Privacy Enhancement Computation
Privacy Enhancement Computation
Data is at the core of all businesses, the most valuable asset in the current age. As its
value keeps increasing, keeping this asset safe becomes the highest priority for
organizations. Data needs to be managed, processed, and analyzed to glean valuable
insights. Since data is sensitive, it can also be abused by malicious attackers.
However, considering the tremendous volume of data that needs to be safeguarded
for privacy, data governance and technology integrations, the task becomes
herculean. Though there are privacy legislations such as GDPR in the EU and several
others around the globe, privacy breaches occur very often. One of the main reasons
this is happening is because of business transactions happening through third parties,
to gain insights to improve their services, to get some valuable data, or maybe just to
earn additional money by using any available data.
Consumers are becoming increasingly concerned about sharing their personal data as
they find it difficult to track who uses them, the manner it is used and mainly who is
responsible for handling them. Since cyberattacks are on the rise, and attackers using
more complex techniques to access data, the use of privacy-enhancing computation
(PEC) and technologies (PET) have become a crucial security measure for
organizations. PEC is one of the leading Gartner strategic technology trends. With the
adoption of technologies like AI, organizations today can process increasingly
complex and growing data in a structured, controlled, and protected manner.
Enterprises having a well-defined roadmap for PEC and technologies implementation
are expected to minimize the exposure to potential attacks and enable secured data
usage.
PRIVACY-ENHANCING COMPUTATION
What is Privacy-enhancing computation?
Though there is no standard definition there yet, we could say that privacy enhancing
computation is a group of various technologies that help to achieve the highest level
of private data protection. This group of technologies support privacy and data
protection and provide safeguards against violations and hacker attacks. The solutions
can be hardware and software designed to glean valuable data to use for various
purposes while building a robust and secure foundation.
These technologies have been around for some time but it’s only recently they have
been used for real-life applications and use cases. Gartner has classified PEC in the
“people centricity” category and according to the research and consulting company,
PEC has three forms, comprising of three technologies to protect data.
1. The first form involves technology providing a trusted environment where data
can be processed securely. To enable this there are trusted third parties and
hardware trusted execution environments.
2. The second form involves processing and analytics through privacy-aware
machine learning. The technologies leveraged in this form consists of federated
machine learning and privacy-aware machine learning.
3. The third form of PEC consists of technology enabling data and algorithms
transformation. These include homomorphic encryption to keep the data
confidential, multiparty computation, differential privacy, private set
intersection, among others.
Why do organizations need to implement privacy-
enhancing computation (PECs)?
The primary reason why organizations should adopt PECs is to avoid having
any possible risk to the privacy of the consumers. When any user enters their
personal data into any application, website, account, or any other form, they
would want to ensure the data is kept private and used only for the intended
purpose. Enterprises lacking a proper tried, and testing process for the
protection of data offers an easy opportunity for malicious attackers to misuse
the data. This poses a huge threat to users’ privacy and in turn affects the
credibility, reputation, trust, and confidence of people in the actions of the
organization. So, companies should ensure they have full control in managing
this information.
Moreover, with the rise of data protection laws around the globe such as
GDPR and CCPA, it will become mandatory for organizations to set up
processes and take measures to protect consumer data. Otherwise,
organizations may incur huge financial loss from data breaches and severe
fines as penalties. As per the DLA Piper GDPR Data Breach Survey 2020
report, GDPR fines incurred by organizations are estimated to be over
US$126 million from May 2018 to January 2020. This can significantly affect
any enterprise’s financials.
How Does Technology Enhance Privacy?
good example of this is AI companies that need protected access to client data
are the only secure way to achieve this whilst simultaneously allowing
Innovative technology allows everyday users to take swift action and secure
personal information that could have otherwise been sent to third parties. For
flows, including transferred data that captures when, who, and the conditions
of transfer.
Privacy- Enhancing Computation
Technologies
Privacy-enhancing technologies (PETs) are a broad range of technologies
(hardware or software solutions) that are designed to extract data value in
order to unleash its full commercial, scientific and social potential, without
risking the privacy and security of this information.
Cryptographic algorithms
Example
Suppose we want to compute the average salary among three employees without
revealing the actual salary, for such problems one can use secure multiparty
computation. Let’s take an example-
1. Obfuscation: This one is a general term for data masking that contains
multiple methods to replace sensitive information by adding distracting
or misleading data to a log or profile. Obfuscating also hides personal
information or sensitive data through computer algorithms and masking
techniques. This technique can also involve adding misleading or
distracting data or information so it's harder for an attacker to obtain the
needed data.
For example:
int i;main(){for(i=0;i["]<i;++i){--i;}"];
read('-'-'-',i+++"hell\
o,world!\n",'/'/'/'));}read(j,i,p){
write(j/p+p,i---j,i/i);}
int i;
printf("%c", ch);
int main()
write_char("hello, world!\n"[i]);
}
return 0;
• Shrinking: It helps detect and safely remove unused classes, fields, methods,
and attributes from the app’s release build.
• Optimization: It helps in inspecting and rewriting the code to reduce its size.
For example, if an optimizer detects an if-else statement in which the else {}
statement is never used, the code for the else statement is removed. Examples
of code shrinkers and optimizers are ProGuard for both Java and Android and
R8 for Android.
In the everyday operations of any business, a lot of sensitive data goes through
HR, marketing, or IT departments, and pseudonymization can help you lower
the risk and avoid any possible data breach.
Purposes
• There are many reasons for using anonymizers, such as minimizing risk,
prevention of identity theft, or protecting search histories from public
disclosure.
• Some countries apply heavy censorship on the internet. Anonymizers can help
to allow free access to all of the internet content, but they cannot help against
persecution for accessing the anonymizer website itself. Furthermore, as
information itself about anonymizer websites are banned in those countries,
users are wary that they may be falling into a government-set trap.[10]
• Anonymizers are also used by people who wish to receive objective
information with the growing target marketing on the internet and targeted
information. For example, large news outlets such as CNN target the viewers
according to region and give different information to different populations.
Websites such as YouTube obtain information about the last videos viewed on
a computer, and they propose "recommended" videos accordingly, and most of
the online targeted marketing is done by showing advertisements according to
that region. Anonymizers are used for avoiding that kind of targeting and
getting a more objective view of information.
• For building a reliable anonymous system, anonymous proxy signatures are
helpful. It can be used in anonymous voting or other authentication processes
that value anonymity.
Synthetic data is important for businesses due to three reasons: privacy, product
testing and training machine learning algorithms.
Businesses can prefer different methods such as decision trees, deep learning
techniques, and iterative proportional fitting to execute the data synthesis process.
They should choose the method according to synthetic data requirements and the
level of data utility that is desired for the specific purpose of data generation.
After data synthesis, they should assess the utility of synthetic data by comparing
it with real data. The utility assessment process has two stages:
➢ Agent-Based Modeling
Training generative models often starts with gathering a large amount of data
in a particular domain (e.g., images, natural language text, tabular data), and
then training a model to generate more data like it. The generative models
described below have different architectures, but are all based on neural
networks - and fundamentally leverage the same approach of utilizing a
number of parameters smaller than the input data they were trained on.
Another challenge with traditional machine learning is that user’s data gets
aggregated in a central location for machine learning training which may be
against the privacy policies of certain countries and may make the data more
vulnerable to data breaches
• Data security: Keeping training dataset on the devices, so a data pool is not
required for the model.
• Data diversity: Challenges other than data security such as network
unavailability in edge devices may prevent companies from merging datasets
from different sources. Federated learning facilitates access to heterogeneous
data even in cases where data sources can communicate only during certain
times
• Real time continual learning: Models are constantly improved using client
data with no need to aggregate data for continual learning.
• Hardware efficiency: This approach uses less complex hardware, because
federated learning models do not need one complex central server to analyze
data
BENEFITS OF PRIVACY-ENHANCING
COMPUTATION
Here are some of the benefits of enabling privacy-enhancing computation.
1. Harm prevention
When there is no protection against the prevention of privacy data breaches,
malicious users can gain easy access to information without any permission. This can
be various types of information such as data from social media accounts, cloud stores,
bank details, among others. A Data breach can affect the privacy of the users and harm
their lives for a long time. PECs are capable of shielding access to sensitive information
and ensures that a mandatory set of permissions are enabled to protect and gain access
to sensitive information.
1. HR: The benefit of PEC in the Human Resources Department can be providing
gender equality and decreasing the gender pay gap in the company.
➢ https://www.altamira.ai/blog/privacy-enhancing-computation/
➢ https://10xds.com/blog/cyber-security/privacy-enhancing-computation/
➢ https://research.aimultiple.com/synthetic-data-generation/
➢ https://101blockchains.com/zero-knowledge-proof-example/
➢ https://research.aimultiple.com/privacy-enhancing-technologies/
➢ https://www.geeksforgeeks.org/what-is-obfuscation/
➢ https://www.geeksforgeeks.org/what-is-secure-multiparty-computation/