SlideShare une entreprise Scribd logo
1  sur  30
Methods and Tools for GDPR Compliance through
Privacy and Data
Protection 4 Engineering
PDPbD Framework
Improving Privacy and Data
Protection by Design
CEA
2020/03/10
Case Study: Smart Grid system
Overall description of the target Smart Grid system
2020/03/10 CEA PDP4E 2
Smart Grid functions and data flows
PDP4E 3
2020/03/10 CEA
Smart Grid reference architecture
PDP4E 4
2020/03/10 CEA
Demoing PDPbDesign Framework
PDP4E 5
2. Develop a data-oriented model
3. Built-in privacy techniques for data-oriented models
4. Develop a process-oriented model
5. Built-in privacy techniques for process-oriented models
Continue the development cycle
2020/03/10 CEA
DesignOK
DesignNotOK
1. Select GDPR requirements to be satisfied
1. Select GDPR Requirements to
be satisfied
PDP4E 6
2020/03/10 CEA
1. Select GDPR Requirements to be
satisfied
GDPR-Req1.1:
Processing "Store Measurementinfo" shall be lawful if the data subject "Customer" has
given consent "ConsentForStoreMeasurementInfo" to the processing of his or her
personal data "MeasurementInfo " for one or more specific purposes R-02
GDPR-Req10:
Personal Data "MeasurementInfo" shall be adequate, relevant and limited to what is
necessary in relation to the purpose "R-02" for which they are processed
PDP4E 7
2020/03/10 CEA
2. Develop a data-oriented
model
PDP4E 8
2020/03/10 CEA
2. Develop a data-oriented model
Data-oriented model features:
Different data types:
 Generic Data
 Composite Data: for generic Data
Decomposition
 Table: a tag for imported Tables
 Data Link: reference external sources
 Opaque Data: data non-interpretable, e.g.,
cyphered text
Tool support for modelling:
 Automatic decomposition  go to Tool
PDP4E 9
2020/03/10 CEA
2. Develop a data-oriented model
Framework support for modelling:
Import Data Base (Tables)
Model elements search, selection, edition
  go to Tool
PDP4E 10
2020/03/10 CEA
2. Develop a data-oriented model
Framework support for modelling:
Import Data Base (Tables)
Model elements search, selection, edition
  go to Tool
PDP4E 11
2020/03/10 CEA
3. Built-in privacy techniques for
data-oriented models
PDP4E 12
2020/03/10 CEA
3. Built-in privacy techniques for data-
oriented models
Data-oriented strategies (27550 – Privacy Engineering)

PDP4E 13
2020/03/10 CEA
3. Built-in privacy techniques for data-
oriented models
K-anonymity:
Quasi-identifiers
PDP4E 14
2020/03/10 CEA
3. Built-in privacy techniques for data-
oriented models
K-anonymity:
Example
PDP4E 15
2020/03/10 CEA
3. Built-in privacy techniques for data-
oriented models
Built-in strategy for K-anonymity:
Support to verify the property  go to Tool
PDP4E 16
2020/03/10 CEA
3. Built-in privacy techniques for data-
oriented models
Built-in strategy for K-anonymity:
Support to verify the property  go to Tool
PDP4E 17
2020/03/10 CEA
3. Built-in privacy techniques for data-
oriented models
Built-in strategy for K-anonymity:
GDPR-Req10:
Personal Data "MeasurementInfo" shall be adequate, relevant and limited to what is
necessary in relation to the purpose "R-02" for which they are processed
Links can be settled to show Requirement coverage.
PDP4E 18
2020/03/10 CEA
4. Develop a process-oriented
model
PDP4E 19
2020/03/10 CEA
4. Develop a process-oriented model
Implementation of a Data Flow Diagram (DFD)
 Process
 External Entities
 Data Store
 Data Flow Edges
 Input / Output Pins
PDP4E 20
2020/03/10 CEA
4. Develop a process-oriented model
The DFD implementation is a Domain Specific Modelling Language (DSML)
 Based upon Papyrus UML Activities
 A profile is developed:
 Extension of UML Activity
 Specialization to introduce Domain Knowledge
 Basis for Model-driven design
Support provided for modelling:
 Transformation Requirement-to-DFD
 Reuse of data-oriented model elements
 Automatic application of profile types  go to Tool
PDP4E 21
2020/03/10 CEA
4. Develop a process-oriented model
Support for Process refinement
 Detailed model: the tasks of a process
 A Behaviour associated to each Process
 Consistency between refinements  Go to Tool
PDP4E 22
2020/03/10 CEA
5. Built-in privacy techniques for
process-oriented models
PDP4E 23
2020/03/10 CEA
5. Built-in privacy techniques for
process-oriented models
Process-oriented strategies (27550 – Privacy Engineering)

PDP4E 24
2020/03/10 CEA
5. Built-in privacy techniques for
process-oriented models
Conditions for Consent (GDPR):
 Where processing is based on consent, the controller shall be able to demonstrate that the data
subject has consented to processing of his or her personal data.
If the data subject’s consent is given in the context of a written declaration which also concerns other
matters, the request for consent shall be presented in a manner which is clearly distinguishable from
the other matters, in an intelligible and easily accessible form, using clear and plain language. Any part
of such a declaration which constitutes an infringement of this Regulation shall not be binding.
The data subject shall have the right to withdraw his or her consent at any time. The withdrawal of
consent shall not affect the lawfulness of processing based on consent before its withdrawal. 3Prior to
giving consent, the data subject shall be informed thereof. It shall be as easy to withdraw as to give
consent.
When assessing whether consent is freely given, utmost account shall be taken of whether, inter alia,
the performance of a contract, including the provision of a service, is conditional on consent to the
processing of personal data that is not necessary for the performance of that contract.

PDP4E 25
2020/03/10 CEA
5. Built-in privacy techniques for
process-oriented models
DSML integrating GDPR fundamental notions and relations
 The PDPbD Framework is enriched with
PDP4E 26
2020/03/10 CEA
5. Built-in privacy techniques for
process-oriented models
Built-in technique: Consent Pattern Instantiation
 The pattern introduces GDPR consent notions
 The pattern is applied on a target DFD model
 The user is guided through the instantiation
 The model is accordingly completed
  go to Tool
PDP4E 27
2020/03/10 CEA
5. Built-in privacy techniques for
process-oriented models
Built-in technique: Consent Pattern Instantiation
 The instantiated pattern provides a view of stakeholders:
 Decisive role in GDPR compliance
 Automatic model completion
 Model elements editable
  go to Tool
PDP4E 28
2020/03/10 CEA
5. Built-in privacy techniques for
process-oriented models
Built-in technique: Consent Pattern Instantiation
GDPR-Req1.1:
Processing "Store Measurementinfo" shall be lawful if the data subject "Customer" has
given consent "ConsentForStoreMeasurementInfo" to the processing of his or her personal
data "MeasurementInfo " for one or more specific purposes R-02
Links can be settled to show Requirement coverage.
PDP4E 29
2020/03/10 CEA
Methods and Tools for GDPR Compliance through
Privacy and Data
Protection 4 Engineering
For more information, visit:
www.pdp4e-project.org
Thank you for your attention
Questions?
Contributions:
gabriel.pedroza@cea.fr
Patrick.Tessier@cea.fr

Contenu connexe

Tendances

H2020 project WITDOM overview
H2020 project WITDOM overviewH2020 project WITDOM overview
H2020 project WITDOM overviewElsa Prieto
 
Privacy preserving computing and secure multi party computation
Privacy preserving computing and secure multi party computationPrivacy preserving computing and secure multi party computation
Privacy preserving computing and secure multi party computationUlf Mattsson
 
ISACA Houston - How to de-classify data and rethink transfer of data between ...
ISACA Houston - How to de-classify data and rethink transfer of data between ...ISACA Houston - How to de-classify data and rethink transfer of data between ...
ISACA Houston - How to de-classify data and rethink transfer of data between ...Ulf Mattsson
 
ISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloudISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloudUlf Mattsson
 
Adjusting to the GDPR: The Impact on Data Scientists and Behavioral Researchers
Adjusting to the GDPR: The Impact on Data Scientists and Behavioral ResearchersAdjusting to the GDPR: The Impact on Data Scientists and Behavioral Researchers
Adjusting to the GDPR: The Impact on Data Scientists and Behavioral ResearchersTravis Greene
 
Hungarian Electronic Public Administration Interoperability Framework (MEKIK)...
Hungarian Electronic Public Administration Interoperability Framework (MEKIK)...Hungarian Electronic Public Administration Interoperability Framework (MEKIK)...
Hungarian Electronic Public Administration Interoperability Framework (MEKIK)...Csaba Krasznay
 
Kontakt.io webinar with Cassia Networks
Kontakt.io webinar with Cassia NetworksKontakt.io webinar with Cassia Networks
Kontakt.io webinar with Cassia Networkskontakt.io
 
Jul 16 isaca london data protection, security and privacy risks - on premis...
Jul 16 isaca london   data protection, security and privacy risks - on premis...Jul 16 isaca london   data protection, security and privacy risks - on premis...
Jul 16 isaca london data protection, security and privacy risks - on premis...Ulf Mattsson
 
Evolving regulations are changing the way we think about tools and technology
Evolving regulations are changing the way we think about tools and technologyEvolving regulations are changing the way we think about tools and technology
Evolving regulations are changing the way we think about tools and technologyUlf Mattsson
 
New enterprise application and data security challenges and solutions apr 2...
New enterprise application and data security challenges and solutions   apr 2...New enterprise application and data security challenges and solutions   apr 2...
New enterprise application and data security challenges and solutions apr 2...Ulf Mattsson
 
Secure access to biomedical data sources for legal data sharing-kuchinke
Secure access to biomedical data sources for legal data sharing-kuchinkeSecure access to biomedical data sources for legal data sharing-kuchinke
Secure access to biomedical data sources for legal data sharing-kuchinkeWolfgang Kuchinke
 
Unlock the potential of data security 2020
Unlock the potential of data security 2020Unlock the potential of data security 2020
Unlock the potential of data security 2020Ulf Mattsson
 
ISACA Houston - Practical data privacy and de-identification techniques
ISACA Houston  - Practical data privacy and de-identification techniquesISACA Houston  - Practical data privacy and de-identification techniques
ISACA Houston - Practical data privacy and de-identification techniquesUlf Mattsson
 
The emerging pci dss and nist standards
The emerging pci dss and nist standardsThe emerging pci dss and nist standards
The emerging pci dss and nist standardsUlf Mattsson
 
Protecting Data Privacy in Analytics and Machine Learning
Protecting Data Privacy in Analytics and Machine LearningProtecting Data Privacy in Analytics and Machine Learning
Protecting Data Privacy in Analytics and Machine LearningUlf Mattsson
 
GDPR considerations for blockchain solution architects.
GDPR considerations for blockchain solution architects.GDPR considerations for blockchain solution architects.
GDPR considerations for blockchain solution architects.Salman Baset
 
GDPR and Blockchain
GDPR and BlockchainGDPR and Blockchain
GDPR and BlockchainSalman Baset
 
Privacy Preserving Mining in Code Profiling Data
Privacy Preserving Mining in Code Profiling DataPrivacy Preserving Mining in Code Profiling Data
Privacy Preserving Mining in Code Profiling DataDr. Amarjeet Singh
 

Tendances (20)

Beawre pitch
Beawre pitchBeawre pitch
Beawre pitch
 
Pdp4 e forum
Pdp4 e forumPdp4 e forum
Pdp4 e forum
 
H2020 project WITDOM overview
H2020 project WITDOM overviewH2020 project WITDOM overview
H2020 project WITDOM overview
 
Privacy preserving computing and secure multi party computation
Privacy preserving computing and secure multi party computationPrivacy preserving computing and secure multi party computation
Privacy preserving computing and secure multi party computation
 
ISACA Houston - How to de-classify data and rethink transfer of data between ...
ISACA Houston - How to de-classify data and rethink transfer of data between ...ISACA Houston - How to de-classify data and rethink transfer of data between ...
ISACA Houston - How to de-classify data and rethink transfer of data between ...
 
ISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloudISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloud
 
Adjusting to the GDPR: The Impact on Data Scientists and Behavioral Researchers
Adjusting to the GDPR: The Impact on Data Scientists and Behavioral ResearchersAdjusting to the GDPR: The Impact on Data Scientists and Behavioral Researchers
Adjusting to the GDPR: The Impact on Data Scientists and Behavioral Researchers
 
Hungarian Electronic Public Administration Interoperability Framework (MEKIK)...
Hungarian Electronic Public Administration Interoperability Framework (MEKIK)...Hungarian Electronic Public Administration Interoperability Framework (MEKIK)...
Hungarian Electronic Public Administration Interoperability Framework (MEKIK)...
 
Kontakt.io webinar with Cassia Networks
Kontakt.io webinar with Cassia NetworksKontakt.io webinar with Cassia Networks
Kontakt.io webinar with Cassia Networks
 
Jul 16 isaca london data protection, security and privacy risks - on premis...
Jul 16 isaca london   data protection, security and privacy risks - on premis...Jul 16 isaca london   data protection, security and privacy risks - on premis...
Jul 16 isaca london data protection, security and privacy risks - on premis...
 
Evolving regulations are changing the way we think about tools and technology
Evolving regulations are changing the way we think about tools and technologyEvolving regulations are changing the way we think about tools and technology
Evolving regulations are changing the way we think about tools and technology
 
New enterprise application and data security challenges and solutions apr 2...
New enterprise application and data security challenges and solutions   apr 2...New enterprise application and data security challenges and solutions   apr 2...
New enterprise application and data security challenges and solutions apr 2...
 
Secure access to biomedical data sources for legal data sharing-kuchinke
Secure access to biomedical data sources for legal data sharing-kuchinkeSecure access to biomedical data sources for legal data sharing-kuchinke
Secure access to biomedical data sources for legal data sharing-kuchinke
 
Unlock the potential of data security 2020
Unlock the potential of data security 2020Unlock the potential of data security 2020
Unlock the potential of data security 2020
 
ISACA Houston - Practical data privacy and de-identification techniques
ISACA Houston  - Practical data privacy and de-identification techniquesISACA Houston  - Practical data privacy and de-identification techniques
ISACA Houston - Practical data privacy and de-identification techniques
 
The emerging pci dss and nist standards
The emerging pci dss and nist standardsThe emerging pci dss and nist standards
The emerging pci dss and nist standards
 
Protecting Data Privacy in Analytics and Machine Learning
Protecting Data Privacy in Analytics and Machine LearningProtecting Data Privacy in Analytics and Machine Learning
Protecting Data Privacy in Analytics and Machine Learning
 
GDPR considerations for blockchain solution architects.
GDPR considerations for blockchain solution architects.GDPR considerations for blockchain solution architects.
GDPR considerations for blockchain solution architects.
 
GDPR and Blockchain
GDPR and BlockchainGDPR and Blockchain
GDPR and Blockchain
 
Privacy Preserving Mining in Code Profiling Data
Privacy Preserving Mining in Code Profiling DataPrivacy Preserving Mining in Code Profiling Data
Privacy Preserving Mining in Code Profiling Data
 

Similaire à Paris wp5 pd-pb_d_case_study

DEFeND Project Presentation - July 2018
DEFeND Project Presentation - July 2018DEFeND Project Presentation - July 2018
DEFeND Project Presentation - July 2018DEFeND Project
 
WITDOM Data Protection Orchestrator
WITDOM Data Protection OrchestratorWITDOM Data Protection Orchestrator
WITDOM Data Protection OrchestratorElsa Prieto
 
Executive Overview on EDM Strategy
Executive Overview on EDM StrategyExecutive Overview on EDM Strategy
Executive Overview on EDM Strategyssuserf8f9b2
 
How to minimize scope for gdpr data protection compliance when using cloud se...
How to minimize scope for gdpr data protection compliance when using cloud se...How to minimize scope for gdpr data protection compliance when using cloud se...
How to minimize scope for gdpr data protection compliance when using cloud se...Dirk Rünagel
 
Linking HPC to Data Management - EUDAT Summer School (Giuseppe Fiameni, CINECA)
Linking HPC to Data Management - EUDAT Summer School (Giuseppe Fiameni, CINECA)Linking HPC to Data Management - EUDAT Summer School (Giuseppe Fiameni, CINECA)
Linking HPC to Data Management - EUDAT Summer School (Giuseppe Fiameni, CINECA)EUDAT
 
Partner enablement GDPR
Partner enablement GDPRPartner enablement GDPR
Partner enablement GDPRJuan Niekerk
 
Acquisition of IT Service Management tools
Acquisition of IT Service Management toolsAcquisition of IT Service Management tools
Acquisition of IT Service Management toolsChristian F. Nissen
 
Partner enablement GDPR
Partner enablement GDPRPartner enablement GDPR
Partner enablement GDPRJuan Niekerk
 
Toreon adding privacy by design in secure application development oss18 v20...
Toreon adding privacy by design in secure application development   oss18 v20...Toreon adding privacy by design in secure application development   oss18 v20...
Toreon adding privacy by design in secure application development oss18 v20...Sebastien Deleersnyder
 
Scalable policy-aware Linked Data architecture for prIvacy, transparency and ...
Scalable policy-aware Linked Data architecture for prIvacy, transparency and ...Scalable policy-aware Linked Data architecture for prIvacy, transparency and ...
Scalable policy-aware Linked Data architecture for prIvacy, transparency and ...Sabrina Kirrane
 
GDPR compliant data anonymization / pseudonymization
GDPR compliant data anonymization / pseudonymization GDPR compliant data anonymization / pseudonymization
GDPR compliant data anonymization / pseudonymization Patric Dahse
 
IDC Portugal | Como Libertar os Seus Dados com Virtualização de Dados
IDC Portugal | Como Libertar os Seus Dados com Virtualização de DadosIDC Portugal | Como Libertar os Seus Dados com Virtualização de Dados
IDC Portugal | Como Libertar os Seus Dados com Virtualização de DadosDenodo
 
IRJET- Fast Phrase Search for Encrypted Cloud Storage
IRJET- Fast Phrase Search for Encrypted Cloud StorageIRJET- Fast Phrase Search for Encrypted Cloud Storage
IRJET- Fast Phrase Search for Encrypted Cloud StorageIRJET Journal
 
A Goal-oriented Approach for Business Process Improvement Using Process Wareh...
A Goal-oriented Approach for Business Process Improvement Using Process Wareh...A Goal-oriented Approach for Business Process Improvement Using Process Wareh...
A Goal-oriented Approach for Business Process Improvement Using Process Wareh...M Khurram Shahzad
 
Ensure GDPR Compliance with LeanIX
Ensure GDPR Compliance with LeanIXEnsure GDPR Compliance with LeanIX
Ensure GDPR Compliance with LeanIXLeanIX GmbH
 

Similaire à Paris wp5 pd-pb_d_case_study (20)

DEFeND Project Presentation - July 2018
DEFeND Project Presentation - July 2018DEFeND Project Presentation - July 2018
DEFeND Project Presentation - July 2018
 
Privacy Data Protection for Engineers - PDP4E
Privacy Data Protection for Engineers - PDP4EPrivacy Data Protection for Engineers - PDP4E
Privacy Data Protection for Engineers - PDP4E
 
WITDOM Data Protection Orchestrator
WITDOM Data Protection OrchestratorWITDOM Data Protection Orchestrator
WITDOM Data Protection Orchestrator
 
Executive Overview on EDM Strategy
Executive Overview on EDM StrategyExecutive Overview on EDM Strategy
Executive Overview on EDM Strategy
 
How to minimize scope for gdpr data protection compliance when using cloud se...
How to minimize scope for gdpr data protection compliance when using cloud se...How to minimize scope for gdpr data protection compliance when using cloud se...
How to minimize scope for gdpr data protection compliance when using cloud se...
 
Granular or holistic approaches 210126 Alejandra Ruiz
Granular or holistic approaches 210126 Alejandra RuizGranular or holistic approaches 210126 Alejandra Ruiz
Granular or holistic approaches 210126 Alejandra Ruiz
 
Linking HPC to Data Management - EUDAT Summer School (Giuseppe Fiameni, CINECA)
Linking HPC to Data Management - EUDAT Summer School (Giuseppe Fiameni, CINECA)Linking HPC to Data Management - EUDAT Summer School (Giuseppe Fiameni, CINECA)
Linking HPC to Data Management - EUDAT Summer School (Giuseppe Fiameni, CINECA)
 
Partner enablement GDPR
Partner enablement GDPRPartner enablement GDPR
Partner enablement GDPR
 
Acquisition of IT Service Management tools
Acquisition of IT Service Management toolsAcquisition of IT Service Management tools
Acquisition of IT Service Management tools
 
Partner enablement GDPR
Partner enablement GDPRPartner enablement GDPR
Partner enablement GDPR
 
Toreon adding privacy by design in secure application development oss18 v20...
Toreon adding privacy by design in secure application development   oss18 v20...Toreon adding privacy by design in secure application development   oss18 v20...
Toreon adding privacy by design in secure application development oss18 v20...
 
Approach to Data Management v0.2
Approach to Data Management v0.2Approach to Data Management v0.2
Approach to Data Management v0.2
 
Scalable policy-aware Linked Data architecture for prIvacy, transparency and ...
Scalable policy-aware Linked Data architecture for prIvacy, transparency and ...Scalable policy-aware Linked Data architecture for prIvacy, transparency and ...
Scalable policy-aware Linked Data architecture for prIvacy, transparency and ...
 
GDPR compliant data anonymization / pseudonymization
GDPR compliant data anonymization / pseudonymization GDPR compliant data anonymization / pseudonymization
GDPR compliant data anonymization / pseudonymization
 
IDC Portugal | Como Libertar os Seus Dados com Virtualização de Dados
IDC Portugal | Como Libertar os Seus Dados com Virtualização de DadosIDC Portugal | Como Libertar os Seus Dados com Virtualização de Dados
IDC Portugal | Como Libertar os Seus Dados com Virtualização de Dados
 
Pdp4e IPEN-2019
Pdp4e  IPEN-2019Pdp4e  IPEN-2019
Pdp4e IPEN-2019
 
Pdp4 e privacy engineering toolkit ipen 2019
Pdp4 e privacy engineering toolkit   ipen 2019Pdp4 e privacy engineering toolkit   ipen 2019
Pdp4 e privacy engineering toolkit ipen 2019
 
IRJET- Fast Phrase Search for Encrypted Cloud Storage
IRJET- Fast Phrase Search for Encrypted Cloud StorageIRJET- Fast Phrase Search for Encrypted Cloud Storage
IRJET- Fast Phrase Search for Encrypted Cloud Storage
 
A Goal-oriented Approach for Business Process Improvement Using Process Wareh...
A Goal-oriented Approach for Business Process Improvement Using Process Wareh...A Goal-oriented Approach for Business Process Improvement Using Process Wareh...
A Goal-oriented Approach for Business Process Improvement Using Process Wareh...
 
Ensure GDPR Compliance with LeanIX
Ensure GDPR Compliance with LeanIXEnsure GDPR Compliance with LeanIX
Ensure GDPR Compliance with LeanIX
 

Plus de Privacy Data Protection for Engineering

Plus de Privacy Data Protection for Engineering (6)

Long term security evolution of ai and data protection antonio kung trialog...
Long term security evolution of ai and data protection   antonio kung trialog...Long term security evolution of ai and data protection   antonio kung trialog...
Long term security evolution of ai and data protection antonio kung trialog...
 
Granular or holistic approaches - Antonio Kung
Granular or holistic approaches - Antonio KungGranular or holistic approaches - Antonio Kung
Granular or holistic approaches - Antonio Kung
 
Antonio kung impact of ai on privacy sept 10
Antonio kung impact of ai on privacy   sept 10Antonio kung impact of ai on privacy   sept 10
Antonio kung impact of ai on privacy sept 10
 
Antonio kung - pdp4e privacy engineering oxford sept 9 - v2
Antonio kung - pdp4e privacy engineering oxford   sept 9 - v2Antonio kung - pdp4e privacy engineering oxford   sept 9 - v2
Antonio kung - pdp4e privacy engineering oxford sept 9 - v2
 
Ipen 2019 roma status of privacy engineering standardisation v2
Ipen 2019 roma   status of privacy engineering standardisation v2Ipen 2019 roma   status of privacy engineering standardisation v2
Ipen 2019 roma status of privacy engineering standardisation v2
 
Ipen2018
Ipen2018Ipen2018
Ipen2018
 

Dernier

Paper Tube : Shigeru Ban projects and Case Study of Cardboard Cathedral .pdf
Paper Tube : Shigeru Ban projects and Case Study of Cardboard Cathedral .pdfPaper Tube : Shigeru Ban projects and Case Study of Cardboard Cathedral .pdf
Paper Tube : Shigeru Ban projects and Case Study of Cardboard Cathedral .pdfNainaShrivastava14
 
Katarzyna Lipka-Sidor - BIM School Course
Katarzyna Lipka-Sidor - BIM School CourseKatarzyna Lipka-Sidor - BIM School Course
Katarzyna Lipka-Sidor - BIM School Coursebim.edu.pl
 
Energy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptxEnergy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptxsiddharthjain2303
 
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...Sumanth A
 
Prach: A Feature-Rich Platform Empowering the Autism Community
Prach: A Feature-Rich Platform Empowering the Autism CommunityPrach: A Feature-Rich Platform Empowering the Autism Community
Prach: A Feature-Rich Platform Empowering the Autism Communityprachaibot
 
Module-1-(Building Acoustics) Noise Control (Unit-3). pdf
Module-1-(Building Acoustics) Noise Control (Unit-3). pdfModule-1-(Building Acoustics) Noise Control (Unit-3). pdf
Module-1-(Building Acoustics) Noise Control (Unit-3). pdfManish Kumar
 
OOP concepts -in-Python programming language
OOP concepts -in-Python programming languageOOP concepts -in-Python programming language
OOP concepts -in-Python programming languageSmritiSharma901052
 
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...Erbil Polytechnic University
 
Levelling - Rise and fall - Height of instrument method
Levelling - Rise and fall - Height of instrument methodLevelling - Rise and fall - Height of instrument method
Levelling - Rise and fall - Height of instrument methodManicka Mamallan Andavar
 
multiple access in wireless communication
multiple access in wireless communicationmultiple access in wireless communication
multiple access in wireless communicationpanditadesh123
 
Research Methodology for Engineering pdf
Research Methodology for Engineering pdfResearch Methodology for Engineering pdf
Research Methodology for Engineering pdfCaalaaAbdulkerim
 
Main Memory Management in Operating System
Main Memory Management in Operating SystemMain Memory Management in Operating System
Main Memory Management in Operating SystemRashmi Bhat
 
Input Output Management in Operating System
Input Output Management in Operating SystemInput Output Management in Operating System
Input Output Management in Operating SystemRashmi Bhat
 
Earthing details of Electrical Substation
Earthing details of Electrical SubstationEarthing details of Electrical Substation
Earthing details of Electrical Substationstephanwindworld
 
FUNCTIONAL AND NON FUNCTIONAL REQUIREMENT
FUNCTIONAL AND NON FUNCTIONAL REQUIREMENTFUNCTIONAL AND NON FUNCTIONAL REQUIREMENT
FUNCTIONAL AND NON FUNCTIONAL REQUIREMENTSneha Padhiar
 
CS 3251 Programming in c all unit notes pdf
CS 3251 Programming in c all unit notes pdfCS 3251 Programming in c all unit notes pdf
CS 3251 Programming in c all unit notes pdfBalamuruganV28
 
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.ppt
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.pptROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.ppt
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.pptJohnWilliam111370
 
List of Accredited Concrete Batching Plant.pdf
List of Accredited Concrete Batching Plant.pdfList of Accredited Concrete Batching Plant.pdf
List of Accredited Concrete Batching Plant.pdfisabel213075
 
Engineering Drawing section of solid
Engineering Drawing     section of solidEngineering Drawing     section of solid
Engineering Drawing section of solidnamansinghjarodiya
 
『澳洲文凭』买麦考瑞大学毕业证书成绩单办理澳洲Macquarie文凭学位证书
『澳洲文凭』买麦考瑞大学毕业证书成绩单办理澳洲Macquarie文凭学位证书『澳洲文凭』买麦考瑞大学毕业证书成绩单办理澳洲Macquarie文凭学位证书
『澳洲文凭』买麦考瑞大学毕业证书成绩单办理澳洲Macquarie文凭学位证书rnrncn29
 

Dernier (20)

Paper Tube : Shigeru Ban projects and Case Study of Cardboard Cathedral .pdf
Paper Tube : Shigeru Ban projects and Case Study of Cardboard Cathedral .pdfPaper Tube : Shigeru Ban projects and Case Study of Cardboard Cathedral .pdf
Paper Tube : Shigeru Ban projects and Case Study of Cardboard Cathedral .pdf
 
Katarzyna Lipka-Sidor - BIM School Course
Katarzyna Lipka-Sidor - BIM School CourseKatarzyna Lipka-Sidor - BIM School Course
Katarzyna Lipka-Sidor - BIM School Course
 
Energy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptxEnergy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptx
 
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
 
Prach: A Feature-Rich Platform Empowering the Autism Community
Prach: A Feature-Rich Platform Empowering the Autism CommunityPrach: A Feature-Rich Platform Empowering the Autism Community
Prach: A Feature-Rich Platform Empowering the Autism Community
 
Module-1-(Building Acoustics) Noise Control (Unit-3). pdf
Module-1-(Building Acoustics) Noise Control (Unit-3). pdfModule-1-(Building Acoustics) Noise Control (Unit-3). pdf
Module-1-(Building Acoustics) Noise Control (Unit-3). pdf
 
OOP concepts -in-Python programming language
OOP concepts -in-Python programming languageOOP concepts -in-Python programming language
OOP concepts -in-Python programming language
 
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
 
Levelling - Rise and fall - Height of instrument method
Levelling - Rise and fall - Height of instrument methodLevelling - Rise and fall - Height of instrument method
Levelling - Rise and fall - Height of instrument method
 
multiple access in wireless communication
multiple access in wireless communicationmultiple access in wireless communication
multiple access in wireless communication
 
Research Methodology for Engineering pdf
Research Methodology for Engineering pdfResearch Methodology for Engineering pdf
Research Methodology for Engineering pdf
 
Main Memory Management in Operating System
Main Memory Management in Operating SystemMain Memory Management in Operating System
Main Memory Management in Operating System
 
Input Output Management in Operating System
Input Output Management in Operating SystemInput Output Management in Operating System
Input Output Management in Operating System
 
Earthing details of Electrical Substation
Earthing details of Electrical SubstationEarthing details of Electrical Substation
Earthing details of Electrical Substation
 
FUNCTIONAL AND NON FUNCTIONAL REQUIREMENT
FUNCTIONAL AND NON FUNCTIONAL REQUIREMENTFUNCTIONAL AND NON FUNCTIONAL REQUIREMENT
FUNCTIONAL AND NON FUNCTIONAL REQUIREMENT
 
CS 3251 Programming in c all unit notes pdf
CS 3251 Programming in c all unit notes pdfCS 3251 Programming in c all unit notes pdf
CS 3251 Programming in c all unit notes pdf
 
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.ppt
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.pptROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.ppt
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.ppt
 
List of Accredited Concrete Batching Plant.pdf
List of Accredited Concrete Batching Plant.pdfList of Accredited Concrete Batching Plant.pdf
List of Accredited Concrete Batching Plant.pdf
 
Engineering Drawing section of solid
Engineering Drawing     section of solidEngineering Drawing     section of solid
Engineering Drawing section of solid
 
『澳洲文凭』买麦考瑞大学毕业证书成绩单办理澳洲Macquarie文凭学位证书
『澳洲文凭』买麦考瑞大学毕业证书成绩单办理澳洲Macquarie文凭学位证书『澳洲文凭』买麦考瑞大学毕业证书成绩单办理澳洲Macquarie文凭学位证书
『澳洲文凭』买麦考瑞大学毕业证书成绩单办理澳洲Macquarie文凭学位证书
 

Paris wp5 pd-pb_d_case_study

  • 1. Methods and Tools for GDPR Compliance through Privacy and Data Protection 4 Engineering PDPbD Framework Improving Privacy and Data Protection by Design CEA 2020/03/10
  • 2. Case Study: Smart Grid system Overall description of the target Smart Grid system 2020/03/10 CEA PDP4E 2
  • 3. Smart Grid functions and data flows PDP4E 3 2020/03/10 CEA
  • 4. Smart Grid reference architecture PDP4E 4 2020/03/10 CEA
  • 5. Demoing PDPbDesign Framework PDP4E 5 2. Develop a data-oriented model 3. Built-in privacy techniques for data-oriented models 4. Develop a process-oriented model 5. Built-in privacy techniques for process-oriented models Continue the development cycle 2020/03/10 CEA DesignOK DesignNotOK 1. Select GDPR requirements to be satisfied
  • 6. 1. Select GDPR Requirements to be satisfied PDP4E 6 2020/03/10 CEA
  • 7. 1. Select GDPR Requirements to be satisfied GDPR-Req1.1: Processing "Store Measurementinfo" shall be lawful if the data subject "Customer" has given consent "ConsentForStoreMeasurementInfo" to the processing of his or her personal data "MeasurementInfo " for one or more specific purposes R-02 GDPR-Req10: Personal Data "MeasurementInfo" shall be adequate, relevant and limited to what is necessary in relation to the purpose "R-02" for which they are processed PDP4E 7 2020/03/10 CEA
  • 8. 2. Develop a data-oriented model PDP4E 8 2020/03/10 CEA
  • 9. 2. Develop a data-oriented model Data-oriented model features: Different data types:  Generic Data  Composite Data: for generic Data Decomposition  Table: a tag for imported Tables  Data Link: reference external sources  Opaque Data: data non-interpretable, e.g., cyphered text Tool support for modelling:  Automatic decomposition  go to Tool PDP4E 9 2020/03/10 CEA
  • 10. 2. Develop a data-oriented model Framework support for modelling: Import Data Base (Tables) Model elements search, selection, edition   go to Tool PDP4E 10 2020/03/10 CEA
  • 11. 2. Develop a data-oriented model Framework support for modelling: Import Data Base (Tables) Model elements search, selection, edition   go to Tool PDP4E 11 2020/03/10 CEA
  • 12. 3. Built-in privacy techniques for data-oriented models PDP4E 12 2020/03/10 CEA
  • 13. 3. Built-in privacy techniques for data- oriented models Data-oriented strategies (27550 – Privacy Engineering)  PDP4E 13 2020/03/10 CEA
  • 14. 3. Built-in privacy techniques for data- oriented models K-anonymity: Quasi-identifiers PDP4E 14 2020/03/10 CEA
  • 15. 3. Built-in privacy techniques for data- oriented models K-anonymity: Example PDP4E 15 2020/03/10 CEA
  • 16. 3. Built-in privacy techniques for data- oriented models Built-in strategy for K-anonymity: Support to verify the property  go to Tool PDP4E 16 2020/03/10 CEA
  • 17. 3. Built-in privacy techniques for data- oriented models Built-in strategy for K-anonymity: Support to verify the property  go to Tool PDP4E 17 2020/03/10 CEA
  • 18. 3. Built-in privacy techniques for data- oriented models Built-in strategy for K-anonymity: GDPR-Req10: Personal Data "MeasurementInfo" shall be adequate, relevant and limited to what is necessary in relation to the purpose "R-02" for which they are processed Links can be settled to show Requirement coverage. PDP4E 18 2020/03/10 CEA
  • 19. 4. Develop a process-oriented model PDP4E 19 2020/03/10 CEA
  • 20. 4. Develop a process-oriented model Implementation of a Data Flow Diagram (DFD)  Process  External Entities  Data Store  Data Flow Edges  Input / Output Pins PDP4E 20 2020/03/10 CEA
  • 21. 4. Develop a process-oriented model The DFD implementation is a Domain Specific Modelling Language (DSML)  Based upon Papyrus UML Activities  A profile is developed:  Extension of UML Activity  Specialization to introduce Domain Knowledge  Basis for Model-driven design Support provided for modelling:  Transformation Requirement-to-DFD  Reuse of data-oriented model elements  Automatic application of profile types  go to Tool PDP4E 21 2020/03/10 CEA
  • 22. 4. Develop a process-oriented model Support for Process refinement  Detailed model: the tasks of a process  A Behaviour associated to each Process  Consistency between refinements  Go to Tool PDP4E 22 2020/03/10 CEA
  • 23. 5. Built-in privacy techniques for process-oriented models PDP4E 23 2020/03/10 CEA
  • 24. 5. Built-in privacy techniques for process-oriented models Process-oriented strategies (27550 – Privacy Engineering)  PDP4E 24 2020/03/10 CEA
  • 25. 5. Built-in privacy techniques for process-oriented models Conditions for Consent (GDPR):  Where processing is based on consent, the controller shall be able to demonstrate that the data subject has consented to processing of his or her personal data. If the data subject’s consent is given in the context of a written declaration which also concerns other matters, the request for consent shall be presented in a manner which is clearly distinguishable from the other matters, in an intelligible and easily accessible form, using clear and plain language. Any part of such a declaration which constitutes an infringement of this Regulation shall not be binding. The data subject shall have the right to withdraw his or her consent at any time. The withdrawal of consent shall not affect the lawfulness of processing based on consent before its withdrawal. 3Prior to giving consent, the data subject shall be informed thereof. It shall be as easy to withdraw as to give consent. When assessing whether consent is freely given, utmost account shall be taken of whether, inter alia, the performance of a contract, including the provision of a service, is conditional on consent to the processing of personal data that is not necessary for the performance of that contract.  PDP4E 25 2020/03/10 CEA
  • 26. 5. Built-in privacy techniques for process-oriented models DSML integrating GDPR fundamental notions and relations  The PDPbD Framework is enriched with PDP4E 26 2020/03/10 CEA
  • 27. 5. Built-in privacy techniques for process-oriented models Built-in technique: Consent Pattern Instantiation  The pattern introduces GDPR consent notions  The pattern is applied on a target DFD model  The user is guided through the instantiation  The model is accordingly completed   go to Tool PDP4E 27 2020/03/10 CEA
  • 28. 5. Built-in privacy techniques for process-oriented models Built-in technique: Consent Pattern Instantiation  The instantiated pattern provides a view of stakeholders:  Decisive role in GDPR compliance  Automatic model completion  Model elements editable   go to Tool PDP4E 28 2020/03/10 CEA
  • 29. 5. Built-in privacy techniques for process-oriented models Built-in technique: Consent Pattern Instantiation GDPR-Req1.1: Processing "Store Measurementinfo" shall be lawful if the data subject "Customer" has given consent "ConsentForStoreMeasurementInfo" to the processing of his or her personal data "MeasurementInfo " for one or more specific purposes R-02 Links can be settled to show Requirement coverage. PDP4E 29 2020/03/10 CEA
  • 30. Methods and Tools for GDPR Compliance through Privacy and Data Protection 4 Engineering For more information, visit: www.pdp4e-project.org Thank you for your attention Questions? Contributions: gabriel.pedroza@cea.fr Patrick.Tessier@cea.fr