Cloud Privacy Beyond Legal Compliance: An NLP analysis of certifiable privacy and security standards

被引:0
|
作者
Kilhoffer, Zachary [1 ]
Bashir, Masooda [1 ]
机构
[1] Univ Illinois, Sch Informat Sci, Champaign, IL 61801 USA
来源
2024 IEEE CLOUD SUMMIT, CLOUD SUMMIT 2024 | 2024年
关键词
privacy; security; certification; controls; standards;
D O I
10.1109/Cloud-Summit61220.2024.00020
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
By implementing standards and becoming certified, organizations can demonstrate good practices and trustworthiness. However, privacy standards are relatively immature, and the privacy research community rarely examines the individual controls of organizational standards (e.g., ISO 27017, SOC-2), which are what concretely implements privacy principles. It is also very time-consuming to monitor evolving standards, assess relevance and usefulness in a given context, and whether the effort and expense of becoming certified makes sense. In this paper, we propose an exploratory method leveraging a large language model (LLM) to analyze privacy documents. We created a dataset of controls (n=1,511) from all nine standards identified as certifiable, cloud relevant, and privacy relevant. We fine-tuned BERT, a popular baseline LLM, to optimize performance on privacy standards. Finally, we performed topic modeling to better understand how the standards address privacy challenges and compare to one another. We demonstrate that controls can be grouped into 11 topics (e.g., "PII Management", "Continuous Monitoring and Auditing in Cloud"). Most standards seem to strongly emphasize the security and risk angles of privacy rather than rights and control over data. The results suggest efforts to standardize privacy practices are still nascent - more time, practice, and theoretical agreement is required before privacy standards approach the rigor of their security counterparts. By providing our fine-tuned model, coding pipeline, and method, we demonstrate the utility of this approach to better compare and understand privacy standards and other documentation for assessment and refining.
引用
收藏
页码:79 / 86
页数:8
相关论文
共 50 条
  • [1] Cloud computing security and privacy: Standards and regulations
    Yu, Yong
    Miyaji, Atsuko
    Au, Man Ho
    Susilo, Willy
    COMPUTER STANDARDS & INTERFACES, 2017, 54 : 1 - 2
  • [2] Evaluating existing security and privacy requirements for legal compliance
    Aaron K. Massey
    Paul N. Otto
    Lauren J. Hayward
    Annie I. Antón
    Requirements Engineering, 2010, 15 : 119 - 137
  • [3] Evaluating existing security and privacy requirements for legal compliance
    Massey, Aaron K.
    Otto, Paul N.
    Hayward, Lauren J.
    Anton, Annie I.
    REQUIREMENTS ENGINEERING, 2010, 15 (01) : 119 - 137
  • [4] Cloud Security and Privacy Metamodel Metamodel for Security and Privacy Knowledge in Cloud Services
    Xia, Tian
    Washizaki, Hironori
    Kato, Takehisa
    Kaiya, Haruhiko
    Ogata, Shinpei
    Fernandez, Eduardo B.
    Kanuka, Hideyuki
    Yoshino, Masayuki
    Yamamoto, Dan
    Okubo, Takao
    Yoshioka, Nobukazu
    Hazeyama, Atsuo
    PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON MODEL-DRIVEN ENGINEERING AND SOFTWARE DEVELOPMENT, 2018, : 379 - 386
  • [5] Legal, Privacy, Security, Access and Regulatory Issues in Cloud Computing
    Dlodlo, Nomusa
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON INFORMATION MANAGEMENT AND EVALUATION, 2011, : 161 - 168
  • [6] Security Analysis and Legal Compliance Checking for the Design of Privacy-friendly Information Systems
    Guarda, Paolo
    Ranise, Silvio
    Siswantoro, Hari
    PROCEEDINGS OF THE 22ND ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES (SACMAT'17), 2017, : 247 - 254
  • [7] Compliance of privacy policies with legal regulations compliance of privacy policies with Canadian PIPEDA
    Zhang, Nolan
    Bodorik, Peter
    Jutla, Dawn
    ICE-B 2007: PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON E-BUSINESS, 2007, : 277 - +
  • [8] Analysis of Security and Privacy in Public Cloud Environment
    Raja, Abdul Sattar
    Abd Razak, Shukor
    2015 INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (ICCC), 2015, : 53 - 58
  • [9] Privacy, Security, Legal and Technology Acceptance Requirements for a GDPR Compliance Platform
    Tsohou, Aggeliki
    Magkos, Manos
    Mouratidis, Haralambos
    Chrysoloras, George
    Piras, Luca
    Pavlidis, Michalis
    Debussche, Julien
    Rotoloni, Marco
    Gallego-Nicasio Crespo, Beatriz
    COMPUTER SECURITY, ESORICS 2019, 2020, 11980 : 204 - 223
  • [10] Legal issues of security and privacy
    Anon
    Newspaper Techniques, 2002, (JAN.):