Clouded data: Privacy and the promise of encryption

Personal data is highly vulnerable to security exploits, spurring moves to lock it down through encryption, to cryptographically ‘cloud’ it. But personal data is also highly valuable to corporations and states, triggering moves to unlock its insights by relocating it in the cloud. We characterise this twinned condition as ‘clouded data’. Clouded data constructs a political and technological notion of privacy that operates through the intersection of corporate power, computational resources and the ability to obfuscate, gain insights from and valorise a dependency between public and private. First, we survey prominent clouded data approaches (blockchain, multiparty computation, differential privacy, and homomorphic encryption), suggesting their particular affordances produce distinctive versions of privacy. Next, we perform two notional code-based experiments using synthetic datasets. In the field of health, we submit a patient’s blood pressure to a notional cloud-based diagnostics service; in education, we construct a student survey that enables aggregate reporting without individual identification. We argue that these technical affordances legitimate new political claims to capture and commodify personal data. The final section broadens the discussion to consider the political force of clouded data and its reconstitution of traditional notions such as the public and the private.

[1]  Julie E. Cohen Turning Privacy Inside Out , 2019, Theoretical Inquiries in Law.

[2]  Brent Mittelstadt,et al.  From Individual to Group Privacy in Big Data Analytics , 2017 .

[3]  Louise Amoore Cloud geographies , 2018, Cognitive Code.

[4]  Y. de Montjoye,et al.  Unique in the shopping mall: On the reidentifiability of credit card metadata , 2015, Science.

[5]  R. Pool,et al.  From ‘trial community’ to ‘experimental publics’: how clinical research shapes public participation , 2017 .

[6]  Adrian Mackenzie,et al.  Personalization and probabilities: Impersonal propensities in online grocery shopping , 2018 .

[7]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[8]  Sherif Sakr,et al.  Using machine learning on cardiorespiratory fitness data for predicting hypertension: The Henry Ford ExercIse Testing (FIT) Project , 2018, PloS one.

[9]  Rajkumar Buyya,et al.  Article in Press Future Generation Computer Systems ( ) – Future Generation Computer Systems Cloud Computing and Emerging It Platforms: Vision, Hype, and Reality for Delivering Computing as the 5th Utility , 2022 .

[10]  Oscar H. Gandy,et al.  The Political Economy of Personal Information , 2011 .

[11]  Cynthia Dwork,et al.  Differential Privacy , 2006, ICALP.

[12]  Gizem S. Cetin,et al.  Private queries on encrypted genomic data , 2017, BMC Medical Genomics.

[13]  M. Avram,et al.  Advantages and Challenges of Adopting Cloud Computing from an Enterprise Perspective , 2014 .

[14]  Luciano Floridi,et al.  Introduction: A New Perspective on Privacy , 2017 .

[15]  L. Floridi Open Data, Data Protection, and Group Privacy , 2014, Philosophy & Technology.

[16]  M. Foucault,et al.  The birth of the clinic : an archaeology of medical perception , 1974 .