Mitigating Sovereign Data Exchange Challenges: A Mapping to Apply
Privacy- and Authenticity-Enhancing Technologies
- URL: http://arxiv.org/abs/2207.01513v1
- Date: Mon, 20 Jun 2022 08:16:42 GMT
- Title: Mitigating Sovereign Data Exchange Challenges: A Mapping to Apply
Privacy- and Authenticity-Enhancing Technologies
- Authors: Kaja Schmidt and Gonzalo Munilla Garrido and Alexander M\"uhle and
Christoph Meinel
- Abstract summary: Authenticity Enhancing Technologies (AETs) and Privacy-Enhancing Technologies (PETs) are considered to engage in Sovereign Data Exchange (SDE)
PETs and AETs are technically complex, which impedes their adoption.
This study empirically constructs a challenge-oriented technology mapping.
- Score: 67.34625604583208
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Harmful repercussions from sharing sensitive or personal data can hamper
institutions' willingness to engage in data exchange. Thus, institutions
consider Authenticity Enhancing Technologies (AETs) and Privacy-Enhancing
Technologies (PETs) to engage in Sovereign Data Exchange (SDE), i.e., sharing
data with third parties without compromising their own or their users' data
sovereignty. However, these technologies are often technically complex, which
impedes their adoption. To support practitioners select PETs and AETs for SDE
use cases and highlight SDE challenges researchers and practitioners should
address, this study empirically constructs a challenge-oriented technology
mapping. First, we compile challenges of SDE by conducting a systematic
literature review and expert interviews. Second, we map PETs and AETs to the
SDE challenges and identify which technologies can mitigate which challenges.
We validate the mapping through investigator triangulation. Although the most
critical challenge concerns data usage and access control, we find that the
majority of PETs and AETs focus on data processing issues.
Related papers
- Are Data Experts Buying into Differentially Private Synthetic Data? Gathering Community Perspectives [14.736115103446101]
In the United States, differential privacy (DP) is the dominant technical operationalization of privacy-preserving data analysis.
This study qualitatively examines one class of DP mechanisms: private data synthesizers.
arXiv Detail & Related papers (2024-12-17T15:50:14Z) - A Survey on Private Transformer Inference [17.38462391595219]
Transformer models have revolutionized AI, enabling applications like content generation and sentiment analysis.
However, their use in Machine Learning as a Service (ML) raises significant privacy concerns.
Private Transformer Inference (PTI) addresses these issues using cryptographic techniques.
arXiv Detail & Related papers (2024-12-11T07:05:24Z) - Second FRCSyn-onGoing: Winning Solutions and Post-Challenge Analysis to Improve Face Recognition with Synthetic Data [104.30479583607918]
2nd FRCSyn-onGoing challenge is based on the 2nd Face Recognition Challenge in the Era of Synthetic Data (FRCSyn), originally launched at CVPR 2024.
We focus on exploring the use of synthetic data both individually and in combination with real data to solve current challenges in face recognition.
arXiv Detail & Related papers (2024-12-02T11:12:01Z) - Speech Emotion Recognition under Resource Constraints with Data Distillation [64.36799373890916]
Speech emotion recognition (SER) plays a crucial role in human-computer interaction.
The emergence of edge devices in the Internet of Things presents challenges in constructing intricate deep learning models.
We propose a data distillation framework to facilitate efficient development of SER models in IoT applications.
arXiv Detail & Related papers (2024-06-21T13:10:46Z) - SoK: Demystifying Privacy Enhancing Technologies Through the Lens of
Software Developers [4.171555557592296]
In the absence of data protection measures, software applications lead to privacy breaches.
This review analyses 39 empirical studies on developers' privacy practices.
It reports the usage of six PETs in software application scenarios.
It discusses challenges developers face when integrating PETs into software.
arXiv Detail & Related papers (2023-12-30T12:24:40Z) - Balancing Privacy and Progress in Artificial Intelligence: Anonymization
in Histopathology for Biomedical Research and Education [1.8078387709049526]
Transferring medical data "as open as possible" poses a risk to patient privacy.
Existing regulations push towards keeping medical data "as closed as necessary" to avoid re-identification risks.
This paper explores the legal regulations and terminologies for medical data-sharing.
arXiv Detail & Related papers (2023-07-18T16:53:07Z) - On the Challenges of Deploying Privacy-Preserving Synthetic Data in the
Enterprise [0.0]
We study the challenges associated with deploying synthetic data, a subfield of Generative AI.
Our focus centers on enterprise deployment, with an emphasis on privacy concerns caused by the vast amount of personal and highly sensitive data.
arXiv Detail & Related papers (2023-07-09T15:42:22Z) - AI for IT Operations (AIOps) on Cloud Platforms: Reviews, Opportunities
and Challenges [60.56413461109281]
Artificial Intelligence for IT operations (AIOps) aims to combine the power of AI with the big data generated by IT Operations processes.
We discuss in depth the key types of data emitted by IT Operations activities, the scale and challenges in analyzing them, and where they can be helpful.
We categorize the key AIOps tasks as - incident detection, failure prediction, root cause analysis and automated actions.
arXiv Detail & Related papers (2023-04-10T15:38:12Z) - Advanced Data Augmentation Approaches: A Comprehensive Survey and Future
directions [57.30984060215482]
We provide a background of data augmentation, a novel and comprehensive taxonomy of reviewed data augmentation techniques, and the strengths and weaknesses (wherever possible) of each technique.
We also provide comprehensive results of the data augmentation effect on three popular computer vision tasks, such as image classification, object detection and semantic segmentation.
arXiv Detail & Related papers (2023-01-07T11:37:32Z) - Deep Technology Tracing for High-tech Companies [67.86308971806322]
We develop a novel data-driven solution, i.e., Deep Technology Forecasting (DTF) framework, to automatically find the most possible technology directions customized to each high-tech company.
DTF consists of three components: Potential Competitor Recognition (PCR), Collaborative Technology Recognition (CTR), and Deep Technology Tracing (DTT) neural network.
arXiv Detail & Related papers (2020-01-02T07:44:12Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.