COnSeNT 2021 - ODRL Profile for Expressing Consent through Granular Access Control Policies in Solid

This project that has received funding from the European Union’s Horizon 2020 research and innovation
programme under grant agreement Nº813497
ODRL Profile for Expressing Consent
through Granular Access Control
Policies in Solid
Beatriz Esteves, beatriz.gesteves@upm.es, OEG – UPM
Harshvardhan J. Pandit, pandith@tcd.ie, ADAPT Centre –TCD
Víctor Rodríguez-Doncel, vrodriguez@fi.upm.es, OEG – UPM
Overview
• Introduction to Solid
• Motivation
• Related Work
• ODRL Profile for Solid’s ACL
• Implementation &
Architecture
• Challenges
• Conclusion
2 / 11
Introduction to Solid
https://solidproject.org
Solid is a specification for decentralised
personal data stores based on
interoperable data formats and protocols.
Ownership Interoperability
Beatriz has full access to one of her web resources,
located at https:// beatriz.databox.me/docs/file1
<#authorization1>
a acl:Authorization;
acl:agent <https://beatriz.databox.me/profile/card#me>;
acl:accessTo <https://beatriz.databox.me/docs/file1>;
acl:mode acl:Read, acl:Write, acl:Control.
WebID
Solid’s Access Control Authorizations
3 / 11
Motivation
GDPR’s Articles 13 and 14
Identity
Purpose
Personal data categories
Processing categories
Legal bases
Recipients
Consent
provide information
regarding
Introspect use of
personal data
Store consent and
authorisations
Determine data
sharing preferences
How can Solid’s ACL be
extended to specify and
enforce an individual’s data
sharing preferences?
4 / 11
Related Work
Specifying Personal Data and Processing
Access Control using Linked Data
5 / 11
ODRL Profile for Solid’s ACL
https://w3id.org/oac/
Requisites
R1. Support specifying user preferences as policies.
R2. Incorporate vocabulary specifying or aligned to legal
concepts.
R3. Support specifying permissions and prohibitions at
arbitrary granularity.
R4. Support identifying and resolving conflicts based on scope.
R5. Record (store) policies used to authorise access.
R6. Support querying policies and authorisations for
introspection of data use.
:example-1 a odrl:Policy ;
odrl:permission [
odrl:action oac:Read ;
odrl:target oac:Contact ;
odrl:assigner [
a oac:DataSubject ;
cert:key "https://beatriz.webID/card#me"
] ;
odrl:constraint [
odrl:leftOperand oac:Purpose ;
odrl:operator odrl:isA ;
odrl:rightOperand dpv:AcademicResearch
]
] .
Extension of Solid's ACL mechanism using the ODRL specification to define
"sticky policies" that express permissions and/or prohibitions associated with
data stored in a Solid pod and uses DPV as a controlled vocabulary to invoke
specific privacy and data protection terms.
6 / 11
Implementation & Architecture
Extension of the existing Solid Pod specification
• Consent datastore – keep a record of the consent actions
• Audit Log – store metadata related to logins, access requests, changes
in policies and consent authorisations
• Notification Mechanism – allow to update or revoke requests regarding
consent
• Metadata and Policies Editors – assist users to craft granular policies for
the management of access to their Pod
7 / 11
Challenges
Efficiency and performance
Complexity of ODRL policies
• Deal with large collection of policies in the
form of preferences, requests, and
authorisations
• The more data is transmitted in policies and
requests, the more time and resource-
consuming will be the authorization
mechanism
• Deal with conflicting policies, i.e., global
prohibitions outweigh local permissions
Storage and Management of Policies
• Where to store requests and user policies
• Discovery of policies that refer to a given
resource
• How to craft valid ODRL policies
• Create a separate area of the Pod to store
the policies and metadata declarations
• Create a Policies Editor component that
supports users in drafting the policies,
without having the need for previous ODRL
knowledge
Limit ODRL features to ensure optimal performance
8 / 11
Challenges
Legal Implications of Requests
Legal Interpretation of Request and
Preferences
Consent
• Deal with other legal bases, i.e., compliance
with a legal obligation or legitimate interests
• Discuss whether access to resources in the
pod should be automated
• Challenge that is unlikely to be satisfactorily
addressed
• Map policies, requests, and preferences with
their legal interpretation
• Deal with different jurisdictions
• To ensure that consent is informed and
explicit, specific information items should be
provided and recorded in the Pod
• Allow users to update or revoke consent
• Discuss whether the implicit consent from
the established user preferences is enough to
provide automated access to non-sensitive
personal data
• Allow users to choose which data types, and
purposes, they are comfortable with
enabling automation and which not
• Have a queryable Consent datastore which
can be easily updated
9 / 11
Conclusion
Solid’s shortcomings
• Expression of more complex policies beyond a yes/no
• Alignment with GDPR requisites
Can be overcome
by using
Future Work
• Implement reasoners that can efficiently
perform the authorization decision.
• Define the RDF SHACL shapes that determine
which ODRL expressions can be evaluated.
• Declare mappings to other languages that
grant interoperability with compliance tools.
• Grant seamless operation with non-ODRL
Solid Pods.
10 / 11
This project that has received funding from the European Union’s Horizon 2020 research and innovation
programme under grant agreement Nº813497
ODRL Profile for Expressing Consent through Granular Access Control
Policies in Solid
Beatriz Esteves, beatriz.gesteves@upm.es, OEG – UPM
Harshvardhan J. Pandit, pandith@tcd.ie, ADAPT Centre –TCD
Víctor Rodríguez-Doncel, vrodriguez@fi.upm.es, OEG – UPM
Q & A
1 of 11

Recommended

Who should I trust with my data? by
Who should I trust with my data?Who should I trust with my data?
Who should I trust with my data?Beatriz Esteves
16 views6 slides
Digital Representation of Privacy Terms by
Digital Representation of Privacy TermsDigital Representation of Privacy Terms
Digital Representation of Privacy TermsBeatriz Esteves
20 views12 slides
W3C DPVCG - DPV v0.2 by
W3C DPVCG - DPV v0.2W3C DPVCG - DPV v0.2
W3C DPVCG - DPV v0.2Beatriz Esteves
30 views12 slides
Transparent Personal Data Processing: The Road Ahead by
Transparent Personal Data Processing: The Road AheadTransparent Personal Data Processing: The Road Ahead
Transparent Personal Data Processing: The Road AheadSabrina Kirrane
914 views23 slides
Satisfy Regulatory Requirements in Business Objects (GDPR, HIPAA, SOX, FISMA,... by
Satisfy Regulatory Requirements in Business Objects (GDPR, HIPAA, SOX, FISMA,...Satisfy Regulatory Requirements in Business Objects (GDPR, HIPAA, SOX, FISMA,...
Satisfy Regulatory Requirements in Business Objects (GDPR, HIPAA, SOX, FISMA,...Wiiisdom
123 views25 slides
Catrina Hopkins Final Project PowerPoint by
Catrina Hopkins Final Project PowerPointCatrina Hopkins Final Project PowerPoint
Catrina Hopkins Final Project PowerPoint2230336
216 views10 slides

More Related Content

What's hot

Virtual Medicolegal Documents by
Virtual Medicolegal DocumentsVirtual Medicolegal Documents
Virtual Medicolegal DocumentsChristopher Brigham MD
14 views22 slides
Blockchain Technology for Patients Medical Records by
Blockchain Technology for Patients Medical RecordsBlockchain Technology for Patients Medical Records
Blockchain Technology for Patients Medical RecordseHealth Forum
1.8K views16 slides
Personal Data Privacy Semantics in Multi-Agent Systems Interactions by
Personal Data Privacy Semantics in Multi-Agent Systems InteractionsPersonal Data Privacy Semantics in Multi-Agent Systems Interactions
Personal Data Privacy Semantics in Multi-Agent Systems InteractionsJean-Paul Calbimonte
174 views22 slides
eDiscovery - Advising your Clients on how to be Litigation Ready in the 21st ... by
eDiscovery - Advising your Clients on how to be Litigation Ready in the 21st ...eDiscovery - Advising your Clients on how to be Litigation Ready in the 21st ...
eDiscovery - Advising your Clients on how to be Litigation Ready in the 21st ...Ledjit
467 views12 slides
OpenID Foundation Research & Education Working Group Update - October 22, 2018 by
OpenID Foundation Research & Education Working Group Update - October 22, 2018OpenID Foundation Research & Education Working Group Update - October 22, 2018
OpenID Foundation Research & Education Working Group Update - October 22, 2018OpenIDFoundation
1.2K views13 slides
ICIC 2013 Conference Proceedings Kim Zwollo Rights Direct by
ICIC 2013 Conference Proceedings Kim Zwollo Rights DirectICIC 2013 Conference Proceedings Kim Zwollo Rights Direct
ICIC 2013 Conference Proceedings Kim Zwollo Rights DirectDr. Haxel Consult
983 views23 slides

What's hot(20)

Blockchain Technology for Patients Medical Records by eHealth Forum
Blockchain Technology for Patients Medical RecordsBlockchain Technology for Patients Medical Records
Blockchain Technology for Patients Medical Records
eHealth Forum1.8K views
Personal Data Privacy Semantics in Multi-Agent Systems Interactions by Jean-Paul Calbimonte
Personal Data Privacy Semantics in Multi-Agent Systems InteractionsPersonal Data Privacy Semantics in Multi-Agent Systems Interactions
Personal Data Privacy Semantics in Multi-Agent Systems Interactions
eDiscovery - Advising your Clients on how to be Litigation Ready in the 21st ... by Ledjit
eDiscovery - Advising your Clients on how to be Litigation Ready in the 21st ...eDiscovery - Advising your Clients on how to be Litigation Ready in the 21st ...
eDiscovery - Advising your Clients on how to be Litigation Ready in the 21st ...
Ledjit467 views
OpenID Foundation Research & Education Working Group Update - October 22, 2018 by OpenIDFoundation
OpenID Foundation Research & Education Working Group Update - October 22, 2018OpenID Foundation Research & Education Working Group Update - October 22, 2018
OpenID Foundation Research & Education Working Group Update - October 22, 2018
OpenIDFoundation1.2K views
ICIC 2013 Conference Proceedings Kim Zwollo Rights Direct by Dr. Haxel Consult
ICIC 2013 Conference Proceedings Kim Zwollo Rights DirectICIC 2013 Conference Proceedings Kim Zwollo Rights Direct
ICIC 2013 Conference Proceedings Kim Zwollo Rights Direct
Dr. Haxel Consult983 views
Blockchain in Healthcare: An Overview by Debut Infotech
Blockchain in Healthcare: An OverviewBlockchain in Healthcare: An Overview
Blockchain in Healthcare: An Overview
Debut Infotech371 views
ICIC 2013 Conference Proceedings Richard Garner (LexisNexis) by Dr. Haxel Consult
ICIC 2013 Conference Proceedings Richard Garner (LexisNexis)ICIC 2013 Conference Proceedings Richard Garner (LexisNexis)
ICIC 2013 Conference Proceedings Richard Garner (LexisNexis)
Dr. Haxel Consult1.6K views
New Zealand on FHIR - HiNZ 2019 by Peter Jordan
New Zealand on FHIR - HiNZ 2019New Zealand on FHIR - HiNZ 2019
New Zealand on FHIR - HiNZ 2019
Peter Jordan109 views
UX Bristol 2019 Lightning talk - Tips to develop a user-centred GDPR policy by Maria Santos
UX Bristol 2019 Lightning talk - Tips to develop a user-centred GDPR policyUX Bristol 2019 Lightning talk - Tips to develop a user-centred GDPR policy
UX Bristol 2019 Lightning talk - Tips to develop a user-centred GDPR policy
Maria Santos132 views
HL7 FHIR FoundationTopics for Non-Developers by Peter Jordan
HL7 FHIR FoundationTopics for Non-DevelopersHL7 FHIR FoundationTopics for Non-Developers
HL7 FHIR FoundationTopics for Non-Developers
Peter Jordan117 views
ICIC 2013 Conference Proceedings Krishna Molecular Connections by Dr. Haxel Consult
ICIC 2013 Conference Proceedings Krishna Molecular ConnectionsICIC 2013 Conference Proceedings Krishna Molecular Connections
ICIC 2013 Conference Proceedings Krishna Molecular Connections
Dr. Haxel Consult1.4K views

Similar to COnSeNT 2021 - ODRL Profile for Expressing Consent through Granular Access Control Policies in Solid

Streamline Your Negotiation: Creating & Updating a License Template for Your... by
Streamline Your Negotiation: Creating & Updating a License Template for Your...Streamline Your Negotiation: Creating & Updating a License Template for Your...
Streamline Your Negotiation: Creating & Updating a License Template for Your...Liane Taylor
622 views45 slides
Barriers to legal interoperability of research data by
Barriers to legal interoperability of research dataBarriers to legal interoperability of research data
Barriers to legal interoperability of research dataCarrie Seltzer, Ph.D.
95 views15 slides
Securing, storing and enabling safe access to data by
Securing, storing and enabling safe access to dataSecuring, storing and enabling safe access to data
Securing, storing and enabling safe access to dataRobin Rice
95 views20 slides
OpenAIRE webinar on Open Research Data in H2020 (OAW2016) by
OpenAIRE webinar on Open Research Data in H2020 (OAW2016)OpenAIRE webinar on Open Research Data in H2020 (OAW2016)
OpenAIRE webinar on Open Research Data in H2020 (OAW2016)OpenAIRE
1.4K views32 slides
Data accessibilityandchallenges by
Data accessibilityandchallengesData accessibilityandchallenges
Data accessibilityandchallengesjyotikhadake
159 views33 slides
2010 CLARA Nijmegen - Data Seal of Approval tutorial by
2010 CLARA Nijmegen - Data Seal of Approval tutorial2010 CLARA Nijmegen - Data Seal of Approval tutorial
2010 CLARA Nijmegen - Data Seal of Approval tutorialDirk Roorda
581 views28 slides

Similar to COnSeNT 2021 - ODRL Profile for Expressing Consent through Granular Access Control Policies in Solid(20)

Streamline Your Negotiation: Creating & Updating a License Template for Your... by Liane Taylor
Streamline Your Negotiation: Creating & Updating a License Template for Your...Streamline Your Negotiation: Creating & Updating a License Template for Your...
Streamline Your Negotiation: Creating & Updating a License Template for Your...
Liane Taylor622 views
Securing, storing and enabling safe access to data by Robin Rice
Securing, storing and enabling safe access to dataSecuring, storing and enabling safe access to data
Securing, storing and enabling safe access to data
Robin Rice95 views
OpenAIRE webinar on Open Research Data in H2020 (OAW2016) by OpenAIRE
OpenAIRE webinar on Open Research Data in H2020 (OAW2016)OpenAIRE webinar on Open Research Data in H2020 (OAW2016)
OpenAIRE webinar on Open Research Data in H2020 (OAW2016)
OpenAIRE1.4K views
Data accessibilityandchallenges by jyotikhadake
Data accessibilityandchallengesData accessibilityandchallenges
Data accessibilityandchallenges
jyotikhadake159 views
2010 CLARA Nijmegen - Data Seal of Approval tutorial by Dirk Roorda
2010 CLARA Nijmegen - Data Seal of Approval tutorial2010 CLARA Nijmegen - Data Seal of Approval tutorial
2010 CLARA Nijmegen - Data Seal of Approval tutorial
Dirk Roorda581 views
Licensing health and sensitive data by ARDC
Licensing health and sensitive dataLicensing health and sensitive data
Licensing health and sensitive data
ARDC582 views
DDOD for FOIA organizations by David Portnoy
DDOD for FOIA organizationsDDOD for FOIA organizations
DDOD for FOIA organizations
David Portnoy550 views
Managing Your Research Data for Maximum Impact -Rob Daley 300616_Shared by Rob Daley
Managing Your Research Data for Maximum Impact -Rob Daley 300616_SharedManaging Your Research Data for Maximum Impact -Rob Daley 300616_Shared
Managing Your Research Data for Maximum Impact -Rob Daley 300616_Shared
Rob Daley176 views
Building a data driven search application with LucidWorks SiLK by Lucidworks (Archived)
Building a data driven search application with LucidWorks SiLKBuilding a data driven search application with LucidWorks SiLK
Building a data driven search application with LucidWorks SiLK
Govern and Protect Your End User Information by Denodo
Govern and Protect Your End User InformationGovern and Protect Your End User Information
Govern and Protect Your End User Information
Denodo 212 views
All an NCP should know about DMPs, but didn't have the time to ask by Sarah Jones
All an NCP should know about DMPs, but didn't have the time to askAll an NCP should know about DMPs, but didn't have the time to ask
All an NCP should know about DMPs, but didn't have the time to ask
Sarah Jones218 views
Research Data Management Introduction: EUDAT/Open AIRE Webinar| www.eudat.eu | by EUDAT
Research Data Management Introduction: EUDAT/Open AIRE Webinar| www.eudat.eu | Research Data Management Introduction: EUDAT/Open AIRE Webinar| www.eudat.eu |
Research Data Management Introduction: EUDAT/Open AIRE Webinar| www.eudat.eu |
EUDAT6.8K views
Research Data Management: An Introductory Webinar from OpenAIRE and EUDAT by OpenAIRE
Research Data Management: An Introductory Webinar from OpenAIRE and EUDATResearch Data Management: An Introductory Webinar from OpenAIRE and EUDAT
Research Data Management: An Introductory Webinar from OpenAIRE and EUDAT
OpenAIRE1.6K views
Research Data Management: An Introductory Webinar from OpenAIRE and EUDAT by Tony Ross-Hellauer
Research Data Management: An Introductory Webinar from OpenAIRE and EUDATResearch Data Management: An Introductory Webinar from OpenAIRE and EUDAT
Research Data Management: An Introductory Webinar from OpenAIRE and EUDAT

Recently uploaded

virtual reality.pptx by
virtual reality.pptxvirtual reality.pptx
virtual reality.pptxG036GaikwadSnehal
11 views15 slides
ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ... by
ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...
ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...Jasper Oosterveld
18 views49 slides
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive by
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLiveAutomating a World-Class Technology Conference; Behind the Scenes of CiscoLive
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLiveNetwork Automation Forum
31 views35 slides
PRODUCT LISTING.pptx by
PRODUCT LISTING.pptxPRODUCT LISTING.pptx
PRODUCT LISTING.pptxangelicacueva6
14 views1 slide
Ransomware is Knocking your Door_Final.pdf by
Ransomware is Knocking your Door_Final.pdfRansomware is Knocking your Door_Final.pdf
Ransomware is Knocking your Door_Final.pdfSecurity Bootcamp
55 views46 slides
Uni Systems for Power Platform.pptx by
Uni Systems for Power Platform.pptxUni Systems for Power Platform.pptx
Uni Systems for Power Platform.pptxUni Systems S.M.S.A.
56 views21 slides

Recently uploaded(20)

ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ... by Jasper Oosterveld
ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...
ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive by Network Automation Forum
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLiveAutomating a World-Class Technology Conference; Behind the Scenes of CiscoLive
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive
Five Things You SHOULD Know About Postman by Postman
Five Things You SHOULD Know About PostmanFive Things You SHOULD Know About Postman
Five Things You SHOULD Know About Postman
Postman33 views
Powerful Google developer tools for immediate impact! (2023-24) by wesley chun
Powerful Google developer tools for immediate impact! (2023-24)Powerful Google developer tools for immediate impact! (2023-24)
Powerful Google developer tools for immediate impact! (2023-24)
wesley chun10 views
6g - REPORT.pdf by Liveplex
6g - REPORT.pdf6g - REPORT.pdf
6g - REPORT.pdf
Liveplex10 views
STKI Israeli Market Study 2023 corrected forecast 2023_24 v3.pdf by Dr. Jimmy Schwarzkopf
STKI Israeli Market Study 2023   corrected forecast 2023_24 v3.pdfSTKI Israeli Market Study 2023   corrected forecast 2023_24 v3.pdf
STKI Israeli Market Study 2023 corrected forecast 2023_24 v3.pdf
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f... by TrustArc
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc10 views
STPI OctaNE CoE Brochure.pdf by madhurjyapb
STPI OctaNE CoE Brochure.pdfSTPI OctaNE CoE Brochure.pdf
STPI OctaNE CoE Brochure.pdf
madhurjyapb14 views
Data Integrity for Banking and Financial Services by Precisely
Data Integrity for Banking and Financial ServicesData Integrity for Banking and Financial Services
Data Integrity for Banking and Financial Services
Precisely21 views
PharoJS - Zürich Smalltalk Group Meetup November 2023 by Noury Bouraqadi
PharoJS - Zürich Smalltalk Group Meetup November 2023PharoJS - Zürich Smalltalk Group Meetup November 2023
PharoJS - Zürich Smalltalk Group Meetup November 2023
Noury Bouraqadi127 views
TouchLog: Finger Micro Gesture Recognition Using Photo-Reflective Sensors by sugiuralab
TouchLog: Finger Micro Gesture Recognition  Using Photo-Reflective SensorsTouchLog: Finger Micro Gesture Recognition  Using Photo-Reflective Sensors
TouchLog: Finger Micro Gesture Recognition Using Photo-Reflective Sensors
sugiuralab19 views

COnSeNT 2021 - ODRL Profile for Expressing Consent through Granular Access Control Policies in Solid

  • 1. This project that has received funding from the European Union’s Horizon 2020 research and innovation programme under grant agreement Nº813497 ODRL Profile for Expressing Consent through Granular Access Control Policies in Solid Beatriz Esteves, beatriz.gesteves@upm.es, OEG – UPM Harshvardhan J. Pandit, pandith@tcd.ie, ADAPT Centre –TCD Víctor Rodríguez-Doncel, vrodriguez@fi.upm.es, OEG – UPM
  • 2. Overview • Introduction to Solid • Motivation • Related Work • ODRL Profile for Solid’s ACL • Implementation & Architecture • Challenges • Conclusion 2 / 11
  • 3. Introduction to Solid https://solidproject.org Solid is a specification for decentralised personal data stores based on interoperable data formats and protocols. Ownership Interoperability Beatriz has full access to one of her web resources, located at https:// beatriz.databox.me/docs/file1 <#authorization1> a acl:Authorization; acl:agent <https://beatriz.databox.me/profile/card#me>; acl:accessTo <https://beatriz.databox.me/docs/file1>; acl:mode acl:Read, acl:Write, acl:Control. WebID Solid’s Access Control Authorizations 3 / 11
  • 4. Motivation GDPR’s Articles 13 and 14 Identity Purpose Personal data categories Processing categories Legal bases Recipients Consent provide information regarding Introspect use of personal data Store consent and authorisations Determine data sharing preferences How can Solid’s ACL be extended to specify and enforce an individual’s data sharing preferences? 4 / 11
  • 5. Related Work Specifying Personal Data and Processing Access Control using Linked Data 5 / 11
  • 6. ODRL Profile for Solid’s ACL https://w3id.org/oac/ Requisites R1. Support specifying user preferences as policies. R2. Incorporate vocabulary specifying or aligned to legal concepts. R3. Support specifying permissions and prohibitions at arbitrary granularity. R4. Support identifying and resolving conflicts based on scope. R5. Record (store) policies used to authorise access. R6. Support querying policies and authorisations for introspection of data use. :example-1 a odrl:Policy ; odrl:permission [ odrl:action oac:Read ; odrl:target oac:Contact ; odrl:assigner [ a oac:DataSubject ; cert:key "https://beatriz.webID/card#me" ] ; odrl:constraint [ odrl:leftOperand oac:Purpose ; odrl:operator odrl:isA ; odrl:rightOperand dpv:AcademicResearch ] ] . Extension of Solid's ACL mechanism using the ODRL specification to define "sticky policies" that express permissions and/or prohibitions associated with data stored in a Solid pod and uses DPV as a controlled vocabulary to invoke specific privacy and data protection terms. 6 / 11
  • 7. Implementation & Architecture Extension of the existing Solid Pod specification • Consent datastore – keep a record of the consent actions • Audit Log – store metadata related to logins, access requests, changes in policies and consent authorisations • Notification Mechanism – allow to update or revoke requests regarding consent • Metadata and Policies Editors – assist users to craft granular policies for the management of access to their Pod 7 / 11
  • 8. Challenges Efficiency and performance Complexity of ODRL policies • Deal with large collection of policies in the form of preferences, requests, and authorisations • The more data is transmitted in policies and requests, the more time and resource- consuming will be the authorization mechanism • Deal with conflicting policies, i.e., global prohibitions outweigh local permissions Storage and Management of Policies • Where to store requests and user policies • Discovery of policies that refer to a given resource • How to craft valid ODRL policies • Create a separate area of the Pod to store the policies and metadata declarations • Create a Policies Editor component that supports users in drafting the policies, without having the need for previous ODRL knowledge Limit ODRL features to ensure optimal performance 8 / 11
  • 9. Challenges Legal Implications of Requests Legal Interpretation of Request and Preferences Consent • Deal with other legal bases, i.e., compliance with a legal obligation or legitimate interests • Discuss whether access to resources in the pod should be automated • Challenge that is unlikely to be satisfactorily addressed • Map policies, requests, and preferences with their legal interpretation • Deal with different jurisdictions • To ensure that consent is informed and explicit, specific information items should be provided and recorded in the Pod • Allow users to update or revoke consent • Discuss whether the implicit consent from the established user preferences is enough to provide automated access to non-sensitive personal data • Allow users to choose which data types, and purposes, they are comfortable with enabling automation and which not • Have a queryable Consent datastore which can be easily updated 9 / 11
  • 10. Conclusion Solid’s shortcomings • Expression of more complex policies beyond a yes/no • Alignment with GDPR requisites Can be overcome by using Future Work • Implement reasoners that can efficiently perform the authorization decision. • Define the RDF SHACL shapes that determine which ODRL expressions can be evaluated. • Declare mappings to other languages that grant interoperability with compliance tools. • Grant seamless operation with non-ODRL Solid Pods. 10 / 11
  • 11. This project that has received funding from the European Union’s Horizon 2020 research and innovation programme under grant agreement Nº813497 ODRL Profile for Expressing Consent through Granular Access Control Policies in Solid Beatriz Esteves, beatriz.gesteves@upm.es, OEG – UPM Harshvardhan J. Pandit, pandith@tcd.ie, ADAPT Centre –TCD Víctor Rodríguez-Doncel, vrodriguez@fi.upm.es, OEG – UPM Q & A