Is Privacy Still an Issue for Data Mining? Chris Clifton 11 October, 2007

Similar documents
Privacy-Preserving Collaborative Recommendation Systems Based on the Scalar Product

Pan-Canadian Trust Framework Overview

Presentation Outline

Towards a Modern Approach to Privacy-Aware Government Data Releases

Towards Health Data Democracy

FUNDING DUE DILIGENCE WHAT YOUR INVESTORS NEED YOU TO KNOW ABOUT COMPLIANCE. May 26, 2010

UX Aspects of Threat Information Sharing

IMPORTANT ASPECTS OF DATA MINING & DATA PRIVACY ISSUES. K.P Jayant, Research Scholar JJT University Rajasthan

The Use of Commercial Databases for National Security: Privacy, Evaluation, and Accuracy

Privacy-preserving Multiparty Collaborative Mining with Geometric Data Perturbation

Protection of Privacy Policy

8 Executive summary. Intelligent Software Agent Technologies: Turning a Privacy Threat into a Privacy Protector

Privacy engineering, privacy by design, and privacy governance

Decentralisation, i.e. Internet for Social Good

Analysing Megatrends to Better shape the future of Tourism

Standards and privacy engineering ISO, OASIS, PRIPARE and Other Important Developments

Enabling Trust in e-business: Research in Enterprise Privacy Technologies

CONSENT IN THE TIME OF BIG DATA. Richard Austin February 1, 2017

Executive Summary Industry s Responsibility in Promoting Responsible Development and Use:

Knowledge Brokerage Tools for Sustainable Food Planning. Dirk M Wascher Alterra Wageningen UR

KKR Credit Advisors (Ireland) Unlimited Company PILLAR 3 DISCLOSURES

Abstracts. Cryptography, Cyber Security and Information Warfare. (3rd CryCybIW) 3 rd International Conference on. Hellenic Military Academy

LAW ON TECHNOLOGY TRANSFER 1998

Dependable AI Systems

Emerging Transportation Technology Strategic Plan for the St. Louis Region Project Summary June 28, 2017

The BGF-G7 Summit Report The AIWS 7-Layer Model to Build Next Generation Democracy

Canadian Health Food Association. Pre-budget consultations in advance of the 2018 budget

Violent Intent Modeling System

the Companies and Intellectual Property Commission of South Africa (CIPC)

PROTECTION GOALS FOR PRIVACY ENGINEERING

FIPPs Fair Information Practice Principles

Chapter 30: Game Theory

Global citizenship at HP. Corporate accountability and governance. Overarching message

Data Protection and Ethics in Healthcare

Growing Positive Perceptions DIFFERENTIATION. Creating Wants

Big Data, privacy and ethics: current trends and future challenges

Evolution of Research Consortia Increasing Clinical Focus

Efficient Privacy-Preserving Biometric Identification

Making Identity Use Predictable. UNCITRAL Colloquium on Identity Management and Trust Services 21 April, 2016

Privacy by Design: Research and Action. Deirdre K. Mulligan

Data Protection and Privacy in a M2M world. Yiannis Theodorou, Regulatory Policy Manager GSMA Latam Plenary Peru, November 2013

Intellectual Property and Technology Transfer

Draft executive summaries to target groups on industrial energy efficiency and material substitution in carbonintensive

SMART CITY VNPT s APPROACH & EXPERIENCE. VNPT Group

Ethics Review Data Sharing Bridging Legal Environments

CRIRSCO and evolving international accounting standards: IFRSs

Privacy Policy SOP-031

Indiana Jones and the Raiders of the Lost RFID Tag

Mr. Alain Schoenenberger

Multi-level third space for systemic urban research and innovation

12 April Fifth World Congress for Freedom of Scientific research. Speech by. Giovanni Buttarelli

Privacy by Design. Deirdre K. Mulligan

Responsible Data Use Policy Framework

Controlling and Disclosing your Personal Information

Location Disclosure. Alex Endert Usable Security CS 6204 Fall, 2009 Dennis Kafura Virginia Tech

SUSTAINABILITY MATERIALITY OVERVIEW

Foresight for Canadian Animal Health. Shane Renwick DVM MSc Canadian Food Inspection Agency (CFIA)

Online Social Networks As Supporting Evidence: A Digital Forensic Investigation Model and Its Application Design

What is Proof of Stake?

DIMACS/PORTIA Workshop on Privacy Preserving

Rosatom Approach to IPR Management in Collaborative Projects on Innovations

Latin-American non-state actor dialogue on Article 6 of the Paris Agreement

Integrating Fundamental Values into Information Flows in Sustainability Decision-Making

EXPLORATION DEVELOPMENT OPERATION CLOSURE

Metrology in the Digital Transformation

Biometric Data, Deidentification. E. Kindt Cost1206 Training school 2017

SETTING UP YOUR OWN LEGAL BUSINESS

REWE Group Detox Program

CODE OF CONDUCT. STATUS : December 1, 2015 DES C R I P T I O N. Internal Document Date : 01/12/2015. Revision : 02

The Overview. Our Idea

Interoperable systems that are trusted and secure

PRACTICAL MAGIC WITH THE SOCIAL SECURITY DEATH MASTER FILE

So, who are we? For more information on us and the company, look at our website &

Workshop on anonymization Berlin, March 19, Basic Knowledge Terms, Definitions and general techniques. Murat Sariyar TMF

Raw materials topics in Horizon 2020 Societal Challenge 5 Work Programme 2016

Where am I? Plane Mirrors

MULTIPLE SCENARIOS FOR PRIVATE-SECTOR USE OF RFID

Principles for the Networked World

Written response to the public consultation on the European Commission Green Paper: From

Littoral Operations Center Overview. OpTech East 1 December 2015

Advisor Practice Management Checklist Practice management checklist for financial advisor use only Based on the book Guerrilla Marketing For

Our position. ICDPPC declaration on ethics and data protection in artificial intelligence

Comments from CEN CENELEC on COM(2010) 245 of 19 May 2010 on "A Digital Agenda for Europe"

Careers in Mathematics

Artificial intelligence and judicial systems: The so-called predictive justice

Trusted Data Intermediaries

On the Economics of Synthetic Biology: Is Openness Feasible?

IoT in Health and Social Care

Introduction. Privacy vs. need for credentials Privacy vs. desire for free expression Privacy vs. safety / security 1-2

3D Printing: Addressing the New Dimension in Brand and IP Infringement

Ensuring Adequate Policies and Resources for the 2020 Census

Alberto Di Minin Trieste, The Macro-Regional Innovation Week September 2016

Privacy. New technologies, same responsibilities. Carole Fleeman Office of the Victorian Privacy Commissioner

Webinar Module Eight: Companion Guide Putting Referrals Into Action

Introduction. Data Source

Memorandum on the long-term accessibility. of digital information in Germany

Privacy and the EU GDPR US and UK Privacy Professionals

Systematic Privacy by Design Engineering

National Intellectual property center of Georgia SAKPATENTI.

TENTATIVE REFLECTIONS ON A FRAMEWORK FOR STI POLICY ROADMAPS FOR THE SDGS

Transcription:

Is Privacy Still an Issue for Data Mining? Chris Clifton 11 October, 2007

Privacy-Preserving Data Mining: History 2000: First PPDM papers Srikant&Agrawal: Perturbation Lindell&Pinkas: Secure Multiparty Computation Both assumed horizontal partitioning of data 2002: Previous NGDM First solution for vertical partitioning First workshop on privacy-preserving data mining 2003: ICDM Best Paper showed issues with multivariate perturbation Today: Many solutions SMC, rotation, perturbation Implementations No practice?

When Does this Hit the Mainstream? Data Mining moves FAST VLDB 94 Fast association rule mining Intelligent Miner for Data 1995? Has PPDM missed the boat?

What does PPDM Need? Understand the problem What is privacy? What is the problem with data mining? Did it go away when the Data Mining Moratorium Act of 2003 died? Find a market for the technology Privacy is good But confidentiality pays

What is Privacy? It s all about Individually Identifiable Data Standard in nearly all privacy laws But not yet clearly defined Ongoing research in anonymity Data Mining developments exacerbate the problem Text mining Social networks Multirelational data mining New research challenges!

Alternate Privacy Notions Range / approximate value True encryption / multiple-message indistinguishability Probing Plausible deniability Libel legal standards Possible worlds scenarios Probabilistic possible worlds Threat models Identity theft Blackmail / ruin political campaign Embarrassment Trust Legal Law enforcement / government

Kevin Du Understanding privacy Different techniques use different ways to quantify privacy No way to compare What us unified notion of privacy? Threat models Identity theft Blackmail / ruin political campaign Embarrassment Trust Legal Law enforcement / government Annie Anton?

The Real Problem: Misuse Misuse doesn t require data mining High profile cases from disclosure of raw data, not data mining Is data mining a privacy red herring? Problem: Data Mining is why the data is there to be misused Example: CardSystems saved data for analysis Without data mining, no need for data Privacy-Preserving Data Mining can help!

Reduced Risk Marketing PPDM as Misuse Protection No data warehouse to be protected Cost savings to offset PPDM cost Lowered risk of disclosure Lower cost of handling disclosure Better data better data mining results Studies show people willing to give better data if privacy protected

Misunderstanding Data Mining can Lead to Misuse Data Mining Reporting Act of 2007: An assessment of the efficacy or likely efficacy of the data mining activity in providing accurate information consistent with and valuable to the stated goals and plans for the use or development of the data mining activity. Research Agenda Confidence bounds On particular prediction, not average Limits on learning

Marketing PPDM as Collaboration Technology Work in Secure Supply Chain gaining traction Optimize supply chain without losing competitive advantage Shared model development using confidential data True Need to know Share knowledge, not data Prove need without disclosing reasons

Challenges with Secure Multiparty Communication for Collaboration Most work under semi-honest model If you trust your partners, why not just share data? Extension to malicious model expensive And still not enough Other models Incentive-compatible Auditable

Next Generation of Privacy-Preserving Data Mining Understanding Privacy Beyond Individually Identifiable Data Research supporting profitable use Controlling disclosure risk/cost Collaboration without Disclosure Incentives Understanding data mining benefit Limits on learning Confidence in outcomes