Cloud Privacy Beyond Legal Compliance: An NLP analysis of certifiable privacy and security standards

被引:0
|
作者
Kilhoffer, Zachary [1 ]
Bashir, Masooda [1 ]
机构
[1] Univ Illinois, Sch Informat Sci, Champaign, IL 61801 USA
来源
2024 IEEE CLOUD SUMMIT, CLOUD SUMMIT 2024 | 2024年
关键词
privacy; security; certification; controls; standards;
D O I
10.1109/Cloud-Summit61220.2024.00020
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
By implementing standards and becoming certified, organizations can demonstrate good practices and trustworthiness. However, privacy standards are relatively immature, and the privacy research community rarely examines the individual controls of organizational standards (e.g., ISO 27017, SOC-2), which are what concretely implements privacy principles. It is also very time-consuming to monitor evolving standards, assess relevance and usefulness in a given context, and whether the effort and expense of becoming certified makes sense. In this paper, we propose an exploratory method leveraging a large language model (LLM) to analyze privacy documents. We created a dataset of controls (n=1,511) from all nine standards identified as certifiable, cloud relevant, and privacy relevant. We fine-tuned BERT, a popular baseline LLM, to optimize performance on privacy standards. Finally, we performed topic modeling to better understand how the standards address privacy challenges and compare to one another. We demonstrate that controls can be grouped into 11 topics (e.g., "PII Management", "Continuous Monitoring and Auditing in Cloud"). Most standards seem to strongly emphasize the security and risk angles of privacy rather than rights and control over data. The results suggest efforts to standardize privacy practices are still nascent - more time, practice, and theoretical agreement is required before privacy standards approach the rigor of their security counterparts. By providing our fine-tuned model, coding pipeline, and method, we demonstrate the utility of this approach to better compare and understand privacy standards and other documentation for assessment and refining.
引用
收藏
页码:79 / 86
页数:8
相关论文
共 50 条
  • [21] Cloud Security Ecosystem for Data Security and Privacy
    Arora, Akshay
    Khanna, Abhirup
    Rastogi, Anmol
    Agarwal, Amit
    PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING, DATA SCIENCE AND ENGINEERING (CONFLUENCE 2017), 2017, : 288 - 292
  • [22] Confidentiality and privacy: beyond legal duties
    Thomson, CJH
    MEDICAL JOURNAL OF AUSTRALIA, 2003, 178 (06) : 252 - +
  • [23] IT Security and Privacy Standards in Comparison Improving FedRAMP Authorization for Cloud Service Providers
    Di Giulio, Carlo
    Kamhoua, Charles
    Campbell, Roy H.
    Sprabery, Read
    Kwiat, Kevin
    Bashir, Masooda N.
    2017 17TH IEEE/ACM INTERNATIONAL SYMPOSIUM ON CLUSTER, CLOUD AND GRID COMPUTING (CCGRID), 2017, : 1090 - 1099
  • [24] VOIP FOR TELEREHABILITATION: A RISK ANALYSIS FOR PRIVACY, SECURITY, AND HIPAA COMPLIANCE
    Cohn, Ellen R.
    INTERNATIONAL JOURNAL OF TELEREHABILITATION, 2010, 2 (02): : 1 - 1
  • [25] Privacy, Security, and Legal Issues in the Health Cloud: Structured Review for Taxonomy Development
    Zandesh, Zahra
    JMIR FORMATIVE RESEARCH, 2024, 8
  • [26] Managing information privacy - Developing a context for security and privacy standards convergence
    Robbins, Jim
    Sabo, John T.
    IEEE SECURITY & PRIVACY, 2006, 4 (04) : 92 - 95
  • [27] Security and privacy issues in cloud computing
    Haider Abbas
    Olaf Maennel
    Saïd Assar
    Annals of Telecommunications, 2017, 72 : 233 - 235
  • [28] Cloud Computing: Security, Privacy and Practice
    Xiang, Yang
    Di Martino, Beniamino
    Wang, Guilin
    Li, Jin
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF GRID COMPUTING AND ESCIENCE, 2015, 52 : 59 - 60
  • [29] Multiuser Privacy and Security Conflicts in the Cloud
    Alhelali, Eman
    Ramokapane, Kopo M.
    Such, Jose
    PROCEEDINGS OF THE 2023 CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS (CHI 2023), 2023,
  • [30] Data Security and Privacy in Cloud Storage
    Xinhua Dong
    Ruixuan Li
    Wanwan Zhou
    Dongjie Liao
    Shuoyi Zhao
    ZTECommunications, 2013, 11 (02) : 18 - 23