Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×
Privacy Technology

The UN is Testing Technology That Processes Data Confidentially 21

How to analyse data without revealing their secrets? From a report: Data are valuable. But not all of them are as valuable as they could be. Reasons of confidentiality mean that many medical, financial, educational and other personal records, from the analysis of which much public good could be derived, are in practice unavailable. A lot of commercial data are similarly sequestered. For example, firms have more granular and timely information on the economy than governments can obtain from surveys. But such intelligence would be useful to rivals. If companies could be certain it would remain secret, they might be more willing to make it available to officialdom. A range of novel data-processing techniques might make such sharing possible. These so-called privacy-enhancing technologies (PETs) are still in the early stages of development. But they are about to get a boost from a project launched by the United Nations' statistics division. The UN PETs Lab, which opened for business officially on January 25th, enables national statistics offices, academic researchers and companies to collaborate to carry out projects which will test various PETs, permitting technical and administrative hiccups to be identified and overcome.

The first such effort, which actually began last summer, before the PETs Lab's formal inauguration, analysed import and export data from national statistical offices in America, Britain, Canada, Italy and the Netherlands, to look for anomalies. Those could be a result of fraud, of faulty record keeping or of innocuous re-exporting. For the pilot scheme, the researchers used categories already in the public domain -- in this case international trade in things such as wood pulp and clocks. They thus hoped to show that the system would work, before applying it to information where confidentiality matters. They put several kinds of PETs through their paces. In one trial, OpenMined, a charity based in Oxford, tested a technique called secure multiparty computation (SMPC). This approach involves the data to be analysed being encrypted by their keeper and staying on the premises. The organisation running the analysis (in this case OpenMined) sends its algorithm to the keeper, who runs it on the encrypted data. That is mathematically complex, but possible. The findings are then sent back to the original inquirer.
This discussion has been archived. No new comments can be posted.

The UN is Testing Technology That Processes Data Confidentially

Comments Filter:
  • https://en.m.wikipedia.org/wik... [wikipedia.org]

    "Homomorphic encryption is a form of encryption that permits users to perform computations on its encrypted data without first decrypting it."

    Not the only way, but then the information should be secure while handled and processed by outside people. Who could have specialized hardware like tons of GPUs to speed results (to amortize the cost). Or allow many remote people to rent their hardware out for processing anonymous data.

    Yeah the example above (submission) being physical

    • Encrypting data at rest, wherever it is, is a common requirement. That way a breach only gets the attacker a bunch of unreadable garbage.

      What I don't get is why they say it is mathematically complex to run an algorithm over the data when the people running the algorithm have the keys to decrypt it. So, it should be no different from any other set of queries run against an encrypted database. It's done transparently with SQL a billion times a day...

  • I mean our data. Someone is about to have all our data stolen.

  • The article is paywalled. Is this an application of homomorphic encryption [wikipedia.org]? Where they can search the data, but the data remains encrypted? This is a better use of it than enhancing DRM.

  • if the shape of the data is available then an algorithm can be easily created to run on the data owner's computing resource to create the desired aggregation to the degree of abstraction that the data owner is comfortable with. No need for homomorphic crypto
  • by sursurrus ( 796632 ) on Tuesday February 01, 2022 @04:51PM (#62228203)

    The press release is gibberish so let me translate: "We at the UN feel very strongly that our past massive corruption is not a predictor of future massive corruption. Give us your data."

  • up of Dictatorships and Totalitarian regimes for the most part, free Democracies are the rare minority. So most of what they do should be viewed with suspicion.

Time is the most valuable thing a man can spend. -- Theophrastus

Working...