Trusted Data: A New Framework for Identity and Data Sharing (Revised And Expanded Edition)
Thomas Hardjono is Technology Director of the MIT Connection Science and the MIT Trust::Data Consortium.
David Shrier is a Professor of Practice (AI and Innovation) with Imperial College Business School, co-director of the Trusted AI Alliance (a collective of more than 3,000 AI researchers across Imperial College London, MIT, University of Oxford, Harvard and University of Edinburgh focused on building a better world through responsible and trusthworthy AI), and a Visiting Scholar with MIT's School of Engineering. He previously held a dual appointment at MIT and University of Oxford where his initiatives directly drove over $1 billion of financial support for MIT, Harvard and Oxford. David also is active in the private sector having led more than $10 billion of corporate growth programs and an IPO on the NYSE, and having made three dozen angel investments through his venture studio Visionary Future. With MIT Press, David has co-edited
Alex “Sandy” Pentland directs the MIT-wide initiative MIT Connection Science. Called one of the “seven most powerful data scientists in the world” by
How to create an Internet of Trusted Data in which insights from data can be extracted without collecting, holding, or revealing the underlying data.
Trusted Data describes a data architecture that places humans and their societal values at the center of the discussion. By involving people from all parts of the ecosystem of information, this new approach allows us to realize the benefits of data-driven algorithmic decision making while minimizing the risks and unintended consequences. It proposes a software architecture and legal framework for an Internet of Trusted Data that provides safe, secure access for everyone and protects against bias, unfairness, and other unintended effects. This approach addresses issues of data privacy, security, ownership, and trust by allowing insights to be extracted from data held by different people, companies, or governments without collecting, holding, or revealing the underlying data. The software architecture, called Open Algorithms, or OPAL, sends algorithms to databases rather than copying or sharing data. The data is protected by existing firewalls; only encrypted results are shared. Data never leaves its repository. A higher security architecture, ENIGMA, built on OPAL, is fully encrypted.
Contributors Michiel Bakker, Yves-Alexandre de Montjoye, Daniel Greenwood, Thomas Hardjoni, Jake Kendall, Cameron Kerry, Bruno Lepri, Alexander Lipton, Takeo Nishikata, Alejandro Noriega-Campero, Nuria Oliver, Alex Pentland, David L. Shrier, Jacopo Staiano, Guy Zyskind
An MIT Connection Science and Engineering Book
Download citation file:
Table of Contents
-
I: Architecture
-
II: Policy
-
III: Current
- Open Access
- Free
- Available
- No Access