Privacy by design
Challenges and Opportunities using
Privacy Enhancing Technology (PET)
Yanick Dols
Ecosystem Developer at Brightlands
Fabian van den Broek
Assistant Professor at Open University
Slide 2
Slide 2 text
Yanick Dols
Ecosystem Developer at Brightlands
Smart Services Campus
Slide 3
Slide 3 text
Brightlands
A Limburg initiative for
a sustainable and
healthy future
Stimulate innovation
Create employment
Attracting and retaining talent
Boosting the Limburg economy
Slide 4
Slide 4 text
From four innovation campuses we look for solutions for
tomorrow that already lead to opportunities today
Sittard-Geleen
Brightlands
Chemelot Campus
Smart materials
Sustainable production of chemicals
Maastricht
Brightlands
Health Campus
Regenerative medicine
Precision medicine
Innovative diagnostics
Venlo
Brightlands
Greenport Campus
Food
Healthy nutrition
Heerlen
Brightlands
Smart Services Campus
Data science
Smart services
Knowledge crossing borders
Geographically, organizationally and scientifically
Slide 7
Slide 7 text
No content
Slide 8
Slide 8 text
We encourage close
cooperation between
entrepreneurship,
science and
governments
Entrepreneurs
hip
Public
sector
Knowledge
institutes
Brightlands
Slide 9
Slide 9 text
We combine on our
campus science,
entrepreneurship,
talent and
state-of-the-art
facilities
Offices
& Facilities
Innovation
& Research
Talent &
Education
Public
sector
Citizens
Entrepreneur
s
Knowledge
institutes
Slide 10
Slide 10 text
No content
Slide 11
Slide 11 text
You learn and innovate on a specific theme
with our business and knowledge partners
ESG
reporting
Poverty
& debt
Admin
tech
Smart public
services
Energy
transition
Climate
change
Fraud
detection
Digital
identity
HR
tech
Sustainable
homes
Digital
inclusion
Customer
interaction
Businesspartners Themes
Knowledge Partners
Slide 12
Slide 12 text
WE WORK WITH SEVERAL
Artificial
Intelligence
Synthetic
data
Multi Party
Computing
DISRUPTIVE TECHNOLOGIES
Blockchain Self Sovereign
Identity
Quantum
Computing
Slide 13
Slide 13 text
Fabian van den Broek
Assistant Professor at Open University
Slide 14
Slide 14 text
security privacy
the Security vs. Privacy debate
security
privacy
security problems privacy problems
1. e-mail scam
2. account take-over by criminal
3. Google employee spying on your e-mail
3
Slide 20
Slide 20 text
security problems privacy problems
1. e-mail scam
2. account take-over by criminal
3. Google employee spying on your e-mail
4. profiling by Google based on your e-mail
4
Slide 21
Slide 21 text
security problems for
Google
privacy problems for users
1. e-mail scam
2. account take-over by criminal
3. Google employee spying on your e-mail
4. profiling by Google based on your e-mail
security problems
for users
Slide 22
Slide 22 text
security problems for
Google
privacy problems for users
1. e-mail scam
2. account take-over by criminal
3. Google employee spying on your e-mail
4. profiling by Google based on your e-mail
5. cryptominer on Google’s servers
security problems
for users
5
Slide 23
Slide 23 text
1. e-mail scam
2. account take-over by criminal
3. Google employee spying on your e-mail
4. profiling by Google based on your e-mail
5. cryptominer on Google’s servers
security problems privacy problems
Slide 24
Slide 24 text
1. e-mail scam
2. account take-over by criminal
3. Google employee spying on your e-mail
4. profiling by Google based on your e-mail
5. cryptominer on Google’s servers
different attacks & different attackers
Slide 25
Slide 25 text
1. e-mail scam
2. account take-over by criminal
3. Google employee spying on your e-mail
4. profiling by Google based on your e-mail
5. cryptominer on Google’s servers
different goals
Slide 26
Slide 26 text
1. e-mail scam 🡪 finances
2. account take-over by criminal 🡪 authenticity/integrity
3. Google employee spying on your e-mail 🡪 privacy / confidentiality
4. profiling by Google based on your e-mail 🡪 privacy / autonomy
5. cryptominer on Google’s servers 🡪 computation cycles
Slide 27
Slide 27 text
1. e-mail scam
2. account take-over by criminal
3. Google employee spying on your e-mail
4. profiling by Google based on your e-mail
5. cryptominer on Google’s servers
How to compare or value these?
Slide 28
Slide 28 text
security privacy
Slide 29
Slide 29 text
less security more security
Slide 30
Slide 30 text
Helps keep data
confidential
Helps availability
of data
backups
Slide 31
Slide 31 text
security
privacy
Slide 32
Slide 32 text
good for security property Y that party A & B care about
assuming attacker model E
bad for security property Y’ that A & C care about
assuming attacker model E’
good for security property X of party A
assuming attacker model E’
bad for privacy property X of party B
good for privacy property Z’ of party B
bad for societal concern Z’’
design space
Slide 33
Slide 33 text
security
requirement Y
detecting
abuse
usability
• for users & customers
• for organisation
• for sys-admins
• for software
developers
cost
security
requirement X
revocation
non-repudiation
anonymity
privacy
requirement Z
repudiation
benefits
Slide 34
Slide 34 text
Do not despair….
• Security is hard…
• Privacy is (often) harder…
• But, you have to do it. By design.
Slide 35
Slide 35 text
Enter PETs….
Slide 36
Slide 36 text
Privacy Enhancing Technologies (PETs)
Techniques that improve privacy, while keeping functionality
Zero-Knowledge Proofs (ZKP)
Proof knowledge of a certain value, without revealing it
• Pick a card from a randomized deck
• Prove the color of the card (red/black),
without revealing anything else
ZKP
ABC
Attribute-based credentials (ABC)
• Proof ‘attributes’ of yourself
• Name, birthdate, bloodtype, etc.
• Without revealing anything else
Slide 43
Slide 43 text
ZKP
ABC
Attribute-based credentials (ABC)
• Proof ‘attributes’ of yourself
• Name, birthdate, bloodtype, etc.
• Without revealing anything else
Slide 44
Slide 44 text
Multi-Party Computation
• Allow multiple parties to compute something together
• Each party has their own input
• No party learns the input of other parties
• The result can be shared, or individualized
Slide 45
Slide 45 text
…
1
secret
2 3 n
secret secret secret
function
Slide 46
Slide 46 text
So many
PETs…
Slide 47
Slide 47 text
PET Decision
Tree
Slide 48
Slide 48 text
No content
Slide 49
Slide 49 text
No content
Slide 50
Slide 50 text
No content
Slide 51
Slide 51 text
More information?
Step by at our
stand #31
Thank you!