ABSTRACT
Homomorphic encryption, secure multi-party computation, and differential privacy are part of an emerging class of Privacy Enhancing Technologies which share a common promise: to preserve privacy whilst also obtaining the benefits of computational analysis. Due to their relative novelty, complexity, and opacity, these technologies provoke a variety of novel questions for design and governance. We interviewed researchers, developers, industry leaders, policymakers, and designers involved in their deployment to explore motivations, expectations, perceived opportunities and barriers to adoption. This provided insight into several pertinent challenges facing the adoption of these technologies, including: how they might make a nebulous concept like privacy computationally tractable; how to make them more usable by developers; and how they could be explained and made accountable to stakeholders and wider society. We conclude with implications for the development, deployment, and responsible governance of these privacy-preserving computation techniques.
Supplemental Material
Available for Download
- 2020. Microsoft SEAL (release 3.5). https://github.com/Microsoft/SEAL. Microsoft Research, Redmond, WA.Google Scholar
- Martin Abadi, Andy Chu, Ian Goodfellow, H Brendan McMahan, Ilya Mironov, Kunal Talwar, and Li Zhang. 2016. Deep learning with differential privacy. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. 308–318.Google ScholarDigital Library
- Yasemin Acar, Sascha Fahl, and Michelle L Mazurek. 2016. You are not your developer, either: A research agenda for usable security and privacy research beyond end users. In 2016 IEEE Cybersecurity Development (SecDev). IEEE, 3–8.Google Scholar
- Alessandro Acquisti, Laura Brandimarte, and George Loewenstein. 2015. Privacy and human behavior in the age of information. Science 347, 6221 (2015), 509–514.Google Scholar
- Nitin Agrawal, Ali Shahin Shamsabadi, Matt J Kusner, and Adrià Gascón. 2019. QUOTIENT: two-party secure neural network training and prediction. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. 1231–1247.Google ScholarDigital Library
- Adi Akavia, Dan Feldman, and Hayim Shaul. 2019. Secure Data Retrieval on the Cloud: Homomorphic Encryption meets Coresets. IACR Transactions on Cryptographic Hardware and Embedded Systems (2019), 80–106.Google Scholar
- Sebastian Angel, Hao Chen, Kim Laine, and Srinath Setty. 2018. PIR with compressed queries and amortized query processing. In 2018 IEEE Symposium on Security and Privacy (SP). IEEE, 962–979.Google ScholarCross Ref
- Hala Assal and Sonia Chiasson. 2019. ’Think secure from the beginning’ A Survey with Software Developers. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems. 1–13.Google ScholarDigital Library
- Rebecca Balebako, Jaeyeon Jung, Wei Lu, Lorrie Faith Cranor, and Carolyn Nguyen. 2013. Little brothers watching you: Raising awareness of data leaks on smartphones. In Proceedings of the Symposium on Usable Privacy and Security. ACM, 12.Google ScholarDigital Library
- Rebecca Balebako, Abigail Marsh, Jialiu Lin, Jason I Hong, and Lorrie Faith Cranor. 2014. The privacy and security behaviors of smartphone app developers. (2014).Google Scholar
- Rebecca Balebako, Florian Schaub, Idris Adjerid, Alessandro Acquisti, and Lorrie Cranor. 2015. The Impact of Timing on the Salience of Smartphone App Privacy Notices. In Proceedings of the ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices. ACM, 63–74.Google ScholarDigital Library
- Manuel Barbosa and Pooya Farshim. 2012. Delegatable homomorphic encryption with applications to secure outsourcing of computation. In Cryptographers’ Track at the RSA Conference. Springer, 296–312.Google Scholar
- Jeffrey Bardzell and Shaowen Bardzell. 2015. Humanistic hci. Synthesis Lectures on Human-Centered Informatics 8, 4(2015), 1–185.Google ScholarCross Ref
- Lemi Baruh, Ekin Secinti, and Zeynep Cemalcilar. 2017. Online Privacy Concerns and Privacy Management: A Meta-Analytical Review. Journal of Communication 67, 1 (2017), 26–53.Google ScholarCross Ref
- Alexander Bogner, Beate Littig, and Wolfgang Menz. 2009. Interviewing experts. Springer.Google Scholar
- Mark Bovens, Thomas Schillemans, and Robert E Goodin. 2014. Public accountability. The Oxford handbook of public accountability 1, 1(2014), 1–22.Google Scholar
- Virginia Braun and Victoria Clarke. 2006. Using thematic analysis in psychology. Qualitative research in psychology 3, 2 (2006), 77–101.Google Scholar
- Ian Brown and Douwe Korff. 2009. Terrorism and the proportionality of internet surveillance. European Journal of Criminology 6, 2 (2009), 119–134.Google ScholarCross Ref
- Brooke Bullek, Stephanie Garboski, Darakhshan J Mir, and Evan M Peck. 2017. Towards Understanding Differential Privacy: When Do People Trust Randomized Response Technique?. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems. 3833–3837.Google ScholarDigital Library
- Rosario Cammarota, Matthias Schunter, Anand Rajan, Fabian Boemer, Ágnes Kiss, Amos Treiber, Christian Weinert, Thomas Schneider, Emmanuel Stapf, Ahmad-Reza Sadeghi, 2020. Trustworthy AI Inference Systems: An Industry Research View. arXiv preprint arXiv:2008.04449(2020).Google Scholar
- Hao Chen, Zhicong Huang, Kim Laine, and Peter Rindal. 2018. Labeled PSI from fully homomorphic encryption with malicious security. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. 1223–1237.Google ScholarDigital Library
- Jeremy Clark, Paul C Van Oorschot, and Carlisle Adams. 2007. Usability of anonymous web browsing: an examination of tor interfaces and deployability. In Proceedings of the 3rd symposium on Usable privacy and security. 41–51.Google ScholarDigital Library
- Julie E Cohen. 2012. Configuring the networked self: Law, code, and the play of everyday practice. Yale University Press.Google Scholar
- Jessica Colnago, Yuanyuan Feng, Tharangini Palanivel, Sarah Pearman, Megan Ung, Alessandro Acquisti, Lorrie Faith Cranor, and Norman Sadeh. 2020. Informing the design of a personalized privacy assistant for the internet of things. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems. 1–13.Google ScholarDigital Library
- CPOmagazine.Com. 2020. What’s Old Is New Again: Examining Privacy Enhancing Technologies. https://www2.deloitte.com/nl/nl/pages/risk/articles/is-2020-finally-the-year-of-the-pets.htmlGoogle Scholar
- Lorrie Faith Cranor, Manjula Arjula, and Praveen Guduru. 2002. Use of a P3P user agent by early adopters. In Proceedings of the 2002 ACM workshop on Privacy in the Electronic Society. 1–10.Google ScholarDigital Library
- Emiliano De Cristofaro and Gene Tsudik. 2010. Practical private set intersection protocols with linear complexity. In International Conference on Financial Cryptography and Data Security. Springer, 143–159.Google ScholarDigital Library
- Paul De Hert and Serge Gutwirth. 2006. Privacy, data protection and law enforcement. Opacity of the individual and transparency of power. Privacy and the criminal law(2006), 61–104.Google Scholar
- Deloitte.com. 2020. Is 2020 finally the year of the PETs (Privacy Enhancing Technologies)?https://www2.deloitte.com/nl/nl/pages/risk/articles/is-2020-finally-the-year-of-the-pets.htmlGoogle Scholar
- Gurpreet Dhillon and James Backhouse. 2001. Current directions in IS security research: towards socio-organizational perspectives. Information systems journal 11, 2 (2001), 127–153.Google Scholar
- Edsger W Dijkstra. 1982. Selected writings on computing-a personal perspective. Texts and monographs in computer science. Springer, doi 10(1982), 978–1.Google ScholarCross Ref
- Graham Dove, Kim Halskov, Jodi Forlizzi, and John Zimmerman. 2017. UX design innovation: Challenges for working with machine learning as a design material. In Proceedings of the 2017 chi conference on human factors in computing systems. 278–288.Google ScholarDigital Library
- Cynthia Dwork. 2008. Differential privacy: A survey of results. In International conference on theory and applications of models of computation. Springer, 1–19.Google ScholarCross Ref
- Cynthia Dwork and Jing Lei. 2009. Differential privacy and robust statistics. In Proceedings of the forty-first annual ACM symposium on Theory of computing. 371–380.Google ScholarDigital Library
- Cynthia Dwork and Adam Smith. 2010. Differential privacy for statistics: What we know and what we want to learn. Journal of Privacy and Confidentiality 1, 2 (2010).Google ScholarCross Ref
- Pelle Ehn. 1988. Work-oriented design of computer artifacts. Ph.D. Dissertation. Arbetslivscentrum.Google ScholarDigital Library
- Chris Elsden, Arthi Manohar, Jo Briggs, Mike Harding, Chris Speed, and John Vines. 2018. Making sense of blockchain applications: A typology for HCI. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems. 1–14.Google ScholarDigital Library
- Úlfar Erlingsson, Vasyl Pihur, and Aleksandra Korolova. 2014. Rappor: Randomized aggregatable privacy-preserving ordinal response. In Proceedings of the 2014 ACM SIGSAC conference on computer and communications security. 1054–1067.Google ScholarDigital Library
- David Evans, Jonathan Katz, Yan Huang, and Lior Malka. 2011. Faster secure two-party computation using garbled circuits. (2011).Google Scholar
- Joshua AT Fairfield and Christoph Engel. 2015. Privacy as a public good. Duke LJ 65(2015), 385.Google Scholar
- Daniel Fallman. 2011. The new good: exploring the potential of philosophy of technology to contribute to human-computer interaction. In Proceedings of the SIGCHI conference on human factors in computing systems. 1051–1060.Google ScholarDigital Library
- Steven M Furnell, Nathan Clarke, Rodrigo Werlinger, Kirstie Hawkey, and Konstantin Beznosov. 2009. An integrated view of human, organizational, and technological challenges of IT security management. Information Management & Computer Security(2009).Google Scholar
- Oscar H Gandy Jr. 1993. The Panoptic Sort: A Political Economy of Personal Information. Critical Studies in Communication and in the Cultural Industries.ERIC.Google Scholar
- Chong-zhi Gao, Qiong Cheng, Pei He, Willy Susilo, and Jin Li. 2018. Privacy-preserving Naive Bayes classifiers secure against the substitution-then-comparison attack. Information Sciences 444(2018), 72–88.Google ScholarCross Ref
- C Gentry. 2009. A fully homomorphic encryption scheme. PhD thesis, Stanford University, 2009. (2009).Google ScholarDigital Library
- Ran Gilad-Bachrach, Nathan Dowlin, Kim Laine, Kristin Lauter, Michael Naehrig, and John Wernsing. 2016. Cryptonets: Applying neural networks to encrypted data with high throughput and accuracy. In International Conference on Machine Learning. 201–210.Google Scholar
- Kenneth Goldstein. 2002. Getting in the door: Sampling and completing elite interviews. PS: Political Science and Politics 35, 4 (2002), 669–672.Google ScholarCross Ref
- Peter Leo Gorski, Yasemin Acar, Luigi Lo Iacono, and Sascha Fahl. 2020. Listen to Developers! A Participatory Design Study on Security Warnings for Cryptographic APIs. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems. 1–13.Google ScholarDigital Library
- Matthew Green and Matthew Smith. 2015. Developers are users too: designing crypto and security APIs that busy engineers and sysadmins can use securely. (2015).Google Scholar
- Seda Gürses and Bettina Berendt. 2010. PETs in the surveillance society: a critical review of the potentials and limitations of the privacy as confidentiality paradigm. In Data Protection in a Profiled World. Springer, 301–321.Google Scholar
- Seda Gurses and Joris Van Hoboken. [n.d.]. Privacy after the agile turn. ([n. d.]).Google Scholar
- Irit Hadar, Tomer Hasson, Oshrat Ayalon, Eran Toch, Michael Birnhack, Sofia Sherman, and Arod Balissa. 2018. Privacy by designers: software developers’ privacy mindset. Empirical Software Engineering 23, 1 (2018), 259–289.Google ScholarDigital Library
- Rob Hall, Stephen E Fienberg, and Yuval Nardi. 2011. Secure multiple linear regression based on homomorphic encryption. Journal of Official Statistics 27, 4 (2011), 669.Google Scholar
- S Harrison, D Tatar, and P Sengers. 2007. The three paradigms of HCI. alt. In CHI’07.Google Scholar
- Carmit Hazay. 2018. Oblivious polynomial evaluation and secure set-intersection from algebraic PRFs. Journal of Cryptology 31, 2 (2018), 537–586.Google ScholarDigital Library
- Carmit Hazay and Yehuda Lindell. 2008. Efficient protocols for set intersection and pattern matching with security against malicious and covert adversaries. In Theory of Cryptography Conference. Springer, 155–175.Google ScholarCross Ref
- Amir Herzberg. 2009. Why Johnny can’t surf (safely)? Attacks and defenses for web users. computers & security 28, 1-2 (2009), 63–71.Google Scholar
- Robert Hoppe. 2009. Scientific advice and public policy: expert advisers’ and policymakers’ discourses on boundary work. Poiesis & Praxis 6, 3-4 (2009), 235–263.Google ScholarCross Ref
- Siam Hussain, Baiyu Li, Farinaz Koushanfar, and Rosario Cammarota. 2020. TinyGarble2: Smart, Efficient, and Scalable Yao’s Garble Circuit. In Proceedings of the 2020 Workshop on Privacy-Preserving Machine Learning in Practice. 65–67.Google ScholarDigital Library
- Sheila Jasanoff and Sang-Hyun Kim. 2009. Containing the atom: Sociotechnical imaginaries and nuclear power in the United States and South Korea. Minerva 47, 2 (2009), 119.Google ScholarCross Ref
- Somesh Jha, Louis Kruger, and Vitaly Shmatikov. 2008. Towards practical privacy for genomic computation. In 2008 IEEE Symposium on Security and Privacy (sp 2008). IEEE, 216–230.Google ScholarDigital Library
- Noah Johnson, Joseph P Near, and Dawn Song. 2018. Towards practical differential privacy for SQL queries. Proceedings of the VLDB Endowment 11, 5 (2018), 526–539.Google ScholarDigital Library
- Robert Jungk and Norbert Müllert. 1987. Future Workshops: How to create desirable futures. Inst. for Social Inventions.Google Scholar
- Ruogu Kang, Laura Dabbish, Nathaniel Fruchter, and Sara Kiesler. 2015. “My Data Just Goes Everywhere:” User Mental Models of the Internet and Implications for Privacy and Security. In Proceedings of Symposium On Usable Privacy and Security. 39–52.Google Scholar
- Caitlin Kelleher and Michelle Ichinco. 2019. Towards a model of API learning. In 2019 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC). IEEE, 163–168.Google ScholarCross Ref
- Florian Kerschbaum. 2012. Outsourced private set intersection using homomorphic encryption. In Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security. 85–86.Google ScholarDigital Library
- Jennifer King. 2013. “How Come I’m Allowing Strangers To Go Through My Phone?”—Smartphones and Privacy Expectations. In Symposium on Usable Privacy and Security (SOUPS).Google Scholar
- Blagovesta Kostova, Seda Gürses, and Carmela Troncoso. 2020. Privacy Engineering Meets Software Engineering. On the Challenges of Engineering Privacy ByDesign. arXiv preprint arXiv:2007.08613(2020).Google Scholar
- Ponnurangam Kumaraguru and Lorrie Faith Cranor. 2005. Privacy indexes: a survey of Westin’s studies. (2005).Google Scholar
- Zbigniew Kwecka, William Buchanan, Burkhard Schafer, and Judith Rauhofer. 2014. “I am Spartacus”: privacy enhancing technologies, collaborative obfuscation and privacy as a public good. Artificial intelligence and law 22, 2 (2014), 113–139.Google Scholar
- Joseph Lawrance, Christopher Bogart, Margaret Burnett, Rachel Bellamy, Kyle Rector, and Scott D Fleming. 2010. How programmers debug, revisited: An information foraging theory perspective. IEEE Transactions on Software Engineering 39, 2 (2010), 197–215.Google ScholarDigital Library
- Lora Bex Lempert. 2007. Asking questions of the data: Memo writing in the grounded. The Sage handbook of grounded theory(2007), 245–264.Google Scholar
- Pedro Leon, Blase Ur, Richard Shay, Yang Wang, Rebecca Balebako, and Lorrie Cranor. 2012. Why Johnny can’t opt out: a usability evaluation of tools to limit online behavioral advertising. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, 589–598.Google ScholarDigital Library
- Pedro Giovanni Leon, Blase Ur, Yang Wang, Manya Sleeper, Rebecca Balebako, Richard Shay, Lujo Bauer, Mihai Christodorescu, and Lorrie Faith Cranor. 2013. What matters to users?: factors that affect users’ willingness to share information with online advertisers. In Proceedings of Symposium on Usable Privacy and Security. ACM, 1–7.Google ScholarDigital Library
- Jialiu Lin, Shahriyar Amini, Jason I Hong, Norman Sadeh, Janne Lindqvist, and Joy Zhang. 2012. Expectation and purpose: understanding users’ mental models of mobile app privacy through crowdsourcing. In Proceedings of Conference on Ubiquitous Computing. ACM, 501–510.Google ScholarDigital Library
- Jialiu Lin, Bin Liu, Norman Sadeh, and Jason I Hong. 2014. Modeling users’ mobile app privacy preferences: Restoring usability in a sea of permission settings. In Symposium On Usable Privacy and Security. 199–212.Google Scholar
- Bin Liu, Mads Schaarup Andersen, Florian Schaub, Hazim Almuhimedi, Shikun Aerin Zhang, Norman Sadeh, Yuvraj Agarwal, and Alessandro Acquisti. 2016. Follow My Recommendations: A Personalized Assistant for Mobile App Permissions. In Proceedings of the Symposium on Usable Privacy and Security.Google Scholar
- Dominique Machuletz, Stefan Laube, and Rainer Böhme. 2018. Webcam covering as planned behavior. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems. 1–13.Google ScholarDigital Library
- Donald MacKenzie and Judy Wajcman. 1999. The social shaping of technology. Open university press.Google Scholar
- Antonio Marcedone, Zikai Wen, and Elaine Shi. 2015. Secure Dating with Four or Fewer Cards.IACR Cryptol. ePrint Arch. 2015 (2015), 1031.Google Scholar
- Adam Mechtley. 2020. API as Curriculum: Designing High-Level API Affordances as Instructional Scaffolds. In Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing Systems. 1–9.Google ScholarDigital Library
- Alfred J Menezes, Jonathan Katz, Paul C Van Oorschot, and Scott A Vanstone. 1996. Handbook of applied cryptography. CRC press.Google Scholar
- Morgan Meyer. 2010. The rise of the knowledge broker. Science communication 32, 1 (2010), 118–127.Google Scholar
- Payman Mohassel and Yupeng Zhang. 2017. Secureml: A system for scalable privacy-preserving machine learning. In 2017 IEEE Symposium on Security and Privacy (SP). IEEE, 19–38.Google ScholarCross Ref
- Brad A Myers and Jeffrey Stylos. 2016. Improving API usability. Commun. ACM 59, 6 (2016), 62–69.Google ScholarDigital Library
- Nelly EJ Oudshoorn and Trevor Pinch. 2003. How users matter: The co-construction of users and technologies. MIT press.Google Scholar
- Antti Oulasvirta and Kasper Hornbæk. 2016. Hci research as problem-solving. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems. 4956–4967.Google ScholarDigital Library
- Edward C Page, Bill Jenkins, William Ieuan Jenkins, 2005. Policy bureaucracy: Government with a cast of thousands. Oxford University Press on Demand.Google Scholar
- David J Phillips. 2004. Privacy policy and PETs: The influence of policy regimes on the development and social implications of privacy enhancing technologies. New Media & Society 6, 6 (2004), 691–706.Google ScholarCross Ref
- Trevor J Pinch and Wiebe E Bijker. 1984. The social construction of facts and artefacts: Or how the sociology of science and the sociology of technology might benefit each other. Social studies of science 14, 3 (1984), 399–441.Google Scholar
- Maarten Roy Prak. 2006. Craft guilds in the early modern low countries: Work, power and representation. Ashgate Publishing, Ltd.Google Scholar
- Lucy Qin, Andrei Lapets, Frederick Jansen, Peter Flockhart, Kinan Dak Albab, Ira Globus-Harris, Shannon Roberts, and Mayank Varia. 2019. From usability to secure computing and back again. In Fifteenth Symposium on Usable Privacy and Security ({SOUPS} 2019).Google Scholar
- M Sadegh Riazi, Mohammad Samragh, Hao Chen, Kim Laine, Kristin Lauter, and Farinaz Koushanfar. 2019. {XONN}: XNOR-based Oblivious Deep Neural Network Inference. In 28th {USENIX} Security Symposium ({USENIX} Security 19). 1501–1518.Google Scholar
- Ronald L Rivest, Len Adleman, Michael L Dertouzos, 1978. On data banks and privacy homomorphisms. Foundations of secure computation 4, 11 (1978), 169–180.Google Scholar
- Phillip Rogaway. 2015. The Moral Character of Cryptographic Work.IACR Cryptol. ePrint Arch. 2015 (2015), 1162.Google Scholar
- Theo Ryffel, Andrew Trask, Morten Dahl, Bobby Wagner, Jason Mancuso, Daniel Rueckert, and Jonathan Passerat-Palmbach. 2018. A generic framework for privacy preserving deep learning. arXiv preprint arXiv:1811.04017(2018).Google Scholar
- Amartya Sanyal, Matt J Kusner, Adria Gascon, and Varun Kanade. 2018. Tapas: Tricks to accelerate (encrypted) prediction as a service. arXiv preprint arXiv:1806.03461(2018).Google Scholar
- Florian Schaub, Rebecca Balebako, Adam L Durity, and Lorrie Faith Cranor. 2015. A design space for effective privacy notices. In Proceedings of the Symposium On Usable Privacy and Security. 1–17.Google Scholar
- Abigail Sellen, Yvonne Rogers, Richard Harper, and Tom Rodden. 2009. Reflecting human values in the digital age. Commun. ACM 52, 3 (2009), 58–66.Google ScholarDigital Library
- Steven Shapin. 1998. Placing the view from nowhere: historical and sociological problems in the location of science. Transactions of the Institute of British Geographers 23, 1(1998), 5–12.Google ScholarCross Ref
- Irina Shklovski, Scott D Mainwaring, Halla Hrund Skúladóttir, and Höskuldur Borgthorsson. 2014. Leakiness and creepiness in app space: Perceptions of privacy and mobile app use. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, 2347–2356.Google ScholarDigital Library
- The Royal Society. 2019. Protecting Privacy in Practice: The Current Use, Development and Limits of Privacy Enhancing Technologies in Data Analysis. Technical Report. The Royal Society.Google Scholar
- Sarah Spiekermann and Lorrie Faith Cranor. 2008. Engineering privacy. IEEE Transactions on software engineering 35, 1 (2008), 67–82.Google ScholarDigital Library
- Felix Stalder. 2002. The failure of privacy enhancing technologies (PETs) and the voiding of privacy. Sociological Research Online 7, 2 (2002), 25–39.Google ScholarCross Ref
- Friedrich Steimann. 2018. Fatal abstraction. In Proceedings of the 2018 ACM SIGPLAN International Symposium on New Ideas, New Paradigms, and Reflections on Programming and Software. 125–130.Google ScholarDigital Library
- Donald E Stokes. 2011. Pasteur’s quadrant: Basic science and technological innovation. Brookings Institution Press.Google Scholar
- Herman T Tavani and James H Moor. 2001. Privacy protection, control of information, and privacy-enhancing technologies. ACM Sigcas Computers and Society 31, 1 (2001), 6–11.Google ScholarDigital Library
- UN Privacy Preserving Techniques Task Team. 2020. UN Handbook on Privacy-Preserving Computation Techniques. Technical Report. http://publications.officialstatistics.org/handbooks/privacy-preserving-techniques-handbook/UN%20Handbook%20for%20Privacy-Preserving%20Techniques.pdfGoogle Scholar
- Blase Ur, Pedro Giovanni Leon, Lorrie Faith Cranor, Richard Shay, and Yang Wang. 2012. Smart, useful, scary, creepy: perceptions of online behavioral advertising. In Proceedings of the Eighth Symposium on Usable Privacy and Security. ACM, 4.Google ScholarDigital Library
- Max Van Kleek, Ilaria Liccardi, Reuben Binns, Jun Zhao, Daniel J Weitzner, and Nigel Shadbolt. 2017. Better the devil you know: Exposing the data sharing practices of smartphone apps. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems. ACM, 5208–5220.Google ScholarDigital Library
- Michael Veale, Reuben Binns, and Jef Ausloos. 2018. When data protection by design and data subject rights clash. International Data Privacy Law 8, 2 (2018), 105–123.Google ScholarCross Ref
- Xiao Wang, Alex J. Malozemoff, and Jonathan Katz. 2016. EMP-toolkit: Efficient MultiParty computation toolkit. https://github.com/emp-toolkit.Google Scholar
- Stanley L Warner. 1965. Randomized response: A survey technique for eliminating evasive answer bias. J. Amer. Statist. Assoc. 60, 309 (1965), 63–69.Google ScholarCross Ref
- Kang Wei, Jun Li, Ming Ding, Chuan Ma, Howard H Yang, Farhad Farokhi, Shi Jin, Tony QS Quek, and H Vincent Poor. 2020. Federated learning with differential privacy: Algorithms and performance analysis. IEEE Transactions on Information Forensics and Security (2020).Google Scholar
- Alma Whitten and J Doug Tygar. 1999. Why Johnny Can’t Encrypt: A Usability Evaluation of PGP 5.0.. In USENIX Security Symposium, Vol. 348. 169–184.Google Scholar
- Kathleen Broome Williams. 2012. Grace Hopper: Admiral of the cyber sea. Naval Institute Press.Google Scholar
- Aiping Xiong, Tianhao Wang, Ninghui Li, and Somesh Jha. 2020. Towards Effective Differential Privacy Communication for Users’ Data Sharing Decision and Comprehension. arXiv preprint arXiv:2003.13922(2020).Google Scholar
- Andrew C Yao. 1982. Protocols for secure computations. In 23rd annual symposium on foundations of computer science (sfcs 1982). IEEE, 160–164.Google ScholarDigital Library
- Xun Yi, Mohammed Golam Kaosar, Russell Paulet, and Elisa Bertino. 2012. Single-database private information retrieval from fully homomorphic encryption. IEEE Transactions on Knowledge and Data Engineering 25, 5(2012), 1125–1134.Google ScholarDigital Library
- Minhaz Zibran. 2008. What makes APIs difficult to use. International Journal of Computer Science and Network Security (IJCSNS) 8, 4(2008), 255–261.Google Scholar
Index Terms
- Exploring Design and Governance Challenges in the Development of Privacy-Preserving Computation
Recommendations
Privacy-enhancing technologies: approaches and development
In this paper, we discuss privacy threats on the Internet and possible solutions to this problem. Examples of privacy threats in the communication networks are identity disclosure, linking data traffic with identity, location disclosure in connection ...
e-governance initiatives in Mongolia
ICEGOV '08: Proceedings of the 2nd international conference on Theory and practice of electronic governanceThe Government of Mongolia pays great attention to introduction of Information and Communication Technology (ICT) in all social and economic sectors. In the past years, a number of activities were implemented to enhance the use ICT as a key tool for ...
Collaborative privacy management
The landscape of the World Wide Web with all its versatile services heavily relies on the disclosure of private user information. Unfortunately, the growing amount of personal data collected by service providers poses a significant privacy threat for ...
Comments