A CI-based Auditing Framework for Data Collection Practices

03/30/2023
by   Athina Markopoulou, et al.
0

Apps and devices (mobile devices, web browsers, IoT, VR, voice assistants, etc.) routinely collect user data, and send them to first- and third-party servers through the network. Recently, there is a lot of interest in (1) auditing the actual data collection practices of those systems; and also in (2) checking the consistency of those practices against the statements made in the corresponding privacy policies. In this paper, we argue that the contextual integrity (CI) tuple can be the basic building block for defining and implementing such an auditing framework. We elaborate on the special case where the tuple is partially extracted from the network traffic generated by the end-device of interest, and partially from the corresponding privacy policies using natural language processing (NLP) techniques. Along the way, we discuss related bodies of work and representative examples that fit into that framework. More generally, we believe that CI can be the building block not only for auditing at the edge, but also for specifying privacy policies and system APIs. We also discuss limitations and directions for future work.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
03/14/2023

The Overview of Privacy Labels and their Compatibility with Privacy Policies

Privacy nutrition labels provide a way to understand an app's key data p...
research
03/13/2023

Analytics for "interaction with the service": Surreptitious Collection of User Interaction Data

The rise of mobile apps has brought greater convenience and customizatio...
research
08/11/2023

PrivacyLens: A Framework to Collect and Analyze the Landscape of Past, Present, and Future Smart Device Privacy Policies

As the adoption of smart devices continues to permeate all aspects of ou...
research
11/20/2020

Resolving the cybersecurity Data Sharing Paradox to scale up cybersecurity via a co-production approach towards data sharing

As cybercriminals scale up their operations to increase their profits or...
research
11/30/2012

Secure voice based authentication for mobile devices: Vaulted Voice Verification

As the use of biometrics becomes more wide-spread, the privacy concerns ...
research
06/13/2022

Consent verification monitoring

Advances in service personalization are driven by low-cost data collecti...
research
08/19/2019

Three Dimensions of Privacy Policies

Privacy policies are the main way to obtain information related to perso...

Please sign up or login with your details

Forgot password? Click here to reset