Embedding Privacy Into Software Systems : a Privacy Engineering Methodology for Data Minimisation
Total Page:16
File Type:pdf, Size:1020Kb
The University of New South Wales SCHOOL OF ENGINEERING AND INFORMATION TECHNOLOGY Embedding Privacy into Software Systems : A Privacy Engineering Methodology for Data Minimisation Awanthika Rasanjalee Senarath z5122081 A thesis submitted in fulfilment of the requirements for the degree of Doctor of Philosophy (Computer Science) December 2019 Supervised by Dr. Nalin Asanka Gamagedara Arachchilage External Supervisor Dr. Marthie Grobler Abstract Ubiquitous software systems (online shopping, social networking apps) to- day collect, store and process user data, such as users name, age, credit card number and location. If these systems collect unnecessary data, and store and share data without implementing privacy, data could be hacked and used to steal a users identity, or to cause reputation or/and financial loss to users. Therefore, systems should be designed taking privacy into account. Data Min- imisation (DM) is a privacy concept that is recognised in the European General Data Protection Directive, which shows that systems should minimise the col- lection and use of data in a system by design. However, the developers who design systems are not privacy experts. They are unable to implement DM in systems without guidance. Therefore, the research reported in this thesis focuses on developing a Privacy Engineering Methodology (PEM) that would enable developers to implement DM in software systems through understand- ing data privacy risks. Three experiments were conducted in this endeavour. The first experiment investigated the difficulties faced by developers when fol- lowing privacy concepts, similar to DM into their development practices. The findings showed that developers lacked knowledge on privacy concepts and that most concepts are not compatible with the way developers usually work. The second experiment investigated privacy risks associated with data in software systems. The results indicated that the sensitivity of data and the visibility of the data in a system were directly proportional to the data privacy risk, and the relevance of data to the system was inversely proportional to the data privacy risk. Knowledge from experiments one and two were used to develop a PEM that enables developers to practice DM through understanding the data privacy risks associated with data. The final experiment of the thesis inves- iii tigated the intention of software developers to use the PEM using a modified version of the Technology Acceptance Model (TAM). Results indicated that developers had a positive intention to use the PEM and that understanding data privacy risks enable developers to decide how to ensure user privacy in systems. Therefore, this thesis determines that data privacy risks could be used as an effective tool to enable software developers to practice DM. The thesis also encourages that common privacy theories should be presented as PEMs to enable developers to use them within their development practices. June 20, 2020 iv Publications The following publications are based on the research reported in this thesis. Table 1: Publications Publications [Ranking based on Impact CORE/ACPHIS/ABCD/ERA] Factor Senarath, A., Arachchilage, N. A. G., (2018), \Why developers can- N/A not embed privacy into software systems? An empirical investigation", In Proceedings of the 22nd International Conference on Evaluation and Assessment in Software Engineering 2018 (EASE'18). ACM, New York, NY, USA, 211-216. [Rank - A] [Best Paper Award]. Senarath, A., Arachchilage, N. A. G., (2019), \Will they use it or 2.103 not? Investigating Software Developers intention to follow Privacy En- gineering Methodologies", ACM Transactions on Privacy and Security (TOPS), ACM. [Rank - A] Senarath, A., Arachchilage, N. A. G., (2019), \Data Protection Reg- 2.849 ulations and Engineering Data Minimization for compliance.", Com- puters and Security, Elsevier. [Rank - A] Senarath, A., Arachchilage, N. A. G. 2018. Understanding Software N/A Developers' Approach towards Implementing Data Minimization, 4th Workshop on Security Information Workers at SOUPS, 2018. Senarath, A., Arachchilage, N. A. G. 2018. Understanding user pri- 3.714 vacy expectations: A software developers perspective, Telematics and Informatics, Volume 35, Issue 7, October 2018, pp 1845-1862. Senarath, A., Arachchilage, N. A. G. 2017. Understanding Organ- N/A isational Approach towards End User Privacy, Australian Conference on Information Systems, 2017. [Rank - A] Senarath, A., Arachchilage, N. A. G., Grobler, M., (2019), A model N/A for system developers to measure the privacy risk of data, 52nd Hawaii International, Conference on System Sciences (HICSS), January 2019. Senarath, A., Arachchilage, N. A. G., Slay J., (2017),Designing Pri- N/A vacy for You: A Practical Approach for User-Centric Privacy. Lecture Notes in Computer Science, Vol. 10292. Springer, Cham, 2017. Senarath, A., Arachchilage, N. A. G. (2020),The Unheard Story of N/A Organizational Motivations Towards User Privacy, Security, Privacy, and Forensics Issues in Big Data, January 2020. June 20, 2020 COPYRIGHT STATEMENT ‘I hereby grant the University of New South Wales or its agents a non-exclusive licence to archive and to make available (including to members of the public) my thesis or dissertation in whole or part in the University libraries in all forms of media, now or here after known. I acknowledge that I retain all intellectual property rights which subsist in my thesis or dissertation, such as copyright and patent rights, subject to applicable law. I also retain the right to use all or part of my thesis or dissertation in future works (such as articles or books).’ ‘For any substantial portions of copyright material used in this thesis, written permission for use has been obtained, or the copyright material is removed from the final public version of the thesis.’ Signed ……………………………………………........................... Date …………………………………………….............................. AUTHENTICITY STATEMENT ‘I certify that the Library deposit digital copy is a direct equivalent of the final officially approved version of my thesis.’ Signed ……………………………………………........................... Date …………………………………………….............................. UNSW is supportive of candidates publishing their research results during their candidature as detailed in the UNSW Thesis Examination Procedure. Publications can be used in their thesis in lieu of a Chapter if: ● The candidate contributed greater than 50% of the content in the publication and is the “primary author”, ie. the candidate was responsible primarily for the planning, execution and preparation of the work for publication ● The candidate has approval to include the publication in their thesis in lieu of a Chapter from their supervisor and Postgraduate Coordinator. ● The publication is not subject to any obligations or contractual agreements with a third party that would constrain its inclusion in the thesis Please indicate whether this thesis contains published material or not: This thesis contains no publications, either published or submitted for publication ☐ (if this box is checked, you may delete all the material on page 2) Some of the work described in this thesis has been published and it has been X documented in the relevant Chapters with acknowledgement (if this box is checked, you may delete all the material on page 2) This thesis has publications (either published or submitted for publication) ☐ incorporated into it in lieu of a chapter and the details are presented below CANDIDATE’S DECLARATION I declare that: ● I have complied with the UNSW Thesis Examination Procedure ● where I have used a publication in lieu of a Chapter, the listed publication(s) below meet(s) the requirements to be included in the thesis. Candidate’s Name Signature Date (dd/mm/yy) ORIGINALITY STATEMENT ‘I hereby declare that this submission is my own work and to the best of my knowledge it contains no materials previously published or written by another person, or substantial proportions of material which have been accepted for the award of any other degree or diploma at UNSW or any other educational institution, except where due acknowledgement is made in the thesis. Any contribution made to the research by others, with whom I have worked at UNSW or elsewhere, is explicitly acknowledged in the thesis. I also declare that the intellectual content of this thesis is the product of my own work, except to the extent that assistance from others in the project's design and conception or in style, presentation and linguistic expression is acknowledged.’ Signed …………………………………………….............. Date …………………………………………….............. Surname/Family Name : Senarath Given Name/s : Awanthika Rasanjalee Abbreviation for degree as give in the University calendar : Faculty : School : Embedding Privacy into Software Systems : A PrivacyEngineering Thesis Title : Methodology for Data Minimisation Abstract 350 words maximum: (PLEASE TYPE) Ubiquitous software systems (online shopping, social networking apps) today collect, store and process user data, such as user’s name, age, credit card number and location. If these systems collect unnecessary data, and store and share data without implementing privacy, data could be hacked and used to steal a users’ identity, or to cause reputation or/and financial loss to users. Therefore, systems should be designed taking privacy into account. Data Minimisation (DM) is a privacy concept that is recognised in the European General Data Protection Directive, which shows that systems should minimise the