Upgrade to Pro — share decks privately, control downloads, hide ads and more …

Open Universiteit

Marketing OGZ
September 15, 2023
93

Open Universiteit

Marketing OGZ

September 15, 2023
Tweet

Transcript

  1. Privacy by design Challenges and Opportunities using Privacy Enhancing Technology

    (PET) Yanick Dols Ecosystem Developer at Brightlands Fabian van den Broek Assistant Professor at Open University
  2. Brightlands A Limburg initiative for a sustainable and healthy future

    Stimulate innovation Create employment Attracting and retaining talent Boosting the Limburg economy
  3. From four innovation campuses we look for solutions for tomorrow

    that already lead to opportunities today Sittard-Geleen Brightlands Chemelot Campus Smart materials Sustainable production of chemicals Maastricht Brightlands Health Campus Regenerative medicine Precision medicine Innovative diagnostics Venlo Brightlands Greenport Campus Food Healthy nutrition Heerlen Brightlands Smart Services Campus Data science Smart services
  4. We combine on our campus science, entrepreneurship, talent and state-of-the-art

    facilities Offices & Facilities Innovation & Research Talent & Education Public sector Citizens Entrepreneur s Knowledge institutes
  5. You learn and innovate on a specific theme with our

    business and knowledge partners ESG reporting Poverty & debt Admin tech Smart public services Energy transition Climate change Fraud detection Digital identity HR tech Sustainable homes Digital inclusion Customer interaction Businesspartners Themes Knowledge Partners
  6. WE WORK WITH SEVERAL Artificial Intelligence Synthetic data Multi Party

    Computing DISRUPTIVE TECHNOLOGIES Blockchain Self Sovereign Identity Quantum Computing
  7. security problems privacy problems 1. e-mail scam 2. account take-over

    by criminal 3. Google employee spying on your e-mail 3
  8. security problems privacy problems 1. e-mail scam 2. account take-over

    by criminal 3. Google employee spying on your e-mail 4. profiling by Google based on your e-mail 4
  9. security problems for Google privacy problems for users 1. e-mail

    scam 2. account take-over by criminal 3. Google employee spying on your e-mail 4. profiling by Google based on your e-mail security problems for users
  10. security problems for Google privacy problems for users 1. e-mail

    scam 2. account take-over by criminal 3. Google employee spying on your e-mail 4. profiling by Google based on your e-mail 5. cryptominer on Google’s servers security problems for users 5
  11. 1. e-mail scam 2. account take-over by criminal 3. Google

    employee spying on your e-mail 4. profiling by Google based on your e-mail 5. cryptominer on Google’s servers security problems privacy problems
  12. 1. e-mail scam 2. account take-over by criminal 3. Google

    employee spying on your e-mail 4. profiling by Google based on your e-mail 5. cryptominer on Google’s servers different attacks & different attackers
  13. 1. e-mail scam 2. account take-over by criminal 3. Google

    employee spying on your e-mail 4. profiling by Google based on your e-mail 5. cryptominer on Google’s servers different goals
  14. 1. e-mail scam 🡪 finances 2. account take-over by criminal

    🡪 authenticity/integrity 3. Google employee spying on your e-mail 🡪 privacy / confidentiality 4. profiling by Google based on your e-mail 🡪 privacy / autonomy 5. cryptominer on Google’s servers 🡪 computation cycles
  15. 1. e-mail scam 2. account take-over by criminal 3. Google

    employee spying on your e-mail 4. profiling by Google based on your e-mail 5. cryptominer on Google’s servers How to compare or value these?
  16. good for security property Y that party A & B

    care about assuming attacker model E bad for security property Y’ that A & C care about assuming attacker model E’ good for security property X of party A assuming attacker model E’ bad for privacy property X of party B good for privacy property Z’ of party B bad for societal concern Z’’ design space
  17. security requirement Y detecting abuse usability • for users &

    customers • for organisation • for sys-admins • for software developers cost security requirement X revocation non-repudiation anonymity privacy requirement Z repudiation benefits
  18. Do not despair…. • Security is hard… • Privacy is

    (often) harder… • But, you have to do it. By design.
  19. Many different PETs • Zero knowledge proofs (ZKP) • Attribute-based

    Credentials (ABC) • Fully Homomorphic Encryption (FHE) • Multi-Party Computation (MPC) • Federated Learning (FL) • Differential Privacy (DP) • ….
  20. Many different PETs • Zero knowledge proofs (ZKP) • Attribute-based

    Credentials (ABC) • Fully Homomorphic Encryption (FHE) • Multi-Party Computation (MPC) • Federated Learning (FL) • Differential Privacy (DP) • ….
  21. Zero-Knowledge Proofs (ZKP) Proof knowledge of a certain value, without

    revealing it • Pick a card from a randomized deck • Prove the color of the card (red/black), without revealing anything else
  22. ZKP

  23. ZKP ABC Attribute-based credentials (ABC) • Proof ‘attributes’ of yourself

    • Name, birthdate, bloodtype, etc. • Without revealing anything else
  24. ZKP ABC Attribute-based credentials (ABC) • Proof ‘attributes’ of yourself

    • Name, birthdate, bloodtype, etc. • Without revealing anything else
  25. Multi-Party Computation • Allow multiple parties to compute something together

    • Each party has their own input • No party learns the input of other parties • The result can be shared, or individualized