skip to main content
10.1145/3411764.3445677acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
research-article
Honorable Mention

Exploring Design and Governance Challenges in the Development of Privacy-Preserving Computation

Authors Info & Claims
Published:07 May 2021Publication History

ABSTRACT

Homomorphic encryption, secure multi-party computation, and differential privacy are part of an emerging class of Privacy Enhancing Technologies which share a common promise: to preserve privacy whilst also obtaining the benefits of computational analysis. Due to their relative novelty, complexity, and opacity, these technologies provoke a variety of novel questions for design and governance. We interviewed researchers, developers, industry leaders, policymakers, and designers involved in their deployment to explore motivations, expectations, perceived opportunities and barriers to adoption. This provided insight into several pertinent challenges facing the adoption of these technologies, including: how they might make a nebulous concept like privacy computationally tractable; how to make them more usable by developers; and how they could be explained and made accountable to stakeholders and wider society. We conclude with implications for the development, deployment, and responsible governance of these privacy-preserving computation techniques.

Skip Supplemental Material Section

Supplemental Material

References

  1. 2020. Microsoft SEAL (release 3.5). https://github.com/Microsoft/SEAL. Microsoft Research, Redmond, WA.Google ScholarGoogle Scholar
  2. Martin Abadi, Andy Chu, Ian Goodfellow, H Brendan McMahan, Ilya Mironov, Kunal Talwar, and Li Zhang. 2016. Deep learning with differential privacy. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. 308–318.Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Yasemin Acar, Sascha Fahl, and Michelle L Mazurek. 2016. You are not your developer, either: A research agenda for usable security and privacy research beyond end users. In 2016 IEEE Cybersecurity Development (SecDev). IEEE, 3–8.Google ScholarGoogle Scholar
  4. Alessandro Acquisti, Laura Brandimarte, and George Loewenstein. 2015. Privacy and human behavior in the age of information. Science 347, 6221 (2015), 509–514.Google ScholarGoogle Scholar
  5. Nitin Agrawal, Ali Shahin Shamsabadi, Matt J Kusner, and Adrià Gascón. 2019. QUOTIENT: two-party secure neural network training and prediction. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. 1231–1247.Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Adi Akavia, Dan Feldman, and Hayim Shaul. 2019. Secure Data Retrieval on the Cloud: Homomorphic Encryption meets Coresets. IACR Transactions on Cryptographic Hardware and Embedded Systems (2019), 80–106.Google ScholarGoogle Scholar
  7. Sebastian Angel, Hao Chen, Kim Laine, and Srinath Setty. 2018. PIR with compressed queries and amortized query processing. In 2018 IEEE Symposium on Security and Privacy (SP). IEEE, 962–979.Google ScholarGoogle ScholarCross RefCross Ref
  8. Hala Assal and Sonia Chiasson. 2019. ’Think secure from the beginning’ A Survey with Software Developers. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems. 1–13.Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Rebecca Balebako, Jaeyeon Jung, Wei Lu, Lorrie Faith Cranor, and Carolyn Nguyen. 2013. Little brothers watching you: Raising awareness of data leaks on smartphones. In Proceedings of the Symposium on Usable Privacy and Security. ACM, 12.Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Rebecca Balebako, Abigail Marsh, Jialiu Lin, Jason I Hong, and Lorrie Faith Cranor. 2014. The privacy and security behaviors of smartphone app developers. (2014).Google ScholarGoogle Scholar
  11. Rebecca Balebako, Florian Schaub, Idris Adjerid, Alessandro Acquisti, and Lorrie Cranor. 2015. The Impact of Timing on the Salience of Smartphone App Privacy Notices. In Proceedings of the ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices. ACM, 63–74.Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Manuel Barbosa and Pooya Farshim. 2012. Delegatable homomorphic encryption with applications to secure outsourcing of computation. In Cryptographers’ Track at the RSA Conference. Springer, 296–312.Google ScholarGoogle Scholar
  13. Jeffrey Bardzell and Shaowen Bardzell. 2015. Humanistic hci. Synthesis Lectures on Human-Centered Informatics 8, 4(2015), 1–185.Google ScholarGoogle ScholarCross RefCross Ref
  14. Lemi Baruh, Ekin Secinti, and Zeynep Cemalcilar. 2017. Online Privacy Concerns and Privacy Management: A Meta-Analytical Review. Journal of Communication 67, 1 (2017), 26–53.Google ScholarGoogle ScholarCross RefCross Ref
  15. Alexander Bogner, Beate Littig, and Wolfgang Menz. 2009. Interviewing experts. Springer.Google ScholarGoogle Scholar
  16. Mark Bovens, Thomas Schillemans, and Robert E Goodin. 2014. Public accountability. The Oxford handbook of public accountability 1, 1(2014), 1–22.Google ScholarGoogle Scholar
  17. Virginia Braun and Victoria Clarke. 2006. Using thematic analysis in psychology. Qualitative research in psychology 3, 2 (2006), 77–101.Google ScholarGoogle Scholar
  18. Ian Brown and Douwe Korff. 2009. Terrorism and the proportionality of internet surveillance. European Journal of Criminology 6, 2 (2009), 119–134.Google ScholarGoogle ScholarCross RefCross Ref
  19. Brooke Bullek, Stephanie Garboski, Darakhshan J Mir, and Evan M Peck. 2017. Towards Understanding Differential Privacy: When Do People Trust Randomized Response Technique?. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems. 3833–3837.Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Rosario Cammarota, Matthias Schunter, Anand Rajan, Fabian Boemer, Ágnes Kiss, Amos Treiber, Christian Weinert, Thomas Schneider, Emmanuel Stapf, Ahmad-Reza Sadeghi, 2020. Trustworthy AI Inference Systems: An Industry Research View. arXiv preprint arXiv:2008.04449(2020).Google ScholarGoogle Scholar
  21. Hao Chen, Zhicong Huang, Kim Laine, and Peter Rindal. 2018. Labeled PSI from fully homomorphic encryption with malicious security. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. 1223–1237.Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Jeremy Clark, Paul C Van Oorschot, and Carlisle Adams. 2007. Usability of anonymous web browsing: an examination of tor interfaces and deployability. In Proceedings of the 3rd symposium on Usable privacy and security. 41–51.Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Julie E Cohen. 2012. Configuring the networked self: Law, code, and the play of everyday practice. Yale University Press.Google ScholarGoogle Scholar
  24. Jessica Colnago, Yuanyuan Feng, Tharangini Palanivel, Sarah Pearman, Megan Ung, Alessandro Acquisti, Lorrie Faith Cranor, and Norman Sadeh. 2020. Informing the design of a personalized privacy assistant for the internet of things. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems. 1–13.Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. CPOmagazine.Com. 2020. What’s Old Is New Again: Examining Privacy Enhancing Technologies. https://www2.deloitte.com/nl/nl/pages/risk/articles/is-2020-finally-the-year-of-the-pets.htmlGoogle ScholarGoogle Scholar
  26. Lorrie Faith Cranor, Manjula Arjula, and Praveen Guduru. 2002. Use of a P3P user agent by early adopters. In Proceedings of the 2002 ACM workshop on Privacy in the Electronic Society. 1–10.Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Emiliano De Cristofaro and Gene Tsudik. 2010. Practical private set intersection protocols with linear complexity. In International Conference on Financial Cryptography and Data Security. Springer, 143–159.Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Paul De Hert and Serge Gutwirth. 2006. Privacy, data protection and law enforcement. Opacity of the individual and transparency of power. Privacy and the criminal law(2006), 61–104.Google ScholarGoogle Scholar
  29. Deloitte.com. 2020. Is 2020 finally the year of the PETs (Privacy Enhancing Technologies)?https://www2.deloitte.com/nl/nl/pages/risk/articles/is-2020-finally-the-year-of-the-pets.htmlGoogle ScholarGoogle Scholar
  30. Gurpreet Dhillon and James Backhouse. 2001. Current directions in IS security research: towards socio-organizational perspectives. Information systems journal 11, 2 (2001), 127–153.Google ScholarGoogle Scholar
  31. Edsger W Dijkstra. 1982. Selected writings on computing-a personal perspective. Texts and monographs in computer science. Springer, doi 10(1982), 978–1.Google ScholarGoogle ScholarCross RefCross Ref
  32. Graham Dove, Kim Halskov, Jodi Forlizzi, and John Zimmerman. 2017. UX design innovation: Challenges for working with machine learning as a design material. In Proceedings of the 2017 chi conference on human factors in computing systems. 278–288.Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. Cynthia Dwork. 2008. Differential privacy: A survey of results. In International conference on theory and applications of models of computation. Springer, 1–19.Google ScholarGoogle ScholarCross RefCross Ref
  34. Cynthia Dwork and Jing Lei. 2009. Differential privacy and robust statistics. In Proceedings of the forty-first annual ACM symposium on Theory of computing. 371–380.Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. Cynthia Dwork and Adam Smith. 2010. Differential privacy for statistics: What we know and what we want to learn. Journal of Privacy and Confidentiality 1, 2 (2010).Google ScholarGoogle ScholarCross RefCross Ref
  36. Pelle Ehn. 1988. Work-oriented design of computer artifacts. Ph.D. Dissertation. Arbetslivscentrum.Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. Chris Elsden, Arthi Manohar, Jo Briggs, Mike Harding, Chris Speed, and John Vines. 2018. Making sense of blockchain applications: A typology for HCI. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems. 1–14.Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. Úlfar Erlingsson, Vasyl Pihur, and Aleksandra Korolova. 2014. Rappor: Randomized aggregatable privacy-preserving ordinal response. In Proceedings of the 2014 ACM SIGSAC conference on computer and communications security. 1054–1067.Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. David Evans, Jonathan Katz, Yan Huang, and Lior Malka. 2011. Faster secure two-party computation using garbled circuits. (2011).Google ScholarGoogle Scholar
  40. Joshua AT Fairfield and Christoph Engel. 2015. Privacy as a public good. Duke LJ 65(2015), 385.Google ScholarGoogle Scholar
  41. Daniel Fallman. 2011. The new good: exploring the potential of philosophy of technology to contribute to human-computer interaction. In Proceedings of the SIGCHI conference on human factors in computing systems. 1051–1060.Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. Steven M Furnell, Nathan Clarke, Rodrigo Werlinger, Kirstie Hawkey, and Konstantin Beznosov. 2009. An integrated view of human, organizational, and technological challenges of IT security management. Information Management & Computer Security(2009).Google ScholarGoogle Scholar
  43. Oscar H Gandy Jr. 1993. The Panoptic Sort: A Political Economy of Personal Information. Critical Studies in Communication and in the Cultural Industries.ERIC.Google ScholarGoogle Scholar
  44. Chong-zhi Gao, Qiong Cheng, Pei He, Willy Susilo, and Jin Li. 2018. Privacy-preserving Naive Bayes classifiers secure against the substitution-then-comparison attack. Information Sciences 444(2018), 72–88.Google ScholarGoogle ScholarCross RefCross Ref
  45. C Gentry. 2009. A fully homomorphic encryption scheme. PhD thesis, Stanford University, 2009. (2009).Google ScholarGoogle ScholarDigital LibraryDigital Library
  46. Ran Gilad-Bachrach, Nathan Dowlin, Kim Laine, Kristin Lauter, Michael Naehrig, and John Wernsing. 2016. Cryptonets: Applying neural networks to encrypted data with high throughput and accuracy. In International Conference on Machine Learning. 201–210.Google ScholarGoogle Scholar
  47. Kenneth Goldstein. 2002. Getting in the door: Sampling and completing elite interviews. PS: Political Science and Politics 35, 4 (2002), 669–672.Google ScholarGoogle ScholarCross RefCross Ref
  48. Peter Leo Gorski, Yasemin Acar, Luigi Lo Iacono, and Sascha Fahl. 2020. Listen to Developers! A Participatory Design Study on Security Warnings for Cryptographic APIs. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems. 1–13.Google ScholarGoogle ScholarDigital LibraryDigital Library
  49. Matthew Green and Matthew Smith. 2015. Developers are users too: designing crypto and security APIs that busy engineers and sysadmins can use securely. (2015).Google ScholarGoogle Scholar
  50. Seda Gürses and Bettina Berendt. 2010. PETs in the surveillance society: a critical review of the potentials and limitations of the privacy as confidentiality paradigm. In Data Protection in a Profiled World. Springer, 301–321.Google ScholarGoogle Scholar
  51. Seda Gurses and Joris Van Hoboken. [n.d.]. Privacy after the agile turn. ([n. d.]).Google ScholarGoogle Scholar
  52. Irit Hadar, Tomer Hasson, Oshrat Ayalon, Eran Toch, Michael Birnhack, Sofia Sherman, and Arod Balissa. 2018. Privacy by designers: software developers’ privacy mindset. Empirical Software Engineering 23, 1 (2018), 259–289.Google ScholarGoogle ScholarDigital LibraryDigital Library
  53. Rob Hall, Stephen E Fienberg, and Yuval Nardi. 2011. Secure multiple linear regression based on homomorphic encryption. Journal of Official Statistics 27, 4 (2011), 669.Google ScholarGoogle Scholar
  54. S Harrison, D Tatar, and P Sengers. 2007. The three paradigms of HCI. alt. In CHI’07.Google ScholarGoogle Scholar
  55. Carmit Hazay. 2018. Oblivious polynomial evaluation and secure set-intersection from algebraic PRFs. Journal of Cryptology 31, 2 (2018), 537–586.Google ScholarGoogle ScholarDigital LibraryDigital Library
  56. Carmit Hazay and Yehuda Lindell. 2008. Efficient protocols for set intersection and pattern matching with security against malicious and covert adversaries. In Theory of Cryptography Conference. Springer, 155–175.Google ScholarGoogle ScholarCross RefCross Ref
  57. Amir Herzberg. 2009. Why Johnny can’t surf (safely)? Attacks and defenses for web users. computers & security 28, 1-2 (2009), 63–71.Google ScholarGoogle Scholar
  58. Robert Hoppe. 2009. Scientific advice and public policy: expert advisers’ and policymakers’ discourses on boundary work. Poiesis & Praxis 6, 3-4 (2009), 235–263.Google ScholarGoogle ScholarCross RefCross Ref
  59. Siam Hussain, Baiyu Li, Farinaz Koushanfar, and Rosario Cammarota. 2020. TinyGarble2: Smart, Efficient, and Scalable Yao’s Garble Circuit. In Proceedings of the 2020 Workshop on Privacy-Preserving Machine Learning in Practice. 65–67.Google ScholarGoogle ScholarDigital LibraryDigital Library
  60. Sheila Jasanoff and Sang-Hyun Kim. 2009. Containing the atom: Sociotechnical imaginaries and nuclear power in the United States and South Korea. Minerva 47, 2 (2009), 119.Google ScholarGoogle ScholarCross RefCross Ref
  61. Somesh Jha, Louis Kruger, and Vitaly Shmatikov. 2008. Towards practical privacy for genomic computation. In 2008 IEEE Symposium on Security and Privacy (sp 2008). IEEE, 216–230.Google ScholarGoogle ScholarDigital LibraryDigital Library
  62. Noah Johnson, Joseph P Near, and Dawn Song. 2018. Towards practical differential privacy for SQL queries. Proceedings of the VLDB Endowment 11, 5 (2018), 526–539.Google ScholarGoogle ScholarDigital LibraryDigital Library
  63. Robert Jungk and Norbert Müllert. 1987. Future Workshops: How to create desirable futures. Inst. for Social Inventions.Google ScholarGoogle Scholar
  64. Ruogu Kang, Laura Dabbish, Nathaniel Fruchter, and Sara Kiesler. 2015. “My Data Just Goes Everywhere:” User Mental Models of the Internet and Implications for Privacy and Security. In Proceedings of Symposium On Usable Privacy and Security. 39–52.Google ScholarGoogle Scholar
  65. Caitlin Kelleher and Michelle Ichinco. 2019. Towards a model of API learning. In 2019 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC). IEEE, 163–168.Google ScholarGoogle ScholarCross RefCross Ref
  66. Florian Kerschbaum. 2012. Outsourced private set intersection using homomorphic encryption. In Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security. 85–86.Google ScholarGoogle ScholarDigital LibraryDigital Library
  67. Jennifer King. 2013. “How Come I’m Allowing Strangers To Go Through My Phone?”—Smartphones and Privacy Expectations. In Symposium on Usable Privacy and Security (SOUPS).Google ScholarGoogle Scholar
  68. Blagovesta Kostova, Seda Gürses, and Carmela Troncoso. 2020. Privacy Engineering Meets Software Engineering. On the Challenges of Engineering Privacy ByDesign. arXiv preprint arXiv:2007.08613(2020).Google ScholarGoogle Scholar
  69. Ponnurangam Kumaraguru and Lorrie Faith Cranor. 2005. Privacy indexes: a survey of Westin’s studies. (2005).Google ScholarGoogle Scholar
  70. Zbigniew Kwecka, William Buchanan, Burkhard Schafer, and Judith Rauhofer. 2014. “I am Spartacus”: privacy enhancing technologies, collaborative obfuscation and privacy as a public good. Artificial intelligence and law 22, 2 (2014), 113–139.Google ScholarGoogle Scholar
  71. Joseph Lawrance, Christopher Bogart, Margaret Burnett, Rachel Bellamy, Kyle Rector, and Scott D Fleming. 2010. How programmers debug, revisited: An information foraging theory perspective. IEEE Transactions on Software Engineering 39, 2 (2010), 197–215.Google ScholarGoogle ScholarDigital LibraryDigital Library
  72. Lora Bex Lempert. 2007. Asking questions of the data: Memo writing in the grounded. The Sage handbook of grounded theory(2007), 245–264.Google ScholarGoogle Scholar
  73. Pedro Leon, Blase Ur, Richard Shay, Yang Wang, Rebecca Balebako, and Lorrie Cranor. 2012. Why Johnny can’t opt out: a usability evaluation of tools to limit online behavioral advertising. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, 589–598.Google ScholarGoogle ScholarDigital LibraryDigital Library
  74. Pedro Giovanni Leon, Blase Ur, Yang Wang, Manya Sleeper, Rebecca Balebako, Richard Shay, Lujo Bauer, Mihai Christodorescu, and Lorrie Faith Cranor. 2013. What matters to users?: factors that affect users’ willingness to share information with online advertisers. In Proceedings of Symposium on Usable Privacy and Security. ACM, 1–7.Google ScholarGoogle ScholarDigital LibraryDigital Library
  75. Jialiu Lin, Shahriyar Amini, Jason I Hong, Norman Sadeh, Janne Lindqvist, and Joy Zhang. 2012. Expectation and purpose: understanding users’ mental models of mobile app privacy through crowdsourcing. In Proceedings of Conference on Ubiquitous Computing. ACM, 501–510.Google ScholarGoogle ScholarDigital LibraryDigital Library
  76. Jialiu Lin, Bin Liu, Norman Sadeh, and Jason I Hong. 2014. Modeling users’ mobile app privacy preferences: Restoring usability in a sea of permission settings. In Symposium On Usable Privacy and Security. 199–212.Google ScholarGoogle Scholar
  77. Bin Liu, Mads Schaarup Andersen, Florian Schaub, Hazim Almuhimedi, Shikun Aerin Zhang, Norman Sadeh, Yuvraj Agarwal, and Alessandro Acquisti. 2016. Follow My Recommendations: A Personalized Assistant for Mobile App Permissions. In Proceedings of the Symposium on Usable Privacy and Security.Google ScholarGoogle Scholar
  78. Dominique Machuletz, Stefan Laube, and Rainer Böhme. 2018. Webcam covering as planned behavior. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems. 1–13.Google ScholarGoogle ScholarDigital LibraryDigital Library
  79. Donald MacKenzie and Judy Wajcman. 1999. The social shaping of technology. Open university press.Google ScholarGoogle Scholar
  80. Antonio Marcedone, Zikai Wen, and Elaine Shi. 2015. Secure Dating with Four or Fewer Cards.IACR Cryptol. ePrint Arch. 2015 (2015), 1031.Google ScholarGoogle Scholar
  81. Adam Mechtley. 2020. API as Curriculum: Designing High-Level API Affordances as Instructional Scaffolds. In Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing Systems. 1–9.Google ScholarGoogle ScholarDigital LibraryDigital Library
  82. Alfred J Menezes, Jonathan Katz, Paul C Van Oorschot, and Scott A Vanstone. 1996. Handbook of applied cryptography. CRC press.Google ScholarGoogle Scholar
  83. Morgan Meyer. 2010. The rise of the knowledge broker. Science communication 32, 1 (2010), 118–127.Google ScholarGoogle Scholar
  84. Payman Mohassel and Yupeng Zhang. 2017. Secureml: A system for scalable privacy-preserving machine learning. In 2017 IEEE Symposium on Security and Privacy (SP). IEEE, 19–38.Google ScholarGoogle ScholarCross RefCross Ref
  85. Brad A Myers and Jeffrey Stylos. 2016. Improving API usability. Commun. ACM 59, 6 (2016), 62–69.Google ScholarGoogle ScholarDigital LibraryDigital Library
  86. Nelly EJ Oudshoorn and Trevor Pinch. 2003. How users matter: The co-construction of users and technologies. MIT press.Google ScholarGoogle Scholar
  87. Antti Oulasvirta and Kasper Hornbæk. 2016. Hci research as problem-solving. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems. 4956–4967.Google ScholarGoogle ScholarDigital LibraryDigital Library
  88. Edward C Page, Bill Jenkins, William Ieuan Jenkins, 2005. Policy bureaucracy: Government with a cast of thousands. Oxford University Press on Demand.Google ScholarGoogle Scholar
  89. David J Phillips. 2004. Privacy policy and PETs: The influence of policy regimes on the development and social implications of privacy enhancing technologies. New Media & Society 6, 6 (2004), 691–706.Google ScholarGoogle ScholarCross RefCross Ref
  90. Trevor J Pinch and Wiebe E Bijker. 1984. The social construction of facts and artefacts: Or how the sociology of science and the sociology of technology might benefit each other. Social studies of science 14, 3 (1984), 399–441.Google ScholarGoogle Scholar
  91. Maarten Roy Prak. 2006. Craft guilds in the early modern low countries: Work, power and representation. Ashgate Publishing, Ltd.Google ScholarGoogle Scholar
  92. Lucy Qin, Andrei Lapets, Frederick Jansen, Peter Flockhart, Kinan Dak Albab, Ira Globus-Harris, Shannon Roberts, and Mayank Varia. 2019. From usability to secure computing and back again. In Fifteenth Symposium on Usable Privacy and Security ({SOUPS} 2019).Google ScholarGoogle Scholar
  93. M Sadegh Riazi, Mohammad Samragh, Hao Chen, Kim Laine, Kristin Lauter, and Farinaz Koushanfar. 2019. {XONN}: XNOR-based Oblivious Deep Neural Network Inference. In 28th {USENIX} Security Symposium ({USENIX} Security 19). 1501–1518.Google ScholarGoogle Scholar
  94. Ronald L Rivest, Len Adleman, Michael L Dertouzos, 1978. On data banks and privacy homomorphisms. Foundations of secure computation 4, 11 (1978), 169–180.Google ScholarGoogle Scholar
  95. Phillip Rogaway. 2015. The Moral Character of Cryptographic Work.IACR Cryptol. ePrint Arch. 2015 (2015), 1162.Google ScholarGoogle Scholar
  96. Theo Ryffel, Andrew Trask, Morten Dahl, Bobby Wagner, Jason Mancuso, Daniel Rueckert, and Jonathan Passerat-Palmbach. 2018. A generic framework for privacy preserving deep learning. arXiv preprint arXiv:1811.04017(2018).Google ScholarGoogle Scholar
  97. Amartya Sanyal, Matt J Kusner, Adria Gascon, and Varun Kanade. 2018. Tapas: Tricks to accelerate (encrypted) prediction as a service. arXiv preprint arXiv:1806.03461(2018).Google ScholarGoogle Scholar
  98. Florian Schaub, Rebecca Balebako, Adam L Durity, and Lorrie Faith Cranor. 2015. A design space for effective privacy notices. In Proceedings of the Symposium On Usable Privacy and Security. 1–17.Google ScholarGoogle Scholar
  99. Abigail Sellen, Yvonne Rogers, Richard Harper, and Tom Rodden. 2009. Reflecting human values in the digital age. Commun. ACM 52, 3 (2009), 58–66.Google ScholarGoogle ScholarDigital LibraryDigital Library
  100. Steven Shapin. 1998. Placing the view from nowhere: historical and sociological problems in the location of science. Transactions of the Institute of British Geographers 23, 1(1998), 5–12.Google ScholarGoogle ScholarCross RefCross Ref
  101. Irina Shklovski, Scott D Mainwaring, Halla Hrund Skúladóttir, and Höskuldur Borgthorsson. 2014. Leakiness and creepiness in app space: Perceptions of privacy and mobile app use. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, 2347–2356.Google ScholarGoogle ScholarDigital LibraryDigital Library
  102. The Royal Society. 2019. Protecting Privacy in Practice: The Current Use, Development and Limits of Privacy Enhancing Technologies in Data Analysis. Technical Report. The Royal Society.Google ScholarGoogle Scholar
  103. Sarah Spiekermann and Lorrie Faith Cranor. 2008. Engineering privacy. IEEE Transactions on software engineering 35, 1 (2008), 67–82.Google ScholarGoogle ScholarDigital LibraryDigital Library
  104. Felix Stalder. 2002. The failure of privacy enhancing technologies (PETs) and the voiding of privacy. Sociological Research Online 7, 2 (2002), 25–39.Google ScholarGoogle ScholarCross RefCross Ref
  105. Friedrich Steimann. 2018. Fatal abstraction. In Proceedings of the 2018 ACM SIGPLAN International Symposium on New Ideas, New Paradigms, and Reflections on Programming and Software. 125–130.Google ScholarGoogle ScholarDigital LibraryDigital Library
  106. Donald E Stokes. 2011. Pasteur’s quadrant: Basic science and technological innovation. Brookings Institution Press.Google ScholarGoogle Scholar
  107. Herman T Tavani and James H Moor. 2001. Privacy protection, control of information, and privacy-enhancing technologies. ACM Sigcas Computers and Society 31, 1 (2001), 6–11.Google ScholarGoogle ScholarDigital LibraryDigital Library
  108. UN Privacy Preserving Techniques Task Team. 2020. UN Handbook on Privacy-Preserving Computation Techniques. Technical Report. http://publications.officialstatistics.org/handbooks/privacy-preserving-techniques-handbook/UN%20Handbook%20for%20Privacy-Preserving%20Techniques.pdfGoogle ScholarGoogle Scholar
  109. Blase Ur, Pedro Giovanni Leon, Lorrie Faith Cranor, Richard Shay, and Yang Wang. 2012. Smart, useful, scary, creepy: perceptions of online behavioral advertising. In Proceedings of the Eighth Symposium on Usable Privacy and Security. ACM, 4.Google ScholarGoogle ScholarDigital LibraryDigital Library
  110. Max Van Kleek, Ilaria Liccardi, Reuben Binns, Jun Zhao, Daniel J Weitzner, and Nigel Shadbolt. 2017. Better the devil you know: Exposing the data sharing practices of smartphone apps. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems. ACM, 5208–5220.Google ScholarGoogle ScholarDigital LibraryDigital Library
  111. Michael Veale, Reuben Binns, and Jef Ausloos. 2018. When data protection by design and data subject rights clash. International Data Privacy Law 8, 2 (2018), 105–123.Google ScholarGoogle ScholarCross RefCross Ref
  112. Xiao Wang, Alex J. Malozemoff, and Jonathan Katz. 2016. EMP-toolkit: Efficient MultiParty computation toolkit. https://github.com/emp-toolkit.Google ScholarGoogle Scholar
  113. Stanley L Warner. 1965. Randomized response: A survey technique for eliminating evasive answer bias. J. Amer. Statist. Assoc. 60, 309 (1965), 63–69.Google ScholarGoogle ScholarCross RefCross Ref
  114. Kang Wei, Jun Li, Ming Ding, Chuan Ma, Howard H Yang, Farhad Farokhi, Shi Jin, Tony QS Quek, and H Vincent Poor. 2020. Federated learning with differential privacy: Algorithms and performance analysis. IEEE Transactions on Information Forensics and Security (2020).Google ScholarGoogle Scholar
  115. Alma Whitten and J Doug Tygar. 1999. Why Johnny Can’t Encrypt: A Usability Evaluation of PGP 5.0.. In USENIX Security Symposium, Vol. 348. 169–184.Google ScholarGoogle Scholar
  116. Kathleen Broome Williams. 2012. Grace Hopper: Admiral of the cyber sea. Naval Institute Press.Google ScholarGoogle Scholar
  117. Aiping Xiong, Tianhao Wang, Ninghui Li, and Somesh Jha. 2020. Towards Effective Differential Privacy Communication for Users’ Data Sharing Decision and Comprehension. arXiv preprint arXiv:2003.13922(2020).Google ScholarGoogle Scholar
  118. Andrew C Yao. 1982. Protocols for secure computations. In 23rd annual symposium on foundations of computer science (sfcs 1982). IEEE, 160–164.Google ScholarGoogle ScholarDigital LibraryDigital Library
  119. Xun Yi, Mohammed Golam Kaosar, Russell Paulet, and Elisa Bertino. 2012. Single-database private information retrieval from fully homomorphic encryption. IEEE Transactions on Knowledge and Data Engineering 25, 5(2012), 1125–1134.Google ScholarGoogle ScholarDigital LibraryDigital Library
  120. Minhaz Zibran. 2008. What makes APIs difficult to use. International Journal of Computer Science and Network Security (IJCSNS) 8, 4(2008), 255–261.Google ScholarGoogle Scholar

Index Terms

  1. Exploring Design and Governance Challenges in the Development of Privacy-Preserving Computation
          Index terms have been assigned to the content through auto-classification.

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Conferences
            CHI '21: Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems
            May 2021
            10862 pages
            ISBN:9781450380966
            DOI:10.1145/3411764

            Copyright © 2021 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 7 May 2021

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • research-article
            • Research
            • Refereed limited

            Acceptance Rates

            Overall Acceptance Rate6,199of26,314submissions,24%

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader

          HTML Format

          View this article in HTML Format .

          View HTML Format