311111 novel cryptographic method that makes it possible to collect data and protect the privacy of the user at the same time
The statistical evaluation of digital user data is of vital importance for analyzing trends. But it can also undermine the privacy. Computer scientists from Saarbrücken have now developed a novel cryptographic method that makes it possible to collect data and protect the privacy of the user at the same time. They present their approach for the first time at the computer expo Cebit in Hannover at the Saarland University research booth (hall 9, booth E13).
“Many website providers are able to collect data, but only a few manage to do so without invading users’ privacy”, explains Aniket Kate, who leads the research group “Cryptographic Systems” at the Cluster of Excellence “Multimodal Computing and Interaction” (MMCI) in Saarbrücken. Two aspects threaten privacy during data aggregation: On the one hand, where and how is the data aggregated? For example, website owners are interested in the age and gender of their visitors. Therefore, they store data files (cookies) on their computers that observe which other websites they visit. “But this wealth of sensitive information allows them also to reconstruct detailed profiles of each individual”, says Kate. On the other hand, it is important to publish aggregated data in a privacy-preserving way. “Researchers have already demonstrated that precise information about the habits of citizens can be reconstructed from the electricity consumption information collected by so-called smart meters”, explains Kate.
In cooperation with his colleagues Fabienne Eigner and Matteo Maffei from the Center for IT-Security, Privacy and Accountability (CISPA) and Francesca Pampaloni from the Italian IMT Institute for Advanced Studies Lucca, Kate developed a software system called “Privada”. It is not only able to resolve the dilemma between the desire for information and the protection of data, but it can also be easily applied in different domains. “For example, with Privada website owners are still able to observe that their websites are mainly visited by middle-aged women, but nothing more”, Kate explains.
To achieve this, users split up the requested information and send parts of it to previously defined servers performing multi-party computation: Each server evaluates its data without being aware of the data of other parties. So together they compute a secret, but are not able to decode it on their own. Moreover, each party adds on a value corresponding to a probability distribution to make the data a little bit imprecise. The perturbated partial results are assembled into the actual analysis. The perturbation ensures that the identity of the individual person is protected, while trends are still significant in the aggregated statistic about user data.
The privacy is even guaranteed if all but one of the servers collaborate. Hence, according to the researchers, it is even conceivable that companies could provide such servers. If only servers, and not users, perturb the data with a certain amount of noise, that has two advantages: Firstly, not much computational power is necessary on the user’s side. Hence, even a mobile phone could send the partial result to a particular server. Also, in total, there is only a minimal amount of noise attached to the aggregated data. Hence, the resulting statistic about user data is as accurate as possible.
The computer scientists from Saarbrücken have already implemented their concept. “The computation is fast; the servers just need a few seconds”, says Fabienne Eigner, part of the research group “Secure and Privacy-preserving Systems” at Saarland University. She also worked on the software system. The architecture is constructed in such a way that it would not make any difference if someone were to analyze the data of a thousand or a million people”, explains Eigner.
The Latest on: Digital user data
[google_news title=”” keyword=”Digital user data” num_posts=”10″ blurb_length=”0″ show_thumb=”left”]
via Google News
The Latest on: Digital user data
- Why you should choose IPVanish to shield your digital identityon February 27, 2024 at 7:05 am
In an era when our digital footprints are being tracked more than ever, securing one's online privacy is not just a convenience but a necessity. For individuals who understand the importance of data ...
- Avast faces fine for tracking and selling user dataon February 25, 2024 at 11:14 pm
The US Federal Trade Commission (FTC) has levelled a a $16.5 million fine against cybersecurity vendor Avast for unlawfully harvesting and selling customer data without their consent.
- Biggest Data Breaches And Cyber Hacks of 2023 And 2024on February 25, 2024 at 7:00 am
Explore the biggest data breaches and cyber hacks of 2023 and 2024 to be on top of the latest cyber threats and protect your data effectively.
- Safeguarding Children in the Era of Big Dataon February 24, 2024 at 5:32 pm
By Ron Kerbs, CEO, Kidas In the ever-evolving landscape of cyberspace, 2023 unveiled a concerning trend: major players in the tech industry, including giants like Meta and Discord, were found either m ...
- Protecting Your Data: Top Cybersecurity Measures Every Business Should Takeon February 23, 2024 at 11:13 pm
In today’s digital age, protecting your business data is more important than ever. Cyber threats are on the rise, and a single security breach can have devastating consequences for your company.
- It’s time to stop trusting your antivirus softwareon February 23, 2024 at 5:05 am
The software promised to block “annoying tracking cookies” that collected data on browsing activities, as well as shield the user’s privacy. Gen Digital, the company that owns Avast ...
- Need for localization of data centers: Navigating security, compliance, and performance in the digital ageon February 22, 2024 at 8:48 pm
One of the foremost reasons driving the call for localized data centers is the paramount importance of security. As organizations worldwide grapple with escalating cyber threats, the geographical ...
- Data Security: Beyond Threat Hunting to Monitoring Data Flow and User Behavioron February 19, 2024 at 6:00 am
Cybersecurity is moving from conventional threat detection to a strategy that emphasizes context and preempts user behavior to detect anomalies.
- Reddit May Sell User Content for $60 Million to Unknown AI Firmon February 19, 2024 at 4:09 am
Reddit made a $60 million deal to let an AI company use its data, aiming to boost its value before going public. This move might upset users who have already shown they don’t like Reddit’s recent ...
- SEO Automation: Revolutionizing Your SEO Strategy with OMH Digitalon February 14, 2024 at 7:15 am
In this exploration, we'll unveil the transformative power of SEO automation, where OMH Digital takes the lead in reshaping online success stories.
via Bing News