Privacy in Data Service Composition

01/03/2020
by   Mahmoud Barhamgi, et al.
0

In modern information systems different information features, about the same individual, are often collected and managed by autonomous data collection services that may have different privacy policies. Answering many end-users' legitimate queries requires the integration of data from multiple such services. However, data integration is often hindered by the lack of a trusted entity, often called a mediator, with which the services can share their data and delegate the enforcement of their privacy policies. In this paper, we propose a flexible privacy-preserving data integration approach for answering data integration queries without the need for a trusted mediator. In our approach, services are allowed to enforce their privacy policies locally. The mediator is considered to be untrusted, and only has access to encrypted information to allow it to link data subjects across the different services. Services, by virtue of a new privacy requirement, dubbed k-Protection, limiting privacy leaks, cannot infer information about the data held by each other. End-users, in turn, have access to privacy-sanitized data only. We evaluated our approach using an example and a real dataset from the healthcare application domain. The results are promising from both the privacy preservation and the performance perspectives.

READ FULL TEXT

page 2

page 4

page 5

page 6

page 7

page 9

page 10

page 13

research
11/09/2020

Privacy-Preserving XGBoost Inference

Although machine learning (ML) is widely used for predictive tasks, ther...
research
01/09/2019

Data Querying and Access Control for Secure Multiparty Computation

In the Internet of Things and smart environments data, collected from di...
research
09/09/2019

A Privacy-Preserving Longevity Study of Tor's Hidden Services

Tor and hidden services have emerged as a practical solution to protect ...
research
12/19/2018

Preventing Attacks on Anonymous Data Collection

Anonymous data collection systems allow users to contribute the data nec...
research
07/08/2021

Zeph: Cryptographic Enforcement of End-to-End Data Privacy

As increasingly more sensitive data is being collected to gain valuable ...
research
02/09/2023

Practical Privacy Preservation in a Mobile Cloud Environment

The proliferation of smartphone devices has led to the emergence of powe...
research
07/05/2022

Challenges in Adapting ECH in TLS for Privacy Enhancement over the Internet

Security and Privacy are crucial in modern Internet services. Transport ...

Please sign up or login with your details

Forgot password? Click here to reset