Schaefer et al. (2018) present a definition of rules
for achieving Confidentiality-by-Construction, where
functional specifications are replaced by confidential-
ity specifications listing which variables contain se-
crets. Though the approach seems interesting, it has
(to the best of our knowledge) not been implemented.
Tuma et al. (2019) analyse information flow poli-
cies at the modelling level. They focus on data confi-
dentiality and integrity, and introduce a graphical no-
tation based on DFDs to algorithmically detect design
flaws “in the form of violations of the intended secu-
rity properties”. They provide an Eclipse-based im-
plementation. Their approach is also based on DFDs
but has different objectives: while we focus on the
implementation of model transformation for specific
privacy checks, Tuma et al. focus on the detection of
design flaws associated with security properties.
Our paper distinguishes itself in that none of the
above has taken the approach to automatically add
privacy checks to design models.
6 CONCLUSIONS
We have provided algorithms to automatically trans-
late DFD models into privacy-aware DFDs (PA-
DFDs) as well as a proof-of-concept implementation
integrated into a graphical tool for drawing DFDs.
Obtaining the algorithms (from the existing concep-
tual transformation) was not easy as some aspects
of the transformation were subtle and ambiguous not
allowing for a direct implementation. We have ad-
dressed these conceptual flaws and evaluated them
through two case studies: an automated payment sys-
tem and an online retail system.
One limitation of our approach is that the dia-
grams resulting form our transformation can be large,
making it difficult to visualise them. That said, the
intended use of this tool is as an intermediate step
in the design and development process, so the soft-
ware architect can still be able to inspect (and mod-
ify) only small and relevant subsets of the PA-DFD.
Our next step is to implement an algorithm to auto-
matically synthesise a template from the PA-DFD in
Java or Python. We will provide the programmer with
predefined libraries to be used as building blocks for
implementing such privacy checks.
REFERENCES
Alshareef, H., Stucki, S., and Schneider, G. (2020). Trans-
forming data flow diagrams for privacy compliance
(long version). CoRR, abs/2011.12028.
Antignac, T., Scandariato, R., and Schneider, G. (2016). A
privacy-aware conceptual model for handling personal
data. In ISoLA’16, pages 942–957.
Antignac, T., Scandariato, R., and Schneider, G. (2018).
Privacy compliance via model transformations. In
IWPE’18, pages 120–126. IEEE.
Basin, D., Debois, S., and Hildebrandt, T. (2018). On pur-
pose and by necessity: compliance under the GDPR.
In FC’18, pages 20–37. Springer.
Cavoukian, A. (2012). Privacy by design: origins, mean-
ing, and prospects for assuring privacy and trust in the
information era. In Privacy Protection Measures and
Tech. in Business Org., pages 170–208. IGI Global.
Chong, H.-Y. and Diamantopoulos, A. (2020). Integrat-
ing advanced technologies to uphold security of pay-
ment: Data flow diagram. Automation in Construc-
tion, 114:103–158.
Danezis, G., Domingo-Ferrer, J., Hansen, M., Hoepman,
J.-H., Le Métayer, D., Tirtea, R., and Schiffner, S.
(2015). Privacy and data protection by design. ENISA
Report.
Dennis, A., Wixom, B. H., and Roth, R. M. (2018). Systems
analysis and design. John wiley & sons.
draw.io (2019). draw.io. https://www.draw.io/.
European Commission (2016). General data protection
regulation (GDPR). Regulation 2016/679, European
Commission.
Falkenberg, E., Pols, R. V. D., and Weide, T. V. D. (1991).
Understanding process structure diagrams. Informa-
tion Systems, 16(4):417 – 428.
Freitas, M. and Mira da Silva, M. (2018). GDPR compli-
ance in SMEs: There is much to be done. J. Inform.
Systems Eng., 3(4):30.
Henriksen, M. (2018). Draw.io libraries for threat mod-
eling diagrams. https://github.com/michenriksen/
drawio-threatmodeling.
Hert, P. D. and Papakonstantinou, V. (2016). The new gen-
eral data protection regulation: Still a sound system
for the protection of individuals? Computer Law &
Security Review, 32(2):179–194.
Oetzel, M. C. and Spiekermann, S. (2014). A systematic
methodology for privacy impact assessments: a de-
sign science approach. European Journal of Informa-
tion Systems, 23(2):126–150.
Schaefer, I., Runge, T., Knüppel, A., Cleophas, L., Kourie,
D., and Watson, B. W. (2018). Towards con-
fidentiality-by-construction. In ISoLA’18. Springer.
Schneider, G. (2018). Is privacy by construction possible?
In ISoLA’18, pages 471–485. Springer.
Senarath, A. and Arachchilage, N. A. (2018). Why devel-
opers cannot embed privacy into software systems? an
empirical investigation. In EASE’18, pages 211–216.
Shostack, A. (2014). Threat modeling: Designing for secu-
rity. John Wiley & Sons.
Sirur, S., Nurse, J. R., and Webb, H. (2018). Are we there
yet? Understanding the challenges faced in complying
with the general data protection regulation (GDPR). In
MPS’18, pages 88–95. ACM.
Tsormpatzoudi, P., Berendt, B., and Coudert, F. (2015). Pri-
vacy by design: From research and policy to prac-
MODELSWARD 2021 - 9th International Conference on Model-Driven Engineering and Software Development
214