Enhancing Security and Privacy in the Social Web: a User-Centered Approach for the Protection of Minors WP2 – Requirements An
Total Page:16
File Type:pdf, Size:1020Kb
Marie Sklodowska Curie, Ref. Ares(2016)7203956 - 31/12/2016 Research and Innovation Staff Exchange (RISE) ENhancing seCurity and privAcy in the Social wEb: a user-centered approach for the protection of minors WP2 – Requirements and System Architecture Deliverable D2.2 “System Requirements and Software Architecture” Editor(s): Michael Sirivianos (CUT) Author(s): Michael Sirivianos, Kostantinos Papadamou, Antigoni Parmaxi, Panagiotis Zaphiris (CUT), Rig Das (ROMA3), Pantelis Nicolaou, George Sielis (CYRIC), Thanassis Lekkas, Demetris Soukaras (INNO), Antonia Gogoglou, Despoina Chatzakou (AUTH), Emiliano De Cristofaro, Gianluca Stringhini (UCL), Jeremy Blackburn (TID) Dissemination Level: Public Nature: Report Version: 2.3 PROPRIETARY RIGHTS STATEMENT This document contains information, which is proprietary to the ENCASE Consortium. Neither this document nor the information contained herein shall be used, duplicated or communicated by any means to any third party, in whole or in parts, except with prior written consent of the ENCASE consortium. Deliverable D2.2 “System Requirements and Software Architecture” ENCASE Project Profile Contract Number 691025 Acronym ENCASE Title ENhancing seCurity and privacy in the Social wEb: a user-centered approach for the protection of minors Start Date Jan 1st, 2016 Duration 48 Months Partners Cyprus University of Cyprus Technology Telefonica Investigacion Y Spain Desarrollo SA University College London United Kingdom Cyprus Research and Cyprus Innovation Center, Ltd SignalGenerix Ltd Cyprus Aristotle University Greece Innovators, AE Greece Universita Degli Studi, Roma Italy Tre 2 Deliverable D2.2 “System Requirements and Software Architecture” Document History AUTHORS (CUT) Michael Sirivianos, Kostantinos Papadamou, Antigoni Parmaxi, Panagiotis Zaphiris (ROMA3) Rig Das (CYRIC) Pantelis Nikolaou, George Sielis (INNO) Thanassis Lekkas, Demetris Soukaras (AUTH) Antonia Gogoglou, Despoina Chatzakou (UCL) Emiliano De Cristofaro, Gianluca Stringhini (TID) Jeremy Blackburn VERSIONS Version Date Author Remarks 0.1 15.11.2016 CUT Initial Table of Contents 0.2 18.11.2016 CUT, INNO Update of the related web-based tools 0.3 15.11.2016 CUT Update of initial literature review 0.4 20.11.2016 CUT, CYRIC Revised use cases 0.5 28.11.2016 CUT Addition and update of user stories 0.6 30.11.2016 ROMA3 Added dataset description for sexually abusive behaviour detection 0.7 02.12.2016 AUTH, TID Added dataset description for abusive behaviour and hate speech detection 0.8 02.12.2016 UCL Added dataset description for cyber bullying and hate speech detection 0.9 04.12.2016 AUTH Added dataset description for early malicious activity detection 1.0 06.12.2016 CUT, CYRIC, ROMA3 Added the reference architecture description 1.1 08.12.2016 CYRIC, ROMA3 Added established architectures section 1.2 12.12.2016 CUT, CYRIC, ROMA3, INNO Added the description of the architectural components 1.3 13.12.2016 ROMA3, CYRIC Added architectural components diagrams 1.4 14.12.2016 ΙΝΝΟ Added infrastructure design 1.5 15.12.2016 CUT Updated architectural components diagrams 1.6 17.12.2016 CUT, CYRIC Added Front-end technical requirements 1.7 19.12.2016 CUT Added Web-proxy server 3 Deliverable D2.2 “System Requirements and Software Architecture” technical requirements 1.8 21.12.2016 CUT Added Middleware technical requirements 1.9 23.12.2016 CUT Added Back-end technical requirements 2.0 24.12.2016 CUT, CYRIC Revision of use cases and technical requirements 2.1 26.06.2016 CUT, CYRIC, ROMA3 Comments and corrections 2.2 29.06.2016 CUT Document layout and format check 2.3 30.06.2016 CUT, CYRIC, ROMA3 Proof reading – Final version 4 Deliverable D2.2 “System Requirements and Software Architecture” Executive Summary The overall aim of the ENCASE project is to leverage the latest advances in usable security and privacy of minors (age 10-18) in order to design and implement a user-centric architecture for the protection of minors from malicious actors in Online Social Networks (OSNs). This deliverable, “System Requirements and Software Architecture”, is a revision of D2.1, which was an initial specification of the system’s requirements and the software architecture. In order to identity the magnitude of the problem, we have also surveyed the existing security and privacy enhancing web-based tools and performed a research state-of-art on cyber security risks and on security in OSNs. Moreover, we further investigated the problem by collecting data from various OSNs and through our own measurements we intended to verify the results of the literature review provided in D2.1. According to the use cases requirements engineering methodology that ENCASE has opted for, the user stories are the next step. This deliverable provides more sophisticated use cases and the usage scenarios has been transformed into user stories - first person narrative stories - that essentially provide another level of detail, addressing each user role individually and from a first person perspective. The benefit using this approach is that enables you to produce accurate technical requirements without taking into account the limitations imposed by the technology at hand. Based on the aforementioned we were in position to design the reference architecture of the ENCASE ecosystem and to define and describe the various components that consist this architecture and the interactions between them. This architecture comprises three browser add-ons, a web- proxy service that in collaboration with a middleware service will be responsible to detect malicious behaviour, fake identities and activity, and sensitive content in OSNs based on sophisticated machine learning detection rules generated by a data analytics software stack, which is the back-end of our architecture. Lastly, this document relies on the above efforts and mainly in the user stories in order to produce a list of specific technical requirements. The requirements are classified according to the four components and services that will together form the ENCASE platform. These are: 1. Front-End 2. Web-proxy Server 3. Middleware Service 4. Data Analytics Software Stack (Back-End) The requirements description for each component is then subdivided into Functional requirements, Security and privacy requirements, and Operational requirements. 5 Deliverable D2.2 “System Requirements and Software Architecture” Table of Contents Executive Summary ................................................................................................................................. 5 List of Figures ........................................................................................................................................ 10 List of Tables ......................................................................................................................................... 10 1. Introduction .................................................................................................................................. 11 1.1. Purpose of the document ..................................................................................................... 11 1.2. Structure of the document ................................................................................................... 11 1.3. User Stories Methodology .................................................................................................... 11 1.4. User Story template .............................................................................................................. 12 2. State-of-the-art ............................................................................................................................. 12 2.1. Benefits and risks of Web 2.0 tools ...................................................................................... 13 2.2. Security and privacy enhancing web-based tools review ..................................................... 13 2.3. Research state-of-the-art on cyber security risks for minors ............................................... 18 2.3.1. Minors’ access to the Internet and use of OSN ............................................................ 18 2.3.2. A taxonomy of online risks for minors .......................................................................... 19 2.3.3. Summary ....................................................................................................................... 23 2.4. Research state-of-the-art on security/e-safety in online environments .............................. 23 2.4.1. Introduction .................................................................................................................. 23 2.4.2. Methodology ................................................................................................................. 24 2.4.3. Development of Security corpus ................................................................................... 24 2.4.4. Corpus refinement ........................................................................................................ 24 2.4.5. Synthesis ....................................................................................................................... 24 2.4.6. Findings ......................................................................................................................... 25 2.4.7. Implications for researchers and practitioners ............................................................. 28 3. Measurements and Test Data Preparation ..................................................................................