Privacy and DRM Requirements for Collaborative Development of AI Applications

The use of data is essential for the capabilities of Data-driven Artificial intelligence (AI), Deep Learning and Big Data analysis techniques. This data usage, however, raises intrinsically the concerns on data privacy. In addition, supporting collaborative development of AI applications across organisations has become a major need in AI system design. Digital Rights Management (DRM) is required to protect intellectual property in such collaboration. As a consequence of DRM, privacy threats and privacy-enforcing mechanisms will interact with each other. This paper describes the privacy and DRM requirements in collaborative AI system design using AI pipelines. It describes the relationships between DRM and privacy and outlines the threats against these non-functional features. Finally, the paper provides first security architecture to protect against the threats on DRM and privacy in collaborative AI design using AI pipelines.

[1]  David L. Mills,et al.  Network Time Protocol Version 4: Autokey Specification , 2010, RFC.

[2]  Charu C. Aggarwal,et al.  Data Mining: The Textbook , 2015 .

[3]  Randy H. Katz,et al.  A Berkeley View of Systems Challenges for AI , 2017, ArXiv.

[4]  David M. Eyers,et al.  SCONE: Secure Linux Containers with Intel SGX , 2016, OSDI.

[5]  J. Rubenfeld The Right of Privacy , 1989 .

[6]  Ronald Petrlic Privacy-Preserving Digital Rights Management in a Trusted Cloud Environment , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.

[7]  Paul C. van Oorschot,et al.  Internet geolocation: Evasion and counterevasion , 2009, CSUR.

[8]  Srdjan Capkun,et al.  Software Grand Exposure: SGX Cache Attacks Are Practical , 2017, WOOT.

[9]  Christopher Krügel,et al.  Steal This Movie: Automatically Bypassing DRM Protection in Streaming Media Services , 2013, USENIX Security Symposium.

[10]  Lei Wang,et al.  BONSEYES: Platform for Open Development of Systems of Artificial Intelligence: Invited paper , 2017, Conf. Computing Frontiers.

[11]  Louis D. Brandeis,et al.  The Right to Privacy , 1890 .

[12]  Herbert Burkert,et al.  Some Preliminary Comments on the DIRECTIVE 95/46/EC OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data. , 1996 .

[13]  Kurt Tutschku,et al.  Flexible Privacy and High Trust in the Next Generation Internet : The Use Case of a Cloud-based Marketplace for AI , 2017 .

[14]  Michael A. Menlowe,et al.  Philosophical Dimensions of Privacy: An Anthology , 2009 .

[15]  Adrian Perrig,et al.  Bootstrapping Trust in Commodity Computers , 2010, 2010 IEEE Symposium on Security and Privacy.

[16]  Larry Korba,et al.  Applying digital rights management systems to privacy rights management , 2002, Comput. Secur..