Tamper-Proof Privacy Auditing for Artificial Intelligence Systems
Tamper-Proof Privacy Auditing for Artificial Intelligence Systems
Andrew Sutton, Reza Samavi
Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence
Best Sister Conferences. Pages 5374-5378.
https://doi.org/10.24963/ijcai.2018/756
Privacy audit logs are used to capture the actions of participants in a data sharing environment in order for auditors to check compliance with privacy policies. However, collusion may occur between the auditors and participants to obfuscate actions that should be recorded in the audit logs. In this paper, we propose a Linked Data based method of utilizing blockchain technology to create tamper-proof audit logs that provide proof of log manipulation and non-repudiation.
Keywords:
Knowledge Representation and Reasoning: Description Logics and Ontologies
Agent-based and Multi-agent Systems: Trust and Reputation
Multidisciplinary Topics and Applications: Security and Privacy