Title
Understanding and protecting privacy: formal semantics and principled audit mechanisms
Abstract
Privacy has become a significant concern in modern society as personal information about individuals is increasingly collected, used, and shared, often using digital technologies, by a wide range of organizations. Certain information handling practices of organizations that monitor individuals' activities on the Web, data aggregation companies that compile massive databases of personal information, cell phone companies that collect and use location data about individuals, online social networks and search engines—while enabling useful services—have aroused much indignation and protest in the name of privacy. Similarly, as healthcare organizations are embracing electronic health record systems and patient portals to enable patients, employees, and business affiliates more efficient access to personal health information, there is trepidation that the privacy of patients may not be adequately protected if information handling practices are not carefully designed and enforced. Given this state of affairs, it is very important to arrive at a general understanding of (a) why certain information handling practices arouse moral indignation, what practices or policies are appropriate in a given setting, and (b) how to represent and enforce such policies using information processing systems. This article summarizes progress on a research program driven by goal (b). We describe a semantic model and logic of privacy that formalizes privacy as a right to appropriate flows of personal information—a position taken by contextual integrity, a philosphical theory of privacy for answering questions of the form identified in (a). The logic is designed with the goal of enabling specification and enforcement of practical privacy policies. It has been used to develop the first complete formalization of two US privacy laws—the HIPAA Privacy Rule that prescribes and proscribes flows of personal health information, and the Gramm-Leach-Bliley Act that similarly governs flows of personal financial information. Observing that preventive access control mechanisms are not sufficient to enforce such privacy policies, we develop two complementary audit mechanisms for policy enforcement. These mechanisms enable auditing of practical privacy policies, including the entire HIPAA Privacy Rule. The article concludes with a vision for further research in this area.
Year
DOI
Venue
2011
10.1007/978-3-642-25560-1_1
ICISS
Keywords
Field
DocType
principled audit mechanism,personal health information,information processing system,practical privacy policy,us privacy law,certain information handling practice,personal financial information,privacy policy,information handling practice,personal information,formal semantics,electronic health record system
Data mining,Information privacy law,Privacy by Design,Computer science,Computer security,Privacy policy,Protected health information,Personally identifiable information,Data Protection Act 1998,Information privacy,Privacy software
Conference
Volume
ISSN
Citations 
7093
0302-9743
15
PageRank 
References 
Authors
0.70
42
8
Name
Order
Citations
PageRank
Anupam Datta1161787.21
Jeremiah Blocki223023.80
Nicolas Christin32133126.02
Henry DeYoung4694.74
Deepak Garg558145.48
Limin Jia666671.97
Dilsun Kaynar727214.05
Arunesh Sinha815021.67