Tamper-Proof Privacy Auditing for Artificial Intelligence Systems

Abstract

Privacy audit logs are used to capture the actions of participants in a data sharing environment in order for auditors to check compliance with privacy policies. However, collusion may occur between the auditors and participants to obfuscate actions that should be recorded in the audit logs. In this paper, we propose a Linked Data based method of utilizing blockchain technology to create tamper-proof audit logs that provide proof of log manipulation and non-repudiation.

Cite

Text

Sutton and Samavi. "Tamper-Proof Privacy Auditing for Artificial Intelligence Systems." International Joint Conference on Artificial Intelligence, 2018. doi:10.24963/IJCAI.2018/756

Markdown

[Sutton and Samavi. "Tamper-Proof Privacy Auditing for Artificial Intelligence Systems." International Joint Conference on Artificial Intelligence, 2018.](https://mlanthology.org/ijcai/2018/sutton2018ijcai-tamper/) doi:10.24963/IJCAI.2018/756

BibTeX

@inproceedings{sutton2018ijcai-tamper,
  title     = {{Tamper-Proof Privacy Auditing for Artificial Intelligence Systems}},
  author    = {Sutton, Andrew and Samavi, Reza},
  booktitle = {International Joint Conference on Artificial Intelligence},
  year      = {2018},
  pages     = {5374-5378},
  doi       = {10.24963/IJCAI.2018/756},
  url       = {https://mlanthology.org/ijcai/2018/sutton2018ijcai-tamper/}
}