Tracking Personal Data Use: Provenance and Trust

نویسنده

  • Lucja Kot
چکیده

In the era of Big Data, every individual is the target of intensive data collection by parties from the government to grocery store chains. Anecdotal evidence suggests that opting out of the data collection process is effectively impossible [3]. A recent report commissioned by the White House revealed a broad public concern about the collection and use of personal data by untrusted agencies and businesses [1]. As a result, we have seen an effort to improve the transparency of data collection and use. Due to legislative and public pressure, many data collectors now publish privacy policies that explain what personal data is stored and how it is processed. For example, Google’s policy [2] states that “We may combine personal information from one service with information, including personal information, from other Google services [...]. We will not combine DoubleClick cookie information with personally identifiable information unless we have your opt-in consent.” Such policies are useful but have shortcomings; as English-language documents, they are both too confusing for novice users and too vague for experts, and they require human effort to create and maintain. A better solution is to create technological tools that empower individuals to track what happens to their data. The same problem has been addressed in scientific data processing through abstractions and algorithms for workflow provenance [5]. It is time to apply these techniques to the problem of personal data use; just like scientists can trace what happens to individual data points from a dataset, individuals should have access to a “Personal Data Use Workbench”, where they can browse how a company or government agency is using their data.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Provenance, Lineage, and Workflows

In Computer Science, Provenance also known as lineage and pedigree describe the source and derivation of data. Data provenance is key to the management of scientific data and has recently been recognized as central to the trust one places in data. This paper focus attention on the importance and difficulty of provenance tracking in practice. We discuss a taxonomy of data provenance characterist...

متن کامل

Data Conservancy Provenance, Context, and Lineage Services: Key Components for Data Preservation and Curation

Among the key services that institutional data management infrastructures must provide are provenance and lineage tracking and the ability to associate data with contextual information needed for understanding and use. These functionalities are critical for addressing a number of key issues faced by data collectors and users, including trust in data, results traceability, data transparency, and...

متن کامل

Provenance Context Entity (PaCE): Scalable Provenance Tracking for Scientific RDF Data

The Resource Description Framework (RDF) format is being used by a large number of scientific applications to store and disseminate their datasets. The provenance information, describing the source or lineage of the datasets, is playing an increasingly significant role in ensuring data quality, computing trust value of the datasets, and ranking query results. Current provenance tracking approac...

متن کامل

Update Exchange with Mappings and Provenance

We consider systems for data sharing among heterogeneous peers related by a network of schema mappings. Each peer has a locally controlled and edited database instance, but wants to ask queries over related data from other peers as well. To achieve this, every peer’s updates propagate along the mappings to the other peers. However, this update exchange is filtered by trust conditions — expressi...

متن کامل

Facilitating Trust on Data through Provenance

Research on trusted computing focuses mainly on the security and integrity of the execution environment, from hardware components to software services. However, this is only one facet of the computation, the other being the data. If our goal is to produce trusted results, a trustworthy execution environment is not enough: we also need trustworthy data. Provenance of data plays a pivotal role in...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015