Skip to main content

Big Data and Sensitive Data

  • Chapter
  • First Online:
Big Data for the Greater Good

Part of the book series: Studies in Big Data ((SBD,volume 42))

Abstract

Big Data provides a tremendous amount of detailed data for improved decision making, from overall strategic decisions, to automated operational micro-decisions. Directly, or with the right analytical methods, these data may reveal private information such as preferences and choices, as well as bargaining positions. Therefore, these data may be both personal or of strategic importance to companies, which may distort the value of Big Data. Consequently, privacy-preserving use of such data has been a long-standing challenge, but today this can be effectively addressed by modern cryptography. One class of solutions makes data itself anonymous, although this degrades the value of the data. Another class allows confidential use of the actual data by Computation on Encrypted Data (CoED). This chapter describes how CoED can be used for privacy-preserving statistics and how it may distort existing trustee institutions and foster new types of data collaborations and business models. The chapter provides an introduction to CoED, and presents CoED applications for collaborative statistics when applied to financial risk assessment in banks and directly to the banks’ customers. Another application shows how MPC can be used to gather high quality data from, for example,. national statistics into online services without compromising confidentiality.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Known weaknesses are physical side-channels and information leakages through memory access patterns, which breaks the security. A sound review of SGX is provided by Costan and Devadas [2].

  2. 2.

    Gartner has MPC (Multiparty Computation) listed as a technology “on the rise” in a recent report on data security in July 2017 https://www.gartner.com/doc/3772083/hype-cycle-data-security.

  3. 3.

    Other important characteristics are the different types of basic operations such as arithmetic or Boolean, and different types of cryptographic technologies such as secret sharing and homomorphic encryption.

  4. 4.

    Another property is fault tolerance, which allows the MPC system to continue to operate if a CP intentionally or unintentionally fails to operate.

  5. 5.

    The chart was presented by Jesper Buus Nielsen at the opening of the DIGIT center (http://digit.au.dk) and the data points come from the following papers: [11,12,13,14,15,16,17].

  6. 6.

    http://cs.au.dk/research/centers/cfem.

  7. 7.

    https://practice-project.eu.

  8. 8.

    The banks are typically the lenders with the utmost priority in case of default.

  9. 9.

    https://bigdatabysecurity.dk.

  10. 10.

    One example of an ongoing R&D project that focuses on MPC and machine learning is the EU-project SODA (https://www.soda-project.eu).

  11. 11.

    https://bigdatabysecurity.dk.

  12. 12.

    This work has a direct link to the final report from the Commission on Evidence-Based Policymaking in the US. This report explores how to increase the availability of data for assessing government programs, without compromising privacy and confidentiality. The report explains how MPC can be part of the solution as currently tested by Statistics Denmark.

  13. 13.

    Furthermore, if the MPC protocol is based on so-called secret sharing, as it is, there is no decryption key that can be broken by brute force, which within the EU means that the GDPR regulation may not apply. This is, however, to be legally assessed by the national data protection agencies, who are the legal interpreters of the GDPR.

  14. 14.

    See e.g. http://gking.harvard.edu/files/gking/files/0314policyforumff.pdf.

  15. 15.

    A dictionary or a legislative text typically defines a trustee as an individual or institution in a position of trust.

References

  1. H. Varian, Economic mechanism design for computerized agents, in First USENIX Workshop on Electronic Commerce (1995)

    Google Scholar 

  2. V. Costan, S. Devadas, Intel SGX Explained (Cryptology ePrint Archive, Report 2016/086)

    Google Scholar 

  3. A. Gibbard, Manipulation of voting schemes: a general result. Econometrica 41, 587–601 (1973)

    Article  MathSciNet  Google Scholar 

  4. R.B. Myerson, Incentives compatibility and the bargaining Problem. Econometrica 47, 61–73 (1979)

    Article  MathSciNet  Google Scholar 

  5. A. Shamir, How to share a secret. Commun. ACM 22(11), 612–613 (1979)

    Article  MathSciNet  Google Scholar 

  6. D. Chaum, C. Crepeau, I.B. Damgaard, Multiparty unconditionally secure protocols (extended abstract), in 20th ACM STOC, Chicago, Illinois, USA, 24 May 1988 (ACM Press, 1988) pp. 11–19

    Google Scholar 

  7. P. Bogetoft, I.B. Damgaard, T. Jacobsen, K. Nielsen, J.I. Pagter, T. Toft (2005), Secure computation, economy, and trust—A generic solution for secure auctions with real-world applications. Basic Research in Computer Science Report RS-05-18

    Google Scholar 

  8. P. Bogetoft, D.L. Christensen, I.B. Damgaard, M. Geisler, T. Jakobsen, M. Krigaard, J.D. Nielsen, J.B. Nielsen, K. Nielsen, J. Pagter, M.I. Schwartzbach, T. Toft, Secure Multiparty Computation Goes Live. Lecture Notes in Computer Science 5628, 325–343 (2009)

    Article  Google Scholar 

  9. D. Malkhi, N. Nisan, B. Pinkas, Y. Sella, Fairplay—A secure two-party computation system, in Proceedings of the 13th USENIX Security Symposium (2004), pp. 287–302

    Google Scholar 

  10. P. Bogetoft, K. Boye, H. Neergaard-Petersen, K. Nielsen, Reallocating sugar beet contracts: can sugar production survive in Denmark? Eur. Rev. Agric. Econ. 34(1), 1–20 (2007)

    Article  Google Scholar 

  11. B. Pinkas, T. Schneider, N.P. Smart, S.C. Williams, Secure Two-Party Computation Is Practical (Asiacrypt, 2009)

    Chapter  Google Scholar 

  12. A. Shelat, C. Shen, Two-output Secure Computation With Malicious Adversaries (Euroscript, 2011)

    Chapter  Google Scholar 

  13. J.B. Nielsen, P.S. Nordholt, C. Orlandi, S.S. Burra, A New Approach to Practical Active-Secure Two-Party Computation (Crypto, 2012)

    Google Scholar 

  14. T.K. Frederiksen, J.B. Nielsen, Fast and Maliciously Secure Two-Party Computation Using the GPU (ACNS, 2013)

    Chapter  Google Scholar 

  15. T.K. Frederiksen, J.B. Nielsen, Faster Maliciously Secure Two-Party Computation Using the GPU (SCN, 2014)

    Google Scholar 

  16. Y. Lindell, B. Riva, Blazing Fast 2PC in the Offline/Online Setting with Security for Malicious Adversaries (CCS, 2015)

    Google Scholar 

  17. B.N. Nielsen, T. Schneider, R. Trifiletti, Constant Round Maliciously Secure 2PC with Function-independent Preprocessing using LEGO (NDSS, 2017)

    Google Scholar 

  18. I. Damgaard, K.L. Damgaard, K. Nielsen, P.S. Nordholt, T. Toft, Confidential benchmarking based on multiparty computation. Financial Cryptography and Data Security. Lecture Notes in Computer Science, vol. 9603 (Springer, 2017), pp. 169–187

    Google Scholar 

  19. A. Charnes, W.W. Cooper, E. Rhodes, Measuring the efficiency of decision making units. Eur. J. Oper. Res. 2, 429–444 (1978)

    Article  MathSciNet  Google Scholar 

  20. A. Charnes, W.W. Cooper, E. Rhodes, Short communication: measuring the efficiency of decision making units. Eur. J. Oper. Res. 3, 339 (1979)

    Article  Google Scholar 

  21. E. Emrouznejad, B.R. Parker, G. Tavares, Evaluation of research in efficiency and productivity: a survey and analysis of the first 30 years of scholarly literature in DEA (Soc. Econ. Plann, Sci, 2008)

    Google Scholar 

  22. P.J. Agrell, P. Bogetoft, J. Tind, DEA and dynamic yardstick competition in Scandinavian electricity distribution. J. Prod. Anal. 23(2), 173–201 (2005)

    Article  Google Scholar 

  23. P. Bogetoft, K. Nielsen, DEA based auctions. Eur. J. Oper. Res. 184(2), 685–700 (2008)

    Article  Google Scholar 

  24. K. Nielsen, T. Toft, Secure relative performance scheme, in Proceedings of Workshop on Internet and Network Economics. LNCS (2007), 48–58

    Google Scholar 

  25. A. Cielen, L. Peeters, K. Vanhoof, Bankruptcy prediction using a data envelopment analysis. Eur. J. Oper. Res. 154(2), 526–532 (2004)

    Article  Google Scholar 

  26. J.C. Paradi, M. Asmild, P.C. Simak, Using DEA and worst practice DEA in credit risk evaluation. J. Prod. Anal. 21(2), 153–165 (2004)

    Article  Google Scholar 

  27. I.M. Premachandra, G.S. Bhabra, T. Sueyoshi, DEA as a tool for bankruptcy assessment: a comparative study with logistic regression technique. Eur. J. Oper. Res. 193(2), 412–424 (2009)

    Article  Google Scholar 

  28. R.D. Banker, A. Charnes, W.W. Cooper, Some models for estimating technical and scale inefficiencies in data envelopment analysis. Manage. Sci. 30, 1078–1092 (1984)

    Article  Google Scholar 

  29. P. Bogetoft, L. Otto, Benchmarking with DEA, SFA, and R (Springer, New York, 2011)

    Book  Google Scholar 

  30. W.W. Cooper, L.M. Seiford, K. Tone, Data envelopment analysis: a comprehensive text with models, applications, references and DEA-solver software, 2nd edn. (Springer, 2007)

    Google Scholar 

Download references

Acknowledgements

This research has been partially supported by the EU through the FP7 project PRACTICE and by the Danish Industry Foundation through the project “Big Data by Security”.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kurt Nielsen .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer International Publishing AG, part of Springer Nature

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Nielsen, K. (2019). Big Data and Sensitive Data. In: Emrouznejad, A., Charles, V. (eds) Big Data for the Greater Good. Studies in Big Data, vol 42. Springer, Cham. https://doi.org/10.1007/978-3-319-93061-9_9

Download citation

Publish with us

Policies and ethics