SlideShare a Scribd company logo
Towards an End-to-End
Architecture for Run-time
Data Protection in the Cloud
Nazila Gol Mohammadi*, Zoltan Adam Mann*, Andreas Metzger*,
Maritta Heisel*, James Greig+
* paluno, +OCC
Motivational Example
2SEAA 2018, Prague
IaaS Cloud
Provider X
FR
Component
A
DB
PaaS Cloud
provider
US
Component B is deployed
in a non-EU geolocation.
Access violates GPDR
wrt. geo-location policies.
Data is transferred to SaaS
provided by untrusted entity,
thus threat to data protection
Component and thus its data is deployed on
non-secure infrastructure and thus data
may be compromised
Data is deployed in non-
secure DB and thus data
may be compromised
SaaS Cloud
Provider Z
Data Consumer
IaaS Cloud
Provider Y
DataData Subject
Legislative Organ Data Controller A
Com-
ponent
C
Component
B
Challenges for Data Protection
Uncertainty at design time of run-time changes
• Dynamic deployment, migration, change of privacy preferences, …
• Privacy- and Security-by-Design no longer sufficient
 Runtime data protection
Conflicting goals
• Security techniques can have considerable overhead
• May negatively impact costs, performance, etc.
 Trade-off between conflicting goals
Complex interactions among multiple entities
• Software, hardware, services, stakeholders, …
• “Isolated”, individual solutions not sufficient
 End-to-end architecture and integrated solutions
3SEAA 2018, Prague
Solution Idea
End-to-end architecture for integration and dynamic
adaptation of data protection techniques
4SEAA 2018, Prague
End-to-End Runtime
Data Protection
Exploiting
Secure
Hardware for
Secure Data
Storage and
Processing
Sticky
Policies
&
Secure Data
Life-cycle
Models@
Runtime
&
Self-
Adaptation
Automated
Risk Analysis
&
Management
Development and Validation Process
Overview of process phases
5
1. Requirements
Engineering
2. Design of E2E
Architecture
3. Validation
SEAA 2018, Prague
1. Requirements Engineering
6
1) Requirements Engineering
1a) Context Analysis
(Identifying Roles and
Entities)
1b) Requirements
Identification
(Goal and Scenario Modelling)
Privacy Framework from
ISO/IEC 29100
General Data Protection
Regulation (GDPR)
List of Actors
& Context
Entities
Goal
Model
SEAA 2018, Prague
2. Design of E2E Architecture
Considerations to manage complexity
• Define architecture on conceptual level
 no deployment concerns (e.g., distribution)
• Focus on run-time concerns
 design tools considered separately
• Identify key functions and concerns
 high-level components
• Define principal information flow
 conceptual interfaces (low coupling)
7SEAA 2018, Prague
2. Design of E2E Architecture
8SEAA 2018, Prague
Application
Data Controller
Cloud infrastructure
(public, private, …)
Sensitive data
store
Data
gatekeeper
Adaptation
Risk
assessment
monitor
adapt
register*
register
Data access
protection
data access
adapt
monitor
* Data Subject may register
directly with Data
Gatekeeper or via Application
Data Subject
request
System
modeling
2. Design of E2E Architecture
9SEAA 2018, Prague
Application
Data Controller
Cloud infrastructure
(public, private, …)
Sensitive data
store
Data
gatekeeper
Adaptation
Risk
assessment
Run-time
model
proposed adaptation
risk impact of proposed adaptation
policies, service contracts
current risk level too high
analyze
update
monitor
adapt
analyze
service contracts
register*
register
request
Data access
protection
data access
request
restrictions
monitor
adapt
adapt
monitor
Logging
log log
log
log
policy change
Data Subject
System
modeling
3. Validation
10
3) Validation
3a) Scenario-
based Validation
3b) Case
Study
Scenarios for
Goal
Satisfaction
Application
Example
SEAA 2018, Prague
3. Validation
Example scenario for scenario-based validation
11SEAA 2018, Prague
3. Validation
Commercial case study
• Data subjects
• Vulnerable adults living at home
• Data users
1) Volunteers
2) Social care providers
• Data access
1) Matchmaking between volunteers
and vulnerable adults
2) Anonymous access to geographical
data about people with unmet needs
• Deployment on public cloud
12SEAA 2018, Prague
Conclusion and Outlook
Initial design of
End-to-End architecture
for data protection
in the cloud
Future work
• From conceptual to technical architecture (decentralization of
components, programmatic APIs, …)
• Exploiting TOSCA for run-time model
SEAA 2018, Prague 13
Thank you!
https://restassuredh2020.eu
Research leading to these results
has received funding from …the
EU’s Horizon 2020 research and
innovation programme under grant
agreement 731678 (RestAssured)
SEAA 2018, Prague 14
Requirements for E2E architecture
• R1: Registration of data subjects to for specifying/updating their
privacy preferences
• R2: Access to sensitive data of data subjects regulated by data
protection policies
• R3: Registration of data controllers for specifying offered service
contracts
• R4: Applications requests access to sensitive data
• R5: Compliance of application’s accesses to data protection policies
• R6: Data controllers need monitoring capabilities
• R7: Identification of violations
• R8: Data controllers need adaptations capabilities (for data protection)
• R9: Data controllers should identify risks w.r.t. to data protection
15SEAA 2018, Prague
Design of E2E architecture
Data Gatekeeper (cont.)
• Manages the data protection policies and service
contracts
• Decides, based on the available policies and contracts,
which operations are allowed
16SEAA 2018, Prague
Design of E2E architecture
Data Access Protection (cont.)
• Ensuring conformance of data accesses to the policies
• Secure enclaves and cryptographic techniques for
ensuring data confidentiality and integrity
• Access control to enforce the compliance with the
data protection policies
•
17SEAA 2018, Prague
Design of E2E architecture
Adaptation (cont.)
• Responsible for the satisfaction of data protection
goals in the presence of run-time changes
• Continuously monitoring of the system and its
environment
• Analysing detected changes w.r.t. its impact on
data protection
• Devising a plan to adapt the system if a identified
change represents an actual or imminent problem
• Carrying out planned adaptations by reconfiguration
18SEAA 2018, Prague
Design of E2E architecture
Risk Assessment (cont.)
• Responsible for continuous run-time risks assessment
• Triggering Adaptation component if the risk level is too
high
• Assessing risk impact of planned adaptations to ensure
that proposed changes by adaptation:
• will be compliant with the data protection policies
• do not introduce unacceptable risks
19SEAA 2018, Prague
2. Design of E2E Architecture
Run-time Model
• Considers all relevant assets and their relationships within
system and its context
• Up-to-date by monitoring
• Model information is used by multiple components to
reason about
• current situation
• associated risks of data protection violation
• other requirement violations
20SEAA 2018, Prague

More Related Content

What's hot (20)

PDF
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
ieeepondy
 
PDF
How to Swiftly Operationalize the Data Lake for Advanced Analytics Using a Lo...
Denodo
 
PDF
Secure Your Data with Virtual Data Fabric (ASEAN)
Denodo
 
PDF
Graphs in Telecommunications - Jesus Barrasa, Neo4j
Neo4j
 
PDF
Product Keynote: Advancing Denodo’s Logical Data Fabric with AI and Advanced ...
Denodo
 
DOCX
Cloud computing projects
CloudTechnologies
 
PDF
The Linked Data Advantage
Sqrrl
 
PDF
Gianluigi Vigano, Senior Architect and Fouad Teban, Regional Presales Manager...
Dataconomy Media
 
PPTX
Web Analytics In 5 Minutes Or Less
Michael Halder
 
PDF
Operationalize with alerting, custom dashboards, and timelines
Elasticsearch
 
PDF
Data Virtualization enabled Data Fabric: Operationalize the Data Lake (APAC)
Denodo
 
PDF
Accelerate Self-service Analytics with Universal Semantic Model
Denodo
 
PDF
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
LeMeniz Infotech
 
PDF
Fluency® - www.fluencysecurity.com
Collin Miles
 
PPTX
YugaByte DB - "Designing a Distributed Database Architecture for GDPR Complia...
Jimmy Guerrero
 
PDF
GraphTour 2020 - Allianz: Empower your business with Graph Analytics
Neo4j
 
PDF
Cloud gateways for regulatory compliance
Ulf Mattsson
 
PDF
Big Data Security and Governance
DataWorks Summit/Hadoop Summit
 
DOC
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
Shakas Technologies
 
PPTX
Building a future-proof cyber security platform with Apache Metron
DataWorks Summit
 
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
ieeepondy
 
How to Swiftly Operationalize the Data Lake for Advanced Analytics Using a Lo...
Denodo
 
Secure Your Data with Virtual Data Fabric (ASEAN)
Denodo
 
Graphs in Telecommunications - Jesus Barrasa, Neo4j
Neo4j
 
Product Keynote: Advancing Denodo’s Logical Data Fabric with AI and Advanced ...
Denodo
 
Cloud computing projects
CloudTechnologies
 
The Linked Data Advantage
Sqrrl
 
Gianluigi Vigano, Senior Architect and Fouad Teban, Regional Presales Manager...
Dataconomy Media
 
Web Analytics In 5 Minutes Or Less
Michael Halder
 
Operationalize with alerting, custom dashboards, and timelines
Elasticsearch
 
Data Virtualization enabled Data Fabric: Operationalize the Data Lake (APAC)
Denodo
 
Accelerate Self-service Analytics with Universal Semantic Model
Denodo
 
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
LeMeniz Infotech
 
Fluency® - www.fluencysecurity.com
Collin Miles
 
YugaByte DB - "Designing a Distributed Database Architecture for GDPR Complia...
Jimmy Guerrero
 
GraphTour 2020 - Allianz: Empower your business with Graph Analytics
Neo4j
 
Cloud gateways for regulatory compliance
Ulf Mattsson
 
Big Data Security and Governance
DataWorks Summit/Hadoop Summit
 
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
Shakas Technologies
 
Building a future-proof cyber security platform with Apache Metron
DataWorks Summit
 

Similar to Towards an End-to-End Architecture for Run-time Data Protection in the Cloud (20)

PDF
Data Architecture for Solutions.pdf
Alan McSweeney
 
PDF
A Novel Computing Paradigm for Data Protection in Cloud Computing
IJMER
 
PDF
t2_4-architecting-data-for-integration-and-longevity
Jonathan Hamilton Solórzano
 
PPTX
Webinar: How to Design Primary Storage for GDPR
Storage Switzerland
 
PDF
Enterprise Architecture - An Introduction
Daljit Banger
 
PDF
Practical Enterprise Security Architecture
Priyanka Aash
 
PDF
Week-2_LectureA1_701.pdf
ssuserc3fe80
 
PDF
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Editor IJMTER
 
PPTX
New enterprise application and data security challenges and solutions apr 2...
Ulf Mattsson
 
PDF
Beyond GDPR Compliance - Role of Internal Audit
Omo Osagiede
 
PDF
Forecast 2014: SaaS Data Exchange
Open Data Center Alliance
 
PDF
111906665 ensuring-distributed-accountability-for-data-sharing-in-the-cloud
Nag Nani
 
PDF
Cloud Data Protection for the Masses
IRJET Journal
 
PPT
Securing Citizen Facing Applications
edwinlorenzana
 
PDF
Addressing Gaps in Your Cyber Security
NextLabs, Inc.
 
PPTX
The Enablement of an Identity-Centric SOC in the Regulatory Rumba Era
Luca Martelli
 
DOC
Privacy Preserving Public Auditing for Data Storage Security in Cloud
Girish Chandra
 
PDF
Designing Security Architecture Solutions 1st Jay Ramachandran
pianondorman
 
PDF
Guidelines for the technological development in the e-health application domain
Ivano Malavolta
 
PDF
Enabling a Data Mesh Architecture with Data Virtualization
Denodo
 
Data Architecture for Solutions.pdf
Alan McSweeney
 
A Novel Computing Paradigm for Data Protection in Cloud Computing
IJMER
 
t2_4-architecting-data-for-integration-and-longevity
Jonathan Hamilton Solórzano
 
Webinar: How to Design Primary Storage for GDPR
Storage Switzerland
 
Enterprise Architecture - An Introduction
Daljit Banger
 
Practical Enterprise Security Architecture
Priyanka Aash
 
Week-2_LectureA1_701.pdf
ssuserc3fe80
 
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Editor IJMTER
 
New enterprise application and data security challenges and solutions apr 2...
Ulf Mattsson
 
Beyond GDPR Compliance - Role of Internal Audit
Omo Osagiede
 
Forecast 2014: SaaS Data Exchange
Open Data Center Alliance
 
111906665 ensuring-distributed-accountability-for-data-sharing-in-the-cloud
Nag Nani
 
Cloud Data Protection for the Masses
IRJET Journal
 
Securing Citizen Facing Applications
edwinlorenzana
 
Addressing Gaps in Your Cyber Security
NextLabs, Inc.
 
The Enablement of an Identity-Centric SOC in the Regulatory Rumba Era
Luca Martelli
 
Privacy Preserving Public Auditing for Data Storage Security in Cloud
Girish Chandra
 
Designing Security Architecture Solutions 1st Jay Ramachandran
pianondorman
 
Guidelines for the technological development in the e-health application domain
Ivano Malavolta
 
Enabling a Data Mesh Architecture with Data Virtualization
Denodo
 
Ad

More from Andreas Metzger (16)

PPTX
Explainable Online Reinforcement Learning for Adaptive Systems
Andreas Metzger
 
PPTX
Data Quality Issues in Online Reinforcement Learning for Self-Adaptive System...
Andreas Metzger
 
PPTX
Explaining Online Reinforcement Learning Decisions of Self-Adaptive Systems
Andreas Metzger
 
PPTX
Antrittsvorlesung - APL.pptx
Andreas Metzger
 
PPTX
Feature Model-Guided Online Reinforcement Learning for Self-Adaptive Services
Andreas Metzger
 
PPTX
Triggering Proactive Business Process Adaptations via Online Reinforcement Le...
Andreas Metzger
 
PPTX
Data-driven AI for Self-Adaptive Software Systems
Andreas Metzger
 
PPTX
Data-driven Deep Learning for Proactive Terminal Process Management
Andreas Metzger
 
PPTX
Big Data Technology Insights
Andreas Metzger
 
PPTX
Proactive Process Adaptation using Deep Learning Ensembles
Andreas Metzger
 
PPTX
Data-driven AI for Self-adaptive Information Systems
Andreas Metzger
 
PPTX
Considering Non-sequential Control Flows for Process Prediction with Recurren...
Andreas Metzger
 
PPTX
Big Data Value in Mobility and Logistics
Andreas Metzger
 
PPTX
Predictive Business Process Monitoring considering Reliability and Risk
Andreas Metzger
 
PDF
Risk-based Proactive Process Adaptation
Andreas Metzger
 
PDF
Predictive Process Monitoring Considering Reliability Estimates
Andreas Metzger
 
Explainable Online Reinforcement Learning for Adaptive Systems
Andreas Metzger
 
Data Quality Issues in Online Reinforcement Learning for Self-Adaptive System...
Andreas Metzger
 
Explaining Online Reinforcement Learning Decisions of Self-Adaptive Systems
Andreas Metzger
 
Antrittsvorlesung - APL.pptx
Andreas Metzger
 
Feature Model-Guided Online Reinforcement Learning for Self-Adaptive Services
Andreas Metzger
 
Triggering Proactive Business Process Adaptations via Online Reinforcement Le...
Andreas Metzger
 
Data-driven AI for Self-Adaptive Software Systems
Andreas Metzger
 
Data-driven Deep Learning for Proactive Terminal Process Management
Andreas Metzger
 
Big Data Technology Insights
Andreas Metzger
 
Proactive Process Adaptation using Deep Learning Ensembles
Andreas Metzger
 
Data-driven AI for Self-adaptive Information Systems
Andreas Metzger
 
Considering Non-sequential Control Flows for Process Prediction with Recurren...
Andreas Metzger
 
Big Data Value in Mobility and Logistics
Andreas Metzger
 
Predictive Business Process Monitoring considering Reliability and Risk
Andreas Metzger
 
Risk-based Proactive Process Adaptation
Andreas Metzger
 
Predictive Process Monitoring Considering Reliability Estimates
Andreas Metzger
 
Ad

Recently uploaded (20)

PDF
"Beyond English: Navigating the Challenges of Building a Ukrainian-language R...
Fwdays
 
PDF
Exolore The Essential AI Tools in 2025.pdf
Srinivasan M
 
PDF
CIFDAQ Weekly Market Wrap for 11th July 2025
CIFDAQ
 
PDF
Timothy Rottach - Ramp up on AI Use Cases, from Vector Search to AI Agents wi...
AWS Chicago
 
PDF
SWEBOK Guide and Software Services Engineering Education
Hironori Washizaki
 
PDF
The Builder’s Playbook - 2025 State of AI Report.pdf
jeroen339954
 
PPTX
WooCommerce Workshop: Bring Your Laptop
Laura Hartwig
 
PDF
Reverse Engineering of Security Products: Developing an Advanced Microsoft De...
nwbxhhcyjv
 
PDF
HubSpot Main Hub: A Unified Growth Platform
Jaswinder Singh
 
PDF
Agentic AI lifecycle for Enterprise Hyper-Automation
Debmalya Biswas
 
PDF
Achieving Consistent and Reliable AI Code Generation - Medusa AI
medusaaico
 
PDF
LLMs.txt: Easily Control How AI Crawls Your Site
Keploy
 
PDF
July Patch Tuesday
Ivanti
 
PDF
Smart Trailers 2025 Update with History and Overview
Paul Menig
 
PPTX
"Autonomy of LLM Agents: Current State and Future Prospects", Oles` Petriv
Fwdays
 
PDF
SFWelly Summer 25 Release Highlights July 2025
Anna Loughnan Colquhoun
 
PPT
Interview paper part 3, It is based on Interview Prep
SoumyadeepGhosh39
 
PPTX
Webinar: Introduction to LF Energy EVerest
DanBrown980551
 
PDF
Newgen 2022-Forrester Newgen TEI_13 05 2022-The-Total-Economic-Impact-Newgen-...
darshakparmar
 
PDF
CIFDAQ Market Insights for July 7th 2025
CIFDAQ
 
"Beyond English: Navigating the Challenges of Building a Ukrainian-language R...
Fwdays
 
Exolore The Essential AI Tools in 2025.pdf
Srinivasan M
 
CIFDAQ Weekly Market Wrap for 11th July 2025
CIFDAQ
 
Timothy Rottach - Ramp up on AI Use Cases, from Vector Search to AI Agents wi...
AWS Chicago
 
SWEBOK Guide and Software Services Engineering Education
Hironori Washizaki
 
The Builder’s Playbook - 2025 State of AI Report.pdf
jeroen339954
 
WooCommerce Workshop: Bring Your Laptop
Laura Hartwig
 
Reverse Engineering of Security Products: Developing an Advanced Microsoft De...
nwbxhhcyjv
 
HubSpot Main Hub: A Unified Growth Platform
Jaswinder Singh
 
Agentic AI lifecycle for Enterprise Hyper-Automation
Debmalya Biswas
 
Achieving Consistent and Reliable AI Code Generation - Medusa AI
medusaaico
 
LLMs.txt: Easily Control How AI Crawls Your Site
Keploy
 
July Patch Tuesday
Ivanti
 
Smart Trailers 2025 Update with History and Overview
Paul Menig
 
"Autonomy of LLM Agents: Current State and Future Prospects", Oles` Petriv
Fwdays
 
SFWelly Summer 25 Release Highlights July 2025
Anna Loughnan Colquhoun
 
Interview paper part 3, It is based on Interview Prep
SoumyadeepGhosh39
 
Webinar: Introduction to LF Energy EVerest
DanBrown980551
 
Newgen 2022-Forrester Newgen TEI_13 05 2022-The-Total-Economic-Impact-Newgen-...
darshakparmar
 
CIFDAQ Market Insights for July 7th 2025
CIFDAQ
 

Towards an End-to-End Architecture for Run-time Data Protection in the Cloud

  • 1. Towards an End-to-End Architecture for Run-time Data Protection in the Cloud Nazila Gol Mohammadi*, Zoltan Adam Mann*, Andreas Metzger*, Maritta Heisel*, James Greig+ * paluno, +OCC
  • 2. Motivational Example 2SEAA 2018, Prague IaaS Cloud Provider X FR Component A DB PaaS Cloud provider US Component B is deployed in a non-EU geolocation. Access violates GPDR wrt. geo-location policies. Data is transferred to SaaS provided by untrusted entity, thus threat to data protection Component and thus its data is deployed on non-secure infrastructure and thus data may be compromised Data is deployed in non- secure DB and thus data may be compromised SaaS Cloud Provider Z Data Consumer IaaS Cloud Provider Y DataData Subject Legislative Organ Data Controller A Com- ponent C Component B
  • 3. Challenges for Data Protection Uncertainty at design time of run-time changes • Dynamic deployment, migration, change of privacy preferences, … • Privacy- and Security-by-Design no longer sufficient  Runtime data protection Conflicting goals • Security techniques can have considerable overhead • May negatively impact costs, performance, etc.  Trade-off between conflicting goals Complex interactions among multiple entities • Software, hardware, services, stakeholders, … • “Isolated”, individual solutions not sufficient  End-to-end architecture and integrated solutions 3SEAA 2018, Prague
  • 4. Solution Idea End-to-end architecture for integration and dynamic adaptation of data protection techniques 4SEAA 2018, Prague End-to-End Runtime Data Protection Exploiting Secure Hardware for Secure Data Storage and Processing Sticky Policies & Secure Data Life-cycle Models@ Runtime & Self- Adaptation Automated Risk Analysis & Management
  • 5. Development and Validation Process Overview of process phases 5 1. Requirements Engineering 2. Design of E2E Architecture 3. Validation SEAA 2018, Prague
  • 6. 1. Requirements Engineering 6 1) Requirements Engineering 1a) Context Analysis (Identifying Roles and Entities) 1b) Requirements Identification (Goal and Scenario Modelling) Privacy Framework from ISO/IEC 29100 General Data Protection Regulation (GDPR) List of Actors & Context Entities Goal Model SEAA 2018, Prague
  • 7. 2. Design of E2E Architecture Considerations to manage complexity • Define architecture on conceptual level  no deployment concerns (e.g., distribution) • Focus on run-time concerns  design tools considered separately • Identify key functions and concerns  high-level components • Define principal information flow  conceptual interfaces (low coupling) 7SEAA 2018, Prague
  • 8. 2. Design of E2E Architecture 8SEAA 2018, Prague Application Data Controller Cloud infrastructure (public, private, …) Sensitive data store Data gatekeeper Adaptation Risk assessment monitor adapt register* register Data access protection data access adapt monitor * Data Subject may register directly with Data Gatekeeper or via Application Data Subject request System modeling
  • 9. 2. Design of E2E Architecture 9SEAA 2018, Prague Application Data Controller Cloud infrastructure (public, private, …) Sensitive data store Data gatekeeper Adaptation Risk assessment Run-time model proposed adaptation risk impact of proposed adaptation policies, service contracts current risk level too high analyze update monitor adapt analyze service contracts register* register request Data access protection data access request restrictions monitor adapt adapt monitor Logging log log log log policy change Data Subject System modeling
  • 10. 3. Validation 10 3) Validation 3a) Scenario- based Validation 3b) Case Study Scenarios for Goal Satisfaction Application Example SEAA 2018, Prague
  • 11. 3. Validation Example scenario for scenario-based validation 11SEAA 2018, Prague
  • 12. 3. Validation Commercial case study • Data subjects • Vulnerable adults living at home • Data users 1) Volunteers 2) Social care providers • Data access 1) Matchmaking between volunteers and vulnerable adults 2) Anonymous access to geographical data about people with unmet needs • Deployment on public cloud 12SEAA 2018, Prague
  • 13. Conclusion and Outlook Initial design of End-to-End architecture for data protection in the cloud Future work • From conceptual to technical architecture (decentralization of components, programmatic APIs, …) • Exploiting TOSCA for run-time model SEAA 2018, Prague 13
  • 14. Thank you! https://restassuredh2020.eu Research leading to these results has received funding from …the EU’s Horizon 2020 research and innovation programme under grant agreement 731678 (RestAssured) SEAA 2018, Prague 14
  • 15. Requirements for E2E architecture • R1: Registration of data subjects to for specifying/updating their privacy preferences • R2: Access to sensitive data of data subjects regulated by data protection policies • R3: Registration of data controllers for specifying offered service contracts • R4: Applications requests access to sensitive data • R5: Compliance of application’s accesses to data protection policies • R6: Data controllers need monitoring capabilities • R7: Identification of violations • R8: Data controllers need adaptations capabilities (for data protection) • R9: Data controllers should identify risks w.r.t. to data protection 15SEAA 2018, Prague
  • 16. Design of E2E architecture Data Gatekeeper (cont.) • Manages the data protection policies and service contracts • Decides, based on the available policies and contracts, which operations are allowed 16SEAA 2018, Prague
  • 17. Design of E2E architecture Data Access Protection (cont.) • Ensuring conformance of data accesses to the policies • Secure enclaves and cryptographic techniques for ensuring data confidentiality and integrity • Access control to enforce the compliance with the data protection policies • 17SEAA 2018, Prague
  • 18. Design of E2E architecture Adaptation (cont.) • Responsible for the satisfaction of data protection goals in the presence of run-time changes • Continuously monitoring of the system and its environment • Analysing detected changes w.r.t. its impact on data protection • Devising a plan to adapt the system if a identified change represents an actual or imminent problem • Carrying out planned adaptations by reconfiguration 18SEAA 2018, Prague
  • 19. Design of E2E architecture Risk Assessment (cont.) • Responsible for continuous run-time risks assessment • Triggering Adaptation component if the risk level is too high • Assessing risk impact of planned adaptations to ensure that proposed changes by adaptation: • will be compliant with the data protection policies • do not introduce unacceptable risks 19SEAA 2018, Prague
  • 20. 2. Design of E2E Architecture Run-time Model • Considers all relevant assets and their relationships within system and its context • Up-to-date by monitoring • Model information is used by multiple components to reason about • current situation • associated risks of data protection violation • other requirement violations 20SEAA 2018, Prague

Editor's Notes

  • #16: R1: Registration of data subjects to the E2E run-time data protection system for specifying / updating their privacy preferences. R2: Access to sensitive data of data subjects is regulated by data protection policies. R3: Registration of data controllers to the E2E run-time data protection system for specifying contracts of offered services. R4: Requests for access to sensitive data by applications. R5: Compliance of application’s accesses to sensitive data with the data protection policies. R6: Data controllers monitor applications, the infrastructure and changes in data protection policies. R7: Identification of violations regarding data protection. R8: Support for data controllers in performing adaptations on applications and the cloud infrastructure. R9: Support for data controllers in identifying risks with respect to data protection, thus facilitating proactive adaptations.
  • #17: Manages the data protection policies and service contracts governing the data life-cycle. Decides, based on the available policies and contracts, which operations are allowed for a certain data. Addresses requirements: R1, R2, and R3.
  • #18: Ensuring that data accesses are secure and conform to the relevant policies. Applying secure enclaves and cryptographic techniques for ensuring data confidentiality and integrity. Involvement in access control to enforce the compliance with the specified data protection policies. Addresses requirements R2, R4, and R5
  • #19: Responsible for the satisfaction of requirements in the presence of run-time changes. Continuously monitoring of the system and its environment. Analysing detected changes with respect to its impact on data protection and other quality attributes. Devising a plan to adapt the system if a identified change represents an actual or imminent problem. Carrying out planned adaptations by reconfiguring the appropriate component or context entity. Addresses requirements: R6, R7, and R8.
  • #20: Responsibility for continuous run-time assessment of risks for data protection. Assessing of risks associated with the current system setup  triggering Adaptation component if the risk level is too high. Assessing of risk impact of planned adaptations for ensuring that changes, proposed by adaptation will be compliant with the available policies do not introduce unacceptable risks of data protection violation. Addresses requirements: R7 and R9.