Abstract
Establishment of privacy legislation regulations like the General Data Protection Regulation (GDPR) makes privacy to become one of the very important quality requirements towards software systems. Software companies need to develop strict strategies to comply with such regulations. However, currently privacy is frequently studied together with security, nevertheless these two characteristics may have different scenarios and hence – different approaches towards satisfying them. This paper studies privacy requirements of service-based software systems with respect to privacy regulations (specifically – GDPR) and methods at architectural level to meet them. Based on this, we present an architectural approach to ensure privacy, especially in the case, when the software have not been developed with privacy in mind, as such regulations did not exist. Main aspect of this approach are some additional components to system architecture, which may also be developed as services. Our approach may be easily applied to already implemented legacy software systems. Its application is straightforward as very small changes in system implementation should be done. A short illustrative case study is also included at the end of the paper.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
All web sources in the References section were last visited in April 2021.
References
Bachmann, F., Bass, L., Nord, R.: Modifiability tactics. Technical Report. Carnegie-Mellon University Pittsburgh. Software Engineering Institute (2007)
Bass, L., Clements, P., Kazman, R.: Software Architecture in Practice, 3rd edn. Addison-Wesley Professional (2013)
Bowman, C., Gesher, A., Grant, J. K., Slate, D., Lerner, E.: The Architecture of Privacy: On Engineering Technologies that Can Deliver Trustworthy Safeguards. “O’Reilly Media, Inc.” (2015)
Cardoso, R., Issarny, V.: Architecting pervasive computing systems for privacy: a survey. In: Sixth Working IEEE/IFIP Conference on Software Architecture: WICSA 2007, 2007, Mumbai, Maharashtra, India, pp. 26 (2007)
Chen, D., Zhao, H.: Data security and privacy protection issues in cloud computing. In 2012 International Conference on Computer Science and Electronics Engineering, vol. 1, pp. 647–651. IEEE (2012)
Hoepman, J.H.: Privacy design strategies. In: IFIP International Information Security Conference, pp. 446–459. Springer, Heidelberg, June 2014. https://doi.org/10.1007/978-3-642-55415-5_38
Hong, J.I., Landay, J.A.: An architecture for privacy-sensitive ubiquitous computing. In: Proceedings of the 2nd International Conference on Mobile Systems, Applications, and Services, pp. 177–189 (2004)
Kumaraguru, P., Cranor, L., Lobo, J., Calo, S.: A survey of privacy policy languages. In: Workshop on Usable IT Security Management (USM 07): Proceedings of the 3rd Symposium on Usable Privacy and Security. ACM (2007)
Lord, N.: What is the Principle of Least Privilege (POLP)? A Best Practice for Information Security and Compliance (2020). https://digitalguardian.com/blog/what-principle-least-privilege-polp-best-practice-information-security-and-compliance
Miraftabzadeh, S.A., Rad, P., Choo, K.K.R., Jamshidi, M.: A privacy-aware architecture at the edge for autonomous real-time identity reidentification in crowds. IEEE Internet Things J. 5(4), 2936–2946 (2017)
Mocrii, D., Chen, Y., Musilek, P.: IoT-based smart homes: a review of system architecture, software, communications, privacy and security. Internet Things 1, 81–98 (2018)
Noeparast, E., Ravanmehr, R.: A Novel Event-Oriented architecture for logging and auditing in distributed systems. Adv. Netw. Commun. 1, 36–44 (2012)
Onik, M.M.H., Kim, C.S., Lee, N.Y., Yang, J.: Privacy-aware blockchain for personal data sharing and tracking. Open Comput. Sci. 9(1), 80–91 (2019)
Perera, C., Barhamgi, M., Bandara, A.K., Ajmal, M., Price, B., Nuseibeh, B.: Designing privacy-aware internet of things applications. Inf. Sci. 512, 238–257 (2020)
Scott, J., Kazman, R.: Realizing and refining architectural tactics: Availability. Carnegie-Mellon Univ. Pittsburgh Pa Software Engineering Inst. (2009)
Semantha, F., Azam, S., Yeo, K., Shanmugam, B.: A Systematic literature review on privacy by design in the healthcare sector. Electronics 9(3), 452 (2020). https://doi.org/10.3390/electronics9030452
Simmhan, Y., et al.: An analysis of security and privacy issues in smart grid software architectures on clouds. In IEEE 4th International Conference on Cloud Computing, pp. 582–589 (2011)
Wahlstrom, K., Ul-haq, A., Burmeister, O.: Privacy by design: a holochain exploration. Australas. J. Inf. Syst. 24 (2020). https://doi.org/10.3127/ajis.v24i0.2801
Wang, J., Amos, B., Das, A., Pillai, P., Sadeh, N., Satyanarayanan, M.: A scalable and privacy-aware IoT service for live video analytics. In: Proceedings of the 8th ACM on Multimedia Systems Conference, pp. 38–49, June 2017
Wang, J., Amos, B., Das, A., Pillai, P., Sadeh, N., Satyanarayanan, M.: Enabling live video analytics with a scalable and privacy-aware framework. ACM Trans. Multimed. Comput. Commun. Appl. (TOMM) 14(3s), 1–24 (2018)
Wong, R.Y., Mulligan, D.K.: Bringing design to the privacy table: Broadening “design” in “privacy by design” through the lens of HCI. In: Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, pp. 1–17 (2019)
Principle of least privilege (POLP). Definition. https://searchsecurity.techtarget.com/definition/principle-of-least-privilege-POLP
Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995. OJ CL 281, 0031–0050 (1995)
Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016. https://eur-lex.europa.eu/eli/reg/2016/679/oj
Acknowledgements
The research presented in this paper is partially supported by The National Science Program “Information and Communication Technologies for Unified Digital Market in Science, Education and Security” financed by the Ministry of Education and Science, Bulgaria and the Sofia University “St. Kliment Ohridski” Research Science Fund project No. 80-10-74/25.03.2021 (“Data intensive software architectures”).
Authors of the paper are also grateful to the anonymous reviewers for their valuable comments and remarks, which increased the quality of the paper.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Switzerland AG
About this paper
Cite this paper
Stefanova, E., Dimov, A. (2021). Privacy Enabled Software Architecture. In: Shishkov, B. (eds) Business Modeling and Software Design. BMSD 2021. Lecture Notes in Business Information Processing, vol 422. Springer, Cham. https://doi.org/10.1007/978-3-030-79976-2_11
Download citation
DOI: https://doi.org/10.1007/978-3-030-79976-2_11
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-79975-5
Online ISBN: 978-3-030-79976-2
eBook Packages: Computer ScienceComputer Science (R0)