Method and apparatus for providing end-to-end privacy for distributed computations
First Claim
1. A method comprising facilitating a processing of and/or processing (1) data and/or (2) information and/or (3) at least one signal, the (1) data and/or (2) information and/or (3) at least one signal based, at least in part, on the following:
- one or more privacy policies associated with at least one level of a computational environment;
one or more computation closures associated with the at least one level of the computational environment; and
a processing, by a processor, of the one or more privacy policies and the one or more computation closures to determine whether to cause, at least in part, an enforcement of the one or more privacy policies by issuing a request for one or more higher privacy capabilities or replacing the one or more computation closures with one or more lower privacy requiring computation closures when the one or more computation closures are transferred to the at least one level of the computational environment that does not have sufficient one or more privacy capabilities from at least one other level of the computational environment,wherein a combination of at least one of the one or more computation closures with one or more other computation closures is based, at least in part, on one or more parameters and the enforcement of the one or more privacy policies is based, at least in part, on the combination.
2 Assignments
0 Petitions
Accused Products
Abstract
An approach is provided for providing end-to-end privacy in multi-level distributed computations. A distributed computation privacy platform determines one or more privacy policies associated with at least one level of a computational environment. The distributed computation privacy platform also determines one or more computation closures associated with the at least one level of the computational environment. The distributed computation privacy platform further processes and/or facilitates a processing of the one or more privacy policies and the one or more computation closures to cause, at least in part, an enforcement of the one or more privacy policies.
-
Citations
18 Claims
-
1. A method comprising facilitating a processing of and/or processing (1) data and/or (2) information and/or (3) at least one signal, the (1) data and/or (2) information and/or (3) at least one signal based, at least in part, on the following:
-
one or more privacy policies associated with at least one level of a computational environment; one or more computation closures associated with the at least one level of the computational environment; and a processing, by a processor, of the one or more privacy policies and the one or more computation closures to determine whether to cause, at least in part, an enforcement of the one or more privacy policies by issuing a request for one or more higher privacy capabilities or replacing the one or more computation closures with one or more lower privacy requiring computation closures when the one or more computation closures are transferred to the at least one level of the computational environment that does not have sufficient one or more privacy capabilities from at least one other level of the computational environment, wherein a combination of at least one of the one or more computation closures with one or more other computation closures is based, at least in part, on one or more parameters and the enforcement of the one or more privacy policies is based, at least in part, on the combination. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. An apparatus comprising:
-
at least one processor; and at least one memory including computer program code for one or more programs, the at least one memory and the computer program code configured to, with the at least one processor, cause the apparatus to perform at least the following, determine one or more privacy policies associated with at least one level of a computational environment; determine one or more computation closures associated with the at least one level of the computational environment; and process and/or facilitate a processing of the one or more privacy policies and the one or more computation closures to determine whether to cause, at least in part, an enforcement of the one or more privacy policies by issuing a request for one or more higher privacy capabilities or replacing the one or more computation closures with one or more lower privacy requiring computation closures when the one or more computation closures are transferred to the at least one level of the computational environment that does not have sufficient one or more privacy capabilities from at least one other level of the computational environment, wherein a combination of at least one of the one or more computation closures with one or more other computation closures is based, at least in part, on one or more parameters and the enforcement of the one or more privacy policies is based, at least in part, on the combination. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
Specification