Font Size: a A A

Protecting Data Privacy in the Presence of Data Provenanc

Posted on:2018-12-06Degree:Ph.DType:Dissertation
University:University of California, DavisCandidate:Kianmajd, ParisaFull Text:PDF
GTID:1448390002996841Subject:Computer Science
Abstract/Summary:
Provenance describes the origin, derivation, and ownership of data products. It enhances the trustworthiness and facilitates access and usage control decisions in information flow systems and distributed settings. Provenance may contain private information, be subject to multiple access policies or be too detailed, thus, the provenance may need to be sanitized before release.;The main goal of this dissertation is to improve provenance sanitization methods by managing the conflicts between provenance and privacy policies and to present cryptographic solutions to protect the privacy of data and its provenance.;We use a model-based diagnosis approach to identify the conflicts in a set of policies and show how our framework can be used to find the conflicts between disclosure and privacy policies when sanitizing workflow provenance graphs.;Lack of trust is a prevalent issue in many applications. Blockchain technology makes the trust more transparent by making transactions' provenance public but this comes at the cost of compromising users' privacy. We present a cryptographic layer that can be applied over blockchain to mitigate privacy implications and allow users own and control their data.;We propose a privacy-preserving road usage charge system in which a network of peer drivers work together to record their location points periodically. The users can then answer various queries over their location points and compute cryptographic proofs showing that the query answers are accurate, and present the proofs together with the answers to the requesters. Also, we present a blockchain-based system for coordinating actions in smart communities in a privacy-preserving manner and look at its application for sharing solar energy in a smart neighborhood autonomously and without any third party being involved.;We also explore cryptographic approaches for providing an access control layer in emerging applications of blockchain technology. Despite numerous cryptographic access control approaches for the cloud systems, most of them are computationally too complex to be applied to practical cases. We describe how blockchain can change this paradigm by deploying the power of a peer-to-peer network for granting and verifying access requests.
Keywords/Search Tags:Data, Access, Privacy, Provenance, Blockchain
Related items