Author:
Kuznetsov Mikhail,Novikova Evgenia,Kotenko Igor
Abstract
AbstractThe processing of personal data gives a rise to many privacy concerns, and one of them is to ensure the transparency of data processing to end users. Usually this information is communicated to them using privacy policies. In this paper, the problem of user notification in case of data breaches and policy changes is addressed, besides an ontology-based approach to model them is proposed. To specify the ontology concepts and properties, the requirements and recommendations for the legislative regulations as well as existing privacy policies are evaluated. A set of SPARQL queries to validate the correctness and completeness of the proposed ontology are developed. The proposed approach is applied to evaluate the privacy policies designed by cloud computing providers and IoT device manufacturers. The results of the analysis show that the transparency of user notification scenarios presented in the privacy policies is still very low, and the companies should reconsider the notification mechanisms and provide more detailed information in privacy policies.
Publisher
Springer Science and Business Media LLC
Reference53 articles.
1. 3plususa (2021) Available online https://3plususa.com. Accessed 20 Jan 2021
2. Amazon Web Services (2022) Available online https://aws.amazon.com/en/privacy/. Accessed 20 June 2022
3. Ashley P, Hada S, Karjoth G, Schunter M (2007) The description logic handbook: theory, implementation and applications. Cambridge University Press, Cambridge
4. Ashley P, Hada S, Karjoth G, Schunter M (2002) E-p3p privacy policies and privacy authorization. In: Proceedings of the 2002 ACM Workshop on Privacy in the Electronic Society. WPES ’02, pp 103–109. Association for Computing Machinery, New York, NY, USA. https://doi.org/10.1145/644527.644538
5. Azraoui M, Elkhiyaoui K, Önen M, Bernsmed K, De Oliveira AS, Sendor J (2015) A-PPL: an accountability policy language. In: Garcia-Alfaro J, et al (eds) Data privacy management, autonomous spontaneous security, and security assurance. DPM 2014, QASA 2014, SETOP 2014, Lecture Notes in computer science, vol. 8872, pp 319–326. Springer, Switzerland, Cham. https://doi.org/10.1007/978-3-319-17016-9_21