Abstract
We argue for the design of “Privacy-preserving Accountable Accuracy Management Systems (PAAMS)”. The designs of such systems recognize from the onset that accuracy, accountability, and privacy management are intertwined. As such, these systems have to dynamically manage the tradeoffs between these (often conflicting) objectives. For example, accuracy in such systems can be improved by providing better accountability links between structured and unstructured information. Further, accuracy may be enhanced if access to private information is allowed in controllable and accountable ways. Our proposed approach involves three key elements. First, a model to link unstructured information such as that found in email, image and document repositories with structured information such as that in traditional databases. Second, a model for accuracy management and entity disambiguation by proactively preventing, detecting and tracing errors in information bases. Third, a model to provide privacy-governed operation as accountability and accuracy are managed.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
http://www.washingtonpost.com/wp-dyn/content/article/2007/03/24/AR2007032400944.html
Batini, C., Scannapieco, M.: Data Quality: Concepts, Methodologies and Techniques. Springer, Heidelberg (2006)
Hassell, J., Aleman-Meza, B., Arpinar, I.B.: Ontology-Driven Automatic Entity Disambiguation in Unstructured Text. In: 5th International Semantic Web Conference (ISWC 2006), Athens, GA, USA, November 5-9 (2006)
Aleman-Meza, B., Burns, P., Eavenson, M., Palaniswami, D., Sheth, A.P.: An Ontological Approach to the Document Access Problem of Insider Threat. In: Proceedings of the IEEE Intl. Conference on Intelligence and Security Informatics (ISI-2005), May 19-20 (2005)
Agrawal, R., Evfimievski, A., Srikant, R.: Information Sharing Across Private Databases. In: SIGMOD (2003)
Naor, M., Pinkas, B.: Oblivious Transfer and Polynomial Evaluation. STOC (1999)
Scannapirco, M., Figotin, I., Bertino, E., Elmagarmid, A.: Privacy Preserving Schema and Data Matching. In: SIGMOD (2007)
Hjaltason, G.R., Samet, H.: Properties of Embedding Methods for Similarity Searching in Metric Spaces. IEEE TPAMI 25(5) (2003)
Xu, S., Yung, M.: K-anonymous Multi-party Secret Handshakes. In: Financial Cryptography and Data Security, FC 2007 (2007)
Tsudik, G., Xu, S.: A Flexible Framework for Secret Handshakes. In: Danezis, G., Golle, P. (eds.) PET 2006. LNCS, vol. 4258, pp. 295–315. Springer, Heidelberg (2006)
Xu, S., Yung, M.: K-Anonymous Secret Handshakes with Reusable Credentials. In: The Proceedings of ACM Conference on Computer and Communications Security 2004 (ACM CCS 2004), pp. 158–167. ACM Press, New York (2004)
Sharkey, P., Tian, H., Zhang, W., Xu, S.: Privacy-Preserving Data Mining Through Knowledge Model Sharing. In: Proceedings of the First ACM SIGKDD International Workshop on Privacy, Security, and Trust in KDD, ACM PinKDD 2007 (2007)
Dowd, J., Xu, S., Zhang, W.: Privacy-Preserving Decision Tree Mining Based on Random Substitutions. In: Müller, G. (ed.) ETRICS 2006. LNCS, vol. 3995, pp. 145–159. Springer, Heidelberg (2006)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Thomas, R.K., Sandhu, R., Bertino, E., Arpinar, B., Xu, S. (2009). Privacy-Preserving Accountable Accuracy Management Systems (PAAMS). In: Gal, C.S., Kantor, P.B., Lesk, M.E. (eds) Protecting Persons While Protecting the People. ISIPS 2008. Lecture Notes in Computer Science, vol 5661. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-10233-2_11
Download citation
DOI: https://doi.org/10.1007/978-3-642-10233-2_11
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-10232-5
Online ISBN: 978-3-642-10233-2
eBook Packages: Computer ScienceComputer Science (R0)