Carnegie Mellon University
School of Computer Science

 People
 Research
 About us

 Education
    Workshops
    Talks
    Courses

 Privacy
    Issues
    Introduction

 Publications
    Papers
    Presentations

Emerging Technologies and Sample Solutions

  1. Human recognition and identification
  2. Ubiquitous video
  3. Ubiquitous data sharing
  4. Information capturing tools
  5. Positioning technology
  6. Personal care

3. Ubiquitous data sharing

Technologies 
  • Semantic Web
  • Data Mining (person-specific patterns)
  • Bio-Terrorism Surveillance


Benefits to Society   Privacy Concerns Voiced
  • Semantic Web provides summary information from large amounts of data, by making web content machine readable
  • Counter terrorism surveillance may improve the safety of American citizens against terrorist attacks by detecting suspicious behavior early.
  • Bio-Terrorism surveillance can save lives by early detection of a biological agent and identifying naturally occurring outbreaks.
  • Erosion of civil liberty protection.
  • Erosion of illegal search protections because law-enforcement can “mine” cases from collected data.
  • Patient privacy is at risk by additional sharing of identified information with law enforcement, which may render healthcare less effective.
  • Detect social interactions of people.
  • Access to uncontrolled and unprecedented amounts of information on identified individuals.
  • Collected data can be used for other government purposes


SolutionDescription
CertBox (“Privacy Appliance”) A CertBox provides a fast means for automatically de-identifying a flow of data in accordance to HIPAA data sharing provisions, while the resulting data remain useful for bio-terrorism surveillance
  
Reasonable Cause (“Selective Revelation”) Reasonable cause is a protocol in which the level of de-identification experienced by the data match a scientific and legally expressed need for the data.
  
Distributed Surveillance Rather than sharing specific person-specific values with a central authority, answers to surveillance questions are computed over a network of data holder machines. Overall answers are provided with scientific assurances of privacy protections for individual and institutional information.
  
Semantic Web Technologies to Reconcile Privacy and Context Awareness (“eWallet”) Extensions to eWallet allows "owners" and "guardians" of person-specific data to specify and enforce expressed policies related to collecting and sharing personal data.
  
Data Valuation by Simulation Using publicly available data and information about social and behavioral networks of individuals, synthetic data can be constructed to determing the usefulness and fitness of a potential data source prior to actually acquiring real data.
  
Roster Collocation Networks Roster Collcation Networks is a set of algorithsm for determining collocations of people while protecting privacy. [ref]


Privacy Impact 
  • A. Video, wiretapping and surveillance
  • B. Civil liberties, illegal search
  • F. Copyright law


More on Technology Group Overview, 1, 2, 3, 4, 5, 6


Summer 2003 [webmaster@dataprivacylab.org] Privacy Technology Center