VAMS: Verifiable Auditing of Access to Confidential Data

05/12/2018
by   Alexander Hicks, et al.
0

The sharing of personal data has the potential to bring substantial benefits both to individuals and society, but these can be achieved only if people have confidence their data will not be used inappropriately. As more sensitive data is considered for sharing (e.g., communication records and medical records), and as it is increasingly used for making important decisions, there is a growing need for effective ways to hold data processors accountable for their actions, while protecting the privacy of individuals and the integrity of their data. We propose a system, VAMS, that allows individuals to check accesses to their sensitive personal data, and enables auditors to detect violations of policy. Furthermore, our system protects the privacy of individuals and organizations, while allowing published statistics to be publicly verified. We build two prototype systems, one based on the Hyperledger Fabric distributed ledger and another based on the Trillian verifiable log-backed map, and evaluate their performance on simulated workloads based on real-world data sets. We find that while the one based on Hyperledger Fabric may have more favorable trust assumptions in certain settings, the one based on Trillian is more scalable, achieving up to 102 transactions per second, as opposed to Hyperledger's 40.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
06/17/2019

Public Ledger for Sensitive Data

Satoshi Nakamoto's Blockchain allows to build publicly verifiable and al...
research
12/24/2022

zkFaith: Soonami's Zero-Knowledge Identity Protocol

Individuals are encouraged to prove their eligibility to access specific...
research
05/29/2019

Fair Decision Making using Privacy-Protected Data

Data collected about individuals is regularly used to make decisions tha...
research
08/23/2022

"Am I Private and If So, how Many?" - Communicating Privacy Guarantees of Differential Privacy with Risk Communication Formats

Decisions about sharing personal information are not trivial, since ther...
research
02/23/2022

Privacy issues on biometric systems

In the XXIth century there is a strong interest on privacy issues. Techn...
research
07/13/2023

Data Behind the Walls An Advanced Architecture for Data Privacy Management

In today's highly connected society, we are constantly asked to provide ...
research
06/17/2019

Scrubbing Sensitive PHI Data from Medical Records made Easy by SpaCy -- A Scalable Model Implementation Comparisons

De-identification of clinical records is an extremely important process ...

Please sign up or login with your details

Forgot password? Click here to reset