confidentiality of a dataset while reducing the number
of values to be obscured (Caruccio et al., 2020).
5 CONCLUSION
This paper extended SecTro, a requirements
modelling tool, to include privacy patterns that
incorporate GDPR principles. The extended version
of SecTro provides the analyst with a set of patterns
as models, for GDPR principles, which can be used
by the analyst for performing PbD modelling, and
checking current compliance of the modeled system
with GDPR principles. The most recent guidelines
and relevant documentation on GDPR have been used
to identify and design the required privacy patterns,
together with relevant literature and collaboration
with privacy/security experts (from companies and
universities) involved within the DEFeND EU
Project. The privacy patterns have been implemented
on the top of SecTro, and evaluated using a healthcare
scenario where the analyst can model the privacy
aspects at early requirements analysis stages. The
evaluation results suggest that our proposed GDPR
patterns can help analysts in PbD modeling analysis,
by representing GDPR principles and considering
relevant ready-to-use alternatives, towards achieving
GDPR compliance.
REFERENCES
Alkubaisy, D., Piras, L., Al-Obeidallah, M., Cox, K., &
Mouratidis, H. (2021). ConfIs: A tool for privacy and
Security Analysis and Conflict Resolution for
supporting GDPR compliance through privacy-by-
design. Proceedings of the 16th International
Conference on Evaluation of Novel Approaches to
Software Engineering.
Amato, F., Casola, V., Cozzolino, G., De Benedictis, A.,
Mazzocca, N., & Moscato, F. (2021). A security and
privacy validation methodology for e-health
systems. ACM Transactions on Multimedia
Computing, Communications, and Applications
(TOMM), 17(2s), 1-22.
Bincoletto, G. (2020). EDPB Guidelines 4/2019 on Data
Protection by Design and by Default. Eur. Data Prot.
L. Rev., 6, 574.
Caruccio, L., Desiato, D., Polese, G., & Tortora, G. (2020).
GDPR compliant information confidentiality
preservation in big data processing. IEEE Access, 8,
205034-205050.
Diamantopoulou, V., Androutsopoulou, A., Gritzalis, S., &
Charalabidis, Y. (2020). Preserving digital privacy in e-
participation environments: Towards GDPR
compliance. Information, 11(2), 117.
Finck, M., & Pallas, F. (2020). They who must not be
identified—distinguishing personal from non-personal
data under the GDPR. International Data Privacy
Law, 10(1), 11-36.
Koutli, M., Theologou, N., Tryferidis, A., Tzovaras, D.,
Kagkini, A., Zandes, D., ... & Vanya, S. (2019, May).
Secure IoT e-Health applications using VICINITY
framework and GDPR guidelines. In 2019 15th
International Conference on Distributed Computing in
Sensor Systems (DCOSS) (pp. 263-270). IEEE.
Maguire, M. (2001). Methods to support human-centred
design. International journal of human-computer
studies, 55(4), 587-634.
Mouratidis, H., & Giorgini, P. (2007). Secure tropos: a
security-oriented extension of the tropos
methodology. International Journal of Software
Engineering and Knowledge Engineering, 17(02), 285-
309.
Pavlidis, M., Islam, S., & Mouratidis, H. (2011, June). A
CASE tool to support automated modelling and
analysis of security requirements, based on secure
tropos. In International Conference on Advanced
Information Systems Engineering (pp. 95-109).
Springer, Berlin, Heidelberg.
Pavlidis, M., Mouratidis, H., & Islam, S. (2012). Modelling
security using trust based concepts. International
Journal of Secure Software Engineering (IJSSE), 3(2),
36-53.
Pavlidis, M., Mouratidis, H., Panaousis, E., &
Argyropoulos, N. (2017, August). Selecting security
mechanisms in secure tropos. In International
Conference on Trust and Privacy in Digital
Business (pp. 99-114). Springer, Cham.
Piras, L., Al-Obeidallah, M. G., Pavlidis, M., Mouratidis,
H., Tsohou, A., Magkos, E., ... & Crespo, B. G. N.
(2020, September). DEFeND DSM: a data scope
management service for model-based privacy by design
GDPR compliance. In International Conference on
Trust and Privacy in Digital Business (pp. 186-201).
Springer, Cham.
Piras, L., Al-Obeidallah, M. G., Praitano, A., Tsohou, A.,
Mouratidis, H., Gallego-Nicasio Crespo, B., ... &
Zorzino, G. G. (2019, August). DEFeND architecture:
a privacy by design platform for GDPR compliance.
In International Conference on Trust and Privacy in
Digital Business (pp. 78-93). Springer, Cham.
Tomashchuk, O., Li, Y., Landuyt, D. V., & Joosen, W.
(2020, June). Operationalization of privacy and security
requirements for eHealth IoT applications in the context
of GDPR and CSL. In Annual Privacy Forum (pp. 143-
160). Springer, Cham.
Voigt, P., & Von dem Bussche, A. (2017). The eu general
data protection regulation (gdpr). A Practical Guide,
1st Ed., Cham: Springer International
Publishing, 10(3152676), 10-5555.
Wohlin, C., Runeson, P., Höst, M., Ohlsson, M. C.,
Regnell, B., & Wesslén, A. (2012). Experimentation in
software engineering. Springer Science & Business
Media.