Computer Science ›› 2021, Vol. 48 ›› Issue (9): 9-20.doi: 10.11896/jsjkx.201000011

Special Issue: Intelligent Data Governance Technologies and Systems

• Intelligent Data Governance Technologies and Systems • Previous Articles     Next Articles

AI Governance Oriented Legal to Technology Bridging Framework for Cross-modal Privacy Protection

LEI Yu-xiao , DUAN Yu-cong   

  1. School of Computer Science and Technology,Hainan University,Haikou 570228,China
  • Received:2020-10-03 Revised:2021-04-04 Online:2021-09-15 Published:2021-09-10
  • About author:LEI Yu-xiao,born in 1997,postgra-duate.Her main research interests include privacy protection,knowledge graphs and big data.
    DUAN Yu-cong,born in 1977,Ph.D,professor,Ph.D.supervisor,is a senior member of China Computer Federation.His main research interests include service computing,artificial intelligence,knowledge graph and big data.
  • Supported by:
    National Natural Science Foundation of China(61662021,72062015),Natural Science Foundation of Hainan Province,China(620RC561),Program of Education Bureau of Hainan Province,China(Hnky2019-13) and Educational Reform Research Program of Hainan University,China(HDJY2102,HDJWJG03)

Abstract: With the popularity of virtual communities among network users,virtual community groups have become a small society,which can extract user-related privacy resources through the “virtual traces” left by users' browsing and user-generated content user published.Privacy resources can be classified into data resources,information resources and knowledge resources according to their characteristics,which constitute the data,information,knowledge,and wisdom graph (DIKW graph).There are four circulation processes for privacy resources in virtual communities,namely,the sensing,storage,transfern,and processing of privacy resources.The four processes are respectively completed by the three participants,the user,the AI system,and the visitor individually or in cooperation.The right to privacy includes the right to know,the right to participate,the right to forget,and the right to supervise.By clarifying the scope of privacy rights of the three participants in the four circulation processes,and combining the protection of privacy values,an anonymous protection mechanism,risk assessment mechanism and supervision mechanism are designed to build an AI governance legal framework for privacy protection of virtual communities.

Key words: Data\Information\Knowledge and Wisdom graph, Privacy protection, Right to privacy, Value of privacy, Virtual community

CLC Number: 

  • TP309
[1]O'NEILL E,KOSTAKOS V,KINDBERG T,et al.Instrumenting the City:Developing Methods for Observing and Understanding the Digital Cityscape [C]//Lecture Notes in Computer Science.2006,4206:315-322.
[2]GIRARDIN F,CALABRESE F,FIORE F D,et al.Digital Footprinting:uncovering tourists with user-generated content[J].IEEE Pervasive Computing,2008,7(4):36-43.
[3]HU H,GE Y J,HOU D Y.Using Web Crawler Technology for Geo-Events Analysis:A Case Study of theHuangyan Island Incident[J].Sustainability,2014,6(4):1896-1912.
[4]KRUMM J,DAVIES N,NARAYANASWAMI C.User-generated content[J].IEEE Pervasive Computing,2008,7(4):10-11.
[5]LEI Y,DUAN Y.Personality Classification and ConversionMethod of Virtual Community Personnel Based on DIKW Graph[J].Chinese Journal of Applied Sciences,2020,38(5):803-824.
[6]ULRIKE H.Reviewing person's value of privacy of online social networking[J].Internet Research,2011,21(4):384-407.
[7]BOZDA E.Bias in algorithmic filtering and personalization[J].Ethics & Information Technology,2013,15(3):209-227.
[8]MITTELSTADT B D,ALLO P,TADDEO M,et al.The ethics of algorithms:mapping the debate[J].Big Data and Society,2016,3(2):1-21.
[9]DUAN Y C,ZHAN L G,ZHANG XY,et al.Formalizing DIKW Architecture for Modeling Security and Privacy as Typed Resources[C]//Testbeds and Research Infrastructures for the Development of Networks and Communities.2018:157-168.
[10]DUAN Y C,SHAO L X,HU G Z,et al.Specifying architecture of knowledge graph with data graph,information graph,know-ledge graph and wisdom graph[C]//IEEE International Confe-rence on Software Engineering Research.IEEE,2017.
[11]SONG Z Y,DUAN Y C,WAN S X,et al.Processing Optimization of Typed Resources with Synchronized Storage and Computation Adaptation in Fog Computing[J].Wireless Communications and Mobile Computing,2018,2018:1-13.
[12]GURSES S,ALAMO J M D.Privacy Engineering:Shaping an Emerging Field of Research and Practice[J].IEEE Security & Privacy,2016,14(2):40-46.
[13]DUAN Y C,SUN X B,CHE H Y,et al.Modeling Data,Information and Knowledge for Security Protection of Hybrid IoT and Edge Resources[J].IEEE Access,2019,7:99161-99176.
[14]DUAN Y C.Existence Computation:Revelation on Entity vs.Relationship for Relationship Defined Everything of Semantics[C]//2019 20th IEEE/ACIS International Conference on Software Engineering,Artificial Intelligence,Networking and Parallel/Distributed Computing (SNPD).2019:139-144.
[15]OLSON D L.Data mining in business services[J].Service Business,2007,1(3):181-193.
[16]KURGAN L A,MUSILEK P.A survey of Knowledge Discovery and Data Mining process models[J].The Knowledge Enginee-ring Review,2006,21(1):1-24.
[17]VISSER W,HINDRIKS K V,JONKER C M.Argumentation-Based Qualitative Preference Modelling with Incomplete and Uncertain Information[J].Group Decision & Negotiation,2012,21(1):99-127.
[18]MITTELSTAD B.From Individual to Group Privacy in Big Data Analytics[J].Philosophy & Technology,2017,30(4):475-494.
[19]VASSILIADIS P.A Survey of Extract-Transform-Load Technology[J].International Journal of Data Warehousing & Mi-ning,2009,5(3):1-27.
[20]HARIRI R H,FREDERICKS E M,BOWERS K M.Uncertainty in big data analytics:survey,opportunities,and challenges[J].Journal of Big Data,2019,6(1):44.
[21]HARPER J.Privacy and the Four Categories of InformationTechnology[R].American Enterprise Institute Report,2020.
[22]EKSTRAND M D,JOSHAGHANI R,MEHRPOUYAN H.Privacy for All:Ensuring Fair and Equitable Privacy Protections[C]//Proceedings of the 1st Conference on Fairness,Accountability and Transparency.2018:35-47.
[23]HOFFMAN S,PODGURSKI A.Balancing Privacy,Autonomy,and Scientific Needs In Electronic Health Records Research[J].SMU law review:a publication of Southern Methodist University School of Law,2012,65(1):85-144.
[24]SOLOVE D J.The Future of Reputation:Gossip,Rumor,and Privacy on the Internet[M]//Yale University Press,2007.
[25]GORMAN D.Rights in Collision: The Individual Right of Privacy and the Public Right To Know[J].Asahi Law Review Asahi University School of Law,1978,35(2):249-257.
[26]MANTELERO A.The EU Proposal for a General Data Protection Regulation and the roots of the right to be forgotten[J].Computer Law & Security Review,2013,29(3),229-235.
[27]WALLACE K A.Anonymity[J].Ethics and Information Technology,1999,1(1):21-31.
[1] LU Chen-yang, DENG Su, MA Wu-bin, WU Ya-hui, ZHOU Hao-hao. Federated Learning Based on Stratified Sampling Optimization for Heterogeneous Clients [J]. Computer Science, 2022, 49(9): 183-193.
[2] WANG Mei-shan, YAO Lan, GAO Fu-xiang, XU Jun-can. Study on Differential Privacy Protection for Medical Set-Valued Data [J]. Computer Science, 2022, 49(4): 362-368.
[3] JIN Hua, ZHU Jing-yu, WANG Chang-da. Review on Video Privacy Protection [J]. Computer Science, 2022, 49(1): 306-313.
[4] GUO Rui, LU Tian-liang, DU Yan-hui. Source-location Privacy Protection Scheme Based on Target Decision in WSN [J]. Computer Science, 2021, 48(5): 334-340.
[5] WANG Rui-jin, TANG Yu-cheng, PEI Xi-kai, GUO Shang-tong, ZHANG Feng-li. Block-chain Privacy Protection Scheme Based on Lightweight Homomorphic Encryption and Zero-knowledge Proof [J]. Computer Science, 2021, 48(11A): 547-551.
[6] LI Yu, DUAN Hong-yue, YIN Yu-yu, GAO Hong-hao. Survey of Crowdsourcing Applications in Blockchain Systems [J]. Computer Science, 2021, 48(11): 12-27.
[7] YU Qi-long, LU Ning, SHI Wen-bo. Traceable Mixing Scheme for Bitcoin [J]. Computer Science, 2021, 48(11): 72-78.
[8] WEI Li-qi, ZHAO Zhi-hong, BAI Guang-wei, SHEN Hang. Location Privacy Game Mechanism Based on Generative Adversarial Networks [J]. Computer Science, 2021, 48(10): 266-271.
[9] YU Xue-yong, CHEN Tao. Privacy Protection Offloading Algorithm Based on Virtual Mapping in Edge Computing Scene [J]. Computer Science, 2021, 48(1): 65-71.
[10] LI Yan, SHEN De-rong, NIE Tie-zheng, KOU Yue. Multi-keyword Semantic Search Scheme for Encrypted Cloud Data [J]. Computer Science, 2020, 47(9): 318-323.
[11] GUO Rui, LU Tian-liang, DU Yan-hui, ZHOU Yang, PAN Xiao-qin, LIU Xiao-chen. WSN Source-location Privacy Protection Based on Improved Ant Colony Algorithm [J]. Computer Science, 2020, 47(7): 307-313.
[12] WANG Hui, LIU Yu-xiang, CAO Shun-xiang, ZHOU Ming-ming. Medical Data Storage Mechanism Integrating Blockchain Technology [J]. Computer Science, 2020, 47(4): 285-291.
[13] XU Chong-jian,LI Xian-feng. Data Privacy Protection Method of Block Chain Transaction [J]. Computer Science, 2020, 47(3): 281-286.
[14] ZHAO Nan,ZHANG Guo-an. Authenticated Privacy Protection Scheme Based on Certificateless Ring Signcryption in VANET [J]. Computer Science, 2020, 47(3): 312-319.
[15] LV Zhi-quan, LI Hao, ZHANG Zong-fu, ZHANG Min. Topic-based Re-identification for Anonymous Users in Social Network [J]. Computer Science, 2019, 46(6): 143-147.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!