SlideShare a Scribd company logo
1 of 15
Download to read offline
© Hitachi, Ltd. 2020. All rights reserved.
A Secure Decision-Support Scheme for
Self-Sovereign Identity Management
SCIS 2020, Kochi, Japan – Session: 4E2 認証・ID管理
January 31st, 2020
Dr. Sven Wohlgemuth Hitachi, Ltd. R&D Group
Prof. Dr. Katsuyuki Umezawa Shonan Institute of Technology
Dr. Yusuke Mishina AIST CPSEC
Dr. Kazuo Takaragi AIST CPSEC
1© Hitachi, Ltd. 2020. All rights reserved.
Data Protection: From Login to Usage of Data
Productivity
Amount of data
PC Era
Web 1.0
Web 2.0
Web 3.0
Web 4.0
Desktop
The World Wide Web
The Social Web
The Semantic Web
The Intelligent Web
Transparency
Compliance
to contracts
Human-machine interaction
Machine-machine interaction
One-factor
identification
Multi-factor
identification
Reputation
Centralized data processing
Ubiquitous data processing
Client/Server data processing
... with automatic
decision support
Putting humans
back in control
In following Radar Networks & Nova Spivack, 2007; E. Brynjolfsson and A. McAfee, Race against the Machine, 2011.
2© Hitachi, Ltd. 2020. All rights reserved.
Data Protection: Chance and Risk for Intermediary
Data
provider
Data
consumer
Data
provider
Data
consumer
Decision on transaction depends on
data aggregation / inference of information
Problem: No control on data usage
dAlice
dAlice, d*Alice
SOX
eIDAS
Regulation
Accountability &
Transparency
on access to data
Identity
Master
identity
private
public
Qualification
Friends
Finance
Health
...
Alice
3© Hitachi, Ltd. 2020. All rights reserved.
MIT / W3C: Data Ownership & Data Portability
Data
provider
Data
consumer
Data
provider
Alice
Delegation of accountability
Personal Online Datastore
(POD) server
Guard (Enforcement of access rights)
Social graph
POD Charlie
https://charlie.incrupt.n
et/...
POD Bob
https://bob.incrupt.net/.
..POD Alice
https://alice.incrupt.net
Master identity
Qualification
Finance
Health
Friends
If “friend” then delegate rights on dAlice
Data ownership:
Accountability to
data provider
Alice: Master
identity
Bob: Master
identity
Required: Digital evidence about data usage
Data ownership:
Accountability to
data provider
d*Alice
data breach/
misuse?
4© Hitachi, Ltd. 2020. All rights reserved.
Digital Evidence: Entscheidungsproblem
Theory of computation
Predicate logic
of 2nd order
Predicate logic
of 1st order
Propositional
logic
Relationship
No relation 1:n
Knowledge
Information
Data
Is claimed “friend” = defender or attacker?
1:n:m
Security language?
Undecidable
• Goedel: Incompleteness
theorems
• Turing: Halting problem
DBMS
Typed access matrix with ORCON language
Access matrix /
NP-complete
problem
Proof-carrying code
Zero-knowledge proof
Language-based
security
Transform to
Mathematical induction
Equality: Identity relation F
𝑎 = 𝑏 ≡ ∀𝐹 𝐹 𝑎 = 𝐹 𝑏
5© Hitachi, Ltd. 2020. All rights reserved.
Mathematical Induction: Entscheidungsproblem
1. Basis step n=1: Secure database
2. Induction hypothesis for n:
Friend = True identity and policy enforcement
3. Inductive step n → n+1: Friend = Linked user
Dolev-Yao security model: Assume data breach/misuse (“You’re not a friend”)
Security mechanisms:
• Typed access control with mutual exclusion
• Byzantine Fault Tolerance with hash chain
• Certification with digital signature
Security mechanisms:
• (Sub) Graph isomorphism for equality
• Data Provenance
• Zero-Knowledge Proof Data
provider
Data
consumer
Data
provider
(dAlice, EncAlice) (dBob, EncBob)
dAlice, enc(dAlice,,
DecAlice)
Is data to be proven
true?
Zero-
knowledge
proof
Delega
tion of
rights
Access
history
Equality of graphs
Data
consumer
Entscheidungsproblem
6© Hitachi, Ltd. 2020. All rights reserved.
Interim Result: We have a Byzantine Consensus Problem
Data
provider
Data
consumer
Data
provider
Data
consumer
Data
provider
Data
consumer
Data
provider
Data
consumer
Goal: Majority of computations agrees on information
Case 1: Intermediary fails Case 2: A user fails
Assumption:
Bob is not a friend
Bob is not a
friend
Faked dBob
Bob is not a
friend
Is Bob a friend? Is Bob a friend?
System Risk: False Negative and False Positive → Other consensus required
dBob: Bob is a
friend
Claim:
Bob is a friend
Assumption:
Bob is not a friend
Claim:
Bob is a friend
7© Hitachi, Ltd. 2020. All rights reserved.
From now on: Humans as Oracle
Data
consumer
Data
provider
Oracle
Data
consumer
Data
provider
Computation: Turing Machine Enhanced by Oracle Realized by Humans
• Complete solution of decidable problems
• Reasoning with data provenance
• Solves decision and functional problems
• Used in security proof with attacker
• Expert decision-making
• Providing personal data
Qualification
Contract: Institution of open market economy
• Property rights and competition
• Consensus: Declaration of intent (e.g. NDA)
• Freedom to enter
• Adaptable to changes
dAlice,
d*Alice
Rights
Required: Protection against (IT) system risks
8© Hitachi, Ltd. 2020. All rights reserved.
From now on: Assume You’re a Friend
Verifier Prover
Alice
Challenge: You’re a friend
Challenge: Show relation of master identity to
a) Equality of some data sharing OR
b) All of Alice’s credentials
Response: Digital evidence on
contract-compliant use of data
Response: Contract-related knowledge on
a) Sub graph isomorphism to master identity
b) Relations of master identity
Anonymized observations
Zero-
knowledge
proof
In following: M. Blum, “How to Prove a Theorem So No One Else Can Claim It”, Proc. Int. Congress of Mathematics, 1986.
Attacker has to solve
NP-complete problem
Entscheidungsproblem
Delegated rights & use
9© Hitachi, Ltd. 2020. All rights reserved.
From now on: Secure Search by Reasoning
Search for “friend”
PoW by
Auditors …
Public ledgers Anonymized
data
provenance
Search result:
Base security score by Social
Graph on Bob’s data processing
Search result:
Base security score by Social
Graph on Bob’s data processing
Hyperledger
Data
provider
Data
consumer
BobAlice
Accountability &
Transparency on use of data
dAlice,
d*Alice
Rights
Decision:
If “friend” then
Secure Kernel 4 Supply
Chains (SK4SC)
by ZKP, Hysteresis Digital
Signature, and competition for
royalties on using identity
S. Wohlgemuth, K. Takaragi, I. Echizen,
Privacy with Secondary Use of Personal Information, 2016.
K. Takaragi, S. Wohlgemuth, 暗号技術と量子コン
ピュータ開発・「現状と課題」を考える, 久保田隆 (編
集), ブロックチェーンをめぐる実務・政策と法, 2018.
S. Wohlgemuth, K. Umezawa, Y. Mishina, K. Takaragi.
Competitive Compliance with Blockchain, 2019.
S. Wohlgemuth, K. Umezawa, K. Takaragi,
Secure Sharing of Design Information, 2018.
10© Hitachi, Ltd. 2020. All rights reserved.
From now on: Chance for Intermediaries by Privacy
Alice
Financial auditors, …
Physicians, …
Advisors, …
Economy
Energy
Healthcare
Control on data usage by compliance to contracts
Royalties for rights on using authentic information
Data
provider
dAlice
nym1
nym2
nym3
nym1
nym2
nym3
宝木 和夫、ウォルゲムト スベン、久保田 隆、三科 雄介、梅澤 克之、
渡邊 創, ブロックチェーンを用いた規制克服技術の考察 – A Study
of RegTech with blockchain, SCIS 2020.
CA
Auditor
Master identity
Qualification
11© Hitachi, Ltd. 2020. All rights reserved.
Conclusion for Self-Sovereign Identity Management
• Usage control enhances identity management for the Web
• By Byzantine consensus with contracts on data use and sharing with royalties
• By Transparency of secure delegation of rights with Zero-Knowledge Proof and SK4SC
• So that an attacker must solve the Entscheidungsproblem and NP-complete problem
• Without digital evidence on compliance for data originating from data breach/misuse
Data
provider
Data
consumer
Data
provider
Data
consumer
dAlice dAlice, d*Alice
14© Hitachi, Ltd. 2020. All rights reserved.
Zero-Knowledge Proof (ZKP)
• Proof of language membership & proof of knowledge of information
• Probabilistic proof system between 2 parties on graph isomorphism
• Prover is scalable in computing and can show only true statement
• Verifier gets no additional knowledge on original graph
U. Feige, A. Fiat, A. Shamir, “Zero-Knowledge Proofs of Identity”, 1998.
S. Goldwasser, S. Micali, C. Rackoff, “The Knowledge Complexity of Interactive Proof Systems”, 1989
O. Goldreich, S. Micali, A. Widgerson, “Proofs that Yield Nothing But Their Validity or All Languages in NP Have Zero-Knowledge Proof Systems”, 1991.
Verifier
2. a
3. c random out of {0,1}
4. c
5. r:= t + cm mod q
6. r
7. Check if gr = ahc
pkVerifier := (p, q, g, h)
ChallengeResponse
Prover
1. t random, a:=gt
pkVerifier := (p, q, g, h)
View publication statsView publication stats

More Related Content

What's hot

Product security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security CertsProduct security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security CertsLabSharegroup
 
Cybersecurity with AI - Ashrith Barthur
Cybersecurity with AI - Ashrith BarthurCybersecurity with AI - Ashrith Barthur
Cybersecurity with AI - Ashrith BarthurSri Ambati
 
Blockchain for IoT - Smart Home
Blockchain for IoT - Smart HomeBlockchain for IoT - Smart Home
Blockchain for IoT - Smart HomeBiagio Botticelli
 
Machine learning and ai in a brave new cloud world
Machine learning and ai in a brave new cloud worldMachine learning and ai in a brave new cloud world
Machine learning and ai in a brave new cloud worldUlf Mattsson
 
Enabling the data driven enterprise v3a
Enabling the data driven enterprise v3aEnabling the data driven enterprise v3a
Enabling the data driven enterprise v3armikkilineni
 
Trust Data Sharing and Utilization Infrastructure for Sensitive Data Using Hy...
Trust Data Sharing and Utilization Infrastructure for Sensitive Data Using Hy...Trust Data Sharing and Utilization Infrastructure for Sensitive Data Using Hy...
Trust Data Sharing and Utilization Infrastructure for Sensitive Data Using Hy...Koshi Ikegawa
 
Internet of Things (IoT) two-factor authentication using blockchain
Internet of Things (IoT) two-factor authentication using blockchainInternet of Things (IoT) two-factor authentication using blockchain
Internet of Things (IoT) two-factor authentication using blockchainDavid Wood
 
Understanding the "Intelligence" in AI
Understanding the "Intelligence" in AIUnderstanding the "Intelligence" in AI
Understanding the "Intelligence" in AIForcepoint LLC
 
AIOTI GA WG03 (IoT Standardisation) Chairman Presentation - 3 Nov 2015
 AIOTI  GA WG03 (IoT Standardisation) Chairman Presentation - 3 Nov 2015 AIOTI  GA WG03 (IoT Standardisation) Chairman Presentation - 3 Nov 2015
AIOTI GA WG03 (IoT Standardisation) Chairman Presentation - 3 Nov 2015Patrick GUILLEMIN
 
Securing data with blockchain and ai
Securing data with blockchain and aiSecuring data with blockchain and ai
Securing data with blockchain and aiVenkat Projects
 
IoT 7 Critical Musts
IoT 7 Critical MustsIoT 7 Critical Musts
IoT 7 Critical MustsClint Smith
 
Future Technology and Charities
Future Technology and CharitiesFuture Technology and Charities
Future Technology and Charitiesrhoddavies1
 
N-able webinar:Build recurring revenue in 45 days
N-able webinar:Build recurring revenue in 45 daysN-able webinar:Build recurring revenue in 45 days
N-able webinar:Build recurring revenue in 45 daysSolarwinds N-able
 
Hot technologies of 2019
Hot technologies of 2019Hot technologies of 2019
Hot technologies of 2019Ahmed Banafa
 
Emerging techonology presentation bw
Emerging techonology presentation bwEmerging techonology presentation bw
Emerging techonology presentation bwBridgetteWilliams15
 
ISSA: Next Generation Tokenization for Compliance and Cloud Data Protection
ISSA: Next Generation Tokenization for Compliance and Cloud Data ProtectionISSA: Next Generation Tokenization for Compliance and Cloud Data Protection
ISSA: Next Generation Tokenization for Compliance and Cloud Data ProtectionUlf Mattsson
 
Making real time data accessible through mixed reality
Making real time data accessible through mixed realityMaking real time data accessible through mixed reality
Making real time data accessible through mixed realityBogdan Deaky
 
Fog computing security and privacy issues, open challenges, and blockchain so...
Fog computing security and privacy issues, open challenges, and blockchain so...Fog computing security and privacy issues, open challenges, and blockchain so...
Fog computing security and privacy issues, open challenges, and blockchain so...IJECEIAES
 

What's hot (20)

Product security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security CertsProduct security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security Certs
 
Cybersecurity with AI - Ashrith Barthur
Cybersecurity with AI - Ashrith BarthurCybersecurity with AI - Ashrith Barthur
Cybersecurity with AI - Ashrith Barthur
 
ETIS Information Security Benchmark Successful Practices in telco security
ETIS Information Security Benchmark Successful Practices in telco securityETIS Information Security Benchmark Successful Practices in telco security
ETIS Information Security Benchmark Successful Practices in telco security
 
Blockchain for IoT - Smart Home
Blockchain for IoT - Smart HomeBlockchain for IoT - Smart Home
Blockchain for IoT - Smart Home
 
Machine learning and ai in a brave new cloud world
Machine learning and ai in a brave new cloud worldMachine learning and ai in a brave new cloud world
Machine learning and ai in a brave new cloud world
 
Enabling the data driven enterprise v3a
Enabling the data driven enterprise v3aEnabling the data driven enterprise v3a
Enabling the data driven enterprise v3a
 
Trust Data Sharing and Utilization Infrastructure for Sensitive Data Using Hy...
Trust Data Sharing and Utilization Infrastructure for Sensitive Data Using Hy...Trust Data Sharing and Utilization Infrastructure for Sensitive Data Using Hy...
Trust Data Sharing and Utilization Infrastructure for Sensitive Data Using Hy...
 
Internet of Things (IoT) two-factor authentication using blockchain
Internet of Things (IoT) two-factor authentication using blockchainInternet of Things (IoT) two-factor authentication using blockchain
Internet of Things (IoT) two-factor authentication using blockchain
 
Jae hyung lee mit
Jae hyung lee mitJae hyung lee mit
Jae hyung lee mit
 
Understanding the "Intelligence" in AI
Understanding the "Intelligence" in AIUnderstanding the "Intelligence" in AI
Understanding the "Intelligence" in AI
 
AIOTI GA WG03 (IoT Standardisation) Chairman Presentation - 3 Nov 2015
 AIOTI  GA WG03 (IoT Standardisation) Chairman Presentation - 3 Nov 2015 AIOTI  GA WG03 (IoT Standardisation) Chairman Presentation - 3 Nov 2015
AIOTI GA WG03 (IoT Standardisation) Chairman Presentation - 3 Nov 2015
 
Securing data with blockchain and ai
Securing data with blockchain and aiSecuring data with blockchain and ai
Securing data with blockchain and ai
 
IoT 7 Critical Musts
IoT 7 Critical MustsIoT 7 Critical Musts
IoT 7 Critical Musts
 
Future Technology and Charities
Future Technology and CharitiesFuture Technology and Charities
Future Technology and Charities
 
N-able webinar:Build recurring revenue in 45 days
N-able webinar:Build recurring revenue in 45 daysN-able webinar:Build recurring revenue in 45 days
N-able webinar:Build recurring revenue in 45 days
 
Hot technologies of 2019
Hot technologies of 2019Hot technologies of 2019
Hot technologies of 2019
 
Emerging techonology presentation bw
Emerging techonology presentation bwEmerging techonology presentation bw
Emerging techonology presentation bw
 
ISSA: Next Generation Tokenization for Compliance and Cloud Data Protection
ISSA: Next Generation Tokenization for Compliance and Cloud Data ProtectionISSA: Next Generation Tokenization for Compliance and Cloud Data Protection
ISSA: Next Generation Tokenization for Compliance and Cloud Data Protection
 
Making real time data accessible through mixed reality
Making real time data accessible through mixed realityMaking real time data accessible through mixed reality
Making real time data accessible through mixed reality
 
Fog computing security and privacy issues, open challenges, and blockchain so...
Fog computing security and privacy issues, open challenges, and blockchain so...Fog computing security and privacy issues, open challenges, and blockchain so...
Fog computing security and privacy issues, open challenges, and blockchain so...
 

Similar to Secure Decision Support for Self-Sovereign Identity

ISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloudISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloudUlf Mattsson
 
Privacy preserving computing and secure multi-party computation ISACA Atlanta
Privacy preserving computing and secure multi-party computation ISACA AtlantaPrivacy preserving computing and secure multi-party computation ISACA Atlanta
Privacy preserving computing and secure multi-party computation ISACA AtlantaUlf Mattsson
 
Secure Sharing of Design Information with Blockchains
Secure Sharing of Design Information with BlockchainsSecure Sharing of Design Information with Blockchains
Secure Sharing of Design Information with BlockchainsSven Wohlgemuth
 
Protecting data privacy in analytics and machine learning ISACA London UK
Protecting data privacy in analytics and machine learning ISACA London UKProtecting data privacy in analytics and machine learning ISACA London UK
Protecting data privacy in analytics and machine learning ISACA London UKUlf Mattsson
 
Cryptograpy Exam
Cryptograpy ExamCryptograpy Exam
Cryptograpy ExamLisa Olive
 
iDate: AI and blockchain
iDate: AI and blockchainiDate: AI and blockchain
iDate: AI and blockchain3G4G
 
Tokenization on the Node - Data Protection for Security and Compliance
Tokenization on the Node - Data Protection for Security and ComplianceTokenization on the Node - Data Protection for Security and Compliance
Tokenization on the Node - Data Protection for Security and ComplianceUlf Mattsson
 
Emerging application and data protection for multi cloud
Emerging application and data protection for multi cloudEmerging application and data protection for multi cloud
Emerging application and data protection for multi cloudUlf Mattsson
 
[GPATS 2013] Makoto (Mac) Yokozawa - Cyber Immune Systems That Helps Trust a...
[GPATS 2013]  Makoto (Mac) Yokozawa - Cyber Immune Systems That Helps Trust a...[GPATS 2013]  Makoto (Mac) Yokozawa - Cyber Immune Systems That Helps Trust a...
[GPATS 2013] Makoto (Mac) Yokozawa - Cyber Immune Systems That Helps Trust a...Assespro Nacional
 
Implications of GDPR for IoT Big Data Security and Privacy Fabric
Implications of GDPR for IoT Big Data Security and Privacy FabricImplications of GDPR for IoT Big Data Security and Privacy Fabric
Implications of GDPR for IoT Big Data Security and Privacy FabricMark Underwood
 
Trusted, Transparent and Fair AI using Open Source
Trusted, Transparent and Fair AI using Open SourceTrusted, Transparent and Fair AI using Open Source
Trusted, Transparent and Fair AI using Open SourceAnimesh Singh
 
Privacy Preserved Data Augmentation using Enterprise Data Fabric
Privacy Preserved Data Augmentation using Enterprise Data FabricPrivacy Preserved Data Augmentation using Enterprise Data Fabric
Privacy Preserved Data Augmentation using Enterprise Data FabricAtif Shaikh
 
Threat Modeling Everything
Threat Modeling EverythingThreat Modeling Everything
Threat Modeling EverythingAnne Oikarinen
 
Blockchain EXE #10:Ocean ProtocolとBigchainDB: 分散型データエコシステムの実現(Dimitri De Jong...
Blockchain EXE #10:Ocean ProtocolとBigchainDB: 分散型データエコシステムの実現(Dimitri De Jong...Blockchain EXE #10:Ocean ProtocolとBigchainDB: 分散型データエコシステムの実現(Dimitri De Jong...
Blockchain EXE #10:Ocean ProtocolとBigchainDB: 分散型データエコシステムの実現(Dimitri De Jong...blockchainexe
 
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...ijccsa
 
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITYCOST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITYShakas Technologies
 
A Robust finger Print Authentication Scheme viaBlockchain to retrieve Citizen...
A Robust finger Print Authentication Scheme viaBlockchain to retrieve Citizen...A Robust finger Print Authentication Scheme viaBlockchain to retrieve Citizen...
A Robust finger Print Authentication Scheme viaBlockchain to retrieve Citizen...IRJET Journal
 
Data Con LA 2019 - Securing IoT Data with Pervasive Encryption by Eysha Shirr...
Data Con LA 2019 - Securing IoT Data with Pervasive Encryption by Eysha Shirr...Data Con LA 2019 - Securing IoT Data with Pervasive Encryption by Eysha Shirr...
Data Con LA 2019 - Securing IoT Data with Pervasive Encryption by Eysha Shirr...Data Con LA
 
ISACA Houston - Practical data privacy and de-identification techniques
ISACA Houston  - Practical data privacy and de-identification techniquesISACA Houston  - Practical data privacy and de-identification techniques
ISACA Houston - Practical data privacy and de-identification techniquesUlf Mattsson
 

Similar to Secure Decision Support for Self-Sovereign Identity (20)

ISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloudISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloud
 
Privacy preserving computing and secure multi-party computation ISACA Atlanta
Privacy preserving computing and secure multi-party computation ISACA AtlantaPrivacy preserving computing and secure multi-party computation ISACA Atlanta
Privacy preserving computing and secure multi-party computation ISACA Atlanta
 
Secure Sharing of Design Information with Blockchains
Secure Sharing of Design Information with BlockchainsSecure Sharing of Design Information with Blockchains
Secure Sharing of Design Information with Blockchains
 
Protecting data privacy in analytics and machine learning ISACA London UK
Protecting data privacy in analytics and machine learning ISACA London UKProtecting data privacy in analytics and machine learning ISACA London UK
Protecting data privacy in analytics and machine learning ISACA London UK
 
Cryptograpy Exam
Cryptograpy ExamCryptograpy Exam
Cryptograpy Exam
 
iDate: AI and blockchain
iDate: AI and blockchainiDate: AI and blockchain
iDate: AI and blockchain
 
Tokenization on the Node - Data Protection for Security and Compliance
Tokenization on the Node - Data Protection for Security and ComplianceTokenization on the Node - Data Protection for Security and Compliance
Tokenization on the Node - Data Protection for Security and Compliance
 
Emerging application and data protection for multi cloud
Emerging application and data protection for multi cloudEmerging application and data protection for multi cloud
Emerging application and data protection for multi cloud
 
[GPATS 2013] Makoto (Mac) Yokozawa - Cyber Immune Systems That Helps Trust a...
[GPATS 2013]  Makoto (Mac) Yokozawa - Cyber Immune Systems That Helps Trust a...[GPATS 2013]  Makoto (Mac) Yokozawa - Cyber Immune Systems That Helps Trust a...
[GPATS 2013] Makoto (Mac) Yokozawa - Cyber Immune Systems That Helps Trust a...
 
Implications of GDPR for IoT Big Data Security and Privacy Fabric
Implications of GDPR for IoT Big Data Security and Privacy FabricImplications of GDPR for IoT Big Data Security and Privacy Fabric
Implications of GDPR for IoT Big Data Security and Privacy Fabric
 
Trusted, Transparent and Fair AI using Open Source
Trusted, Transparent and Fair AI using Open SourceTrusted, Transparent and Fair AI using Open Source
Trusted, Transparent and Fair AI using Open Source
 
Privacy Preserved Data Augmentation using Enterprise Data Fabric
Privacy Preserved Data Augmentation using Enterprise Data FabricPrivacy Preserved Data Augmentation using Enterprise Data Fabric
Privacy Preserved Data Augmentation using Enterprise Data Fabric
 
Ieee itmsb20
Ieee itmsb20Ieee itmsb20
Ieee itmsb20
 
Threat Modeling Everything
Threat Modeling EverythingThreat Modeling Everything
Threat Modeling Everything
 
Blockchain EXE #10:Ocean ProtocolとBigchainDB: 分散型データエコシステムの実現(Dimitri De Jong...
Blockchain EXE #10:Ocean ProtocolとBigchainDB: 分散型データエコシステムの実現(Dimitri De Jong...Blockchain EXE #10:Ocean ProtocolとBigchainDB: 分散型データエコシステムの実現(Dimitri De Jong...
Blockchain EXE #10:Ocean ProtocolとBigchainDB: 分散型データエコシステムの実現(Dimitri De Jong...
 
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
 
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITYCOST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
 
A Robust finger Print Authentication Scheme viaBlockchain to retrieve Citizen...
A Robust finger Print Authentication Scheme viaBlockchain to retrieve Citizen...A Robust finger Print Authentication Scheme viaBlockchain to retrieve Citizen...
A Robust finger Print Authentication Scheme viaBlockchain to retrieve Citizen...
 
Data Con LA 2019 - Securing IoT Data with Pervasive Encryption by Eysha Shirr...
Data Con LA 2019 - Securing IoT Data with Pervasive Encryption by Eysha Shirr...Data Con LA 2019 - Securing IoT Data with Pervasive Encryption by Eysha Shirr...
Data Con LA 2019 - Securing IoT Data with Pervasive Encryption by Eysha Shirr...
 
ISACA Houston - Practical data privacy and de-identification techniques
ISACA Houston  - Practical data privacy and de-identification techniquesISACA Houston  - Practical data privacy and de-identification techniques
ISACA Houston - Practical data privacy and de-identification techniques
 

More from Sven Wohlgemuth

個人情報の有効活用を可能にする (Enabling effective use of personal information)
 個人情報の有効活用を可能にする (Enabling effective use of personal information) 個人情報の有効活用を可能にする (Enabling effective use of personal information)
個人情報の有効活用を可能にする (Enabling effective use of personal information)Sven Wohlgemuth
 
Tagging Disclosure of Personal Data to Third Parties to Preserve Privacy
Tagging Disclosure of Personal Data to Third Parties to Preserve PrivacyTagging Disclosure of Personal Data to Third Parties to Preserve Privacy
Tagging Disclosure of Personal Data to Third Parties to Preserve PrivacySven Wohlgemuth
 
Privacy-Enhancing Trust Infrastructure for Process Mining
Privacy-Enhancing Trust Infrastructure for Process MiningPrivacy-Enhancing Trust Infrastructure for Process Mining
Privacy-Enhancing Trust Infrastructure for Process MiningSven Wohlgemuth
 
EN 6.3: 3 Sicherheitsmodelle
EN 6.3: 3 SicherheitsmodelleEN 6.3: 3 Sicherheitsmodelle
EN 6.3: 3 SicherheitsmodelleSven Wohlgemuth
 
Privacy in Business Processes by User-Centric Identity Management
Privacy in Business Processes by User-Centric Identity ManagementPrivacy in Business Processes by User-Centric Identity Management
Privacy in Business Processes by User-Centric Identity ManagementSven Wohlgemuth
 
WP14 Workshop "From Data Economy to Secure Logging as a Step towards Transpar...
WP14 Workshop "From Data Economy to Secure Logging as a Step towards Transpar...WP14 Workshop "From Data Economy to Secure Logging as a Step towards Transpar...
WP14 Workshop "From Data Economy to Secure Logging as a Step towards Transpar...Sven Wohlgemuth
 
On Privacy in Medical Services with Electronic Health Records
On Privacy in Medical Services with Electronic Health RecordsOn Privacy in Medical Services with Electronic Health Records
On Privacy in Medical Services with Electronic Health RecordsSven Wohlgemuth
 
EN 6.3: 2 IT-Compliance und IT-Sicherheitsmanagement
EN 6.3: 2 IT-Compliance und IT-SicherheitsmanagementEN 6.3: 2 IT-Compliance und IT-Sicherheitsmanagement
EN 6.3: 2 IT-Compliance und IT-SicherheitsmanagementSven Wohlgemuth
 
EN 6.3: 1 IT-Sicherheit und Technischer Datenschutz
EN 6.3: 1 IT-Sicherheit und Technischer DatenschutzEN 6.3: 1 IT-Sicherheit und Technischer Datenschutz
EN 6.3: 1 IT-Sicherheit und Technischer DatenschutzSven Wohlgemuth
 
Privacy with Secondary Use of Personal Information
Privacy with Secondary Use of Personal InformationPrivacy with Secondary Use of Personal Information
Privacy with Secondary Use of Personal InformationSven Wohlgemuth
 
International Workshop on Information Systems for Social Innovation (ISSI) 2009
International Workshop on Information Systems for Social Innovation (ISSI) 2009International Workshop on Information Systems for Social Innovation (ISSI) 2009
International Workshop on Information Systems for Social Innovation (ISSI) 2009Sven Wohlgemuth
 
Durchsetzung von Privacy Policies in Dienstenetzen
Durchsetzung von Privacy Policies in DienstenetzenDurchsetzung von Privacy Policies in Dienstenetzen
Durchsetzung von Privacy Policies in DienstenetzenSven Wohlgemuth
 
Privacy in Business Processes by User-Centric Identity Management
Privacy in Business Processes by User-Centric Identity ManagementPrivacy in Business Processes by User-Centric Identity Management
Privacy in Business Processes by User-Centric Identity ManagementSven Wohlgemuth
 
Privacy in Business Processes by Identity Management
Privacy in Business Processes by Identity ManagementPrivacy in Business Processes by Identity Management
Privacy in Business Processes by Identity ManagementSven Wohlgemuth
 
Schlüsselverwaltung - Objektorientierter Entwurf und Implementierung
Schlüsselverwaltung - Objektorientierter Entwurf und ImplementierungSchlüsselverwaltung - Objektorientierter Entwurf und Implementierung
Schlüsselverwaltung - Objektorientierter Entwurf und ImplementierungSven Wohlgemuth
 
Resilience by Usable Security
Resilience by Usable SecurityResilience by Usable Security
Resilience by Usable SecuritySven Wohlgemuth
 
Sicherheit in einer vernetzten Welt
Sicherheit in einer vernetzten WeltSicherheit in einer vernetzten Welt
Sicherheit in einer vernetzten WeltSven Wohlgemuth
 
Solutions for Coping with Privacy and Usability
Solutions for Coping with Privacy and UsabilitySolutions for Coping with Privacy and Usability
Solutions for Coping with Privacy and UsabilitySven Wohlgemuth
 

More from Sven Wohlgemuth (20)

個人情報の有効活用を可能にする (Enabling effective use of personal information)
 個人情報の有効活用を可能にする (Enabling effective use of personal information) 個人情報の有効活用を可能にする (Enabling effective use of personal information)
個人情報の有効活用を可能にする (Enabling effective use of personal information)
 
Tagging Disclosure of Personal Data to Third Parties to Preserve Privacy
Tagging Disclosure of Personal Data to Third Parties to Preserve PrivacyTagging Disclosure of Personal Data to Third Parties to Preserve Privacy
Tagging Disclosure of Personal Data to Third Parties to Preserve Privacy
 
Privacy-Enhancing Trust Infrastructure for Process Mining
Privacy-Enhancing Trust Infrastructure for Process MiningPrivacy-Enhancing Trust Infrastructure for Process Mining
Privacy-Enhancing Trust Infrastructure for Process Mining
 
EN 6.3: 4 Kryptographie
EN 6.3: 4 KryptographieEN 6.3: 4 Kryptographie
EN 6.3: 4 Kryptographie
 
EN 6.3: 3 Sicherheitsmodelle
EN 6.3: 3 SicherheitsmodelleEN 6.3: 3 Sicherheitsmodelle
EN 6.3: 3 Sicherheitsmodelle
 
Privacy in Business Processes by User-Centric Identity Management
Privacy in Business Processes by User-Centric Identity ManagementPrivacy in Business Processes by User-Centric Identity Management
Privacy in Business Processes by User-Centric Identity Management
 
WP14 Workshop "From Data Economy to Secure Logging as a Step towards Transpar...
WP14 Workshop "From Data Economy to Secure Logging as a Step towards Transpar...WP14 Workshop "From Data Economy to Secure Logging as a Step towards Transpar...
WP14 Workshop "From Data Economy to Secure Logging as a Step towards Transpar...
 
Privacy in e-Health
Privacy in e-HealthPrivacy in e-Health
Privacy in e-Health
 
On Privacy in Medical Services with Electronic Health Records
On Privacy in Medical Services with Electronic Health RecordsOn Privacy in Medical Services with Electronic Health Records
On Privacy in Medical Services with Electronic Health Records
 
EN 6.3: 2 IT-Compliance und IT-Sicherheitsmanagement
EN 6.3: 2 IT-Compliance und IT-SicherheitsmanagementEN 6.3: 2 IT-Compliance und IT-Sicherheitsmanagement
EN 6.3: 2 IT-Compliance und IT-Sicherheitsmanagement
 
EN 6.3: 1 IT-Sicherheit und Technischer Datenschutz
EN 6.3: 1 IT-Sicherheit und Technischer DatenschutzEN 6.3: 1 IT-Sicherheit und Technischer Datenschutz
EN 6.3: 1 IT-Sicherheit und Technischer Datenschutz
 
Privacy with Secondary Use of Personal Information
Privacy with Secondary Use of Personal InformationPrivacy with Secondary Use of Personal Information
Privacy with Secondary Use of Personal Information
 
International Workshop on Information Systems for Social Innovation (ISSI) 2009
International Workshop on Information Systems for Social Innovation (ISSI) 2009International Workshop on Information Systems for Social Innovation (ISSI) 2009
International Workshop on Information Systems for Social Innovation (ISSI) 2009
 
Durchsetzung von Privacy Policies in Dienstenetzen
Durchsetzung von Privacy Policies in DienstenetzenDurchsetzung von Privacy Policies in Dienstenetzen
Durchsetzung von Privacy Policies in Dienstenetzen
 
Privacy in Business Processes by User-Centric Identity Management
Privacy in Business Processes by User-Centric Identity ManagementPrivacy in Business Processes by User-Centric Identity Management
Privacy in Business Processes by User-Centric Identity Management
 
Privacy in Business Processes by Identity Management
Privacy in Business Processes by Identity ManagementPrivacy in Business Processes by Identity Management
Privacy in Business Processes by Identity Management
 
Schlüsselverwaltung - Objektorientierter Entwurf und Implementierung
Schlüsselverwaltung - Objektorientierter Entwurf und ImplementierungSchlüsselverwaltung - Objektorientierter Entwurf und Implementierung
Schlüsselverwaltung - Objektorientierter Entwurf und Implementierung
 
Resilience by Usable Security
Resilience by Usable SecurityResilience by Usable Security
Resilience by Usable Security
 
Sicherheit in einer vernetzten Welt
Sicherheit in einer vernetzten WeltSicherheit in einer vernetzten Welt
Sicherheit in einer vernetzten Welt
 
Solutions for Coping with Privacy and Usability
Solutions for Coping with Privacy and UsabilitySolutions for Coping with Privacy and Usability
Solutions for Coping with Privacy and Usability
 

Recently uploaded

Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhimiss dipika
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一Fs
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一z xss
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书zdzoqco
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationLinaWolf1
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)Christopher H Felton
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Paul Calvano
 
Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Excelmac1
 
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Sonam Pathan
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作ys8omjxb
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一Fs
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Sonam Pathan
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一Fs
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxDyna Gilbert
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Dana Luther
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一Fs
 
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Lucknow
 

Recently uploaded (20)

Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhi
 
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 Documentation
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24
 
Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...
 
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
 
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptx
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
 
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
 
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
 

Secure Decision Support for Self-Sovereign Identity

  • 1. © Hitachi, Ltd. 2020. All rights reserved. A Secure Decision-Support Scheme for Self-Sovereign Identity Management SCIS 2020, Kochi, Japan – Session: 4E2 認証・ID管理 January 31st, 2020 Dr. Sven Wohlgemuth Hitachi, Ltd. R&D Group Prof. Dr. Katsuyuki Umezawa Shonan Institute of Technology Dr. Yusuke Mishina AIST CPSEC Dr. Kazuo Takaragi AIST CPSEC
  • 2. 1© Hitachi, Ltd. 2020. All rights reserved. Data Protection: From Login to Usage of Data Productivity Amount of data PC Era Web 1.0 Web 2.0 Web 3.0 Web 4.0 Desktop The World Wide Web The Social Web The Semantic Web The Intelligent Web Transparency Compliance to contracts Human-machine interaction Machine-machine interaction One-factor identification Multi-factor identification Reputation Centralized data processing Ubiquitous data processing Client/Server data processing ... with automatic decision support Putting humans back in control In following Radar Networks & Nova Spivack, 2007; E. Brynjolfsson and A. McAfee, Race against the Machine, 2011.
  • 3. 2© Hitachi, Ltd. 2020. All rights reserved. Data Protection: Chance and Risk for Intermediary Data provider Data consumer Data provider Data consumer Decision on transaction depends on data aggregation / inference of information Problem: No control on data usage dAlice dAlice, d*Alice SOX eIDAS Regulation Accountability & Transparency on access to data Identity Master identity private public Qualification Friends Finance Health ... Alice
  • 4. 3© Hitachi, Ltd. 2020. All rights reserved. MIT / W3C: Data Ownership & Data Portability Data provider Data consumer Data provider Alice Delegation of accountability Personal Online Datastore (POD) server Guard (Enforcement of access rights) Social graph POD Charlie https://charlie.incrupt.n et/... POD Bob https://bob.incrupt.net/. ..POD Alice https://alice.incrupt.net Master identity Qualification Finance Health Friends If “friend” then delegate rights on dAlice Data ownership: Accountability to data provider Alice: Master identity Bob: Master identity Required: Digital evidence about data usage Data ownership: Accountability to data provider d*Alice data breach/ misuse?
  • 5. 4© Hitachi, Ltd. 2020. All rights reserved. Digital Evidence: Entscheidungsproblem Theory of computation Predicate logic of 2nd order Predicate logic of 1st order Propositional logic Relationship No relation 1:n Knowledge Information Data Is claimed “friend” = defender or attacker? 1:n:m Security language? Undecidable • Goedel: Incompleteness theorems • Turing: Halting problem DBMS Typed access matrix with ORCON language Access matrix / NP-complete problem Proof-carrying code Zero-knowledge proof Language-based security Transform to Mathematical induction Equality: Identity relation F 𝑎 = 𝑏 ≡ ∀𝐹 𝐹 𝑎 = 𝐹 𝑏
  • 6. 5© Hitachi, Ltd. 2020. All rights reserved. Mathematical Induction: Entscheidungsproblem 1. Basis step n=1: Secure database 2. Induction hypothesis for n: Friend = True identity and policy enforcement 3. Inductive step n → n+1: Friend = Linked user Dolev-Yao security model: Assume data breach/misuse (“You’re not a friend”) Security mechanisms: • Typed access control with mutual exclusion • Byzantine Fault Tolerance with hash chain • Certification with digital signature Security mechanisms: • (Sub) Graph isomorphism for equality • Data Provenance • Zero-Knowledge Proof Data provider Data consumer Data provider (dAlice, EncAlice) (dBob, EncBob) dAlice, enc(dAlice,, DecAlice) Is data to be proven true? Zero- knowledge proof Delega tion of rights Access history Equality of graphs Data consumer Entscheidungsproblem
  • 7. 6© Hitachi, Ltd. 2020. All rights reserved. Interim Result: We have a Byzantine Consensus Problem Data provider Data consumer Data provider Data consumer Data provider Data consumer Data provider Data consumer Goal: Majority of computations agrees on information Case 1: Intermediary fails Case 2: A user fails Assumption: Bob is not a friend Bob is not a friend Faked dBob Bob is not a friend Is Bob a friend? Is Bob a friend? System Risk: False Negative and False Positive → Other consensus required dBob: Bob is a friend Claim: Bob is a friend Assumption: Bob is not a friend Claim: Bob is a friend
  • 8. 7© Hitachi, Ltd. 2020. All rights reserved. From now on: Humans as Oracle Data consumer Data provider Oracle Data consumer Data provider Computation: Turing Machine Enhanced by Oracle Realized by Humans • Complete solution of decidable problems • Reasoning with data provenance • Solves decision and functional problems • Used in security proof with attacker • Expert decision-making • Providing personal data Qualification Contract: Institution of open market economy • Property rights and competition • Consensus: Declaration of intent (e.g. NDA) • Freedom to enter • Adaptable to changes dAlice, d*Alice Rights Required: Protection against (IT) system risks
  • 9. 8© Hitachi, Ltd. 2020. All rights reserved. From now on: Assume You’re a Friend Verifier Prover Alice Challenge: You’re a friend Challenge: Show relation of master identity to a) Equality of some data sharing OR b) All of Alice’s credentials Response: Digital evidence on contract-compliant use of data Response: Contract-related knowledge on a) Sub graph isomorphism to master identity b) Relations of master identity Anonymized observations Zero- knowledge proof In following: M. Blum, “How to Prove a Theorem So No One Else Can Claim It”, Proc. Int. Congress of Mathematics, 1986. Attacker has to solve NP-complete problem Entscheidungsproblem Delegated rights & use
  • 10. 9© Hitachi, Ltd. 2020. All rights reserved. From now on: Secure Search by Reasoning Search for “friend” PoW by Auditors … Public ledgers Anonymized data provenance Search result: Base security score by Social Graph on Bob’s data processing Search result: Base security score by Social Graph on Bob’s data processing Hyperledger Data provider Data consumer BobAlice Accountability & Transparency on use of data dAlice, d*Alice Rights Decision: If “friend” then Secure Kernel 4 Supply Chains (SK4SC) by ZKP, Hysteresis Digital Signature, and competition for royalties on using identity S. Wohlgemuth, K. Takaragi, I. Echizen, Privacy with Secondary Use of Personal Information, 2016. K. Takaragi, S. Wohlgemuth, 暗号技術と量子コン ピュータ開発・「現状と課題」を考える, 久保田隆 (編 集), ブロックチェーンをめぐる実務・政策と法, 2018. S. Wohlgemuth, K. Umezawa, Y. Mishina, K. Takaragi. Competitive Compliance with Blockchain, 2019. S. Wohlgemuth, K. Umezawa, K. Takaragi, Secure Sharing of Design Information, 2018.
  • 11. 10© Hitachi, Ltd. 2020. All rights reserved. From now on: Chance for Intermediaries by Privacy Alice Financial auditors, … Physicians, … Advisors, … Economy Energy Healthcare Control on data usage by compliance to contracts Royalties for rights on using authentic information Data provider dAlice nym1 nym2 nym3 nym1 nym2 nym3 宝木 和夫、ウォルゲムト スベン、久保田 隆、三科 雄介、梅澤 克之、 渡邊 創, ブロックチェーンを用いた規制克服技術の考察 – A Study of RegTech with blockchain, SCIS 2020. CA Auditor Master identity Qualification
  • 12. 11© Hitachi, Ltd. 2020. All rights reserved. Conclusion for Self-Sovereign Identity Management • Usage control enhances identity management for the Web • By Byzantine consensus with contracts on data use and sharing with royalties • By Transparency of secure delegation of rights with Zero-Knowledge Proof and SK4SC • So that an attacker must solve the Entscheidungsproblem and NP-complete problem • Without digital evidence on compliance for data originating from data breach/misuse Data provider Data consumer Data provider Data consumer dAlice dAlice, d*Alice
  • 13.
  • 14.
  • 15. 14© Hitachi, Ltd. 2020. All rights reserved. Zero-Knowledge Proof (ZKP) • Proof of language membership & proof of knowledge of information • Probabilistic proof system between 2 parties on graph isomorphism • Prover is scalable in computing and can show only true statement • Verifier gets no additional knowledge on original graph U. Feige, A. Fiat, A. Shamir, “Zero-Knowledge Proofs of Identity”, 1998. S. Goldwasser, S. Micali, C. Rackoff, “The Knowledge Complexity of Interactive Proof Systems”, 1989 O. Goldreich, S. Micali, A. Widgerson, “Proofs that Yield Nothing But Their Validity or All Languages in NP Have Zero-Knowledge Proof Systems”, 1991. Verifier 2. a 3. c random out of {0,1} 4. c 5. r:= t + cm mod q 6. r 7. Check if gr = ahc pkVerifier := (p, q, g, h) ChallengeResponse Prover 1. t random, a:=gt pkVerifier := (p, q, g, h) View publication statsView publication stats