Data protection
authorities worldwide have agreed on the value of considering
privacy-by-design principles when developing privacy-friendly systems
and software. However, on the technical plane, a profusion of
privacy-oriented guidelines and approaches coexists, which provides
partial solutions to the overall problem and aids engineers during
different stages of the system development lifecycle. As a result,
engineers find difficult to understand what they should do to make
their systems abide by privacy by design, thus hindering the adoption
of privacy engineering practices. This paper reviews existing best
practices in the analysis and design stages of the system development
lifecycle, introduces a systematic methodology for privacy engineering
that merges and integrates them, leveraging their best features whilst
addressing their weak points, and describes its alignment with current
standardization efforts.
Six protection
goals provide a common scheme for addressing the legal, technical,
economic, and societal dimensions of privacy and data protection in
complex IT systems. In this paper, each of these is analyzed for state
of the art in implementation, existing techniques and technologies, and
future research indications.
Federated Identity
Management (FIM), while solving important scalability, security and
privacy problems of remote entity authentication, introduces new
privacy risks. By virtue of sharing identities with many systems, the
improved data quality of subjects may increase the possibilities of
linking private data sets; moreover, new opportunities for user
profiling are being introduced. However, FIM models to mitigate these
risks have been proposed. In this paper we elaborate privacy by design
requirements for this class of systems, transpose them into specific
architectural requirements, and evaluate a number of FIM models with
respect to these requirements. The contributions of this paper are a
catalog of privacy-related architectural requirements, joining up
legal, business and system architecture viewpoints, and the
demonstration of concrete FIM models showing how the requirements can
be implemented in practice.