Contribution to Privacy
Antonio Kung
Trialog
3 December 2009 Joint eSecurity - Article 29WG Slide 1
PRECIOSA
PRivacy Enabled Capability In co-Operative
systems and Safety Applications
FP7 STREP Project
1/3/2008-31/8/2010
www.preciosa-project.org
3 December 2009 Joint eSecurity - Article 29WG Slide 2
Goal and Objectives
Goal
Ensure that co-operative systems meet (future)
privacy regulations
Demonstrate an example application with suitable
technology for privacy protection
Objectives
approach for privacy by design
privacy verifiability
privacy aware architecture
guidelines for privacy by design
specific research challenges
3 December 2009 Joint eSecurity - Article 29WG Slide 3
Technical Concept
Privacy Perimeter
Examples
Control Vehicle
centre Box
Control Vehicle
centre Box
3 December 2009 Joint eSecurity - Article 29WG Slide 4
Technical Concept
Enforce privacy policy within perimeter
Four elements
Data
Policy (allowed operations)
Mandatory Privacy Control (enforces policy)
Policy Perimeter Protection (ensures integrity)
Describes allowed
Protects policy Only allows operations on data
perimeter policy compliant
integrity operations on data
PPP MPC Policy Data
3 December 2009 Joint eSecurity - Article 29WG Slide 5
PRECIOSA Concept vs PETs
PETS are often described as a list of
technologies:
Encryption
Anonymisation and pseudonymisation
Securely management of logins
…
PRECIOSA Viewpoint
System oriented new PET category
Policy Enforcement PET
3 December 2009 Joint eSecurity - Article 29WG Slide 6
PRECIOSA Shift
From organisational enforcement
Data controller
Sphere of Measures Organizational
responsibility
Policy Enforcement
To technical enforcement
Data controller
Sphere of Measures Technical
responsibility
Policy Enforcement
3 December 2009 Joint eSecurity - Article 29WG Slide 7
Technologies (PETs)
Storage Secure
access through Application
Metadata Query-based API
Data and meta data
MPC (Mandatory Privacy Control)
bound together
securely Data+Metadata manipulation
MPC verifies policy Secure Secure
stored in meta data Local Communi-
Storage cation
Access through a
query-based API
3 December 2009 Joint eSecurity - Article 29WG Slide 8
Technologies (PETs)
Communication
Pseudonymisation Application
(from Sevecom)
Query-based API
Trusted computing for
remote attestation MPC (Mandatory Privacy Control)
Data+Metadata manipulation
Secure Secure
Local Communi-
Storage cation
3 December 2009 Joint eSecurity - Article 29WG Slide 9
Conclusion
PRECIOSA promotes
Privacy by design
Privacy preservation (vs privacy enhancement)
PRECIOSA PET
Policy enforcement PET
Notion of distributed perimeter could lead to notion
of logical minimisation
E.g. Lots of data collected, but very limited access
3 December 2009 Joint eSecurity - Article 29WG Slide 10