Cloud Privacy Beyond Legal Compliance: An NLP analysis of certifiable privacy and security standards

被引:0
|
作者
Kilhoffer, Zachary [1 ]
Bashir, Masooda [1 ]
机构
[1] Univ Illinois, Sch Informat Sci, Champaign, IL 61801 USA
来源
2024 IEEE CLOUD SUMMIT, CLOUD SUMMIT 2024 | 2024年
关键词
privacy; security; certification; controls; standards;
D O I
10.1109/Cloud-Summit61220.2024.00020
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
By implementing standards and becoming certified, organizations can demonstrate good practices and trustworthiness. However, privacy standards are relatively immature, and the privacy research community rarely examines the individual controls of organizational standards (e.g., ISO 27017, SOC-2), which are what concretely implements privacy principles. It is also very time-consuming to monitor evolving standards, assess relevance and usefulness in a given context, and whether the effort and expense of becoming certified makes sense. In this paper, we propose an exploratory method leveraging a large language model (LLM) to analyze privacy documents. We created a dataset of controls (n=1,511) from all nine standards identified as certifiable, cloud relevant, and privacy relevant. We fine-tuned BERT, a popular baseline LLM, to optimize performance on privacy standards. Finally, we performed topic modeling to better understand how the standards address privacy challenges and compare to one another. We demonstrate that controls can be grouped into 11 topics (e.g., "PII Management", "Continuous Monitoring and Auditing in Cloud"). Most standards seem to strongly emphasize the security and risk angles of privacy rather than rights and control over data. The results suggest efforts to standardize privacy practices are still nascent - more time, practice, and theoretical agreement is required before privacy standards approach the rigor of their security counterparts. By providing our fine-tuned model, coding pipeline, and method, we demonstrate the utility of this approach to better compare and understand privacy standards and other documentation for assessment and refining.
引用
收藏
页码:79 / 86
页数:8
相关论文
共 50 条
  • [41] User Privacy and Security in Cloud Computing
    Waleed, AL-Museelem
    Li Chunlin
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (02): : 341 - 352
  • [42] Who Is Responsible for Security and Privacy in the Cloud?
    Dasgupta, Dipankar
    COMPUTER INFORMATION SYSTEMS - ANALYSIS AND TECHNOLOGIES, 2011, 245 : 4 - 4
  • [43] Engineering Cryptography for Security and Privacy in the Cloud
    Krenn, Stephan
    Loruenser, Thomas
    Striecks, Christoph
    ERCIM NEWS, 2018, (113): : 53 - 54
  • [44] Privacy, security, legal and technology acceptance elicited and consolidated requirements for a GDPR compliance platform
    Tsohou, Aggeliki
    Magkos, Emmanouil
    Mouratidis, Haralambos
    Chrysoloras, George
    Piras, Luca
    Pavlidis, Michalis
    Debussche, Julien
    Rotoloni, Marco
    Crespo, Beatriz Gallego-Nicasio
    INFORMATION AND COMPUTER SECURITY, 2020, 28 (04) : 531 - 553
  • [45] Security and Privacy Implications of Cloud Computing - Lost in the Cloud
    Tchifilionova, Vassilka
    OPEN RESEARCH PROBLEMS IN NETWORK SECURITY, 2011, 6555 : 149 - 158
  • [46] Privacy and Security Security for Mobile and Cloud Frontiers in Healthcare
    Kotz, David
    Fu, Kevin
    Gunter, Carl
    Rubin, Avi
    COMMUNICATIONS OF THE ACM, 2015, 58 (08) : 21 - 23
  • [47] Compliance as baseline, or striving for more? How Privacy Engineers Work and Use Privacy Standards
    Kilhoffer, Zachary
    Wilder, Devyn
    Bashir, Masooda
    9TH IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS, EUROS&PW 2024, 2024, : 9 - 18
  • [48] Privacy and Legal Issues in Cloud Computing.
    Glenster, Ann Kristin
    CAMBRIDGE LAW JOURNAL, 2016, 75 (01): : 174 - 176
  • [49] A Framework for Privacy and Security Requirements Analysis and Conflict Resolution for Supporting GDPR Compliance Through Privacy-by-Design
    Alkubaisy, Duaa
    Piras, Luca
    Al-Obeidallah, Mohammed Ghazi
    Cox, Karl
    Mouratidis, Haralambos
    EVALUATION OF NOVEL APPROACHES TO SOFTWARE ENGINEERING (ENASE 2021), 2022, 1556 : 67 - 87
  • [50] RIGHT TO FINANCIAL PRIVACY - EMERGING STANDARDS OF BANK COMPLIANCE
    JONES, SE
    BANKING LAW JOURNAL, 1988, 105 (01): : 37 - 51