Data Protection by Design Tool for Automated GDPR Compliance Verification Based on Semantically Modeled Informed Consent
Abstract
:1. Introduction
1.1. Goal
1.2. Contributions
- We present a scalable tool for automated GDPR compliance verification based on informed consent, with a use case in smart cities and insurance (see Appendix A.2) that can be generalized to other domains. By “scalable”, we mean a system design (i.e., architecture) that adapts to incoming requests, such as scaling up as the number of requests increases.
- We present a process with a sequence of intermediate steps (regulation -> SDM—TOM -> code) that translates legal regulations into code. We show that implemented TOMs can be systematically evaluated and automatically tested (in Section 7.2).
- Our tool supports data interoperability through the use of semantic technology (ontology and a KG).
- Our tool implements a solution for broken consent chains based on two industrial use cases.
2. Background
3. Related Work
3.1. Compliance Verification
3.2. Summary
- P indicates that GDPR compliance has only been proposed or guidelines provided without actually implementing a proof of concept or implementation.
- PoC indicates the completion of a proof of concept (or experimental implementation that is not at the prototype level).
- PT indicates that a prototype implementation has been completed.
- FM indicates ready-to-deploy work that can be integrated via Representational State Transfer (REST) Application Programming Interface (API). With ready-to-deploy code, we refer to an implementation that can be deployed and integrated with minimal configuration.
4. KG Overview and Legal Background
4.1. GDPR and Relevant TOMs
- Systematizes data protection requirements in form of protection goals.
- Systematically derives generic measures from the protection goals, supplemented by a catalog of reference measures.
- Systematizes the identification of risks in order to determine protection requirements of the data subjects resulting from the processing.
- Offers a procedure model for modeling, implementation, and continuous control and testing of processing activities.
4.2. Legal KG
5. System Architecture
5.1. Service Layer
5.1.1. API Layer
Algorithm 1: Role-based API endpoint access. |
5.1.2. Data Processing
5.1.3. Shared Service
5.1.4. Security
5.1.5. Consent
Algorithm 2: Consent validation for consent creation. |
5.1.6. Auditing
5.1.7. Compliance
5.2. Security and Privacy
5.2.1. Policy Tools
5.2.2. Policy Enforcement Points (PEP)
5.2.3. Policy Decision Points (PDP)
5.2.4. Compliance-Related Policy Decisions
5.3. Scheduler
5.4. Remote Storage
5.5. Serverless Layer
6. Implementation
6.1. Experimental Setup
Software (or Libraries) | Version |
---|---|
Python [78] | 3.8 |
SWI-Prolog [79] | 7.6.4 |
Flask [80] | 1.1.2 |
Flask-RESTful [81] | 0.3.8 |
Flask-SQLAlchemy [82] | 2.5.1 |
Requests [83] | 2.25.1 |
Flask Apispec [84] | 0.11.0 |
Pycryptodome [85] | 3.10.1 |
Flask-JWT-Extended [86] | 4.2.1 |
FuzzyWuzzy [87] | 0.18.0 |
NLTK [88] | 3.6.2 |
Spacy [89] | 3.0.6 |
SPARQLWrapper [90] | 1.8.5 |
PyMongo [91] | 3.11.4 |
Docker ([92] Community Edition) | 20.X |
SQLite [93] | 2.6 |
GraphDB free edition | 9.4.1 |
MongoDB [22] | 5.0.6 |
6.2. Automated GDPR Compliance Verification Tool Implementation
6.2.1. API Layer
6.2.2. Data Processing
6.2.3. Shared Service
6.2.4. Security
6.2.5. Consent
6.2.6. Auditing
6.2.7. Compliance
6.2.8. Security and Privacy
6.2.9. Serverless Layer
6.2.10. Scheduler
ofelia: |
image: mcuadros/ofelia:latest |
depends_on: |
- tekactool |
- parser |
command: daemon --docker |
restart: always |
volumes: |
- ./:/app |
- /var/run/docker.sock:/var/run/docker.sock:ro |
labels: |
ofelia.job-run.datecron.image: “parser” |
ofelia.job-run.datecron.schedule: “@every 86400s” |
ofelia.job-run.datecron.command: “python3 /app/core/cron/Cron.py” |
7. Evaluation
7.1. Performance and Scalability
7.2. TOMs
8. Conclusions
- Translating regulations into a machine-readable format requires a considerable effort with regard to the collaboration between legal and technology experts. Both the law and computer science fields necessitate the precise definition of concepts. The translation of these concepts to a machine-readable format needs to be precise as well.
- A well-designed core semantic model is key to achieving a common understanding of specific information across different systems. However, the integration of existing ontologies is challenging, as each ontology presents concepts from a different perspective.
- The early and consistent collaboration with business (or industry) use case partners and legal experts helps understand the requirements and implications from both perspectives. This helps the system design and implementation adapt to business needs, while fulfilling legal requirements.
- The use of semantic technology has shown to have various benefits for our work. However, existing and well-established industry systems do not always utilize semantics. This required us to to adapt our implementation to the industry requirements. To ease the process, we have selected a JSON format to communicate the consent information and compliance check results.
- Scalability, interoperability, and the simplification of the integration processes are critical for use case partners, as is the tool’s consent creation functionality. Any tool’s design and implementation must be tailored to such requirements.
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Acknowledgments
Conflicts of Interest
Abbreviations
AES | Advanced Encryption Standard |
API | Application Programming Interface |
CPU | Central Processing Unit |
DC | Data Controller |
DP | Data Processor |
DPO | Data Protection Officer |
DPV | Data Privacy Vocabulary |
DS | Data Subject |
DEFeND | Data Privacy Governance for Supporting GDPR |
EAX | Encrypt-Then-Authenticate-Then-Translate |
EU DPD | European Data Protection Directive |
GDPR | General Data Protection Regulation |
GHz | Gigahertz |
GPS | Global Positioning System |
HTTP | Hypertext Transfer Protocol |
JSON | JavaScript Object Notation |
JWT | JSON Web Token |
KG | Knowledge Graph |
MFOTL | Metric First-order Temporal Logic |
ML | Machine Learning |
NGAC | Next Generation Access Control |
NIST | National Institute of Standards and Technology |
OAEP | Optimal Asymmetric Encryption Padding |
OAS | OpenAPI Specification |
OWL | Web Ontology Language |
PEPs | Policy Enforcement Points |
PII | Personally Identifiable Information |
PKCS | Public Key Cryptography Standards |
RAM | Random Access Memory |
REST | Representational State Transfer |
RSA | Rivest–Shamir–Adleman |
S4P | SecPAL for Privacy |
SDM | Standard Data Protection Model |
SMEs | Small and Medium-sized Enterprises |
SMT | Satisfiability Modulo Theories |
SPARQL | Simple Protocol and Resource Description Framework Query Language |
STS | Socio-Technical Security |
TOMs | Technical and Organisational Measures |
URL | Uniform Resource Locator |
Appendix A
Appendix A.1. Maths Symbols
∧ | Logical conjunction operator. |
Appendix A.2. Use Case Overview
Appendix A.3. Comparison with State-of-the-Art
Study | Consent Create/Revoke | Automated Compliance Checking | Interoperability | Scalability | TOMs Implemented | Implementation | Ease of Incorporation into Other Laws | Performance Evaluation | Industrial Use Case |
---|---|---|---|---|---|---|---|---|---|
Ranise and Siswantoro [25] | / | PoC | |||||||
Robol et al. [27] | / | PoC | |||||||
Westphal et al. [29] | / | PoC | |||||||
Rhala et al. [3] | / | P | |||||||
Brodin [31] | / | P | |||||||
Camilo [32] | / | PoC | |||||||
Alfred et al. [8] | / | PoC | |||||||
Piras et al. [36] | / | P | |||||||
Truong et al. [38] | / | PT | |||||||
Barati et al. [39] | / | PoC | |||||||
Kirrane et al. [17] | / | PT | |||||||
Bonati et al. [43] | / | PoC | |||||||
Mahindrakar and Joshi [46] | / | PoC | |||||||
Barati and Rana [47] | / | PoC | |||||||
Ryan et al. [6] | / | PoC | |||||||
Merlec et al. [7] | / | PT | |||||||
Hamdani et al. [50] | / | PoC | |||||||
Daoudagh et al. [53] | / | FM | |||||||
Tokas et al. [54] | / | PoC | |||||||
Our work | / | FM |
References
- European Parliament and Council. Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the Protection of Natural Persons with Regard to the Processing of Personal Data and on the Free Movement of Such Data, and REPEALING DIRective 95/46/EC (General Data Protection Regulation). Official Journal of the European Union, L119. 2016. Available online: https://eur-lex.europa.eu/eli/reg/2016/679/oj (accessed on 3 December 2021).
- Mangini, V.; Tal, I.; Moldovan, A.N. An empirical study on the impact of GDPR and right to be forgotten-organisations and users perspective. In Proceedings of the 15th International Conference on Availability, Reliability and Security, Event, Ireland, 25–28 August 2020; pp. 1–9. [Google Scholar] [CrossRef]
- Rhahla, M.; Allegue, S.; Abdellatif, T. A framework for GDPR compliance in big data systems. In Proceedings of the International Conference on Risks and Security of Internet and Systems, Hammamet, Tunisia, 29–31 October 2019; Springer: Berlin/Heidelberg, Germany, 2019; pp. 211–226. [Google Scholar] [CrossRef]
- Ryan, P.; Crane, M.; Brennan, R. Design Challenges for GDPR RegTech. In Proceedings of the 22nd International Conference on Enterprise Information Systems, ICEIS, Prague, Czech Republic, 5–7 May 2020; INSTICC: Milan, Italy; SciTePress: Setubal, Portugal, 2020; Volume 2, pp. 787–795. [Google Scholar]
- Barati, M.; Rana, O. Enhancing User Privacy in IoT: Integration of GDPR and Blockchain. In Blockchain and Trustworthy Systems; Zheng, Z., Dai, H.N., Tang, M., Chen, X., Eds.; Springer: Singapore, 2020; pp. 322–335. [Google Scholar] [CrossRef] [Green Version]
- Ryan, P.; Crane, M.; Brennan, R. GDPR Compliance tools: Best practice from RegTech. In Proceedings of the International Conference on Enterprise Information Systems, Online, 26–28 April 2021; Springer: Cham, Switzerland, 2021. [Google Scholar]
- Merlec, M.M.; Lee, Y.K.; Hong, S.P.; In, H.P. A Smart Contract-Based Dynamic Consent Management System for Personal Data Usage under GDPR. Sensors 2021, 21, 7994. [Google Scholar] [CrossRef] [PubMed]
- Arfelt, E.; Basin, D.; Debois, S. Monitoring the GDPR. In European Symposium on Research in Computer Security; Sako, K., Schneider, S., Ryan, P.Y.A., Eds.; Springer International Publishing: Cham, Switzerland, 2019; pp. 681–699. [Google Scholar]
- International Association of Privacy Professionals (IAPP). Available online: https://iapp.org (accessed on 12 December 2021).
- IAPP. IAPP-FTI Consulting Privacy Governance Report 2020. Technical Report. Available online: https://iapp.org/media/pdf/resource_center/IAPP_FTIConsulting_2020PrivacyGovernanceReport.pdf (accessed on 8 December 2021).
- The smashHit project. Public Report D1.3 Public Innovation Concept. Available online: https://www.smashhit.eu/wp-content/uploads/2021/03/smashHit_D1.3_Public_Innovation_Concept_v100.pdf (accessed on 19 December 2021).
- Chhetri, T.R. Improving Decision Making Using Semantic Web Technologies. In The Semantic Web: ESWC 2021 Satellite Events; Verborgh, R., Dimou, A., Hogan, A., d’Amato, C., Tiddi, I., Bröring, A., Mayer, S., Ongenae, F., Tommasini, R., Alam, M., Eds.; Springer International Publishing: Cham, Switzerland, 2021; pp. 165–175. [Google Scholar] [CrossRef]
- The smashHit EU H2020 Project. Available online: https://smashhit.eu (accessed on 5 January 2022).
- RegTech. Available online: https://www.regnology.net/en/ (accessed on 23 December 2021).
- Fensel, D.; Simsek, U.; Angele, K.; Huaman, E.; Kärle, E.; Panasiuk, O.; Toma, I.; Umbrich, J.; Wahler, A. Knowledge Graphs: Methodology, Tools and Selected Use Cases; Springer: Cham, Switzerland, 2020. [Google Scholar]
- Kurteva, A.; Chhetri, T.R.; Pandit, H.J.; Fensel, A. Consent through the lens of semantics: State of the art survey and best practices. Semant. Web 2021, 1–27. [Google Scholar] [CrossRef]
- Kirrane, S.; Fern’andez, J.D.; Bonatti, P.; Milosevic, U.; Polleres, A.; Wenning, R. The SPECIAL-K Personal Data Processing Transparency and Compliance Platform. arXiv 2020, arXiv:abs/2001.09461. [Google Scholar]
- Introducing JSON. Available online: https://www.json.org/json-en.html (accessed on 2 January 2022).
- JSON Web Tokens (JWT). Available online: https://jwt.io (accessed on 27 December 2021).
- van Rossum, G.; Barry Warsaw, N.C. PEP 8—Style Guide for Python Code. Available online: hhttps://www.python.org/dev/peps/pep-0008/ (accessed on 10 January 2022).
- GraphDB. Available online: https://graphdb.ontotext.com (accessed on 7 January 2022).
- MongoDB. Available online: https://www.mongodb.com (accessed on 10 December 2021).
- Koç, Ç.K.; Özdemir, F.; Ödemiş Özger, Z. Rivest-Shamir-Adleman Algorithm. In Partially Homomorphic Encryption; Springer: Berlin/Heidelberg, Germany, 2021; pp. 37–41. [Google Scholar]
- Selent, D. Advanced encryption standard. Rivier Acad. J. 2010, 6, 1–14. [Google Scholar]
- Ranise, S.; Siswantoro, H. Automated Legal Compliance Checking by Security Policy Analysis. In Computer Safety, Reliability, and Security; Tonetta, S., Schoitsch, E., Bitsch, F., Eds.; Springer International Publishing: Cham, Switzerland, 2017; pp. 361–372. [Google Scholar] [CrossRef]
- Parliament, E. European Data Protection Directive (EU DPD). Available online: https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=celex%3A31995L0046. (accessed on 2 January 2022).
- Robol, M.; Salnitri, M.; Giorgini, P. Toward GDPR-Compliant Socio-Technical Systems: Modeling Language and Reasoning Framework. In The Practice of Enterprise Modeling; Poels, G., Gailly, F., Serral Asensio, E., Snoeck, M., Eds.; Springer International Publishing: Cham, Switzerland, 2017; pp. 236–250. [Google Scholar] [CrossRef] [Green Version]
- Dalpiaz, F.; Paja, E.; Giorgini, P. Security Requirements Engineering: Designing Secure Socio-Technical Systems; MIT Press: Cambridge, MA, USA, 2016. [Google Scholar]
- Westphal, P.; Fernandez Garcia, J.D.; Kirrane, S.; Lehmann, J. SPIRIT: A semantic transparency and compliance stack. In Proceedings of the 14th International Conference on Semantic Systems, Vienna, Austria, 10–13 September 2018. [Google Scholar]
- Rao, T.R.; Mitra, P.; Bhatt, R.; Goswami, A. The big data system, components, tools, and technologies: A survey. Knowl. Inf. Syst. 2019, 60, 1165–1245. [Google Scholar] [CrossRef]
- Brodin, M. A framework for GDPR compliance for small-and medium-sized enterprises. Eur. J. Secur. Res. 2019, 4, 243–264. [Google Scholar] [CrossRef] [Green Version]
- Camilo, J. Blockchain-based consent manager for GDPR compliance. Open Identity Summit 2019, 2019, 165–170. [Google Scholar]
- Davari, M.; Bertino, E. Access Control Model Extensions to Support Data Privacy Protection based on GDPR. In Proceedings of the 2019 IEEE International Conference on Big Data (Big Data), Los Angeles, CA, USA, 9–12 December 2019; pp. 4017–4024. [Google Scholar] [CrossRef]
- Basin, D.A.; Klaedtke, F.; Müller, S.; Zalinescu, E. Monitoring Metric First-Order Temporal Properties. J. ACM (JACM) 2015, 62, 1–45. [Google Scholar] [CrossRef]
- Basin, D.; Harvan, M.; Klaedtke, F.; Zălinescu, E. MONPOLY: Monitoring usage-control policies. In International Conference on Runtime Verification; Springer: Berlin/Heidelberg, Germany, 2011; pp. 360–364. [Google Scholar]
- Piras, L.; Al-Obeidallah, M.G.; Praitano, A.; Tsohou, A.; Mouratidis, H.; Crespo, B.G.N.; Bernard, J.B.; Fiorani, M.; Magkos, E.; Sanz, A.C.; et al. DEFeND architecture: A privacy by design platform for GDPR compliance. In Proceedings of the International Conference on Trust and Privacy in Digital Business, Linz, Austria, 26–29 August 2019; Springer: Berlin/Heidelberg, Germany, 2019; pp. 78–93. [Google Scholar] [CrossRef]
- The DEFeND Project. Available online: https://www.defendproject.eu (accessed on 27 December 2021).
- Truong, N.B.; Sun, K.; Lee, G.M.; Guo, Y. GDPR-Compliant Personal Data Management: A Blockchain-Based Solution. Trans. Inf. Forensics Secur. 2020, 15, 1746–1761. [Google Scholar] [CrossRef] [Green Version]
- Barati, M.; Rana, O.; Petri, I.; Theodorakopoulos, G. GDPR Compliance Verification in Internet of Things. IEEE Access 2020, 8, 119697–119709. [Google Scholar] [CrossRef]
- Basin, D.; Debois, S.; Hildebrandt, T. On Purpose and by Necessity: Compliance Under the GDPR. In Financial Cryptography; Springer: Berlin/Heidelberg, Germany, 2018. [Google Scholar] [CrossRef]
- Ethereum. Available online: https://ethereum.org/en/ (accessed on 7 October 2021).
- Data and Knowledge Group, University of Oxford. HermiT OWL Reasoner. Available online: http://www.hermit-reasoner.com (accessed on 20 October 2021).
- Bonatti, P.A.; Kirrane, S.; Petrova, I.M.; Sauro, L. Machine Understandable Policies and GDPR Compliance Checking. KI-Künstliche Intell. 2020, 34, 303–315. [Google Scholar] [CrossRef]
- Bechhofer, S.; van Harmelen, F.; Hendler, J.; Horrocks, I.; McGuinness, D.L.; Patel-Schneider, P.F.; Stein, L.A. OWL Web Ontology Language. Available online: https://www.w3.org/TR/owl-ref/ (accessed on 20 December 2021).
- Bonatti, P.A. Fast Compliance Checking in an OWL2 Fragment. In Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence, IJCAI-18, International Joint Conferences on Artificial Intelligence Organization, Stockholm, Sweden, 13–19 July 2018; pp. 1746–1752. [Google Scholar] [CrossRef] [Green Version]
- Mahindrakar, A.; Joshi, K.P. Automating GDPR Compliance using Policy Integrated Blockchain. In Proceedings of the 2020 IEEE 6th Intl Conference on Big Data Security on Cloud (BigDataSecurity), IEEE Intl Conference on High Performance and Smart Computing, (HPSC) and IEEE Intl Conference on Intelligent Data and Security (IDS), Baltimore, MD, USA, 25–27 May 2020; pp. 86–93. [Google Scholar] [CrossRef]
- Barati, M.; Rana, O. Tracking GDPR Compliance in Cloud-based Service Delivery. IEEE Trans. Serv. Comput. 2020, 1. [Google Scholar] [CrossRef]
- Data Protection Vocabularies and Controls W3C Community Group. Data Privacy Vocabulary (DPV). Available online: https://github.com/dpvcg/dpv (accessed on 4 January 2022).
- Lebo, T.; Sahoo, S.; McGuinness, D.; Belhajjame, K.; Cheney, J.; Corsar, D.; Garijo, D.; Soiland-Reyes, S.; Zednik, S.; Zhao, J. PROV-O: The PROV Ontology; W3C Recommendation, World Wide Web Consortium: Boston, MA, USA, 2013. [Google Scholar]
- Hamdani, R.E.; Mustapha, M.; Amariles, D.R.; Troussel, A.; Meeùs, S.; Krasnashchok, K. A Combined Rule-Based and Machine Learning Approach for Automated GDPR Compliance Checking. In Proceedings of the Eighteenth International Conference on Artificial Intelligence and Law, São Paulo, Brazil, 21–25 June 2021; Association for Computing Machinery: New York, NY, USA, 2021; pp. 40–49. [Google Scholar]
- Wilson, S.; Schaub, F.; Dara, A.; Liu, F.; Cherivirala, S.; Leon, P.; Andersen, M.; Zimmeck, S.; Sathyendra, K.; Russell, N.; et al. The Creation and Analysis of a Website Privacy Policy Corpus. In Proceedings of the 54th Annual Meeting of the Association for Computational Linguistics, Berlin, Germany, 7–12 August 2016; pp. 1330–1340. [Google Scholar] [CrossRef]
- GDPR. Data Protection Impact Assessments, Article 35 of GDPR. Available online: https://gdpr-info.eu/art-35-gdpr/ (accessed on 20 December 2021).
- Daoudagh, S.; Marchetti, E.; Savarino, V.; Bernabe, J.B.; García-Rodríguez, J.; Moreno, R.T.; Martinez, J.A.; Skarmeta, A.F. Data Protection by Design in the Context of Smart Cities: A Consent and Access Control Proposal. Sensors 2021, 21, 7154. [Google Scholar] [CrossRef] [PubMed]
- Tokas, S.; Owe, O.; Ramezanifarkhani, T. Static checking of GDPR-related privacy compliance for object-oriented distributed systems. J. Log. Algebr. Methods Program. 2022, 125, 100733. [Google Scholar] [CrossRef]
- Conference of the Independent Data Protection Supervisory Authorities of the Federation and the Länder. The Standard Data Protection Model—A Method for Data Protection Advising and Controlling on the Basis of Uniform Protection Goals, Version 2.0b. 2020. Available online: https://www.datenschutzzentrum.de/uploads/sdm/SDM-Methodology_V2.0b.pdf (accessed on 15 December 2021).
- smashHitCore Ontology. Available online: https://smashhiteu.github.io/smashHitCore/ (accessed on 9 January 2022).
- SPARQL Query Language for RDF. Available online: https://www.w3.org/TR/rdf-sparql-query/ (accessed on 5 November 2021).
- smashHitCore GraphnDB SPARQL Endpoint. Available online: https://smashhitactool.sti2.at/sparql (accessed on 5 January 2022).
- Kurteva, A. Implementing Informed Consent with Knowledge Graphs. In The Semantic Web: ESWC 2021 Satellite Events; Verborgh, R., Dimou, A., Hogan, A., d’Amato, C., Tiddi, I., Bröring, A., Mayer, S., Ongenae, F., Tommasini, R., Alam, M., Eds.; Springer International Publishing: Cham, Switzerland, 2021; pp. 155–164. [Google Scholar] [CrossRef]
- Bless, C.; Dötlinger, L.; Kaltschmid, M.; Reiter, M.; Kurteva, A.; Roa-Valverde, A.J.; Fensel, A. Raising Awareness of Data Sharing Consent Through Knowledge Graph Visualisation. In Further with Knowledge Graphs; IOS Press: Amsterdam, The Netherlands, 2021; pp. 44–57. [Google Scholar] [CrossRef]
- Dragoni, N.; Giallorenzo, S.; Lafuente, A.L.; Mazzara, M.; Montesi, F.; Mustafin, R.; Safina, L. Microservices: Yesterday, Today, and Tomorrow. In Present and Ulterior Software Engineering; Mazzara, M., Meyer, B., Eds.; Springer International Publishing: Cham, Switzerland, 2017; pp. 195–216. [Google Scholar] [CrossRef] [Green Version]
- Subramanian, H.; Raj, P. Hands-On RESTful API Design Patterns and Best Practices: Design, Develop, and Deploy Highly Adaptable, Scalable, and Secure RESTful Web APIs; Packt Publishing Ltd.: Birmingham, UK, 2019. [Google Scholar]
- De Lauretis, L. From Monolithic Architecture to Microservices Architecture. In Proceedings of the 2019 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW), Berlin, Germany, 28–31 October 2019; pp. 93–96. [Google Scholar] [CrossRef]
- Hasselbring, W.; Steinacker, G. Microservice Architectures for Scalability, Agility and Reliability in E-Commerce. In Proceedings of the 2017 IEEE International Conference on Software Architecture Workshops (ICSAW), Gothenburg, Sweden, 5–7 April 2017; pp. 243–246. [Google Scholar] [CrossRef]
- Zou, L.; Ni, M.; Huang, Y.; Shi, W.; Li, X. Hybrid Encryption. In Frontier Computing; Hung, J.C., Yen, N.Y., Chang, J.W., Eds.; Springer: Singapore, 2020; pp. 541–551. [Google Scholar]
- SPARQL 1.1 Query Language. Available online: https://www.w3.org/TR/sparql11-query/ (accessed on 15 December 2021).
- Lindqvist, J. New challenges to personal data processing agreements: Is the GDPR fit to deal with contract, accountability and liability in a world of the Internet of Things? Int. J. Law Inf. Technol. 2017, 26, 45–63. [Google Scholar] [CrossRef]
- INCITS 565-2020; Information Technology—Next Generation Access Control (NGAC). ANSI: Washington, DC, USA, 2020. Available online: https://standards.incits.org/apps/group_public/project/details.php?project_id=2328 (accessed on 29 December 2021).
- NoSQL Database. Available online: https://hostingdata.co.uk/nosql-database/ (accessed on 9 December 2021).
- Eismann, S.; Scheuner, J.; van Eyk, E.; Schwinger, M.; Grohmann, J.; Herbst, N.; Abad, C.L.; Iosup, A. Serverless Applications: Why, When, and How? IEEE Softw. 2021, 38, 32–39. [Google Scholar] [CrossRef]
- Atlas Database. Deploy a Multi-Cloud Database. Available online: https://www.mongodb.com/atlas/database (accessed on 10 December 2021).
- Amazon Web Services (AWS). Available online: https://aws.amazon.com (accessed on 6 December 2021).
- Kubernetes. Available online: https://kubernetes.io (accessed on 6 December 2021).
- Linode. Available online: https://www.linode.com (accessed on 6 December 2021).
- Linux. Available online: https://www.linux.org (accessed on 22 December 2021).
- Ubuntu. Available online: https://ubuntu.com (accessed on 4 December 2021).
- Debian. Available online: https://www.debian.org (accessed on 14 December 2021).
- Python. Available online: https://www.python.org (accessed on 1 December 2021).
- SWI Prolog. Available online: https://www.swi-prolog.org (accessed on 10 January 2022).
- Flask. Available online: https://flask.palletsprojects.com/en/2.0.x/ (accessed on 19 December 2021).
- Flask-RESTful. Available online: https://flask-restful.readthedocs.io/en/latest/ (accessed on 17 December 2021).
- Flask-SQLAlchemy. Available online: https://flask-sqlalchemy.palletsprojects.com/en/2.x/ (accessed on 28 December 2021).
- Requests: HTTP for Humans. Available online: https://docs.python-requests.org/en/latest/ (accessed on 10 December 2021).
- Flask-Apispec: Auto-Documenting REST APIs for Flask. Available online: https://flask-apispec.readthedocs.io/en/latest/ (accessed on 15 December 2021).
- PyCryptodome. Available online: https://www.pycryptodome.org/en/latest/src/introduction.html (accessed on 9 January 2022).
- Flask-JWT-Extended’s Documentation. Available online: https://flask-jwt-extended.readthedocs.io/en/stable/ (accessed on 14 December 2021).
- FuzzyWuzzy. Available online: https://github.com/seatgeek/fuzzywuzzy (accessed on 29 November 2021).
- NLTK. Available online: https://www.nltk.org (accessed on 18 December 2021).
- spaCy: Industrial-Strength Natural Language Processing. Available online: https://spacy.io (accessed on 15 December 2021).
- SPARQL Endpoint Interface to Python. Available online: https://sparqlwrapper.readthedocs.io/en/latest/ (accessed on 4 January 2022).
- PyMongo. Available online: https://pymongo.readthedocs.io/en/stable/ (accessed on 7 December 2021).
- Docker. Available online: https://www.docker.com (accessed on 4 January 2022).
- SQLite. Available online: https://sqlite.org/index.html (accessed on 14 December 2021).
- Data Tracker. Available online: https://datatracker.ietf.org/doc/html/rfc7519 (accessed on 29 December 2021).
- OpenAPI Initiative. Available online: https://www.openapis.org (accessed on 19 December 2021).
- National Institute of Standards and Technology (NIST). Available online: https://www.nist.gov (accessed on 11 December 2021).
- FIPS 197; Advanced Encryption Standard (AES). National Institute of Standards and Technology: Gaithersburg, MD, USA, 2001.
- Garg, N.; Yadav, P. Comparison of asymmetric algorithms in cryptography. J. Comput. Sci. Mob. Comput. (IJCSMC) 2014, 3, 1190–1196. [Google Scholar]
- RFC 8017. Available online: https://www.rfc-editor.org/info/rfc8017 (accessed on 11 January 2022).
- RFC 5208. Available online: https://www.ietf.org/rfc/rfc5208.txt (accessed on 11 January 2022).
- Bellare, M.; Rogaway, P.; Wagner, D. EAX: A Conventional Authenticated-Encryption Mode. IACR Eprint Archive. 2003. Available online: https://ia.cr/2003/069 (accessed on 5 January 2022).
- Marshmallow: Simplified Object Serialization. Available online: https://marshmallow.readthedocs.io/en/stable/index.html (accessed on 19 October 2021).
- Becker, M.; Malkis, A.; Bussard, L. S4P: A Generic Language for Specifying Privacy Preferences and Policies; Technical Report MSR-TR-2010-32; Microsoft Research: Cambridge, UK, 2010. [Google Scholar]
- Alex Ellis. OpenFaas. Available online: https://blog.alexellis.io/tag/openfaas/ (accessed on 5 December 2021).
- Ofelia Scheduler. Available online: https://github.com/mcuadros/ofelia (accessed on 10 November 2021).
- Padmavathi, B.; Kumari, S.R. A Survey on Performance Analysis of DES; AES and RSA Algorithm along with LSB Substitution Technique. Int. J. Sci. Res. (IJSR) 2013, 2, 170–174. [Google Scholar]
- Nadeem, A.; Javed, M. A Performance Comparison of Data Encryption Algorithms. In Proceedings of the 2005 International Conference on Information and Communication Technologies, Karachi, Pakistan, 27-28 Aug. 2005; pp. 84–89. [Google Scholar] [CrossRef]
- Dehury, C.K.; Srirama, S.N.; Chhetri, T.R. CCoDaMiC: A framework for Coherent Coordination of Data Migration and Computation platforms. Future Gener. Comput. Syst. 2020, 109, 1–16. [Google Scholar] [CrossRef]
- Kakkar, A.; Farshori, A. Server-Less Cloud Computing—An Economical Solution for Business Operations. In Innovations in Computer Science and Engineering; Springer: Berlin/Heidelberg, Germany, 2020; pp. 145–154. [Google Scholar]
- Chung, M.T.; Quang-Hung, N.; Nguyen, M.T.; Thoai, N. Using Docker in high performance computing applications. In Proceedings of the 2016 IEEE Sixth International Conference on Communications and Electronics (ICCE), Ha-Long, Vietnam, 27–29 July 2016; pp. 52–57. [Google Scholar] [CrossRef]
- Kubernetespods. Available online: https://kubernetes.io/docs/concepts/workloads/pods/ (accessed on 1 November 2021).
- Horizontal Pod Autoscaling. Available online: https://kubernetes.io/docs/tasks/run-application/horizontal-pod-autoscale/ (accessed on 2 January 2022).
- Locust. Available online: https://locust.io (accessed on 11 December 2021).
- Data Protection Commissioner. Self-Assessment Checklist GDPR Readiness Checklist Tools. Available online: https://www.dataprotection.ie/en/organisations/resources-organisations/self-assessment-checklist (accessed on 6 October 2021).
- Uniitest. Available online: https://docs.python.org/3/library/unittest.html (accessed on 5 December 2021).
- GDPR Compliance Tool. Available online: https://github.com/tekrajchhetri/GDPR_compliance_tool (accessed on 12 January 2022).
GDPR Principles | SDM Protection Goal | Scope and Purpose | TOM | Our TOM Implementation | Our Tool’s Component |
---|---|---|---|---|---|
Purpose limitation (Art. 5(1)(b)) | Unlinkability | Takes the principle of purpose limitation into account; defines the permissible purpose changes. | Role concepts with graduated access rights on the basis of identity management and secure authentication process. | JavaScript Object Notation (JSON) [18] Web Tokens (JWT) [19]-based access control is implemented. Further, customization of standard JWT token-based access is implemented, enabling role-based endpoint access. | API layer |
Storage limitation (Art. 5(1)(e)) | Availability | Ensuring the availability of data at a certain time for those who require it at that time. | Documentation of data syntax. | PEP-8 [20] coding convention is followed throughout the entire code base; code is commented for better understandability. Swagger (an interface description language for describing RESTful APIs) is used to document the RESTful APIs. | All components |
Lawfulness, fairness and transparency (Art. 5(1)(a)) | Transparency | The extent and the form in which data processing should be kept transparent towards data subjects and supervisory authorities; information and disclosure obligations pursuant to Art. 12 et seq. GDPR, the notification obligation pursuant to Art. 34 GDPR, the documentation of the processing pursuant to Art. 30 GDPR. | Documentation of consents, their revocations and objections. | Consent and their states, such as revocations, are stored in the GraphDB [21] database, as well as logged in the MongoDB [22] database. | Compliance, Consent, Audit |
Accuracy (5(1)(d)), Integrity and confidentiality (Art. 5(1)(f)) | Intervenability | The extent to which data subject rights are to be granted; how data subjects can exercise their rights, how to ensure that requests are made in a legitimate manner, what corrections can be taken in the processing of personal data (e.g., by rectification, erasure, or limitation of the processing of personal data) and in what form data can be transferred by or to other controllers. | Operational possibility of compiling, consistently rectifying, blocking and erasure of all stored personal data. | All data are stored in the KG with a unique ID and these data are processed via REST API endpoints; by providing personal information that resolves to a unique ID, users can access their data via a user interface. | Compliance, Consent |
Integrity and confidentiality (Art. 5(1)(f)) | Confidentiality | Takes care that the disclosure of certain data is denied to those who are not authorized to have access to it; takes into account the processes, systems, and services potentially vulnerable to unauthorized access. | Encryption of data. | Deterministic searchable encryption technique is used to encrypt the data. The Rivest–Shamir–Adleman (RSA) [23] with Public Key Cryptography (PKCS) Standards) #1 Optimal Asymmetric Encryption Padding (OAEP) is used for asymmetric Advanced Encryption Standard (AES) [24] session key encryption and chained three layers AES for data encryption. Further, implementation of authentication procedure. & Identity management is used to ensure that only registered components have access to endpoints. | Security |
Integrity and confidentiality (Art. 5(1)(f)), Accountability (Art. 5(2)) | Integrity | Ensuring that data related to an identified or identifiable person are kept intact and up-to-date; ensuring that the processes, systems, and services are correctly planned, operated, and controlled according to the intended purpose. | Protection against external influences. | Security measures such as encryption, role-based access controls to prevent unauthorized data access. Audits and tests to document functionality, risks, security gaps. | Security, Audit |
Data minimization (Art. 5(1)(c)) | Data minimization | Implementation of the data minimization requirement of the GDPR; establishment of retention periods for personal data and processes to ensure compliance. | Reduction of non-required attributes of data subjects. | Consent creation REST API endpoint defines minimal set of variables for processing. | Consent |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Chhetri, T.R.; Kurteva, A.; DeLong, R.J.; Hilscher, R.; Korte, K.; Fensel, A. Data Protection by Design Tool for Automated GDPR Compliance Verification Based on Semantically Modeled Informed Consent. Sensors 2022, 22, 2763. https://doi.org/10.3390/s22072763
Chhetri TR, Kurteva A, DeLong RJ, Hilscher R, Korte K, Fensel A. Data Protection by Design Tool for Automated GDPR Compliance Verification Based on Semantically Modeled Informed Consent. Sensors. 2022; 22(7):2763. https://doi.org/10.3390/s22072763
Chicago/Turabian StyleChhetri, Tek Raj, Anelia Kurteva, Rance J. DeLong, Rainer Hilscher, Kai Korte, and Anna Fensel. 2022. "Data Protection by Design Tool for Automated GDPR Compliance Verification Based on Semantically Modeled Informed Consent" Sensors 22, no. 7: 2763. https://doi.org/10.3390/s22072763
APA StyleChhetri, T. R., Kurteva, A., DeLong, R. J., Hilscher, R., Korte, K., & Fensel, A. (2022). Data Protection by Design Tool for Automated GDPR Compliance Verification Based on Semantically Modeled Informed Consent. Sensors, 22(7), 2763. https://doi.org/10.3390/s22072763