SlideShare a Scribd company logo
Scalable	
  Policy-­‐awarE Linked	
  Data	
  
arChitecture for	
  
prIvacy,	
  trAnsparency and	
  compLiance
H2020-­‐ICT-­‐2016-­‐1	
  Big	
  Data	
  PPP:	
  privacy-­‐preserving	
  Big	
  Data	
  
technologies	
  (ICT-­‐18-­‐2016)	
  call
Technological	
  problem	
  -­‐ General	
  Data	
  Protection	
  
Regulation	
  supporting	
  consent	
  and	
  transparency
2013 2014 2015 2016 2017 2018
Draft	
  of	
  the	
  regulation
7/22/2012
Revisions	
  in	
  the	
  draft
3/12/2013
Discussions	
  in	
  the	
  EU	
  Council
5/19/2014
EU	
  Council	
  finalises	
  the	
  chapters
8/6/2015
Trilogue	
  starts
6/24/2015
Trilogue	
  agrees
12/17/2015
Comes	
  into	
  force
5/15/2018
Companies whose  business  models  rely  on  personal  data
Data  subjects  who  would  like  to  declare,  monitor  and  optionally  
revoke  their  (often  not  explicit)  preferences  on  data  sharing
Regulators who  can  leverage  technical  means  to  check  
compliance  with  the  GDPR
2013 2014 2015 2016 2017 2018
Draft	
  of	
  the	
  regulation
7/22/2012
Revisions	
  in	
  the	
  draft
3/12/2013
Discussions	
  in	
  the	
  EU	
  Council
5/19/2014
EU	
  Council	
  finalises	
  the	
  chapters
8/6/2015
Trilogue	
  starts
6/24/2015
Trilogue	
  agrees
12/17/2015
Comes	
  into	
  force
5/15/2018
Technological	
  problem	
  -­‐ General	
  Data	
  Protection	
  
Regulation	
  supporting	
  consent	
  and	
  transparency
Data$&$Data$
Driven$
Services
Regulators
Companies/
Service4
Providers
Customers/
Service4Users
Privacy4
Preferences
Legal
Policies
Contracts/
Terms4of4use
Technological	
  problem	
  -­‐ General	
  Data	
  Protection	
  
Regulation	
  supporting	
  consent	
  and	
  transparency
• Policy	
  management	
  framework
vGives	
  users	
  control	
  of	
  their	
  personal	
  data	
  
vRepresents	
  access/usage	
  policies	
  and	
  legislative	
  requirements	
  in	
  a	
  
machine	
  readable	
  format
• Transparency	
  and	
  compliance	
  framework
vProvides	
  information	
  on	
  how	
  data	
  is	
  processed and with	
  whom	
  it	
  is	
  
shared
vAllows	
  data	
  subjects	
  to	
  take	
  corrective	
  action
• Scalable	
  policy-­‐aware	
  Linked	
  Data	
  architecture	
  
vBuild	
  on	
  top	
  of	
  the Big	
  Data	
  Europe	
  (BDE)	
  platform	
  scalability	
  and	
  
elasticity	
  mechanisms
vExtended	
  BDE	
  with	
  robust	
  policy,	
  transparency	
  and	
  compliance	
  
protocols
Technological	
  problem	
  -­‐ General	
  Data	
  Protection	
  
Regulation	
  supporting	
  consent	
  and	
  transparency
Software	
  components	
  -­‐ Foundations
• Big	
  Data	
  Europe	
  scalability	
  and	
  elasticity
• PrimeLife policy	
  languages,	
  access	
  control	
  policies,	
  
release	
  policies	
  and	
  data	
  handling	
  policies
Payload'Data
Permissions
Semantification
Policy'ingestion
Compression'&'Encryption
Persisting'policies'with''data:
“Sticky”'Policies
Policy>aware'Querrying:
Data'Subsets/Filtering'
Policies
HDT
SPECIAL
APIs
User'Control
Dashboards
Software	
  components	
  -­‐ Foundations
• SPECIAL	
  uses	
  the	
  Linked	
  Data	
  paradigm
• All	
  data	
  items	
  are	
  identified	
  by	
  globally	
  unique	
  identifiers	
  (i.e.	
  
Internationalised Resource	
  Identifiers	
  (IRI’s))
• By	
  using	
  HyperText Transfer	
  Protocol	
  (HTTP)	
  IRI’s	
  everything	
  is	
  
potentially	
  linkable
Payload'Data
Permissions
Semantification
Policy'ingestion
Compression'&'Encryption
Persisting'policies'with''data:
“Sticky”'Policies
Policy>aware'Querrying:
Data'Subsets/Filtering'
Policies
HDT
SPECIAL
APIs
User'Control
Dashboards
Payload'Data
Permissions
Semantification
Policy'ingestion
Compression'&'Encryption
Persisting'policies'with''data:
“Sticky”'Policies
Policy>aware'Querrying:
Data'Subsets/Filtering'
Policies
HDT
SPECIAL
APIs
User'Control
Dashboards
• IRI’s	
  allow	
  SPECIAL	
  to	
  make	
  semantic	
  assertions	
  (access/usage	
  
constraints)	
  on	
  the	
  data	
  items	
  using	
  Linked	
  Data	
  annotations
• Legacy	
  systems	
  can	
  be	
  integrated	
  via	
  transformation	
  middleware
Software	
  components	
  -­‐ Semantification
Software	
  components	
  -­‐ Policy	
  Ingestion
• Record	
  context information	
  and	
  access/usage constraints	
  
• Handle	
  a	
  broad	
  variety	
  of	
  sources	
  and	
  formats
• Take	
  a	
  privacy-­‐by-­‐design approach	
  and	
  allows	
  for	
  conscious	
  
decisions	
  about	
  data	
  collection	
  and	
  data	
  (re)use
Payload'Data
Permissions
Semantification
Policy'ingestion
Compression'&'Encryption
Persisting'policies'with''data:
“Sticky”'Policies
Policy>aware'Querrying:
Data'Subsets/Filtering'
Policies
HDT
SPECIAL
APIs
User'Control
Dashboards
Software	
  components	
  -­‐ Compression	
  &	
  Encryption
• When	
  sharing	
  data	
  or	
  query	
  results	
  information	
  is	
  securely	
  stored	
  
and	
  exchanged
• Enable	
  efficient	
  queryable encryption	
  based	
  on	
  compressed RDF	
  
data
Payload'Data
Permissions
Semantification
Policy'ingestion
Compression'&'Encryption
Persisting'policies'with''data:
“Sticky”'Policies
Policy>aware'Querrying:
Data'Subsets/Filtering'
Policies
HDT
SPECIAL
APIs
User'Control
Dashboards
Software	
  components	
  -­‐ Sticky	
  Policies
• Data	
  sharing	
  can	
  be	
  done	
  along	
  data	
  value	
  chains	
  in	
  a	
  way	
  
that	
  includes	
  the	
  policy	
  information
• Gluing	
  policy	
  information	
  to	
  the	
  payload	
  data	
  persistently,	
  
even	
  across	
  company	
  borders,	
  is	
  called	
  “sticky	
  policies”
vData	
  protection	
  constraints
vOther	
  limitations and	
  obligations
Payload'Data
Permissions
Semantification
Policy'ingestion
Compression'&'Encryption
Persisting'policies'with''data:
“Sticky”'Policies
Policy>aware'Querrying:
Data'Subsets/Filtering'
Policies
HDT
SPECIAL
APIs
User'Control
Dashboards
Software	
  components	
  -­‐ Policy-­‐aware	
  Querying
• Categorise and	
  subdivide	
  data	
  through	
  annotations	
  into	
  sensitivity	
  
categories/levels	
  or	
  based	
  on	
  fine-­‐grained	
  user-­‐policies
• Policy	
  aware	
  aggregation and	
  anonymisation techniques
• Recording	
  of	
  the	
  sharing	
  event	
  in	
  a	
  manner	
  that	
  supports	
  non-­‐
repudiation
Payload'Data
Permissions
Semantification
Policy'ingestion
Compression'&'Encryption
Persisting'policies'with''data:
“Sticky”'Policies
Policy>aware'Querrying:
Data'Subsets/Filtering'
Policies
HDT
SPECIAL
APIs
User'Control
Dashboards
Software	
  components	
  -­‐ User	
  Control
• Interactive	
  Dashboard	
  
vDisplay	
  highly	
  relevant	
  information	
  to	
  the	
  user	
  based	
  on	
  context	
  
vMap	
  what	
  the	
  users	
  sees	
  to	
  their	
  entire	
  Linked	
  Data	
  graph
vInvestigate	
  how	
  semantified data	
  can	
  cater	
  for	
  better	
  informed	
  consent
• Relieve	
  the	
  burden	
  of	
  policy	
  management	
  via	
  Templates
• Support	
  versioning,	
  revocation,	
  and	
  forgetting functionality
Payload'Data
Permissions
Semantification
Policy'ingestion
Compression'&'Encryption
Persisting'policies'with''data:
“Sticky”'Policies
Policy>aware'Querrying:
Data'Subsets/Filtering'
Policies
HDT
SPECIAL
APIs
User'Control
Dashboards
Adversaries	
  &	
  Additional	
  input
• Challenges
vProvide	
  synthesised	
  linked	
  graph	
  data	
  (linked	
  to	
  existing	
  open	
  data	
  sets)	
  
and	
  challenge	
  users	
  to	
  reconstruct	
  those	
  encrypted	
  graphs
vDevelop	
  simulated	
  synthesised	
  policies	
  and	
  datasets	
  and	
  derive	
  challenges	
  
to	
  retrieve	
  and re-­‐construct	
  unauthorised	
   information from	
  our	
  system	
  
• Workshops
vDiscuss	
  limitations	
  and	
  possible	
  additional	
   challenges
vDerive	
  challenges	
  that	
  can	
  not	
  be	
  tested	
  automatically e.g.	
  policies	
  that	
  
cannot	
  be	
  enforced	
  by	
  automated	
  means	
  need	
  to	
  be	
  protected	
  by	
  (legal)	
  
contracts
• Additional	
  Input
vICT-­‐18-­‐2016	
  and	
  ICT-­‐14-­‐2016	
  projects
vPrivacy	
  &	
  Us	
  (Privacy	
  &	
  Usability)	
  https://privacyus.eu/,	
  Data	
  markets	
  
Austria	
  https://datamarket.at/,	
  etc…
vW3C	
  standardisation activities
Technical/Scientific	
  contact	
  
Sabrina	
  Kirrane
Vienna	
  University	
  of	
  Economics	
  
and	
  Business
sabrina.kirrane@wu.ac.at
Scalable	
  Policy-­‐awarE Linked	
  Data	
  
arChitecture for	
  
prIvacy,	
  trAnsparency and	
  compLiance
Adminsitrative contact	
  
Philippe	
  Rohou
ERCIM	
  W3C
philippe.rohou@ercim.eu

More Related Content

What's hot

Review Paper On Multi-Keyword Ranked Search in Encrypted Cloud Storage
Review Paper On Multi-Keyword Ranked Search in Encrypted Cloud StorageReview Paper On Multi-Keyword Ranked Search in Encrypted Cloud Storage
Review Paper On Multi-Keyword Ranked Search in Encrypted Cloud Storage
IRJET Journal
 
Security Check in Cloud Computing through Third Party Auditor
Security Check in Cloud Computing through Third Party AuditorSecurity Check in Cloud Computing through Third Party Auditor
Security Check in Cloud Computing through Third Party Auditor
ijsrd.com
 
Scalable Data Management: Automation and the Modern Research Data Portal
Scalable Data Management: Automation and the Modern Research Data PortalScalable Data Management: Automation and the Modern Research Data Portal
Scalable Data Management: Automation and the Modern Research Data Portal
Globus
 
Privacy Preserving Data Mining
Privacy Preserving Data MiningPrivacy Preserving Data Mining
Privacy Preserving Data Mining
ROMALEE AMOLIC
 
Outsourced similarity search on
Outsourced similarity search onOutsourced similarity search on
Outsourced similarity search on
IMPULSE_TECHNOLOGY
 
Michael Poremba, Director, Data Architecture at Practice Fusion
Michael Poremba, Director, Data Architecture at Practice FusionMichael Poremba, Director, Data Architecture at Practice Fusion
Michael Poremba, Director, Data Architecture at Practice Fusion
MongoDB
 
Deploying Linked Open Data: Methodologies and Software Tools
Deploying Linked Open Data: Methodologies and Software ToolsDeploying Linked Open Data: Methodologies and Software Tools
Deploying Linked Open Data: Methodologies and Software Tools
Nikolaos Konstantinou
 
Privacy Preserving DB Systems
Privacy Preserving DB SystemsPrivacy Preserving DB Systems
Privacy Preserving DB Systems
Ashraf Bashir
 
Materializing the Web of Linked Data
Materializing the Web of Linked DataMaterializing the Web of Linked Data
Materializing the Web of Linked Data
Nikolaos Konstantinou
 
Privacy preserving in data mining with hybrid approach
Privacy preserving in data mining with hybrid approachPrivacy preserving in data mining with hybrid approach
Privacy preserving in data mining with hybrid approach
Narendra Dhadhal
 
Current trends in data security nursing research ppt
Current trends in data security nursing research pptCurrent trends in data security nursing research ppt
Current trends in data security nursing research ppt
Nursing Path
 
Privacy preserving multi-keyword ranked search over encrypted cloud data 2
Privacy preserving multi-keyword ranked search over encrypted cloud data 2Privacy preserving multi-keyword ranked search over encrypted cloud data 2
Privacy preserving multi-keyword ranked search over encrypted cloud data 2
Swathi Rampur
 
Classifying confidential data using SVM for efficient cloud query processing
Classifying confidential data using SVM for efficient cloud query processingClassifying confidential data using SVM for efficient cloud query processing
Classifying confidential data using SVM for efficient cloud query processing
TELKOMNIKA JOURNAL
 
Data mining and privacy preserving in data mining
Data mining and privacy preserving in data miningData mining and privacy preserving in data mining
Data mining and privacy preserving in data miningNeeda Multani
 
J017547478
J017547478J017547478
J017547478
IOSR Journals
 
IRJET- Compound Keyword Search of Encrypted Cloud Data by using Semantic Scheme
IRJET- Compound Keyword Search of Encrypted Cloud Data by using Semantic SchemeIRJET- Compound Keyword Search of Encrypted Cloud Data by using Semantic Scheme
IRJET- Compound Keyword Search of Encrypted Cloud Data by using Semantic Scheme
IRJET Journal
 
Privacy Preserved Distributed Data Sharing with Load Balancing Scheme
Privacy Preserved Distributed Data Sharing with Load Balancing SchemePrivacy Preserved Distributed Data Sharing with Load Balancing Scheme
Privacy Preserved Distributed Data Sharing with Load Balancing Scheme
Editor IJMTER
 
SECURE AUDITING AND DEDUPLICATING DATA IN CLOUD
SECURE AUDITING AND DEDUPLICATING DATA IN CLOUDSECURE AUDITING AND DEDUPLICATING DATA IN CLOUD
SECURE AUDITING AND DEDUPLICATING DATA IN CLOUD
Nexgen Technology
 
Privacy preserving dm_ppt
Privacy preserving dm_pptPrivacy preserving dm_ppt
Privacy preserving dm_ppt
Sagar Verma
 

What's hot (19)

Review Paper On Multi-Keyword Ranked Search in Encrypted Cloud Storage
Review Paper On Multi-Keyword Ranked Search in Encrypted Cloud StorageReview Paper On Multi-Keyword Ranked Search in Encrypted Cloud Storage
Review Paper On Multi-Keyword Ranked Search in Encrypted Cloud Storage
 
Security Check in Cloud Computing through Third Party Auditor
Security Check in Cloud Computing through Third Party AuditorSecurity Check in Cloud Computing through Third Party Auditor
Security Check in Cloud Computing through Third Party Auditor
 
Scalable Data Management: Automation and the Modern Research Data Portal
Scalable Data Management: Automation and the Modern Research Data PortalScalable Data Management: Automation and the Modern Research Data Portal
Scalable Data Management: Automation and the Modern Research Data Portal
 
Privacy Preserving Data Mining
Privacy Preserving Data MiningPrivacy Preserving Data Mining
Privacy Preserving Data Mining
 
Outsourced similarity search on
Outsourced similarity search onOutsourced similarity search on
Outsourced similarity search on
 
Michael Poremba, Director, Data Architecture at Practice Fusion
Michael Poremba, Director, Data Architecture at Practice FusionMichael Poremba, Director, Data Architecture at Practice Fusion
Michael Poremba, Director, Data Architecture at Practice Fusion
 
Deploying Linked Open Data: Methodologies and Software Tools
Deploying Linked Open Data: Methodologies and Software ToolsDeploying Linked Open Data: Methodologies and Software Tools
Deploying Linked Open Data: Methodologies and Software Tools
 
Privacy Preserving DB Systems
Privacy Preserving DB SystemsPrivacy Preserving DB Systems
Privacy Preserving DB Systems
 
Materializing the Web of Linked Data
Materializing the Web of Linked DataMaterializing the Web of Linked Data
Materializing the Web of Linked Data
 
Privacy preserving in data mining with hybrid approach
Privacy preserving in data mining with hybrid approachPrivacy preserving in data mining with hybrid approach
Privacy preserving in data mining with hybrid approach
 
Current trends in data security nursing research ppt
Current trends in data security nursing research pptCurrent trends in data security nursing research ppt
Current trends in data security nursing research ppt
 
Privacy preserving multi-keyword ranked search over encrypted cloud data 2
Privacy preserving multi-keyword ranked search over encrypted cloud data 2Privacy preserving multi-keyword ranked search over encrypted cloud data 2
Privacy preserving multi-keyword ranked search over encrypted cloud data 2
 
Classifying confidential data using SVM for efficient cloud query processing
Classifying confidential data using SVM for efficient cloud query processingClassifying confidential data using SVM for efficient cloud query processing
Classifying confidential data using SVM for efficient cloud query processing
 
Data mining and privacy preserving in data mining
Data mining and privacy preserving in data miningData mining and privacy preserving in data mining
Data mining and privacy preserving in data mining
 
J017547478
J017547478J017547478
J017547478
 
IRJET- Compound Keyword Search of Encrypted Cloud Data by using Semantic Scheme
IRJET- Compound Keyword Search of Encrypted Cloud Data by using Semantic SchemeIRJET- Compound Keyword Search of Encrypted Cloud Data by using Semantic Scheme
IRJET- Compound Keyword Search of Encrypted Cloud Data by using Semantic Scheme
 
Privacy Preserved Distributed Data Sharing with Load Balancing Scheme
Privacy Preserved Distributed Data Sharing with Load Balancing SchemePrivacy Preserved Distributed Data Sharing with Load Balancing Scheme
Privacy Preserved Distributed Data Sharing with Load Balancing Scheme
 
SECURE AUDITING AND DEDUPLICATING DATA IN CLOUD
SECURE AUDITING AND DEDUPLICATING DATA IN CLOUDSECURE AUDITING AND DEDUPLICATING DATA IN CLOUD
SECURE AUDITING AND DEDUPLICATING DATA IN CLOUD
 
Privacy preserving dm_ppt
Privacy preserving dm_pptPrivacy preserving dm_ppt
Privacy preserving dm_ppt
 

Viewers also liked

Transparent Personal Data Processing: The Road Ahead
Transparent Personal Data Processing: The Road AheadTransparent Personal Data Processing: The Road Ahead
Transparent Personal Data Processing: The Road Ahead
Sabrina Kirrane
 
Society, Privacy and the Semantic Web - Policy and Technology PrivOn 2017
Society, Privacy and the Semantic Web - Policy and Technology PrivOn 2017Society, Privacy and the Semantic Web - Policy and Technology PrivOn 2017
Society, Privacy and the Semantic Web - Policy and Technology PrivOn 2017
Sabrina Kirrane
 
Self-Enforcing Access Control for Encrypted RDF
Self-Enforcing Access Control for Encrypted RDFSelf-Enforcing Access Control for Encrypted RDF
Self-Enforcing Access Control for Encrypted RDF
Sabrina Kirrane
 
Modelling the General Data Protection Regulation
Modelling the General Data Protection RegulationModelling the General Data Protection Regulation
Modelling the General Data Protection Regulation
Sabrina Kirrane
 
Data License Clearance Center
Data License Clearance Center Data License Clearance Center
Data License Clearance Center
Sabrina Kirrane
 
Privacy & innovation digital enterprise
Privacy & innovation digital enterprisePrivacy & innovation digital enterprise
Privacy & innovation digital enterprise
Sabrina Kirrane
 

Viewers also liked (6)

Transparent Personal Data Processing: The Road Ahead
Transparent Personal Data Processing: The Road AheadTransparent Personal Data Processing: The Road Ahead
Transparent Personal Data Processing: The Road Ahead
 
Society, Privacy and the Semantic Web - Policy and Technology PrivOn 2017
Society, Privacy and the Semantic Web - Policy and Technology PrivOn 2017Society, Privacy and the Semantic Web - Policy and Technology PrivOn 2017
Society, Privacy and the Semantic Web - Policy and Technology PrivOn 2017
 
Self-Enforcing Access Control for Encrypted RDF
Self-Enforcing Access Control for Encrypted RDFSelf-Enforcing Access Control for Encrypted RDF
Self-Enforcing Access Control for Encrypted RDF
 
Modelling the General Data Protection Regulation
Modelling the General Data Protection RegulationModelling the General Data Protection Regulation
Modelling the General Data Protection Regulation
 
Data License Clearance Center
Data License Clearance Center Data License Clearance Center
Data License Clearance Center
 
Privacy & innovation digital enterprise
Privacy & innovation digital enterprisePrivacy & innovation digital enterprise
Privacy & innovation digital enterprise
 

Similar to Scalable policy-aware Linked Data architecture for prIvacy, transparency and compliance

04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik
04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik
04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik
VMUG IT
 
Toreon adding privacy by design in secure application development oss18 v20...
Toreon adding privacy by design in secure application development   oss18 v20...Toreon adding privacy by design in secure application development   oss18 v20...
Toreon adding privacy by design in secure application development oss18 v20...
Sebastien Deleersnyder
 
DEFeND Project Presentation - July 2018
DEFeND Project Presentation - July 2018DEFeND Project Presentation - July 2018
DEFeND Project Presentation - July 2018
DEFeND Project
 
e-SIDES workshop at EBDVF 2018, Vienna 14/11/2018
e-SIDES workshop at EBDVF 2018, Vienna 14/11/2018 e-SIDES workshop at EBDVF 2018, Vienna 14/11/2018
e-SIDES workshop at EBDVF 2018, Vienna 14/11/2018
e-SIDES.eu
 
GDPR Readiness for Software Usage Analytics
GDPR Readiness for Software Usage AnalyticsGDPR Readiness for Software Usage Analytics
GDPR Readiness for Software Usage Analytics
Revulytics Inc.
 
How to turn GDPR into a Strategic Advantage using Connected Data
How to turn GDPR into a Strategic Advantage using Connected DataHow to turn GDPR into a Strategic Advantage using Connected Data
How to turn GDPR into a Strategic Advantage using Connected Data
Neo4j
 
Privacy by Design as a system design strategy - EIC 2019
Privacy by Design as a system design strategy - EIC 2019 Privacy by Design as a system design strategy - EIC 2019
Privacy by Design as a system design strategy - EIC 2019
Sagara Gunathunga
 
Sharp Cookie Advisors legal_botar_ai_dataskydd_gdpr
Sharp Cookie Advisors legal_botar_ai_dataskydd_gdprSharp Cookie Advisors legal_botar_ai_dataskydd_gdpr
Sharp Cookie Advisors legal_botar_ai_dataskydd_gdpr
Sharp Cookie Advisors
 
Big Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPRBig Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPR
Matt Stubbs
 
SPECIAL ESWC project networking
SPECIAL ESWC project networkingSPECIAL ESWC project networking
SPECIAL ESWC project networking
Sabrina Kirrane
 
GDPR- The Buck Stops Here
GDPR-  The Buck Stops HereGDPR-  The Buck Stops Here
GDPR- The Buck Stops Here
Kellyn Pot'Vin-Gorman
 
The EU General Protection Regulation and how Oracle can help
The EU General Protection Regulation and how Oracle can help The EU General Protection Regulation and how Oracle can help
The EU General Protection Regulation and how Oracle can help
Niklas Hjorthen
 
California Consumer Privacy Act (CCPA)
California Consumer Privacy Act (CCPA)California Consumer Privacy Act (CCPA)
California Consumer Privacy Act (CCPA)
Happiest Minds Technologies
 
Automatic Detection, Classification and Authorization of Sensitive Personal D...
Automatic Detection, Classification and Authorization of Sensitive Personal D...Automatic Detection, Classification and Authorization of Sensitive Personal D...
Automatic Detection, Classification and Authorization of Sensitive Personal D...
DataWorks Summit/Hadoop Summit
 
Who changed my data? Need for data governance and provenance in a streaming w...
Who changed my data? Need for data governance and provenance in a streaming w...Who changed my data? Need for data governance and provenance in a streaming w...
Who changed my data? Need for data governance and provenance in a streaming w...
DataWorks Summit
 
Iron Mountain® Policy Center Solution Enterprise Edition
Iron Mountain® Policy Center Solution Enterprise EditionIron Mountain® Policy Center Solution Enterprise Edition
Iron Mountain® Policy Center Solution Enterprise Edition
InfoGoTo
 
Tizor_Data-Best-Practices.ppt
Tizor_Data-Best-Practices.pptTizor_Data-Best-Practices.ppt
Tizor_Data-Best-Practices.pptwebhostingguy
 
Tizor_Data-Best-Practices.ppt
Tizor_Data-Best-Practices.pptTizor_Data-Best-Practices.ppt
Tizor_Data-Best-Practices.pptwebhostingguy
 
Transforming GE Healthcare with Data Platform Strategy
Transforming GE Healthcare with Data Platform StrategyTransforming GE Healthcare with Data Platform Strategy
Transforming GE Healthcare with Data Platform Strategy
Databricks
 
Hadoop and Financial Services
Hadoop and Financial ServicesHadoop and Financial Services
Hadoop and Financial Services
Cloudera, Inc.
 

Similar to Scalable policy-aware Linked Data architecture for prIvacy, transparency and compliance (20)

04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik
04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik
04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik
 
Toreon adding privacy by design in secure application development oss18 v20...
Toreon adding privacy by design in secure application development   oss18 v20...Toreon adding privacy by design in secure application development   oss18 v20...
Toreon adding privacy by design in secure application development oss18 v20...
 
DEFeND Project Presentation - July 2018
DEFeND Project Presentation - July 2018DEFeND Project Presentation - July 2018
DEFeND Project Presentation - July 2018
 
e-SIDES workshop at EBDVF 2018, Vienna 14/11/2018
e-SIDES workshop at EBDVF 2018, Vienna 14/11/2018 e-SIDES workshop at EBDVF 2018, Vienna 14/11/2018
e-SIDES workshop at EBDVF 2018, Vienna 14/11/2018
 
GDPR Readiness for Software Usage Analytics
GDPR Readiness for Software Usage AnalyticsGDPR Readiness for Software Usage Analytics
GDPR Readiness for Software Usage Analytics
 
How to turn GDPR into a Strategic Advantage using Connected Data
How to turn GDPR into a Strategic Advantage using Connected DataHow to turn GDPR into a Strategic Advantage using Connected Data
How to turn GDPR into a Strategic Advantage using Connected Data
 
Privacy by Design as a system design strategy - EIC 2019
Privacy by Design as a system design strategy - EIC 2019 Privacy by Design as a system design strategy - EIC 2019
Privacy by Design as a system design strategy - EIC 2019
 
Sharp Cookie Advisors legal_botar_ai_dataskydd_gdpr
Sharp Cookie Advisors legal_botar_ai_dataskydd_gdprSharp Cookie Advisors legal_botar_ai_dataskydd_gdpr
Sharp Cookie Advisors legal_botar_ai_dataskydd_gdpr
 
Big Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPRBig Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPR
 
SPECIAL ESWC project networking
SPECIAL ESWC project networkingSPECIAL ESWC project networking
SPECIAL ESWC project networking
 
GDPR- The Buck Stops Here
GDPR-  The Buck Stops HereGDPR-  The Buck Stops Here
GDPR- The Buck Stops Here
 
The EU General Protection Regulation and how Oracle can help
The EU General Protection Regulation and how Oracle can help The EU General Protection Regulation and how Oracle can help
The EU General Protection Regulation and how Oracle can help
 
California Consumer Privacy Act (CCPA)
California Consumer Privacy Act (CCPA)California Consumer Privacy Act (CCPA)
California Consumer Privacy Act (CCPA)
 
Automatic Detection, Classification and Authorization of Sensitive Personal D...
Automatic Detection, Classification and Authorization of Sensitive Personal D...Automatic Detection, Classification and Authorization of Sensitive Personal D...
Automatic Detection, Classification and Authorization of Sensitive Personal D...
 
Who changed my data? Need for data governance and provenance in a streaming w...
Who changed my data? Need for data governance and provenance in a streaming w...Who changed my data? Need for data governance and provenance in a streaming w...
Who changed my data? Need for data governance and provenance in a streaming w...
 
Iron Mountain® Policy Center Solution Enterprise Edition
Iron Mountain® Policy Center Solution Enterprise EditionIron Mountain® Policy Center Solution Enterprise Edition
Iron Mountain® Policy Center Solution Enterprise Edition
 
Tizor_Data-Best-Practices.ppt
Tizor_Data-Best-Practices.pptTizor_Data-Best-Practices.ppt
Tizor_Data-Best-Practices.ppt
 
Tizor_Data-Best-Practices.ppt
Tizor_Data-Best-Practices.pptTizor_Data-Best-Practices.ppt
Tizor_Data-Best-Practices.ppt
 
Transforming GE Healthcare with Data Platform Strategy
Transforming GE Healthcare with Data Platform StrategyTransforming GE Healthcare with Data Platform Strategy
Transforming GE Healthcare with Data Platform Strategy
 
Hadoop and Financial Services
Hadoop and Financial ServicesHadoop and Financial Services
Hadoop and Financial Services
 

More from Sabrina Kirrane

Different perspectives on data science
Different perspectives on data scienceDifferent perspectives on data science
Different perspectives on data science
Sabrina Kirrane
 
Intelligent agents the vision revisited
Intelligent agents the vision revisitedIntelligent agents the vision revisited
Intelligent agents the vision revisited
Sabrina Kirrane
 
DALICC ESWC Project Networking 2018
DALICC ESWC Project Networking 2018DALICC ESWC Project Networking 2018
DALICC ESWC Project Networking 2018
Sabrina Kirrane
 
Digital Rights Management
Digital Rights ManagementDigital Rights Management
Digital Rights Management
Sabrina Kirrane
 
W3C Data Privacy Vocabularies and Controls Community Group
W3C Data Privacy Vocabularies and Controls Community GroupW3C Data Privacy Vocabularies and Controls Community Group
W3C Data Privacy Vocabularies and Controls Community Group
Sabrina Kirrane
 
Propelling the Potential of Linked Data in Enterprises
Propelling the Potential of Linked Data in EnterprisesPropelling the Potential of Linked Data in Enterprises
Propelling the Potential of Linked Data in Enterprises
Sabrina Kirrane
 
Cryptocurrencies and Blockchain technology
Cryptocurrencies and Blockchain technologyCryptocurrencies and Blockchain technology
Cryptocurrencies and Blockchain technology
Sabrina Kirrane
 

More from Sabrina Kirrane (7)

Different perspectives on data science
Different perspectives on data scienceDifferent perspectives on data science
Different perspectives on data science
 
Intelligent agents the vision revisited
Intelligent agents the vision revisitedIntelligent agents the vision revisited
Intelligent agents the vision revisited
 
DALICC ESWC Project Networking 2018
DALICC ESWC Project Networking 2018DALICC ESWC Project Networking 2018
DALICC ESWC Project Networking 2018
 
Digital Rights Management
Digital Rights ManagementDigital Rights Management
Digital Rights Management
 
W3C Data Privacy Vocabularies and Controls Community Group
W3C Data Privacy Vocabularies and Controls Community GroupW3C Data Privacy Vocabularies and Controls Community Group
W3C Data Privacy Vocabularies and Controls Community Group
 
Propelling the Potential of Linked Data in Enterprises
Propelling the Potential of Linked Data in EnterprisesPropelling the Potential of Linked Data in Enterprises
Propelling the Potential of Linked Data in Enterprises
 
Cryptocurrencies and Blockchain technology
Cryptocurrencies and Blockchain technologyCryptocurrencies and Blockchain technology
Cryptocurrencies and Blockchain technology
 

Recently uploaded

Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 

Recently uploaded (20)

Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 

Scalable policy-aware Linked Data architecture for prIvacy, transparency and compliance

  • 1. Scalable  Policy-­‐awarE Linked  Data   arChitecture for   prIvacy,  trAnsparency and  compLiance H2020-­‐ICT-­‐2016-­‐1  Big  Data  PPP:  privacy-­‐preserving  Big  Data   technologies  (ICT-­‐18-­‐2016)  call
  • 2. Technological  problem  -­‐ General  Data  Protection   Regulation  supporting  consent  and  transparency 2013 2014 2015 2016 2017 2018 Draft  of  the  regulation 7/22/2012 Revisions  in  the  draft 3/12/2013 Discussions  in  the  EU  Council 5/19/2014 EU  Council  finalises  the  chapters 8/6/2015 Trilogue  starts 6/24/2015 Trilogue  agrees 12/17/2015 Comes  into  force 5/15/2018
  • 3. Companies whose  business  models  rely  on  personal  data Data  subjects  who  would  like  to  declare,  monitor  and  optionally   revoke  their  (often  not  explicit)  preferences  on  data  sharing Regulators who  can  leverage  technical  means  to  check   compliance  with  the  GDPR 2013 2014 2015 2016 2017 2018 Draft  of  the  regulation 7/22/2012 Revisions  in  the  draft 3/12/2013 Discussions  in  the  EU  Council 5/19/2014 EU  Council  finalises  the  chapters 8/6/2015 Trilogue  starts 6/24/2015 Trilogue  agrees 12/17/2015 Comes  into  force 5/15/2018 Technological  problem  -­‐ General  Data  Protection   Regulation  supporting  consent  and  transparency
  • 5. • Policy  management  framework vGives  users  control  of  their  personal  data   vRepresents  access/usage  policies  and  legislative  requirements  in  a   machine  readable  format • Transparency  and  compliance  framework vProvides  information  on  how  data  is  processed and with  whom  it  is   shared vAllows  data  subjects  to  take  corrective  action • Scalable  policy-­‐aware  Linked  Data  architecture   vBuild  on  top  of  the Big  Data  Europe  (BDE)  platform  scalability  and   elasticity  mechanisms vExtended  BDE  with  robust  policy,  transparency  and  compliance   protocols Technological  problem  -­‐ General  Data  Protection   Regulation  supporting  consent  and  transparency
  • 6. Software  components  -­‐ Foundations • Big  Data  Europe  scalability  and  elasticity • PrimeLife policy  languages,  access  control  policies,   release  policies  and  data  handling  policies Payload'Data Permissions Semantification Policy'ingestion Compression'&'Encryption Persisting'policies'with''data: “Sticky”'Policies Policy>aware'Querrying: Data'Subsets/Filtering' Policies HDT SPECIAL APIs User'Control Dashboards
  • 7. Software  components  -­‐ Foundations • SPECIAL  uses  the  Linked  Data  paradigm • All  data  items  are  identified  by  globally  unique  identifiers  (i.e.   Internationalised Resource  Identifiers  (IRI’s)) • By  using  HyperText Transfer  Protocol  (HTTP)  IRI’s  everything  is   potentially  linkable Payload'Data Permissions Semantification Policy'ingestion Compression'&'Encryption Persisting'policies'with''data: “Sticky”'Policies Policy>aware'Querrying: Data'Subsets/Filtering' Policies HDT SPECIAL APIs User'Control Dashboards
  • 8. Payload'Data Permissions Semantification Policy'ingestion Compression'&'Encryption Persisting'policies'with''data: “Sticky”'Policies Policy>aware'Querrying: Data'Subsets/Filtering' Policies HDT SPECIAL APIs User'Control Dashboards • IRI’s  allow  SPECIAL  to  make  semantic  assertions  (access/usage   constraints)  on  the  data  items  using  Linked  Data  annotations • Legacy  systems  can  be  integrated  via  transformation  middleware Software  components  -­‐ Semantification
  • 9. Software  components  -­‐ Policy  Ingestion • Record  context information  and  access/usage constraints   • Handle  a  broad  variety  of  sources  and  formats • Take  a  privacy-­‐by-­‐design approach  and  allows  for  conscious   decisions  about  data  collection  and  data  (re)use Payload'Data Permissions Semantification Policy'ingestion Compression'&'Encryption Persisting'policies'with''data: “Sticky”'Policies Policy>aware'Querrying: Data'Subsets/Filtering' Policies HDT SPECIAL APIs User'Control Dashboards
  • 10. Software  components  -­‐ Compression  &  Encryption • When  sharing  data  or  query  results  information  is  securely  stored   and  exchanged • Enable  efficient  queryable encryption  based  on  compressed RDF   data Payload'Data Permissions Semantification Policy'ingestion Compression'&'Encryption Persisting'policies'with''data: “Sticky”'Policies Policy>aware'Querrying: Data'Subsets/Filtering' Policies HDT SPECIAL APIs User'Control Dashboards
  • 11. Software  components  -­‐ Sticky  Policies • Data  sharing  can  be  done  along  data  value  chains  in  a  way   that  includes  the  policy  information • Gluing  policy  information  to  the  payload  data  persistently,   even  across  company  borders,  is  called  “sticky  policies” vData  protection  constraints vOther  limitations and  obligations Payload'Data Permissions Semantification Policy'ingestion Compression'&'Encryption Persisting'policies'with''data: “Sticky”'Policies Policy>aware'Querrying: Data'Subsets/Filtering' Policies HDT SPECIAL APIs User'Control Dashboards
  • 12. Software  components  -­‐ Policy-­‐aware  Querying • Categorise and  subdivide  data  through  annotations  into  sensitivity   categories/levels  or  based  on  fine-­‐grained  user-­‐policies • Policy  aware  aggregation and  anonymisation techniques • Recording  of  the  sharing  event  in  a  manner  that  supports  non-­‐ repudiation Payload'Data Permissions Semantification Policy'ingestion Compression'&'Encryption Persisting'policies'with''data: “Sticky”'Policies Policy>aware'Querrying: Data'Subsets/Filtering' Policies HDT SPECIAL APIs User'Control Dashboards
  • 13. Software  components  -­‐ User  Control • Interactive  Dashboard   vDisplay  highly  relevant  information  to  the  user  based  on  context   vMap  what  the  users  sees  to  their  entire  Linked  Data  graph vInvestigate  how  semantified data  can  cater  for  better  informed  consent • Relieve  the  burden  of  policy  management  via  Templates • Support  versioning,  revocation,  and  forgetting functionality Payload'Data Permissions Semantification Policy'ingestion Compression'&'Encryption Persisting'policies'with''data: “Sticky”'Policies Policy>aware'Querrying: Data'Subsets/Filtering' Policies HDT SPECIAL APIs User'Control Dashboards
  • 14. Adversaries  &  Additional  input • Challenges vProvide  synthesised  linked  graph  data  (linked  to  existing  open  data  sets)   and  challenge  users  to  reconstruct  those  encrypted  graphs vDevelop  simulated  synthesised  policies  and  datasets  and  derive  challenges   to  retrieve  and re-­‐construct  unauthorised   information from  our  system   • Workshops vDiscuss  limitations  and  possible  additional   challenges vDerive  challenges  that  can  not  be  tested  automatically e.g.  policies  that   cannot  be  enforced  by  automated  means  need  to  be  protected  by  (legal)   contracts • Additional  Input vICT-­‐18-­‐2016  and  ICT-­‐14-­‐2016  projects vPrivacy  &  Us  (Privacy  &  Usability)  https://privacyus.eu/,  Data  markets   Austria  https://datamarket.at/,  etc… vW3C  standardisation activities
  • 15. Technical/Scientific  contact   Sabrina  Kirrane Vienna  University  of  Economics   and  Business sabrina.kirrane@wu.ac.at Scalable  Policy-­‐awarE Linked  Data   arChitecture for   prIvacy,  trAnsparency and  compLiance Adminsitrative contact   Philippe  Rohou ERCIM  W3C philippe.rohou@ercim.eu