Engineering privacy by design: lessons from the design and implementation of an identity wallet platform

In the last decade, there has been more and more focus on the topic of information privacy, especially considering the ever increasing digital transformations that both businesses and the society are experiencing. As a right of individuals to "control when, how and to what extent information about them is communicated to others" [29], privacy has become an important expectation of users. A recent study in the EU showed that more than 70% of the citizens are not willing to sacrifice their privacy in exchange for a service [17]. The paradigm of Privacy-by-Design (PbD) [14] has become more important nowadays, which has also become a regulatory requirement by the EU General Data Protection Regulation (GDPR), which came into force in May 2018 [2]. PbD as a paradigm defines principles promoting the integration of privacy goals already during the design of an ICT system. However, translating those principles into engineering requirements is seen as a challenge.

[1]  Joachim Posegga,et al.  On Structural Signatures for Tree Data Structures , 2012, ACNS.

[2]  George Danezis,et al.  AnNotify: A Private Notification Service , 2017, IACR Cryptol. ePrint Arch..

[3]  Wouter Joosen,et al.  LINDDUN privacy threat modeling: a tutorial , 2015 .

[4]  Wouter Joosen,et al.  Empirical evaluation of a privacy-focused threat modeling methodology , 2014, J. Syst. Softw..

[5]  Andrew E O Obwanda An information security risk management gap analysis tool based on ISO/IEC 27005:2011 compliance for SMEs in Kenya , 2018 .

[6]  José M. del Álamo,et al.  A Metamodel for Privacy Engineering Methods , 2017, IWPE@SP.

[7]  Stephan Krenn,et al.  Opportunities and Challenges of CREDENTIAL - Towards a Metadata-Privacy Respecting Identity Provider , 2016, Privacy and Identity Management.

[8]  Matt Blaze,et al.  Divertible Protocols and Atomic Proxy Cryptography , 1998, EUROCRYPT.

[9]  Wouter Joosen,et al.  A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements , 2011, Requirements Engineering.

[10]  Christian Paquin,et al.  U-Prove Cryptographic Specification V1.1 (Revision 3) , 2013 .

[11]  George Danezis,et al.  UnlimitID: Privacy-Preserving Federated Identity Management using Algebraic MACs , 2016, WPES@CCS.

[12]  Josep Domingo-Ferrer,et al.  Privacy and Data Protection by Design - from policy to engineering , 2014, ArXiv.

[13]  Thomas S. Heydt-Benjamin,et al.  Cryptographic Protocols of the Identity Mixer Library , 2009 .

[14]  Naomi B. Lefkovitz,et al.  An Introduction to Privacy Engineering and Risk Management in Federal Systems , 2017 .

[15]  Kai Rannenberg,et al.  D2.2 - Architecture for Attribute-based Credential Technologies - Final Version , 2014 .

[16]  Joseph Gray Jackson,et al.  Privacy and Freedom , 1968 .