This deliverable discusses requirements for the design and use of big data solutions. The solutions we focus on can be considered “privacy preserving” because they include privacy-preserving technologies or are used in an environment in which non-technical measures were taken to preserve privacy.
However, an appropriate solution design can only lay the foundation. To achieve privacy-preserving data sharing and usage, it is not less important that the solutions are used in an appropriate manner and environment. The presented requirements are based on the results of the gap analyses provided in D4.1 and discussed in the light of related previous work.
Moreover, the report describes design challenges faced in the context of privacy-preserving technologies paying particular attention to the requirements faced in the context of big data. The focus is on the classes of technologies introduced in D3.1 and assessed in D3.2.
Attachment | Size |
---|---|
e-sides-d4.2-v1.1-1549617745.pdf | 926.33 KB |
Cyberwatching.eu has received funding from the European Union’s Horizon 2020 research and innovation programme under grant agreement No 740129. The content of this website does not represent the opinion of the European Commission, and the European Commission is not responsible for any use that might be made of such content. Privacy Policy | Disclaimer / Terms and Conditions of Use