SlideShare une entreprise Scribd logo
1  sur  21
Télécharger pour lire hors ligne
A case for “open-ended”
data
Srinath Srinivasa, Web Science Lab, IIIT Bangalore
sri@iiitb.ac.in
Open-data concerns
Utilization of data in a social system is influenced
by three primary concerns: Transparency, Privacy
and Security
Open-data initiatives (like data.gov.in) focus on
data elements that promote transparency, and
exclude data that infringes on privacy (PII) and/or
are sensitive towards (national) security.
Transparency
Privacy Security
Open-data concerns
Data elements that are critical for transparency
concerns are called “open data.”
Data elements that can potentially compromise
collective security and have to be tightly controlled,
are called “closed data.” These are typically managed
in the form of shared secrets.
Private data is critical to the safety and well-being of
individuals. But it may sometimes need to be
disseminated in an “open-ended” fashion (i.e. not in
the control of the owner of the data.)
Transparency
Privacy Security
Open
data
Open-
ended
data
Closed data
(shared
secrets)
Open-ended data
Private data that may need to be disseminated in
an “open-ended” fashion
Open-ended means:
● Owner of data may not have knowledge of
all recipients
● Owner of data may not be able to
unilaterally control dissemination
Examples:
Dissemination of Aadhar details of a person to
different state and non-state stakeholders by
organizations
Sharing of medical records among hospitals
Sharing of exam records among universities
Open-ended data dissemination is critically dependent on the data
dissemination framework and the credibility of its decisions
Regulations for private data dissemination
EU GDPR
● Right to access
● Right to be forgotten
● Privacy by design
● Data protection officers
● Breach notification regulations
● Data portability rights
Indian data protection act (white paper)
● Technology agnosticism
● Holistic application (uniformity of legal
framework)
● Informed consent
● Data minimization (no soliciting extraneous
data)
● Controller accountability
● Structured enforcement
● Deterrent penalties
Characterizing Data Utility
Context of Utility
Utility of data is typically bounded within specific
contexts. Taken out of context, the data
element(s) may lose their utility.
Stakeholder capacity
Utility is not an objective characteristic of data --
but a characteristic of the association between
the data and the stakeholder capacity.
Divergent Aggregation of Utility
A given collection of data elements may be
aggregated in different ways for different utilitarian
contexts. There is no “one” correct aggregation.
Confounding of Utilities
The utilization of data by one stakeholder may
(positively or negatively) impact other stakeholders.
Characterizing Data Utility (Examples)
Context of Utility
Applicability of 5% GST is limited to specific
contexts (restaurants, not even catering).
Stakeholder capacity
Data about JEE cut-off marks for admission may
be useless to a layperson, but very utilitarian to a
student applying for engineering.
Divergent Aggregation of Utility
Open data about weather can be utilized in different
contexts for different purposes (agriculture, aviation,
traffic management, etc.)
Confounding of Utilities
Utilizing data about a person’s medical condition by
an advertiser may result in negative utility for the
person. (The Target pregnancy ad example).
Many Worlds on a Frame (MWF)
A knowledge representation framework for
publication and open-ended dissemination of
private data.
Essential building blocks:
● Worlds
● Actors
● Resources
XIIT
Raju
Raju
Role
Table
NIRF
toRole
from:Raju
to:Role
from:XIIT
Many Worlds on a Frame
Resource
● Refers to all forms of data elements that are
published and consumed in a technology
agnostic fashion
Actor
● Refers to consumers or producers of data.
May be a human user or an application. All
actors have login credentials or access keys
to enter the Frame
World
● Refers to a semantic boundary in which
certain data are relevant, and can be
published and consumed by legitimate
actors in appropriate capacity
Many Worlds on a Frame
Actors and Worlds
Every actor has an associated world with the same name
Actors publish and consume data only from their worlds
Data flow between worlds managed by worlds “participating” or
“playing roles” in other worlds
Raju
Raju
to:XIIT
Many Worlds on a Frame
Participations
A world participating in another world, is said to
be playing a “role” in the other world.
Each Role definition exports an “Interface” that
can be used to publish or consume data via that
role.
When data elements are published or accessed via
a role, then that operation is said to have taken
place in the “capacity” of that role.
World
Role Table
Role | Interface | Players
Privileges Table
Role | Constraints | Privileges
Many Worlds on a Frame
Participations Example
XIIT participates in NIRF in the role of “Affiliate Institution”
Through this role, it can interact with NIRF data using the
following interfaces: getRankData(), uploadApplication()
XIIT also participates in the role of “Mentor Institution” in
NIRF using which, it can access the following interfaces:
getMembers(), uploadReview()
XIIT can hence interact with data in the NIRF world in two
capacities: Affiliate Institution and Member Institution,
with different privileges.
NIRF
Role Table
Role | Interface | Players
Affiliate | getRankdata() | XIIT
Instt uploadApplication()
Mentor | getMembers() | XIIT
Instt uploadReview()
Many Worlds on a Frame
Participations
Every Role is associated with it, a set of “privileges” and
“constraints”
Constraints are represented in the form of required participations.
Example: the role “Affiliate Institution” in NIRF may have the
constraint “Recognized Institution” in the world called UGC. That
is, only worlds that are “Recognized Institutions” in UGC are
eligible to play the role of “Affiliate Institution” in NIRF.
The set of privileges cover various aspects of the system
operations like, create worlds, edit worlds, add data, read data,
delete data, represent worlds, grant privileges, etc.
World
Role Table
Role | Interface | Players
Privileges Table
Role | Constraints | Privileges
Many Worlds on a Frame
Representations
Actors (users or application programs) are associated with their
own worlds, which they represent fully
Based on the roles they play in other worlds, they may represent
those worlds in its participation
Example: Raju plays the role of Director in world XIIT. The
Director role (highlighted in Red) allows Raju to access the NIRF
world in the capacity of “Mentor Instt” by acting as a
representative of XIIT. Raju (the user or application program)
now has access to the interfaces for “Mentor Instt” exported by
NIRF. Bala, who plays the role of Dean at XIIT, can access NIRF in
the capacity of “Affiliate Instt” by representing XIIT.
XIIT
Privileges Table
Role | Constraints | Privileges
Admin | | :all
Chairman| | :represent(:all)
Director | | :represent(Mentor Instt, NIRF)
Dean | | :represent(Affiliate Instt, NIRF)
Raju
Raju
to:XIIT
Director
Bala
Bala
to:XIIT
Dean
Resource Tagging
The simplest interface for a Role are get() and
put() functions.
The get() function for role_id r in world w, gets all
resources from the target world that are tagged
to:r in w, and will be locally tagged as from:w
The put() function for role_id r, uploads all
resources to the target world, which are locally
tagged as to:r
Many Worlds on a Frame
Bots
Bots are virtual actors associated with worlds that
can represent the world in some or all roles.
The function of bots is to represent the world in all
other worlds where it is playing a role, by calling
the interface functions.
Many Worlds on a Frame
Worlds can be located-in or contained-in another world --
different from playing a role
Containment has following semantics. If world w is
contained in world c then:
● All role players of c are entitled to at least the same
roles and privileges in w
● If world c is inaccessible or invisible for actor a, then
w and all worlds contained in c are also inaccessible
or invisible to a.
For any installation of MWF, there is an overarching
container world (usually called UoD or Universe of
Discourse).
IISc
NIAS
MWF Grid
An MWF grid is created over multiple installations
or “sites”
The main site has the UoD which is not contained
in any other world
All other sites (called grid nodes) have their
top-most container world, itself being contained
in one of the existing worlds in an existing site.
Main site
Grid node
UoD
W
Provenance
All member sites of an MWF grid are part of a distributed
ledger system (blockchain) that maintain a copy of
transaction logs
Each transaction entry contains at least the following
information:
● Nature of the transaction
● World(s) involved in the transaction
● Resource(s) involved in the transaction
● Actor(s) involved in the transaction
● Capacity in which the transaction was performed
● Outcome of the transaction
Image Source: Wikipedia
MWF and GDPR
● Right to access
○ Actors publish data in their own worlds and
provide access by means of playing roles.
(Further dissemination of their data
currently only accessible via transaction
logs)
● Right to be forgotten
○ While worlds can discontinue their roles,
MWF (as yet) does not factor right to be
forgotten of older data
● Privacy by design
○ Check
● Data protection officers
○ Implemented by means of roles
● Breach notification regulations
○ Can be implemented on top of provenance
logging
● Data portability rights
○ Applies naturally to MWF since all data
pertinent to a person are managed in their
world and can be ported based on their
participations
MWF and Indian Data Protection Act
● Technology agnosticism
○ Check (MWF is a formal, technology
agnostic model)
● Holistic application
○ Check (common framework for different
kinds of worlds)
● Informed consent
○ Check (User data stored in their world, and
shared based on participation through
informed consent)
● Data minimization (no soliciting extraneous
data)
○ Check (Role interfaces)
● Controller accountability
○ Check (Enforceable by logging capacity and
provenance)
● Structured enforcement
○ Check (World containment provides
scalable semantics for structured
enforcement and jurisdictions)
● Deterrent penalties
○ Can be implemented as a layer over MWF
Conclusions
Three concerns of data sharing: Transparency, Privacy and Security leads to three
modalities of openness: Open, Open-ended and Closed data
MWF as a scalable formalism for open-ended dissemination of data
Current projects implementing MWF:
● RootSet (http://wsl.iiitb.ac.in/kb/)
○ Single node implementation of deprecated version of MWF
● Sandesh (http://wsl.iiitb.ac.in/sandesh-web)
○ Single node MWF as an underlying formalism for semantic integration of open data
● Open City
○ Ongoing PoC project using MWF as a data-exchange platform for smart city
implementations

Contenu connexe

Similaire à Open ended data

Big Data visualization
Big Data visualizationBig Data visualization
Big Data visualizationShilpa Soi
 
principle of oop’s in cpp
principle of oop’s in cppprinciple of oop’s in cpp
principle of oop’s in cppgourav kottawar
 
The linked data value chain atif
The linked data value chain atifThe linked data value chain atif
The linked data value chain atifAtif Latif
 
A Muilt-Keyword Ranked Based Search and Privacy Preservation of Distributed D...
A Muilt-Keyword Ranked Based Search and Privacy Preservation of Distributed D...A Muilt-Keyword Ranked Based Search and Privacy Preservation of Distributed D...
A Muilt-Keyword Ranked Based Search and Privacy Preservation of Distributed D...IRJET Journal
 
A Muilt-Keyword Ranked Based Search and Privacy Preservation of Distributed D...
A Muilt-Keyword Ranked Based Search and Privacy Preservation of Distributed D...A Muilt-Keyword Ranked Based Search and Privacy Preservation of Distributed D...
A Muilt-Keyword Ranked Based Search and Privacy Preservation of Distributed D...IRJET Journal
 
Elements analysis dfd_er_std
Elements analysis dfd_er_stdElements analysis dfd_er_std
Elements analysis dfd_er_stdAmmar Jamali
 
Distributed Data mining using Multi Agent data
Distributed Data mining using Multi Agent dataDistributed Data mining using Multi Agent data
Distributed Data mining using Multi Agent dataIRJET Journal
 
Mi health care - multi-tenant health care system
Mi health care - multi-tenant health care systemMi health care - multi-tenant health care system
Mi health care - multi-tenant health care systemConference Papers
 
Basic constituent elements
Basic constituent elementsBasic constituent elements
Basic constituent elementsPooja Dixit
 
Data Science: A Revolution of Data
Data Science: A Revolution of DataData Science: A Revolution of Data
Data Science: A Revolution of DataIRJET Journal
 
Sabrina Kirrane INSIGHT Viva Presentation
Sabrina Kirrane INSIGHT Viva Presentation Sabrina Kirrane INSIGHT Viva Presentation
Sabrina Kirrane INSIGHT Viva Presentation Sabrina Kirrane
 
Implementation of Agent Based Dynamic Distributed Service
Implementation of Agent Based Dynamic Distributed ServiceImplementation of Agent Based Dynamic Distributed Service
Implementation of Agent Based Dynamic Distributed ServiceCSCJournals
 
Running head MANAGEMENT INFORMATION SYSTEM1MANAGEMENT INFORM.docx
Running head MANAGEMENT INFORMATION SYSTEM1MANAGEMENT INFORM.docxRunning head MANAGEMENT INFORMATION SYSTEM1MANAGEMENT INFORM.docx
Running head MANAGEMENT INFORMATION SYSTEM1MANAGEMENT INFORM.docxcowinhelen
 
data abstraction ,encapsulation,A.D.T
data abstraction ,encapsulation,A.D.Tdata abstraction ,encapsulation,A.D.T
data abstraction ,encapsulation,A.D.Tkapil10197
 

Similaire à Open ended data (20)

UCIAD - quick overview
UCIAD - quick overviewUCIAD - quick overview
UCIAD - quick overview
 
Privacy preserving
Privacy preservingPrivacy preserving
Privacy preserving
 
Introduction to linked data
Introduction to linked dataIntroduction to linked data
Introduction to linked data
 
Big Data visualization
Big Data visualizationBig Data visualization
Big Data visualization
 
principle of oop’s in cpp
principle of oop’s in cppprinciple of oop’s in cpp
principle of oop’s in cpp
 
The linked data value chain atif
The linked data value chain atifThe linked data value chain atif
The linked data value chain atif
 
A Muilt-Keyword Ranked Based Search and Privacy Preservation of Distributed D...
A Muilt-Keyword Ranked Based Search and Privacy Preservation of Distributed D...A Muilt-Keyword Ranked Based Search and Privacy Preservation of Distributed D...
A Muilt-Keyword Ranked Based Search and Privacy Preservation of Distributed D...
 
A Muilt-Keyword Ranked Based Search and Privacy Preservation of Distributed D...
A Muilt-Keyword Ranked Based Search and Privacy Preservation of Distributed D...A Muilt-Keyword Ranked Based Search and Privacy Preservation of Distributed D...
A Muilt-Keyword Ranked Based Search and Privacy Preservation of Distributed D...
 
Elements analysis dfd_er_std
Elements analysis dfd_er_stdElements analysis dfd_er_std
Elements analysis dfd_er_std
 
Distributed Data mining using Multi Agent data
Distributed Data mining using Multi Agent dataDistributed Data mining using Multi Agent data
Distributed Data mining using Multi Agent data
 
Mi health care - multi-tenant health care system
Mi health care - multi-tenant health care systemMi health care - multi-tenant health care system
Mi health care - multi-tenant health care system
 
Basic constituent elements
Basic constituent elementsBasic constituent elements
Basic constituent elements
 
Data Science: A Revolution of Data
Data Science: A Revolution of DataData Science: A Revolution of Data
Data Science: A Revolution of Data
 
Lecture 2
Lecture 2Lecture 2
Lecture 2
 
Sabrina Kirrane INSIGHT Viva Presentation
Sabrina Kirrane INSIGHT Viva Presentation Sabrina Kirrane INSIGHT Viva Presentation
Sabrina Kirrane INSIGHT Viva Presentation
 
Cal Essay
Cal EssayCal Essay
Cal Essay
 
Intro to Agent-based System
Intro to Agent-based SystemIntro to Agent-based System
Intro to Agent-based System
 
Implementation of Agent Based Dynamic Distributed Service
Implementation of Agent Based Dynamic Distributed ServiceImplementation of Agent Based Dynamic Distributed Service
Implementation of Agent Based Dynamic Distributed Service
 
Running head MANAGEMENT INFORMATION SYSTEM1MANAGEMENT INFORM.docx
Running head MANAGEMENT INFORMATION SYSTEM1MANAGEMENT INFORM.docxRunning head MANAGEMENT INFORMATION SYSTEM1MANAGEMENT INFORM.docx
Running head MANAGEMENT INFORMATION SYSTEM1MANAGEMENT INFORM.docx
 
data abstraction ,encapsulation,A.D.T
data abstraction ,encapsulation,A.D.Tdata abstraction ,encapsulation,A.D.T
data abstraction ,encapsulation,A.D.T
 

Plus de Srinath Srinivasa

Modeling sustainability in social networks
Modeling sustainability in social networksModeling sustainability in social networks
Modeling sustainability in social networksSrinath Srinivasa
 
Characterizing online social cognition
Characterizing online social cognitionCharacterizing online social cognition
Characterizing online social cognitionSrinath Srinivasa
 
Big Social Machines: Architecture and Challenges
Big Social Machines: Architecture and ChallengesBig Social Machines: Architecture and Challenges
Big Social Machines: Architecture and ChallengesSrinath Srinivasa
 
Abstraction and Expression on the Web
Abstraction and Expression on the WebAbstraction and Expression on the Web
Abstraction and Expression on the WebSrinath Srinivasa
 
The Power Law of Social Media: What CIOs Should Know
The Power Law of Social Media: What CIOs Should KnowThe Power Law of Social Media: What CIOs Should Know
The Power Law of Social Media: What CIOs Should KnowSrinath Srinivasa
 
Big Data and the Semantic Web: Challenges and Opportunities
Big Data and the Semantic Web: Challenges and OpportunitiesBig Data and the Semantic Web: Challenges and Opportunities
Big Data and the Semantic Web: Challenges and OpportunitiesSrinath Srinivasa
 
Aggregating Operational Knowledge in Community Settings
Aggregating Operational Knowledge in Community SettingsAggregating Operational Knowledge in Community Settings
Aggregating Operational Knowledge in Community SettingsSrinath Srinivasa
 
Information Networks and Semantics
Information Networks and SemanticsInformation Networks and Semantics
Information Networks and SemanticsSrinath Srinivasa
 
Semantics hidden within co-occurrence patterns
Semantics hidden within co-occurrence patternsSemantics hidden within co-occurrence patterns
Semantics hidden within co-occurrence patternsSrinath Srinivasa
 
The open problem of open-world computing
The open problem of open-world computingThe open problem of open-world computing
The open problem of open-world computingSrinath Srinivasa
 
Trends In Graph Data Management And Mining
Trends In Graph Data Management And MiningTrends In Graph Data Management And Mining
Trends In Graph Data Management And MiningSrinath Srinivasa
 
Information Networks And Their Dynamics
Information Networks And Their DynamicsInformation Networks And Their Dynamics
Information Networks And Their DynamicsSrinath Srinivasa
 

Plus de Srinath Srinivasa (15)

AI and the sense of self
AI and the sense of selfAI and the sense of self
AI and the sense of self
 
Modeling sustainability in social networks
Modeling sustainability in social networksModeling sustainability in social networks
Modeling sustainability in social networks
 
Characterizing online social cognition
Characterizing online social cognitionCharacterizing online social cognition
Characterizing online social cognition
 
The Web and the Mind
The Web and the MindThe Web and the Mind
The Web and the Mind
 
Big Social Machines: Architecture and Challenges
Big Social Machines: Architecture and ChallengesBig Social Machines: Architecture and Challenges
Big Social Machines: Architecture and Challenges
 
Abstraction and Expression on the Web
Abstraction and Expression on the WebAbstraction and Expression on the Web
Abstraction and Expression on the Web
 
Towards a "Mindful" Web
Towards a "Mindful" WebTowards a "Mindful" Web
Towards a "Mindful" Web
 
The Power Law of Social Media: What CIOs Should Know
The Power Law of Social Media: What CIOs Should KnowThe Power Law of Social Media: What CIOs Should Know
The Power Law of Social Media: What CIOs Should Know
 
Big Data and the Semantic Web: Challenges and Opportunities
Big Data and the Semantic Web: Challenges and OpportunitiesBig Data and the Semantic Web: Challenges and Opportunities
Big Data and the Semantic Web: Challenges and Opportunities
 
Aggregating Operational Knowledge in Community Settings
Aggregating Operational Knowledge in Community SettingsAggregating Operational Knowledge in Community Settings
Aggregating Operational Knowledge in Community Settings
 
Information Networks and Semantics
Information Networks and SemanticsInformation Networks and Semantics
Information Networks and Semantics
 
Semantics hidden within co-occurrence patterns
Semantics hidden within co-occurrence patternsSemantics hidden within co-occurrence patterns
Semantics hidden within co-occurrence patterns
 
The open problem of open-world computing
The open problem of open-world computingThe open problem of open-world computing
The open problem of open-world computing
 
Trends In Graph Data Management And Mining
Trends In Graph Data Management And MiningTrends In Graph Data Management And Mining
Trends In Graph Data Management And Mining
 
Information Networks And Their Dynamics
Information Networks And Their DynamicsInformation Networks And Their Dynamics
Information Networks And Their Dynamics
 

Dernier

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 

Dernier (20)

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 

Open ended data

  • 1. A case for “open-ended” data Srinath Srinivasa, Web Science Lab, IIIT Bangalore sri@iiitb.ac.in
  • 2. Open-data concerns Utilization of data in a social system is influenced by three primary concerns: Transparency, Privacy and Security Open-data initiatives (like data.gov.in) focus on data elements that promote transparency, and exclude data that infringes on privacy (PII) and/or are sensitive towards (national) security. Transparency Privacy Security
  • 3. Open-data concerns Data elements that are critical for transparency concerns are called “open data.” Data elements that can potentially compromise collective security and have to be tightly controlled, are called “closed data.” These are typically managed in the form of shared secrets. Private data is critical to the safety and well-being of individuals. But it may sometimes need to be disseminated in an “open-ended” fashion (i.e. not in the control of the owner of the data.) Transparency Privacy Security Open data Open- ended data Closed data (shared secrets)
  • 4. Open-ended data Private data that may need to be disseminated in an “open-ended” fashion Open-ended means: ● Owner of data may not have knowledge of all recipients ● Owner of data may not be able to unilaterally control dissemination Examples: Dissemination of Aadhar details of a person to different state and non-state stakeholders by organizations Sharing of medical records among hospitals Sharing of exam records among universities Open-ended data dissemination is critically dependent on the data dissemination framework and the credibility of its decisions
  • 5. Regulations for private data dissemination EU GDPR ● Right to access ● Right to be forgotten ● Privacy by design ● Data protection officers ● Breach notification regulations ● Data portability rights Indian data protection act (white paper) ● Technology agnosticism ● Holistic application (uniformity of legal framework) ● Informed consent ● Data minimization (no soliciting extraneous data) ● Controller accountability ● Structured enforcement ● Deterrent penalties
  • 6. Characterizing Data Utility Context of Utility Utility of data is typically bounded within specific contexts. Taken out of context, the data element(s) may lose their utility. Stakeholder capacity Utility is not an objective characteristic of data -- but a characteristic of the association between the data and the stakeholder capacity. Divergent Aggregation of Utility A given collection of data elements may be aggregated in different ways for different utilitarian contexts. There is no “one” correct aggregation. Confounding of Utilities The utilization of data by one stakeholder may (positively or negatively) impact other stakeholders.
  • 7. Characterizing Data Utility (Examples) Context of Utility Applicability of 5% GST is limited to specific contexts (restaurants, not even catering). Stakeholder capacity Data about JEE cut-off marks for admission may be useless to a layperson, but very utilitarian to a student applying for engineering. Divergent Aggregation of Utility Open data about weather can be utilized in different contexts for different purposes (agriculture, aviation, traffic management, etc.) Confounding of Utilities Utilizing data about a person’s medical condition by an advertiser may result in negative utility for the person. (The Target pregnancy ad example).
  • 8. Many Worlds on a Frame (MWF) A knowledge representation framework for publication and open-ended dissemination of private data. Essential building blocks: ● Worlds ● Actors ● Resources XIIT Raju Raju Role Table NIRF toRole from:Raju to:Role from:XIIT
  • 9. Many Worlds on a Frame Resource ● Refers to all forms of data elements that are published and consumed in a technology agnostic fashion Actor ● Refers to consumers or producers of data. May be a human user or an application. All actors have login credentials or access keys to enter the Frame World ● Refers to a semantic boundary in which certain data are relevant, and can be published and consumed by legitimate actors in appropriate capacity
  • 10. Many Worlds on a Frame Actors and Worlds Every actor has an associated world with the same name Actors publish and consume data only from their worlds Data flow between worlds managed by worlds “participating” or “playing roles” in other worlds Raju Raju to:XIIT
  • 11. Many Worlds on a Frame Participations A world participating in another world, is said to be playing a “role” in the other world. Each Role definition exports an “Interface” that can be used to publish or consume data via that role. When data elements are published or accessed via a role, then that operation is said to have taken place in the “capacity” of that role. World Role Table Role | Interface | Players Privileges Table Role | Constraints | Privileges
  • 12. Many Worlds on a Frame Participations Example XIIT participates in NIRF in the role of “Affiliate Institution” Through this role, it can interact with NIRF data using the following interfaces: getRankData(), uploadApplication() XIIT also participates in the role of “Mentor Institution” in NIRF using which, it can access the following interfaces: getMembers(), uploadReview() XIIT can hence interact with data in the NIRF world in two capacities: Affiliate Institution and Member Institution, with different privileges. NIRF Role Table Role | Interface | Players Affiliate | getRankdata() | XIIT Instt uploadApplication() Mentor | getMembers() | XIIT Instt uploadReview()
  • 13. Many Worlds on a Frame Participations Every Role is associated with it, a set of “privileges” and “constraints” Constraints are represented in the form of required participations. Example: the role “Affiliate Institution” in NIRF may have the constraint “Recognized Institution” in the world called UGC. That is, only worlds that are “Recognized Institutions” in UGC are eligible to play the role of “Affiliate Institution” in NIRF. The set of privileges cover various aspects of the system operations like, create worlds, edit worlds, add data, read data, delete data, represent worlds, grant privileges, etc. World Role Table Role | Interface | Players Privileges Table Role | Constraints | Privileges
  • 14. Many Worlds on a Frame Representations Actors (users or application programs) are associated with their own worlds, which they represent fully Based on the roles they play in other worlds, they may represent those worlds in its participation Example: Raju plays the role of Director in world XIIT. The Director role (highlighted in Red) allows Raju to access the NIRF world in the capacity of “Mentor Instt” by acting as a representative of XIIT. Raju (the user or application program) now has access to the interfaces for “Mentor Instt” exported by NIRF. Bala, who plays the role of Dean at XIIT, can access NIRF in the capacity of “Affiliate Instt” by representing XIIT. XIIT Privileges Table Role | Constraints | Privileges Admin | | :all Chairman| | :represent(:all) Director | | :represent(Mentor Instt, NIRF) Dean | | :represent(Affiliate Instt, NIRF) Raju Raju to:XIIT Director Bala Bala to:XIIT Dean
  • 15. Resource Tagging The simplest interface for a Role are get() and put() functions. The get() function for role_id r in world w, gets all resources from the target world that are tagged to:r in w, and will be locally tagged as from:w The put() function for role_id r, uploads all resources to the target world, which are locally tagged as to:r Many Worlds on a Frame Bots Bots are virtual actors associated with worlds that can represent the world in some or all roles. The function of bots is to represent the world in all other worlds where it is playing a role, by calling the interface functions.
  • 16. Many Worlds on a Frame Worlds can be located-in or contained-in another world -- different from playing a role Containment has following semantics. If world w is contained in world c then: ● All role players of c are entitled to at least the same roles and privileges in w ● If world c is inaccessible or invisible for actor a, then w and all worlds contained in c are also inaccessible or invisible to a. For any installation of MWF, there is an overarching container world (usually called UoD or Universe of Discourse). IISc NIAS
  • 17. MWF Grid An MWF grid is created over multiple installations or “sites” The main site has the UoD which is not contained in any other world All other sites (called grid nodes) have their top-most container world, itself being contained in one of the existing worlds in an existing site. Main site Grid node UoD W
  • 18. Provenance All member sites of an MWF grid are part of a distributed ledger system (blockchain) that maintain a copy of transaction logs Each transaction entry contains at least the following information: ● Nature of the transaction ● World(s) involved in the transaction ● Resource(s) involved in the transaction ● Actor(s) involved in the transaction ● Capacity in which the transaction was performed ● Outcome of the transaction Image Source: Wikipedia
  • 19. MWF and GDPR ● Right to access ○ Actors publish data in their own worlds and provide access by means of playing roles. (Further dissemination of their data currently only accessible via transaction logs) ● Right to be forgotten ○ While worlds can discontinue their roles, MWF (as yet) does not factor right to be forgotten of older data ● Privacy by design ○ Check ● Data protection officers ○ Implemented by means of roles ● Breach notification regulations ○ Can be implemented on top of provenance logging ● Data portability rights ○ Applies naturally to MWF since all data pertinent to a person are managed in their world and can be ported based on their participations
  • 20. MWF and Indian Data Protection Act ● Technology agnosticism ○ Check (MWF is a formal, technology agnostic model) ● Holistic application ○ Check (common framework for different kinds of worlds) ● Informed consent ○ Check (User data stored in their world, and shared based on participation through informed consent) ● Data minimization (no soliciting extraneous data) ○ Check (Role interfaces) ● Controller accountability ○ Check (Enforceable by logging capacity and provenance) ● Structured enforcement ○ Check (World containment provides scalable semantics for structured enforcement and jurisdictions) ● Deterrent penalties ○ Can be implemented as a layer over MWF
  • 21. Conclusions Three concerns of data sharing: Transparency, Privacy and Security leads to three modalities of openness: Open, Open-ended and Closed data MWF as a scalable formalism for open-ended dissemination of data Current projects implementing MWF: ● RootSet (http://wsl.iiitb.ac.in/kb/) ○ Single node implementation of deprecated version of MWF ● Sandesh (http://wsl.iiitb.ac.in/sandesh-web) ○ Single node MWF as an underlying formalism for semantic integration of open data ● Open City ○ Ongoing PoC project using MWF as a data-exchange platform for smart city implementations