Title: Concordia University
1A Hierarchical Approach to the Specification of
Privacy Preferences
2Outline
- 1. Introduction and Theoretical Background
- 2. Hierarchies in Preferences
- 3. Specifying Preferences with Hierarchies
- 4. Conflict Resolution
- 5. Implementation
- 6. Conclusion
3Privacy Introduction
How to protect privacy?
4Theoretic Background
- 1. Hippocratic Databases
- Privacy Metadata (Policy and Preference)
- Compliance Auditing
- K-anonymity
- .etc
- 2. P3P and APPEL
- Policy and Preference in standard
- Defined for web interface to collect data
- XML machine readable preference
- Preference expressed with APPEL rules
5Related Work
- 1. Minimal Disclosure in Hierarchical
Hippocratic Databases with Delegation - Framework for preference negotiation
- 2. Determining User Privacy Preferences by
Asking the Right Questions An Automated
Approach - Ask users for their privacy preferences
- 3. A Security Policy Model for Clinical
Information Systems - Traditional confidentiality and intergrity
model
6Architecture
(Privacy-Policy and Privacy-Authorization)
Use Private Data based on Authorizations
7HDB Privacy Metadata (Preference)
- Three dimensions existing in this table
- Private Data (Columns Table and Attribute)
- Purpose
- Data Recipients (Authorized-User)
8Hierarchies in each Dimension
- Private Data Data Recipients
Purpose
9Disclosure Inheritance with Hierarchies
- 1. Represent the hierarchies by Posets in each
dimension - (D, D), (R, R), (P, P)
- 2. Compare the nodes with different semantics
- Private Data Sensitivity
- Data Recipients Position Ranking
(Privilege) - Purpose Purpose and Sub-purpose Relation
- 3. Provide nodes for disclosure
10Disclosure Inheritance (Contd)
- 4. Compute the nodes to be disclosed in all three
dimensions in terms of semantics - 5. Privacy Preference Poset
- ltM, gt where MD?R?P, and is the
- composition of the three relations D,
R - and P.
11Options for Specifying Preferences
Option 1 Explicitly specify what to disclose
and what to be kept private.
D X or D M-X
ltM, gt Privacy preference poset
X To be disclosed or kept private
12Options (Contd)
Option 2 Partially utilize disclosure
inheritance Specify a range to be disclosed,
and exceptions.
D d?x?X, ?y?Y, y d x - Z. ltM, gt
Privacy preference poset X, Y Upper bounds and
lower bounds Z To be kept private
13Options (Contd)
- Option 3 Fully utilize disclosure
inheritance Specify ranges for disclosing and
keeping private. - D d?x?X, ?y?Y, y d x - p?w?W, ?z?Z, w
p z.
ltM, gt Privacy preference poset X, Y Upper
bounds and lower bounds for disclosure Z, W
Upper bounds and lower bounds for keeping private
14Conflict Resolution
- Why we need conflict resolution?
- 1. Disclosure set storage in database
- Exist overlap and conflict in different
sets - 2. Preference specified over time
- For the same patient
Meta-policies defined to resolve conflicts
15Latest Take Precedence
- Overriding the existing preferences with the new
preference - Option 1 D1 D0 ? X (if X is to be disclosed)
or D1 D0 -X (if X is to be kept private). - Option 2 D1 D0 ? d?x?X, ?y?Y, y d x -
Z. - Option 3 D1 D0 ? d?x?X, ?y?Y, y d x -
p? w?W,? z?Z, w p z.
16Disclosure Take Precedence
- Any conflict caused by the negative part will be
ignored. - Option 1 D1 D0 ? X (if X is to be disclosed)
or D1 D0 (if X is to be kept private). - Option 2 D1 D0 ? (d?x?X, ?y?Y, y d x
- Z) - Option 3 D1 D0 ? (d?x?X, ?y?Y, y d x
- p?w?W, ?z?Z, w p z).
17Private Take Precedence
- A user can disallow a disclosure even if it has
previously been consented upon. - Option 1, 2, 3 the same as Latest Take
Precedence meta-policy in our implementation
Because we store preferences as the form of
disclosure sets
If we store preference with disclosed and private
sets separately, we can simply compute the final
disclosure set as ?Di-?Xi.
18Implementation
- 1. Web Interface for Preferences
- (APPEL integrated)
- 2. Generate Disclosure Set
- 3. Conflict Inspection and Resolution
- 4. Snowflake Metadata Schema
19Snowflake Metadata Schema
20Snowflake Metadata (Contd)
21Implementation Architecture
22Conclusion
- Observed hierarchies naturally exist
- Proposed disclosure inheritance semantics
- Described several options to specify
- preferences with hierarchies
- 4. Resolved potential conflicts
- 5. Implemented
23