Abstract:
A method for implementing a privacy policy includes receiving code for an application which includes definitions for a set of classes of records and for each of the record classes in the set, a definition of at least one field. A user selects one or more of the record classes and fields of the application as sensitive. A records manager is generated for identifying an associated minimization service for generating a minimized value of data in the sensitive field. A mapping aspect identifies joins in the application code where the minimization service is to be called. When the records manager and mapping aspect are deployed with the application, the minimization service generates a minimized value of data in the respective sensitive field.
Abstract:
A system and method for implementing a privacy policy in an application to be run are provided. Definitions are received for a set of fields. At least one of the fields is designated as sensitive by a default privacy policy. A user is provided with a consent editor whereby the user can consent to relaxing the default privacy policy for at least one of the sensitive fields. A consent privacy rule is generated based on the received consent. A mapping aspect is provided which identifies joins at which code of the application is to be augmented by calling a minimization service to apply the default privacy policy by generating a minimized value of data in each of the designated sensitive fields used by the application unless there is a generated consent privacy rule which authorizes relaxation of the default privacy policy for the user's data in a respective sensitive field.
Abstract:
A method for implementing a privacy policy includes receiving code for an application which includes definitions for a set of classes of records and for each of the record classes in the set, a definition of at least one field. A user selects one or more of the record classes and fields of the application as sensitive. A records manager is generated for identifying an associated minimization service for generating a minimized value of data in the sensitive field. A mapping aspect identifies joins in the application code where the minimization service is to be called. When the records manager and mapping aspect are deployed with the application, the minimization service generates a minimized value of data in the respective sensitive field.
Abstract:
Data privacy is becoming increasingly important and, in some jurisdictions, required. Access to private data can be controlled by forcing all access to go through minimizations services that allow only authorized access to private data. These minimization services can become processing bottlenecks if the only way to modify private data is by way of requests to the minimization service. Certain homomorphic operations allow for encrypted data to be modified without being first decrypted although other operands must be encrypted. Augmenting a minimization service to provide a public encryption key provides for encryption of the other operands. Providing a records manager that can take advantage of homomorphic operations allows certain data operations to be performed without compromising security and without accessing the minimization service.
Abstract:
A system and method for implementing a privacy policy in an application to be run are provided. Definitions are received for a set of fields. At least one of the fields is designated as sensitive by a default privacy policy. A user is provided with a consent editor whereby the user can consent to relaxing the default privacy policy for at least one of the sensitive fields. A consent privacy rule is generated based on the received consent. A mapping aspect is provided which identifies joins at which code of the application is to be augmented by calling a minimization service to apply the default privacy policy by generating a minimized value of data in each of the designated sensitive fields used by the application unless there is a generated consent privacy rule which authorizes relaxation of the default privacy policy for the user's data in a respective sensitive field.
Abstract:
Data privacy is becoming increasingly important and, in some jurisdictions, required. Access to private data can be controlled by forcing all access to go through minimizations services that allow only authorized access to private data. These minimization services can become processing bottlenecks if the only way to modify private data is by way of requests to the minimization service. Certain homomorphic operations allow for encrypted data to be modified without being first decrypted although other operands must be encrypted. Augmenting a minimization service to provide a public encryption key provides for encryption of the other operands. Providing a records manager that can take advantage of homomorphic operations allows certain data operations to be performed without compromising security and without accessing the minimization service.