Towards General-purpose Infrastructure for Protecting Scientific Data Under Study

10/04/2021
by   Andrew Trask, et al.
0

The scientific method presents a key challenge to privacy because it requires many samples to support a claim. When samples are commercially valuable or privacy-sensitive enough, their owners have strong reasons to avoid releasing them for scientific study. Privacy techniques seek to mitigate this tension by enforcing limits on one's ability to use studied samples for secondary purposes. Recent work has begun combining these techniques into end-to-end systems for protecting data. In this work, we assemble the first such combination which is sufficient for a privacy-layman to use familiar tools to experiment over private data while the infrastructure automatically prohibits privacy leakage. We support this theoretical system with a prototype within the Syft privacy platform using the PyTorch framework.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
09/24/2020

Practical Aspect of Privacy-Preserving Data Publishing in Process Mining

Process mining techniques such as process discovery and conformance chec...
research
06/21/2022

The Privacy Onion Effect: Memorization is Relative

Machine learning models trained on private datasets have been shown to l...
research
07/08/2021

Zeph: Cryptographic Enforcement of End-to-End Data Privacy

As increasingly more sensitive data is being collected to gain valuable ...
research
04/02/2019

Data Disclosure under Perfect Sample Privacy

Perfect data privacy seems to be in fundamental opposition to the econom...
research
09/16/2023

New Privacy Mechanism Design With Direct Access to the Private Data

The design of a statistical signal processing privacy problem is studied...
research
11/17/2020

Privug: Quantifying Leakage using Probabilistic Programming for Privacy Risk Analysis

Disclosure of data analytics has important scientific and commercial jus...
research
09/22/2018

Understanding Tor Usage with Privacy-Preserving Measurement

The Tor anonymity network is difficult to measure because, if not done c...

Please sign up or login with your details

Forgot password? Click here to reset