COOKIES: By using this website you agree that we can place Google Analytics Cookies on your device for performance monitoring. |
University of Cambridge > Talks.cam > Isaac Newton Institute Seminar Series > The Challenge of Privacy Protection for Statistical Agencies
The Challenge of Privacy Protection for Statistical AgenciesAdd to your list(s) Download to your calendar using vCal
If you have a question about this talk, please contact INI IT. DLAW01 - 'Data linkage and anonymisation: setting the agenda' Since the field of statistical disclosure limitation (SDL) was first formalized by Ivan Fellegi in 1972, official statistical agencies have recognized that their publications posed confidentiality risks for the households and businesses who responded. For even longer, agencies have protected the source data for those publications by using secure storage methods and access authorization systems. In SDL , Dalenius (1977) and, in computer science, Goldwasser and Micali (1982) formalized what has become the modern approach to privacy protection in data publication: inferential disclosure limitation/semantic security. The modern approach to physical data security centers on firewall and encryption technologies. And the two sets of risks (disclosure through publication and disclosure through unauthorized access) have become increasingly inter-related. It is important to recognize the distinct issues, however. Secure multiparty computing and the stronger fully homomorphic encryption are formal solutions to the problem of permitting statistical computations without granting access to the decrypted data. Privacy-protected query publication is a formal solution to the problem of insuring that inferential disclosures are bounded and that the bound is respected in all published tables. There are now tractable systems that combine secure multi-party computing with formal privacy protection of the computed statistics (e.g., Shokri and Shmatikov 2015). The challenge to statistical agencies is to learn how these systems work, and move their own protection technologies in this direction. Private companies like Google and Microsoft already do this. Statistical agencies must be prepared to explain the differences in their publication requirements and security protocols that distinguish their chosen data storage methods and publications from those used by private companies.
This talk is part of the Isaac Newton Institute Seminar Series series. This talk is included in these lists:
Note that ex-directory lists are not shown. |
Other listsType the title of a new list here Forum for Youth Participation and Democracy St Catharine's College MCR Catz Mini-Seminars ‘Geographies of Radical Difference’ Philiminality DPMMS Pure Maths study groupsOther talksModulating developmental signals allows establishment of cultures of expanded potential stem cells Animal Migration Prof Kate Jones (UCL): Biodiversity & Conservation Taking Investment in Education Seriously - Two Part Series Constructing the organism in the age of abstraction Borel Local Lemma |