SlideShare a Scribd company logo
1 of 11
Download to read offline
This project that has received funding from the European Union’s Horizon 2020 research and innovation
programme under grant agreement Nº813497
ODRL Profile for Expressing Consent
through Granular Access Control
Policies in Solid
Beatriz Esteves, beatriz.gesteves@upm.es, OEG – UPM
Harshvardhan J. Pandit, pandith@tcd.ie, ADAPT Centre –TCD
Víctor Rodríguez-Doncel, vrodriguez@fi.upm.es, OEG – UPM
Overview
• Introduction to Solid
• Motivation
• Related Work
• ODRL Profile for Solid’s ACL
• Implementation &
Architecture
• Challenges
• Conclusion
2 / 11
Introduction to Solid
https://solidproject.org
Solid is a specification for decentralised
personal data stores based on
interoperable data formats and protocols.
Ownership Interoperability
Beatriz has full access to one of her web resources,
located at https:// beatriz.databox.me/docs/file1
<#authorization1>
a acl:Authorization;
acl:agent <https://beatriz.databox.me/profile/card#me>;
acl:accessTo <https://beatriz.databox.me/docs/file1>;
acl:mode acl:Read, acl:Write, acl:Control.
WebID
Solid’s Access Control Authorizations
3 / 11
Motivation
GDPR’s Articles 13 and 14
Identity
Purpose
Personal data categories
Processing categories
Legal bases
Recipients
Consent
provide information
regarding
Introspect use of
personal data
Store consent and
authorisations
Determine data
sharing preferences
How can Solid’s ACL be
extended to specify and
enforce an individual’s data
sharing preferences?
4 / 11
Related Work
Specifying Personal Data and Processing
Access Control using Linked Data
5 / 11
ODRL Profile for Solid’s ACL
https://w3id.org/oac/
Requisites
R1. Support specifying user preferences as policies.
R2. Incorporate vocabulary specifying or aligned to legal
concepts.
R3. Support specifying permissions and prohibitions at
arbitrary granularity.
R4. Support identifying and resolving conflicts based on scope.
R5. Record (store) policies used to authorise access.
R6. Support querying policies and authorisations for
introspection of data use.
:example-1 a odrl:Policy ;
odrl:permission [
odrl:action oac:Read ;
odrl:target oac:Contact ;
odrl:assigner [
a oac:DataSubject ;
cert:key "https://beatriz.webID/card#me"
] ;
odrl:constraint [
odrl:leftOperand oac:Purpose ;
odrl:operator odrl:isA ;
odrl:rightOperand dpv:AcademicResearch
]
] .
Extension of Solid's ACL mechanism using the ODRL specification to define
"sticky policies" that express permissions and/or prohibitions associated with
data stored in a Solid pod and uses DPV as a controlled vocabulary to invoke
specific privacy and data protection terms.
6 / 11
Implementation & Architecture
Extension of the existing Solid Pod specification
• Consent datastore – keep a record of the consent actions
• Audit Log – store metadata related to logins, access requests, changes
in policies and consent authorisations
• Notification Mechanism – allow to update or revoke requests regarding
consent
• Metadata and Policies Editors – assist users to craft granular policies for
the management of access to their Pod
7 / 11
Challenges
Efficiency and performance
Complexity of ODRL policies
• Deal with large collection of policies in the
form of preferences, requests, and
authorisations
• The more data is transmitted in policies and
requests, the more time and resource-
consuming will be the authorization
mechanism
• Deal with conflicting policies, i.e., global
prohibitions outweigh local permissions
Storage and Management of Policies
• Where to store requests and user policies
• Discovery of policies that refer to a given
resource
• How to craft valid ODRL policies
• Create a separate area of the Pod to store
the policies and metadata declarations
• Create a Policies Editor component that
supports users in drafting the policies,
without having the need for previous ODRL
knowledge
Limit ODRL features to ensure optimal performance
8 / 11
Challenges
Legal Implications of Requests
Legal Interpretation of Request and
Preferences
Consent
• Deal with other legal bases, i.e., compliance
with a legal obligation or legitimate interests
• Discuss whether access to resources in the
pod should be automated
• Challenge that is unlikely to be satisfactorily
addressed
• Map policies, requests, and preferences with
their legal interpretation
• Deal with different jurisdictions
• To ensure that consent is informed and
explicit, specific information items should be
provided and recorded in the Pod
• Allow users to update or revoke consent
• Discuss whether the implicit consent from
the established user preferences is enough to
provide automated access to non-sensitive
personal data
• Allow users to choose which data types, and
purposes, they are comfortable with
enabling automation and which not
• Have a queryable Consent datastore which
can be easily updated
9 / 11
Conclusion
Solid’s shortcomings
• Expression of more complex policies beyond a yes/no
• Alignment with GDPR requisites
Can be overcome
by using
Future Work
• Implement reasoners that can efficiently
perform the authorization decision.
• Define the RDF SHACL shapes that determine
which ODRL expressions can be evaluated.
• Declare mappings to other languages that
grant interoperability with compliance tools.
• Grant seamless operation with non-ODRL
Solid Pods.
10 / 11
This project that has received funding from the European Union’s Horizon 2020 research and innovation
programme under grant agreement Nº813497
ODRL Profile for Expressing Consent through Granular Access Control
Policies in Solid
Beatriz Esteves, beatriz.gesteves@upm.es, OEG – UPM
Harshvardhan J. Pandit, pandith@tcd.ie, ADAPT Centre –TCD
Víctor Rodríguez-Doncel, vrodriguez@fi.upm.es, OEG – UPM
Q & A

More Related Content

What's hot

Blockchain Technology for Patients Medical Records
Blockchain Technology for Patients Medical RecordsBlockchain Technology for Patients Medical Records
Blockchain Technology for Patients Medical RecordseHealth Forum
 
Personal Data Privacy Semantics in Multi-Agent Systems Interactions
Personal Data Privacy Semantics in Multi-Agent Systems InteractionsPersonal Data Privacy Semantics in Multi-Agent Systems Interactions
Personal Data Privacy Semantics in Multi-Agent Systems InteractionsJean-Paul Calbimonte
 
eDiscovery - Advising your Clients on how to be Litigation Ready in the 21st ...
eDiscovery - Advising your Clients on how to be Litigation Ready in the 21st ...eDiscovery - Advising your Clients on how to be Litigation Ready in the 21st ...
eDiscovery - Advising your Clients on how to be Litigation Ready in the 21st ...Ledjit
 
OpenID Foundation Research & Education Working Group Update - October 22, 2018
OpenID Foundation Research & Education Working Group Update - October 22, 2018OpenID Foundation Research & Education Working Group Update - October 22, 2018
OpenID Foundation Research & Education Working Group Update - October 22, 2018OpenIDFoundation
 
ICIC 2013 Conference Proceedings Kim Zwollo Rights Direct
ICIC 2013 Conference Proceedings Kim Zwollo Rights DirectICIC 2013 Conference Proceedings Kim Zwollo Rights Direct
ICIC 2013 Conference Proceedings Kim Zwollo Rights DirectDr. Haxel Consult
 
Blockchain in Healthcare: An Overview
Blockchain in Healthcare: An OverviewBlockchain in Healthcare: An Overview
Blockchain in Healthcare: An OverviewDebut Infotech
 
ICIC 2013 Conference Proceedings Richard Garner (LexisNexis)
ICIC 2013 Conference Proceedings Richard Garner (LexisNexis)ICIC 2013 Conference Proceedings Richard Garner (LexisNexis)
ICIC 2013 Conference Proceedings Richard Garner (LexisNexis)Dr. Haxel Consult
 
Decentralised entity registry “WikiReg”
Decentralised entity registry “WikiReg”Decentralised entity registry “WikiReg”
Decentralised entity registry “WikiReg”Christophe Guéret
 
New Zealand on FHIR - HiNZ 2019
New Zealand on FHIR - HiNZ 2019New Zealand on FHIR - HiNZ 2019
New Zealand on FHIR - HiNZ 2019Peter Jordan
 
II-SDV 2015, 20 - 21 April, in Nice
II-SDV 2015, 20 - 21 April, in NiceII-SDV 2015, 20 - 21 April, in Nice
II-SDV 2015, 20 - 21 April, in NiceDr. Haxel Consult
 
UX Bristol 2019 Lightning talk - Tips to develop a user-centred GDPR policy
UX Bristol 2019 Lightning talk - Tips to develop a user-centred GDPR policyUX Bristol 2019 Lightning talk - Tips to develop a user-centred GDPR policy
UX Bristol 2019 Lightning talk - Tips to develop a user-centred GDPR policyMaria Santos
 
Channeling insights to the right people
Channeling insights to the right peopleChanneling insights to the right people
Channeling insights to the right peopleSebastien Lefebvre
 
HL7 FHIR FoundationTopics for Non-Developers
HL7 FHIR FoundationTopics for Non-DevelopersHL7 FHIR FoundationTopics for Non-Developers
HL7 FHIR FoundationTopics for Non-DevelopersPeter Jordan
 
ICIC 2013 Conference Proceedings Krishna Molecular Connections
ICIC 2013 Conference Proceedings Krishna Molecular ConnectionsICIC 2013 Conference Proceedings Krishna Molecular Connections
ICIC 2013 Conference Proceedings Krishna Molecular ConnectionsDr. Haxel Consult
 

What's hot (20)

Virtual Medicolegal Documents
Virtual Medicolegal DocumentsVirtual Medicolegal Documents
Virtual Medicolegal Documents
 
Blockchain Technology for Patients Medical Records
Blockchain Technology for Patients Medical RecordsBlockchain Technology for Patients Medical Records
Blockchain Technology for Patients Medical Records
 
Personal Data Privacy Semantics in Multi-Agent Systems Interactions
Personal Data Privacy Semantics in Multi-Agent Systems InteractionsPersonal Data Privacy Semantics in Multi-Agent Systems Interactions
Personal Data Privacy Semantics in Multi-Agent Systems Interactions
 
eDiscovery - Advising your Clients on how to be Litigation Ready in the 21st ...
eDiscovery - Advising your Clients on how to be Litigation Ready in the 21st ...eDiscovery - Advising your Clients on how to be Litigation Ready in the 21st ...
eDiscovery - Advising your Clients on how to be Litigation Ready in the 21st ...
 
OpenID Foundation Research & Education Working Group Update - October 22, 2018
OpenID Foundation Research & Education Working Group Update - October 22, 2018OpenID Foundation Research & Education Working Group Update - October 22, 2018
OpenID Foundation Research & Education Working Group Update - October 22, 2018
 
ICIC 2013 Conference Proceedings Kim Zwollo Rights Direct
ICIC 2013 Conference Proceedings Kim Zwollo Rights DirectICIC 2013 Conference Proceedings Kim Zwollo Rights Direct
ICIC 2013 Conference Proceedings Kim Zwollo Rights Direct
 
Corporate Web Systems
Corporate Web SystemsCorporate Web Systems
Corporate Web Systems
 
Data lake protection ft 3119 -ver1.0
Data lake protection   ft 3119 -ver1.0Data lake protection   ft 3119 -ver1.0
Data lake protection ft 3119 -ver1.0
 
Blockchain in Healthcare: An Overview
Blockchain in Healthcare: An OverviewBlockchain in Healthcare: An Overview
Blockchain in Healthcare: An Overview
 
ICIC 2013 Conference Proceedings Richard Garner (LexisNexis)
ICIC 2013 Conference Proceedings Richard Garner (LexisNexis)ICIC 2013 Conference Proceedings Richard Garner (LexisNexis)
ICIC 2013 Conference Proceedings Richard Garner (LexisNexis)
 
Decentralised entity registry “WikiReg”
Decentralised entity registry “WikiReg”Decentralised entity registry “WikiReg”
Decentralised entity registry “WikiReg”
 
Hanson In Defense of the Proxy Server
Hanson In Defense of the Proxy ServerHanson In Defense of the Proxy Server
Hanson In Defense of the Proxy Server
 
New Zealand on FHIR - HiNZ 2019
New Zealand on FHIR - HiNZ 2019New Zealand on FHIR - HiNZ 2019
New Zealand on FHIR - HiNZ 2019
 
II-SDV 2015, 20 - 21 April, in Nice
II-SDV 2015, 20 - 21 April, in NiceII-SDV 2015, 20 - 21 April, in Nice
II-SDV 2015, 20 - 21 April, in Nice
 
Building blocks for success: criteria for trusted institutional repositories
Building blocks for success: criteria for trusted institutional repositoriesBuilding blocks for success: criteria for trusted institutional repositories
Building blocks for success: criteria for trusted institutional repositories
 
UX Bristol 2019 Lightning talk - Tips to develop a user-centred GDPR policy
UX Bristol 2019 Lightning talk - Tips to develop a user-centred GDPR policyUX Bristol 2019 Lightning talk - Tips to develop a user-centred GDPR policy
UX Bristol 2019 Lightning talk - Tips to develop a user-centred GDPR policy
 
Channeling insights to the right people
Channeling insights to the right peopleChanneling insights to the right people
Channeling insights to the right people
 
HL7 FHIR FoundationTopics for Non-Developers
HL7 FHIR FoundationTopics for Non-DevelopersHL7 FHIR FoundationTopics for Non-Developers
HL7 FHIR FoundationTopics for Non-Developers
 
Gbrds Tech Issues Op
Gbrds Tech Issues OpGbrds Tech Issues Op
Gbrds Tech Issues Op
 
ICIC 2013 Conference Proceedings Krishna Molecular Connections
ICIC 2013 Conference Proceedings Krishna Molecular ConnectionsICIC 2013 Conference Proceedings Krishna Molecular Connections
ICIC 2013 Conference Proceedings Krishna Molecular Connections
 

Similar to COnSeNT 2021 - ODRL Profile for Expressing Consent through Granular Access Control Policies in Solid

Streamline Your Negotiation: Creating & Updating a License Template for Your...
Streamline Your Negotiation: Creating & Updating a License Template for Your...Streamline Your Negotiation: Creating & Updating a License Template for Your...
Streamline Your Negotiation: Creating & Updating a License Template for Your...Liane Taylor
 
Barriers to legal interoperability of research data
Barriers to legal interoperability of research dataBarriers to legal interoperability of research data
Barriers to legal interoperability of research dataCarrie Seltzer, Ph.D.
 
Securing, storing and enabling safe access to data
Securing, storing and enabling safe access to dataSecuring, storing and enabling safe access to data
Securing, storing and enabling safe access to dataRobin Rice
 
OpenAIRE webinar on Open Research Data in H2020 (OAW2016)
OpenAIRE webinar on Open Research Data in H2020 (OAW2016)OpenAIRE webinar on Open Research Data in H2020 (OAW2016)
OpenAIRE webinar on Open Research Data in H2020 (OAW2016)OpenAIRE
 
Data accessibilityandchallenges
Data accessibilityandchallengesData accessibilityandchallenges
Data accessibilityandchallengesjyotikhadake
 
2010 CLARA Nijmegen - Data Seal of Approval tutorial
2010 CLARA Nijmegen - Data Seal of Approval tutorial2010 CLARA Nijmegen - Data Seal of Approval tutorial
2010 CLARA Nijmegen - Data Seal of Approval tutorialDirk Roorda
 
Licensing health and sensitive data
Licensing health and sensitive dataLicensing health and sensitive data
Licensing health and sensitive dataARDC
 
DDOD for FOIA organizations
DDOD for FOIA organizationsDDOD for FOIA organizations
DDOD for FOIA organizationsDavid Portnoy
 
Managing Your Research Data for Maximum Impact -Rob Daley 300616_Shared
Managing Your Research Data for Maximum Impact -Rob Daley 300616_SharedManaging Your Research Data for Maximum Impact -Rob Daley 300616_Shared
Managing Your Research Data for Maximum Impact -Rob Daley 300616_SharedRob Daley
 
Building a data driven search application with LucidWorks SiLK
Building a data driven search application with LucidWorks SiLKBuilding a data driven search application with LucidWorks SiLK
Building a data driven search application with LucidWorks SiLKLucidworks (Archived)
 
Govern and Protect Your End User Information
Govern and Protect Your End User InformationGovern and Protect Your End User Information
Govern and Protect Your End User InformationDenodo
 
All an NCP should know about DMPs, but didn't have the time to ask
All an NCP should know about DMPs, but didn't have the time to askAll an NCP should know about DMPs, but didn't have the time to ask
All an NCP should know about DMPs, but didn't have the time to askSarah Jones
 
Research Data Management: An Introductory Webinar from OpenAIRE and EUDAT
Research Data Management: An Introductory Webinar from OpenAIRE and EUDATResearch Data Management: An Introductory Webinar from OpenAIRE and EUDAT
Research Data Management: An Introductory Webinar from OpenAIRE and EUDATTony Ross-Hellauer
 
Research Data Management: An Introductory Webinar from OpenAIRE and EUDAT
Research Data Management: An Introductory Webinar from OpenAIRE and EUDATResearch Data Management: An Introductory Webinar from OpenAIRE and EUDAT
Research Data Management: An Introductory Webinar from OpenAIRE and EUDATOpenAIRE
 
Research Data Management Introduction: EUDAT/Open AIRE Webinar| www.eudat.eu |
Research Data Management Introduction: EUDAT/Open AIRE Webinar| www.eudat.eu | Research Data Management Introduction: EUDAT/Open AIRE Webinar| www.eudat.eu |
Research Data Management Introduction: EUDAT/Open AIRE Webinar| www.eudat.eu | EUDAT
 
A Tale of Two Regulations: Cross-Border Data Protection For Big Data Under GD...
A Tale of Two Regulations: Cross-Border Data Protection For Big Data Under GD...A Tale of Two Regulations: Cross-Border Data Protection For Big Data Under GD...
A Tale of Two Regulations: Cross-Border Data Protection For Big Data Under GD...DataWorks Summit/Hadoop Summit
 
EPSRC research data expectations and research software management
EPSRC research data expectations and research software managementEPSRC research data expectations and research software management
EPSRC research data expectations and research software managementHistoric Environment Scotland
 

Similar to COnSeNT 2021 - ODRL Profile for Expressing Consent through Granular Access Control Policies in Solid (20)

Streamline Your Negotiation: Creating & Updating a License Template for Your...
Streamline Your Negotiation: Creating & Updating a License Template for Your...Streamline Your Negotiation: Creating & Updating a License Template for Your...
Streamline Your Negotiation: Creating & Updating a License Template for Your...
 
Barriers to legal interoperability of research data
Barriers to legal interoperability of research dataBarriers to legal interoperability of research data
Barriers to legal interoperability of research data
 
Securing, storing and enabling safe access to data
Securing, storing and enabling safe access to dataSecuring, storing and enabling safe access to data
Securing, storing and enabling safe access to data
 
OpenAIRE webinar on Open Research Data in H2020 (OAW2016)
OpenAIRE webinar on Open Research Data in H2020 (OAW2016)OpenAIRE webinar on Open Research Data in H2020 (OAW2016)
OpenAIRE webinar on Open Research Data in H2020 (OAW2016)
 
Data accessibilityandchallenges
Data accessibilityandchallengesData accessibilityandchallenges
Data accessibilityandchallenges
 
2010 CLARA Nijmegen - Data Seal of Approval tutorial
2010 CLARA Nijmegen - Data Seal of Approval tutorial2010 CLARA Nijmegen - Data Seal of Approval tutorial
2010 CLARA Nijmegen - Data Seal of Approval tutorial
 
LSHTM Research Data Management Policy: An Overview
LSHTM Research Data Management Policy: An OverviewLSHTM Research Data Management Policy: An Overview
LSHTM Research Data Management Policy: An Overview
 
Licensing health and sensitive data
Licensing health and sensitive dataLicensing health and sensitive data
Licensing health and sensitive data
 
DDOD for FOIA organizations
DDOD for FOIA organizationsDDOD for FOIA organizations
DDOD for FOIA organizations
 
Managing Your Research Data for Maximum Impact -Rob Daley 300616_Shared
Managing Your Research Data for Maximum Impact -Rob Daley 300616_SharedManaging Your Research Data for Maximum Impact -Rob Daley 300616_Shared
Managing Your Research Data for Maximum Impact -Rob Daley 300616_Shared
 
Introduction to Data Licences
Introduction to Data LicencesIntroduction to Data Licences
Introduction to Data Licences
 
Building a data driven search application with LucidWorks SiLK
Building a data driven search application with LucidWorks SiLKBuilding a data driven search application with LucidWorks SiLK
Building a data driven search application with LucidWorks SiLK
 
Shareable by Design: Making Better Use of your Research
Shareable by Design: Making Better Use of your ResearchShareable by Design: Making Better Use of your Research
Shareable by Design: Making Better Use of your Research
 
Govern and Protect Your End User Information
Govern and Protect Your End User InformationGovern and Protect Your End User Information
Govern and Protect Your End User Information
 
All an NCP should know about DMPs, but didn't have the time to ask
All an NCP should know about DMPs, but didn't have the time to askAll an NCP should know about DMPs, but didn't have the time to ask
All an NCP should know about DMPs, but didn't have the time to ask
 
Research Data Management: An Introductory Webinar from OpenAIRE and EUDAT
Research Data Management: An Introductory Webinar from OpenAIRE and EUDATResearch Data Management: An Introductory Webinar from OpenAIRE and EUDAT
Research Data Management: An Introductory Webinar from OpenAIRE and EUDAT
 
Research Data Management: An Introductory Webinar from OpenAIRE and EUDAT
Research Data Management: An Introductory Webinar from OpenAIRE and EUDATResearch Data Management: An Introductory Webinar from OpenAIRE and EUDAT
Research Data Management: An Introductory Webinar from OpenAIRE and EUDAT
 
Research Data Management Introduction: EUDAT/Open AIRE Webinar| www.eudat.eu |
Research Data Management Introduction: EUDAT/Open AIRE Webinar| www.eudat.eu | Research Data Management Introduction: EUDAT/Open AIRE Webinar| www.eudat.eu |
Research Data Management Introduction: EUDAT/Open AIRE Webinar| www.eudat.eu |
 
A Tale of Two Regulations: Cross-Border Data Protection For Big Data Under GD...
A Tale of Two Regulations: Cross-Border Data Protection For Big Data Under GD...A Tale of Two Regulations: Cross-Border Data Protection For Big Data Under GD...
A Tale of Two Regulations: Cross-Border Data Protection For Big Data Under GD...
 
EPSRC research data expectations and research software management
EPSRC research data expectations and research software managementEPSRC research data expectations and research software management
EPSRC research data expectations and research software management
 

Recently uploaded

Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024The Digital Insurer
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 

Recently uploaded (20)

Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 

COnSeNT 2021 - ODRL Profile for Expressing Consent through Granular Access Control Policies in Solid

  • 1. This project that has received funding from the European Union’s Horizon 2020 research and innovation programme under grant agreement Nº813497 ODRL Profile for Expressing Consent through Granular Access Control Policies in Solid Beatriz Esteves, beatriz.gesteves@upm.es, OEG – UPM Harshvardhan J. Pandit, pandith@tcd.ie, ADAPT Centre –TCD Víctor Rodríguez-Doncel, vrodriguez@fi.upm.es, OEG – UPM
  • 2. Overview • Introduction to Solid • Motivation • Related Work • ODRL Profile for Solid’s ACL • Implementation & Architecture • Challenges • Conclusion 2 / 11
  • 3. Introduction to Solid https://solidproject.org Solid is a specification for decentralised personal data stores based on interoperable data formats and protocols. Ownership Interoperability Beatriz has full access to one of her web resources, located at https:// beatriz.databox.me/docs/file1 <#authorization1> a acl:Authorization; acl:agent <https://beatriz.databox.me/profile/card#me>; acl:accessTo <https://beatriz.databox.me/docs/file1>; acl:mode acl:Read, acl:Write, acl:Control. WebID Solid’s Access Control Authorizations 3 / 11
  • 4. Motivation GDPR’s Articles 13 and 14 Identity Purpose Personal data categories Processing categories Legal bases Recipients Consent provide information regarding Introspect use of personal data Store consent and authorisations Determine data sharing preferences How can Solid’s ACL be extended to specify and enforce an individual’s data sharing preferences? 4 / 11
  • 5. Related Work Specifying Personal Data and Processing Access Control using Linked Data 5 / 11
  • 6. ODRL Profile for Solid’s ACL https://w3id.org/oac/ Requisites R1. Support specifying user preferences as policies. R2. Incorporate vocabulary specifying or aligned to legal concepts. R3. Support specifying permissions and prohibitions at arbitrary granularity. R4. Support identifying and resolving conflicts based on scope. R5. Record (store) policies used to authorise access. R6. Support querying policies and authorisations for introspection of data use. :example-1 a odrl:Policy ; odrl:permission [ odrl:action oac:Read ; odrl:target oac:Contact ; odrl:assigner [ a oac:DataSubject ; cert:key "https://beatriz.webID/card#me" ] ; odrl:constraint [ odrl:leftOperand oac:Purpose ; odrl:operator odrl:isA ; odrl:rightOperand dpv:AcademicResearch ] ] . Extension of Solid's ACL mechanism using the ODRL specification to define "sticky policies" that express permissions and/or prohibitions associated with data stored in a Solid pod and uses DPV as a controlled vocabulary to invoke specific privacy and data protection terms. 6 / 11
  • 7. Implementation & Architecture Extension of the existing Solid Pod specification • Consent datastore – keep a record of the consent actions • Audit Log – store metadata related to logins, access requests, changes in policies and consent authorisations • Notification Mechanism – allow to update or revoke requests regarding consent • Metadata and Policies Editors – assist users to craft granular policies for the management of access to their Pod 7 / 11
  • 8. Challenges Efficiency and performance Complexity of ODRL policies • Deal with large collection of policies in the form of preferences, requests, and authorisations • The more data is transmitted in policies and requests, the more time and resource- consuming will be the authorization mechanism • Deal with conflicting policies, i.e., global prohibitions outweigh local permissions Storage and Management of Policies • Where to store requests and user policies • Discovery of policies that refer to a given resource • How to craft valid ODRL policies • Create a separate area of the Pod to store the policies and metadata declarations • Create a Policies Editor component that supports users in drafting the policies, without having the need for previous ODRL knowledge Limit ODRL features to ensure optimal performance 8 / 11
  • 9. Challenges Legal Implications of Requests Legal Interpretation of Request and Preferences Consent • Deal with other legal bases, i.e., compliance with a legal obligation or legitimate interests • Discuss whether access to resources in the pod should be automated • Challenge that is unlikely to be satisfactorily addressed • Map policies, requests, and preferences with their legal interpretation • Deal with different jurisdictions • To ensure that consent is informed and explicit, specific information items should be provided and recorded in the Pod • Allow users to update or revoke consent • Discuss whether the implicit consent from the established user preferences is enough to provide automated access to non-sensitive personal data • Allow users to choose which data types, and purposes, they are comfortable with enabling automation and which not • Have a queryable Consent datastore which can be easily updated 9 / 11
  • 10. Conclusion Solid’s shortcomings • Expression of more complex policies beyond a yes/no • Alignment with GDPR requisites Can be overcome by using Future Work • Implement reasoners that can efficiently perform the authorization decision. • Define the RDF SHACL shapes that determine which ODRL expressions can be evaluated. • Declare mappings to other languages that grant interoperability with compliance tools. • Grant seamless operation with non-ODRL Solid Pods. 10 / 11
  • 11. This project that has received funding from the European Union’s Horizon 2020 research and innovation programme under grant agreement Nº813497 ODRL Profile for Expressing Consent through Granular Access Control Policies in Solid Beatriz Esteves, beatriz.gesteves@upm.es, OEG – UPM Harshvardhan J. Pandit, pandith@tcd.ie, ADAPT Centre –TCD Víctor Rodríguez-Doncel, vrodriguez@fi.upm.es, OEG – UPM Q & A