Skip to main content

2024 | OriginalPaper | Buchkapitel

Privacy Engineering in the Data Mesh: Towards a Decentralized Data Privacy Governance Framework

verfasst von : Nemania Borovits, Indika Kumara, Damian A. Tamburri, Willem-Jan Van Den Heuvel

Erschienen in: Service-Oriented Computing – ICSOC 2023 Workshops

Verlag: Springer Nature Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Privacy engineering, emphasizing data protection during the design, build, and maintenance of software systems, faces new challenges and opportunities in the emerging decentralized data architectures, namely data mesh. By decentralizing data product ownership across domains, data mesh offers a novel paradigm to rethink how privacy principles are incorporated and maintained in modern system architectures. This paper introduces a conceptual framework that integrates privacy engineering principles with the decentralized nature of data mesh. Our approach provides a holistic view, capturing essential dimensions from both domains. We explore the intersections of privacy engineering and data mesh dimensions and provide guidelines for the stakeholders of a data mesh initiative to embed better data privacy controls. Our framework aims to offer a blueprint to ensure robust privacy practices are inherent, not just additive, during the adoption of data mesh.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Agarwal, V., et al.: Compliance-as-code for cybersecurity automation in hybrid cloud. In: 2022 IEEE 15th International Conference on Cloud Computing (CLOUD), pp. 427–437 (2022) Agarwal, V., et al.: Compliance-as-code for cybersecurity automation in hybrid cloud. In: 2022 IEEE 15th International Conference on Cloud Computing (CLOUD), pp. 427–437 (2022)
4.
Zurück zum Zitat Cavoukian, A., et al.: Privacy by design: the 7 foundational principles. Information and privacy commissioner of Ontario, Canada 5, 12 (2009) Cavoukian, A., et al.: Privacy by design: the 7 foundational principles. Information and privacy commissioner of Ontario, Canada 5, 12 (2009)
5.
Zurück zum Zitat Chen, D., Zhao, H.: Data security and privacy protection issues in cloud computing. In: 2012 International Conference on Computer Science and Electronics Engineering, vol. 1, pp. 647–651 (2012) Chen, D., Zhao, H.: Data security and privacy protection issues in cloud computing. In: 2012 International Conference on Computer Science and Electronics Engineering, vol. 1, pp. 647–651 (2012)
6.
Zurück zum Zitat Cranor, L.: Web Privacy with P3P. O’Reilly Media Inc., Sebastopol (2002) Cranor, L.: Web Privacy with P3P. O’Reilly Media Inc., Sebastopol (2002)
7.
Zurück zum Zitat Cranor, L.F.: Necessary but not sufficient: standardized mechanisms for privacy notice and choice. J. Telecommun. High Technol. Law 10, 273 (2012) Cranor, L.F.: Necessary but not sufficient: standardized mechanisms for privacy notice and choice. J. Telecommun. High Technol. Law 10, 273 (2012)
8.
Zurück zum Zitat Crosby, M., Pattanayak, P., Verma, S., Kalyanaraman, V., et al.: Blockchain technology: beyond bitcoin. Appl. Innov. 2(6–10), 71 (2016) Crosby, M., Pattanayak, P., Verma, S., Kalyanaraman, V., et al.: Blockchain technology: beyond bitcoin. Appl. Innov. 2(6–10), 71 (2016)
9.
10.
Zurück zum Zitat De Montjoye, Y.A., Rocher, L., Pentland, A.S.: bandicoot: a python toolbox for mobile phone metadata. J. Mach. Learn. Res. 17(1), 6100–6104 (2016)MathSciNet De Montjoye, Y.A., Rocher, L., Pentland, A.S.: bandicoot: a python toolbox for mobile phone metadata. J. Mach. Learn. Res. 17(1), 6100–6104 (2016)MathSciNet
11.
Zurück zum Zitat Dehghani, Z.: Data Mesh Delivering Data-Driven Value at Scale. O’Reilly Media, Sebastopol (2022) Dehghani, Z.: Data Mesh Delivering Data-Driven Value at Scale. O’Reilly Media, Sebastopol (2022)
13.
Zurück zum Zitat El Emam, K., Dankar, F.K.: Protecting privacy using k-anonymity. J. Am. Med. Inform. Assoc. 15(5), 627–637 (2008)CrossRef El Emam, K., Dankar, F.K.: Protecting privacy using k-anonymity. J. Am. Med. Inform. Assoc. 15(5), 627–637 (2008)CrossRef
14.
Zurück zum Zitat Fang, L., LeFevre, K.: Privacy wizards for social networking sites. In: Proceedings of the 19th International Conference on World Wide Web, pp. 351–360 (2010) Fang, L., LeFevre, K.: Privacy wizards for social networking sites. In: Proceedings of the 19th International Conference on World Wide Web, pp. 351–360 (2010)
15.
Zurück zum Zitat Friedland, G., Sommer, R.: Cybercasing the joint: on the privacy implications of geo-tagging. In: 5th USENIX Workshop on Hot Topics in Security (HotSec 2010) (2010) Friedland, G., Sommer, R.: Cybercasing the joint: on the privacy implications of geo-tagging. In: 5th USENIX Workshop on Hot Topics in Security (HotSec 2010) (2010)
18.
Zurück zum Zitat Heurix, J., Zimmermann, P., Neubauer, T., Fenz, S.: A taxonomy for privacy enhancing technologies. Comput. Secur. 53, 1–17 (2015)CrossRef Heurix, J., Zimmermann, P., Neubauer, T., Fenz, S.: A taxonomy for privacy enhancing technologies. Comput. Secur. 53, 1–17 (2015)CrossRef
21.
Zurück zum Zitat Khatri, V., Brown, C.V.: Designing data governance. Commun. ACM 53(1), 148–152 (2010)CrossRef Khatri, V., Brown, C.V.: Designing data governance. Commun. ACM 53(1), 148–152 (2010)CrossRef
23.
Zurück zum Zitat Lăzăroiu, G., Kovacova, M., Kliestikova, J., Kubala, P., Valaskova, K., Dengov, V.V.: Data governance and automated individual decision-making in the digital privacy general data protection regulation. Administratie si Manag. Public 31, 132–142 (2018) Lăzăroiu, G., Kovacova, M., Kliestikova, J., Kubala, P., Valaskova, K., Dengov, V.V.: Data governance and automated individual decision-making in the digital privacy general data protection regulation. Administratie si Manag. Public 31, 132–142 (2018)
24.
Zurück zum Zitat de Montjoye, Y.A., Hidalgo, C.A., Verleysen, M., Blondel, V.D.: Unique in the crowd: the privacy bounds of human mobility. Sci. Rep. 3(1), 1376 (2013)CrossRef de Montjoye, Y.A., Hidalgo, C.A., Verleysen, M., Blondel, V.D.: Unique in the crowd: the privacy bounds of human mobility. Sci. Rep. 3(1), 1376 (2013)CrossRef
25.
Zurück zum Zitat Newman, S.: Building Microservices. O’Reilly Media Inc., Sebastopol (2021) Newman, S.: Building Microservices. O’Reilly Media Inc., Sebastopol (2021)
26.
Zurück zum Zitat Otto, P.N., Antón, A.I.: Addressing legal requirements in requirements engineering: a systematic literature review. IEEE Trans. Softw. Eng. 43(2), 158–171 (2017) Otto, P.N., Antón, A.I.: Addressing legal requirements in requirements engineering: a systematic literature review. IEEE Trans. Softw. Eng. 43(2), 158–171 (2017)
27.
Zurück zum Zitat Pardau, S.L.: The California consumer privacy act: towards a European-style privacy regime in the United States. J. Tech. L. & Pol’y 23, 68 (2018) Pardau, S.L.: The California consumer privacy act: towards a European-style privacy regime in the United States. J. Tech. L. & Pol’y 23, 68 (2018)
28.
Zurück zum Zitat General Data Protection Regulation: Regulation (EU) 2016/679 of the European parliament and of the council. Regulation (EU) 679/2016 (2016) General Data Protection Regulation: Regulation (EU) 2016/679 of the European parliament and of the council. Regulation (EU) 679/2016 (2016)
29.
Zurück zum Zitat Richards, M.: Microservices vs. Service-Oriented Architecture. O’Reilly Media, Sebastopol (2015) Richards, M.: Microservices vs. Service-Oriented Architecture. O’Reilly Media, Sebastopol (2015)
31.
Zurück zum Zitat Spiekermann, S., Korunovska, J., Langheinrich, M.: Inside the organization: why privacy and security engineering is a challenge for engineers. Proc. IEEE 107(3), 600–615 (2018)CrossRef Spiekermann, S., Korunovska, J., Langheinrich, M.: Inside the organization: why privacy and security engineering is a challenge for engineers. Proc. IEEE 107(3), 600–615 (2018)CrossRef
32.
Zurück zum Zitat Sweeney, L.: k-anonymity: a model for protecting privacy. Int. J. Uncertainty Fuzziness Knowl.-Based Syst. 10(5), 557–570 (2002)MathSciNetCrossRef Sweeney, L.: k-anonymity: a model for protecting privacy. Int. J. Uncertainty Fuzziness Knowl.-Based Syst. 10(5), 557–570 (2002)MathSciNetCrossRef
34.
Zurück zum Zitat Wider, A., Verma, S., Akhtar, A.: Decentralized data governance as part of a data mesh platform: concepts and approaches. In: 2023 IEEE International Conference on Web Services (ICWS), pp. 746–754 (2023) Wider, A., Verma, S., Akhtar, A.: Decentralized data governance as part of a data mesh platform: concepts and approaches. In: 2023 IEEE International Conference on Web Services (ICWS), pp. 746–754 (2023)
35.
Zurück zum Zitat Williams, J., Nee, L.: Privacy engineering. Computer 55(10), 113–118 (2022)CrossRef Williams, J., Nee, L.: Privacy engineering. Computer 55(10), 113–118 (2022)CrossRef
36.
Zurück zum Zitat Xu, R., Baracaldo, N., Joshi, J.: Privacy-preserving machine learning: methods, challenges and directions. arXiv preprint arXiv:2108.04417 (2021) Xu, R., Baracaldo, N., Joshi, J.: Privacy-preserving machine learning: methods, challenges and directions. arXiv preprint arXiv:​2108.​04417 (2021)
Metadaten
Titel
Privacy Engineering in the Data Mesh: Towards a Decentralized Data Privacy Governance Framework
verfasst von
Nemania Borovits
Indika Kumara
Damian A. Tamburri
Willem-Jan Van Den Heuvel
Copyright-Jahr
2024
Verlag
Springer Nature Singapore
DOI
https://doi.org/10.1007/978-981-97-0989-2_21

Premium Partner