Please use this identifier to cite or link to this item:

Utilizing Remote Evaluation for Providing Data Sovereignty in Data-sharing Ecosystems

File Size Format  
0685.pdf 659.95 kB Adobe PDF View/Open

Item Summary

Title:Utilizing Remote Evaluation for Providing Data Sovereignty in Data-sharing Ecosystems
Authors:Bruckner, Fabian
Howar, Falk
Keywords:Cybersecurity and Software Assurance
data sharing
data sovereignty
mobile code
show 1 moreusage control
show less
Date Issued:05 Jan 2021
Abstract:The maintenance of digital sovereignty is an important aspect of data-driven business models and data-sharing ecosystems. Considering this, sensitive data is often stored in proprietary systems under the data owner’s control and with appropriate security mechanisms. However, nowadays, it is often necessary to share data. As executing unknown and untrusted code on systems containing sensitive data is potentially dangerous, data-processing algorithms cannot be directly sent to the data-storing systems, as one solution. Instead, we have implemented an approach called remote processing that uses the domain-specific language \degree{}, which provides built-in usage control mechanisms for data processing tasks. The approach extends the well-known remote processing paradigm that allows controlled, distributed data usage without actual data sharing (transmission via network). Instead of classified data, applications and their execution results are transmitted. This way, sensitive data is never directly exposed to third parties. Furthermore, the application-integrated usage control mechanisms prevent malicious data usage.
Pages/Duration:10 pages
Rights:Attribution-NonCommercial-NoDerivatives 4.0 International
Appears in Collections: Cybersecurity and Software Assurance

Please email if you need this content in ADA-compliant format.

This item is licensed under a Creative Commons License Creative Commons