
pecially with respect to the fulfillment of some data
controller obligations as stated by the GDPR. We are
currently working towards structuring and extending
more our language, in order to support more data pro-
tection use cases, looking at personal data but also at
more in general, confidential information especially
in the cyber security domain.
ACKNOWLEDGEMENTS
This work was partly supported by EC-funded pro-
jects Coco Cloud [grant no. 610853] and by C3ISP
[grand no. 700294].
REFERENCES
Bird and LLC, B. (2018). China cybersecurity law update:
Personal information national standards officially pu-
blished. https://www.twobirds.com. Accessed: 2018-
06-20.
Caimi, C., Gambardella, C., Manea, M., Petrocchi, M., and
Stella, D. (2015). Legal and technical perspectives
in data sharing agreements definition. In Berendt,
B., Engel, T., Ikonomou, D., M
´
etayer, D. L., and
Schiffner, S., editors, Privacy Technologies and Po-
licy - Third Annual Privacy Forum, APF 2015, Lux-
embourg, October 7-8, 2015, Revised Selected Papers,
volume 9484 of Lecture Notes in Computer Science,
pages 178–192. Springer.
Coco Cloud Consortium (2016). Coco Cloud website.
http://www.coco-cloud.eu.
Colombo, M., Lazouski, A., Martinelli, F., and Mori, P.
(2010). A Proposal on Enhancing XACML with Conti-
nuous Usage Control Features, pages 133–146. Sprin-
ger US, Boston, MA.
Di Cerbo, F., Some, D. F., Gomez, L., and Trabelsi, S.
(2015). PPL v2.0: Uniform data access and usage
control on cloud and mobile. In Matteucci, I., Mori,
P., and Petrocchi, M., editors, 1st IEEE/ACM Inter-
national Workshop on TEchnical and LEgal aspects
of data pRIvacy and SEcurity, TELERISE 2015, Flo-
rence, Italy, May 18, 2015, pages 2–7. IEEE Computer
Society.
European Parliament and Council (2016). Regulation
(EU) 2016/679 of the European Parliament and of
the Council (General Data Protection Regulation). 27
April 2016 - http://goo.gl/LfwxGe.
Lazouski, A., Mancini, G., Martinelli, F., and Mori, P.
(2012). Usage control in cloud systems. In Savage,
N., Assad, S. E., and Shoniregun, C. A., editors, 7th
International Conference for Internet Technology and
Secured Transactions, ICITST 2012, London, Uni-
ted Kingdom, December 10-12, 2012, pages 202–207.
IEEE.
OASIS (2010). eXtensible Access Control Markup Lan-
guage (XACML) Version 3.0.
Park, J. and Sandhu, R. (2004). The UCON ABC usage
control model. ACM Transactions on Information and
System Security (TISSEC), 7(1):128–174.
Pearson, S. and Casassa Mont, M. (2011). Sticky poli-
cies: An approach for managing privacy across multi-
ple parties. Computer, 44(9):60–68.
Standing Committee of the National People’s Con-
gress (2017). Cyber security law (draft).
http://www.npc.gov.cn/npc/xinwen/lfgz/flca/2015-
07/06/content 1940614.htm. Accessed: 2018-06-20.
Trabelsi, S., Njeh, A., Bussard, L., and Neven, G. (2010).
Ppl engine: A symmetric architecture for privacy po-
licy handling. In W3C Workshop on Privacy and data
usage control, volume 4.
Zhang, X., Parisi-Presicce, F., Sandhu, R., and Park, J.
(2005). Formal model and policy specification of
usage control. ACM Trans. Inf. Syst. Secur., 8(4):351–
387.
Towards a Declarative Approach to Stateful and Stateless Usage Control for Data Protection
315