An operational architecture for privacy-by-design in public service
applications
- URL: http://arxiv.org/abs/2006.04654v1
- Date: Mon, 8 Jun 2020 14:57:29 GMT
- Title: An operational architecture for privacy-by-design in public service
applications
- Authors: Prashant Agrawal, Anubhutie Singh, Malavika Raghavan, Subodh Sharma,
Subhashis Banerjee
- Abstract summary: We present an operational architecture for privacy-by-design based on independent regulatory oversight.
We briefly discuss the feasibility of implementing our architecture based on existing techniques.
- Score: 0.26249027950824505
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Governments around the world are trying to build large data registries for
effective delivery of a variety of public services. However, these efforts are
often undermined due to serious concerns over privacy risks associated with
collection and processing of personally identifiable information. While a rich
set of special-purpose privacy-preserving techniques exist in computer science,
they are unable to provide end-to-end protection in alignment with legal
principles in the absence of an overarching operational architecture to ensure
purpose limitation and protection against insider attacks. This either leads to
weak privacy protection in large designs, or adoption of overly defensive
strategies to protect privacy by compromising on utility.
In this paper, we present an operational architecture for privacy-by-design
based on independent regulatory oversight stipulated by most data protection
regimes, regulated access control, purpose limitation and data minimisation. We
briefly discuss the feasibility of implementing our architecture based on
existing techniques. We also present some sample case studies of
privacy-preserving design sketches of challenging public service applications.
Related papers
- Privacy in Fine-tuning Large Language Models: Attacks, Defenses, and Future Directions [11.338466798715906]
Fine-tuning Large Language Models (LLMs) can achieve state-of-the-art performance across various domains.
This paper provides a comprehensive survey of privacy challenges associated with fine-tuning LLMs.
We highlight vulnerabilities to various privacy attacks, including membership inference, data extraction, and backdoor attacks.
arXiv Detail & Related papers (2024-12-21T06:41:29Z) - Activity Recognition on Avatar-Anonymized Datasets with Masked Differential Privacy [64.32494202656801]
Privacy-preserving computer vision is an important emerging problem in machine learning and artificial intelligence.
We present anonymization pipeline that replaces sensitive human subjects in video datasets with synthetic avatars within context.
We also proposeMaskDP to protect non-anonymized but privacy sensitive background information.
arXiv Detail & Related papers (2024-10-22T15:22:53Z) - Collection, usage and privacy of mobility data in the enterprise and public administrations [55.2480439325792]
Security measures such as anonymization are needed to protect individuals' privacy.
Within our study, we conducted expert interviews to gain insights into practices in the field.
We survey privacy-enhancing methods in use, which generally do not comply with state-of-the-art standards of differential privacy.
arXiv Detail & Related papers (2024-07-04T08:29:27Z) - The Data Minimization Principle in Machine Learning [61.17813282782266]
Data minimization aims to reduce the amount of data collected, processed or retained.
It has been endorsed by various global data protection regulations.
However, its practical implementation remains a challenge due to the lack of a rigorous formulation.
arXiv Detail & Related papers (2024-05-29T19:40:27Z) - You Still See Me: How Data Protection Supports the Architecture of AI Surveillance [5.989015605760986]
We show how privacy-preserving techniques in the development of AI systems can support surveillance infrastructure under the guise of regulatory permissibility.
We propose technology and policy strategies to evaluate privacy-preserving techniques in light of the protections they actually confer.
arXiv Detail & Related papers (2024-02-09T18:39:29Z) - A Unified View of Differentially Private Deep Generative Modeling [60.72161965018005]
Data with privacy concerns comes with stringent regulations that frequently prohibited data access and data sharing.
Overcoming these obstacles is key for technological progress in many real-world application scenarios that involve privacy sensitive data.
Differentially private (DP) data publishing provides a compelling solution, where only a sanitized form of the data is publicly released.
arXiv Detail & Related papers (2023-09-27T14:38:16Z) - Advancing Differential Privacy: Where We Are Now and Future Directions for Real-World Deployment [100.1798289103163]
We present a detailed review of current practices and state-of-the-art methodologies in the field of differential privacy (DP)
Key points and high-level contents of the article were originated from the discussions from "Differential Privacy (DP): Challenges Towards the Next Frontier"
This article aims to provide a reference point for the algorithmic and design decisions within the realm of privacy, highlighting important challenges and potential research directions.
arXiv Detail & Related papers (2023-04-14T05:29:18Z) - An Example of Privacy and Data Protection Best Practices for Biometrics
Data Processing in Border Control: Lesson Learned from SMILE [0.9442139459221784]
Misuse of data, compromising the privacy of individuals and/or authorized processing of data may be irreversible.
This is partly due to the lack of methods and guidance for the integration of data protection and privacy by design in the system development process.
We present an example of privacy and data protection best practices to provide more guidance for data controllers and developers.
arXiv Detail & Related papers (2022-01-10T15:34:43Z) - Privacy in Open Search: A Review of Challenges and Solutions [0.6445605125467572]
Information retrieval (IR) is prone to privacy threats, such as attacks and unintended disclosures of documents and search history.
This work aims at highlighting and discussing open challenges for privacy in the recent literature of IR, focusing on tasks featuring user-generated text data.
arXiv Detail & Related papers (2021-10-20T18:38:48Z) - Differentially Private Multi-Agent Planning for Logistic-like Problems [70.3758644421664]
This paper proposes a novel strong privacy-preserving planning approach for logistic-like problems.
Two challenges are addressed: 1) simultaneously achieving strong privacy, completeness and efficiency, and 2) addressing communication constraints.
To the best of our knowledge, this paper is the first to apply differential privacy to the field of multi-agent planning.
arXiv Detail & Related papers (2020-08-16T03:43:09Z) - Online publication of court records: circumventing the
privacy-transparency trade-off [0.0]
We argue that current practices are insufficient for coping with massive access to legal data.
We propose a straw man multimodal architecture paving the way to a full-fledged privacy-preserving legal data publishing system.
arXiv Detail & Related papers (2020-07-03T13:58:01Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.