Local Personal Data Processing with Third Party Code and Bounded Leakage

被引:1
|
作者
Carpentier, Robin [1 ,2 ]
Popa, Iulian Sandu [1 ,2 ]
Anciaux, Nicolas [1 ,2 ]
机构
[1] Univ Versailles St Quentin En Yvelines, Versailles, France
[2] Inria Saclay Ile de France, Palaiseau, France
来源
PROCEEDINGS OF THE 11TH INTERNATIONAL CONFERENCE ON DATA SCIENCE, TECHNOLOGY AND APPLICATIONS (DATA) | 2022年
关键词
Personal Data Management Systems; User Defined Functions; Bounded Leakage;
D O I
10.5220/0011321900003269
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Personal Data Management Systems (PDMSs) provide individuals with appropriate tools to collect, manage and share their personal data under control. A founding principle of PDMSs is to move the computation code to the user's data, not the other way around. This opens up new uses for personal data, wherein the entire personal database of the individuals is operated within their local environment and never exposed outside, but only aggregated computed results are externalized. Yet, whenever arbitrary aggregation function code, provided by a third-party service or application, is evaluated on large datasets, as envisioned for typical PDMS use-cases, can the potential leakage of the user's personal information, through the legitimate results of that function, be bounded and kept small? This paper aims at providing a positive answer to this question, which is essential to demonstrate the rationale of the PDMS paradigm. We resort to an architecture for PDMSs based on Trusted Execution Environments to evaluate any classical user-defined aggregate PDMS function. We show that an upper bound on leakage exists and we sketch remaining research issues.
引用
收藏
页码:520 / 527
页数:8
相关论文
共 50 条
  • [1] 'A third party to whom data are disclosed': A third group among those processing data
    Aparicio Salom, Javier
    INTERNATIONAL DATA PRIVACY LAW, 2014, 4 (03) : 177 - 188
  • [2] Personal data strategies in digital advertising: Can first-party data outshine third-party data?
    Ham, Minjeong
    Lee, Sang Woo
    INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT, 2025, 80
  • [3] Mobile Applications: Analyzing Private Data Leakage Using Third Party Connections
    Kumar, Pradeep
    Singh, Maninder
    2015 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2015, : 57 - 62
  • [4] Control of Our Personal Data in the Big Data Era: The Case of Third Party Web Tracking
    Gonzalez Guerrero, Laura Daniela
    REVISTA ESTUDIOS SOCIO-JURIDICOS, 2019, 21 (01): : 209 - 244
  • [5] "KEEP TO THE CODE": A GLOBAL CODE OF CONDUCT FOR THIRD-PARTY FUNDERS
    Sahani, Victoria Shannon
    BOSTON UNIVERSITY LAW REVIEW, 2022, 102 (07) : 2331 - 2388
  • [6] Identifying, Prioritizing and Evaluating Vulnerabilities in Third Party Code
    Cobleigh, Alexander
    Hell, Martin
    Karlsson, Linus
    Reimer, Oscar
    Sonnerup, Jonathan
    Wisenhoff, Daniel
    2018 IEEE 22ND INTERNATIONAL ENTERPRISE DISTRIBUTED OBJECT COMPUTING CONFERENCE WORKSHOPS (EDOCW 2018), 2018, : 208 - 211
  • [7] Leakage of Sensitive Information to Third-Party Voice Applications
    Bispham, Mary
    Zard, Clara
    Sattar, Suliman
    Ferrer-Aran, Xavier
    Suarez-Tangil, Guillermo
    Such, Jose
    PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON CONVERSATIONAL USER INTERFACES, CUI 2022, 2022,
  • [8] AppMonitor: restricting information leakage to third-party applications
    Nemi Chandra Rathore
    Somanath Tripathy
    Social Network Analysis and Mining, 2020, 10
  • [9] AppMonitor: restricting information leakage to third-party applications
    Rathore, Nemi Chandra
    Tripathy, Somanath
    SOCIAL NETWORK ANALYSIS AND MINING, 2020, 10 (01)
  • [10] Enhanced Protection of Ecommerce Users' Personal Data and Privacy using the Trusted Third Party Model
    Kangwa, Mukuka
    Lubobya, Charles S.
    Phiri, Jackson
    PROCEEDINGS OF THE 18TH INTERNATIONAL CONFERENCE ON E-BUSINESS (ICE-B), 2021, : 116 - 126