An operational architecture for privacy-by-design in public service
applications
- URL: http://arxiv.org/abs/2006.04654v1
- Date: Mon, 8 Jun 2020 14:57:29 GMT
- Title: An operational architecture for privacy-by-design in public service
applications
- Authors: Prashant Agrawal, Anubhutie Singh, Malavika Raghavan, Subodh Sharma,
Subhashis Banerjee
- Abstract summary: We present an operational architecture for privacy-by-design based on independent regulatory oversight.
We briefly discuss the feasibility of implementing our architecture based on existing techniques.
- Score: 0.26249027950824505
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Governments around the world are trying to build large data registries for
effective delivery of a variety of public services. However, these efforts are
often undermined due to serious concerns over privacy risks associated with
collection and processing of personally identifiable information. While a rich
set of special-purpose privacy-preserving techniques exist in computer science,
they are unable to provide end-to-end protection in alignment with legal
principles in the absence of an overarching operational architecture to ensure
purpose limitation and protection against insider attacks. This either leads to
weak privacy protection in large designs, or adoption of overly defensive
strategies to protect privacy by compromising on utility.
In this paper, we present an operational architecture for privacy-by-design
based on independent regulatory oversight stipulated by most data protection
regimes, regulated access control, purpose limitation and data minimisation. We
briefly discuss the feasibility of implementing our architecture based on
existing techniques. We also present some sample case studies of
privacy-preserving design sketches of challenging public service applications.
Related papers
- Enhancing Feature-Specific Data Protection via Bayesian Coordinate Differential Privacy [55.357715095623554]
Local Differential Privacy (LDP) offers strong privacy guarantees without requiring users to trust external parties.
We propose a Bayesian framework, Bayesian Coordinate Differential Privacy (BCDP), that enables feature-specific privacy quantification.
arXiv Detail & Related papers (2024-10-24T03:39:55Z) - Collection, usage and privacy of mobility data in the enterprise and public administrations [55.2480439325792]
Security measures such as anonymization are needed to protect individuals' privacy.
Within our study, we conducted expert interviews to gain insights into practices in the field.
We survey privacy-enhancing methods in use, which generally do not comply with state-of-the-art standards of differential privacy.
arXiv Detail & Related papers (2024-07-04T08:29:27Z) - GoldCoin: Grounding Large Language Models in Privacy Laws via Contextual Integrity Theory [44.297102658873726]
Existing research studies privacy by exploring various privacy attacks, defenses, and evaluations within narrowly predefined patterns.
We introduce a novel framework, GoldCoin, designed to efficiently ground LLMs in privacy laws for judicial assessing privacy violations.
Our framework leverages the theory of contextual integrity as a bridge, creating numerous synthetic scenarios grounded in relevant privacy statutes.
arXiv Detail & Related papers (2024-06-17T02:27:32Z) - The Data Minimization Principle in Machine Learning [61.17813282782266]
Data minimization aims to reduce the amount of data collected, processed or retained.
It has been endorsed by various global data protection regulations.
However, its practical implementation remains a challenge due to the lack of a rigorous formulation.
arXiv Detail & Related papers (2024-05-29T19:40:27Z) - You Still See Me: How Data Protection Supports the Architecture of AI Surveillance [5.989015605760986]
We show how privacy-preserving techniques in the development of AI systems can support surveillance infrastructure under the guise of regulatory permissibility.
We propose technology and policy strategies to evaluate privacy-preserving techniques in light of the protections they actually confer.
arXiv Detail & Related papers (2024-02-09T18:39:29Z) - A Unified View of Differentially Private Deep Generative Modeling [60.72161965018005]
Data with privacy concerns comes with stringent regulations that frequently prohibited data access and data sharing.
Overcoming these obstacles is key for technological progress in many real-world application scenarios that involve privacy sensitive data.
Differentially private (DP) data publishing provides a compelling solution, where only a sanitized form of the data is publicly released.
arXiv Detail & Related papers (2023-09-27T14:38:16Z) - Advancing Differential Privacy: Where We Are Now and Future Directions for Real-World Deployment [100.1798289103163]
We present a detailed review of current practices and state-of-the-art methodologies in the field of differential privacy (DP)
Key points and high-level contents of the article were originated from the discussions from "Differential Privacy (DP): Challenges Towards the Next Frontier"
This article aims to provide a reference point for the algorithmic and design decisions within the realm of privacy, highlighting important challenges and potential research directions.
arXiv Detail & Related papers (2023-04-14T05:29:18Z) - An Example of Privacy and Data Protection Best Practices for Biometrics
Data Processing in Border Control: Lesson Learned from SMILE [0.9442139459221784]
Misuse of data, compromising the privacy of individuals and/or authorized processing of data may be irreversible.
This is partly due to the lack of methods and guidance for the integration of data protection and privacy by design in the system development process.
We present an example of privacy and data protection best practices to provide more guidance for data controllers and developers.
arXiv Detail & Related papers (2022-01-10T15:34:43Z) - Privacy in Open Search: A Review of Challenges and Solutions [0.6445605125467572]
Information retrieval (IR) is prone to privacy threats, such as attacks and unintended disclosures of documents and search history.
This work aims at highlighting and discussing open challenges for privacy in the recent literature of IR, focusing on tasks featuring user-generated text data.
arXiv Detail & Related papers (2021-10-20T18:38:48Z) - Differentially Private Multi-Agent Planning for Logistic-like Problems [70.3758644421664]
This paper proposes a novel strong privacy-preserving planning approach for logistic-like problems.
Two challenges are addressed: 1) simultaneously achieving strong privacy, completeness and efficiency, and 2) addressing communication constraints.
To the best of our knowledge, this paper is the first to apply differential privacy to the field of multi-agent planning.
arXiv Detail & Related papers (2020-08-16T03:43:09Z) - Online publication of court records: circumventing the
privacy-transparency trade-off [0.0]
We argue that current practices are insufficient for coping with massive access to legal data.
We propose a straw man multimodal architecture paving the way to a full-fledged privacy-preserving legal data publishing system.
arXiv Detail & Related papers (2020-07-03T13:58:01Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.