论文标题
使用隐私流图评估软件隐私
Assessing Software Privacy using the Privacy Flow-Graph
论文作者
论文摘要
我们越来越依赖数字服务及其提供的便利。个人数据的处理对于此类服务是不可或缺的,因此隐私和数据保护是一个日益关注的问题,政府对诸如欧盟GDPR之类的法规做出了回应。此后,制造软件的组织有法律义务记录其软件的隐私和数据保护。这项工作必须涉及了解该代码的软件开发人员,以及了解数据保护和影响评估(DPIA)的隐私和要求的法律部门。 为了帮助开发人员和非技术人员(例如律师)记录软件的隐私和数据保护行为,我们开发了一种自动软件分析技术。该技术基于静态程序分析,以表征与隐私相关数据的流动。分析的结果可以作为隐私流和操作的图表表示 - 对于非技术人员来说,这也是可以理解的。我们认为,我们的技术有助于技术和非技术人员之间的合作记录软件的隐私行为。我们解释了如何利用我们技术产生的结果来回答DPIA所需的一系列与隐私相关的问题。为了说明我们的工作,我们显示了将我们的分析技术应用于安全消息传递信号以及云服务nextCloud的客户的详细和抽象分析结果,并展示其隐私流程图如何告知DPIA的撰写。
We increasingly rely on digital services and the conveniences they provide. Processing of personal data is integral to such services and thus privacy and data protection are a growing concern, and governments have responded with regulations such as the EU's GDPR. Following this, organisations that make software have legal obligations to document the privacy and data protection of their software. This work must involve both software developers that understand the code and the organisation's data protection officer or legal department that understands privacy and the requirements of a Data Protection and Impact Assessment (DPIA). To help developers and non-technical people such as lawyers document the privacy and data protection behaviour of software, we have developed an automatic software analysis technique. This technique is based on static program analysis to characterise the flow of privacy-related data. The results of the analysis can be presented as a graph of privacy flows and operations - that is understandable also for non-technical people. We argue that our technique facilitates collaboration between technical and non-technical people in documenting the privacy behaviour of the software. We explain how to use the results produced by our technique to answer a series of privacy-relevant questions needed for a DPIA. To illustrate our work, we show both detailed and abstract analysis results from applying our analysis technique to the secure messaging service Signal and to the client of the cloud service NextCloud and show how their privacy flow-graphs inform the writing of a DPIA.