Staying at the Edge of Privacy: Edge Computing and Impersonal Extraction

From self-driving cars to smart city sensors, billions of devices will be connected to networks in the next few years. These devices will collect vast amounts of data which needs to be processed in real-time, overwhelming centralized cloud architectures. To address this need, the industry seeks to process data closer to the source, driving a major shift from the cloud to the ‘edge.’ This article critically investigates the privacy implications of edge computing. It outlines the abilities introduced by the edge by drawing on two recently published scenarios, an automated license plate reader and an ethnic facial detection model. Based on these affordances, three key questions arise: what kind of data will be collected, how will this data be processed at the edge, and how will this data be ‘completed’ in the cloud? As a site of intermediation between user and cloud, the edge allows data to be extracted from individuals, acted on in real-time, and then abstracted or sterilized, removing identifying information before being stored in conventional data centers. The article thus argues that edge affordances establish a fundamental new ‘privacy condition’ while sidestepping the safeguards associated with the ‘privacy proper’ of personal data use. Responding effectively to these challenges will mean rethinking person-based approaches to privacy at both regulatory and citizen-led levels.

[1]  Karl Marx,et al.  capital: tique de l'e?conomie politique , 2004 .

[2]  Antoinette Rouvroy,et al.  The end(s) of critique: data behaviourism versus due process , 2013 .

[3]  Tom H. Luan,et al.  Fog Computing: Focusing on Mobile Users at the Edge , 2015, ArXiv.

[4]  Rowan Wilken,et al.  Platform specificity and the politics of location data extraction , 2015 .

[5]  Lujo Bauer,et al.  Self-driving cars and data collection: Privacy perceptions of networked autonomous vehicles , 2017, SOUPS.

[6]  Khalil El-Khatib,et al.  A survey of privacy enhancing technologies for smart cities , 2019, Pervasive Mob. Comput..

[7]  Yu Chen,et al.  Smart Surveillance as an Edge Network Service: From Harr-Cascade, SVM to a Lightweight CNN , 2018, 2018 IEEE 4th International Conference on Collaboration and Internet Computing (CIC).

[8]  Xiaojiang Du,et al.  Preserving Location Privacy in Mobile Edge Computing , 2018, ICC 2019 - 2019 IEEE International Conference on Communications (ICC).

[9]  Weisong Shi,et al.  The Promise of Edge Computing , 2016, Computer.

[10]  Paramvir Bahl,et al.  Real-Time Video Analytics: The Killer App for Edge Computing , 2017, Computer.

[11]  Raja Lavanya,et al.  Fog Computing and Its Role in the Internet of Things , 2019, Advances in Computer and Electrical Engineering.

[12]  Qun Li,et al.  Security and Privacy Issues of Fog Computing: A Survey , 2015, WASA.

[13]  Latanya Sweeney,et al.  k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[14]  Latanya Sweeney,et al.  Computational disclosure control: a primer on data privacy protection , 2001 .

[15]  L Sweeney,et al.  Weaving Technology and Policy Together to Maintain Confidentiality , 1997, Journal of Law, Medicine & Ethics.

[16]  Noel E. O'Connor,et al.  Performance of video processing at the edge for crowd-monitoring applications , 2018, 2018 IEEE 4th World Forum on Internet of Things (WF-IoT).

[17]  Paul Ohm Broken Promises of Privacy: Responding to the Surprising Failure of Anonymization , 2009 .

[18]  Bernard E. Harcourt,et al.  Exposed: Desire and Disobedience in the Digital Age , 2015 .

[19]  L. F. Luna-Reyes,et al.  Private Data and Public Value: Governance, Green Consumption, and Sustainable Supply Chains , 2016 .

[20]  Helen Nissenbaum,et al.  Big data's end run around procedural privacy protections , 2014, Commun. ACM.

[21]  H. Jarman,et al.  Private Data and Public Value , 2016 .

[22]  Hua Wang,et al.  Editorial: Special Issue on Security and Privacy of IoT , 2017, World Wide Web.

[23]  K. Marx Capital: A Critique of Political Economy , 1867 .

[24]  Rodrigo Roman,et al.  Mobile Edge Computing, Fog et al.: A Survey and Analysis of Security Threats and Challenges , 2016, Future Gener. Comput. Syst..

[25]  John R Connery,et al.  The right to privacy. , 1973, The Linacre quarterly.

[26]  Bing Chen,et al.  Data Security and Privacy-Preserving in Edge Computing Paradigm: Survey and Open Issues , 2018, IEEE Access.

[27]  In Wang,et al.  Facial feature discovery for ethnicity recognition , 2019, WIREs Data Mining Knowl. Discov..

[28]  Rajkumar Buyya,et al.  Metropolitan intelligent surveillance systems for urban areas by harnessing IoT and edge computing paradigms , 2018, Softw. Pract. Exp..

[29]  Jathan Sadowski When data is capital: Datafication, accumulation, and extraction , 2019, Big Data Soc..

[30]  L. Floridi Open Data, Data Protection, and Group Privacy , 2014, Philosophy & Technology.

[31]  Quan Zhang,et al.  Firework: Data Processing and Sharing for Hybrid Cloud-Edge Analytics , 2018, IEEE Transactions on Parallel and Distributed Systems.

[32]  Josep Domingo-Ferrer,et al.  Database Anonymization: Privacy Models, Data Utility, and Microaggregation-based Inter-model Connections , 2016, Database Anonymization.

[33]  Shoshana Zuboff,et al.  Big other: surveillance capitalism and the prospects of an information civilization , 2015, J. Inf. Technol..

[34]  Arwa Alrawais,et al.  Fog Computing for the Internet of Things: Security and Privacy Issues , 2017, IEEE Internet Computing.

[35]  Vitaly Shmatikov,et al.  Robust De-anonymization of Large Sparse Datasets , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).

[36]  Michael Friedewald,et al.  Seven Types of Privacy , 2013, European Data Protection.

[37]  Serge Gutwirth,et al.  European Data Protection: Coming of Age , 2013, European Data Protection.

[38]  Tony Q. S. Quek,et al.  Intelligent Video Surveillance based on Mobile Edge Networks , 2018, 2018 IEEE International Conference on Communication Systems (ICCS).

[39]  P Pafko,et al.  [Right to privacy]. , 2013, Rozhledy v chirurgii : mesicnik Ceskoslovenske chirurgicke spolecnosti.

[40]  Louis D. Brandeis,et al.  The Right to Privacy , 1890 .

[41]  Brett Neilson,et al.  The Politics of Operations , 2019 .

[42]  Brent Mittelstadt,et al.  From Individual to Group Privacy in Big Data Analytics , 2017 .

[43]  M. Pasquinelli Italian Operaismo and the Information Machine , 2015 .

[44]  Leandros Maglaras,et al.  Security and Privacy in Fog Computing: Challenges , 2017, IEEE Access.

[45]  Sophia Melanson,et al.  We are data: algorithms and the making of our digital selves , 2017 .

[46]  Julie E. Cohen Turning Privacy Inside Out , 2019, Theoretical Inquiries in Law.

[47]  Colin Koopman,et al.  How We Became Our Data , 2019 .

[48]  Shoshana Zuboff The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power , 2019 .