1
Using Data Without
Compromising Privacy
Gordon Haff
Emerging Technology
Evangelist
@ghaff
https://bitmason.blogspot.co
m
@ghaff https://bitmason.blogspot.com
2
Zombies : Brains
Machine Learning : Data
@ghaff https://bitmason.blogspot.com
3
Open data can further
accelerate the amount of
available data in energy,
telecoms, etc.
@ghaff https://bitmason.blogspot.com
4
But data can be private and
sensitive at the individual
person or organization level
@ghaff https://bitmason.blogspot.com
5
“Traditional” anonymization?
Removing personal data fields (e.g. names)
Aggregation by “trusted” agency
@ghaff https://bitmason.blogspot.com
6
Differential Privacy
Multi-Party Computation
Homomorphic Encryption
@ghaff https://bitmason.blogspot.com
7
Differential Privacy
Widely share statistics over a set
of data without revealing anything
about individuals who may be in
data
Injects random data into a data set
(in a mathematically rigorous way)
to protect individual privacy
https://www.accessnow.org/understanding-
differential-privacy-matters-digital-rights/
@ghaff https://bitmason.blogspot.com
8
Multi-Party Computation
“Sharing data without sharing it”
Allows collaborative analysis of
multiple silo-ed datasets without
trusting a central authority
Essentially replacing a trusted
third-party with a protocol by
distributing shares of secrets
@ghaff https://bitmason.blogspot.com
9
Homomorphic Encryption
Strongest variant is FHE (arbitrary functions
execute on encrypted data). Craig Gentry,
2009.
Lets a third party perform complicated
processing of data without being able to see
it
Lattice-based encryption schemes
@ghaff https://bitmason.blogspot.com
10
Further Reading
https://research.redhat.com/quarterly/
CONFIDENTIAL Designator
linkedin.com/company/red-hat
youtube.com/user/RedHatVideos
facebook.com/redhatinc
twitter.com/RedHat
11
Red Hat is the world’s leading provider of enterprise
open source software solutions. Award-winning support,
training, and consulting services make Red Hat a trusted
adviser to the Fortune 500.
Thank you

Lightning Talk: Using Data without Compromising Privacy