Dismantling the Twelve Privacy Purposes

Post on 08-Jul-2015

158 views 2 download

Tags:

Transcript of Dismantling the Twelve Privacy Purposes

Dismantling the Twelve Privacy Purposes

Sabah S. Al-Fedaghi

Department of Computer Engineering

Kuwait University

sabah@eng.kuniv.edu.kw

IFIP 2007

Agenda

• Contribution: Focusing fundamental terms of informational privacy

• Problems with Purpose

• Definitions

• Purposes and P3P

• Framework for replacing Purpose

• Dismantling “CURRENT”

• Dismantling “ADMIN”

ContributionThe Platform for Privacy Preferences (P3P)EPAL XACMLHippocratic databases In spite of these impressive systems, insufficient attention

is directed to fundamental terms of informational privacy.

P3P is singled out since it is the oldest of these projects that is supposed to reach a mature foundation of specification ; however, the implication applies similarly to other projects..

I direct my efforts on the most important notion in P3P and other systems: purpose.

Purpose appears in all privacy guidelines, codes, policies, and legislations. It plays a central role in many privacy-related systems.

Purpose commonly is defined in general terms as how the collected data can be used, or the intended use of the data element, or a description of the reason(s) for data collection and data access.

Purpose appears as uses (e.g., delivery of purchase) of personal information and acts (e.g., research) on personal information

• Claim: P3P 12 standard purposes mix uses of personal information (PI) with acts on personal information and mix uses of personal information privacy with other states of affairs that have several interpretations. Some purposes are not even strongly privacy-related purposes.

• Proposal: to use chains of information handling that let the user exercise more control on the use of his/her PI and allow the personal information (PI) gatherer to excise more control on the processing and accessing of information in its procession.

Problems with Purpose

Purpose is defined in the 2006 W3C Working P3P Draft as

“The reason(s) for data collection and use.”

Reasons are given in response to

why questions.

REASON

?

(1) I need to know how

However, there remains the equally important: How do you utilize my money? Acts on PI?

To answer this question, you don’t give me reasons but actions. For example,

- I will use it to buy and sell stocks, or - I will buy with it old houses to renovate and sell for

profit. • I would be foolish if I were satisfied with only the

answer to the why question.This is approximately the logic of personal information

exchange in P3P. We will propose a mechanism to specify the answer to the how and why questions concurrently.

(2) Separating the why from the howThe P3P 12 purposes specifications sometimes reflect

the answer to the how question rather than reasons that answer the why question.

Example, the P3P purpose: ‘to determine the habits, interests, or other characteristics of individuals and combine it with identified data to make a decision that directly affects that individual’”

An answer to the how question (act on PI), An answer to the why question (use of PI) This separation is important because there are a limited

number (19 acts) of ways of how to act on personal information; hence, the answer to the why question can be specified in a precise manner.

(3) Several interpretations of the same purpose• The interpretation of the 12 P3P purposes is overly

verbose. According to Thibadeau,

We could have hundreds of very specific purposes. For people who know about the science of human intentionality, it makes sense to be able to list many specific purposes…and the writers of the 1.0 working draft specification…understand that a purpose or intent is actually a simple thing to state and evaluate [15].

Answering the how question uncovers multiple interpretations of the answer to the question “Why are you collecting and using my personal information?”

(4) Is this a privacy-related purpose?

The 12 P3P purposes sometimes sway away from privacy-related situations. A P3P purpose, “Information may be used to…without tying identified data,” doesn’t deal with personal information defined as personally-identifying information. If these purposes are necessary, then they should not be mixed in the same basket with personal information use purposes.

Definitions

Personal information is information that

refers

to uniquely identifiable individuals.

 

 

Privacy Other types of Privacy

E.g.,

Physical privacy

Communication privacy

“Non-personal information“ privacy

Personal Information Privacy

What is Personal Information Privacy?

What is personal Information?

Two fundamental types of entit ies:

Persons (natural persons)

Non-persons (e.g., company, government agency, etc.)

Information is of two types:

(i) Non-personal information: Information that has no referent that signifies persons

i i) Personal information: Information that refers to persons.

(a) Atomic: Information that has a single referent that signif ies a single person.

(b) Compound: Information that has more than one referent that signif ies persons.

Spare part x2345 is in store B5 Non-personal information

John is tall and handsome

John, Alice, and Robert hate each other

Proprietors

Theorem: Any compound personal information is privacy-reducible to a set of atomic personal information.

(Al-Fedaghi PST 2005)

E.g., John hates someone, Someone hates John, …

 

 

“Non-personal information“ privacy

Non-personal information:

E.g., architectural sketches

Informational privacy but not personal information privacy

 

 

Types of Personal Information Privacy

Personal information of Jane Jane

John

Personal information of Jane’s friend Alice

Personal information of John

(he is unaware of it)

Who’s privacy is this?

Personal Information Flow Model (PIFM)

The personal information flow model divides the functionality of handling PI in five stages:

● creating

● collecting

● processing

● disclosing

● communicating

Some stages includes sub-stages

Utilize Store Creating

Processing

Collecting

Store

StoreUse

Use

Mining

Store Use

Disclosing

Communicating

Non-Repudiation Authentication

IFIP 2007

Proprietor’s Region Agent’s Region

N

K L M

F

A

F

O E

I P

J

Non-proprietor

Creating

Processing

Collecting

Store

Store

Utilize

Utilize

Mining

Store

Utilize

Disclosing

Disclosing

Figure 3. Architecture of Proprietor/Agent PI flow

Proprietor’s Region Agent’s Region

Non-proprietorCreating

Processing

Collecting

Store

StoreUse

Mining

Store Use

Disclosing

Disclosing

Use

Collecting

Proprietor’s Region Agent’s Region

N

K L M

F

A

F

O E

I P

J

Non-proprietor

Creating

Processing

Collecting

Store

Store

Utilize

Utilize

Mining

Store

Utilize

Disclosing

Disclosing

Figure 3. Architecture of Proprietor/Agent PI flow

Proprietor’s Region Agents’ Regions

Agent 1 Agent 2 Agent 3

Collecting

Disclosing

Collected PI

Collecting

Collecting

Processing

Disclosing processed PI

Mining

Disclosing

Created PI

Disclosing

By

proprietor

Collecting

Creating

Processing

Purposes and P3PIn P3P, we find 12 declared standard purposes: current,

admin, develop, tailoring, pseudo-analysis, pseudo-decision, individual-analysis, individual-decision, contact, historical, telemarketing, and other-purpose. The purpose element in P3P contains one or more of these pre-defined values and can be qualified with values such as opt-in, opt-out, and always.

• Not specific, since it is possible to produce an infinite number of these purposes.

• Mixing uses of personal information with acts on personal information.

• Mixing uses of personal information privacy with other states of affairs that have several interpretations.

In order to dismantle these purposes, we need to construct a framework for the semantics of acts and uses.

Framework for replacing PurposeActs: performing an action on somethingUses: putting something to a particular purpose.Consider the case of acts and uses with respect to

grapes: (5) Acts on grape: Plant it; Eat it; Collect it,

Store it, Dry it …(6) (2) Uses of grape: Medical treatment of a

person, Decorating cakes (eyes in a face), Celebrating [I/others], Teaching students addition and subtraction, Fueling cars (bioethanol fuel).

To distinguish between acts and uses, utilize the structure of agent/action/patient shown in the Figure . It includes an agent who acts on a patient. “Patient” is the object that receives the action.

• For acts: actor/acts-on/patient.

• For uses, the model involves a third entity: the usee.

The usee is the one used by the agent to act on a patient. For example, a physician uses personal information to treat a patient.

act

Agent Patient

use

agent usee

act

patient

Dismantling “CURRENT”According to P3P, the purpose “current” refers

to:• Completion and Support of Activity For

Which Data Was Provided: Information may be used by the service provider to complete the activity for which it was provided, whether a one-time activity such as returning the results from a Web search, forwarding an email message, or placing an order; or a recurring activity such as providing a subscription service; or allowing access to an online address book or electronic wallet.

We show that this purpose:

• Mixes (infinite) uses and (limited number of) acts

• Displays uses that have several interpretations (several possible chains)

• Displays acts that have several interpretations (several possible chains)

Mixing Uses and Acts

The definition of P3P purposes mixes acts and uses,

Examples given by P3P

act Forwarding an email message (PI)

use Providing a subscription service

Example: Consider the phrase

“Completion and Support of Activity For Which Data Was Provided.”

Analogously,

Taking money to complete and support activities for which you give me your money.

- Taking money to sell laptop.

Purpose: I am taking your money to complete and support delivering the laptop to you (use).

Acts on money can include paying money to my employees, paying money for others (DHL, manufacturer), charging money, converting money …

Delivering laptop Returning the results from a Web search

Money examples P3P Examples

Allowing access to workshop Allowing access to an online address book or electronic wallet

Providing a maintenance service for laptop

Providing a subscription service

Placing an order for laptopPlacing an order

Transferring money Forwarding an email message

• Uses have several interpretations

In P3P’s purpose “current”: uses have several interpretations. Figure 5 shows one possible interpretation. PI is collected and then used without processing it or disclosing it. Yet, another interpretation is possible in another stage.

Proprietor

Disclosing Collecting

Uses:

• Returning the results from a Web search

• Placing an order

• Providing a subscription service

• Allowing access to an

online address

Proprietor’s Region Agent’s Region

N

K L M

F

A

F

O E

I P

J

Non-proprietor

Creating

Processing

Collecting

Store

Store

Utilize

Utilize

Mining

Store

Utilize

Disclosing

Disclosing

Figure 3. Architecture of Proprietor/Agent PI flow

Proprietor’s Region Agent’s Region

Non-proprietorCreating

Processing

Collecting

Store

StoreUse

Mining

Store

Use

Disclosing

Disclosing

Use

Collecting

DISMANTLING “ADMIN”

P3P “Admin” purpose refers to:

Web Site and System Administration: Information may be used for the technical support of the Web site and its computer system. This would include processing computer account information, information used in the course of securing and maintaining the site, and verification of Web site activity by the site or its agents. This would include

(1) Processing computer account information,

(2) Information used in the course of securing and maintaining the site,

(3) Verification of Web site activity by the site or its agents.

This method of description juxtaposes acts and uses. In our method, it can be written (or graphed) systematically as:

PI is gathered, processed and used [acts on PI] for [uses of PI]:

• The technical support of the Web site and its computer system

• Securing and maintaining the site

Notice how such a statement reflects the sub-graph in the PIFM:

gathering processing using different types of usage.

Gather Process Use:

1.The technical support of the Web site and its computer system

2. Securing and maintaining the site

Processing Using?

Proprietor’s Region Agent’s Region

N

K L M

F

A

F

O E

I P

J

Non-proprietor

Creating

Processing

Collecting

Store

Store

Utilize

Utilize

Mining

Store

Utilize

Disclosing

Disclosing

Figure 3. Architecture of Proprietor/Agent PI flow

Proprietor’s Region Agent’s Region

Creating

Processing

Collecting

Store

StoreUse

Mining

StoreUse

Disclosing

Disclosing

Use

Conclusion

● The concept of purpose is a central notion in informational privacy.

● It can be formalized based on the notions of:

Acts on personal information

Uses of personal information

Flow model with specific number of acts on personal information

● Purpose = Acts on PI (sub-graphs) + Uses of PI

THANK YOU