IBM Research Report Server-Centric P3P Rakesh Agrawal, Jerry Kiernan

IBM Research Report Server-Centric P3P Rakesh Agrawal, Jerry Kiernan

RJ 10291 (A0304-009) April 21, 2003 Computer Science IBM Research Report Server-Centric P3P Rakesh Agrawal, Jerry Kiernan, Ramakrishnan Srikant, Yirong Xu IBM Research Division Almaden Research Center 650 Harry Road San Jose, CA 95120-6099 Research Division Almaden - Austin - Beijing - Haifa - India - T. J. Watson - Tokyo - Zurich LIMITED DISTRIBUTION NOTICE: This report has been submitted for publication outside of IBM and will probably be copyrighted if accepted for publication. I thas been issued as a Research Report for early dissemination of its contents. In view of the transfer of copyright to the outside publisher, its distribution outside of IBM prior to publication should be limited to peer communications and specific requests. After outside publication, requests should be filled only by reprints or legally obtained copies of the article (e.g ,. payment of royalties). Copies may be requested from IBM T. J. Watson Research Center , P. O. Box 218, Yorktown Heights, NY 10598 USA (email: [email protected]). Some reports are available on the internet at http://domino.watson.ibm.com/library/CyberDig.nsf/home . Server-Centric P3P Rakesh Agrawal Jerry Kiernan Ramakrishnan Srikant Yirong Xu IBM Almaden Research Center 650 Harry Road, San Jose, CA 95120 ragrawal, kiernan, srikant, yirongxu ¡ @almaden.ibm.com Abstract In this paper, we propose a server-centric architecture for P3P that reuses database technology, as opposed to Platform for Privacy Preferences (P3P) is the most sig- the prevailing client-centric implementations based on spe- nificant effort currently underway to enable web users to cialized engines. The server-centric architecture has sev- gain control over their private information. P3P pro- eral advantages (discussed in Section 4.2) including: set- vides mechanisms for web site owners to express their pri- ting up the infrastructure necessary for ensuring that web vacy policies in a standard format that a user can pro- sites act according to their stated policies, allowing P3P grammatically check against her privacy preferences to to be deployed in thin, mobile clients that are likely to decide whether to release her data to the web site. We dominate Internet access in the future, and allowing site discuss architectural alternatives for implementing P3P owners to refine their policies based on the privacy pref- and present a server-centric implementation that reuses erences of their users. Our experiments indicate that the database querying technology, as opposed to the prevail- proposed server-centric architecture performs significantly ing client-centric implementations based on specialized en- better than the sole public-domain client-centric implemen- gines. Not only does the proposed implementation have tation [17]. These experiments also show that the proposed qualitative advantages, our experiments indicate that it architecture has the necessary performance for it to be used performs significantly better than the sole public-domain in practical deployments of P3P. client-centric implementation and that the latency intro- duced by preference matching is small enough for real- 1.1. Related Work world deployments of P3P. P3P is a nascent standard (it became a W3C Recommen- dation on April 16, 2002) and the tools for implementing P3P are still in their infancy. A survey of current P3P im- 1. Introduction plementations is available in [19]. Two prominent imple- mentations of P3P are: AT&T Privacy Bird and the imple- The privacy of personal information on the Internet has be- mentation of compact P3P policies in the Microsoft Inter- come a major concern for governments, businesses, me- net Explorer. In Section 3, we discuss these and some tools dia, and the public [5] [12] [13] [18] [24]. Opinion sur- to aid P3P implementation. veys consistently show that privacy concerns are a leading A vision for Hippocratic databases was recently pre- impediment to the further growth of web-based commerce sented in [1]. Inspired by the privacy tenet of the Hippo- [10] [25] [26] [27]. Initial efforts by web sites to disclose cratic Oath that has guided the conduct of physicians for their privacy policies have had limited impact because these centuries, Hippocratic databases make privacy their central policies were often too lengthy for users to read and were concern. The paper proposes a strawman design for Hip- written in a language too difficult for users to understand. pocratic databases, identifies the technical challenges and Platform for Privacy Preferences (P3P), developed by problems in designing such databases, and suggests poten- the World Wide Web Consortium (W3C), is the most sig- tial solutions. nificant effort underway to enable users to gain more con- The work presented in this paper is complementary to trol over what information a web-site collects. It provides the work on Hippocratic databases. Our focus in this pa- a way for a web site to encode its data-collection and data- per is on the specific problem of how database technol- use practices in a machine-readable XML format, known ogy can be used for checking P3P privacy policies against as a P3P policy [9], which can be programmatically com- users’ privacy preferences, while the Hippocratic database pared against a user’s privacy preferences [8]. The current paper is mostly focused on how to enforce a given privacy P3P standard only provides a mechanism for users to check policy. The lessons from this study can be applied to the a web site’s privacy policy before they release personal in- implementation of the Privacy Constraint Validator mod- formation to the site; mechanisms for enforcing that sites ule in the Hippocratic database design. As we mentioned act according to their stated policies are beyond its scope earlier, P3P does not specify any mechanisms for ensuring [9]. that sites act according to their stated policies. Thus mech- 1 anisms developed for Hippocratic databases may provide site can have different privacy policies governing different the basis for designing enforcement in P3P. parts of the site. P3P provides for a Reference File in which Related work includes research on integrating produc- a site can set up associations between web pages and poli- tion rules with database systems (see [15] for an overview). cies. We describe this mechanism in Section 2.3. See [9] The dominant application of the database rule systems is and [8] for complete specifications of P3P and APPEL (re- to monitor events (mostly updates) and cause specified spectively). actions to be triggered if certain conditions are satisfied. P3P preferences expressed in APPEL also consist of a set 2.1. Policy Description of rules. However, the APPEL rules have little in com- P3P policies are described in XML format as a sequence mon with the rules studied in database systems. APPEL of STATEMENT elements that have the following subele- rules that define a user’s preference are not installed in the ments:¢ database. They are really queries that are processed at the time a user accesses a web site to determine if the web- CONSEQUENCE: describes the intended purpose for site’s policy conforms to the user’s privacy wishes at that ¢ collecting information in human-readable text. moment. PURPOSE: describes purposes for which informa- tion is collected. Multiple purposes can be listed in 1.2. Paper Layout a STATEMENT if all of them have the same values The rest of the paper is structured as follows. We give a for RECIPIENT, RETENTION and DATA-GROUPS; brief overview of P3P in Section 2 and describe the current otherwise, they are specified in different STATE- P3P implementations in Section 3. We give the architec- ¢ MENT elements. ture of our proposed server-centric implementation in Sec- RECIPIENT: describes the intended users of the col- tion 4, and discuss the pros and cons of the server-centric lected information. Multiple recipients can be speci- approach. We give the algorithms for storing P3P polices ¢ fied in one statement. into relational tables, and converting APPEL preferences into either SQL or XQuery in Section 5. We present the RETENTION: defines the duration for which the col- results of our performance experiments in Section 6 and ¢ lected information will be kept. conclude with some remarks and directions for future work DATA-GROUP: provides the list of individual data in Section 7. items (specified using DATA tags) that are collected We assume familiarity with the basic concepts of XML for stated purposes in the statement. [28]. Throughout the paper, we use “element” and “at- P3P has predefined values for PURPOSE (12 choices), tribute” as in the XML specification. For clarity, we will RECIPIENT (6), and RETENTION (5). Examples of sometimes refer to an APPEL element as an “expression”. PURPOSE¢ include: Their subelements will be correspondingly called “subex- pression”. A condensed version of this report appears in current: completion and support of activity for which the proceedings of the the 19th International Conference ¢ data was provided, on Data Engineering (ICDE 2003) [2]. individual-decision: inferring habits, interests, and ¢ other characteristics of individuals, and 2. Overview of P3P contact: contacting visitors for marketing of services The P3P protocol has two parts: or products through a communication channel other 1. Privacy Policies: An XML format in which a web site than voice telephone. can encode its data-collection and data-use practices Examples¢ of RECIPIENT include: [9]. ¢ ours: ourselves, 2. Privacy Preferences: A machine-readable specifica- ¢ same: legal entities following our practices, and tion of a user’s preferences that can be programmati- cally compared against a privacy policy [8]. unrelated: legal entities whose practices are unknown to us. W3C has standardized the XML format for describing privacy policies and it is now a W3C Recommendation Examples¢ of RETENTION include: [9]. A user may specify privacy preferences in APPEL ¢ stated-purpose: discarded at the earliest time possible, [8], which is currently a working draft in W3C.1 APPEL business-practice: long term retention but with a de- provides an XML format for expressing preferences and an ¢ struction time table, and algorithm for matching preferences against policies.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    15 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us