Preserving Privacy Based on Semantic Policy Tools

Different organizations are constantly collecting, analyzing, and storing individuals' private data: shopping sites want to provide better service and recommendations, hospitals to improve healthcare, and government agencies to enable national defense and law enforcement. Sharing data lets thes...

Full description

Bibliographic Details
Main Authors: Kagal, Lalana, Pato, Joseph
Other Authors: Massachusetts Institute of Technology. Computer Science and Artificial Intelligence Laboratory
Format: Article
Language:en_US
Published: IEEE Computer and Reliability Societies 2012
Online Access:http://hdl.handle.net/1721.1/71140
_version_ 1826206252447825920
author Kagal, Lalana
Pato, Joseph
author2 Massachusetts Institute of Technology. Computer Science and Artificial Intelligence Laboratory
author_facet Massachusetts Institute of Technology. Computer Science and Artificial Intelligence Laboratory
Kagal, Lalana
Pato, Joseph
author_sort Kagal, Lalana
collection MIT
description Different organizations are constantly collecting, analyzing, and storing individuals' private data: shopping sites want to provide better service and recommendations, hospitals to improve healthcare, and government agencies to enable national defense and law enforcement. Sharing data lets these organizations discover important knowledge and draw useful conclusions but raises concerns about information privacy and trust. Until recently, the focus was on restricting access to data on a "need-to-know" basis, but since the 9/11 Commission, the paradigm has shifted to a "need to share." The authors explore the use of semantic privacy policies, justifications for data requests, and automated auditing to encourage sharing of sensitive data between organizations. They describe an architecture based on policy tools that evaluate incoming queries against semantic policies and domain knowledge and provide a justification for each query-why they're permitted, denied, or inapplicable. Using a semantic policy language gives policies explicit semantics that allow all participants to unambiguously understand their meaning. The justifications generated by checking incoming requests against these policies help requesters formulate privacy-aware queries. Reasoning over event logs and justifications allows data owners to verify that their privacy policies are being correctly enforced.
first_indexed 2024-09-23T13:26:30Z
format Article
id mit-1721.1/71140
institution Massachusetts Institute of Technology
language en_US
last_indexed 2024-09-23T13:26:30Z
publishDate 2012
publisher IEEE Computer and Reliability Societies
record_format dspace
spelling mit-1721.1/711402022-09-28T14:14:29Z Preserving Privacy Based on Semantic Policy Tools Kagal, Lalana Pato, Joseph Massachusetts Institute of Technology. Computer Science and Artificial Intelligence Laboratory Kagal, Lalana S. Kagal, Lalana Different organizations are constantly collecting, analyzing, and storing individuals' private data: shopping sites want to provide better service and recommendations, hospitals to improve healthcare, and government agencies to enable national defense and law enforcement. Sharing data lets these organizations discover important knowledge and draw useful conclusions but raises concerns about information privacy and trust. Until recently, the focus was on restricting access to data on a "need-to-know" basis, but since the 9/11 Commission, the paradigm has shifted to a "need to share." The authors explore the use of semantic privacy policies, justifications for data requests, and automated auditing to encourage sharing of sensitive data between organizations. They describe an architecture based on policy tools that evaluate incoming queries against semantic policies and domain knowledge and provide a justification for each query-why they're permitted, denied, or inapplicable. Using a semantic policy language gives policies explicit semantics that allow all participants to unambiguously understand their meaning. The justifications generated by checking incoming requests against these policies help requesters formulate privacy-aware queries. Reasoning over event logs and justifications allows data owners to verify that their privacy policies are being correctly enforced. United States. Air Force Office of Scientific Research (Award FA9550-09- 1-0152) United States. Intelligence Advanced Research Projects Activity (Award number FA8750-07-2- 0031) 2012-06-14T14:00:36Z 2012-06-14T14:00:36Z 2010-07 2010-04 Article http://purl.org/eprint/type/JournalArticle 1540-7993 INSPEC Accession Number: 11447356 http://hdl.handle.net/1721.1/71140 Kagal, Lalana, and Joseph Pato. “Preserving Privacy Based on Semantic Policy Tools.” IEEE Security & Privacy Magazine 8.4 (2010): 25–30. Web.© 2010 IEEE. en_US http://dx.doi.org/10.1109/MSP.2010.89 IEEE Security & Privacy Magazine Article is made available in accordance with the publisher's policy and may be subject to US copyright law. Please refer to the publisher's site for terms of use. application/pdf IEEE Computer and Reliability Societies IEEE
spellingShingle Kagal, Lalana
Pato, Joseph
Preserving Privacy Based on Semantic Policy Tools
title Preserving Privacy Based on Semantic Policy Tools
title_full Preserving Privacy Based on Semantic Policy Tools
title_fullStr Preserving Privacy Based on Semantic Policy Tools
title_full_unstemmed Preserving Privacy Based on Semantic Policy Tools
title_short Preserving Privacy Based on Semantic Policy Tools
title_sort preserving privacy based on semantic policy tools
url http://hdl.handle.net/1721.1/71140
work_keys_str_mv AT kagallalana preservingprivacybasedonsemanticpolicytools
AT patojoseph preservingprivacybasedonsemanticpolicytools