SlideShare uma empresa Scribd logo
1 de 16
Baixar para ler offline
Methods and Tools for GDPR Compliance through
Privacy and Data
Protection 4 Engineering
Impact of AI on Privacy
Antonio Kung (Trialog)
Data protection in real-time. Transforming
privacy law into practice. Oxford – Sept 10th,
2019
10/09/2019
Data protection in real-time. Transforming privacy law into
practice
1
This project has received funding from the European
Union’s Horizon 2020 research and innovation
programme under grant agreement No 787034
AI based applications
Current wave
Automatic speech recognition
Machine translation
Spam filters
Search engines
…
Upcoming wave
Autonomous cars
Robots for elderly people
Autonomous drones
…
10/09/2019
Data protection in real-time. Transforming privacy law into
practice
2
Example: Safety Application
Cooperative ITS
10/09/2019
Data protection in real-time. Transforming privacy law into
practice
3
Road side unit
Sending vehicle
Receiving vehicle
Broadcast message (CAM – Cooperative Awareness Message)
Position of vehicle
Movement of vehicle (speed, acceleration, steering angle, …)
Static information about the vehicle: type and size
Recent Path (limited to the last 30 seconds at maximum)
Privacy-by-design: Pseudonyms
(see https://www.sevecom.eu/ 2006-2008)
10/09/2019
Data protection in real-time. Transforming privacy law into
practice
4
Pseudonymization authority
Road side unit
Sending vehicle
Receiving vehicle
Ecosystem
10/09/2019
Data protection in real-time. Transforming privacy law into
practice
5
Road side unit
Application operator
(Safety, Traffic)
Pseudonym issuer
(PKI)
Vehicle
operator
Road side unit
operator
On board
Application operator
Safety
Ecosystem Threats
10/09/2019
Data protection in real-time. Transforming privacy law into
practice
6
Road side unit
Application operator
(Safety, Traffic)
Pseudonym issuer
(PKI)
Vehicle
operator
Road side unit
operator
On board
Application operator
Safety
Linking data
(using AI)
Linking pseudonyms
(using AI)
Identify driving behaviour
Identify driving offence
Autonomous
vehicle
example
Example: Autonomous Vehicle
AI to help decision
10/09/2019
Data protection in real-time. Transforming privacy law into
practice
7
toon
Policy management
process
Autonomous vehicle
manufacturer
Control and
monitoring process
Applies
Autonomous vehicle
Vehicle and
passengers
to manage
Safety, security,
privacy policies
follows
applies
to monitor Establishes
follows
AI to Assist System Lifecycle Processes
10/09/2019
Data protection in real-time. Transforming privacy law into
practice
8
Process AI support
Agreement AI-assisted data sharing agreement
Organisational AI assisted decision making
AI assisted knowledge management
Technical
management
AI assisted risk analysis
AI assisted compliance
Technical process
AI-assisted risk analysis
AI-assisted design
AI-assisted verification
AI assisted operation
AI assisted maintenance
ISO/IEC/IEEE 15288
AI to help Cybersecurity Lifecycle
(ISO/IEC 27101 – NIST)
10/09/2019
Data protection in real-time. Transforming privacy law into
practice
9
Process AI support
Identify AI assisted risk analysis
Protect
Pattern recognition for the design of security
and privacy controls
Detect
Anomaly detection
- off-line analysis
- on-line detection
Respond Assisting and training operators
Autonomous decision taking?Recover
AI to help Risk Analysis
Assistance to avoid attacks
(reduce likelihood of threats)
Assistance to breaches (reduce
severity of impact)
Data protection in real-time. Transforming privacy law into
practice
10/09/2019
10
Absolutely
avoided or
reduced
Must be
avoided or
reduced
Must be
reduced
These risks may
be taken
Negligible
Likelihood
Limited
Likelihood
Significant
Likelihood
Maximum
Likelihood
Negligible
Impact
Limited
Impact
Significant
Impact
Maximum
Impact
AI to Break Cybersecurity
security incident / privacy breach
is more likely to occur
Security incident / privacy breach
has more impact
10/09/2019
Data protection in real-time. Transforming privacy law into
practice
11
Absolutely
avoided or
reduced
Must be
avoided or
reduced
Must be
reduced
These risks may
be taken
Negligible
Likelihood
Limited
Likelihood
Significant
Likelihood
Maximum
Likelihood
Negligible
Impact
Limited
Impact
Significant
Impact
Maximum
Impact
Data Poisoning
Courtesy Ivo Emanuilov (KUL – citip – Imec)
Adversarial examples: malicious inputs to machine learning models
Data Poisoning: Fooling the models
10/09/2019
Data protection in real-time. Transforming privacy law into
practice
12
Malicious AI Report (February 2018)
10/09/2019
Data protection in real-time. Transforming privacy law into
practice
13
Conclusions
AI will improve lifecycle processes
AI will improve security and privacy risk management
Malicious AI will increase security and privacy risks
Security and Privacy Governance Model for AI to meet
Empowerment capability
Explainability capability
10/09/2019
Data protection in real-time. Transforming privacy law into
practice
14
Context or presentation
ISO Study period Impact of AI on privacy
Started in October 2018 for one year
Rapporteurs
 Antonio Kung
 Srinivas Poosarla
 Peter Dickman
 Gurshabad Grover
 Peter Deussen
 Heung Youl Youm
 Zhao Yunwei
SC27 work, liaison with SC42 AI
Terms of reference
review new generation of AI-based systems (autonomous systems) and identify their impact on privacy,
review new threats to privacy which AI can create,
review how AI can be used by deploying improved privacy controls, and
provide recommendations for standardization work.
10/09/2019
Data protection in real-time. Transforming privacy law into
practice
15
Methods and Tools for GDPR Compliance through
Privacy and Data
Protection 4 Engineering
Thank you for your
attention
Questions?
For more information, visit:
www.pdp4e-project.org
Contact points
Antonio Kung (Trialog)
Antonio.kung@trialog.com
Yod Samuel Martín (UPM)
ys.martin@upm.es
10/09/2019
Data protection in real-time. Transforming privacy law into
practice
Slide 16

Mais conteúdo relacionado

Mais procurados

Data Privacy and Security in Autonomous Vehicles
Data Privacy and Security in Autonomous VehiclesData Privacy and Security in Autonomous Vehicles
Data Privacy and Security in Autonomous Vehiclessulaiman_karim
 
Lightkone project : Lightweight computation for networks at the edge
Lightkone project : Lightweight computation for networks at the edgeLightkone project : Lightweight computation for networks at the edge
Lightkone project : Lightweight computation for networks at the edgeAgence du Numérique (AdN)
 
Towards Large-Scale, High-Density Indoor Ultra Wideband Geolocation Systems
Towards Large-Scale, High-Density Indoor Ultra Wideband Geolocation SystemsTowards Large-Scale, High-Density Indoor Ultra Wideband Geolocation Systems
Towards Large-Scale, High-Density Indoor Ultra Wideband Geolocation SystemsAgence du Numérique (AdN)
 
International Conference on Big Data, IoT and Machine Learning (BIOM 2021)
International Conference on Big Data, IoT and Machine Learning (BIOM 2021)International Conference on Big Data, IoT and Machine Learning (BIOM 2021)
International Conference on Big Data, IoT and Machine Learning (BIOM 2021)ijwscjournal
 
Applying IoT to the Management of Natural Disasters Risk NIAGRISK - A digital...
Applying IoT to the Management of Natural Disasters Risk NIAGRISK - A digital...Applying IoT to the Management of Natural Disasters Risk NIAGRISK - A digital...
Applying IoT to the Management of Natural Disasters Risk NIAGRISK - A digital...Agence du Numérique (AdN)
 
Who will buy IOT products and why.
Who will buy IOT products and why.Who will buy IOT products and why.
Who will buy IOT products and why.Atanu Roy Chowdhury
 
Enabling Security-by-design in Smart Grids: An architecture-based approach
Enabling Security-by-design in Smart Grids: An architecture-based approachEnabling Security-by-design in Smart Grids: An architecture-based approach
Enabling Security-by-design in Smart Grids: An architecture-based approachMassimiliano Masi
 
Achieving Interoperability Through IHE
Achieving Interoperability Through IHEAchieving Interoperability Through IHE
Achieving Interoperability Through IHEMassimiliano Masi
 
2 nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
2 nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)2 nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
2 nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)ijwscjournal
 
2nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
2nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)2nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
2nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)ijdms
 
6th International Conference on Cryptography and Information Security (CRIS 2...
6th International Conference on Cryptography and Information Security (CRIS 2...6th International Conference on Cryptography and Information Security (CRIS 2...
6th International Conference on Cryptography and Information Security (CRIS 2...IJNSA Journal
 
A Cybersecurity Digital Twin for Critical Infrastructure Protection
A Cybersecurity Digital Twin for Critical Infrastructure ProtectionA Cybersecurity Digital Twin for Critical Infrastructure Protection
A Cybersecurity Digital Twin for Critical Infrastructure ProtectionMassimiliano Masi
 
Enabling a Zero Trust Architecture in Smart Grids through a Digital Twin
Enabling a Zero Trust Architecture in Smart Grids through a Digital TwinEnabling a Zero Trust Architecture in Smart Grids through a Digital Twin
Enabling a Zero Trust Architecture in Smart Grids through a Digital TwinMassimiliano Masi
 
6th International Conference on Cryptography and Information Security (CRIS 2...
6th International Conference on Cryptography and Information Security (CRIS 2...6th International Conference on Cryptography and Information Security (CRIS 2...
6th International Conference on Cryptography and Information Security (CRIS 2...IJNSA Journal
 
Security and Safety by Design in the Internet of Actors an Architectural Appr...
Security and Safety by Design in the Internet of Actors an Architectural Appr...Security and Safety by Design in the Internet of Actors an Architectural Appr...
Security and Safety by Design in the Internet of Actors an Architectural Appr...Massimiliano Masi
 
6th International Conference on Cryptography and Information Security (CRIS 2...
6th International Conference on Cryptography and Information Security (CRIS 2...6th International Conference on Cryptography and Information Security (CRIS 2...
6th International Conference on Cryptography and Information Security (CRIS 2...IJNSA Journal
 

Mais procurados (20)

Wp6 public
Wp6 publicWp6 public
Wp6 public
 
Data Privacy and Security in Autonomous Vehicles
Data Privacy and Security in Autonomous VehiclesData Privacy and Security in Autonomous Vehicles
Data Privacy and Security in Autonomous Vehicles
 
MECATECH, building the Future
MECATECH, building the FutureMECATECH, building the Future
MECATECH, building the Future
 
Lightkone project : Lightweight computation for networks at the edge
Lightkone project : Lightweight computation for networks at the edgeLightkone project : Lightweight computation for networks at the edge
Lightkone project : Lightweight computation for networks at the edge
 
Towards Large-Scale, High-Density Indoor Ultra Wideband Geolocation Systems
Towards Large-Scale, High-Density Indoor Ultra Wideband Geolocation SystemsTowards Large-Scale, High-Density Indoor Ultra Wideband Geolocation Systems
Towards Large-Scale, High-Density Indoor Ultra Wideband Geolocation Systems
 
Multitel Cybersecurity Projects
Multitel Cybersecurity ProjectsMultitel Cybersecurity Projects
Multitel Cybersecurity Projects
 
International Conference on Big Data, IoT and Machine Learning (BIOM 2021)
International Conference on Big Data, IoT and Machine Learning (BIOM 2021)International Conference on Big Data, IoT and Machine Learning (BIOM 2021)
International Conference on Big Data, IoT and Machine Learning (BIOM 2021)
 
Applying IoT to the Management of Natural Disasters Risk NIAGRISK - A digital...
Applying IoT to the Management of Natural Disasters Risk NIAGRISK - A digital...Applying IoT to the Management of Natural Disasters Risk NIAGRISK - A digital...
Applying IoT to the Management of Natural Disasters Risk NIAGRISK - A digital...
 
Who will buy IOT products and why.
Who will buy IOT products and why.Who will buy IOT products and why.
Who will buy IOT products and why.
 
Enabling Security-by-design in Smart Grids: An architecture-based approach
Enabling Security-by-design in Smart Grids: An architecture-based approachEnabling Security-by-design in Smart Grids: An architecture-based approach
Enabling Security-by-design in Smart Grids: An architecture-based approach
 
Dpm presentation
Dpm presentationDpm presentation
Dpm presentation
 
Achieving Interoperability Through IHE
Achieving Interoperability Through IHEAchieving Interoperability Through IHE
Achieving Interoperability Through IHE
 
2 nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
2 nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)2 nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
2 nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
 
2nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
2nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)2nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
2nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
 
6th International Conference on Cryptography and Information Security (CRIS 2...
6th International Conference on Cryptography and Information Security (CRIS 2...6th International Conference on Cryptography and Information Security (CRIS 2...
6th International Conference on Cryptography and Information Security (CRIS 2...
 
A Cybersecurity Digital Twin for Critical Infrastructure Protection
A Cybersecurity Digital Twin for Critical Infrastructure ProtectionA Cybersecurity Digital Twin for Critical Infrastructure Protection
A Cybersecurity Digital Twin for Critical Infrastructure Protection
 
Enabling a Zero Trust Architecture in Smart Grids through a Digital Twin
Enabling a Zero Trust Architecture in Smart Grids through a Digital TwinEnabling a Zero Trust Architecture in Smart Grids through a Digital Twin
Enabling a Zero Trust Architecture in Smart Grids through a Digital Twin
 
6th International Conference on Cryptography and Information Security (CRIS 2...
6th International Conference on Cryptography and Information Security (CRIS 2...6th International Conference on Cryptography and Information Security (CRIS 2...
6th International Conference on Cryptography and Information Security (CRIS 2...
 
Security and Safety by Design in the Internet of Actors an Architectural Appr...
Security and Safety by Design in the Internet of Actors an Architectural Appr...Security and Safety by Design in the Internet of Actors an Architectural Appr...
Security and Safety by Design in the Internet of Actors an Architectural Appr...
 
6th International Conference on Cryptography and Information Security (CRIS 2...
6th International Conference on Cryptography and Information Security (CRIS 2...6th International Conference on Cryptography and Information Security (CRIS 2...
6th International Conference on Cryptography and Information Security (CRIS 2...
 

Semelhante a Antonio kung impact of ai on privacy sept 10

AI Technology Is Making Us Safer: Is That So?
AI Technology Is Making Us Safer: Is That So?AI Technology Is Making Us Safer: Is That So?
AI Technology Is Making Us Safer: Is That So?Pixel Crayons
 
The Artificial Intelligence World: Responding to Legal and Ethical Issues
The Artificial Intelligence World:  Responding to Legal and Ethical IssuesThe Artificial Intelligence World:  Responding to Legal and Ethical Issues
The Artificial Intelligence World: Responding to Legal and Ethical IssuesRichard Austin
 
SCL Annual Conference 2019: Regulating social media platforms for interoperab...
SCL Annual Conference 2019: Regulating social media platforms for interoperab...SCL Annual Conference 2019: Regulating social media platforms for interoperab...
SCL Annual Conference 2019: Regulating social media platforms for interoperab...Chris Marsden
 
Deep Learning Analytics for IoT Security over a Configurable Big Data Platform
Deep Learning Analytics for IoT Security over a Configurable Big Data PlatformDeep Learning Analytics for IoT Security over a Configurable Big Data Platform
Deep Learning Analytics for IoT Security over a Configurable Big Data PlatformAngela - Maria Despotopoulou
 
Technology innovation through AI
Technology innovation through AITechnology innovation through AI
Technology innovation through AIGlen Koskela
 
Brochure-Lawctopus-compressed.pdf
Brochure-Lawctopus-compressed.pdfBrochure-Lawctopus-compressed.pdf
Brochure-Lawctopus-compressed.pdftarachand1234
 
Tendencias globales en la regulación de la IA y estándares tecnológicos asoci...
Tendencias globales en la regulación de la IA y estándares tecnológicos asoci...Tendencias globales en la regulación de la IA y estándares tecnológicos asoci...
Tendencias globales en la regulación de la IA y estándares tecnológicos asoci...Comisión de Regulación de Comunicaciones
 
Ijacsa published research paper march 2020
Ijacsa published research paper march 2020Ijacsa published research paper march 2020
Ijacsa published research paper march 2020shoaibulhassanuos
 
Data-intensive decision making in the era of big data and artificial intellig...
Data-intensive decision making in the era of big data and artificial intellig...Data-intensive decision making in the era of big data and artificial intellig...
Data-intensive decision making in the era of big data and artificial intellig...samossummit
 
Anti theft security system for vehicle
Anti theft security system for vehicleAnti theft security system for vehicle
Anti theft security system for vehicleabhinandanyadavg
 
Coordination of Threat Analysis in ICT Ecosystems
Coordination of Threat Analysis in ICT EcosystemsCoordination of Threat Analysis in ICT Ecosystems
Coordination of Threat Analysis in ICT EcosystemsITU
 
Hiroki Habuka, Session 5
Hiroki Habuka, Session 5Hiroki Habuka, Session 5
Hiroki Habuka, Session 5OECD Governance
 
CWIN17 london transforming the insurance and banking with io t technologies...
CWIN17 london   transforming the insurance and banking with io t technologies...CWIN17 london   transforming the insurance and banking with io t technologies...
CWIN17 london transforming the insurance and banking with io t technologies...Capgemini
 
BigData and Cybersecurity for Digital Finance and conclusions
BigData and Cybersecurity for Digital Finance and conclusionsBigData and Cybersecurity for Digital Finance and conclusions
BigData and Cybersecurity for Digital Finance and conclusionsBig Data Value Association
 
The Impact of Artificial Intelligence in Aviation?
The Impact of Artificial Intelligence in Aviation?The Impact of Artificial Intelligence in Aviation?
The Impact of Artificial Intelligence in Aviation?ILAM INDIA
 
Design and Implementation of an Intelligent Safety and Security System for Ve...
Design and Implementation of an Intelligent Safety and Security System for Ve...Design and Implementation of an Intelligent Safety and Security System for Ve...
Design and Implementation of an Intelligent Safety and Security System for Ve...Hamzamohammed70
 
IoT Based Accident Avoidance and Detection System for Two Wheelers
IoT Based Accident Avoidance and Detection System for Two WheelersIoT Based Accident Avoidance and Detection System for Two Wheelers
IoT Based Accident Avoidance and Detection System for Two WheelersIJASRD Journal
 
Smartphone Forensic Challenges
Smartphone Forensic ChallengesSmartphone Forensic Challenges
Smartphone Forensic ChallengesCSCJournals
 
The Security Challenge: What's Next?
The Security Challenge: What's Next?The Security Challenge: What's Next?
The Security Challenge: What's Next?Cognizant
 

Semelhante a Antonio kung impact of ai on privacy sept 10 (20)

AI Technology Is Making Us Safer: Is That So?
AI Technology Is Making Us Safer: Is That So?AI Technology Is Making Us Safer: Is That So?
AI Technology Is Making Us Safer: Is That So?
 
The Artificial Intelligence World: Responding to Legal and Ethical Issues
The Artificial Intelligence World:  Responding to Legal and Ethical IssuesThe Artificial Intelligence World:  Responding to Legal and Ethical Issues
The Artificial Intelligence World: Responding to Legal and Ethical Issues
 
SCL Annual Conference 2019: Regulating social media platforms for interoperab...
SCL Annual Conference 2019: Regulating social media platforms for interoperab...SCL Annual Conference 2019: Regulating social media platforms for interoperab...
SCL Annual Conference 2019: Regulating social media platforms for interoperab...
 
Deep Learning Analytics for IoT Security over a Configurable Big Data Platform
Deep Learning Analytics for IoT Security over a Configurable Big Data PlatformDeep Learning Analytics for IoT Security over a Configurable Big Data Platform
Deep Learning Analytics for IoT Security over a Configurable Big Data Platform
 
Technology innovation through AI
Technology innovation through AITechnology innovation through AI
Technology innovation through AI
 
Brochure-Lawctopus-compressed.pdf
Brochure-Lawctopus-compressed.pdfBrochure-Lawctopus-compressed.pdf
Brochure-Lawctopus-compressed.pdf
 
Tendencias globales en la regulación de la IA y estándares tecnológicos asoci...
Tendencias globales en la regulación de la IA y estándares tecnológicos asoci...Tendencias globales en la regulación de la IA y estándares tecnológicos asoci...
Tendencias globales en la regulación de la IA y estándares tecnológicos asoci...
 
Ijacsa published research paper march 2020
Ijacsa published research paper march 2020Ijacsa published research paper march 2020
Ijacsa published research paper march 2020
 
14 june
14 june14 june
14 june
 
Data-intensive decision making in the era of big data and artificial intellig...
Data-intensive decision making in the era of big data and artificial intellig...Data-intensive decision making in the era of big data and artificial intellig...
Data-intensive decision making in the era of big data and artificial intellig...
 
Anti theft security system for vehicle
Anti theft security system for vehicleAnti theft security system for vehicle
Anti theft security system for vehicle
 
Coordination of Threat Analysis in ICT Ecosystems
Coordination of Threat Analysis in ICT EcosystemsCoordination of Threat Analysis in ICT Ecosystems
Coordination of Threat Analysis in ICT Ecosystems
 
Hiroki Habuka, Session 5
Hiroki Habuka, Session 5Hiroki Habuka, Session 5
Hiroki Habuka, Session 5
 
CWIN17 london transforming the insurance and banking with io t technologies...
CWIN17 london   transforming the insurance and banking with io t technologies...CWIN17 london   transforming the insurance and banking with io t technologies...
CWIN17 london transforming the insurance and banking with io t technologies...
 
BigData and Cybersecurity for Digital Finance and conclusions
BigData and Cybersecurity for Digital Finance and conclusionsBigData and Cybersecurity for Digital Finance and conclusions
BigData and Cybersecurity for Digital Finance and conclusions
 
The Impact of Artificial Intelligence in Aviation?
The Impact of Artificial Intelligence in Aviation?The Impact of Artificial Intelligence in Aviation?
The Impact of Artificial Intelligence in Aviation?
 
Design and Implementation of an Intelligent Safety and Security System for Ve...
Design and Implementation of an Intelligent Safety and Security System for Ve...Design and Implementation of an Intelligent Safety and Security System for Ve...
Design and Implementation of an Intelligent Safety and Security System for Ve...
 
IoT Based Accident Avoidance and Detection System for Two Wheelers
IoT Based Accident Avoidance and Detection System for Two WheelersIoT Based Accident Avoidance and Detection System for Two Wheelers
IoT Based Accident Avoidance and Detection System for Two Wheelers
 
Smartphone Forensic Challenges
Smartphone Forensic ChallengesSmartphone Forensic Challenges
Smartphone Forensic Challenges
 
The Security Challenge: What's Next?
The Security Challenge: What's Next?The Security Challenge: What's Next?
The Security Challenge: What's Next?
 

Mais de Privacy Data Protection for Engineering (10)

Wp4 overall approach_v1
Wp4 overall approach_v1Wp4 overall approach_v1
Wp4 overall approach_v1
 
Wp4 tool demonstration_v1
Wp4 tool demonstration_v1Wp4 tool demonstration_v1
Wp4 tool demonstration_v1
 
Wp5 overall approach_3-pd_pbdmodules_v4
Wp5 overall approach_3-pd_pbdmodules_v4Wp5 overall approach_3-pd_pbdmodules_v4
Wp5 overall approach_3-pd_pbdmodules_v4
 
Wp6 workshop 10_march2020
Wp6 workshop 10_march2020Wp6 workshop 10_march2020
Wp6 workshop 10_march2020
 
Pdp4 e forum
Pdp4 e forumPdp4 e forum
Pdp4 e forum
 
Paris wp5 pd-pb_d_case_study
Paris wp5 pd-pb_d_case_studyParis wp5 pd-pb_d_case_study
Paris wp5 pd-pb_d_case_study
 
Paris wp5 pd-pb_d
Paris wp5 pd-pb_dParis wp5 pd-pb_d
Paris wp5 pd-pb_d
 
Wp4 ws cea2020
Wp4 ws cea2020Wp4 ws cea2020
Wp4 ws cea2020
 
Beawre pitch
Beawre pitchBeawre pitch
Beawre pitch
 
Pdp4e IPEN-2019
Pdp4e  IPEN-2019Pdp4e  IPEN-2019
Pdp4e IPEN-2019
 

Último

Steel Structures - Building technology.pptx
Steel Structures - Building technology.pptxSteel Structures - Building technology.pptx
Steel Structures - Building technology.pptxNikhil Raut
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptSAURABHKUMAR892774
 
Class 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm SystemClass 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm Systemirfanmechengr
 
NO1 Certified Black Magic Specialist Expert Amil baba in Uae Dubai Abu Dhabi ...
NO1 Certified Black Magic Specialist Expert Amil baba in Uae Dubai Abu Dhabi ...NO1 Certified Black Magic Specialist Expert Amil baba in Uae Dubai Abu Dhabi ...
NO1 Certified Black Magic Specialist Expert Amil baba in Uae Dubai Abu Dhabi ...Amil Baba Dawood bangali
 
Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleCorrectly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleAlluxio, Inc.
 
Industrial Safety Unit-IV workplace health and safety.ppt
Industrial Safety Unit-IV workplace health and safety.pptIndustrial Safety Unit-IV workplace health and safety.ppt
Industrial Safety Unit-IV workplace health and safety.pptNarmatha D
 
Indian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.pptIndian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.pptMadan Karki
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
National Level Hackathon Participation Certificate.pdf
National Level Hackathon Participation Certificate.pdfNational Level Hackathon Participation Certificate.pdf
National Level Hackathon Participation Certificate.pdfRajuKanojiya4
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfROCENODodongVILLACER
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvLewisJB
 
Industrial Safety Unit-I SAFETY TERMINOLOGIES
Industrial Safety Unit-I SAFETY TERMINOLOGIESIndustrial Safety Unit-I SAFETY TERMINOLOGIES
Industrial Safety Unit-I SAFETY TERMINOLOGIESNarmatha D
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfAsst.prof M.Gokilavani
 
US Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionUS Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionMebane Rash
 
welding defects observed during the welding
welding defects observed during the weldingwelding defects observed during the welding
welding defects observed during the weldingMuhammadUzairLiaqat
 
Main Memory Management in Operating System
Main Memory Management in Operating SystemMain Memory Management in Operating System
Main Memory Management in Operating SystemRashmi Bhat
 
Research Methodology for Engineering pdf
Research Methodology for Engineering pdfResearch Methodology for Engineering pdf
Research Methodology for Engineering pdfCaalaaAbdulkerim
 

Último (20)

Steel Structures - Building technology.pptx
Steel Structures - Building technology.pptxSteel Structures - Building technology.pptx
Steel Structures - Building technology.pptx
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.ppt
 
Class 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm SystemClass 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm System
 
NO1 Certified Black Magic Specialist Expert Amil baba in Uae Dubai Abu Dhabi ...
NO1 Certified Black Magic Specialist Expert Amil baba in Uae Dubai Abu Dhabi ...NO1 Certified Black Magic Specialist Expert Amil baba in Uae Dubai Abu Dhabi ...
NO1 Certified Black Magic Specialist Expert Amil baba in Uae Dubai Abu Dhabi ...
 
Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleCorrectly Loading Incremental Data at Scale
Correctly Loading Incremental Data at Scale
 
Industrial Safety Unit-IV workplace health and safety.ppt
Industrial Safety Unit-IV workplace health and safety.pptIndustrial Safety Unit-IV workplace health and safety.ppt
Industrial Safety Unit-IV workplace health and safety.ppt
 
Indian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.pptIndian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.ppt
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
National Level Hackathon Participation Certificate.pdf
National Level Hackathon Participation Certificate.pdfNational Level Hackathon Participation Certificate.pdf
National Level Hackathon Participation Certificate.pdf
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdf
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
 
Industrial Safety Unit-I SAFETY TERMINOLOGIES
Industrial Safety Unit-I SAFETY TERMINOLOGIESIndustrial Safety Unit-I SAFETY TERMINOLOGIES
Industrial Safety Unit-I SAFETY TERMINOLOGIES
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
 
US Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionUS Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of Action
 
welding defects observed during the welding
welding defects observed during the weldingwelding defects observed during the welding
welding defects observed during the welding
 
Main Memory Management in Operating System
Main Memory Management in Operating SystemMain Memory Management in Operating System
Main Memory Management in Operating System
 
Research Methodology for Engineering pdf
Research Methodology for Engineering pdfResearch Methodology for Engineering pdf
Research Methodology for Engineering pdf
 

Antonio kung impact of ai on privacy sept 10

  • 1. Methods and Tools for GDPR Compliance through Privacy and Data Protection 4 Engineering Impact of AI on Privacy Antonio Kung (Trialog) Data protection in real-time. Transforming privacy law into practice. Oxford – Sept 10th, 2019 10/09/2019 Data protection in real-time. Transforming privacy law into practice 1 This project has received funding from the European Union’s Horizon 2020 research and innovation programme under grant agreement No 787034
  • 2. AI based applications Current wave Automatic speech recognition Machine translation Spam filters Search engines … Upcoming wave Autonomous cars Robots for elderly people Autonomous drones … 10/09/2019 Data protection in real-time. Transforming privacy law into practice 2
  • 3. Example: Safety Application Cooperative ITS 10/09/2019 Data protection in real-time. Transforming privacy law into practice 3 Road side unit Sending vehicle Receiving vehicle Broadcast message (CAM – Cooperative Awareness Message) Position of vehicle Movement of vehicle (speed, acceleration, steering angle, …) Static information about the vehicle: type and size Recent Path (limited to the last 30 seconds at maximum)
  • 4. Privacy-by-design: Pseudonyms (see https://www.sevecom.eu/ 2006-2008) 10/09/2019 Data protection in real-time. Transforming privacy law into practice 4 Pseudonymization authority Road side unit Sending vehicle Receiving vehicle
  • 5. Ecosystem 10/09/2019 Data protection in real-time. Transforming privacy law into practice 5 Road side unit Application operator (Safety, Traffic) Pseudonym issuer (PKI) Vehicle operator Road side unit operator On board Application operator Safety
  • 6. Ecosystem Threats 10/09/2019 Data protection in real-time. Transforming privacy law into practice 6 Road side unit Application operator (Safety, Traffic) Pseudonym issuer (PKI) Vehicle operator Road side unit operator On board Application operator Safety Linking data (using AI) Linking pseudonyms (using AI) Identify driving behaviour Identify driving offence
  • 7. Autonomous vehicle example Example: Autonomous Vehicle AI to help decision 10/09/2019 Data protection in real-time. Transforming privacy law into practice 7 toon Policy management process Autonomous vehicle manufacturer Control and monitoring process Applies Autonomous vehicle Vehicle and passengers to manage Safety, security, privacy policies follows applies to monitor Establishes follows
  • 8. AI to Assist System Lifecycle Processes 10/09/2019 Data protection in real-time. Transforming privacy law into practice 8 Process AI support Agreement AI-assisted data sharing agreement Organisational AI assisted decision making AI assisted knowledge management Technical management AI assisted risk analysis AI assisted compliance Technical process AI-assisted risk analysis AI-assisted design AI-assisted verification AI assisted operation AI assisted maintenance ISO/IEC/IEEE 15288
  • 9. AI to help Cybersecurity Lifecycle (ISO/IEC 27101 – NIST) 10/09/2019 Data protection in real-time. Transforming privacy law into practice 9 Process AI support Identify AI assisted risk analysis Protect Pattern recognition for the design of security and privacy controls Detect Anomaly detection - off-line analysis - on-line detection Respond Assisting and training operators Autonomous decision taking?Recover
  • 10. AI to help Risk Analysis Assistance to avoid attacks (reduce likelihood of threats) Assistance to breaches (reduce severity of impact) Data protection in real-time. Transforming privacy law into practice 10/09/2019 10 Absolutely avoided or reduced Must be avoided or reduced Must be reduced These risks may be taken Negligible Likelihood Limited Likelihood Significant Likelihood Maximum Likelihood Negligible Impact Limited Impact Significant Impact Maximum Impact
  • 11. AI to Break Cybersecurity security incident / privacy breach is more likely to occur Security incident / privacy breach has more impact 10/09/2019 Data protection in real-time. Transforming privacy law into practice 11 Absolutely avoided or reduced Must be avoided or reduced Must be reduced These risks may be taken Negligible Likelihood Limited Likelihood Significant Likelihood Maximum Likelihood Negligible Impact Limited Impact Significant Impact Maximum Impact
  • 12. Data Poisoning Courtesy Ivo Emanuilov (KUL – citip – Imec) Adversarial examples: malicious inputs to machine learning models Data Poisoning: Fooling the models 10/09/2019 Data protection in real-time. Transforming privacy law into practice 12
  • 13. Malicious AI Report (February 2018) 10/09/2019 Data protection in real-time. Transforming privacy law into practice 13
  • 14. Conclusions AI will improve lifecycle processes AI will improve security and privacy risk management Malicious AI will increase security and privacy risks Security and Privacy Governance Model for AI to meet Empowerment capability Explainability capability 10/09/2019 Data protection in real-time. Transforming privacy law into practice 14
  • 15. Context or presentation ISO Study period Impact of AI on privacy Started in October 2018 for one year Rapporteurs  Antonio Kung  Srinivas Poosarla  Peter Dickman  Gurshabad Grover  Peter Deussen  Heung Youl Youm  Zhao Yunwei SC27 work, liaison with SC42 AI Terms of reference review new generation of AI-based systems (autonomous systems) and identify their impact on privacy, review new threats to privacy which AI can create, review how AI can be used by deploying improved privacy controls, and provide recommendations for standardization work. 10/09/2019 Data protection in real-time. Transforming privacy law into practice 15
  • 16. Methods and Tools for GDPR Compliance through Privacy and Data Protection 4 Engineering Thank you for your attention Questions? For more information, visit: www.pdp4e-project.org Contact points Antonio Kung (Trialog) Antonio.kung@trialog.com Yod Samuel Martín (UPM) ys.martin@upm.es 10/09/2019 Data protection in real-time. Transforming privacy law into practice Slide 16