PRIVACY TOOLS FOR SHARING RESEARCH DATA NSF site visit October 19, 2015 Salil Vadhan Supported by the NSF Secure & Trustworthy Cyberspace (SaTC) program,

Slides:



Advertisements
Similar presentations
PRIVACY IN NETWORK TRACES Ilya Mironov Microsoft Research (Silicon Valley Campus)
Advertisements

Maines Sustainability Solutions Initiative (SSI) Focuses on research of the coupled dynamics of social- ecological systems (SES) and the translation of.
Update on Data Publishing With Dataverse
1  July 26, 2011  60 day public comment period ends: Monday, October 26, 2011 !! Paul J. Reitemeier, Ph.D., Chair Human Research Review Committee Note:
DSSF Decision Support Tools – Contractual. Usual Disclaimers The analyses represented in the following slides reflect current understanding of applicable.
Secure and Trustworthy Cyberspace (SaTC) Program Sam Weber Program Director March 2012.
Insights on the Legal Landscape for Data Privacy in Higher Education Rodney Petersen, J.D. Government Relations Officer and Security Task Force Coordinator.
CUMC IRB Investigator Meeting November 9, 2004 Research Use of Stored Data and Tissues.
CATCS REPORT STOC 2015 BUSINESS MEETING Salil Vadhan.
Data Protection in Higher Education: Recent Experiences in Privacy and Security Institute for Computer Law and Policy Cornell University June 29, 2005.
Current Developments in Differential Privacy Salil Vadhan Center for Research on Computation & Society School of Engineering & Applied Sciences Harvard.
Best Practices In Design Outcomes Of A Survey P. H. King, PhD, PE Joan Walker, PhD Vanderbilt University.
+ STARS Evaluation Assistant Webinar 1 September 19, 2014 Evaluation Projects.
The Complexity of Differential Privacy Salil Vadhan Harvard University TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.:
26th WATCH: Differential Privacy: Theoretical and Practical Challenges Salil Vadhan Harvard University THURSDAY Jan. 15, Noon, Room 110 W ashington A rea.
INTERNET2 COLLABORATIVE INNOVATION PROGRAM DEVELOPMENT Florence D. Hudson Senior Vice President and Chief Innovation.
Supporting the local research data environment via cross-campus collaboration and leveraging of national expertise Hannah F. Norton, Rolando Garcia Milian,
Work Group on Student-Centered Learning in High School August 20, :00-3:30pm.
Information and Data in e-Science: Making Seamless Access a Reality Merry Bullock, Ph.D. Senior Director, Office of International Affairs, American Psychological.
ENCRYPTION Team 2.0 Pamela Dornan, Thomas Malone, David Kotar, Nayan Thakker, and Eddie Gallon.
Transparency and Open Data: GSS Response Iain Bell HoP MoJ.
RESPONSIBLE CONDUCT IN HUMAN SUBJECTS RESEARCH MARGARITA M. CARDONA DIRECTOR OF SPONSORED RESEARCH Institutional Review Board.
Data Warehousing Data Mining Privacy. Reading Bhavani Thuraisingham, Murat Kantarcioglu, and Srinivasan Iyer Extended RBAC-design and implementation.
National Science Foundation Directorate for Computer & Information Science & Engineering (CISE) Trustworthy Computing and Transition to Practice Secure.
A Few IQSS Quasi-Research Projects Gary King Institute for Quantitative Social Science Harvard University (talk at the Harvard Academic Computing Committee,
System Changes and Interventions: Registry as a Clinical Practice Tool Mike Hindmarsh Improving Chronic Illness Care, a national program of the Robert.
PIPEDA and Receivables Management Robin Gould-Soil Receivables Management Association of Canada November 16, 2011.
The MSR-UR Curriculum Repository Tom Healy Lead Program Manager Microsoft Research University Relations.
Background Researchers and funders continue to be concerned about the lack of archiving of scientific data. Such data can be useful to researchers, educators,
Designing Services for Security: Information Security Management throughout the Service Lifecycle Sarah Irwin & Craig Haynal 2015 Penn State Security Conference,
Bridging Notions of Privacy Bridging Notions of Privacy (a.k.a. de-identification WG) Kobbi Nissim (BGU and Privacy Tools for Sharing Research.
EDUCATION & OUTREACH NSF site visit October 19, 2015 Salil Vadhan and Urs Gasser Supported by the NSF Secure & Trustworthy Cyberspace (SaTC) program, the.
Differential Privacy: Theoretical & Practical Challenges Salil Vadhan Center for Research on Computation & Society John A. Paulson School of Engineering.
Data Publishing with Dataverse Mercè Crosas, Ph.D. Director of Data Science Institute for Quantitative Social Science, Harvard University.
Transition to Practice. We define “Transition to Practice” as making privacy tools and systems operational.
Bridging the Gap Between Computer Science and Legal Approaches to Privacy Second Census-MIT Big Data Workshop Nov 30-Dec 1, 2015 CS LAW Kobbi Nissim Ben-Gurion.
April 14, 2005MIT Libraries Visiting Committee Libraries Strategic Plan Theme III Work to shape the future MacKenzie Smith Associate Director for Technology.
1 Research Compliance at HMS: What is it Why it is important Who is involved How it affects you and how you can get help Postdoctoral Fellow Orientation.
October 9 th, 2015 University of Pennsylvania TIES Cancer Research Network Y3 Face to Face Meeting U24 CA Session 5 Regulatory Update.
Evaluation Assistant (EA) August Session STARS Alliance 2011 Tuesday Cohort C1 - Aug. 23 Wednesday Cohort C2 - Aug. 24 Noon - 1:30 pm.
Fire Emissions Network Sept. 4, 2002 A white paper for the development of a NSF Digital Government Program proposal Stefan Falke Washington University.
System Development & Operations NSF DataNet site visit to MIT February 8, /8/20101NSF Site Visit to MIT DataSpace DataSpace.
Evaluation Assistant Research Projects EAs are required to lead an evaluation research project for the academic year.
1. October 25, 2011 Louis Everett & John Yu Division of Undergraduate Education National Science Foundation October 26, 2011 Don Millard & John Yu Division.
1 Grant Applications Rachel Croson, PhD Dean, College of Business UT Arlington (formerly DD SES/SBE NSF)
CATCS REPORT FOCS 2012 BUSINESS MEETING Salil Vadhan.
1 Data.gov Initiative Implementation Acceleration Discussion Architecture and Infrastructure Committee Meeting March 19, 2009 Mike Carleton and Sonny Bhagowalia.
Biomedical Informatics Research Network DATA SHARING HIPAA Compliance & IRB Approvals Martha Payne, Jeffrey Grethe October 10, nd Annual All Hands.
Data Citation Dataverse Mercè Crosas Chief Data Science and Technology Officer, IQSS, Harvard Workshop: Data Citation.
Leveraging the Expertise of our Staff and the Information Resources We Manage MIT Libraries Visiting Committee April 13, 2005.
Privacy and Security Considerations in Research and Clinical Trials February 28, 2013 Joanna K. Napp, J.D., M.P.H. Chief Privacy Officer and Compliance.
Big Data Analytics Are we at risk? Dr. Csilla Farkas Director Center for Information Assurance Engineering (CIAE) Department of Computer Science and Engineering.
Gisella Stalloch Cliff Snellgrove. Understand how scientists manage their data Determine data management issues in specific scientific fields Determine.
“Translational research includes two areas of translation. One (T1) is the process of applying discoveries generated during research in the laboratory,
EDUCATION & OUTREACH NSF site visit October 19, 2015 Salil Vadhan and Urs Gasser Supported by the NSF Secure & Trustworthy Cyberspace (SaTC) program, the.
soc 320 expert Become Exceptional/soc320expertdotcom
2016 “OPEN IN ACTION”.
Office 365 Security Assessment Workshop
Privacy TOOLS FOR SHARING RESEARCH DATA
Health Information Security and Privacy Collaborative (HISPC) Overview
Privacy-preserving Release of Statistics: Differential Privacy
The Institute of Quantitative Social Science
CIS 333Competitive Success/tutorialrank.com
CIS 333 Education for Service-- tutorialrank.com.
Current Developments in Differential Privacy
Differential Privacy and Statistical Inference: A TCS Perspective
FUTURE PLANS NSF site visit October 19, 2015 Salil Vadhan
FUTURE PLANS NSF site visit October 19, 2015 Salil Vadhan
Neopay Practical Guides #2 PSD2 (Should I be worried?)
OpenDP: A Pitch for a Community Effort
Presentation transcript:

PRIVACY TOOLS FOR SHARING RESEARCH DATA NSF site visit October 19, 2015 Salil Vadhan Supported by the NSF Secure & Trustworthy Cyberspace (SaTC) program, the Sloan Foundation, and Google.

Computational Social Science The potential: massive new sources of data and ease of sharing will revolutionize social science. The problem: protecting the privacy of individual subjects privacy open data e.g. NYT 5/21/12 “Troves of Personal Data, Forbidden to Researchers” privacy utility traditional approaches (e.g. “stripping PII”)

Our Goal computer science social science statistics law & policy privacy open data privacy utility Achieve : & Via : Chong Vadhan GasserSweeney King Crosas Airoldi Dwork (MSR ) Altman (MIT ) Nissim (BGU) Smith (PSU ) Kantarcioglu (UTD) Gaboardi (Dundee) Honaker O’BrienHurley

Harvard Dataverse Repository: 1274 dataverses with 59,265 datasets and 1,415,241 downloads Largest social science repository in the world Dataverse Repositories around the world: 12 repositories in production with research data ~10 under construction 4 Use Case: Data Repositories

Datasets are restricted due to privacy concerns Goal: enable wider sharing while protecting privacy

Challenges for Sharing Sensitive Data Complexity of Law Thousands of privacy laws in the US alone, at federal, state and local level, usually context-specific: HIPAA, FERPA, CIPSEA, Privacy Act, PPRA, ESRA, …. Difficulty of Deidentification Stripping “PII” usually provides weak protections and/or poor utility Inefficient Process for Obtaining Restricted Data Can involve months of negotiation between institutions, original researchers Goal: make sharing easier for researcher without expertise in privacy law/cs/stats Sweeney `97

Vision: Integrated Privacy Tools Risk Assessment and De-Identification Risk Assessment and De-Identification Differential Privacy Customized & Machine- Actionable Terms of Use Customized & Machine- Actionable Terms of Use Data Tag Generator Data Set Query Access Restricted Access Tools we are working on Consent from subjects Open Access to Sanitized Data Set IRB proposal & review Policy Proposals and Best Practices Database of Privacy Laws & Regulations Deposit in repository

DataTags Ecosystem with Collaborations

This Site Visit: Depth over Breadth Short presentations of specific works to illustrate: Cross-disciplinary collaboration Involvement team members from PIs to students Knowledge transfer and outreach No attempt to survey everything we are doing E.g. papers in FOCS, SODA, COLT, CSF, ICALP, … See annual report and project website. Please ask if you’re wondering!

Privacy Tools for Social Science Gary King (IQSS) A Differentially Private Curator Tool & Supporting Theoretical Work James Honaker (IQSS) Kobbi Nissim (CRCS) DataTags: The Vision & Implementation in Technology Science Latanya Sweeney (Data Privacy Lab, IQSS) Logic Programming for Data Tagging Stephen Chong (CRCS) Agenda I CSSoc SciStatsLawPolicy CSSoc SciStatsLawPolicy

Agenda II Education & Outreach Salil Vadhan (CRCS) Urs Gasser (Berkman) Lunch & Poster Session with Students & Postdocs Modern Framework for Privacy Analysis & Government Open Data David O’Brien (Berkman) Alexandra Wood (Berkman) Bridging Notions of Privacy in CS, Law, Social Science Kobbi Nissim (CRCS) CSSoc SciStatsLawPolicy CSSoc SciStatsLawPolicy CSSoc SciStatsLawPolicy

Agenda III Summary & Future Plans Salil Vadhan (CRCS) Transition to Practice Merce Crosas (IQSS) NSF Private Discussion Feedback CSSoc SciStatsLawPolicy CSSoc SciStatsLawPolicy