Data Cooperatives for Identity Attestations
- URL: http://arxiv.org/abs/2312.14158v1
- Date: Sun, 29 Oct 2023 15:54:02 GMT
- Title: Data Cooperatives for Identity Attestations
- Authors: Thomas Hardjono, Alex Pentland,
- Abstract summary: We propose the use of a legal entity to countersign the blinded attestation.
There are several use-cases for this feature, including the Funds Travel Rule in transactions in digital assets, and the protection of privacy in decentralized social networks.
- Score: 3.924955534956978
- License: http://creativecommons.org/licenses/by-nc-nd/4.0/
- Abstract: Data cooperatives with fiduciary obligations to members provide a useful source of truthful information regarding a given member whose personal data is managed by the cooperative. Since one of the main propositions the cooperative model is to protect the data privacy of members, we explore the notion of blinded attestations in which the identity of the subject is removed from the attestations issued by the cooperative regarding one of its members. This is performed at the request of the individual member. We propose the use of a legal entity to countersign the blinded attestation, one that has an attorney-client relationship with the cooperative, and which can henceforth become the legal point of contact for inquiries regarding the individual related to the attribute being attested. There are several use-cases for this feature, including the Funds Travel Rule in transactions in digital assets, and the protection of privacy in decentralized social networks.
Related papers
- Self-Sovereign Identity for Consented and Content-Based Access to Medical Records using Blockchain [1.118478900782898]
We propose a blockchain-based solution enabling secure exchange of EHRs between different parties powered by a self-sovereign identity wallet and decentralized identifiers.
We grant users full control over their medical data, and enable them to securely share it in total confidentiality over secure communication channels.
arXiv Detail & Related papers (2024-07-31T12:27:31Z) - Secure Traversable Event logging for Responsible Identification of Vertically Partitioned Health Data [1.3927943269211591]
This paper intends to secure the process of associating identifying information with sensitive medical information.
We also enforce the responsibility of the custodians by maintaining an immutable ledger documenting the events of such information identification.
arXiv Detail & Related papers (2023-11-28T07:32:26Z) - Combining Decentralized IDentifiers with Proof of Membership to Enable Trust in IoT Networks [44.99833362998488]
The paper proposes and discusses an alternative (mutual) authentication process for IoT nodes under the same administration domain.
The main idea is to combine the Decentralized IDentifier (DID)-based verification of private key ownership with the verification of a proof that the DID belongs to an evolving trusted set.
arXiv Detail & Related papers (2023-10-12T09:33:50Z) - Extensible Consent Management Architectures for Data Trusts [0.0]
This paper proposes a framework for consent management in Data Trusts.
Data can flow across a network through "role tunnels" established based on corresponding legal capacities.
arXiv Detail & Related papers (2023-09-28T18:28:50Z) - Privacy-Preserving Joint Edge Association and Power Optimization for the
Internet of Vehicles via Federated Multi-Agent Reinforcement Learning [74.53077322713548]
We investigate the privacy-preserving joint edge association and power allocation problem.
The proposed solution strikes a compelling trade-off, while preserving a higher privacy level than the state-of-the-art solutions.
arXiv Detail & Related papers (2023-01-26T10:09:23Z) - How Do Input Attributes Impact the Privacy Loss in Differential Privacy? [55.492422758737575]
We study the connection between the per-subject norm in DP neural networks and individual privacy loss.
We introduce a novel metric termed the Privacy Loss-Input Susceptibility (PLIS) which allows one to apportion the subject's privacy loss to their input attributes.
arXiv Detail & Related papers (2022-11-18T11:39:03Z) - PAN-DOMAIN: Privacy-preserving Sharing and Auditing of Infection
Identifier Matching [0.13124513975412253]
The spread of COVID-19 has highlighted the need for a robust contact tracing infrastructure.
The existing approaches comprise severe flaws in terms of privacy and security.
This paper outlines the PAN-DOMAIN infrastructure that allows for citizen identifiers to be matched amongst the trusted entities.
arXiv Detail & Related papers (2021-12-06T08:26:08Z) - Partial sensitivity analysis in differential privacy [58.730520380312676]
We investigate the impact of each input feature on the individual's privacy loss.
We experimentally evaluate our approach on queries over private databases.
We also explore our findings in the context of neural network training on synthetic data.
arXiv Detail & Related papers (2021-09-22T08:29:16Z) - User-Centric Health Data Using Self-sovereign Identities [69.50862982117127]
This article presents the potential use of the issuers Self-Sovereign Identities (SSI) and Distributed Ledger Technologies (DLT) to improve the privacy and control of health data.
The paper lists the prominent use cases of decentralized identities in the health area, and discusses an effective blockchain-based architecture.
arXiv Detail & Related papers (2021-07-26T17:09:52Z) - Privacy and Trust Redefined in Federated Machine Learning [5.4475482673944455]
We present a privacy-preserving decentralised workflow that facilitates trusted federated learning among participants.
Only entities in possession of Verifiable Credentials issued from the appropriate authorities are able to establish secure, authenticated communication channels.
arXiv Detail & Related papers (2021-03-29T16:47:01Z) - Second layer data governance for permissioned blockchains: the privacy
management challenge [58.720142291102135]
In pandemic situations, such as the COVID-19 and Ebola outbreak, the action related to sharing health data is crucial to avoid the massive infection and decrease the number of deaths.
In this sense, permissioned blockchain technology emerges to empower users to get their rights providing data ownership, transparency, and security through an immutable, unified, and distributed database ruled by smart contracts.
arXiv Detail & Related papers (2020-10-22T13:19:38Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.