SlideShare ist ein Scribd-Unternehmen logo
1 von 31
Downloaden Sie, um offline zu lesen
Privacy	with	Secondary	Use	
of	Personal	Information
MKWI	2016
Sicherheit,	Compliance	und	Verfügbarkeit von	Geschäftsprozessen
March	9,	2016,	Ilmenau,	Germany
Dr.	Sven	Wohlgemuth (Visiting	Researcher	Goethe	Universität Frankfurt,	Germany)
Dr.	Kazuo	Takaragi (National	Institute	of	Advanced	Industrial	Science	and	Technology,	Japan)
Prof.	Dr.	Isao	Echizen (National	Institute	of	Informatics,	Japan)
Helper
The	Great	East	Japan	Earthquake
03.08.16 Privacy	with Secondary Use of Personal	Information 2
Urushidani and	Aoki	2011,	JAISA	2015
Refugee
National	academic	ICT	infrastructure	(SINET)	was	available
Physical
Cyber
SINET	4:	Cloud-type	services	for	>	700	organizations
Telemedicine
Insufficient	information	in	real-time	for	response	and	recovery
Agenda
I. Resilience	and	Safety
• Lessons	learned	
• Safety:	A	Zero-Knowledge	Proof?
II. Towards	Provable	Safety
• Language-Based	Information	Flow	Control
• Language	for	ICT	Resilience
III. Proof	System	for	ICT	Resilience
• Zero-Knowledge	Proof	with	Open	Data
• Cryptographic	Building	Blocks
IV. Looking	for	Partners!
03.08.16 Privacy	with Secondary Use of Personal	Information 3
I.	Resilience	and	Safety
03.08.16 Privacy	with Secondary Use of Personal	Information 4
Urushidani et	al.	2015,	JAISA	2015
Resilience	by	predictive	IT	risk	management	with	personal	data
HelperRefugee
Physical
Cyber
SINET	5:	Cloud	Computing	with	PKI	and	Marketplace
Telemedicine
Ground	Truth 5
Courtesy of Tsukuba Univ.
Kostadinka Bizheva, et al.,
J. of Biomedical Optics,
July/ 2004 Vol.9 No.4
Petra Wilder-Smith, et al.
J. of Biomedical Optics Sep/ 2005 Vol.10 No.5
BrainEye
Tooth
Oral
Skin
Z.P.Chen, et al.,
Opt. Express, Aug/ 2007
Vol. 15 No. 16
Esophagus
Alexander Popp, et al.,
J. of Biomedical Optics, Jan/ 2004
Vol.11 No.1
Lung
Guillermo J. Tearney, et al.
J. of Biomedical Optics
Mar/ 2006 Vol.11 No.2
Cardiovascular
Pancreas
Pier Alberto, et al.
J Pancreas (Online)
2007 Vol.8 No.2 Cervix
Ilya V. Turchin, et al.,
J. of Biomedical Optics,
Nov/ 2005 Vol.10 No.6
Blood flow
Bradley A. Bower., J. of Biomedical Optics,
Jul/ 2007 Vol.12 No.4
Stomach
Yonghong He, et al.
J. of Biomedical Optics
Jan/ 2004 Vol.9 No.1
Trachea
Matthew Brenner, et al.,
J. of Biomedical Optics,
Sep/ 2007 Vol.12 No.5
Cochlea
Fangyi Chen, et al.,
J. of Biomedical Optics,
Mar/ 2007 Vol.12 No.2
Bladder
Ying T. Pan, et al.
J. of Biomedical Optics
Sep/ 2007 Vol.12 No.5
Colon
Alexandre R. Tumlinson, et al.,
J. of Biomedical Optics,
Nov/ 2006 Vol.11 No.6
Kidney
Yu Chen, et al.
J. of Biomedical Optics
Sep/ 2007 Vol.12 No.3
Bone
santec confidential SS-OCT System Inner Vision 16Application to Biometrics:

Non-invasive measurement of iris, retina, fingerprint, vascular image under skin.
OCT(Optical Coherence Tomography)
図:santec株式会社提供資料より
Requirements	on	Safety
03.08.16 Privacy	with	Secondary	Use	of	Personal	Information 5
Compliance
• End-to-end	security
• Declassification
• Accountability	and	penalty
• Adequate	risk	management	with	authentic	reporting
Personal	Risk	Management
• Transaction-specific	safety
• Just-in-time	scalable	knowledge	creation	from	data
• Optimizing	user’s	risk	with	data	minimization
User-centric	safety	
(Completeness)
Integrity	of	computation	
(Soundness)
User-centric	safe	
information	flow
JAISA	2015
HIPAA,	(J-)SOX,	KonTraG,	EU	GDPD,	Japan	Personal	Information	Protection	Law
Safety:	A	Zero-Knowledge	Proof?
03.08.16 Privacy	with	Secondary	Use	of	Personal	Information 6
......
• Multilateral	security	⇒ User-centric	safe	information	flow	
d
d,	d*
Data	provider
/consumer
Data	consumer
Data	consumer
/provider
Data	provider
Secondary	usePrimary	use
• Vulnerability	in	real-time	by	inevitable,	hidden	dependencies
Safety:	A	Zero-Knowledge	Proof?
03.08.16 Privacy	with	Secondary	Use	of	Personal	Information 7
......
• Multilateral	security	⇒ User-centric	safe	information	flow	
d
Secondary	usePrimary	use
• Vulnerability	in	real-time	by	inevitable,	hidden	dependencies
Safety	by	obscurity	– No	reliable	statement	on	information
d,	d*
Data	provider
Data	consumer
/provider
Data	consumer Data	provider
Safety:	Decidability
03.08.16 Privacy	with	Secondary	Use	of	Personal	Information 8
State-of-the-art:	ISO	270xx,	IETF	AAA	(access	control)
......
d
Data	provider
/consumer
Data	consumer
Data	consumer
/provider
Data	provider
d,	d*
?
o1 =	d o2 =	d* …
s1 own, r,	w ?	own,	r,	w	?
s2 r,	w own,	r,	w
s3 ?	r,	w	? r
…
General	
security	
system
Decidability	on	safety	in	general	⇒ Halting	problem	of	Turing	Machine
Probability	of	a	correct	statement	on	safety	in	the	future	=	50%
Harrison	et	al.	1976Hamlen et	al.	2006
Enforcement
Threat	to	Completeness
03.08.16 Privacy	with	Secondary	Use	of	Personal	Information 9
• Information	flow	from	different	sources	in	real-time	
• Aggregation	of	anonymized	personal	data
Loss	of	control	on	confidentiality	(of	honest	prover)
Bob David
Explicit/friendship
Implicitly assumed friendship
Sweeney	2002
Jernigan	and	Mistree,	2007
Threat	to	Soundness
03.08.16 Privacy	with	Secondary	Use	of	Personal	Information 10
Loss	of	control	on	classification	(of	honest	verifier)
• Knowledge	creation	from	personal	data	by	secondary	use
• “Faulty”	data	increases	error	probability	of	machine	learning
Biggio et	al	2012;	Huang	et	al	2011
Supervised machine learning
(e.g.	SVM)
0 2 4 6 8
0
0.05
0.1
0.15
0.2
0.25
0.3
0.35
0.4
% of attack points in training data
classification error (7 vs 1)
validation error
testing error
0 2 4 6 8
0
0.05
0.1
0.15
0.2
0.25
0.3
0.35
0.4
% of attack points in training data
classification error (9 vs 8)
validation error
testing error
0.25
0.3
0.35
0.4
classification error (4 vs 0)
validation error
testing error
structure of the optimal solution.
Another direction for research is the simultaneous opti-
mization of multi-point attacks, which we successfully
approached with sequential single-point attacks. The
first question is how to optimally perturb a subset of
the training data; that is, instead of individually opti-
mizing each attack point, one could derive simultane-
ous steps for every attack point to better optimize their
overall e↵ect. The second question is how to choose
the best subset of points to use as a starting point
for the attack. Generally, the latter is a subset selec-
tion problem but heuristics may allow for improved ap-
proximations. Regardless, we demonstrate that even
non-optimal multi-point attack strategies significantly
degrade the SVM’s performance.
An important practical limitation of the proposed
method is the assumption that the attacker controls
the labels of the injected points. Such assumptions
may not hold when the labels are only assigned by
trusted sources such as humans. For instance, a spam
filter uses its users’ labeling of messages as its ground
truth. Thus, although an attacker can send arbitrary
messages, he cannot guarantee that they will have the
labels necessary for his attack. This imposes an ad-
ditional requirement that the attack data must satisfy
certain side constraints to fool the labeling oracle. Fur-
ther work is needed to understand these potential side
constraints and to incorporate them into attacks.
The final extension would be to incorporate the real-
world inverse feature-mapping problem; that is, the
problem of finding real-world attack data that can
Unsupervised machine learning
(e.g.	PCA)
0.00.20.40.60.81.0
Single Poisoning Period: Evading PCA
Mean chaff volume
Evasionsuccess(FNR)
0% 10% 20% 30% 40% 50%
Uninformed
Locally−informed
Globally−informed
10
0
0.00.20.40.60.81.0
Bo
Evasionsuccess(averagetestFNR)
Figure 3: Effect of poisoning attacks on the PCA-based detector [36
relative chaff volume under Single-Training Period poisoning attacks
(dotted black line) locally-informed (dashed blue line) and globally-in
success of PCA under Boiling Frog poisoning attacks in terms of the
of locally-informed poisoning for four different poisoning schedules (
size of the poisoning by factors 1.01, 1.02, 1.05, and 1.15 respectively).
II.	Towards	Provable	Safety
03.08.16 Privacy	with Secondary Use of Personal	Information 11
Status	Quo:	Language-based	information	flow	control
Rigorous
Natural
Language	
Policy
High-Level	
Policy
Language
Intermediate-Level	
Security	Policy
Flow	Graph
Low-Level	
Enforcement
In	Practice
Take-grant,	type-safety,	
lattice-based	access	control,	
obligations
Identity,	cryptography,	
safe	public	directory,	monitor,	
proof-carrying	code
Decentralized	trust	
management
HIPAA,	(J-)SOX,	
KonTraG,	95/46/EC,	JP	
PII	Protection	Law,	…
Enforcement	classes,	
Ponder,	ExPDT
Computational	complexity,	
PKI,	virtualization,	testing
ISO/IEC	270xx,	BSI	IT-
Baseline	Protection,	IETF	
AAA,	NIST	SCAP
Social/knowledge	graph,	
sticky	policies
secure	delegation	of	rights
ZKP-carrying	information
cf.	Sandhu 1993,	Myers	and Liskov,	1997;	Schneider,	Morrisett and Harper,	2001;	Sabelfeld and Myers,	2003
Access	control doesn‘t scale for resilience
Error	propagation
Joined by Ground Truth
Role	change	of	secondary	use
Ext.:	Reliable	”Big	Brother”
Int.:	Error	propagation
Role	change	of	secondary	use
(DP,	DC,	data,	DS,	time,	…)
Data	minimization
Special	Cases	for	Safety
03.08.16 Privacy	with Secondary Use of Personal	Information 12
• Strict	order
Natural
Language	
Policy
High-Level	
Policy
Language
Intermediate-Level	
Security	Policy
Flow	Graph
Low-Level	
Enforcement
• Symmetric	access	tree
• Safety	if	trees	are	separate • Availability	of	data	
by	declassification
Lattice-based	Access	Control
Sandhu	1993
Take-grant
Lipton	and	Snyder	1977
S1:	u
S2:	u S3:	v
O:	oS3:	w
• Acyclic	graph
• x	<=	3	parameter
• No	revocation
Type-safety
Sandhu	1992
S1:	u
S2:	u S3:	v
O:	oS3:	w
Example:	Chinese-Wall
03.08.16 Privacy	with Secondary Use of Personal	Information 13
Conflict
classes
Personal
datasets
Syshigh
Ground	Truth
Registration	
office
Medical	
treatment
Required	information	
for	enforcement	
(central	by	Syshigh)
Example:	Chinese-Wall
03.08.16 Privacy	with Secondary Use of Personal	Information 14
Conflict
classes
Personal
datasets
Syshigh
Ground	Truth
Registration	
office
Medical	
treatment
Required	information	
for	enforcement	
(central	by	Syshigh)
Example:	Chinese-Wall
03.08.16 Privacy	with Secondary Use of Personal	Information 15
Conflict
classes
Personal
datasets
Syshigh
Ground	Truth
Registration	
office
Medical	
treatment
Bob David
Explicit/friendship
Implicitly assumed friendship
Required	information	
for	enforcement	
(central	by	Syshigh)
Example:	Chinese-Wall
03.08.16 Privacy	with Secondary Use of Personal	Information 16
Conflict
classes
Personal
datasets
Syshigh
Ground	Truth
Registration	
office
Medical	
treatment
Bob David
Explicit/friendship
Implicitly assumed friendship
Required	information	
for	enforcement	
(central	by	Syshigh)
Natural
Language	
Policy
High-Level	
Policy
Language
Intermediate-Level	
Security	Policy
Flow	Graph
Low-Level	
EnforcementLanguage	for	ICT	Resilience
03.08.16 Privacy	with Secondary Use of Personal	Information 17
Safety	for	secondary	use:	Soundness	(safety)	∧ Completeness	(safety	+	liveness)
d,	d*d
Prover/
Verifier
Verifier
Verifier/
Prover
Prover
Access	control
Provisions
Provisions +	observable	obligations
Usage	control
Enforcement	⇒ Open	Data	of	personal	security	information	(Ground	Truth)
Open	Data
on	obligations
adapted	from	Park	and		Sandhu	2004;	Pretschner,	Hilty,	and	Basin	2006
III.	Proof	System	for	ICT	Resilience
03.08.16 Privacy	with Secondary Use of Personal	Information 18
In	practice:	Inevitable	vulnerability	by	dependencies
Safe	information	accountability	⇒ Zero-Knowledge	Proof	on	origin	of	vulnerability
Natural
Language	
Policy
High-Level	
Policy
Language
Intermediate-Level	
Security	Policy
Flow	Graph
Low-Level	
Enforcement
d,	d*d
Prover/
Verifier
Verifier
Verifier/
Prover
Prover
Scheduler
(Open	Data)
III.	Proof	System	for	ICT	Resilience
03.08.16 Privacy	with Secondary Use of Personal	Information 19
In	practice:	Inevitable	vulnerability	by	dependencies
Safe	information	accountability	⇒ Zero-Knowledge	Proof	on	origin	of	vulnerability
Natural
Language	
Policy
High-Level	
Policy
Language
Intermediate-Level	
Security	Policy
Flow	Graph
Low-Level	
Enforcement
d,	d*d
Prover/
Verifier
Verifier
Verifier/
Prover
Prover
Scheduler
(Open	Data)
sec	d,	d*
sec	d,	d*
sec	d,	d*
Knowledge	
extractor
Knowledge	
extractor
Knowledge	extractor
Ground Truth with sec	d,	d*
Zero-Knowledge Proof (ZKP)
• Probabilistic proof system between 2 parties on graph isomorphism
• No additional knowledge for the verifier on original graph
• ICT Resilience: obligations + witnesses + compensation ⟼ Open Data
Prover Verifier
1. t random, a:=gt
2. a
3. c random out of {0,1}
4. c
5. r:=t + cm mod q
6. r
7. Check if gr = ahc
pkVerifier := (p, q, g, h) pkVerifier := (p, q, g, h)
ChallengeResponse
Goldwasser et al. 1989, Bellare and Goldreich 1993
III.	Proof	System	for	ICT	Resilience
03.08.16 Privacy	with Secondary Use of Personal	Information 20
In	practice:	Inevitable	vulnerability	by	dependencies
Safe	information	accountability	⇒ Zero-Knowledge	Proof	on	origin	of	vulnerability
Natural
Language	
Policy
High-Level	
Policy
Language
Intermediate-Level	
Security	Policy
Flow	Graph
Low-Level	
Enforcement
d,	d*d
Prover/
Verifier
Verifier
Verifier/
Prover
Prover
Scheduler
(Open	Data)
sec	d,	d*
sec	d,	d*
sec	d,	d*
Knowledge	
extractor
Knowledge	
extractor
Knowledge	extractor
Ground Truth with sec	d,	d*
Scheduler:	Global	AAA(A) Service
03.08.16 Privacy	with	Secondary	Use	of	Personal	Information 21
Open	Internet	Standard	RFC	2904	AAA	Authorization Framework
1:	Authentication
2:	Authorization
3:	Accounting
+	Witness for Information	Accountability
4:	Accountability
Data	consumer/
provider
Data	consumer/
provider
Data	consumer/
providerAAA(A)
service
Scheduler
sec	d,	d*
sec	d,	d*
sec	d,	d*
Scheduler:	Reliable	Broadcast
03.08.16 Privacy	with	Secondary	Use	of	Personal	Information 22
Self-organized	consensus	by	cryptography
Data	consumer/
provider
Data	consumer/
provider
Data	consumer/
provider
sec	d,	d*
…
sec	d,	d*
sec	d,	d*
• Users	check	users	(Users	as	“miner“	check	transactions	and	get	reward)
Nakamoto 2009
• Block	chain	for	safe	public	directory	with	eCoin for	risk	compensation
Scheduler
Witness:	Authorization
03.08.16 Privacy	with	Secondary	Use	of	Personal	Information 23
• Completeness:	Non-linkable	delegation	of	rights
• Soundness:	Cryptographic	protocols	(ISO/IEC	JTC	1/SC	27	WG2)
Ground	Truth:	ISO/IEC	24761	ACBio – Biometrics	with	PKI
Data	provider
Data	consumer/
provider
Data	consumer/
providerAAA(A)
service
Scheduler
d
Data	consumer/
provider
Sonehara,	Echizen,	and Wohlgemuth	2011
Witness:	Authorization
03.08.16 Privacy	with	Secondary	Use	of	Personal	Information 24
• Completeness:	Non-linkable	delegation	of	rights
• Soundness:	Cryptographic	protocols	(ISO/IEC	JTC	1/SC	27	WG2)
Ground	Truth:	ISO/IEC	24761	ACBio – Biometrics	with	PKI
Data	provider
Data	consumer/
provider
Data	consumer/
providerAAA(A)
service
Scheduler
d
Data	consumer/
provider
Issuer:
Public Key:
Attributes:
Ground Truth
ZKP on Xa23
r,w, own on d
Delegation,
Purpose,
…
Credential of
data subject
Sonehara,	Echizen,	and Wohlgemuth	2011
Sonehara,	Echizen,	and Wohlgemuth	2011
Witness:	Authorization
03.08.16 Privacy	with	Secondary	Use	of	Personal	Information 25
• Completeness:	Non-linkable	delegation	of	rights
• Soundness:	Cryptographic	protocols	(ISO/IEC	JTC	1/SC	27	WG2)
Ground	Truth:	ISO/IEC	24761	ACBio – Biometrics	with	PKI
Data	provider
Data	consumer/
provider
Data	consumer/
providerAAA(A)
service
Scheduler
d
Data	consumer/
provider
Issuer:
Public Key:
Attributes:
Ground Truth
ZKP on Xa23
r,w, own on d
Delegation,
Purpose,
…
Credential of
data subject Issuer:
Public Key:
Attributes:
Miner
ZKP on Xa23
r on d
Delegation to
helper,
medical,
Time, Price …
Credential on d
Issuer:
Public Key:
Attributes:
Miner
ZKP on Xa23
r on d*
Delegation to
logistics,
transport,
Time, Price,…
Credential on d*
Witness:	Accountability
03.08.16 Privacy	with	Secondary	Use	of	Personal	Information 26
• Completeness:	User’s	data	provenance	with	asymmetric	fingerprinting	
• Soundness:	Users’	cryptographic	commitment	on	data	processing
Ground	Truth:	ISO/IEC	24761	ACBio – Biometrics	with	PKI
Data	provider
Data	consumer/
provider
Data	consumer/
providerAAA(A)	
service
Scheduler
d
Data	consumer/
provider
d
Refugee
Ground Truth
Wohlgemuth,	Echizen,	Sonehara,	and Müller	2010
Witness:	Accountability
03.08.16 Privacy	with	Secondary	Use	of	Personal	Information 27
• Completeness:	User’s	data	provenance	with	asymmetric	fingerprinting	
• Soundness:	Users’	cryptographic	commitment	on	data	processing
Ground	Truth:	ISO/IEC	24761	ACBio – Biometrics	with	PKI
d
Data	provider
Data	consumer/
provider
Data	consumer/
providerAAA(A)	
service
Scheduler
d
Data	consumer/
provider
d
Refugee
Ground Truth
d
Refugee
Ground Truth
Helper
Wohlgemuth,	Echizen,	Sonehara,	and Müller	2010
Witness:	Accountability
03.08.16 Privacy	with	Secondary	Use	of	Personal	Information 28
• Completeness:	User’s	data	provenance	with	asymmetric	fingerprinting	
• Soundness:	Users’	cryptographic	commitment	on	data	processing
Ground	Truth:	ISO/IEC	24761	ACBio – Biometrics	with	PKI
d
d*
Data	provider
Data	consumer/
provider
Data	consumer/
providerAAA(A)	
service
Scheduler
d
Data	consumer/
provider
d
Refugee
Ground Truth
d
Refugee
Ground Truth
Helper
d*
Refugee
Ground Truth
Logistics
Wohlgemuth,	Echizen,	Sonehara,	and Müller	2010
Knowledge	Extractor:	Accounting
03.08.16 Privacy	with	Secondary	Use	of	Personal	Information 29
• Reduce	error	probability	by	different	witnesses	on	users
d,	d*d
Prover/
Verifier
Verifier
Verifier/
Prover
Prover
trust rights
cert data	provenance
rec delegation	of	rights
conf benchmarking
comp profit	sharing
• Probabilistic	logical	statement	on	safety	from	user‘s	view	(on	a	PKI)
AAA(A)	
service
Scheduler
AutDC,DPd ?
AutDC,DPd,	d*	?AutDP,	DCd,	d*	?
AutDP,	DCd,	d*,	d**	?
adapted from Maurer	1996,	Wohlgemuth	2015
Knowledge	Extractor:	Accounting
03.08.16 Privacy	with	Secondary	Use	of	Personal	Information 30
• Reduce	error	probability	by	different	witnesses	on	users
d,	d*d
Prover/
Verifier
Verifier
Verifier/
Prover
Prover
trust rights
cert data	provenance
rec delegation	of	rights
conf benchmarking
comp profit	sharing
• Probabilistic	logical	statement	on	safety	from	user‘s	view	(on	a	PKI)
ICT	Resilience	=	Completeness	+	Soundness
ICT	Resilience	=	Informational	self-determination	+	Compliance
AAA(A)	
service
Scheduler
AutDC,DPd ?
AutDC,DPd,	d*	?AutDP,	DCd,	d*	?
AutDP,	DCd,	d*,	d**	?
IV.	Looking	for	Partners!
03.08.16 Privacy	with	Secondary	Use	of	Personal	Information 31
Challenge:	Creating	a	Sustainable	Society
Multilateral	Security
IoT Integrated	Society
Data	consumer/
provider
Data	consumer/
provider
Data	consumer/
provider
sec	d,	d*
…
sec	d,	d*
sec	d,	d*
Scheduler
Resilient Risk Assessment (RA1)
Resilient ICT Services (RA2)
Resilient ICT Infrastructure (RA3)
Technical
Human Legal et al.
Privacy	
by	
Design

Weitere ähnliche Inhalte

Was ist angesagt?

Techniques to Secure Wireless Sensor Networks in Terms of Delay, Process Time...
Techniques to Secure Wireless Sensor Networks in Terms of Delay, Process Time...Techniques to Secure Wireless Sensor Networks in Terms of Delay, Process Time...
Techniques to Secure Wireless Sensor Networks in Terms of Delay, Process Time...AM Publications
 
Compromising Systems: Implementing Hacking Phases
Compromising Systems: Implementing Hacking Phases Compromising Systems: Implementing Hacking Phases
Compromising Systems: Implementing Hacking Phases AIRCC Publishing Corporation
 
COMPROMISING SYSTEMS: IMPLEMENTING HACKING PHASES
COMPROMISING SYSTEMS: IMPLEMENTING HACKING PHASESCOMPROMISING SYSTEMS: IMPLEMENTING HACKING PHASES
COMPROMISING SYSTEMS: IMPLEMENTING HACKING PHASESijcsit
 
When Online Computational Data Meets Offline Real World Events
When Online Computational Data Meets Offline Real World EventsWhen Online Computational Data Meets Offline Real World Events
When Online Computational Data Meets Offline Real World EventsTunghai University
 
2011 modeling and detection of camouflaging worm
2011   modeling and detection of camouflaging worm2011   modeling and detection of camouflaging worm
2011 modeling and detection of camouflaging wormdeepikareddy123
 
An Investigation into the Effectiveness of Machine Learning Techniques for In...
An Investigation into the Effectiveness of Machine Learning Techniques for In...An Investigation into the Effectiveness of Machine Learning Techniques for In...
An Investigation into the Effectiveness of Machine Learning Techniques for In...Oyeniyi Samuel
 
IRJET- FASSBTR : Fingerprint Authentication System Security using Barcode...
IRJET-  	  FASSBTR : Fingerprint Authentication System Security using Barcode...IRJET-  	  FASSBTR : Fingerprint Authentication System Security using Barcode...
IRJET- FASSBTR : Fingerprint Authentication System Security using Barcode...IRJET Journal
 
Self Evolving Antivirus Based on Neuro-Fuzzy Inference System
Self Evolving Antivirus Based on Neuro-Fuzzy Inference SystemSelf Evolving Antivirus Based on Neuro-Fuzzy Inference System
Self Evolving Antivirus Based on Neuro-Fuzzy Inference SystemIJRES Journal
 
Artificial Neural Content Techniques for Enhanced Intrusion Detection and Pre...
Artificial Neural Content Techniques for Enhanced Intrusion Detection and Pre...Artificial Neural Content Techniques for Enhanced Intrusion Detection and Pre...
Artificial Neural Content Techniques for Enhanced Intrusion Detection and Pre...AM Publications
 
IRJET- Implementation of Artificial Intelligence Methods to Curb Cyber Assaul...
IRJET- Implementation of Artificial Intelligence Methods to Curb Cyber Assaul...IRJET- Implementation of Artificial Intelligence Methods to Curb Cyber Assaul...
IRJET- Implementation of Artificial Intelligence Methods to Curb Cyber Assaul...IRJET Journal
 
IRJET - Survey on Malware Detection using Deep Learning Methods
IRJET -  	  Survey on Malware Detection using Deep Learning MethodsIRJET -  	  Survey on Malware Detection using Deep Learning Methods
IRJET - Survey on Malware Detection using Deep Learning MethodsIRJET Journal
 
International Journal of Computer Science and Security Volume (2) Issue (1)
International Journal of Computer Science and Security Volume (2) Issue (1)International Journal of Computer Science and Security Volume (2) Issue (1)
International Journal of Computer Science and Security Volume (2) Issue (1)CSCJournals
 

Was ist angesagt? (13)

Techniques to Secure Wireless Sensor Networks in Terms of Delay, Process Time...
Techniques to Secure Wireless Sensor Networks in Terms of Delay, Process Time...Techniques to Secure Wireless Sensor Networks in Terms of Delay, Process Time...
Techniques to Secure Wireless Sensor Networks in Terms of Delay, Process Time...
 
Compromising Systems: Implementing Hacking Phases
Compromising Systems: Implementing Hacking Phases Compromising Systems: Implementing Hacking Phases
Compromising Systems: Implementing Hacking Phases
 
COMPROMISING SYSTEMS: IMPLEMENTING HACKING PHASES
COMPROMISING SYSTEMS: IMPLEMENTING HACKING PHASESCOMPROMISING SYSTEMS: IMPLEMENTING HACKING PHASES
COMPROMISING SYSTEMS: IMPLEMENTING HACKING PHASES
 
When Online Computational Data Meets Offline Real World Events
When Online Computational Data Meets Offline Real World EventsWhen Online Computational Data Meets Offline Real World Events
When Online Computational Data Meets Offline Real World Events
 
2011 modeling and detection of camouflaging worm
2011   modeling and detection of camouflaging worm2011   modeling and detection of camouflaging worm
2011 modeling and detection of camouflaging worm
 
An Investigation into the Effectiveness of Machine Learning Techniques for In...
An Investigation into the Effectiveness of Machine Learning Techniques for In...An Investigation into the Effectiveness of Machine Learning Techniques for In...
An Investigation into the Effectiveness of Machine Learning Techniques for In...
 
IRJET- FASSBTR : Fingerprint Authentication System Security using Barcode...
IRJET-  	  FASSBTR : Fingerprint Authentication System Security using Barcode...IRJET-  	  FASSBTR : Fingerprint Authentication System Security using Barcode...
IRJET- FASSBTR : Fingerprint Authentication System Security using Barcode...
 
Self Evolving Antivirus Based on Neuro-Fuzzy Inference System
Self Evolving Antivirus Based on Neuro-Fuzzy Inference SystemSelf Evolving Antivirus Based on Neuro-Fuzzy Inference System
Self Evolving Antivirus Based on Neuro-Fuzzy Inference System
 
Artificial Neural Content Techniques for Enhanced Intrusion Detection and Pre...
Artificial Neural Content Techniques for Enhanced Intrusion Detection and Pre...Artificial Neural Content Techniques for Enhanced Intrusion Detection and Pre...
Artificial Neural Content Techniques for Enhanced Intrusion Detection and Pre...
 
IRJET- Implementation of Artificial Intelligence Methods to Curb Cyber Assaul...
IRJET- Implementation of Artificial Intelligence Methods to Curb Cyber Assaul...IRJET- Implementation of Artificial Intelligence Methods to Curb Cyber Assaul...
IRJET- Implementation of Artificial Intelligence Methods to Curb Cyber Assaul...
 
IRJET - Survey on Malware Detection using Deep Learning Methods
IRJET -  	  Survey on Malware Detection using Deep Learning MethodsIRJET -  	  Survey on Malware Detection using Deep Learning Methods
IRJET - Survey on Malware Detection using Deep Learning Methods
 
International Journal of Computer Science and Security Volume (2) Issue (1)
International Journal of Computer Science and Security Volume (2) Issue (1)International Journal of Computer Science and Security Volume (2) Issue (1)
International Journal of Computer Science and Security Volume (2) Issue (1)
 
Msc dare journal 1
Msc dare journal 1Msc dare journal 1
Msc dare journal 1
 

Andere mochten auch

PersoApp - Sichere und benutzerfreundliche Internetanwendungen
PersoApp - Sichere und benutzerfreundliche InternetanwendungenPersoApp - Sichere und benutzerfreundliche Internetanwendungen
PersoApp - Sichere und benutzerfreundliche InternetanwendungenSven Wohlgemuth
 
Resilience by Usable Security
Resilience by Usable SecurityResilience by Usable Security
Resilience by Usable SecuritySven Wohlgemuth
 
PersoApp - Secure and User-Friendly Internet Applications
PersoApp - Secure and User-Friendly Internet ApplicationsPersoApp - Secure and User-Friendly Internet Applications
PersoApp - Secure and User-Friendly Internet ApplicationsSven Wohlgemuth
 
Resilience as a new Enforcement Model for IT Security based on Usage Control
Resilience as a new Enforcement Model for IT Security based on Usage ControlResilience as a new Enforcement Model for IT Security based on Usage Control
Resilience as a new Enforcement Model for IT Security based on Usage ControlSven Wohlgemuth
 
Privacy-Enhancing Trust Infrastructure for Process Mining
Privacy-Enhancing Trust Infrastructure for Process MiningPrivacy-Enhancing Trust Infrastructure for Process Mining
Privacy-Enhancing Trust Infrastructure for Process MiningSven Wohlgemuth
 
PersoApp - An Open Source Community for the new German national ID card
PersoApp - An Open Source Community for the new German national ID cardPersoApp - An Open Source Community for the new German national ID card
PersoApp - An Open Source Community for the new German national ID cardSven Wohlgemuth
 
Tagging Disclosure of Personal Data to Third Parties to Preserve Privacy
Tagging Disclosure of Personal Data to Third Parties to Preserve PrivacyTagging Disclosure of Personal Data to Third Parties to Preserve Privacy
Tagging Disclosure of Personal Data to Third Parties to Preserve PrivacySven Wohlgemuth
 

Andere mochten auch (8)

ICT Resilience in EU
ICT Resilience in EUICT Resilience in EU
ICT Resilience in EU
 
PersoApp - Sichere und benutzerfreundliche Internetanwendungen
PersoApp - Sichere und benutzerfreundliche InternetanwendungenPersoApp - Sichere und benutzerfreundliche Internetanwendungen
PersoApp - Sichere und benutzerfreundliche Internetanwendungen
 
Resilience by Usable Security
Resilience by Usable SecurityResilience by Usable Security
Resilience by Usable Security
 
PersoApp - Secure and User-Friendly Internet Applications
PersoApp - Secure and User-Friendly Internet ApplicationsPersoApp - Secure and User-Friendly Internet Applications
PersoApp - Secure and User-Friendly Internet Applications
 
Resilience as a new Enforcement Model for IT Security based on Usage Control
Resilience as a new Enforcement Model for IT Security based on Usage ControlResilience as a new Enforcement Model for IT Security based on Usage Control
Resilience as a new Enforcement Model for IT Security based on Usage Control
 
Privacy-Enhancing Trust Infrastructure for Process Mining
Privacy-Enhancing Trust Infrastructure for Process MiningPrivacy-Enhancing Trust Infrastructure for Process Mining
Privacy-Enhancing Trust Infrastructure for Process Mining
 
PersoApp - An Open Source Community for the new German national ID card
PersoApp - An Open Source Community for the new German national ID cardPersoApp - An Open Source Community for the new German national ID card
PersoApp - An Open Source Community for the new German national ID card
 
Tagging Disclosure of Personal Data to Third Parties to Preserve Privacy
Tagging Disclosure of Personal Data to Third Parties to Preserve PrivacyTagging Disclosure of Personal Data to Third Parties to Preserve Privacy
Tagging Disclosure of Personal Data to Third Parties to Preserve Privacy
 

Ähnlich wie Privacy and Secondary Use of Personal Data

CyberSecurity-Forum-2010-Mario Hoffmann
CyberSecurity-Forum-2010-Mario HoffmannCyberSecurity-Forum-2010-Mario Hoffmann
CyberSecurity-Forum-2010-Mario Hoffmannsegughana
 
Identifying Malicious Data in Social Media
Identifying Malicious Data in Social MediaIdentifying Malicious Data in Social Media
Identifying Malicious Data in Social MediaIRJET Journal
 
Encountering social engineering activities with a novel honeypot mechanism
Encountering social engineering activities with a novel honeypot mechanismEncountering social engineering activities with a novel honeypot mechanism
Encountering social engineering activities with a novel honeypot mechanismIJECEIAES
 
Network Intrusion Datasets Used In Network Security Education
Network Intrusion Datasets Used In Network Security EducationNetwork Intrusion Datasets Used In Network Security Education
Network Intrusion Datasets Used In Network Security EducationIJITE
 
IRJET- A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
IRJET-  	  A Novel Survey to Secure Medical Images in Cloud using Digital Wat...IRJET-  	  A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
IRJET- A Novel Survey to Secure Medical Images in Cloud using Digital Wat...IRJET Journal
 
Peripheral Review and Analysis of Internet Network Security
Peripheral Review and Analysis of Internet Network SecurityPeripheral Review and Analysis of Internet Network Security
Peripheral Review and Analysis of Internet Network SecurityIJRES Journal
 
Database Security Is Vital For Any And Every Organization
Database Security Is Vital For Any And Every OrganizationDatabase Security Is Vital For Any And Every Organization
Database Security Is Vital For Any And Every OrganizationApril Dillard
 
CYBER ATTACKS ON INTRUSION DETECTION SYSTEM
CYBER ATTACKS ON INTRUSION DETECTION SYSTEMCYBER ATTACKS ON INTRUSION DETECTION SYSTEM
CYBER ATTACKS ON INTRUSION DETECTION SYSTEMijistjournal
 
Vulnerabilities of Fingerprint Authentication Systems and Their Securities
Vulnerabilities of Fingerprint Authentication Systems and Their SecuritiesVulnerabilities of Fingerprint Authentication Systems and Their Securities
Vulnerabilities of Fingerprint Authentication Systems and Their SecuritiesTanjarul Islam Mishu
 
Robust encryption algorithm based sht in wireless sensor networks
Robust encryption algorithm based sht in wireless sensor networksRobust encryption algorithm based sht in wireless sensor networks
Robust encryption algorithm based sht in wireless sensor networksijdpsjournal
 
Critical Infrastructure and Cyber Security: trends and challenges
Critical Infrastructure and Cyber Security: trends and challengesCritical Infrastructure and Cyber Security: trends and challenges
Critical Infrastructure and Cyber Security: trends and challengesCommunity Protection Forum
 
Automated Emerging Cyber Threat Identification and Profiling Based on Natural...
Automated Emerging Cyber Threat Identification and Profiling Based on Natural...Automated Emerging Cyber Threat Identification and Profiling Based on Natural...
Automated Emerging Cyber Threat Identification and Profiling Based on Natural...Shakas Technologies
 
IT8073 _Information Security _UNIT I Full notes
IT8073 _Information Security _UNIT I Full notesIT8073 _Information Security _UNIT I Full notes
IT8073 _Information Security _UNIT I Full notesAsst.prof M.Gokilavani
 
IT8073_Information Security_UNIT I _.pdf
IT8073_Information Security_UNIT I _.pdfIT8073_Information Security_UNIT I _.pdf
IT8073_Information Security_UNIT I _.pdfAsst.prof M.Gokilavani
 
DEFENSE MECHANISMS FOR COMPUTER-BASED INFORMATION SYSTEMS
DEFENSE MECHANISMS FOR COMPUTER-BASED INFORMATION SYSTEMS DEFENSE MECHANISMS FOR COMPUTER-BASED INFORMATION SYSTEMS
DEFENSE MECHANISMS FOR COMPUTER-BASED INFORMATION SYSTEMS IJNSA Journal
 
Examining a display-peeping prevention method that uses real-time UI part tra...
Examining a display-peeping prevention method that uses real-time UI part tra...Examining a display-peeping prevention method that uses real-time UI part tra...
Examining a display-peeping prevention method that uses real-time UI part tra...journalBEEI
 
02 fundamental aspects of security
02 fundamental aspects of security02 fundamental aspects of security
02 fundamental aspects of securityGemy Chan
 
Future-proofing maritime ports against emerging cyber-physical threats
Future-proofing maritime ports against emerging cyber-physical threatsFuture-proofing maritime ports against emerging cyber-physical threats
Future-proofing maritime ports against emerging cyber-physical threatsSteven SIM Kok Leong
 

Ähnlich wie Privacy and Secondary Use of Personal Data (20)

CyberSecurity-Forum-2010-Mario Hoffmann
CyberSecurity-Forum-2010-Mario HoffmannCyberSecurity-Forum-2010-Mario Hoffmann
CyberSecurity-Forum-2010-Mario Hoffmann
 
Identifying Malicious Data in Social Media
Identifying Malicious Data in Social MediaIdentifying Malicious Data in Social Media
Identifying Malicious Data in Social Media
 
A05510105
A05510105A05510105
A05510105
 
Encountering social engineering activities with a novel honeypot mechanism
Encountering social engineering activities with a novel honeypot mechanismEncountering social engineering activities with a novel honeypot mechanism
Encountering social engineering activities with a novel honeypot mechanism
 
Network Intrusion Datasets Used In Network Security Education
Network Intrusion Datasets Used In Network Security EducationNetwork Intrusion Datasets Used In Network Security Education
Network Intrusion Datasets Used In Network Security Education
 
IRJET- A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
IRJET-  	  A Novel Survey to Secure Medical Images in Cloud using Digital Wat...IRJET-  	  A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
IRJET- A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
 
Peripheral Review and Analysis of Internet Network Security
Peripheral Review and Analysis of Internet Network SecurityPeripheral Review and Analysis of Internet Network Security
Peripheral Review and Analysis of Internet Network Security
 
Database Security Is Vital For Any And Every Organization
Database Security Is Vital For Any And Every OrganizationDatabase Security Is Vital For Any And Every Organization
Database Security Is Vital For Any And Every Organization
 
CYBER ATTACKS ON INTRUSION DETECTION SYSTEM
CYBER ATTACKS ON INTRUSION DETECTION SYSTEMCYBER ATTACKS ON INTRUSION DETECTION SYSTEM
CYBER ATTACKS ON INTRUSION DETECTION SYSTEM
 
Vulnerabilities of Fingerprint Authentication Systems and Their Securities
Vulnerabilities of Fingerprint Authentication Systems and Their SecuritiesVulnerabilities of Fingerprint Authentication Systems and Their Securities
Vulnerabilities of Fingerprint Authentication Systems and Their Securities
 
Robust encryption algorithm based sht in wireless sensor networks
Robust encryption algorithm based sht in wireless sensor networksRobust encryption algorithm based sht in wireless sensor networks
Robust encryption algorithm based sht in wireless sensor networks
 
Critical Infrastructure and Cyber Security: trends and challenges
Critical Infrastructure and Cyber Security: trends and challengesCritical Infrastructure and Cyber Security: trends and challenges
Critical Infrastructure and Cyber Security: trends and challenges
 
Automated Emerging Cyber Threat Identification and Profiling Based on Natural...
Automated Emerging Cyber Threat Identification and Profiling Based on Natural...Automated Emerging Cyber Threat Identification and Profiling Based on Natural...
Automated Emerging Cyber Threat Identification and Profiling Based on Natural...
 
IT8073 _Information Security _UNIT I Full notes
IT8073 _Information Security _UNIT I Full notesIT8073 _Information Security _UNIT I Full notes
IT8073 _Information Security _UNIT I Full notes
 
IT8073_Information Security_UNIT I _.pdf
IT8073_Information Security_UNIT I _.pdfIT8073_Information Security_UNIT I _.pdf
IT8073_Information Security_UNIT I _.pdf
 
DEFENSE MECHANISMS FOR COMPUTER-BASED INFORMATION SYSTEMS
DEFENSE MECHANISMS FOR COMPUTER-BASED INFORMATION SYSTEMS DEFENSE MECHANISMS FOR COMPUTER-BASED INFORMATION SYSTEMS
DEFENSE MECHANISMS FOR COMPUTER-BASED INFORMATION SYSTEMS
 
Examining a display-peeping prevention method that uses real-time UI part tra...
Examining a display-peeping prevention method that uses real-time UI part tra...Examining a display-peeping prevention method that uses real-time UI part tra...
Examining a display-peeping prevention method that uses real-time UI part tra...
 
Chapter 1 2
Chapter 1 2Chapter 1 2
Chapter 1 2
 
02 fundamental aspects of security
02 fundamental aspects of security02 fundamental aspects of security
02 fundamental aspects of security
 
Future-proofing maritime ports against emerging cyber-physical threats
Future-proofing maritime ports against emerging cyber-physical threatsFuture-proofing maritime ports against emerging cyber-physical threats
Future-proofing maritime ports against emerging cyber-physical threats
 

Mehr von Sven Wohlgemuth

A Secure Decision-Support Scheme for Self-Sovereign Identity Management
A Secure Decision-Support Scheme for Self-Sovereign Identity ManagementA Secure Decision-Support Scheme for Self-Sovereign Identity Management
A Secure Decision-Support Scheme for Self-Sovereign Identity ManagementSven Wohlgemuth
 
Competitive Compliance with Blockchain
Competitive Compliance with BlockchainCompetitive Compliance with Blockchain
Competitive Compliance with BlockchainSven Wohlgemuth
 
Secure Sharing of Design Information with Blockchains
Secure Sharing of Design Information with BlockchainsSecure Sharing of Design Information with Blockchains
Secure Sharing of Design Information with BlockchainsSven Wohlgemuth
 
個人情報の有効活用を可能にする (Enabling effective use of personal information)
 個人情報の有効活用を可能にする (Enabling effective use of personal information) 個人情報の有効活用を可能にする (Enabling effective use of personal information)
個人情報の有効活用を可能にする (Enabling effective use of personal information)Sven Wohlgemuth
 
EN 6.3: 3 Sicherheitsmodelle
EN 6.3: 3 SicherheitsmodelleEN 6.3: 3 Sicherheitsmodelle
EN 6.3: 3 SicherheitsmodelleSven Wohlgemuth
 
Privacy in Business Processes by User-Centric Identity Management
Privacy in Business Processes by User-Centric Identity ManagementPrivacy in Business Processes by User-Centric Identity Management
Privacy in Business Processes by User-Centric Identity ManagementSven Wohlgemuth
 
WP14 Workshop "From Data Economy to Secure Logging as a Step towards Transpar...
WP14 Workshop "From Data Economy to Secure Logging as a Step towards Transpar...WP14 Workshop "From Data Economy to Secure Logging as a Step towards Transpar...
WP14 Workshop "From Data Economy to Secure Logging as a Step towards Transpar...Sven Wohlgemuth
 
On Privacy in Medical Services with Electronic Health Records
On Privacy in Medical Services with Electronic Health RecordsOn Privacy in Medical Services with Electronic Health Records
On Privacy in Medical Services with Electronic Health RecordsSven Wohlgemuth
 
EN 6.3: 2 IT-Compliance und IT-Sicherheitsmanagement
EN 6.3: 2 IT-Compliance und IT-SicherheitsmanagementEN 6.3: 2 IT-Compliance und IT-Sicherheitsmanagement
EN 6.3: 2 IT-Compliance und IT-SicherheitsmanagementSven Wohlgemuth
 
EN 6.3: 1 IT-Sicherheit und Technischer Datenschutz
EN 6.3: 1 IT-Sicherheit und Technischer DatenschutzEN 6.3: 1 IT-Sicherheit und Technischer Datenschutz
EN 6.3: 1 IT-Sicherheit und Technischer DatenschutzSven Wohlgemuth
 
International Workshop on Information Systems for Social Innovation (ISSI) 2009
International Workshop on Information Systems for Social Innovation (ISSI) 2009International Workshop on Information Systems for Social Innovation (ISSI) 2009
International Workshop on Information Systems for Social Innovation (ISSI) 2009Sven Wohlgemuth
 
Durchsetzung von Privacy Policies in Dienstenetzen
Durchsetzung von Privacy Policies in DienstenetzenDurchsetzung von Privacy Policies in Dienstenetzen
Durchsetzung von Privacy Policies in DienstenetzenSven Wohlgemuth
 
Privacy in Business Processes by User-Centric Identity Management
Privacy in Business Processes by User-Centric Identity ManagementPrivacy in Business Processes by User-Centric Identity Management
Privacy in Business Processes by User-Centric Identity ManagementSven Wohlgemuth
 
Privacy in Business Processes by Identity Management
Privacy in Business Processes by Identity ManagementPrivacy in Business Processes by Identity Management
Privacy in Business Processes by Identity ManagementSven Wohlgemuth
 
Schlüsselverwaltung - Objektorientierter Entwurf und Implementierung
Schlüsselverwaltung - Objektorientierter Entwurf und ImplementierungSchlüsselverwaltung - Objektorientierter Entwurf und Implementierung
Schlüsselverwaltung - Objektorientierter Entwurf und ImplementierungSven Wohlgemuth
 
Sicherheit in einer vernetzten Welt
Sicherheit in einer vernetzten WeltSicherheit in einer vernetzten Welt
Sicherheit in einer vernetzten WeltSven Wohlgemuth
 
Solutions for Coping with Privacy and Usability
Solutions for Coping with Privacy and UsabilitySolutions for Coping with Privacy and Usability
Solutions for Coping with Privacy and UsabilitySven Wohlgemuth
 
iManager - nutzer-zentrierter Identitätsmanager
iManager - nutzer-zentrierter IdentitätsmanageriManager - nutzer-zentrierter Identitätsmanager
iManager - nutzer-zentrierter IdentitätsmanagerSven Wohlgemuth
 

Mehr von Sven Wohlgemuth (20)

A Secure Decision-Support Scheme for Self-Sovereign Identity Management
A Secure Decision-Support Scheme for Self-Sovereign Identity ManagementA Secure Decision-Support Scheme for Self-Sovereign Identity Management
A Secure Decision-Support Scheme for Self-Sovereign Identity Management
 
Competitive Compliance with Blockchain
Competitive Compliance with BlockchainCompetitive Compliance with Blockchain
Competitive Compliance with Blockchain
 
Secure Sharing of Design Information with Blockchains
Secure Sharing of Design Information with BlockchainsSecure Sharing of Design Information with Blockchains
Secure Sharing of Design Information with Blockchains
 
個人情報の有効活用を可能にする (Enabling effective use of personal information)
 個人情報の有効活用を可能にする (Enabling effective use of personal information) 個人情報の有効活用を可能にする (Enabling effective use of personal information)
個人情報の有効活用を可能にする (Enabling effective use of personal information)
 
EN 6.3: 4 Kryptographie
EN 6.3: 4 KryptographieEN 6.3: 4 Kryptographie
EN 6.3: 4 Kryptographie
 
EN 6.3: 3 Sicherheitsmodelle
EN 6.3: 3 SicherheitsmodelleEN 6.3: 3 Sicherheitsmodelle
EN 6.3: 3 Sicherheitsmodelle
 
Privacy in Business Processes by User-Centric Identity Management
Privacy in Business Processes by User-Centric Identity ManagementPrivacy in Business Processes by User-Centric Identity Management
Privacy in Business Processes by User-Centric Identity Management
 
WP14 Workshop "From Data Economy to Secure Logging as a Step towards Transpar...
WP14 Workshop "From Data Economy to Secure Logging as a Step towards Transpar...WP14 Workshop "From Data Economy to Secure Logging as a Step towards Transpar...
WP14 Workshop "From Data Economy to Secure Logging as a Step towards Transpar...
 
Privacy in e-Health
Privacy in e-HealthPrivacy in e-Health
Privacy in e-Health
 
On Privacy in Medical Services with Electronic Health Records
On Privacy in Medical Services with Electronic Health RecordsOn Privacy in Medical Services with Electronic Health Records
On Privacy in Medical Services with Electronic Health Records
 
EN 6.3: 2 IT-Compliance und IT-Sicherheitsmanagement
EN 6.3: 2 IT-Compliance und IT-SicherheitsmanagementEN 6.3: 2 IT-Compliance und IT-Sicherheitsmanagement
EN 6.3: 2 IT-Compliance und IT-Sicherheitsmanagement
 
EN 6.3: 1 IT-Sicherheit und Technischer Datenschutz
EN 6.3: 1 IT-Sicherheit und Technischer DatenschutzEN 6.3: 1 IT-Sicherheit und Technischer Datenschutz
EN 6.3: 1 IT-Sicherheit und Technischer Datenschutz
 
International Workshop on Information Systems for Social Innovation (ISSI) 2009
International Workshop on Information Systems for Social Innovation (ISSI) 2009International Workshop on Information Systems for Social Innovation (ISSI) 2009
International Workshop on Information Systems for Social Innovation (ISSI) 2009
 
Durchsetzung von Privacy Policies in Dienstenetzen
Durchsetzung von Privacy Policies in DienstenetzenDurchsetzung von Privacy Policies in Dienstenetzen
Durchsetzung von Privacy Policies in Dienstenetzen
 
Privacy in Business Processes by User-Centric Identity Management
Privacy in Business Processes by User-Centric Identity ManagementPrivacy in Business Processes by User-Centric Identity Management
Privacy in Business Processes by User-Centric Identity Management
 
Privacy in Business Processes by Identity Management
Privacy in Business Processes by Identity ManagementPrivacy in Business Processes by Identity Management
Privacy in Business Processes by Identity Management
 
Schlüsselverwaltung - Objektorientierter Entwurf und Implementierung
Schlüsselverwaltung - Objektorientierter Entwurf und ImplementierungSchlüsselverwaltung - Objektorientierter Entwurf und Implementierung
Schlüsselverwaltung - Objektorientierter Entwurf und Implementierung
 
Sicherheit in einer vernetzten Welt
Sicherheit in einer vernetzten WeltSicherheit in einer vernetzten Welt
Sicherheit in einer vernetzten Welt
 
Solutions for Coping with Privacy and Usability
Solutions for Coping with Privacy and UsabilitySolutions for Coping with Privacy and Usability
Solutions for Coping with Privacy and Usability
 
iManager - nutzer-zentrierter Identitätsmanager
iManager - nutzer-zentrierter IdentitätsmanageriManager - nutzer-zentrierter Identitätsmanager
iManager - nutzer-zentrierter Identitätsmanager
 

Kürzlich hochgeladen

Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxDyna Gilbert
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITMgdsc13
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Paul Calvano
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一Fs
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书rnrncn29
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhimiss dipika
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作ys8omjxb
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书zdzoqco
 
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Sonam Pathan
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一Fs
 
Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Excelmac1
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一z xss
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationLinaWolf1
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一Fs
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMartaLoveguard
 
Q4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxQ4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxeditsforyah
 
Elevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New OrleansElevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New Orleanscorenetworkseo
 
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Sonam Pathan
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predieusebiomeyer
 

Kürzlich hochgeladen (20)

Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptx
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITM
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhi
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
 
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
 
Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 Documentation
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptx
 
Q4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxQ4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptx
 
Elevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New OrleansElevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New Orleans
 
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
 
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predi
 

Privacy and Secondary Use of Personal Data

  • 1. Privacy with Secondary Use of Personal Information MKWI 2016 Sicherheit, Compliance und Verfügbarkeit von Geschäftsprozessen March 9, 2016, Ilmenau, Germany Dr. Sven Wohlgemuth (Visiting Researcher Goethe Universität Frankfurt, Germany) Dr. Kazuo Takaragi (National Institute of Advanced Industrial Science and Technology, Japan) Prof. Dr. Isao Echizen (National Institute of Informatics, Japan)
  • 2. Helper The Great East Japan Earthquake 03.08.16 Privacy with Secondary Use of Personal Information 2 Urushidani and Aoki 2011, JAISA 2015 Refugee National academic ICT infrastructure (SINET) was available Physical Cyber SINET 4: Cloud-type services for > 700 organizations Telemedicine Insufficient information in real-time for response and recovery
  • 3. Agenda I. Resilience and Safety • Lessons learned • Safety: A Zero-Knowledge Proof? II. Towards Provable Safety • Language-Based Information Flow Control • Language for ICT Resilience III. Proof System for ICT Resilience • Zero-Knowledge Proof with Open Data • Cryptographic Building Blocks IV. Looking for Partners! 03.08.16 Privacy with Secondary Use of Personal Information 3
  • 4. I. Resilience and Safety 03.08.16 Privacy with Secondary Use of Personal Information 4 Urushidani et al. 2015, JAISA 2015 Resilience by predictive IT risk management with personal data HelperRefugee Physical Cyber SINET 5: Cloud Computing with PKI and Marketplace Telemedicine Ground Truth 5 Courtesy of Tsukuba Univ. Kostadinka Bizheva, et al., J. of Biomedical Optics, July/ 2004 Vol.9 No.4 Petra Wilder-Smith, et al. J. of Biomedical Optics Sep/ 2005 Vol.10 No.5 BrainEye Tooth Oral Skin Z.P.Chen, et al., Opt. Express, Aug/ 2007 Vol. 15 No. 16 Esophagus Alexander Popp, et al., J. of Biomedical Optics, Jan/ 2004 Vol.11 No.1 Lung Guillermo J. Tearney, et al. J. of Biomedical Optics Mar/ 2006 Vol.11 No.2 Cardiovascular Pancreas Pier Alberto, et al. J Pancreas (Online) 2007 Vol.8 No.2 Cervix Ilya V. Turchin, et al., J. of Biomedical Optics, Nov/ 2005 Vol.10 No.6 Blood flow Bradley A. Bower., J. of Biomedical Optics, Jul/ 2007 Vol.12 No.4 Stomach Yonghong He, et al. J. of Biomedical Optics Jan/ 2004 Vol.9 No.1 Trachea Matthew Brenner, et al., J. of Biomedical Optics, Sep/ 2007 Vol.12 No.5 Cochlea Fangyi Chen, et al., J. of Biomedical Optics, Mar/ 2007 Vol.12 No.2 Bladder Ying T. Pan, et al. J. of Biomedical Optics Sep/ 2007 Vol.12 No.5 Colon Alexandre R. Tumlinson, et al., J. of Biomedical Optics, Nov/ 2006 Vol.11 No.6 Kidney Yu Chen, et al. J. of Biomedical Optics Sep/ 2007 Vol.12 No.3 Bone santec confidential SS-OCT System Inner Vision 16Application to Biometrics:
 Non-invasive measurement of iris, retina, fingerprint, vascular image under skin. OCT(Optical Coherence Tomography) 図:santec株式会社提供資料より
  • 5. Requirements on Safety 03.08.16 Privacy with Secondary Use of Personal Information 5 Compliance • End-to-end security • Declassification • Accountability and penalty • Adequate risk management with authentic reporting Personal Risk Management • Transaction-specific safety • Just-in-time scalable knowledge creation from data • Optimizing user’s risk with data minimization User-centric safety (Completeness) Integrity of computation (Soundness) User-centric safe information flow JAISA 2015 HIPAA, (J-)SOX, KonTraG, EU GDPD, Japan Personal Information Protection Law
  • 6. Safety: A Zero-Knowledge Proof? 03.08.16 Privacy with Secondary Use of Personal Information 6 ...... • Multilateral security ⇒ User-centric safe information flow d d, d* Data provider /consumer Data consumer Data consumer /provider Data provider Secondary usePrimary use • Vulnerability in real-time by inevitable, hidden dependencies
  • 7. Safety: A Zero-Knowledge Proof? 03.08.16 Privacy with Secondary Use of Personal Information 7 ...... • Multilateral security ⇒ User-centric safe information flow d Secondary usePrimary use • Vulnerability in real-time by inevitable, hidden dependencies Safety by obscurity – No reliable statement on information d, d* Data provider Data consumer /provider Data consumer Data provider
  • 8. Safety: Decidability 03.08.16 Privacy with Secondary Use of Personal Information 8 State-of-the-art: ISO 270xx, IETF AAA (access control) ...... d Data provider /consumer Data consumer Data consumer /provider Data provider d, d* ? o1 = d o2 = d* … s1 own, r, w ? own, r, w ? s2 r, w own, r, w s3 ? r, w ? r … General security system Decidability on safety in general ⇒ Halting problem of Turing Machine Probability of a correct statement on safety in the future = 50% Harrison et al. 1976Hamlen et al. 2006 Enforcement
  • 9. Threat to Completeness 03.08.16 Privacy with Secondary Use of Personal Information 9 • Information flow from different sources in real-time • Aggregation of anonymized personal data Loss of control on confidentiality (of honest prover) Bob David Explicit/friendship Implicitly assumed friendship Sweeney 2002 Jernigan and Mistree, 2007
  • 10. Threat to Soundness 03.08.16 Privacy with Secondary Use of Personal Information 10 Loss of control on classification (of honest verifier) • Knowledge creation from personal data by secondary use • “Faulty” data increases error probability of machine learning Biggio et al 2012; Huang et al 2011 Supervised machine learning (e.g. SVM) 0 2 4 6 8 0 0.05 0.1 0.15 0.2 0.25 0.3 0.35 0.4 % of attack points in training data classification error (7 vs 1) validation error testing error 0 2 4 6 8 0 0.05 0.1 0.15 0.2 0.25 0.3 0.35 0.4 % of attack points in training data classification error (9 vs 8) validation error testing error 0.25 0.3 0.35 0.4 classification error (4 vs 0) validation error testing error structure of the optimal solution. Another direction for research is the simultaneous opti- mization of multi-point attacks, which we successfully approached with sequential single-point attacks. The first question is how to optimally perturb a subset of the training data; that is, instead of individually opti- mizing each attack point, one could derive simultane- ous steps for every attack point to better optimize their overall e↵ect. The second question is how to choose the best subset of points to use as a starting point for the attack. Generally, the latter is a subset selec- tion problem but heuristics may allow for improved ap- proximations. Regardless, we demonstrate that even non-optimal multi-point attack strategies significantly degrade the SVM’s performance. An important practical limitation of the proposed method is the assumption that the attacker controls the labels of the injected points. Such assumptions may not hold when the labels are only assigned by trusted sources such as humans. For instance, a spam filter uses its users’ labeling of messages as its ground truth. Thus, although an attacker can send arbitrary messages, he cannot guarantee that they will have the labels necessary for his attack. This imposes an ad- ditional requirement that the attack data must satisfy certain side constraints to fool the labeling oracle. Fur- ther work is needed to understand these potential side constraints and to incorporate them into attacks. The final extension would be to incorporate the real- world inverse feature-mapping problem; that is, the problem of finding real-world attack data that can Unsupervised machine learning (e.g. PCA) 0.00.20.40.60.81.0 Single Poisoning Period: Evading PCA Mean chaff volume Evasionsuccess(FNR) 0% 10% 20% 30% 40% 50% Uninformed Locally−informed Globally−informed 10 0 0.00.20.40.60.81.0 Bo Evasionsuccess(averagetestFNR) Figure 3: Effect of poisoning attacks on the PCA-based detector [36 relative chaff volume under Single-Training Period poisoning attacks (dotted black line) locally-informed (dashed blue line) and globally-in success of PCA under Boiling Frog poisoning attacks in terms of the of locally-informed poisoning for four different poisoning schedules ( size of the poisoning by factors 1.01, 1.02, 1.05, and 1.15 respectively).
  • 11. II. Towards Provable Safety 03.08.16 Privacy with Secondary Use of Personal Information 11 Status Quo: Language-based information flow control Rigorous Natural Language Policy High-Level Policy Language Intermediate-Level Security Policy Flow Graph Low-Level Enforcement In Practice Take-grant, type-safety, lattice-based access control, obligations Identity, cryptography, safe public directory, monitor, proof-carrying code Decentralized trust management HIPAA, (J-)SOX, KonTraG, 95/46/EC, JP PII Protection Law, … Enforcement classes, Ponder, ExPDT Computational complexity, PKI, virtualization, testing ISO/IEC 270xx, BSI IT- Baseline Protection, IETF AAA, NIST SCAP Social/knowledge graph, sticky policies secure delegation of rights ZKP-carrying information cf. Sandhu 1993, Myers and Liskov, 1997; Schneider, Morrisett and Harper, 2001; Sabelfeld and Myers, 2003
  • 12. Access control doesn‘t scale for resilience Error propagation Joined by Ground Truth Role change of secondary use Ext.: Reliable ”Big Brother” Int.: Error propagation Role change of secondary use (DP, DC, data, DS, time, …) Data minimization Special Cases for Safety 03.08.16 Privacy with Secondary Use of Personal Information 12 • Strict order Natural Language Policy High-Level Policy Language Intermediate-Level Security Policy Flow Graph Low-Level Enforcement • Symmetric access tree • Safety if trees are separate • Availability of data by declassification Lattice-based Access Control Sandhu 1993 Take-grant Lipton and Snyder 1977 S1: u S2: u S3: v O: oS3: w • Acyclic graph • x <= 3 parameter • No revocation Type-safety Sandhu 1992 S1: u S2: u S3: v O: oS3: w
  • 13. Example: Chinese-Wall 03.08.16 Privacy with Secondary Use of Personal Information 13 Conflict classes Personal datasets Syshigh Ground Truth Registration office Medical treatment Required information for enforcement (central by Syshigh)
  • 14. Example: Chinese-Wall 03.08.16 Privacy with Secondary Use of Personal Information 14 Conflict classes Personal datasets Syshigh Ground Truth Registration office Medical treatment Required information for enforcement (central by Syshigh)
  • 15. Example: Chinese-Wall 03.08.16 Privacy with Secondary Use of Personal Information 15 Conflict classes Personal datasets Syshigh Ground Truth Registration office Medical treatment Bob David Explicit/friendship Implicitly assumed friendship Required information for enforcement (central by Syshigh)
  • 16. Example: Chinese-Wall 03.08.16 Privacy with Secondary Use of Personal Information 16 Conflict classes Personal datasets Syshigh Ground Truth Registration office Medical treatment Bob David Explicit/friendship Implicitly assumed friendship Required information for enforcement (central by Syshigh)
  • 17. Natural Language Policy High-Level Policy Language Intermediate-Level Security Policy Flow Graph Low-Level EnforcementLanguage for ICT Resilience 03.08.16 Privacy with Secondary Use of Personal Information 17 Safety for secondary use: Soundness (safety) ∧ Completeness (safety + liveness) d, d*d Prover/ Verifier Verifier Verifier/ Prover Prover Access control Provisions Provisions + observable obligations Usage control Enforcement ⇒ Open Data of personal security information (Ground Truth) Open Data on obligations adapted from Park and Sandhu 2004; Pretschner, Hilty, and Basin 2006
  • 18. III. Proof System for ICT Resilience 03.08.16 Privacy with Secondary Use of Personal Information 18 In practice: Inevitable vulnerability by dependencies Safe information accountability ⇒ Zero-Knowledge Proof on origin of vulnerability Natural Language Policy High-Level Policy Language Intermediate-Level Security Policy Flow Graph Low-Level Enforcement d, d*d Prover/ Verifier Verifier Verifier/ Prover Prover Scheduler (Open Data)
  • 19. III. Proof System for ICT Resilience 03.08.16 Privacy with Secondary Use of Personal Information 19 In practice: Inevitable vulnerability by dependencies Safe information accountability ⇒ Zero-Knowledge Proof on origin of vulnerability Natural Language Policy High-Level Policy Language Intermediate-Level Security Policy Flow Graph Low-Level Enforcement d, d*d Prover/ Verifier Verifier Verifier/ Prover Prover Scheduler (Open Data) sec d, d* sec d, d* sec d, d* Knowledge extractor Knowledge extractor Knowledge extractor Ground Truth with sec d, d* Zero-Knowledge Proof (ZKP) • Probabilistic proof system between 2 parties on graph isomorphism • No additional knowledge for the verifier on original graph • ICT Resilience: obligations + witnesses + compensation ⟼ Open Data Prover Verifier 1. t random, a:=gt 2. a 3. c random out of {0,1} 4. c 5. r:=t + cm mod q 6. r 7. Check if gr = ahc pkVerifier := (p, q, g, h) pkVerifier := (p, q, g, h) ChallengeResponse Goldwasser et al. 1989, Bellare and Goldreich 1993
  • 20. III. Proof System for ICT Resilience 03.08.16 Privacy with Secondary Use of Personal Information 20 In practice: Inevitable vulnerability by dependencies Safe information accountability ⇒ Zero-Knowledge Proof on origin of vulnerability Natural Language Policy High-Level Policy Language Intermediate-Level Security Policy Flow Graph Low-Level Enforcement d, d*d Prover/ Verifier Verifier Verifier/ Prover Prover Scheduler (Open Data) sec d, d* sec d, d* sec d, d* Knowledge extractor Knowledge extractor Knowledge extractor Ground Truth with sec d, d*
  • 21. Scheduler: Global AAA(A) Service 03.08.16 Privacy with Secondary Use of Personal Information 21 Open Internet Standard RFC 2904 AAA Authorization Framework 1: Authentication 2: Authorization 3: Accounting + Witness for Information Accountability 4: Accountability Data consumer/ provider Data consumer/ provider Data consumer/ providerAAA(A) service Scheduler sec d, d* sec d, d* sec d, d*
  • 22. Scheduler: Reliable Broadcast 03.08.16 Privacy with Secondary Use of Personal Information 22 Self-organized consensus by cryptography Data consumer/ provider Data consumer/ provider Data consumer/ provider sec d, d* … sec d, d* sec d, d* • Users check users (Users as “miner“ check transactions and get reward) Nakamoto 2009 • Block chain for safe public directory with eCoin for risk compensation Scheduler
  • 23. Witness: Authorization 03.08.16 Privacy with Secondary Use of Personal Information 23 • Completeness: Non-linkable delegation of rights • Soundness: Cryptographic protocols (ISO/IEC JTC 1/SC 27 WG2) Ground Truth: ISO/IEC 24761 ACBio – Biometrics with PKI Data provider Data consumer/ provider Data consumer/ providerAAA(A) service Scheduler d Data consumer/ provider Sonehara, Echizen, and Wohlgemuth 2011
  • 24. Witness: Authorization 03.08.16 Privacy with Secondary Use of Personal Information 24 • Completeness: Non-linkable delegation of rights • Soundness: Cryptographic protocols (ISO/IEC JTC 1/SC 27 WG2) Ground Truth: ISO/IEC 24761 ACBio – Biometrics with PKI Data provider Data consumer/ provider Data consumer/ providerAAA(A) service Scheduler d Data consumer/ provider Issuer: Public Key: Attributes: Ground Truth ZKP on Xa23 r,w, own on d Delegation, Purpose, … Credential of data subject Sonehara, Echizen, and Wohlgemuth 2011
  • 25. Sonehara, Echizen, and Wohlgemuth 2011 Witness: Authorization 03.08.16 Privacy with Secondary Use of Personal Information 25 • Completeness: Non-linkable delegation of rights • Soundness: Cryptographic protocols (ISO/IEC JTC 1/SC 27 WG2) Ground Truth: ISO/IEC 24761 ACBio – Biometrics with PKI Data provider Data consumer/ provider Data consumer/ providerAAA(A) service Scheduler d Data consumer/ provider Issuer: Public Key: Attributes: Ground Truth ZKP on Xa23 r,w, own on d Delegation, Purpose, … Credential of data subject Issuer: Public Key: Attributes: Miner ZKP on Xa23 r on d Delegation to helper, medical, Time, Price … Credential on d Issuer: Public Key: Attributes: Miner ZKP on Xa23 r on d* Delegation to logistics, transport, Time, Price,… Credential on d*
  • 26. Witness: Accountability 03.08.16 Privacy with Secondary Use of Personal Information 26 • Completeness: User’s data provenance with asymmetric fingerprinting • Soundness: Users’ cryptographic commitment on data processing Ground Truth: ISO/IEC 24761 ACBio – Biometrics with PKI Data provider Data consumer/ provider Data consumer/ providerAAA(A) service Scheduler d Data consumer/ provider d Refugee Ground Truth Wohlgemuth, Echizen, Sonehara, and Müller 2010
  • 27. Witness: Accountability 03.08.16 Privacy with Secondary Use of Personal Information 27 • Completeness: User’s data provenance with asymmetric fingerprinting • Soundness: Users’ cryptographic commitment on data processing Ground Truth: ISO/IEC 24761 ACBio – Biometrics with PKI d Data provider Data consumer/ provider Data consumer/ providerAAA(A) service Scheduler d Data consumer/ provider d Refugee Ground Truth d Refugee Ground Truth Helper Wohlgemuth, Echizen, Sonehara, and Müller 2010
  • 28. Witness: Accountability 03.08.16 Privacy with Secondary Use of Personal Information 28 • Completeness: User’s data provenance with asymmetric fingerprinting • Soundness: Users’ cryptographic commitment on data processing Ground Truth: ISO/IEC 24761 ACBio – Biometrics with PKI d d* Data provider Data consumer/ provider Data consumer/ providerAAA(A) service Scheduler d Data consumer/ provider d Refugee Ground Truth d Refugee Ground Truth Helper d* Refugee Ground Truth Logistics Wohlgemuth, Echizen, Sonehara, and Müller 2010
  • 29. Knowledge Extractor: Accounting 03.08.16 Privacy with Secondary Use of Personal Information 29 • Reduce error probability by different witnesses on users d, d*d Prover/ Verifier Verifier Verifier/ Prover Prover trust rights cert data provenance rec delegation of rights conf benchmarking comp profit sharing • Probabilistic logical statement on safety from user‘s view (on a PKI) AAA(A) service Scheduler AutDC,DPd ? AutDC,DPd, d* ?AutDP, DCd, d* ? AutDP, DCd, d*, d** ? adapted from Maurer 1996, Wohlgemuth 2015
  • 30. Knowledge Extractor: Accounting 03.08.16 Privacy with Secondary Use of Personal Information 30 • Reduce error probability by different witnesses on users d, d*d Prover/ Verifier Verifier Verifier/ Prover Prover trust rights cert data provenance rec delegation of rights conf benchmarking comp profit sharing • Probabilistic logical statement on safety from user‘s view (on a PKI) ICT Resilience = Completeness + Soundness ICT Resilience = Informational self-determination + Compliance AAA(A) service Scheduler AutDC,DPd ? AutDC,DPd, d* ?AutDP, DCd, d* ? AutDP, DCd, d*, d** ?
  • 31. IV. Looking for Partners! 03.08.16 Privacy with Secondary Use of Personal Information 31 Challenge: Creating a Sustainable Society Multilateral Security IoT Integrated Society Data consumer/ provider Data consumer/ provider Data consumer/ provider sec d, d* … sec d, d* sec d, d* Scheduler Resilient Risk Assessment (RA1) Resilient ICT Services (RA2) Resilient ICT Infrastructure (RA3) Technical Human Legal et al. Privacy by Design