Data Privacy in Big Data Applications. Sreagni Banerjee CS-846

Size: px
Start display at page:

Download "Data Privacy in Big Data Applications. Sreagni Banerjee CS-846"

Transcription

1 Data Privacy in Big Data Applications Sreagni Banerjee CS-846

2 Outline! Motivation! Goal and Approach! Introduction to Big Data Privacy! Privacy preserving methods in Big Data Application! Progress! Next Steps! References

3 Motivation! Data are diverse. User privacy is a huge concern.! Need for a review of the privacy preservation mechanisms in Big Data clarifies the challenges of existing privacy mechanisms.! There is a lack of a comparative study between various techniques of Big Data privacy.! There is a need of analysis of privacy and security aspects healthcare in Big Data.

4 Research Question! RQ1. What are the privacy preserving techniques available in the market and are they good enough?! RQ2. How computing infrastructures should be configured and intelligently managed to fulfill the most notably privacy aspects required by Big Data applications?! RQ3:How Big Data privacy preserving mechanisms have been used in healthcare?

5 Goal! Identifying Big Data privacy requirements.! Investigating how Big Data privacy-preserving techniques have been used in healthcare! Investigating privacy challenges in each phase of Big Data life cycle.! Find out the advantages and disadvantages of existing privacy-preserving technologies in the context of Big Data applications.

6 Big Data Privacy in Data Life Cycle

7 Big Data Privacy in Data Life Cycle Big Data privacy in data generation phase! Access Restriction (anti-tracking extensions).! Falsifying data(i.e. Socket Puppet, Mask me). Big Data privacy in data storage phase! Approaches to privacy preservation storage on cloud: Encryption(ABE,IBE).! Integrity verification of Big Data storage. Big Data privacy preserving in data processing! First phase : Safeguarding Information.! Second Phase: Extract meaningful information from the data without violating the privacy.

8 Privacy Preserving Methods in Big Data! De-identification:Process used to prevent a person's identity from being connected with information.

9 Privacy Preserving Methods in Big Data! HybrEx: Utilizes public clouds only for non-sensitive data whereas sensitive data and computation, the model utilizes their private cloud.! Map hybrid! Vertical partitioning! Horizontal partitioning! Hybrid! Privacy-preserving aggregation: Limited to the phases of Big Data collecting and storing.

10 Recent Techniques of Privacy Preserving in Big Data! Differential Privacy:! Analysts are not provided the direct access to the database containing personal information.! Intermediate software: Privacy guard.

11 Recent Techniques of Privacy Preserving in Big Data! Identity based anonymization:! Combination of anonymization, privacy protection, and big data techniques.! Initiative taken by Intel.

12 Recent Techniques of Privacy Preserving in Big Data! Hiding a needle in a haystack: The Idea: Detecting a rare class of data, such as the needles, is hard to find in a haystack, such as a large size of data. Example: The service provider adds a dummy item as noise to the original transaction data collected by the data provider.

13 Related Work! Limited research results focus on privacy in the context of Big Data applications.! ACHIEVING k-anonymity PRIVACY PROTECTION USING GENERALIZATION AND SUPPRESSION--paper published by LATANYA SWEENEY(School of Computer Science, Carnegie Mellon University).! l-diversity: Privacy Beyond k-anonymity--a paper by Ashwin Machanavajjhala Johannes Gehrke Daniel Kifer Muthuramakrishnan Venkitasubramaniam(Department of Computer Science, Cornell University)! t-closeness: Privacy Beyond k-anonymity and l-diversity a paper by Ninghui Li, Tiancheng Li and Suresh Venkatasubramanian(Department of Computer Science, Purdue University)

14 Fast Anonymization of Big Data Streams Problem: Privacy preserving technologies cannot be applied to Big Data streams because:! Unlike static data, data streams need real-time processing.! In the existing static k-anonymization algorithms to reduce information loss, data must be repeatedly scanned during the anonymization procedure. The same process is impossible in data streams processing.! The scales of data streams in some applications are increasing tremendously. Solution: Proposed: Fast Anonymization.

15 Big Data Privacy in Healthcare! Privacy preserving techniques have been increasingly relevant in healthcare, especially in areas such as pervasive healthcare computing.! Patient information is stored in data centres with varying levels of security.! Big Data governance is necessary prior to exposing data to analytics. Some important aspects:! Data governance! Real-time security analytics! Privacy-preserving analytics! Data quality! Data sharing and privacy

16 Progress! Have done analysis on privacy techniques in different phases of Big Data life cycle.! Surveying some recent techniques about privacy in Big Data application in depth((e.g.the techniques mentioned previously).! Currently doing comparative studies on the techniques and also trying to find out how this techniques are already used in Healthcare.

17 Future work:! As our future direction, perspectives are needed to achieve effective solutions to the scalability problem of privacy and security in the era of Big Data and especially to the problem of reconciling security and privacy models by exploiting the map reduce framework.! Privacy preserving techniques for data streams.! Differential privacy is one area which has got significant potential to be utilized further.

18 References:! e8ff6d52d14fefd7f4c Controlling%20Privacy%20by%20using%20Methodo logy%20and%20techniques%20of%20big%20data.pdf! RAND_WR1161.pdf!

19 Thank you! Questions?

Prajapati Het I., Patel Shivani M., Prof. Ketan J. Sarvakar IT Department, U. V. Patel college of Engineering Ganapat University, Gujarat

Prajapati Het I., Patel Shivani M., Prof. Ketan J. Sarvakar IT Department, U. V. Patel college of Engineering Ganapat University, Gujarat Security and Privacy with Perturbation Based Encryption Technique in Big Data Prajapati Het I., Patel Shivani M., Prof. Ketan J. Sarvakar IT Department, U. V. Patel college of Engineering Ganapat University,

More information

Privacy Challenges in Big Data and Industry 4.0

Privacy Challenges in Big Data and Industry 4.0 Privacy Challenges in Big Data and Industry 4.0 Jiannong Cao Internet & Mobile Computing Lab Department of Computing Hong Kong Polytechnic University Email: csjcao@comp.polyu.edu.hk http://www.comp.polyu.edu.hk/~csjcao/

More information

Implementation of Privacy Mechanism using Curve Fitting Method for Data Publishing in Health Care Domain

Implementation of Privacy Mechanism using Curve Fitting Method for Data Publishing in Health Care Domain Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 5, May 2014, pg.1105

More information

Comparison and Analysis of Anonymization Techniques for Preserving Privacy in Big Data

Comparison and Analysis of Anonymization Techniques for Preserving Privacy in Big Data Advances in Computational Sciences and Technology ISSN 0973-6107 Volume 10, Number 2 (2017) pp. 247-253 Research India Publications http://www.ripublication.com Comparison and Analysis of Anonymization

More information

Big data privacy: a technological perspective and review

Big data privacy: a technological perspective and review DOI 10.1186/s40537-016-0059-y SURVEY PAPER Open Access Big data privacy: a technological perspective and review Priyank Jain *, Manasi Gyanchandani and Nilay Khare *Correspondence: priyankjain1984@gmail.com

More information

Data attribute security and privacy in Collaborative distributed database Publishing

Data attribute security and privacy in Collaborative distributed database Publishing International Journal of Engineering Inventions e-issn: 2278-7461, p-issn: 2319-6491 Volume 3, Issue 12 (July 2014) PP: 60-65 Data attribute security and privacy in Collaborative distributed database Publishing

More information

PrivApprox. Privacy- Preserving Stream Analytics.

PrivApprox. Privacy- Preserving Stream Analytics. PrivApprox Privacy- Preserving Stream Analytics https://privapprox.github.io Do Le Quoc, Martin Beck, Pramod Bhatotia, Ruichuan Chen, Christof Fetzer, Thorsten Strufe July 2017 Motivation Clients Analysts

More information

ECEN Security and Privacy for Big Data. Introduction Professor Yanmin Gong 08/22/2017

ECEN Security and Privacy for Big Data. Introduction Professor Yanmin Gong 08/22/2017 ECEN 5060 - Security and Privacy for Big Data Introduction Professor Yanmin Gong 08/22/2017 Administrivia Course Hour: T/R 3:30-4:45 pm @ CLB 101 Office Hour: T/R 2:30-3:30 pm Any question besides assignment

More information

Survey Result on Privacy Preserving Techniques in Data Publishing

Survey Result on Privacy Preserving Techniques in Data Publishing Survey Result on Privacy Preserving Techniques in Data Publishing S.Deebika PG Student, Computer Science and Engineering, Vivekananda College of Engineering for Women, Namakkal India A.Sathyapriya Assistant

More information

A Review of Privacy Preserving Data Publishing Technique

A Review of Privacy Preserving Data Publishing Technique A Review of Privacy Preserving Data Publishing Technique Abstract:- Amar Paul Singh School of CSE Bahra University Shimla Hills, India Ms. Dhanshri Parihar Asst. Prof (School of CSE) Bahra University Shimla

More information

Distributed Bottom up Approach for Data Anonymization using MapReduce framework on Cloud

Distributed Bottom up Approach for Data Anonymization using MapReduce framework on Cloud Distributed Bottom up Approach for Data Anonymization using MapReduce framework on Cloud R. H. Jadhav 1 P.E.S college of Engineering, Aurangabad, Maharashtra, India 1 rjadhav377@gmail.com ABSTRACT: Many

More information

K ANONYMITY. Xiaoyong Zhou

K ANONYMITY. Xiaoyong Zhou K ANONYMITY LATANYA SWEENEY Xiaoyong Zhou DATA releasing: Privacy vs. Utility Society is experiencing exponential growth in the number and variety of data collections containing person specific specific

More information

FREQUENT ITEMSET MINING USING PFP-GROWTH VIA SMART SPLITTING

FREQUENT ITEMSET MINING USING PFP-GROWTH VIA SMART SPLITTING FREQUENT ITEMSET MINING USING PFP-GROWTH VIA SMART SPLITTING Neha V. Sonparote, Professor Vijay B. More. Neha V. Sonparote, Dept. of computer Engineering, MET s Institute of Engineering Nashik, Maharashtra,

More information

Privacy-Preserving Machine Learning

Privacy-Preserving Machine Learning Privacy-Preserving Machine Learning CS 760: Machine Learning Spring 2018 Mark Craven and David Page www.biostat.wisc.edu/~craven/cs760 1 Goals for the Lecture You should understand the following concepts:

More information

Preserving Privacy during Big Data Publishing using K-Anonymity Model A Survey

Preserving Privacy during Big Data Publishing using K-Anonymity Model A Survey ISSN No. 0976-5697 Volume 8, No. 5, May-June 2017 International Journal of Advanced Research in Computer Science SURVEY REPORT Available Online at www.ijarcs.info Preserving Privacy during Big Data Publishing

More information

Integration of information security and network data mining technology in the era of big data

Integration of information security and network data mining technology in the era of big data Acta Technica 62 No. 1A/2017, 157 166 c 2017 Institute of Thermomechanics CAS, v.v.i. Integration of information security and network data mining technology in the era of big data Lu Li 1 Abstract. The

More information

KantanMT.com. Security & Infra-Structure Overview

KantanMT.com. Security & Infra-Structure Overview KantanMT.com Security & Infra-Structure Overview Contents KantanMT Platform Security... 2 Customer Data Protection... 2 Application Security... 2 Physical and Environmental Security... 3 ecommerce Transactions...

More information

Comparative Analysis of Anonymization Techniques

Comparative Analysis of Anonymization Techniques International Journal of Electronic and Electrical Engineering. ISSN 0974-2174 Volume 7, Number 8 (2014), pp. 773-778 International Research Publication House http://www.irphouse.com Comparative Analysis

More information

Privacy Preserved Data Publishing Techniques for Tabular Data

Privacy Preserved Data Publishing Techniques for Tabular Data Privacy Preserved Data Publishing Techniques for Tabular Data Keerthy C. College of Engineering Trivandrum Sabitha S. College of Engineering Trivandrum ABSTRACT Almost all countries have imposed strict

More information

CIS 601 Graduate Seminar in Computer Science Sunnie S. Chung

CIS 601 Graduate Seminar in Computer Science Sunnie S. Chung CIS 601 Graduate Seminar in Computer Science Sunnie S. Chung Research on Topics in Recent Computer Science Research and related papers in the subject that you choose and give presentations in class and

More information

Slicing Technique For Privacy Preserving Data Publishing

Slicing Technique For Privacy Preserving Data Publishing Slicing Technique For Privacy Preserving Data Publishing D. Mohanapriya #1, Dr. T.Meyyappan M.Sc., MBA. M.Phil., Ph.d., 2 # Department of Computer Science and Engineering, Alagappa University, Karaikudi,

More information

All Aboard the HIPAA Omnibus An Auditor s Perspective

All Aboard the HIPAA Omnibus An Auditor s Perspective All Aboard the HIPAA Omnibus An Auditor s Perspective Rick Dakin CEO & Chief Security Strategist February 20, 2013 1 Agenda Healthcare Security Regulations A Look Back What is the final Omnibus Rule? Changes

More information

Massive Scalability With InterSystems IRIS Data Platform

Massive Scalability With InterSystems IRIS Data Platform Massive Scalability With InterSystems IRIS Data Platform Introduction Faced with the enormous and ever-growing amounts of data being generated in the world today, software architects need to pay special

More information

Characterizing Smartphone Usage Patterns from Millions of Android Users

Characterizing Smartphone Usage Patterns from Millions of Android Users Characterizing Smartphone Usage Patterns from Millions of Android Users Huoran Li, Xuan Lu, Xuanzhe Liu Peking University Tao Xie UIUC Kaigui Bian Peking University Felix Xiaozhu Lin Purdue University

More information

Privacy Preserving Data Publishing: From k-anonymity to Differential Privacy. Xiaokui Xiao Nanyang Technological University

Privacy Preserving Data Publishing: From k-anonymity to Differential Privacy. Xiaokui Xiao Nanyang Technological University Privacy Preserving Data Publishing: From k-anonymity to Differential Privacy Xiaokui Xiao Nanyang Technological University Outline Privacy preserving data publishing: What and Why Examples of privacy attacks

More information

Security Control Methods for Statistical Database

Security Control Methods for Statistical Database Security Control Methods for Statistical Database Li Xiong CS573 Data Privacy and Security Statistical Database A statistical database is a database which provides statistics on subsets of records OLAP

More information

An Adaptive Algorithm for Range Queries in Differential Privacy

An Adaptive Algorithm for Range Queries in Differential Privacy Rochester Institute of Technology RIT Scholar Works Theses Thesis/Dissertation Collections 6-2016 An Adaptive Algorithm for Range Queries in Differential Privacy Asma Alnemari Follow this and additional

More information

Big Data - Security with Privacy

Big Data - Security with Privacy Big Data - Security with Privacy Elisa Bertino CS Department, Cyber Center, and CERIAS Purdue University Cyber Center Today we have technologies for Acquiring and sensing data Transmitting data Storing,

More information

Modern Database Architectures Demand Modern Data Security Measures

Modern Database Architectures Demand Modern Data Security Measures Forrester Opportunity Snapshot: A Custom Study Commissioned By Imperva January 2018 Modern Database Architectures Demand Modern Data Security Measures GET STARTED Introduction The fast-paced, ever-changing

More information

Crowd-Blending Privacy

Crowd-Blending Privacy Crowd-Blending Privacy Johannes Gehrke, Michael Hay, Edward Lui, and Rafael Pass Department of Computer Science, Cornell University {johannes,mhay,luied,rafael}@cs.cornell.edu Abstract. We introduce a

More information

A Layered Protocol Architecture for Scalable Innovation and Identification of Network Economic Synergies in the Internet of Things

A Layered Protocol Architecture for Scalable Innovation and Identification of Network Economic Synergies in the Internet of Things A Layered Protocol Architecture for Scalable Innovation and Identification of Network Economic Synergies in the Internet of Things Tilman Wolf 1 and Anna Nagurney 2 1 Department of Electrical and Computer

More information

Computer-based Tracking Protocols: Improving Communication between Databases

Computer-based Tracking Protocols: Improving Communication between Databases Computer-based Tracking Protocols: Improving Communication between Databases Amol Deshpande Database Group Department of Computer Science University of Maryland Overview Food tracking and traceability

More information

Reza Tourani, Satyajayant (Jay) Misra, Travis Mick

Reza Tourani, Satyajayant (Jay) Misra, Travis Mick Application-Specific Secure Gathering of Consumer Preferences and Feedback in Information-Centric Networks Reza Tourani, Satyajayant (Jay) Misra, Travis Mick Computer Science Department New Mexico State

More information

Anonymization of Network Traces Using Noise Addition Techniques

Anonymization of Network Traces Using Noise Addition Techniques Anonymization of Network Traces Using Noise Addition Techniques By Ahmed AlEroud Assistant Professor of Computer Information Systems Yarmouk University, Jordan Post-doctoral Fellow, Department of Information

More information

Efficient Privacy Preservation Techniques for Maintaining HealthCare Records Using Big Data

Efficient Privacy Preservation Techniques for Maintaining HealthCare Records Using Big Data Efficient Privacy Preservation Techniques for Maintaining HealthCare Records Using Big Data S.Jegadeesan, S.Pooja, Vidhya.T Assistant Professor/IT, Dept of Information Technology, Velammal Institute of

More information

Distributed Hybrid MDM, aka Virtual MDM Optional Add-on, for WhamTech SmartData Fabric

Distributed Hybrid MDM, aka Virtual MDM Optional Add-on, for WhamTech SmartData Fabric Distributed Hybrid MDM, aka Virtual MDM Optional Add-on, for WhamTech SmartData Fabric Revision 2.1 Page 1 of 17 www.whamtech.com (972) 991-5700 info@whamtech.com August 2018 Contents Introduction... 3

More information

Kusum Lata, Sugandha Sharma

Kusum Lata, Sugandha Sharma International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2017 IJSRCSEIT Volume 2 Issue 4 ISSN : 2456-3307 A Survey on Cloud Computing and Mobile Cloud Computing

More information

Denial of Service, Traceback and Anonymity

Denial of Service, Traceback and Anonymity Purdue University Center for Education and Research in Information Assurance and Security Denial of Service, Traceback and Anonymity Clay Shields Assistant Professor of Computer Sciences CERIAS Network

More information

DDN Annual High Performance Computing Trends Survey Reveals Rising Deployment of Flash Tiers & Private/Hybrid Clouds vs.

DDN Annual High Performance Computing Trends Survey Reveals Rising Deployment of Flash Tiers & Private/Hybrid Clouds vs. DDN Annual High Performance Computing Trends Survey Reveals Rising Deployment of Flash Tiers & Private/Hybrid Clouds vs. Public for HPC HPC End Users Cite Mixed I/O as the Most Difficult Performance Challenge

More information

A Peek at the Future Intel s Technology Roadmap. Jesse Treger Datacenter Strategic Planning October/November 2012

A Peek at the Future Intel s Technology Roadmap. Jesse Treger Datacenter Strategic Planning October/November 2012 A Peek at the Future Intel s Technology Roadmap Jesse Treger Datacenter Strategic Planning October/November 2012 Intel's Vision This decade we will create and extend computing technology to connect and

More information

Solution Overview Gigamon Visibility Platform for AWS

Solution Overview Gigamon Visibility Platform for AWS Solution Overview Gigamon Visibility Platform for Background With the rapid evolution of the public cloud that brings instant advantages of economies of scale, elasticity and agility, IT and data center

More information

Distributed Systems CS6421

Distributed Systems CS6421 Distributed Systems CS6421 Intro to Distributed Systems and the Cloud Prof. Tim Wood v I teach: Software Engineering, Operating Systems, Sr. Design I like: distributed systems, networks, building cool

More information

Optimal k-anonymity with Flexible Generalization Schemes through Bottom-up Searching

Optimal k-anonymity with Flexible Generalization Schemes through Bottom-up Searching Optimal k-anonymity with Flexible Generalization Schemes through Bottom-up Searching Tiancheng Li Ninghui Li CERIAS and Department of Computer Science, Purdue University 250 N. University Street, West

More information

Indrajit Roy, Srinath T.V. Setty, Ann Kilzer, Vitaly Shmatikov, Emmett Witchel The University of Texas at Austin

Indrajit Roy, Srinath T.V. Setty, Ann Kilzer, Vitaly Shmatikov, Emmett Witchel The University of Texas at Austin Airavat: Security and Privacy for MapReduce Indrajit Roy, Srinath T.V. Setty, Ann Kilzer, Vitaly Shmatikov, Emmett Witchel The University of Texas at Austin Computing in the year 201X 2 Data Illusion of

More information

How Security Policy Orchestration Extends to Hybrid Cloud Platforms

How Security Policy Orchestration Extends to Hybrid Cloud Platforms How Security Policy Orchestration Extends to Hybrid Cloud Platforms Reducing complexity also improves visibility when managing multi vendor, multi technology heterogeneous IT environments www.tufin.com

More information

Void main Technologies

Void main Technologies SNO TITLE Domain 1. A Hybrid Approach for Detecting Automated Spammers in Twitter Data mining 2. A Key-Policy Attribute-Based Temporary Keyword Search scheme for Secure Storage 3. A Lightweight Secure

More information

Enhanced Slicing Technique for Improving Accuracy in Crowdsourcing Database

Enhanced Slicing Technique for Improving Accuracy in Crowdsourcing Database Enhanced Slicing Technique for Improving Accuracy in Crowdsourcing Database T.Malathi 1, S. Nandagopal 2 PG Scholar, Department of Computer Science and Engineering, Nandha College of Technology, Erode,

More information

IMPROVING DATA SECURITY USING ATTRIBUTE BASED BROADCAST ENCRYPTION IN CLOUD COMPUTING

IMPROVING DATA SECURITY USING ATTRIBUTE BASED BROADCAST ENCRYPTION IN CLOUD COMPUTING IMPROVING DATA SECURITY USING ATTRIBUTE BASED BROADCAST ENCRYPTION IN CLOUD COMPUTING 1 K.Kamalakannan, 2 Mrs.Hemlathadhevi Abstract -- Personal health record (PHR) is an patient-centric model of health

More information

On Privacy-Preservation of Text and Sparse Binary Data with Sketches

On Privacy-Preservation of Text and Sparse Binary Data with Sketches On Privacy-Preservation of Text and Sparse Binary Data with Sketches Charu C. Aggarwal Philip S. Yu Abstract In recent years, privacy preserving data mining has become very important because of the proliferation

More information

Commercial Data Intensive Cloud Computing Architecture: A Decision Support Framework

Commercial Data Intensive Cloud Computing Architecture: A Decision Support Framework Association for Information Systems AIS Electronic Library (AISeL) CONF-IRM 2014 Proceedings International Conference on Information Resources Management (CONF-IRM) 2014 Commercial Data Intensive Cloud

More information

Distributed Data Anonymization with Hiding Sensitive Node Labels

Distributed Data Anonymization with Hiding Sensitive Node Labels Distributed Data Anonymization with Hiding Sensitive Node Labels C.EMELDA Research Scholar, PG and Research Department of Computer Science, Nehru Memorial College, Putthanampatti, Bharathidasan University,Trichy

More information

Networking Cyber-physical Applications in a Data-centric World

Networking Cyber-physical Applications in a Data-centric World Networking Cyber-physical Applications in a Data-centric World Jie Wu Dept. of Computer and Information Sciences Temple University ICCCN 2015 Panel Computers weaving themselves into the fabric of everyday

More information

Fujitsu World Tour 2018

Fujitsu World Tour 2018 Fujitsu World Tour 2018 May 30, 2018 #FujitsuWorldTour 1 Copyright 2018 FUJITSU Security and Privacy of Big Data A NIST Perspective Arnab Roy Fujitsu Laboratories of America Co-Chair, NIST Big Data WG:

More information

Pufferfish: A Semantic Approach to Customizable Privacy

Pufferfish: A Semantic Approach to Customizable Privacy Pufferfish: A Semantic Approach to Customizable Privacy Ashwin Machanavajjhala ashwin AT cs.duke.edu Collaborators: Daniel Kifer (Penn State), Bolin Ding (UIUC, Microsoft Research) idash Privacy Workshop

More information

USE CASES. See how Polygon s Biometrid can be used in different usage settings

USE CASES. See how Polygon s Biometrid can be used in different usage settings USE CASES See how Polygon s Biometrid can be used in different usage settings Web/Mobile Authentication Digital user authentication using biometrics Password management is increasingly harder for the user.

More information

Abstract. The Challenges. ESG Lab Review InterSystems IRIS Data Platform: A Unified, Efficient Data Platform for Fast Business Insight

Abstract. The Challenges. ESG Lab Review InterSystems IRIS Data Platform: A Unified, Efficient Data Platform for Fast Business Insight ESG Lab Review InterSystems Data Platform: A Unified, Efficient Data Platform for Fast Business Insight Date: April 218 Author: Kerry Dolan, Senior IT Validation Analyst Abstract Enterprise Strategy Group

More information

CHALLENGES GOVERNANCE INTEGRATION SECURITY

CHALLENGES GOVERNANCE INTEGRATION SECURITY CLOUD SERVICES The adoption and migration to the cloud is rooted in the need for speed and flexibility in creating and managing services. These benefits are often impacted by the difficulty of enterprises

More information

ITU Arab Forum on Future Networks: "Broadband Networks in the Era of App Economy", Tunis - Tunisia, Feb. 2017

ITU Arab Forum on Future Networks: Broadband Networks in the Era of App Economy, Tunis - Tunisia, Feb. 2017 Farouk Kamoun Professor Emeritus, ENSI President SESAME University Farouk.kamoun@sesame.com.tn ITU Arab Forum on Future Networks: "Broadband Networks in the Era of App Economy", Tunis - Tunisia, 21-22

More information

Fine-Grained Access Control

Fine-Grained Access Control Secure your sensitive information Fine-Grained Access Control 2 Serving financial institutions, federal agencies, pharmaceutical companies, payment service providers, insurers, broadcasting companies,

More information

Three Key Challenges Facing ISPs and Their Enterprise Clients

Three Key Challenges Facing ISPs and Their Enterprise Clients Three Key Challenges Facing ISPs and Their Enterprise Clients GRC, enterprise services, and ever-evolving hybrid infrastructures are all dynamic and significant challenges to the ISP s enterprise clients.

More information

Data Management and Security in the GDPR Era

Data Management and Security in the GDPR Era Data Management and Security in the GDPR Era Franck Hourdin; Vice President, EMEA Security Russ Lowenthal; Director, Database Security Product Management Mike Turner; Chief Operating Officer, Capgemini

More information

Exam C Foundations of IBM Cloud Reference Architecture V5

Exam C Foundations of IBM Cloud Reference Architecture V5 Exam C5050 287 Foundations of IBM Cloud Reference Architecture V5 1. Which cloud computing scenario would benefit from the inclusion of orchestration? A. A customer has a need to adopt lean principles

More information

Rocky Mountain Cyberspace Symposium 2018 DoD Cyber Resiliency

Rocky Mountain Cyberspace Symposium 2018 DoD Cyber Resiliency Rocky Mountain Cyberspace Symposium 2018 DoD Cyber Resiliency Mr. Ed Brindley Acting Deputy Cyber Security Department of Defense 7 March 2018 SUPPORT THE WARFIGHTER 2 Overview Secretary Mattis Priorities

More information

Data Security and Privacy. Topic 18: k-anonymity, l-diversity, and t-closeness

Data Security and Privacy. Topic 18: k-anonymity, l-diversity, and t-closeness Data Security and Privacy Topic 18: k-anonymity, l-diversity, and t-closeness 1 Optional Readings for This Lecture t-closeness: Privacy Beyond k-anonymity and l-diversity. Ninghui Li, Tiancheng Li, and

More information

ELASTIC DATA PLATFORM

ELASTIC DATA PLATFORM SERVICE OVERVIEW ELASTIC DATA PLATFORM A scalable and efficient approach to provisioning analytics sandboxes with a data lake ESSENTIALS Powerful: provide read-only data to anyone in the enterprise while

More information

A Container On a Virtual Machine On an HPC? Presentation to HPC Advisory Council. Perth, July 31-Aug 01, 2017

A Container On a Virtual Machine On an HPC? Presentation to HPC Advisory Council. Perth, July 31-Aug 01, 2017 A Container On a Virtual Machine On an HPC? Presentation to HPC Advisory Council Perth, July 31-Aug 01, 2017 http://levlafayette.com Necessary and Sufficient Definitions High Performance Computing: High

More information

Presentation Outline. Introduction Information Gathering Sample of Results Requirements Case Study Challenges Recommendations

Presentation Outline. Introduction Information Gathering Sample of Results Requirements Case Study Challenges Recommendations Sixth SG13 Regional Workshop for Africa on Standardization of future networks: What opportunities for Africa? (Abidjan, Côte d Ivoire, 26-27 March 2018) Supplement No. 146 to Y Series of Recommendations

More information

vrealize Introducing VMware vrealize Suite Purpose Built for the Hybrid Cloud

vrealize Introducing VMware vrealize Suite Purpose Built for the Hybrid Cloud vrealize Introducing VMware vrealize Suite Purpose Built for the Hybrid Cloud Overview: Realizing the Full Power of the Cloud Cloud computing provides tremendous competitive advantages to companies, but

More information

A Way to Personalize In-Home Healthcare and Assisted Living

A Way to Personalize In-Home Healthcare and Assisted Living Knowledge Foundation A Way to Personalize In-Home Healthcare and Assisted Living Wagner Ourique de Morais CERES Centre for Research on Embedded Systems CAISR Centre for Applied Intelligent Systems Research

More information

THALES DATA THREAT REPORT

THALES DATA THREAT REPORT 2018 THALES DATA THREAT REPORT Trends in Encryption and Data Security INDIA EDITION EXECUTIVE SUMMARY #2018DataThreat THE TOPLINE Rising risks for sensitive data in India In India, as in the rest of the

More information

SOLUTION BRIEF NETWORK OPERATIONS AND ANALYTICS. How Can I Predict Network Behavior to Provide for an Exceptional Customer Experience?

SOLUTION BRIEF NETWORK OPERATIONS AND ANALYTICS. How Can I Predict Network Behavior to Provide for an Exceptional Customer Experience? SOLUTION BRIEF NETWORK OPERATIONS AND ANALYTICS How Can I Predict Network Behavior to Provide for an Exceptional Customer Experience? SOLUTION BRIEF CA DATABASE MANAGEMENT FOR DB2 FOR z/os DRAFT When used

More information

Office 365 Buyers Guide: Best Practices for Securing Office 365

Office 365 Buyers Guide: Best Practices for Securing Office 365 Office 365 Buyers Guide: Best Practices for Securing Office 365 Microsoft Office 365 has become the standard productivity platform for the majority of organizations, large and small, around the world.

More information

ENCRYPTED DATA MANAGEMENT WITH DEDUPLICATION IN CLOUD COMPUTING

ENCRYPTED DATA MANAGEMENT WITH DEDUPLICATION IN CLOUD COMPUTING ENCRYPTED DATA MANAGEMENT WITH DEDUPLICATION IN CLOUD COMPUTING S KEERTHI 1*, MADHAVA REDDY A 2* 1. II.M.Tech, Dept of CSE, AM Reddy Memorial College of Engineering & Technology, Petlurivaripalem. 2. Assoc.

More information

Public Key Infrastructure scaling perspectives

Public Key Infrastructure scaling perspectives Public Key Infrastructure scaling perspectives Finseskolen 2012 Anders Fongen, PhD Norwegian Defence Research Establishment anders.fongen@ffi.no Outline of presentation Short intro to PKI architecture

More information

Ambiguity: Hide the Presence of Individuals and Their Privacy with Low Information Loss

Ambiguity: Hide the Presence of Individuals and Their Privacy with Low Information Loss : Hide the Presence of Individuals and Their Privacy with Low Information Loss Hui (Wendy) Wang Department of Computer Science Stevens Institute of Technology Hoboken, NJ, USA hwang@cs.stevens.edu Abstract

More information

Automating Service Management For 5G Networks

Automating Service Management For 5G Networks Automating Service Management For 5G Networks Rafia Inam Automation Summit, Sep 2015 Ericsson 2015 Automation Summit Sep 2015 Page 1 Industry transformation Traditional Industries Transformation Transformed

More information

Top 4 considerations for choosing a converged infrastructure for private clouds

Top 4 considerations for choosing a converged infrastructure for private clouds Top 4 considerations for choosing a converged infrastructure for private clouds Organizations are increasingly turning to private clouds to improve efficiencies, lower costs, enhance agility and address

More information

mhealth: Privacy Challenges in Smartphone-based Personal Health Records and a Conceptual Model for Privacy Management

mhealth: Privacy Challenges in Smartphone-based Personal Health Records and a Conceptual Model for Privacy Management mhealth: Privacy Challenges in Smartphone-based Personal Health Records and a Conceptual Model for Privacy Management ehealth Workshop 28-29 Oct 2014 Middlesex University, London, UK Edeh Esther Omegero

More information

MULTIVARIATE ANALYSIS OF STEALTH QUANTITATES (MASQ)

MULTIVARIATE ANALYSIS OF STEALTH QUANTITATES (MASQ) MULTIVARIATE ANALYSIS OF STEALTH QUANTITATES (MASQ) Application of Machine Learning to Testing in Finance, Cyber, and Software Innovation center, Washington, D.C. THE SCIENCE OF TEST WORKSHOP 2017 AGENDA

More information

Massive Data Analysis

Massive Data Analysis Professor, Department of Electrical and Computer Engineering Tennessee Technological University February 25, 2015 Big Data This talk is based on the report [1]. The growth of big data is changing that

More information

Privacy-Preserving. Introduction to. Data Publishing. Concepts and Techniques. Benjamin C. M. Fung, Ke Wang, Chapman & Hall/CRC. S.

Privacy-Preserving. Introduction to. Data Publishing. Concepts and Techniques. Benjamin C. M. Fung, Ke Wang, Chapman & Hall/CRC. S. Chapman & Hall/CRC Data Mining and Knowledge Discovery Series Introduction to Privacy-Preserving Data Publishing Concepts and Techniques Benjamin C M Fung, Ke Wang, Ada Wai-Chee Fu, and Philip S Yu CRC

More information

SAP C_TS4FI_1610 Exam

SAP C_TS4FI_1610 Exam Volume: 248 Questions Question: 1 Which SAP technological product provides the platform required for SAP to support the digital transformation of an organization? A. SAP HANA B. SAP CRM C. SAP Fiori D.

More information

White Paper. Why IDS Can t Adequately Protect Your IoT Devices

White Paper. Why IDS Can t Adequately Protect Your IoT Devices White Paper Why IDS Can t Adequately Protect Your IoT Devices Introduction As a key component in information technology security, Intrusion Detection Systems (IDS) monitor networks for suspicious activity

More information

PRIVACY STATEMENT +41 (0) Rue du Rhone , Martigny, Switzerland.

PRIVACY STATEMENT +41 (0) Rue du Rhone , Martigny, Switzerland. PRIVACY STATEMENT +41 (0) 225349799 www.energymarketprice.com Rue du Rhone 5 1921, Martigny, Switzerland dpo@energymarketprice.com Introduction Your privacy and trust are important to us and this Privacy

More information

Horizon Health Care, Inc.

Horizon Health Care, Inc. Customer Success Story Horizon Health Care, Inc. Comprehensive Security Risk Analysis Helps FQHC Achieve Meaningful Use and Safeguard PHI. Page 2 of 6 Horizon Health Care, Inc. Comprehensive Security Risk

More information

Teradata and Protegrity High-Value Protection for High-Value Data

Teradata and Protegrity High-Value Protection for High-Value Data Teradata and Protegrity High-Value Protection for High-Value Data 12.16 EB7178 DATA SECURITY Table of Contents 2 Data Centric Security: Providing High-Value Protection for High-Value Data 3 Visibility:

More information

HIPAA AND SECURITY. For Healthcare Organizations

HIPAA AND  SECURITY. For Healthcare Organizations HIPAA AND EMAIL SECURITY For Healthcare Organizations Table of content Protecting patient information 03 Who is affected by HIPAA? 06 Why should healthcare 07 providers care? Email security & HIPPA 08

More information

Towards the Use of Graph Summaries for Privacy Enhancing Release and Querying of Linked Data

Towards the Use of Graph Summaries for Privacy Enhancing Release and Querying of Linked Data Towards the Use of Graph Summaries for Privacy Enhancing Release and Querying of Linked Data Benjamin Heitmann, Felix Hermsen, and Stefan Decker Informatik 5 Information Systems RWTH Aachen University,

More information

Wireless e-business Security. Lothar Vigelandzoon

Wireless e-business Security. Lothar Vigelandzoon Wireless e-business Security Lothar Vigelandzoon E-business evolution Increased business drivers for cost efficiency & market penetration Increased Importance of brand reputation Distance between IT and

More information

Privacy Breaches in Privacy-Preserving Data Mining

Privacy Breaches in Privacy-Preserving Data Mining 1 Privacy Breaches in Privacy-Preserving Data Mining Johannes Gehrke Department of Computer Science Cornell University Joint work with Sasha Evfimievski (Cornell), Ramakrishnan Srikant (IBM), and Rakesh

More information

The Introduction of Sensor-Cloud and Its Architecture, Applications and Approaches. Mao-Lin Li 2013/11/5

The Introduction of Sensor-Cloud and Its Architecture, Applications and Approaches. Mao-Lin Li 2013/11/5 The Introduction of Sensor-Cloud and Its Architecture, Applications and Approaches Mao-Lin Li 2013/11/5 What is a Sensor-Cloud? Sensors: Limited and are specific to their applications/services when linked

More information

Privacy and Security Ensured Rule Mining under Partitioned Databases

Privacy and Security Ensured Rule Mining under Partitioned Databases www.ijiarec.com ISSN:2348-2079 Volume-5 Issue-1 International Journal of Intellectual Advancements and Research in Engineering Computations Privacy and Security Ensured Rule Mining under Partitioned Databases

More information

How do you decide what s best for you?

How do you decide what s best for you? How do you decide what s best for you? Experience Transparency Leadership Commitment Cost reduction Security Trustworthiness Credibility Confidence Reliability Compliance Privacy Expertise Flexibility

More information

Privacy-Preserving WebID Analytics on the Decentralized Policy-Aware Social Web

Privacy-Preserving WebID Analytics on the Decentralized Policy-Aware Social Web Privacy-Preserving WebID Analytics on the Decentralized Policy-Aware Social Web Yuh-Jong Hu hu@cs.nccu.edu.tw Emerging Network Technology (ENT) Lab. Department of Computer Science National Chengchi University,

More information

Design and Implementation of Privacy-Preserving Surveillance. Aaron Segal

Design and Implementation of Privacy-Preserving Surveillance. Aaron Segal 1 Design and Implementation of Privacy-Preserving Surveillance Aaron Segal Yale University May 11, 2016 Advisor: Joan Feigenbaum 2 Overview Introduction Surveillance and Privacy Privacy Principles for

More information

Cell Suppression In SAS Visual Analytics: A Primer

Cell Suppression In SAS Visual Analytics: A Primer ABSTRACT Paper 11883-2016 Cell Suppression In SAS Visual Analytics: A Primer Marc Flore, Institute for Health Policy and Practice, University of New Hampshire In healthcare and other fields, the importance

More information

4 Ways to Protect Your Organization from a Data Breach

4 Ways to Protect Your Organization from a Data Breach BEST PRACTICES GUIDE Patient Data Security 4 Ways to Protect Your Organization from a Data Breach Patient Data Security 2 It s a treasure trove of personal data. The proverbial pot of data gold. For every

More information

Stadium. A Distributed Metadata-private Messaging System. Matei Zaharia Nickolai Zeldovich SOSP 2017

Stadium. A Distributed Metadata-private Messaging System. Matei Zaharia Nickolai Zeldovich SOSP 2017 Stadium A Distributed Metadata-private Messaging System Nirvan Tyagi Yossi Gilad Derek Leung Matei Zaharia Nickolai Zeldovich SOSP 2017 Previous talk: Anonymous broadcast This talk: Private messaging Alice

More information

Review Paper onbuilding Prediction based model for cloud-based data mining

Review Paper onbuilding Prediction based model for cloud-based data mining Review Paper onbuilding Prediction based model for cloud-based data mining Er. Spinder kaur 1,Dr. Sandeep Kautish 2 1 M.Tech Scholar, 2 Assistant Professor ABSTRACT University of Computer Application Guru

More information

Whitepaper. Endpoint Strategy: Debunking Myths about Isolation

Whitepaper. Endpoint Strategy: Debunking Myths about Isolation Whitepaper Endpoint Strategy: Debunking Myths about Isolation May 2018 Endpoint Strategy: Debunking Myths about Isolation Endpoints are, and have always been, a major cyberattack vector. Attackers, aiming

More information