Pseudonymization risk analysis in distributed systems

被引:6
|
作者
Neumann, Geoffrey K. [1 ]
Grace, Paul [1 ]
Burns, Daniel [1 ]
Surridge, Mike [1 ]
机构
[1] Univ Southampton, IT Innovat, Gamma House,Enterprise Rd, Southampton SO16 7NS, Hants, England
关键词
Privacy; Pseudonymization; Risk analysis; PRIVACY;
D O I
10.1186/s13174-018-0098-z
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In an era of big data, online services are becoming increasingly data-centric; they collect, process, analyze and anonymously disclose growing amounts of personal data in the form of pseudonymized data sets. It is crucial that such systems are engineered to both protect individual user (data subject) privacy and give back control of personal data to the user. In terms of pseudonymized data this means that unwanted individuals should not be able to deduce sensitive information about the user. However, the plethora of pseudonymization algorithms and tuneable parameters that currently exist make it difficult for a non expert developer (data controller) to understand and realise strong privacy guarantees. In this paper we propose a principled Model-Driven Engineering (MDE) framework to model data services in terms of their pseudonymization strategies and identify the risks to breaches of user privacy. A developer can explore alternative pseudonymization strategies to determine the effectiveness of their pseudonymization strategy in terms of quantifiable metrics: i) violations of privacy requirements for every user in the current data set; ii) the trade-off between conforming to these requirements and the usefulness of the data for its intended purposes. We demonstrate through an experimental evaluation that the information provided by the framework is useful, particularly in complex situations where privacy requirements are different for different users, and can inform decisions to optimize a chosen strategy in comparison to applying an off-the-shelf algorithm.
引用
收藏
页数:16
相关论文
共 50 条
  • [21] Parallel Cost Analysis of Distributed Systems
    Albert, Elvira
    Correas, Jesus
    Johnsen, Einar Broch
    Roman-Diez, Guillermo
    STATIC ANALYSIS (SAS 2015), 2015, 9291 : 275 - 292
  • [22] Simulation and Analysis of Distributed Systems in KLAIM
    Calzolai, Francesco
    Loreti, Michele
    COORDINATION MODELS AND LANGUAGES, PROCEEDINGS, 2010, 6116 : 122 - 136
  • [23] SOFTWARE SAFETY ANALYSIS IN DISTRIBUTED SYSTEMS
    SHEBALIN, PV
    SON, SH
    CHANG, CH
    COMPUTING SYSTEMS, 1991, 6 (02): : 102 - 116
  • [24] Distributed Performance Analysis of Heterogeneous Systems
    Rantzer, Anders
    49TH IEEE CONFERENCE ON DECISION AND CONTROL (CDC), 2010, : 2682 - 2685
  • [25] Entropic Analysis of Distributed Generation Systems
    Klen K.
    Zhuikov V.
    Radioelectronics and Communications Systems, 2021, 64 (10) : 560 - 571
  • [26] AN ANALYSIS OF REQUIREMENTS FOR THE MANAGEMENT OF DISTRIBUTED SYSTEMS
    DAVIES, JI
    INTEGRATED NETWORK MANAGEMENT, 1, 1989, : 519 - 530
  • [27] Accuracy Analysis of Distributed Simulation Systems
    Lin Qi
    Guo Jing
    6TH INTERNATIONAL SYMPOSIUM ON PRECISION ENGINEERING MEASUREMENTS AND INSTRUMENTATION, 2010, 7544
  • [28] Some analysis in distributed MIMO systems
    Department of Electrical and Computer Engineering, NC State University, Raleigh, NC 27695, United States
    不详
    J. Commun., 2007, 3 (43-50): : 43 - 50
  • [29] Formal specification and analysis of distributed systems
    Kaunas University of Technology, Studentu 50, Kaunas LT-3028, Lithuania
    J Intell Manuf, 6 (559-569):
  • [30] ANALYSIS OF DISTRIBUTED SYSTEMS BY ARRAY ALGEBRA
    SUZUKI, M
    SHIMIZU, K
    INTERNATIONAL JOURNAL OF SYSTEMS SCIENCE, 1990, 21 (01) : 129 - 155