Open Access Open Access  Restricted Access Subscription or Fee Access

Privacy Enhancing Technology Selection based on Inagaki‟s Unified Rule of Combination

V.P. Nithya, R. Subha

Abstract


A major challenge in the field of software engineering is to make users trust the software that they use in their everyday professional or recreational activities. Trusting software depends on various elements, one of which is the protection of user privacy. The paper implements a method that combines the Privacy Safeguard (PriS) method and Inagaki‟s unified combination rule. The method aims to include privacy requirements early in the system development process. The method extends the PriS method to address the degree of participation of every privacy requirements. It can be done by fuzzifiying privacy variables that maps degree of participation of each privacy variables to the [0, 1] interval. Dempster Shafer rule of combination is proposed to combine the evidences needed to select the implementation of the privacy requirement. Yagers rule of combination, which is a modified D-S rule of combination is included to handle conflicts. Inagaki‟s unified combination rule increases the filtering of evidences and also compares with the Dempster‟s rule of combination and Yager‟s rule of combination. The combination results based on the proposed approach can be more reasonable.

Keywords


Dempster Shafer Rule of Combination, Inagaki‟s Unified Combination Rule, PriS, Privacy Requirement

Full Text:

PDF

References


Anton A.I Goal Based Requirement Analysis, IEEE Conference Publications. Proceedings of the 2nd IEEE international conference on requirements engineering (ICRE‟96).

Christos Kalloniatis, Petros Belsis , Stefanos Gritzalis, A soft computing approach for privacy requirements engineering: The PriS framework. Applied Soft Computing. Volume 11, Issue 7, October 2011, Pages 4341–4348.

Christos Kalloniatis, Evangelia Kavakli, Stefanos Gritzalis, Addressing privacy requirements in system design: the PriS Method. pp. 133–153.

Christos Kalloniatis , Evangelia Kavakli, Stefanos Gritzalis, Methods for Designing Privacy Aware Information Systems: A Review, IEEE CPS Conference Publishing Services, Proceedings of the PCI 2009 13th Pan-Hellenic Conference on Informatics, Page(s): 185 - 194 .

C. Kalloniatis, E. Kavakli, E. Kontellis, PriS Tool: A Case Tool for Privacy Oriented Requirement Engineering, Journal of Information System Security, Vol. 6, No. 1, pp. 3-19, AIS SIGSEC

C. Kalloniatis, E. Kavakli, S. Gritzalis, "PriS Methodology: Incorporating Privacy Requirements into the System Design Process", Proceedings of the SREIS 2005 13th IEEE International Requirements Engineering Conference – Symposium on Requirements Engineering for Information Security, J. Mylopoulos, G. Spafford (Eds.), August 2005, Paris, France, IEEE CPS

Charles B. Haley, Robin Laney, Jonathan D. Moffett, Bashar Nuseibeh, Security rquirements Engineering: A Framework for Representation and Analysis, IEEE Transactions on Software Engineering (2008)

Evangelia Kavakli Goal Oriented Requirements Engineering: A Unifying Framework, Springer, Requirements Engineering January 2002, Volume 6, Issue 4, pp 237-251

Inma P. Cabrera, Pablo Cordero, and Manuel Ojeda-Aciego, Fuzzy Logic, Soft Computing, and Applications, Springer(2009), Volume: 5517.

Klir G., Yuan B, “Fuzzy sets and fuzzy logic”, Prentice Hall, 1995 Deliverable D 7.6, IST Programme 2000#29518, 21/11/2003, Samos.

L.A. Zadeh, Review of books: a mathematical theory of evidence, The AI Magazine 5 (3) (1984) 81–83.

Loucopoulos, P., Kavakli, V., Enterprise Knowledge Management and Conceptual Modelling. LNCS Vol. 1565. Springer (1999) 123-143.

Piero Baraldi, Enrico Zio, A comparison between probabilistic and Dempster-Shafer Theory approaches to Model Uncertainty Analysis in the Performance Assessment of Radioactive Waste Repositories. Wiley Online Library , , Risk Analysis 2010, Volume 30.

Rajwinder Kaur , Manisha Bhardwaj ,Neha Malhotra, Analyzing Imprecise Requirements Using Fuzzy Logic, International Journal of Engineering Research & Technology (2012),Volume1.

Sentz, K. and S. Ferson. Combination of Evidence in Dempster-Shafer Theory, Sandia National Laboratories, Technical Report SAND 2002-0835, Albuquerque, New Mexico, 2002.

University of the Aegean, E-Vote: An Internet-based electronic voting system. University of the Aegean, Project

Tazid Ali, Palash Dutta, and Hrishikesh Boruah A New Combination Rule for Conflict Problem of Dempster-Shafer, Evidence Theory, International Journal of Energy, Information and Communications Vol. 3, Issue 1, February, 2012.




DOI: http://dx.doi.org/10.36039/AA042013009

Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.