privacy laws and pervasive sensing big data forever
play

Privacy laws and pervasive sensing / big data: forever - PowerPoint PPT Presentation

Privacy laws and pervasive sensing / big data: forever incommensurate? Trusted Personal Data Management Panel, TdW Conference Max Mhlhuser Technische Universitt Darmstadt Information Self-Determination EU Charter of fundamental rights:


  1. Privacy laws and pervasive sensing / big data: forever incommensurate? Trusted Personal Data Management Panel, TdW Conference Max Mühlhäuser Technische Universität Darmstadt

  2. Information Self-Determination EU Charter of fundamental rights: Art. 8: Protection of personal data Everyone has the right to the protection of personal data concerning him or her. Such data must be processed fairly for specified purposes and on the basis of the consent of the person concerned or some other legitimate basis laid down by law Everyone has the right of access to data which has been collected concerning him or her, and the right to have it rectified. Compliance with these rules shall be subject to control by an independent authority. anonymization data thrift TK Research Portfolio 2

  3. Big Data Incommensurate w/ Data Thrift Two of the ‘big data’ principles: collect more data 1 && don’t throw any data away 2 Why? Just two examples (given by Prof. Mark Whitehorn, Univ. Dundee 2 ): “Even information which might seem insignificant, can be incredibly useful with the correct use. Google decided to keep all the information from users’ spelling mistakes … They looked into what was typed and what the user was trying to say. … they have established that they can still direct users to where they want to go… They have effectively created the most powerful spellchecker in the world just by using data that others would have thrown away .” “When you put your PIN into a cash machine, you put it in at a very precise speed because you know it. If someone steals your card, they’re highly unlikely to enter it at a similar speed so banks can use this as a further method of authentication.” 1: S. Nelson: 10 Tips for Better Big Data Analysis, cf. http://www.dummies.com/how-to/content/10-tips-for-better-big-data-analysis.html 2: C. Bailey, Blog about Big Data Summit 2012, cf. http://christianbailey.net/uncategorized/dont-throw-any-data-away/ TK Research Portfolio 3

  4. The Data Anonymization Myth  Privacy Laws are about PII (Personally Identifiable Information)  Prof. Anind Narayanan (Princeton U) 1 :  Priv. laws: “scrub ‘PII’ in a way that prevents the possibility of re-identification ”  Anind: “… essentially impossible … in a foolproof way w/o losing the utility of the data”  Consequence:  privacy is not an issue of data but of data processing!!  needed: trusted data store + well-controlled interface + case-based rules interface trusted (?) data store 1: Privacy and Security: Myths and Fallacies of “Personally Identifiable Information” . CACM 53 (6), 2010, pp. 23-25 TK Research Portfolio 4

  5. Sensor Data: The End of Privacy?  many, many, many devices …  … collecting data that is considered “non - PII”  … but that can be linked (today, tomorrow)  … often concerns by-passers (consent illusionary!)  … and that is stored @ zillions of systems TK Research Portfolio 5

  6. Dilemma summary = discussion base • data • collect thrift ‘everything’ privacy big • anonymi - • don’t throw zation away protect. data laws needs a n o n y - u b i q u i - m i z a t i o n t o u s  • data • PII unknown f a l l a c y s e n s i n g processing up front • trusted data • consent holder infeasible TK Research Portfolio 6

  7. THANK YOU! TK Research Portfolio 7

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend