Conducting a Privacy Impact Analysis for the Analysis of Communication Records

Attacks on Voice-over-IP calls happen frequently. The prevention of these attacks depends on understanding the attack patterns. These can be derived from communication records. However, these records contain privacy relevant information of the call participants. These records are also protected by a number of laws and regulations. One has to consider all these laws and regulations and the privacy concerns of call participants before an analysis can be done. We propose a method for changing communication records in such a way that the forensic analysis for VoIP attacks is possible and the privacy of the call participants is preserved. We define privacy requirements for communication records from laws, regulations and concerns of call participants. We also present patterns of communication records based on real world examples. Moreover, analysis patterns for VoIP attack states which have relations to communication records that have to survive the data minimization.

[1]  H. Nissenbaum Privacy as contextual integrity , 2004 .

[2]  Lorrie Faith Cranor,et al.  Engineering Privacy , 2009, IEEE Transactions on Software Engineering.

[3]  Stefanos Gritzalis,et al.  Addressing privacy requirements in system design: the PriS method , 2008, Requirements Engineering.

[4]  Shari Lawrence Pfleeger,et al.  Why We Won't Review Books by Hackers , 2006, IEEE Security & Privacy Magazine.

[5]  Gerald Quirchmayr,et al.  Transaction pseudonyms in mobile environments , 2007, Journal in Computer Virology.

[6]  Christoph Sorge,et al.  The Legal Ramifications of Call-Filtering Solutions , 2010, IEEE Security & Privacy.

[7]  Wouter Joosen,et al.  A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements , 2011, Requirements Engineering.

[8]  Gerald Quirchmayr,et al.  CDRAS: An Approach to Dealing with Man-in-the-Middle Attacks in the Context of Voice over IP , 2011, 2011 Sixth International Conference on Availability, Reliability and Security.

[9]  Marit Hansen,et al.  Privacy-enhancing identity management , 2004, Inf. Secur. Tech. Rep..

[10]  Saverio Niccolini,et al.  Lessons learned on the usage of call logs for security and management in IP telephony , 2010, IEEE Communications Magazine.

[11]  Dogan Kesdogan,et al.  Privacy enhancing identity management: protection against re-identification and profiling , 2005, DIM '05.

[12]  Alfred Kobsa,et al.  Designing with Privacy in Mind , 2005 .

[13]  Bart De Decker,et al.  Linking Privacy Solutions to Developer Goals , 2009, 2009 International Conference on Availability, Reliability and Security.

[14]  Eduardo B. Fernández,et al.  Security Patterns for Voice over IP Networks , 2007, 2007 International Multi-Conference on Computing in the Global Information Technology (ICCGI'07).

[15]  Thomas Franke,et al.  P3P — platform for privacy preferences project , 2001, Wirtschaftsinf..

[16]  Alfred Kobsa,et al.  Privacy Considerations in Awareness Systems: Designing with Privacy in Mind , 2009, Awareness Systems.