SlideShare a Scribd company logo
Methods and Tools for GDPR Compliance through
Privacy and Data
Protection 4 Engineering
Long term security evolution of AI
and data protection
Antonio Kung
Trialog, 25 rue du Général Foy 75008 Paris
antonio.kung@trialog.com
26 March 2021 Long-term security evolution of AI and data protection Slide 1
This project has received funding from the European
Union’s Horizon 2020 research and innovation
programme under grant agreement No 787034
Long term security evolution of AI and
data protection
❑Background
❑Characterisation of AI-based systems
❑Long term security evolution
❑Using models
26 March 2021 Long-term security evolution of AI and data protection Slide 2
Background
❑Embedded systems, Cyberphysical systems, Internet of things
❑Various domains
❑Privacy
❑Security
❑Trustworthiness
❑Interoperability
❑Architecture
❑AI
❑Involvement in standards
❑Guidance for organisations
❑Guidance for ecosystems
26 March 2021 Long-term security evolution of AI and data protection 3
https://edps.europa.eu/data-protection/ipen-internet-privacy-engineering-network_en
https://ipen.trialog.com/wiki/Wiki_for_Privacy_Standards_and_Privacy_Projects
Background on AI
❑Study impact of AI on security and privacy (ISO/IEC SC27)
❑Study 132 use cases (ISO/IEC 24030 AI use cases)
❑Guidance for security
❑Guidance for privacy
❑Study impact of AI on an ICT domain (ISO TC215)
❑Impact of AI on health ICT
❑Impact of AI on health ICT systems
❑Study impact of AI on architecture (ISO/IEC AG8)
❑For instance alignment of IoT reference architecture with Knowledge
engineering reference architecture
26 March 2021 Long-term security evolution of AI and data protection 4
Long term security evolution of AI and
data protection
❑Background
❑Characterisation of AI-based systems
❑Long term security evolution
❑Using models
26 March 2021 Long-term security evolution of AI and data protection Slide 5
AI based applications
❑Current wave
❑Automatic speech recognition
❑Machine translation
❑Spam filters
❑Search engines
❑…
❑Upcoming wave
❑Autonomous cars
❑Robots for elderly people
❑Autonomous drones
❑…
26 March 2021 Long-term security evolution of AI and data protection 6
Ecosystem Perspective
Example of cooperative ITS
26 March 2021 Long-term security evolution of AI and data protection 7
Pseudonymization authority
Road side unit
Sending vehicle
Receiving vehicle
Ecosystem Perspective
Example of cooperative ITS
26 March 2021 Long-term security evolution of AI and data protection 8
PKI operator
Vehicle
operator
Use case
operator
AI capability
(e.g. autonomous
driving)
AI capability
(e.g. autonomous
driving)
Lifecycle Perspective
26 March 2021 Long-term security evolution of AI and data protection Slide 9
AI system design &
implementation
AI system training
AI system
integration into
SoS
SoS operation
Training data Application data
Continuous improvement
Governance Perspective
26 March 2021 Long-term security evolution of AI and data protection 10
to
on
Governance body
Governed subject Policies
follows
Monitors Establishes
Governance Perspective
26 March 2021 Long-term security evolution of AI and data protection 11
to
on
Governance body
AI-based
Autonomous
System
Policies
follows
Monitors Establishes
Long term security evolution of AI and
data protection
❑Background
❑Characterisation of AI-based systems
❑Long term security evolution
❑Using models
26 March 2021 Long-term security evolution of AI and data protection Slide 12
Ecosystem Perspective
Example of cooperative ITS
26 March 2021 Long-term security evolution of AI and data protection 13
PKI operator
Vehicle
operator
Use case
operator
AI capability
(e.g. autonomous
driving)
AI capability
(e.g. autonomous
driving)
Lifecycle Perspective
26 March 2021 Long-term security evolution of AI and data protection Slide 14
AI system design &
implementation
AI system training
AI system
integration into
SoS
SoS operation
Training data Application data
Continuous improvement
Governance Perspective
26 March 2021 Long-term security evolution of AI and data protection 15
Governance body
AI-based
Autonomous
System
Policies
follows
Monitors Establishes
Approach
Slide 16
System
Trustworthiness
capability
Long-term
security
Technical/
Organisational
Functional
capability
26 March 2021 Long-term security evolution of AI and data protection
Long term security evolution of AI and
data protection
❑Background
❑Characterisation of AI-based systems
❑Long term security evolution
❑Using models
26 March 2021 Long-term security evolution of AI and data protection Slide 17
Using Models
26 March 2021 Long-term security evolution of AI and data protection Slide 18
Model engineering
constructing proportionally-scaled
miniature working representations
of full-sized machines
Model driven engineering
expressing specifications
through processable models.
Diagram orientation (e.g. UML diagrams)
Source wikipedia
Approach
System model
Trustworthiness
Capability model
Long-term
security
model
Functional
capability model
Slide 19
System
Trustworthiness
capability
Functional
capability
26 March 2021 Long-term security evolution of AI and data protection
Long-term
security
Technical/
Organisational
Community of BAMs
❑Best Available protection Models (BAM)
❑most effective and advanced capabilities
❑suitable in practice for privacy compliance
❑designed to address risks on privacy and security.
❑Analogy with best available techniques
26 March 2021 Long-term security evolution of AI and data protection Slide 20
There is a need for many BAMs
26 March 2021 Long-term security evolution of AI and data protection Slide 21
Consumer applications
Protection models
AI in
Health
AI in Social
network
AI in
Mobility
AI in Smart
home
AI in
Fintech
…
IoT applications
Protection models
AI in
Connected
vehicles
AI in E-
mobility
AI in Smart
energy
AI in
Assisted
Living
AI in
Security
…
Data processing
Protection models
Application developer
reuses a BAM and its implementation
26 March 2021 Long-term security evolution of AI and data protection Slide 22
Reuses
Application developer
Open community
repository
Open
source
Guidance
BAM
Application developer
develop a BAM
26 March 2021 Long-term security evolution of AI and data protection Slide 23
Submits
Open community
repository
Open
source
Modelling tools
Uses
Privacy
engineering tools
Application developer
Guidance
BAM
Eclipse Privacy-by-model Community
26 March 2021 Long-term security evolution of AI and data protection Slide 24
Stakeholders
Privacy model expert
PbM Steering committee
(1) Provides
Guidance for models
(3) Provides
model
(3) Provides
model
Stakeholders
Application privacy protection
Project Task force
Stakeholders
Privacy engineering project
Task force
(2) Uses
(2) Uses
Stakeholders
Privacy model expert
PbM Validation committee
(4)Validates
model
(4) Validates
model
Best
Available
Models
(5) Publishes
model
Join the future Privacy-by-model
community!
Philippe Krief: philippe.krief@eclipse-foundation.org
Antonio Kung: antonio.kung@trialog.com
Samuel Martin: ys.martin@upm.es
26 March 2021 Long-term security evolution of AI and data protection Slide 25
This project has received funding from the European
Union’s Horizon 2020 research and innovation
programme under grant agreement No 787034

More Related Content

What's hot

Wp6 public
Wp6 publicWp6 public
Dpm presentation
Dpm presentationDpm presentation
MECATECH, building the Future
MECATECH, building the FutureMECATECH, building the Future
MECATECH, building the Future
Agence du Numérique (AdN)
 
Lightkone project : Lightweight computation for networks at the edge
Lightkone project : Lightweight computation for networks at the edgeLightkone project : Lightweight computation for networks at the edge
Lightkone project : Lightweight computation for networks at the edge
Agence du Numérique (AdN)
 
Towards Large-Scale, High-Density Indoor Ultra Wideband Geolocation Systems
Towards Large-Scale, High-Density Indoor Ultra Wideband Geolocation SystemsTowards Large-Scale, High-Density Indoor Ultra Wideband Geolocation Systems
Towards Large-Scale, High-Density Indoor Ultra Wideband Geolocation Systems
Agence du Numérique (AdN)
 
Data Privacy and Security in Autonomous Vehicles
Data Privacy and Security in Autonomous VehiclesData Privacy and Security in Autonomous Vehicles
Data Privacy and Security in Autonomous Vehicles
sulaiman_karim
 
Paris wp5 pd-pb_d
Paris wp5 pd-pb_dParis wp5 pd-pb_d
Multitel Cybersecurity Projects
Multitel Cybersecurity ProjectsMultitel Cybersecurity Projects
Multitel Cybersecurity Projects
Agence du Numérique (AdN)
 
Wp4 tool demonstration_v1
Wp4 tool demonstration_v1Wp4 tool demonstration_v1
Wp4 tool demonstration_v1
Privacy Data Protection for Engineering
 
2nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
2nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)2nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
2nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
ijdms
 
2 nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
2 nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)2 nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
2 nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
ijwscjournal
 
Applying IoT to the Management of Natural Disasters Risk NIAGRISK - A digital...
Applying IoT to the Management of Natural Disasters Risk NIAGRISK - A digital...Applying IoT to the Management of Natural Disasters Risk NIAGRISK - A digital...
Applying IoT to the Management of Natural Disasters Risk NIAGRISK - A digital...
Agence du Numérique (AdN)
 
2nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
2nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)2nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
2nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
albert ca
 
2nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
2nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)2nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
2nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
ijdms
 
e-SIDES workshop at ICT 2018, Vienna 5/12/2018
e-SIDES workshop at ICT 2018, Vienna 5/12/2018e-SIDES workshop at ICT 2018, Vienna 5/12/2018
e-SIDES workshop at ICT 2018, Vienna 5/12/2018
e-SIDES.eu
 
2 nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
2 nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)2 nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
2 nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
ijdms
 
6th International Conference on Cryptography and Information Security (CRIS 2...
6th International Conference on Cryptography and Information Security (CRIS 2...6th International Conference on Cryptography and Information Security (CRIS 2...
6th International Conference on Cryptography and Information Security (CRIS 2...
IJNSA Journal
 
Who will buy IOT products and why.
Who will buy IOT products and why.Who will buy IOT products and why.
Who will buy IOT products and why.
Atanu Roy Chowdhury
 
2nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
2nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)2nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
2nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
IJCNCJournal
 

What's hot (19)

Wp6 public
Wp6 publicWp6 public
Wp6 public
 
Dpm presentation
Dpm presentationDpm presentation
Dpm presentation
 
MECATECH, building the Future
MECATECH, building the FutureMECATECH, building the Future
MECATECH, building the Future
 
Lightkone project : Lightweight computation for networks at the edge
Lightkone project : Lightweight computation for networks at the edgeLightkone project : Lightweight computation for networks at the edge
Lightkone project : Lightweight computation for networks at the edge
 
Towards Large-Scale, High-Density Indoor Ultra Wideband Geolocation Systems
Towards Large-Scale, High-Density Indoor Ultra Wideband Geolocation SystemsTowards Large-Scale, High-Density Indoor Ultra Wideband Geolocation Systems
Towards Large-Scale, High-Density Indoor Ultra Wideband Geolocation Systems
 
Data Privacy and Security in Autonomous Vehicles
Data Privacy and Security in Autonomous VehiclesData Privacy and Security in Autonomous Vehicles
Data Privacy and Security in Autonomous Vehicles
 
Paris wp5 pd-pb_d
Paris wp5 pd-pb_dParis wp5 pd-pb_d
Paris wp5 pd-pb_d
 
Multitel Cybersecurity Projects
Multitel Cybersecurity ProjectsMultitel Cybersecurity Projects
Multitel Cybersecurity Projects
 
Wp4 tool demonstration_v1
Wp4 tool demonstration_v1Wp4 tool demonstration_v1
Wp4 tool demonstration_v1
 
2nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
2nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)2nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
2nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
 
2 nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
2 nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)2 nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
2 nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
 
Applying IoT to the Management of Natural Disasters Risk NIAGRISK - A digital...
Applying IoT to the Management of Natural Disasters Risk NIAGRISK - A digital...Applying IoT to the Management of Natural Disasters Risk NIAGRISK - A digital...
Applying IoT to the Management of Natural Disasters Risk NIAGRISK - A digital...
 
2nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
2nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)2nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
2nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
 
2nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
2nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)2nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
2nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
 
e-SIDES workshop at ICT 2018, Vienna 5/12/2018
e-SIDES workshop at ICT 2018, Vienna 5/12/2018e-SIDES workshop at ICT 2018, Vienna 5/12/2018
e-SIDES workshop at ICT 2018, Vienna 5/12/2018
 
2 nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
2 nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)2 nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
2 nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
 
6th International Conference on Cryptography and Information Security (CRIS 2...
6th International Conference on Cryptography and Information Security (CRIS 2...6th International Conference on Cryptography and Information Security (CRIS 2...
6th International Conference on Cryptography and Information Security (CRIS 2...
 
Who will buy IOT products and why.
Who will buy IOT products and why.Who will buy IOT products and why.
Who will buy IOT products and why.
 
2nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
2nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)2nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
2nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
 

Similar to Long term security evolution of ai and data protection antonio kung trialog pdp4 e

IEEE 2018 Java Projects | B-Tech Major Projects | M-Tech Major Projects | Mac...
IEEE 2018 Java Projects | B-Tech Major Projects | M-Tech Major Projects | Mac...IEEE 2018 Java Projects | B-Tech Major Projects | M-Tech Major Projects | Mac...
IEEE 2018 Java Projects | B-Tech Major Projects | M-Tech Major Projects | Mac...
CloudTechnologies
 
4th International Conference on Cloud, Big Data and IoT (CBIoT 2023)
4th International Conference on Cloud, Big Data and IoT (CBIoT 2023)4th International Conference on Cloud, Big Data and IoT (CBIoT 2023)
4th International Conference on Cloud, Big Data and IoT (CBIoT 2023)
IJMIT JOURNAL
 
Introduction to IoT Architectures and Protocols
Introduction to IoT Architectures and ProtocolsIntroduction to IoT Architectures and Protocols
Introduction to IoT Architectures and Protocols
Abdullah Alfadhly
 
Cloud computing security- critical infrastructures
Cloud computing security- critical infrastructuresCloud computing security- critical infrastructures
Cloud computing security- critical infrastructures
Mohammed Saqib
 
SmartManufacturing - Welcome - Marguglio.pptx
SmartManufacturing - Welcome - Marguglio.pptxSmartManufacturing - Welcome - Marguglio.pptx
SmartManufacturing - Welcome - Marguglio.pptx
FIWARE
 
BDE-BDVA Webinar: BigDataEurope Overview & Synergies with BDVA
BDE-BDVA Webinar: BigDataEurope Overview & Synergies with BDVABDE-BDVA Webinar: BigDataEurope Overview & Synergies with BDVA
BDE-BDVA Webinar: BigDataEurope Overview & Synergies with BDVA
BigData_Europe
 
2 nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
2 nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)2 nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
2 nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
ijwscjournal
 
Call for paper - 3rd International Conference on Cloud, Big Data and IoT (CBI...
Call for paper - 3rd International Conference on Cloud, Big Data and IoT (CBI...Call for paper - 3rd International Conference on Cloud, Big Data and IoT (CBI...
Call for paper - 3rd International Conference on Cloud, Big Data and IoT (CBI...
ijgca
 
UNICORN PROJECT - DELIVERABLE 1.2 - 'Unicorn Reference Architecture'
UNICORN PROJECT - DELIVERABLE 1.2 - 'Unicorn Reference Architecture'  UNICORN PROJECT - DELIVERABLE 1.2 - 'Unicorn Reference Architecture'
UNICORN PROJECT - DELIVERABLE 1.2 - 'Unicorn Reference Architecture'
UNICORN
 
PAPER SUBMISSION START NOW-4th International Conference on Cloud, Big Data an...
PAPER SUBMISSION START NOW-4th International Conference on Cloud, Big Data an...PAPER SUBMISSION START NOW-4th International Conference on Cloud, Big Data an...
PAPER SUBMISSION START NOW-4th International Conference on Cloud, Big Data an...
IJDKP
 
Become a cloud security expert
Become a cloud security expertBecome a cloud security expert
Become a cloud security expert
billysmit3
 
3rd International Conference on Cloud, Big Data and IoT (CBIoT 2022)
3rd International Conference on Cloud, Big Data and IoT (CBIoT 2022)3rd International Conference on Cloud, Big Data and IoT (CBIoT 2022)
3rd International Conference on Cloud, Big Data and IoT (CBIoT 2022)
ijccsa
 
Digital twin technology - seminar presentation
Digital twin technology - seminar presentationDigital twin technology - seminar presentation
Digital twin technology - seminar presentation
1js20ec036ksspoorthi
 
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
ijccsa
 
3rd International Conference on Cloud, Big Data and IoT (CBIoT 2022)
3rd International Conference on Cloud, Big Data and IoT (CBIoT 2022)3rd International Conference on Cloud, Big Data and IoT (CBIoT 2022)
3rd International Conference on Cloud, Big Data and IoT (CBIoT 2022)
ijccsa
 
Call for Paper - 3rd International Conference on Cloud, Big Data and IoT (CBI...
Call for Paper - 3rd International Conference on Cloud, Big Data and IoT (CBI...Call for Paper - 3rd International Conference on Cloud, Big Data and IoT (CBI...
Call for Paper - 3rd International Conference on Cloud, Big Data and IoT (CBI...
ijgca
 
3 rd International Conference on Cloud, Big Data and IoT (CBIoT 2022)
3 rd International Conference on Cloud, Big Data and IoT (CBIoT 2022)3 rd International Conference on Cloud, Big Data and IoT (CBIoT 2022)
3 rd International Conference on Cloud, Big Data and IoT (CBIoT 2022)
ijgca
 
3 rd International Conference on Cloud, Big Data and IoT (CBIoT 2022)
3 rd International Conference on Cloud, Big Data and IoT (CBIoT 2022)3 rd International Conference on Cloud, Big Data and IoT (CBIoT 2022)
3 rd International Conference on Cloud, Big Data and IoT (CBIoT 2022)
ijgca
 
Call for Paper - 3rd International Conference on Cloud, Big Data and IoT (CBI...
Call for Paper - 3rd International Conference on Cloud, Big Data and IoT (CBI...Call for Paper - 3rd International Conference on Cloud, Big Data and IoT (CBI...
Call for Paper - 3rd International Conference on Cloud, Big Data and IoT (CBI...
ijgca
 
A Brief Survey on Various Technologies Involved in Cloud Computing Security
A Brief Survey on Various Technologies Involved in Cloud Computing SecurityA Brief Survey on Various Technologies Involved in Cloud Computing Security
A Brief Survey on Various Technologies Involved in Cloud Computing Security
Associate Professor in VSB Coimbatore
 

Similar to Long term security evolution of ai and data protection antonio kung trialog pdp4 e (20)

IEEE 2018 Java Projects | B-Tech Major Projects | M-Tech Major Projects | Mac...
IEEE 2018 Java Projects | B-Tech Major Projects | M-Tech Major Projects | Mac...IEEE 2018 Java Projects | B-Tech Major Projects | M-Tech Major Projects | Mac...
IEEE 2018 Java Projects | B-Tech Major Projects | M-Tech Major Projects | Mac...
 
4th International Conference on Cloud, Big Data and IoT (CBIoT 2023)
4th International Conference on Cloud, Big Data and IoT (CBIoT 2023)4th International Conference on Cloud, Big Data and IoT (CBIoT 2023)
4th International Conference on Cloud, Big Data and IoT (CBIoT 2023)
 
Introduction to IoT Architectures and Protocols
Introduction to IoT Architectures and ProtocolsIntroduction to IoT Architectures and Protocols
Introduction to IoT Architectures and Protocols
 
Cloud computing security- critical infrastructures
Cloud computing security- critical infrastructuresCloud computing security- critical infrastructures
Cloud computing security- critical infrastructures
 
SmartManufacturing - Welcome - Marguglio.pptx
SmartManufacturing - Welcome - Marguglio.pptxSmartManufacturing - Welcome - Marguglio.pptx
SmartManufacturing - Welcome - Marguglio.pptx
 
BDE-BDVA Webinar: BigDataEurope Overview & Synergies with BDVA
BDE-BDVA Webinar: BigDataEurope Overview & Synergies with BDVABDE-BDVA Webinar: BigDataEurope Overview & Synergies with BDVA
BDE-BDVA Webinar: BigDataEurope Overview & Synergies with BDVA
 
2 nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
2 nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)2 nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
2 nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
 
Call for paper - 3rd International Conference on Cloud, Big Data and IoT (CBI...
Call for paper - 3rd International Conference on Cloud, Big Data and IoT (CBI...Call for paper - 3rd International Conference on Cloud, Big Data and IoT (CBI...
Call for paper - 3rd International Conference on Cloud, Big Data and IoT (CBI...
 
UNICORN PROJECT - DELIVERABLE 1.2 - 'Unicorn Reference Architecture'
UNICORN PROJECT - DELIVERABLE 1.2 - 'Unicorn Reference Architecture'  UNICORN PROJECT - DELIVERABLE 1.2 - 'Unicorn Reference Architecture'
UNICORN PROJECT - DELIVERABLE 1.2 - 'Unicorn Reference Architecture'
 
PAPER SUBMISSION START NOW-4th International Conference on Cloud, Big Data an...
PAPER SUBMISSION START NOW-4th International Conference on Cloud, Big Data an...PAPER SUBMISSION START NOW-4th International Conference on Cloud, Big Data an...
PAPER SUBMISSION START NOW-4th International Conference on Cloud, Big Data an...
 
Become a cloud security expert
Become a cloud security expertBecome a cloud security expert
Become a cloud security expert
 
3rd International Conference on Cloud, Big Data and IoT (CBIoT 2022)
3rd International Conference on Cloud, Big Data and IoT (CBIoT 2022)3rd International Conference on Cloud, Big Data and IoT (CBIoT 2022)
3rd International Conference on Cloud, Big Data and IoT (CBIoT 2022)
 
Digital twin technology - seminar presentation
Digital twin technology - seminar presentationDigital twin technology - seminar presentation
Digital twin technology - seminar presentation
 
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
 
3rd International Conference on Cloud, Big Data and IoT (CBIoT 2022)
3rd International Conference on Cloud, Big Data and IoT (CBIoT 2022)3rd International Conference on Cloud, Big Data and IoT (CBIoT 2022)
3rd International Conference on Cloud, Big Data and IoT (CBIoT 2022)
 
Call for Paper - 3rd International Conference on Cloud, Big Data and IoT (CBI...
Call for Paper - 3rd International Conference on Cloud, Big Data and IoT (CBI...Call for Paper - 3rd International Conference on Cloud, Big Data and IoT (CBI...
Call for Paper - 3rd International Conference on Cloud, Big Data and IoT (CBI...
 
3 rd International Conference on Cloud, Big Data and IoT (CBIoT 2022)
3 rd International Conference on Cloud, Big Data and IoT (CBIoT 2022)3 rd International Conference on Cloud, Big Data and IoT (CBIoT 2022)
3 rd International Conference on Cloud, Big Data and IoT (CBIoT 2022)
 
3 rd International Conference on Cloud, Big Data and IoT (CBIoT 2022)
3 rd International Conference on Cloud, Big Data and IoT (CBIoT 2022)3 rd International Conference on Cloud, Big Data and IoT (CBIoT 2022)
3 rd International Conference on Cloud, Big Data and IoT (CBIoT 2022)
 
Call for Paper - 3rd International Conference on Cloud, Big Data and IoT (CBI...
Call for Paper - 3rd International Conference on Cloud, Big Data and IoT (CBI...Call for Paper - 3rd International Conference on Cloud, Big Data and IoT (CBI...
Call for Paper - 3rd International Conference on Cloud, Big Data and IoT (CBI...
 
A Brief Survey on Various Technologies Involved in Cloud Computing Security
A Brief Survey on Various Technologies Involved in Cloud Computing SecurityA Brief Survey on Various Technologies Involved in Cloud Computing Security
A Brief Survey on Various Technologies Involved in Cloud Computing Security
 

More from Privacy Data Protection for Engineering

Wp4 overall approach_v1
Wp4 overall approach_v1Wp4 overall approach_v1
Wp5 overall approach_3-pd_pbdmodules_v4
Wp5 overall approach_3-pd_pbdmodules_v4Wp5 overall approach_3-pd_pbdmodules_v4
Wp5 overall approach_3-pd_pbdmodules_v4
Privacy Data Protection for Engineering
 
Wp6 workshop 10_march2020
Wp6 workshop 10_march2020Wp6 workshop 10_march2020
Wp6 workshop 10_march2020
Privacy Data Protection for Engineering
 
Pdp4 e forum
Pdp4 e forumPdp4 e forum
Paris wp5 pd-pb_d_case_study
Paris wp5 pd-pb_d_case_studyParis wp5 pd-pb_d_case_study
Paris wp5 pd-pb_d_case_study
Privacy Data Protection for Engineering
 
Wp4 ws cea2020
Wp4 ws cea2020Wp4 ws cea2020
Beawre pitch
Beawre pitchBeawre pitch
Pdp4e IPEN-2019
Pdp4e  IPEN-2019Pdp4e  IPEN-2019

More from Privacy Data Protection for Engineering (8)

Wp4 overall approach_v1
Wp4 overall approach_v1Wp4 overall approach_v1
Wp4 overall approach_v1
 
Wp5 overall approach_3-pd_pbdmodules_v4
Wp5 overall approach_3-pd_pbdmodules_v4Wp5 overall approach_3-pd_pbdmodules_v4
Wp5 overall approach_3-pd_pbdmodules_v4
 
Wp6 workshop 10_march2020
Wp6 workshop 10_march2020Wp6 workshop 10_march2020
Wp6 workshop 10_march2020
 
Pdp4 e forum
Pdp4 e forumPdp4 e forum
Pdp4 e forum
 
Paris wp5 pd-pb_d_case_study
Paris wp5 pd-pb_d_case_studyParis wp5 pd-pb_d_case_study
Paris wp5 pd-pb_d_case_study
 
Wp4 ws cea2020
Wp4 ws cea2020Wp4 ws cea2020
Wp4 ws cea2020
 
Beawre pitch
Beawre pitchBeawre pitch
Beawre pitch
 
Pdp4e IPEN-2019
Pdp4e  IPEN-2019Pdp4e  IPEN-2019
Pdp4e IPEN-2019
 

Recently uploaded

P5 Working Drawings.pdf floor plan, civil
P5 Working Drawings.pdf floor plan, civilP5 Working Drawings.pdf floor plan, civil
P5 Working Drawings.pdf floor plan, civil
AnasAhmadNoor
 
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
Gino153088
 
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
ydzowc
 
Digital Twins Computer Networking Paper Presentation.pptx
Digital Twins Computer Networking Paper Presentation.pptxDigital Twins Computer Networking Paper Presentation.pptx
Digital Twins Computer Networking Paper Presentation.pptx
aryanpankaj78
 
Zener Diode and its V-I Characteristics and Applications
Zener Diode and its V-I Characteristics and ApplicationsZener Diode and its V-I Characteristics and Applications
Zener Diode and its V-I Characteristics and Applications
Shiny Christobel
 
Assistant Engineer (Chemical) Interview Questions.pdf
Assistant Engineer (Chemical) Interview Questions.pdfAssistant Engineer (Chemical) Interview Questions.pdf
Assistant Engineer (Chemical) Interview Questions.pdf
Seetal Daas
 
Blood finder application project report (1).pdf
Blood finder application project report (1).pdfBlood finder application project report (1).pdf
Blood finder application project report (1).pdf
Kamal Acharya
 
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
ecqow
 
FULL STACK PROGRAMMING - Both Front End and Back End
FULL STACK PROGRAMMING - Both Front End and Back EndFULL STACK PROGRAMMING - Both Front End and Back End
FULL STACK PROGRAMMING - Both Front End and Back End
PreethaV16
 
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
MadhavJungKarki
 
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
upoux
 
Ericsson LTE Throughput Troubleshooting Techniques.ppt
Ericsson LTE Throughput Troubleshooting Techniques.pptEricsson LTE Throughput Troubleshooting Techniques.ppt
Ericsson LTE Throughput Troubleshooting Techniques.ppt
wafawafa52
 
Call For Paper -3rd International Conference on Artificial Intelligence Advan...
Call For Paper -3rd International Conference on Artificial Intelligence Advan...Call For Paper -3rd International Conference on Artificial Intelligence Advan...
Call For Paper -3rd International Conference on Artificial Intelligence Advan...
ijseajournal
 
Power Electronics- AC -AC Converters.pptx
Power Electronics- AC -AC Converters.pptxPower Electronics- AC -AC Converters.pptx
Power Electronics- AC -AC Converters.pptx
Poornima D
 
SENTIMENT ANALYSIS ON PPT AND Project template_.pptx
SENTIMENT ANALYSIS ON PPT AND Project template_.pptxSENTIMENT ANALYSIS ON PPT AND Project template_.pptx
SENTIMENT ANALYSIS ON PPT AND Project template_.pptx
b0754201
 
5G Radio Network Througput Problem Analysis HCIA.pdf
5G Radio Network Througput Problem Analysis HCIA.pdf5G Radio Network Througput Problem Analysis HCIA.pdf
5G Radio Network Througput Problem Analysis HCIA.pdf
AlvianRamadhani5
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
ijaia
 
Transformers design and coooling methods
Transformers design and coooling methodsTransformers design and coooling methods
Transformers design and coooling methods
Roger Rozario
 
This study Examines the Effectiveness of Talent Procurement through the Imple...
This study Examines the Effectiveness of Talent Procurement through the Imple...This study Examines the Effectiveness of Talent Procurement through the Imple...
This study Examines the Effectiveness of Talent Procurement through the Imple...
DharmaBanothu
 
Supermarket Management System Project Report.pdf
Supermarket Management System Project Report.pdfSupermarket Management System Project Report.pdf
Supermarket Management System Project Report.pdf
Kamal Acharya
 

Recently uploaded (20)

P5 Working Drawings.pdf floor plan, civil
P5 Working Drawings.pdf floor plan, civilP5 Working Drawings.pdf floor plan, civil
P5 Working Drawings.pdf floor plan, civil
 
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
 
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
 
Digital Twins Computer Networking Paper Presentation.pptx
Digital Twins Computer Networking Paper Presentation.pptxDigital Twins Computer Networking Paper Presentation.pptx
Digital Twins Computer Networking Paper Presentation.pptx
 
Zener Diode and its V-I Characteristics and Applications
Zener Diode and its V-I Characteristics and ApplicationsZener Diode and its V-I Characteristics and Applications
Zener Diode and its V-I Characteristics and Applications
 
Assistant Engineer (Chemical) Interview Questions.pdf
Assistant Engineer (Chemical) Interview Questions.pdfAssistant Engineer (Chemical) Interview Questions.pdf
Assistant Engineer (Chemical) Interview Questions.pdf
 
Blood finder application project report (1).pdf
Blood finder application project report (1).pdfBlood finder application project report (1).pdf
Blood finder application project report (1).pdf
 
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
 
FULL STACK PROGRAMMING - Both Front End and Back End
FULL STACK PROGRAMMING - Both Front End and Back EndFULL STACK PROGRAMMING - Both Front End and Back End
FULL STACK PROGRAMMING - Both Front End and Back End
 
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
 
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
 
Ericsson LTE Throughput Troubleshooting Techniques.ppt
Ericsson LTE Throughput Troubleshooting Techniques.pptEricsson LTE Throughput Troubleshooting Techniques.ppt
Ericsson LTE Throughput Troubleshooting Techniques.ppt
 
Call For Paper -3rd International Conference on Artificial Intelligence Advan...
Call For Paper -3rd International Conference on Artificial Intelligence Advan...Call For Paper -3rd International Conference on Artificial Intelligence Advan...
Call For Paper -3rd International Conference on Artificial Intelligence Advan...
 
Power Electronics- AC -AC Converters.pptx
Power Electronics- AC -AC Converters.pptxPower Electronics- AC -AC Converters.pptx
Power Electronics- AC -AC Converters.pptx
 
SENTIMENT ANALYSIS ON PPT AND Project template_.pptx
SENTIMENT ANALYSIS ON PPT AND Project template_.pptxSENTIMENT ANALYSIS ON PPT AND Project template_.pptx
SENTIMENT ANALYSIS ON PPT AND Project template_.pptx
 
5G Radio Network Througput Problem Analysis HCIA.pdf
5G Radio Network Througput Problem Analysis HCIA.pdf5G Radio Network Througput Problem Analysis HCIA.pdf
5G Radio Network Througput Problem Analysis HCIA.pdf
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
 
Transformers design and coooling methods
Transformers design and coooling methodsTransformers design and coooling methods
Transformers design and coooling methods
 
This study Examines the Effectiveness of Talent Procurement through the Imple...
This study Examines the Effectiveness of Talent Procurement through the Imple...This study Examines the Effectiveness of Talent Procurement through the Imple...
This study Examines the Effectiveness of Talent Procurement through the Imple...
 
Supermarket Management System Project Report.pdf
Supermarket Management System Project Report.pdfSupermarket Management System Project Report.pdf
Supermarket Management System Project Report.pdf
 

Long term security evolution of ai and data protection antonio kung trialog pdp4 e

  • 1. Methods and Tools for GDPR Compliance through Privacy and Data Protection 4 Engineering Long term security evolution of AI and data protection Antonio Kung Trialog, 25 rue du Général Foy 75008 Paris antonio.kung@trialog.com 26 March 2021 Long-term security evolution of AI and data protection Slide 1 This project has received funding from the European Union’s Horizon 2020 research and innovation programme under grant agreement No 787034
  • 2. Long term security evolution of AI and data protection ❑Background ❑Characterisation of AI-based systems ❑Long term security evolution ❑Using models 26 March 2021 Long-term security evolution of AI and data protection Slide 2
  • 3. Background ❑Embedded systems, Cyberphysical systems, Internet of things ❑Various domains ❑Privacy ❑Security ❑Trustworthiness ❑Interoperability ❑Architecture ❑AI ❑Involvement in standards ❑Guidance for organisations ❑Guidance for ecosystems 26 March 2021 Long-term security evolution of AI and data protection 3 https://edps.europa.eu/data-protection/ipen-internet-privacy-engineering-network_en https://ipen.trialog.com/wiki/Wiki_for_Privacy_Standards_and_Privacy_Projects
  • 4. Background on AI ❑Study impact of AI on security and privacy (ISO/IEC SC27) ❑Study 132 use cases (ISO/IEC 24030 AI use cases) ❑Guidance for security ❑Guidance for privacy ❑Study impact of AI on an ICT domain (ISO TC215) ❑Impact of AI on health ICT ❑Impact of AI on health ICT systems ❑Study impact of AI on architecture (ISO/IEC AG8) ❑For instance alignment of IoT reference architecture with Knowledge engineering reference architecture 26 March 2021 Long-term security evolution of AI and data protection 4
  • 5. Long term security evolution of AI and data protection ❑Background ❑Characterisation of AI-based systems ❑Long term security evolution ❑Using models 26 March 2021 Long-term security evolution of AI and data protection Slide 5
  • 6. AI based applications ❑Current wave ❑Automatic speech recognition ❑Machine translation ❑Spam filters ❑Search engines ❑… ❑Upcoming wave ❑Autonomous cars ❑Robots for elderly people ❑Autonomous drones ❑… 26 March 2021 Long-term security evolution of AI and data protection 6
  • 7. Ecosystem Perspective Example of cooperative ITS 26 March 2021 Long-term security evolution of AI and data protection 7 Pseudonymization authority Road side unit Sending vehicle Receiving vehicle
  • 8. Ecosystem Perspective Example of cooperative ITS 26 March 2021 Long-term security evolution of AI and data protection 8 PKI operator Vehicle operator Use case operator AI capability (e.g. autonomous driving) AI capability (e.g. autonomous driving)
  • 9. Lifecycle Perspective 26 March 2021 Long-term security evolution of AI and data protection Slide 9 AI system design & implementation AI system training AI system integration into SoS SoS operation Training data Application data Continuous improvement
  • 10. Governance Perspective 26 March 2021 Long-term security evolution of AI and data protection 10 to on Governance body Governed subject Policies follows Monitors Establishes
  • 11. Governance Perspective 26 March 2021 Long-term security evolution of AI and data protection 11 to on Governance body AI-based Autonomous System Policies follows Monitors Establishes
  • 12. Long term security evolution of AI and data protection ❑Background ❑Characterisation of AI-based systems ❑Long term security evolution ❑Using models 26 March 2021 Long-term security evolution of AI and data protection Slide 12
  • 13. Ecosystem Perspective Example of cooperative ITS 26 March 2021 Long-term security evolution of AI and data protection 13 PKI operator Vehicle operator Use case operator AI capability (e.g. autonomous driving) AI capability (e.g. autonomous driving)
  • 14. Lifecycle Perspective 26 March 2021 Long-term security evolution of AI and data protection Slide 14 AI system design & implementation AI system training AI system integration into SoS SoS operation Training data Application data Continuous improvement
  • 15. Governance Perspective 26 March 2021 Long-term security evolution of AI and data protection 15 Governance body AI-based Autonomous System Policies follows Monitors Establishes
  • 17. Long term security evolution of AI and data protection ❑Background ❑Characterisation of AI-based systems ❑Long term security evolution ❑Using models 26 March 2021 Long-term security evolution of AI and data protection Slide 17
  • 18. Using Models 26 March 2021 Long-term security evolution of AI and data protection Slide 18 Model engineering constructing proportionally-scaled miniature working representations of full-sized machines Model driven engineering expressing specifications through processable models. Diagram orientation (e.g. UML diagrams) Source wikipedia
  • 19. Approach System model Trustworthiness Capability model Long-term security model Functional capability model Slide 19 System Trustworthiness capability Functional capability 26 March 2021 Long-term security evolution of AI and data protection Long-term security Technical/ Organisational
  • 20. Community of BAMs ❑Best Available protection Models (BAM) ❑most effective and advanced capabilities ❑suitable in practice for privacy compliance ❑designed to address risks on privacy and security. ❑Analogy with best available techniques 26 March 2021 Long-term security evolution of AI and data protection Slide 20
  • 21. There is a need for many BAMs 26 March 2021 Long-term security evolution of AI and data protection Slide 21 Consumer applications Protection models AI in Health AI in Social network AI in Mobility AI in Smart home AI in Fintech … IoT applications Protection models AI in Connected vehicles AI in E- mobility AI in Smart energy AI in Assisted Living AI in Security … Data processing Protection models
  • 22. Application developer reuses a BAM and its implementation 26 March 2021 Long-term security evolution of AI and data protection Slide 22 Reuses Application developer Open community repository Open source Guidance BAM
  • 23. Application developer develop a BAM 26 March 2021 Long-term security evolution of AI and data protection Slide 23 Submits Open community repository Open source Modelling tools Uses Privacy engineering tools Application developer Guidance BAM
  • 24. Eclipse Privacy-by-model Community 26 March 2021 Long-term security evolution of AI and data protection Slide 24 Stakeholders Privacy model expert PbM Steering committee (1) Provides Guidance for models (3) Provides model (3) Provides model Stakeholders Application privacy protection Project Task force Stakeholders Privacy engineering project Task force (2) Uses (2) Uses Stakeholders Privacy model expert PbM Validation committee (4)Validates model (4) Validates model Best Available Models (5) Publishes model
  • 25. Join the future Privacy-by-model community! Philippe Krief: philippe.krief@eclipse-foundation.org Antonio Kung: antonio.kung@trialog.com Samuel Martin: ys.martin@upm.es 26 March 2021 Long-term security evolution of AI and data protection Slide 25 This project has received funding from the European Union’s Horizon 2020 research and innovation programme under grant agreement No 787034