Here we present a Toolset for Usable Security especially beneficial for the secondary use of personal information.
At Great Hanshin Earthquake occurred in Kansai area, Japan in 1995, it was shown that the sharing of personal information was very important in order to maintain health and property of people who were affected by the disaster.
Those were biometric authentication information, medical records, passbook and so on.
Similar problems have occurred at the Great East Japan Earthquake in 2011 and the 2016 Kumamoto Earthquake.
Conventionally and presumably in future, when the secondary use of personal information should be carried out, this data controller usually plays an important role.
For example, it is a government. It approves an access to that secondary use of personal information with a limited condition.
Usually from this point of time, the owner of the personal information loses control over his or her information. It may be against the regulation or compliance, so the data controller is usually reluctant to give permission.
One of the basic ideas for solving the problem is to provide a sufficient judgment material information to the data controller in a timely manner by which the data controller can properly give a permission for the secondary use of the personal information.
Ideally in order for the perfect judgement for the data controller, it is desirable to give all the states of artifacts, natural products, all the memory of the computer, the human condition and so on. In general, it is not possible.
The first idea is that some part of personal information is anonymized and sometimes subjected to a treatment with artificial intelligence, then sent to the data controller. Some privacy enhancing techniques are used in the process.
Thus, it will enable a fast and rational judgement by the data controller.
The second basic idea is to provide a means that the user does not lose control on his own data even after the secondary use of personal information has been carried out.
For this, it is important to let the user know the data provenance.
We are developing a mechanism using block chain where people can obtain the provenance of anonymous data without central authority.
Furthermore, by referring to the block chain as open data, we get an effect of being able to obtain the transparency and compliance through the process.
Currently, we are developing a set of tools necessary in order to realize these ideas. We aim to lead it to an implementation in a real society through a proof of concept in future.
That’s it.
Thank you very much.
----
Presented at IWSEC 2016 in Tokyo, Japan http://www.iwsec.org/2016/
----
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
A Toolset for Usable Security with ICT Service Networks
1. A Toolset for Usable Security
with ICT Service Networks
Dr. Sven WOHLGEMUTH Dr. Kazuo TAKARAGI
Resilience and Secondary Use of Personal Data
Safety Problem for Security as a Personalized Service
Continuous Multilateral Information Security Management
Let‘s work together on creating a sustainable smart society!
ICT Support for Resilience
• Resilience: Personal predictive risk management
• Internet of Things: Observe and control physical environments
• Cloud Computing: Scalable secondary use of personal data
• Artificial Intelligence: Knowledge creation for decision-support
• Open Data: Ground Truth for IT Governance and innovation
The ultimate aim is sustainability
But: What about reliable information processing for resilience?
Contact: Dr. Kazuo TAKARAGI, Information Technology Research Institute (ITRI),
National Institute of Advanced Industrial Science and Technology (AIST), Japan
Email: kazuo.takaragi@aist.go.jp WWW: http://www.itri.aist.go.jp
• Resilience: By sharing authentic information
on security vulnerabilities and incidents
• Regulations: Compliance by risk management
with personal accountability
• Safety: Users can’t access data without
authorization by the ’data owner’
• State-of-the-art: Access control with a type-
safe security policy
Turing Machine: Safety with access control is in general undecidable
User-Centric Information Flows
Smart Society
Multilateral Security
Data Controller
(e.g. Government)
Open Information Accountability
(As Part of Security/Privacy Controls)
Open Data
sec d, d*
sec d, d*
sec d, d *
…
Privacy
by Design
Plan-Do-Check-Act
(Risk and Life Cycle Management)
Secure Delegation
of Rights
Data ProvenanceIT Risk Controls
Policy Toolbox
Active strategies Passive strategies
Risk
avoidance
Risk
reduction
Risk
provision
Risk
transfer
IT Risk Analytics
HelperRefugee
Physical
Cyber
Cloud Computing with PKI and Marketplace (e.g. SINET)
Ground Truth 5
Courtesy of Tsukuba Univ.
Kostadinka Bizheva, et al.,
J. of Biomedical Optics,
July/ 2004 Vol.9 No.4
Petra Wilder-Smith, et al.
J. of Biomedical Optics Sep/ 2005 Vol.10 No.5
BrainEye
Tooth
Oral
Skin
Z.P.Chen, et al.,
Opt. Express, Aug/ 2007
Vol. 15 No. 16
Esophagus
Alexander Popp, et al.,
J. of Biomedical Optics, Jan/ 2004
Vol.11 No.1
Lung
Guillermo J. Tearney, et al.
J. of Biomedical Optics
Mar/ 2006 Vol.11 No.2
Cardiovascular
Pancreas
Pier Alberto, et al.
J Pancreas (Online)
2007 Vol.8 No.2 Cervix
Ilya V. Turchin, et al.,
J. of Biomedical Optics,
Nov/ 2005 Vol.10 No.6
Blood flow
Bradley A. Bower., J. of Biomedical Optics,
Jul/ 2007 Vol.12 No.4
Stomach
Yonghong He, et al.
J. of Biomedical Optics
Jan/ 2004 Vol.9 No.1
Trachea
Matthew Brenner, et al.,
J. of Biomedical Optics,
Sep/ 2007 Vol.12 No.5
Cochlea
Fangyi Chen, et al.,
J. of Biomedical Optics,
Mar/ 2007 Vol.12 No.2
Bladder
Ying T. Pan, et al.
J. of Biomedical Optics
Sep/ 2007 Vol.12 No.5
Colon
Alexandre R. Tumlinson, et al.,
J. of Biomedical Optics,
Nov/ 2006 Vol.11 No.6
Kidney
Yu Chen, et al.
J. of Biomedical Optics
Sep/ 2007 Vol.12 No.3
Bone
santec confidential SS-OCT System Inner Vision 16Application to Biometrics:
Non-invasive measurement of iris, retina, fingerprint, vascular image under skin.
OCT(Optical Coherence Tomography)
図:santec株式会社提供資料より
o1 = d o2 = d* …
s1 own, r, w ? own, r, w ?
s2 r, w own, r, w
s3 ? r, w ? r
…
......
d
Data provider
/consumer
Data consumer
Data consumer
/provider
Data provider
d, d*
?
General
security
system
Enforcement
Providing
• Privacy
Enhanced
• Transparency
• Compliance
Block chain
• Make correction to
his/her own data
• Grant and revoke
consent on the use
of the data
• Be informed on
data breach
Problem for resilience: Loss of control on personal information on exception handling beyond expectations