Michael Mahan
The Web services architecture must address privacy in
two separate contexts. One context is the assurance of confidentiality during
message transmission between the service requestor and the service receiver.
This includes messages that are processed by one or more intermediary
processors before arriving at its ultimate receiver. Privacy, in this context,
is addressed by message confidentiality technologies and this is one of the
facets of Web services security and is address in section x.x.x.x.
The second privacy context addresses data protection.
Information privacy is the management of sensitive information that may be
obtained by any of processing nodes during a Web services message exchange.
Central in this context is the end user’s right to know how, when, and to what
extent their personal or sensitive information will be used by the Web services
processing nodes. Protected usage includes the sharing of personal or sensitive
information obtained by a processing node with any third party. Also central is
that these practices should be exposed by the processing nodes prior to a
service invocation, allowing a service requestor to factor a processing node’s
privacy practices in the decision to use a particular Web service or to follow
a particular message route. Hence, the publishing and accessibility of a Web
service processor’s privacy practices will aid an end user to retain control
over his personal information. This is contingent on the compliance to the published
privacy by the Web service processor and is outside of the scope of technology
solutions.
Sensitive information provided by a Web service
requester and obtained by a processor may include
identify information such as name, physical address, email address, social
security number (in the U.S.), driver license number, etc. Personal, yet
non-identify information such as age, gender, account numbers, affiliated
organizations, hardware capabilities, and user preferences may also be
transmitted during a Web service invocation. A user’s or institution’s
financial information is probably the most sensitive of data – immediate and
direct harm results if this information is not properly protected. In addition
to storing directly provided information, a service provider or even a message
intermediary can capture service trends about the user or the service
requester. Correlated data is often sold to third parties and should be subject
to privacy protection.
Legislation is a major driver of privacy requirements in some countries
such as the U.S. and in some global organizations, such as the E.U. Hence, it will be mandatory that some Web
service processors make its privacy practices available to service users,
dependent on the relevant local regulatory environment.
Privacy policies apply to any and all entities that collect or collate
personal information during Web service messaging. Privacy policies encapsulate
the rules that govern the usage, management, and potential dissemination of
collected or collated personal information. Privacy policies define how, when,
to whom, and for how long personal information is available to the Web service
processors.
<More on privacy policies and maybe WS-Policy>
<P3P described>
<example P3P usage in Web services>
Anonymity is often used to ensure privacy. Anonymity
in the Web services context is a mechanism to ensure that the identity of a
user is not disclosed during a Web service invocation. Hence, information
supplied to the Web services provider will be free of values that can be used
to identify the user. A Web service provider’s identity-oriented fields might
only get a pseudonym. This is a simple form of identity management and
architecturally requires an application intermediary that is inside the user’s
trust boundary. The application intermediary will relay the user request to the
ultimate receiver after stripping out user sensitive information and replacing
any required data with intermediary-oriented data, including the pseudonym.
Web service providers often require an identifier for each user. This
identifier requirement originates from the provider’s user authentication
mechanism. The provider then uses each identifier as the key to stored
sensitive data relating to an individual service user.
A Web service user will typically interact with many Web service
providers. Hence, each Web service user
will need to maintain many identifiers, regardless of whether the user use
specialized application Web service clients, a general application Web services
client (i.e. browser-based) or some mixture of these two client types. Service
providers often capture the same sensitive information, such as address,
personal preferences, and financial data. This duplicated, distributed data is
apt to become stale, as each user’s sensitive information may be volatile.
A solution to
these issues is to provide Web service users a federated network identity. A federated network identity will provide a
Web service user a single repository for all online identities and sensitive
information including preferences and purchasing habits. Architecturally, an
identify provider fulfils the role of a federated network identity. Each Web
service user can then administer his multiple identities. The identity provider
will then securely share Identity and sensitive information with Web service
providers discriminately.
<Include
required Identity Management architectural entities and relationships>