Constructing Independently Verifiable Privacy-Compliant Type Systems for Message Passing between Black-Box Components

01/30/2019
by   Robin Adams, et al.
0

Privacy by design (PbD) is the principle that privacy should be considered at every stage of the software engineering process. It is increasingly both viewed as best practice and required by law. It is therefore desirable to have formal methods that provide guarantees that certain privacy-relevant properties hold. We propose an approach that can be used to design a privacy-compliant architecture without needing to know the source code or internal structure of any individual component. We model an architecture as a set of agents or components that pass messages to each other. We present in this paper algorithms that take as input an architecture and a set of privacy constraints, and output an extension of the original architecture that satisfies the privacy constraints.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
12/09/2022

Lower Bounds for Rényi Differential Privacy in a Black-Box Setting

We present new methods for assessing the privacy guarantees of an algori...
research
09/17/2020

A type language for message passing component-based systems

Component-based development is challenging in a distributed setting, for...
research
06/09/2021

Single-Server Private Linear Transformation: The Individual Privacy Case

This paper considers the single-server Private Linear Transformation (PL...
research
12/19/2020

Privacy Analysis and Evaluation Policy of Blockchain-based Anonymous Cryptocurrencies

In blockchain-based anonymous cryptocurrencies, due to their tamper-resi...
research
12/15/2018

A General Approach to Adding Differential Privacy to Iterative Training Procedures

In this work we address the practical challenges of training machine lea...
research
03/26/2019

Tool Support of Formal Methods for Privacy by Design

Formal methods are, in principle, suited for supporting the recent parad...
research
03/21/2019

Repairing mappings under policy views

The problem of data exchange involves a source schema, a target schema a...

Please sign up or login with your details

Forgot password? Click here to reset