论文标题
在被遗忘的权利的上下文中形式化数据删除
Formalizing Data Deletion in the Context of the Right to be Forgotten
论文作者
论文摘要
个人有权要求将其存储的实体删除其个人数据(称为被遗忘的权利)的权利已得到明确认可,立法和行使,包括欧盟,阿根廷和加利福尼亚州。但是,围绕此权利的许多讨论仅提供了一个直观的概念,即实现其含义 - 删除此类个人数据的含义。 在这项工作中,我们为使用密码学中的工具和范式遗忘的权利提供了正式的定义框架。特别是,我们提供了一个确切的定义,即从一个实体中可能(或应该是)预期的,该实体在提出请求以删除某些数据时收集个人数据的实体。我们的框架捕获了与数据处理有关的典型系统的几个(尽管不是全部)。尽管不能将其视为表达当前法律的陈述(尤其是因为这些法律在这方面相当模糊),但我们的工作在技术上提供了精确的定义,这些定义代表了法律可以合理期望的可能性,以及对于未来法律的未来版本可能会明确要求的替代方案。 最后,为了展示我们的框架和定义的适用性,我们考虑了各种自然而简单的场景,这些场景被遗忘了。对于每种情况,我们都强调了即使是在实施提供删除保证的系统的真正尝试中也会出现的陷阱,还描述了可证明满足我们定义的技术解决方案。这些解决方案汇集了由各个社区建立的技术。
The right of an individual to request the deletion of their personal data by an entity that might be storing it -- referred to as the right to be forgotten -- has been explicitly recognized, legislated, and exercised in several jurisdictions across the world, including the European Union, Argentina, and California. However, much of the discussion surrounding this right offers only an intuitive notion of what it means for it to be fulfilled -- of what it means for such personal data to be deleted. In this work, we provide a formal definitional framework for the right to be forgotten using tools and paradigms from cryptography. In particular, we provide a precise definition of what could be (or should be) expected from an entity that collects individuals' data when a request is made of it to delete some of this data. Our framework captures several, though not all, relevant aspects of typical systems involved in data processing. While it cannot be viewed as expressing the statements of current laws (especially since these are rather vague in this respect), our work offers technically precise definitions that represent possibilities for what the law could reasonably expect, and alternatives for what future versions of the law could explicitly require. Finally, with the goal of demonstrating the applicability of our framework and definitions, we consider various natural and simple scenarios where the right to be forgotten comes up. For each of these scenarios, we highlight the pitfalls that arise even in genuine attempts at implementing systems offering deletion guarantees, and also describe technological solutions that provably satisfy our definitions. These solutions bring together techniques built by various communities.