O slideshow foi denunciado.
Utilizamos seu perfil e dados de atividades no LinkedIn para personalizar e exibir anúncios mais relevantes. Altere suas preferências de anúncios quando desejar.
Methods and Tools for GDPR Compliance through
Privacy and Data
Protection 4 Engineering
Long term security evolution of AI...
Long term security evolution of AI and
data protection
❑Background
❑Characterisation of AI-based systems
❑Long term securi...
Background
❑Embedded systems, Cyberphysical systems, Internet of things
❑Various domains
❑Privacy
❑Security
❑Trustworthine...
Background on AI
❑Study impact of AI on security and privacy (ISO/IEC SC27)
❑Study 132 use cases (ISO/IEC 24030 AI use cas...
Long term security evolution of AI and
data protection
❑Background
❑Characterisation of AI-based systems
❑Long term securi...
AI based applications
❑Current wave
❑Automatic speech recognition
❑Machine translation
❑Spam filters
❑Search engines
❑…
❑U...
Ecosystem Perspective
Example of cooperative ITS
26 March 2021 Long-term security evolution of AI and data protection 7
Ps...
Ecosystem Perspective
Example of cooperative ITS
26 March 2021 Long-term security evolution of AI and data protection 8
PK...
Lifecycle Perspective
26 March 2021 Long-term security evolution of AI and data protection Slide 9
AI system design &
impl...
Governance Perspective
26 March 2021 Long-term security evolution of AI and data protection 10
to
on
Governance body
Gover...
Governance Perspective
26 March 2021 Long-term security evolution of AI and data protection 11
to
on
Governance body
AI-ba...
Long term security evolution of AI and
data protection
❑Background
❑Characterisation of AI-based systems
❑Long term securi...
Ecosystem Perspective
Example of cooperative ITS
26 March 2021 Long-term security evolution of AI and data protection 13
P...
Lifecycle Perspective
26 March 2021 Long-term security evolution of AI and data protection Slide 14
AI system design &
imp...
Governance Perspective
26 March 2021 Long-term security evolution of AI and data protection 15
Governance body
AI-based
Au...
Approach
Slide 16
System
Trustworthiness
capability
Long-term
security
Technical/
Organisational
Functional
capability
26 ...
Long term security evolution of AI and
data protection
❑Background
❑Characterisation of AI-based systems
❑Long term securi...
Using Models
26 March 2021 Long-term security evolution of AI and data protection Slide 18
Model engineering
constructing ...
Approach
System model
Trustworthiness
Capability model
Long-term
security
model
Functional
capability model
Slide 19
Syste...
Community of BAMs
❑Best Available protection Models (BAM)
❑most effective and advanced capabilities
❑suitable in practice ...
There is a need for many BAMs
26 March 2021 Long-term security evolution of AI and data protection Slide 21
Consumer appli...
Application developer
reuses a BAM and its implementation
26 March 2021 Long-term security evolution of AI and data protec...
Application developer
develop a BAM
26 March 2021 Long-term security evolution of AI and data protection Slide 23
Submits
...
Eclipse Privacy-by-model Community
26 March 2021 Long-term security evolution of AI and data protection Slide 24
Stakehold...
Join the future Privacy-by-model
community!
Philippe Krief: philippe.krief@eclipse-foundation.org
Antonio Kung: antonio.ku...
Próximos SlideShares
Carregando em…5
×

de

Long term security evolution of ai and data protection   antonio kung trialog pdp4 e Slide 1 Long term security evolution of ai and data protection   antonio kung trialog pdp4 e Slide 2 Long term security evolution of ai and data protection   antonio kung trialog pdp4 e Slide 3 Long term security evolution of ai and data protection   antonio kung trialog pdp4 e Slide 4 Long term security evolution of ai and data protection   antonio kung trialog pdp4 e Slide 5 Long term security evolution of ai and data protection   antonio kung trialog pdp4 e Slide 6 Long term security evolution of ai and data protection   antonio kung trialog pdp4 e Slide 7 Long term security evolution of ai and data protection   antonio kung trialog pdp4 e Slide 8 Long term security evolution of ai and data protection   antonio kung trialog pdp4 e Slide 9 Long term security evolution of ai and data protection   antonio kung trialog pdp4 e Slide 10 Long term security evolution of ai and data protection   antonio kung trialog pdp4 e Slide 11 Long term security evolution of ai and data protection   antonio kung trialog pdp4 e Slide 12 Long term security evolution of ai and data protection   antonio kung trialog pdp4 e Slide 13 Long term security evolution of ai and data protection   antonio kung trialog pdp4 e Slide 14 Long term security evolution of ai and data protection   antonio kung trialog pdp4 e Slide 15 Long term security evolution of ai and data protection   antonio kung trialog pdp4 e Slide 16 Long term security evolution of ai and data protection   antonio kung trialog pdp4 e Slide 17 Long term security evolution of ai and data protection   antonio kung trialog pdp4 e Slide 18 Long term security evolution of ai and data protection   antonio kung trialog pdp4 e Slide 19 Long term security evolution of ai and data protection   antonio kung trialog pdp4 e Slide 20 Long term security evolution of ai and data protection   antonio kung trialog pdp4 e Slide 21 Long term security evolution of ai and data protection   antonio kung trialog pdp4 e Slide 22 Long term security evolution of ai and data protection   antonio kung trialog pdp4 e Slide 23 Long term security evolution of ai and data protection   antonio kung trialog pdp4 e Slide 24 Long term security evolution of ai and data protection   antonio kung trialog pdp4 e Slide 25
Próximos SlideShares
What to Upload to SlideShare
Avançar
Transfira para ler offline e ver em ecrã inteiro.

0 gostaram

Compartilhar

Baixar para ler offline

Long term security evolution of ai and data protection antonio kung trialog pdp4 e

Baixar para ler offline

Lailec event 25th and 26th march 2021 at KU Leuven.
https://www.law.kuleuven.be/citip/en/citip-conferences/lailec/lailec-2021/welcome

  • Seja a primeira pessoa a gostar disto

Long term security evolution of ai and data protection antonio kung trialog pdp4 e

  1. 1. Methods and Tools for GDPR Compliance through Privacy and Data Protection 4 Engineering Long term security evolution of AI and data protection Antonio Kung Trialog, 25 rue du Général Foy 75008 Paris antonio.kung@trialog.com 26 March 2021 Long-term security evolution of AI and data protection Slide 1 This project has received funding from the European Union’s Horizon 2020 research and innovation programme under grant agreement No 787034
  2. 2. Long term security evolution of AI and data protection ❑Background ❑Characterisation of AI-based systems ❑Long term security evolution ❑Using models 26 March 2021 Long-term security evolution of AI and data protection Slide 2
  3. 3. Background ❑Embedded systems, Cyberphysical systems, Internet of things ❑Various domains ❑Privacy ❑Security ❑Trustworthiness ❑Interoperability ❑Architecture ❑AI ❑Involvement in standards ❑Guidance for organisations ❑Guidance for ecosystems 26 March 2021 Long-term security evolution of AI and data protection 3 https://edps.europa.eu/data-protection/ipen-internet-privacy-engineering-network_en https://ipen.trialog.com/wiki/Wiki_for_Privacy_Standards_and_Privacy_Projects
  4. 4. Background on AI ❑Study impact of AI on security and privacy (ISO/IEC SC27) ❑Study 132 use cases (ISO/IEC 24030 AI use cases) ❑Guidance for security ❑Guidance for privacy ❑Study impact of AI on an ICT domain (ISO TC215) ❑Impact of AI on health ICT ❑Impact of AI on health ICT systems ❑Study impact of AI on architecture (ISO/IEC AG8) ❑For instance alignment of IoT reference architecture with Knowledge engineering reference architecture 26 March 2021 Long-term security evolution of AI and data protection 4
  5. 5. Long term security evolution of AI and data protection ❑Background ❑Characterisation of AI-based systems ❑Long term security evolution ❑Using models 26 March 2021 Long-term security evolution of AI and data protection Slide 5
  6. 6. AI based applications ❑Current wave ❑Automatic speech recognition ❑Machine translation ❑Spam filters ❑Search engines ❑… ❑Upcoming wave ❑Autonomous cars ❑Robots for elderly people ❑Autonomous drones ❑… 26 March 2021 Long-term security evolution of AI and data protection 6
  7. 7. Ecosystem Perspective Example of cooperative ITS 26 March 2021 Long-term security evolution of AI and data protection 7 Pseudonymization authority Road side unit Sending vehicle Receiving vehicle
  8. 8. Ecosystem Perspective Example of cooperative ITS 26 March 2021 Long-term security evolution of AI and data protection 8 PKI operator Vehicle operator Use case operator AI capability (e.g. autonomous driving) AI capability (e.g. autonomous driving)
  9. 9. Lifecycle Perspective 26 March 2021 Long-term security evolution of AI and data protection Slide 9 AI system design & implementation AI system training AI system integration into SoS SoS operation Training data Application data Continuous improvement
  10. 10. Governance Perspective 26 March 2021 Long-term security evolution of AI and data protection 10 to on Governance body Governed subject Policies follows Monitors Establishes
  11. 11. Governance Perspective 26 March 2021 Long-term security evolution of AI and data protection 11 to on Governance body AI-based Autonomous System Policies follows Monitors Establishes
  12. 12. Long term security evolution of AI and data protection ❑Background ❑Characterisation of AI-based systems ❑Long term security evolution ❑Using models 26 March 2021 Long-term security evolution of AI and data protection Slide 12
  13. 13. Ecosystem Perspective Example of cooperative ITS 26 March 2021 Long-term security evolution of AI and data protection 13 PKI operator Vehicle operator Use case operator AI capability (e.g. autonomous driving) AI capability (e.g. autonomous driving)
  14. 14. Lifecycle Perspective 26 March 2021 Long-term security evolution of AI and data protection Slide 14 AI system design & implementation AI system training AI system integration into SoS SoS operation Training data Application data Continuous improvement
  15. 15. Governance Perspective 26 March 2021 Long-term security evolution of AI and data protection 15 Governance body AI-based Autonomous System Policies follows Monitors Establishes
  16. 16. Approach Slide 16 System Trustworthiness capability Long-term security Technical/ Organisational Functional capability 26 March 2021 Long-term security evolution of AI and data protection
  17. 17. Long term security evolution of AI and data protection ❑Background ❑Characterisation of AI-based systems ❑Long term security evolution ❑Using models 26 March 2021 Long-term security evolution of AI and data protection Slide 17
  18. 18. Using Models 26 March 2021 Long-term security evolution of AI and data protection Slide 18 Model engineering constructing proportionally-scaled miniature working representations of full-sized machines Model driven engineering expressing specifications through processable models. Diagram orientation (e.g. UML diagrams) Source wikipedia
  19. 19. Approach System model Trustworthiness Capability model Long-term security model Functional capability model Slide 19 System Trustworthiness capability Functional capability 26 March 2021 Long-term security evolution of AI and data protection Long-term security Technical/ Organisational
  20. 20. Community of BAMs ❑Best Available protection Models (BAM) ❑most effective and advanced capabilities ❑suitable in practice for privacy compliance ❑designed to address risks on privacy and security. ❑Analogy with best available techniques 26 March 2021 Long-term security evolution of AI and data protection Slide 20
  21. 21. There is a need for many BAMs 26 March 2021 Long-term security evolution of AI and data protection Slide 21 Consumer applications Protection models AI in Health AI in Social network AI in Mobility AI in Smart home AI in Fintech … IoT applications Protection models AI in Connected vehicles AI in E- mobility AI in Smart energy AI in Assisted Living AI in Security … Data processing Protection models
  22. 22. Application developer reuses a BAM and its implementation 26 March 2021 Long-term security evolution of AI and data protection Slide 22 Reuses Application developer Open community repository Open source Guidance BAM
  23. 23. Application developer develop a BAM 26 March 2021 Long-term security evolution of AI and data protection Slide 23 Submits Open community repository Open source Modelling tools Uses Privacy engineering tools Application developer Guidance BAM
  24. 24. Eclipse Privacy-by-model Community 26 March 2021 Long-term security evolution of AI and data protection Slide 24 Stakeholders Privacy model expert PbM Steering committee (1) Provides Guidance for models (3) Provides model (3) Provides model Stakeholders Application privacy protection Project Task force Stakeholders Privacy engineering project Task force (2) Uses (2) Uses Stakeholders Privacy model expert PbM Validation committee (4)Validates model (4) Validates model Best Available Models (5) Publishes model
  25. 25. Join the future Privacy-by-model community! Philippe Krief: philippe.krief@eclipse-foundation.org Antonio Kung: antonio.kung@trialog.com Samuel Martin: ys.martin@upm.es 26 March 2021 Long-term security evolution of AI and data protection Slide 25 This project has received funding from the European Union’s Horizon 2020 research and innovation programme under grant agreement No 787034

Lailec event 25th and 26th march 2021 at KU Leuven. https://www.law.kuleuven.be/citip/en/citip-conferences/lailec/lailec-2021/welcome

Vistos

Vistos totais

122

No Slideshare

0

De incorporações

0

Número de incorporações

92

Ações

Baixados

1

Compartilhados

0

Comentários

0

Curtir

0

×