{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T17:04:47Z","timestamp":1771520687978,"version":"3.50.1"},"publisher-location":"Cham","reference-count":29,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030986353","type":"print"},{"value":"9783030986360","type":"electronic"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2022,9,9]],"date-time":"2022-09-09T00:00:00Z","timestamp":1662681600000},"content-version":"vor","delay-in-days":251,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>One of the foundations of data sharing in the European Union (EU) is trust, especially in view of the advancing digitalization and recent developments with respect to European Data Spaces. In this chapter, we argue that privacy-preserving techniques, such as multi-party computation and fully homomorphic encryption, can play a positive role in enhancing trust in data sharing transactions. We therefore focus on an interdisciplinary perspective on how privacy-preserving techniques can facilitate trustworthy data sharing. We start with introducing the legal landscape of data sharing in the EU. Then, we discuss the different functions of third-party intermediaries, namely, data marketplaces. Before giving a legal perspective on privacy-preserving techniques for enhancing trust in data sharing, we briefly touch upon the Data Governance Act (DGA) proposal with relation to trust and its intersection with the General Data Protection Regulation (GDPR). We continue with an overview on the technical aspects of privacy-preserving methods in the later part, where we focus on methods based on cryptography (such as homomorphic encryption, multi-party computation, private set intersection) and link them to smart contracts. We discuss the main principles behind these methods and highlight the open challenges with respect to privacy, performance bottlenecks, and a more widespread application of privacy-preserving analytics. Finally, we suggest directions for future research by highlighting that the mutual understanding of legal frameworks and technical capabilities will form an essential building block of sustainable and secure data sharing in the future<\/jats:p>","DOI":"10.1007\/978-3-030-98636-0_15","type":"book-chapter","created":{"date-parts":[[2022,9,8]],"date-time":"2022-09-08T08:53:55Z","timestamp":1662627235000},"page":"319-335","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["Privacy-Preserving Techniques for Trustworthy Data Sharing: Opportunities and Challenges for Future Research"],"prefix":"10.1007","author":[{"given":"Lidia","family":"Dutkiewicz","sequence":"first","affiliation":[]},{"given":"Yuliya","family":"Miadzvetskaya","sequence":"additional","affiliation":[]},{"given":"Hosea","family":"Ofe","sequence":"additional","affiliation":[]},{"given":"Alan","family":"Barnett","sequence":"additional","affiliation":[]},{"given":"Lukas","family":"Helminger","sequence":"additional","affiliation":[]},{"given":"Stefanie","family":"Lindstaedt","sequence":"additional","affiliation":[]},{"given":"Andreas","family":"Tr\u00fcgler","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,9,9]]},"reference":[{"key":"15_CR1","unstructured":"Zillner, S., Curry, E., Metzger, A., Auer, S., & Seidl, R. (Eds.). (2017). European big data value strategic research & innovation agenda. Big Data Value Association."},{"key":"15_CR2","unstructured":"Zillner, S., Bisset, D., Milano, M., Curry, E., Garc\u00eda Robles, A., Hahn, T., Irgens, M., Lafrenz, R., Liepert, B., O\u2019Sullivan, B. and Smeulders, A. (Eds.) (2020, September). Strategic research, innovation and deployment agenda\u2014AI, data and robotics partnership. Third release. BDVA, euRobotics, ELLIS, EurAI and CLAIRE."},{"key":"15_CR3","volume-title":"The European data market monitoring tool","author":"M Glennon","year":"2020","unstructured":"Glennon, M., et al. (2020). The European data market monitoring tool. EU Publications."},{"key":"15_CR4","unstructured":"European Commission. (2020). A European strategy for data COM\/2020\/66 final. s.l.:s.n."},{"key":"15_CR5","unstructured":"European Commission. (2019). Communication from the Commission to the European Parliament and the Council. Guidance on the Regulation on a framework for the free flow of non-personal data in the European Union COM\/2019\/250 final. s.l.:s.n."},{"key":"15_CR6","unstructured":"European Commission. (2018). Guidance on sharing private sector data in the European data economy, Accompanying the document \u201cTowards a common European data space\u201d. s.l.:s.n."},{"issue":"7","key":"15_CR7","doi-asserted-by":"publisher","first-page":"208","DOI":"10.1007\/s10272-019-0826-z","volume":"54","author":"M Spiekermann","year":"2019","unstructured":"Spiekermann, M. (2019). Data marketplaces: Trends and monetisation of data goods. Intereconomics, 54(7), 208\u2013216.","journal-title":"Intereconomics"},{"key":"15_CR8","unstructured":"Koutroumpis, P., Leiponen, A. & Thomas, L. D. (2017). The (unfulfilled) potential of data marketplaces (No. 53). ETLA Working Papers."},{"issue":"12","key":"15_CR9","first-page":"4","volume":"50","author":"H Richter","year":"2018","unstructured":"Richter, H., & Slowinski, P. R. (2018). The data sharing economy: On the emergence of new intermediaries. IIC - International Review of Intellectual Property and Competition Law, 50(12), 4\u201329.","journal-title":"IIC - International Review of Intellectual Property and Competition Law"},{"issue":"1","key":"15_CR10","doi-asserted-by":"publisher","first-page":"205395171875668","DOI":"10.1177\/2053951718756683","volume":"5","author":"J-C Plantin","year":"2018","unstructured":"Plantin, J.-C., Lagoze, C., & Edwards, P. N. (2018). Re-integrating scholarly infrastructure: The ambiguous role of data sharing platforms. Big Data & Society, 5(1), 205395171875668.","journal-title":"Big Data & Society"},{"key":"15_CR11","first-page":"213","volume-title":"Trust: Making and breaking cooperative relations","author":"D Gambetta","year":"1988","unstructured":"Gambetta, D. (1988). Can we trust trust? In D. Gambetta (Ed.), Trust: Making and breaking cooperative relations (pp. 213\u2013237). Blackwell."},{"issue":"4","key":"15_CR12","doi-asserted-by":"publisher","first-page":"23","DOI":"10.4018\/jthi.2009040102","volume":"5","author":"M Taddeo","year":"2009","unstructured":"Taddeo, M. (2009). Defining trust and E-trust. International Journal of Technology and Human Interaction, 5(4), 23\u201335.","journal-title":"International Journal of Technology and Human Interaction"},{"key":"15_CR13","unstructured":"Arnaut, C. et al. (2018). Study on data sharing between companies in Europe. s.l.:s.n."},{"key":"15_CR14","unstructured":"Spindler, G. & Schmechel, P. (2016). Personal data and encryption in the european general data protection regulation. s.l.:s.n."},{"key":"15_CR15","unstructured":"Hon, W. K., Millard, C., & Walden, I. (2011). The problem of \\textquotesinglePersonal Data\\textquotesingle in cloud computing - what information is regulated? The cloud of unknowing, Part 1. SSRN Electronic Journal."},{"key":"15_CR16","doi-asserted-by":"publisher","first-page":"258","DOI":"10.1007\/978-3-030-04849-5_23","volume-title":"Business Information Systems Workshops","author":"D Roman","year":"2019","unstructured":"Roman, D., & Vu, K. (2019). Enabling data markets using smart contracts and multi-party computation. In  Business Information Systems Workshops (pp. 258\u2013263). Springer International Publishing."},{"issue":"6","key":"15_CR17","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1038\/s42256-020-0186-1","volume":"2","author":"GA Kaissis","year":"2020","unstructured":"Kaissis, G. A., Makowski, M. R., R\u00fcckert, D., & Braren, R. F. (2020). Secure, privacy-preserving and federated machine learning in medical imaging. Nature Machine Intelligence, 2(6), 305\u2013311.","journal-title":"Nature Machine Intelligence"},{"key":"15_CR18","doi-asserted-by":"publisher","first-page":"104130","DOI":"10.1016\/j.compbiomed.2020.104130","volume":"129","author":"C Thapa","year":"2021","unstructured":"Thapa, C., & Camtepe, S. (2021). Precision health data: Requirements, challenges and existing techniques for data security and privacy. Computers in Biology and Medicine, 129, 104130.","journal-title":"Computers in Biology and Medicine"},{"key":"15_CR19","first-page":"36","volume-title":"Privacy preserving data mining","author":"Y Lindell","year":"2000","unstructured":"Lindell, Y., & Pinkas, B. (2000). Privacy preserving data mining (pp. 36\u201354). Springer."},{"key":"15_CR20","unstructured":"Masters, O. et al. (2019). Towards a homomorphic machine learning big data pipeline for the financial services sector. s.l.:s.n."},{"key":"15_CR21","first-page":"169","volume-title":"Fully homomorphic encryption using ideal lattices","author":"C Gentry","year":"2009","unstructured":"Gentry, C. (2009). Fully homomorphic encryption using ideal lattices (pp. 169\u2013178). Association for Computing Machinery."},{"key":"15_CR22","doi-asserted-by":"crossref","unstructured":"Yao, A. C. (1986). How to generate and exchange secrets (pp. 162\u2013167). s.l.: s.n.","DOI":"10.1109\/SFCS.1986.25"},{"key":"15_CR23","doi-asserted-by":"crossref","unstructured":"Regev, O. (2009). On lattices, learning with errors, random linear codes, and cryptography. Journal of the ACM, 56(9).","DOI":"10.1145\/1568318.1568324"},{"key":"15_CR24","unstructured":"MedCO. (2020). https:\/\/medco.epfl.ch\n. s.l.:s.n."},{"key":"15_CR25","unstructured":"Bampoulidis, A. et al. (2020). Privately connecting mobility to infectious diseases via applied cryptography. s.l.:s.n."},{"key":"15_CR26","unstructured":"Covid-Heatmap. (2021). https:\/\/covid-heatmap.iaik.tugraz.at\/en\/. s.l.:s.n."},{"key":"15_CR27","unstructured":"Neubauer, M. & Goebel, A. (2018). Blockchain for off-chain smart contracts. s.l.:s.n."},{"key":"15_CR28","unstructured":"Sharma, T. K. (2020). Types of blockchains explained. s.l.:s.n."},{"key":"15_CR29","unstructured":"Anderson, R. (2003). \u201cTrusted computing\u201d Frequently asked questions. s.l.:s.n."}],"container-title":["Data Spaces"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-98636-0_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,8]],"date-time":"2022-09-08T09:19:51Z","timestamp":1662628791000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-98636-0_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783030986353","9783030986360"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-98636-0_15","relation":{},"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"9 September 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}