Tamper-Proof Privacy Auditing for Artificial Intelligence Systems
Abstract
Privacy audit logs are used to capture the actions of participants in a data sharing environment in order for auditors to check compliance with privacy policies. However, collusion may occur between the auditors and participants to obfuscate actions that should be recorded in the audit logs. In this paper, we propose a Linked Data based method of utilizing blockchain technology to create tamper-proof audit logs that provide proof of log manipulation and non-repudiation.
Cite
Text
Sutton and Samavi. "Tamper-Proof Privacy Auditing for Artificial Intelligence Systems." International Joint Conference on Artificial Intelligence, 2018. doi:10.24963/IJCAI.2018/756Markdown
[Sutton and Samavi. "Tamper-Proof Privacy Auditing for Artificial Intelligence Systems." International Joint Conference on Artificial Intelligence, 2018.](https://mlanthology.org/ijcai/2018/sutton2018ijcai-tamper/) doi:10.24963/IJCAI.2018/756BibTeX
@inproceedings{sutton2018ijcai-tamper,
title = {{Tamper-Proof Privacy Auditing for Artificial Intelligence Systems}},
author = {Sutton, Andrew and Samavi, Reza},
booktitle = {International Joint Conference on Artificial Intelligence},
year = {2018},
pages = {5374-5378},
doi = {10.24963/IJCAI.2018/756},
url = {https://mlanthology.org/ijcai/2018/sutton2018ijcai-tamper/}
}