Preserving Privacy Based on Semantic Policy Tools

Different organizations are constantly collecting, analyzing, and storing individuals' private data: shopping sites want to provide better service and recommendations, hospitals to improve healthcare, and government agencies to enable national defense and law enforcement. Sharing data lets thes...

Full description

Bibliographic Details
Main Authors: Kagal, Lalana (Contributor), Pato, Joseph (Author)
Other Authors: Massachusetts Institute of Technology. Computer Science and Artificial Intelligence Laboratory (Contributor), Kagal, Lalana S. (Contributor)
Format: Article
Language:English
Published: IEEE Computer and Reliability Societies, 2012-06-14T14:00:36Z.
Subjects:
Online Access:Get fulltext
LEADER 02273 am a22002173u 4500
001 71140
042 |a dc 
100 1 0 |a Kagal, Lalana  |e author 
100 1 0 |a Massachusetts Institute of Technology. Computer Science and Artificial Intelligence Laboratory  |e contributor 
100 1 0 |a Kagal, Lalana S.  |e contributor 
100 1 0 |a Kagal, Lalana  |e contributor 
700 1 0 |a Pato, Joseph  |e author 
245 0 0 |a Preserving Privacy Based on Semantic Policy Tools 
260 |b IEEE Computer and Reliability Societies,   |c 2012-06-14T14:00:36Z. 
856 |z Get fulltext  |u http://hdl.handle.net/1721.1/71140 
520 |a Different organizations are constantly collecting, analyzing, and storing individuals' private data: shopping sites want to provide better service and recommendations, hospitals to improve healthcare, and government agencies to enable national defense and law enforcement. Sharing data lets these organizations discover important knowledge and draw useful conclusions but raises concerns about information privacy and trust. Until recently, the focus was on restricting access to data on a "need-to-know" basis, but since the 9/11 Commission, the paradigm has shifted to a "need to share." The authors explore the use of semantic privacy policies, justifications for data requests, and automated auditing to encourage sharing of sensitive data between organizations. They describe an architecture based on policy tools that evaluate incoming queries against semantic policies and domain knowledge and provide a justification for each query-why they're permitted, denied, or inapplicable. Using a semantic policy language gives policies explicit semantics that allow all participants to unambiguously understand their meaning. The justifications generated by checking incoming requests against these policies help requesters formulate privacy-aware queries. Reasoning over event logs and justifications allows data owners to verify that their privacy policies are being correctly enforced. 
520 |a United States. Air Force Office of Scientific Research (Award FA9550-09- 1-0152) 
520 |a United States. Intelligence Advanced Research Projects Activity (Award number FA8750-07-2- 0031) 
546 |a en_US 
655 7 |a Article 
773 |t IEEE Security & Privacy Magazine