Title :
Privacy in Service Oriented Architectures: SOA Boundary Identity Masking for Enterprises
Author :
Liver, B. ; Di Paolo, R. ; Tice, K.
Author_Institution :
Credit Suisse Inf. Technol., Zurich, Switzerland
Abstract :
Sensitive data is increasingly proliferating due to outsourcing, application service provisioning, cloud computing and so on. The control of such data is increasingly crucial for enterprises, because of regulatory scrutiny, data privacy concerns, and so on. One approach to confine storing and processing sensitive data is our Boundary Identity Masking approach [1], in which a key-value token substitution ensures that sensitive data in its clear-text representation is available only within a well-defined boundary. However, the governance of these boundaries and substitution rules is not defined in [1]. This paper introduces a model for defining boundaries for sensitive data in the context of an enterprise. Next, the paper describes how to govern data privacy of services given the boundary model and a Service Oriented Architecture (SOA). Furthermore, we describe how the data structures of our Boundary Identity Masking approach are governed at an enterprise level. This addresses the scaling of our approach with respect to a large number of services and many boundaries.
Keywords :
data privacy; data structures; organisational aspects; security of data; service-oriented architecture; boundary identity masking approach; cloud computing; data privacy; data structure; enterprise architecture; key value token substitution; sensitive data; service oriented architecture; substitution rule; Business; Context; Data privacy; Data structures; Logic gates; Marketing and sales; Service oriented architecture; data aliasing; data privacy; enterprise architecture; service oriented architecture; trust;
Conference_Titel :
Commerce and Enterprise Computing (CEC), 2010 IEEE 12th Conference on
Conference_Location :
Shanghai
Print_ISBN :
978-1-4244-8433-1
Electronic_ISBN :
978-0-7695-4228-7
DOI :
10.1109/CEC.2010.21