PRIVACY-PRESERVING DATA ANALYSIS AND DATA SHARING

Size: px
Start display at page:

Download "PRIVACY-PRESERVING DATA ANALYSIS AND DATA SHARING"

Transcription

1 PRIVACY-PRESERVING DATA ANALYSIS AND DATA SHARING Chih-Hua Tai Dept. of Computer Science and Information Engineering, National Taipei University New Taipei City, Taiwan

2 BENEFIT OF DATA ANALYSIS Many fields such as marketing, business, healthcare, software engineering, government, to new a few, has received great benefit through data analysis Marketing / Retail Helps marketing Understand customers behaviors Predict what their customers want Finance / Banking Predict the risk of a loan Detect fraudulent credit card transactions 2

3 BENEFIT OF DATA SHARING The volume of data effects the quality of the results of data analysis The release of data brings more chance of better data analysis 3

4 PRIVACY-PRESERVING DATA SHARING

5 PRIVACY ISSUES IN DATA SHARING (EX1) DOB Sex Zipcode Disease 1/21/76 Male Heart Disease 4/13/86 Female Hepatities 2/28/76 Male Brochitis 1/21/76 Male Broken Arm 4/13/86 Female Flu 2/28/76 Female Hang Nail 5

6 PRIVACY ISSUES IN DATA SHARING (EX1) Name DOB Sex Zipcode Alice 1/21/76 Male Bob 1/10/81 Female Carol 10/1/44 Female Dan 2/21/84 Male Ellen 4/19/72 Female

7 DOB Sex Zipcode Disease 1/21/76 Female Heart Disease 4/13/86 Female Hepatities 2/28/76 Male Brochitis 1/21/76 Male Broken Arm 4/13/86 Female Flu 2/28/76 Female Hang Nail Record Linkage Name DOB Sex Zipcode Alice 1/21/76 Female Bob 1/10/81 Female Carol 10/1/44 Female Dan 2/21/84 Male Ellen 4/19/72 Female

8 PRIVACY ISSUES IN DATA SHARING (EX2) Attribute Linkage 8

9 PRIVACY ISSUES IN DATA SHARING (EX3) Attributes: Name, Salary, Links: Friends, Neighborhood, Communities: Interests, Activities, 9

10 PRIVACY ISSUES ON SOCIAL NETWORKS Personal information leaked, even if the vertex identifies are hidden Many information can be used to re-associate the vertex with its identity. Vertex degree: k-degree anonymity, Neighborhood configuration: k-neighborhood anonymity, k-automorphism anonymity, k-isomorphism anonymity, grouping-and- collapsing, 10

11 FRIENDSHIP ATTACK Still there are another type of information for vertex re-identification friendship attack 11

12 PRIVACY CONCERNS IN DATA SHARING Personal information leaked, even if the vertex identifies are hidden E.g., Friendship attacks C.-H. Tai, P. S. Yu, D.-N. Yang and M.-S. Chen, "Privacypreserving Social Network Publication Against Friendship Attacks," In KDD, E.g., Community Identification C.-H. Tai, P. S. Yu, D.-N. Yang, and M.-S. Chen, Structural diversity for privacy in publishing social networks, In SDM, 2011; Structural Diversity for Resisting Community Identification in Published Social Networks, IEEE Trans. Knowl. Data Eng. 26(1): (2014). C.-H. Tai, P.-J. Tseng, P. S. Yu and M.-S. Chen, "Identities Anonymization in Dynamic Social Networks," In ICDM,

13 ENFORCING STRUCTURAL DIVERSITY FOR PRIVACY-PRESERVING RELEASE OF SOCIAL NETWORKS

14 ATTRIBUTE LINKAGE 14

15 L-DIVERSITY Distinct l diversity At least l distinct values associated with a sensitive attribute within a group of records, which share the same set of Quasi Identifier QI: attributes that could potentially re-identify records. 15

16 L-DIVERSITY 16

17 COMMUNITY IDENTIFICATION Vertex identification is considered to be an important privacy issue in publishing social networks. k-degree anonymity, k-neighborhood anonymity, In addition to a vertex identity, each individual is also associated with a community identity. Could be used to infer the political party affiliation or disease information sensitive to the public. Is a kind of structural information 17

18 COMMUNITY IDENTIFICATION Community information is explicitly given: Ex. Alice knows recently Mark is sick Mark participates in this social network Mark makes 3 friends. (vertex degree attack) 18

19 COMMUNITY IDENTIFICATION Community information is not given: Ex. Alice knows Mark participates in this social network and has 3 friends. (vertex degree attack) è Alice can know the approximation of Bob s neighborhood. 19

20 NEW PRIVACY MODEL AGAINST COMMUNITY IDENTIFICATION L-Structural Diversity To protect against vertex degree attack, for each vertex, there should be other vertices with the same degree located in at least L-1 other communities. 20

21 PRIVACY MODEL: K W -STRUCTURAL DIVERSITY ANONYMITY G A release of a social network satisfies L-structural diversity, if for every node, there exists a l-shielding group.??? A group θ d, consisting of all vertices of degree d, is a l-shielding group if there is a vertex subset θ θ d s. t. (1) θ L, and (2) any two vertices u and v in θ, C v C v = ø, where C is the community identity. Ex. Mary has four friends. 21

22 THE ANONYMIZATION Problem formulation: Given a graph G(V, E, C) and an integer k, 1 L C, the problem is to anonymize G to satisfy L-structural diversity such that information distortion is minimized. The challenges: Trade off between data utility and data privacy Scalability of anonymization techniques 22

23 THE PROBLEM IN DYNAMIC SCENARIOS A dynamic social network will be sequentially released. G 1 G 2 An attacker can monitor a victim for a period w. Therefore, the adversary knowledge includes: The releases G t-w+1, G t-w+2,, G t during w A degree sequence Δ vw =(d v t-w+1, d v t-w+2,, d vt ) of a victim v during w Ex. John has two friends at time 1, and makes a new friend at time 2. 23

24 PRIVACY MODEL: K W -STRUCTURAL DIVERSITY ANONYMITY Dynamic scenarios of w>1 A consistent group Θ Δ is the set of vertices The adversary knowledge of includes: 1. The releases G t-w +1, G t-w+2,, G t during w 2. A degree sequence Δ vw =(d v t-w+1, d v t-w+2,, d vt ) of a victim v during w that always share the same degree during w. A consistent group Θ Δ is a l-shielding if at each time instant t in w, there is a vertex subset Θ t Θ Δ s. t. (1) Θ t L, and (2) any two vertices u and v in Θ t, C v t C v t = ø, where C t is the community identity at time t. 24

25 THE ANONYMIZATION Problem formulation: Suppose that every vertex in a series of sequential releases G t-w+1, G t-w+2,, G t-1 is protected. Given G t-w+1, G t-w+2,, G t-1 and L, anonymize the current social network G t s. t. every vertex is protected in a L-shielding consistent group. The challenges: The anonymization is depended on not only the current social network but also previous w-1 releases. Searching through all the w-1 releases to eliminate privacy leak is time consuming. 25

26 PRIVACY-PRESERVING DATA ANALYSIS

27 DATA PRIVACY VS. DATA ANALYSIS Data mining has shown its great promise in various fields. Business, Medical treatment, Networks, Bioinformatics,... For those who lack of expertise in data analysis and/or computing resources... Data Owner Mining Services Provider (Cloud Computing) 27

28 DATA PRIVACY VS. DATA ANALYSIS Data Is Money!!! Data Owner Privacy?! Mining Services Provider (Cloud Computing) 28

29 29

30 PRIVACY CONCERNS IN DATA SHARING Privacy-preserving outsourcing techniques without sacrificing data utility E.g., Mining patterns C.-H. Tai, P. S. Yu, and M.-S. Chen, "k-support Anonymity based on Pseudo Taxonomy for Outsourcing of Frequent Itemset Mining," In KDD, C.-H. Tai, J.-W. Huang, M.-H. Chung, "Privacy Preserving Frequent Pattern Mining on Multi-Cloud Environment, In SBAST, E.g., Similarity measurement Y.-W. Chu, C.-H. Tai, M.-S. Chen and P. S. Yu, "Privacypreserving SimRank over Distributed Information Network," In ICDM,

31 PRIVACY-PRESERVING OUTSOURCING OF FREQUENT ITEM SET MINING

32 FREQUENT ITEMSET MINING (FIM) Discover what happened frequently Trans. ID Items wine cigar, wine cigar, tea beer, cigar, wine beer, tea, wine When threshold set as 3 (=60%), {wine} and {cigar} are frequent. When threshold set as 2 (=40%), {wine}, {cigar}, {tea}, {beer}, {wine, cigar}, and {wine, beer} are frequent. 32

33 THE RISKS OF OUTSOURCING FIM Encryption/decryption method is believed as the possible solution. How to Data achieve Owner the encryption and decryption? Privacy protected Mining Services Provider (Cloud Computing) Correct mining results Reasonable overhead 33

34 THE RISKS OF OUTSOURCING FIM Trans. ID Items Trans. ID Items 1 wine 1 a 2 3 cigar, wine cigar, tea Encrypt 2 3 a, c c, d 4 beer, cigar, wine 4 a, b, c 5 beer, tea, wine 5 a, b, d 34

35 THE RISKS OF OUTSOURCING FIM Top frequency attack Wine is the most frequent item à a is wine Approximate support attack The support of cigar is about 55%~60% à c is cigar Trans. ID Items Trans. ID Items 1 wine 1 a 2 cigar, wine Encrypt 2 a, c 3 cigar, tea 3 c, d 4 beer, cigar, wine 4 a, b, c 5 beer, tea, wine 5 a, b, d 35

36 THE RISKS OF OUTSOURCING FIM The support information about the frequent itemsets can be utilized to effectively reveal the raw data as well as the sensitive Wine information is the most from frequent the anonymized item à a is transactions. wine Top frequency attack Approximate support attack T. Mielik ainen. Privacy problems with anonymized The support of cigar is about 55%~60% à c is cigar transaction databases. In Proc. of Discovery Science, The Risks of Outsourcing FIM Trans. ID Items wine cigar, wine cigar, tea Encrypt Trans. ID Items a a, c c, d 4 beer, cigar, wine 4 a, b, c 5 beer, tea, wine 5 a, b, d 36

37 RELATED WORKS Encrypt each real items by a one-many mapping function. Wong, W. K., Cheung, D. W., Hung, E., Kao, B., Mamoulis, N.: Security in Outsourcing of Association Rule Mining. In: Proc. of VLDB, However, it does not try to anonymize the support information. Recently it is cracked. Molloy, I., Li, N., Li, T.: On the (In)Security and (Im)Practicality of Outsourcing Precise Association Rule Mining. In: Proc. of ICDM,

38 K-SUPPORT ANONYMITY & ANONYMIZATION For every sensitive item, there are at least k-1 other items of the same support. The probability of an item being correctly re-identified is limited to 1/k, even when the precise support information is known. Given a transactional database T, encrypt T into E(T) such that There exist a decryption function D such that MiningResult(T, Δ)= D(MiningResult(E(T), Δ)), for any minimal support Δ. E(T) is k-support anonymous. 38

39 ANONYMIZATION EXAMPLE: ENCRYPTION k Trans. ID Items wine cigar, wine cigar, tea a beer e b cigar i c f wine d g j h tea 4 5 beer, cigar, wine beer, tea, wine Encrypt with k=3 Trans. ID Items 1 c, d, g 2 b, d, g 3 b, h 4 a, b, c 5 a, c, d, h 39

40 SUMMARY Many fields such as marketing, business, healthcare, software engineering, government, to new a few, has received great benefit through data analysis While enjoying the benefit of data analysis, it is also important to take care of privacy issues in both data analysis process and the release of data pieces. 40

41 THANK YOU~!

Privacy Preserving Outsourcing for Frequent Itemset Mining

Privacy Preserving Outsourcing for Frequent Itemset Mining Privacy Preserving Outsourcing for Frequent Itemset Mining M. Arunadevi 1, R. Anuradha 2 PG Scholar, Department of Software Engineering, Sri Ramakrishna Engineering College, Coimbatore, India 1 Assistant

More information

International Journal of Scientific & Engineering Research, Volume 4, Issue 10, October-2013 ISSN 2229-5518 1582

International Journal of Scientific & Engineering Research, Volume 4, Issue 10, October-2013 ISSN 2229-5518 1582 1582 AN EFFICIENT CRYPTOGRAPHIC APPROACH FOR PRESERVING PRIVACY IN DATA MINING T.Sujitha 1, V.Saravanakumar 2, C.Saravanabhavan 3 1. M.E. Student, Sujiraj.me@gmail.com 2. Assistant Professor, visaranams@yahoo.co.in

More information

Hui(Wendy) Wang Stevens Institute of Technology New Jersey, USA. VLDB Cloud Intelligence workshop, 2012

Hui(Wendy) Wang Stevens Institute of Technology New Jersey, USA. VLDB Cloud Intelligence workshop, 2012 Integrity Verification of Cloud-hosted Data Analytics Computations (Position paper) Hui(Wendy) Wang Stevens Institute of Technology New Jersey, USA 9/4/ 1 Data-Analytics-as-a- Service (DAaS) Outsource:

More information

Data attribute security and privacy in distributed database system

Data attribute security and privacy in distributed database system IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 2, Ver. V (Mar-Apr. 2014), PP 27-33 Data attribute security and privacy in distributed database system

More information

Privacy-Preserving in Outsourced Transaction Databases from Association Rules Mining

Privacy-Preserving in Outsourced Transaction Databases from Association Rules Mining Privacy-Preserving in Outsourced Transaction Databases from Association Rules Mining Ms. Deokate Pallavi B., Prof. M.M. Waghmare 2 Student of ME (Information Technology), DGOFFE, University of Pune, Pune

More information

Proposing a Novel Synergized K-Degree L-Diversity T- Closeness Model for Graph Based Data Anonymization

Proposing a Novel Synergized K-Degree L-Diversity T- Closeness Model for Graph Based Data Anonymization Proposing a Novel Synergized K-Degree L-Diversity T- Closeness Model for Graph Based Data Anonymization S.Charanyaa 1, K.Sangeetha 2 M.Tech. Student, Dept of Information Technology, S.N.S. College of Technology,

More information

BSS Homomorphic Encryption: A Privacy model for large transactional database

BSS Homomorphic Encryption: A Privacy model for large transactional database International Journal of Engineering Research and Development e-issn: 78-067X, p-issn: 78-800X, www.ijerd.com Volume 9, Issue 5 (December 0), PP. 5-59 BSS Homomorphic Encryption: A Privacy model for large

More information

Security in Outsourcing of Association Rule Mining

Security in Outsourcing of Association Rule Mining Security in Outsourcing of Association Rule Mining Wai Kit Wong, David Cheung, Ben Kao and Nikos Mamoulis, The University of Hong Kong Edward Hung, The Hong Kong Polytechnic University VLDB 2007, Vienna,

More information

Anonymization: Enhancing Privacy and Security of Sensitive Data of Online Social Networks

Anonymization: Enhancing Privacy and Security of Sensitive Data of Online Social Networks Anonymization: Enhancing Privacy and Security of Sensitive Data of Online Social Networks Mr.Gaurav.P.R. PG Student, Dept.Of CS&E S.J.M.I.T Chitradurga, India Mr.Gururaj.T M.Tech Associate Professor, Dept.Of

More information

A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA

A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA U.Pandi Priya 1, R.Padma Priya 2 1 Research Scholar, Department of Computer Science and Information Technology,

More information

Privacy-Preserving Mining of Association Rules On Cloud by improving Rob Frugal Algorithm

Privacy-Preserving Mining of Association Rules On Cloud by improving Rob Frugal Algorithm Privacy-Preserving Mining of Association Rules On Cloud by improving Rob Frugal Algorithm Mr.Vishal R. Redekar Department of Computer Engineering Smt.Kashibai Navale College of Engineering Pune-411041,

More information

Information Security in Big Data using Encryption and Decryption

Information Security in Big Data using Encryption and Decryption International Research Journal of Computer Science (IRJCS) ISSN: 2393-9842 Information Security in Big Data using Encryption and Decryption SHASHANK -PG Student II year MCA S.K.Saravanan, Assistant Professor

More information

Homomorphic Encryption Schema for Privacy Preserving Mining of Association Rules

Homomorphic Encryption Schema for Privacy Preserving Mining of Association Rules Homomorphic Encryption Schema for Privacy Preserving Mining of Association Rules M.Sangeetha 1, P. Anishprabu 2, S. Shanmathi 3 Department of Computer Science and Engineering SriGuru Institute of Technology

More information

Preserving Privacy and Frequent Sharing Patterns for Social Network Data Publishing

Preserving Privacy and Frequent Sharing Patterns for Social Network Data Publishing Preserving Privacy and Frequent Sharing Patterns for Social Network Data Publishing Benjamin C. M. Fung CIISE, Concordia University Montreal, QC, Canada fung@ciise.concordia.ca Yan an Jin Huazhong University

More information

A Privacy-preserving Approach for Records Management in Cloud Computing. Eun Park and Benjamin Fung. School of Information Studies McGill University

A Privacy-preserving Approach for Records Management in Cloud Computing. Eun Park and Benjamin Fung. School of Information Studies McGill University A Privacy-preserving Approach for Records Management in Cloud Computing Eun Park and Benjamin Fung School of Information Studies McGill University Digital transformation Privacy Conflict? Health service

More information

Performing Data Mining in (SRMS) through Vertical Approach with Association Rules

Performing Data Mining in (SRMS) through Vertical Approach with Association Rules Performing Data Mining in (SRMS) through Vertical Approach with Association Rules Mr. Ambarish S. Durani 1 and Miss. Rashmi B. Sune 2 MTech (III rd Sem), Vidharbha Institute of Technology, Nagpur, Nagpur

More information

Multi-table Association Rules Hiding

Multi-table Association Rules Hiding Multi-table Association Rules Hiding Shyue-Liang Wang 1 and Tzung-Pei Hong 2 1 Department of Information Management 2 Department of Computer Science and Information Engineering National University of Kaohsiung

More information

A Brief Survey on Anonymization Techniques for Privacy Preserving Publishing of Social Network Data

A Brief Survey on Anonymization Techniques for Privacy Preserving Publishing of Social Network Data A Brief Survey on Anonymization Techniques for Privacy Preserving Publishing of Social Network Data Bin Zhou School of Computing Science Simon Fraser University, Canada bzhou@cs.sfu.ca Jian Pei School

More information

PRIVACY PRESERVING ASSOCIATION RULE MINING

PRIVACY PRESERVING ASSOCIATION RULE MINING Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 10, October 2014,

More information

Privacy Preserving Publishing of Social Network Data Privacy and Big Data Mining

Privacy Preserving Publishing of Social Network Data Privacy and Big Data Mining Privacy Preserving Publishing of Social Network Data Privacy and Big Data Mining Suma Reddy 1, Shilpa G V 2 1 PG Scholar, 2 Asst.Professor, Department of Computer Science and Engineering, Vemana IT, Bengaluru-34

More information

Policy-based Pre-Processing in Hadoop

Policy-based Pre-Processing in Hadoop Policy-based Pre-Processing in Hadoop Yi Cheng, Christian Schaefer Ericsson Research Stockholm, Sweden yi.cheng@ericsson.com, christian.schaefer@ericsson.com Abstract While big data analytics provides

More information

AN IMPROVED PRIVACY PRESERVING ALGORITHM USING ASSOCIATION RULE MINING(27-32) AN IMPROVED PRIVACY PRESERVING ALGORITHM USING ASSOCIATION RULE MINING

AN IMPROVED PRIVACY PRESERVING ALGORITHM USING ASSOCIATION RULE MINING(27-32) AN IMPROVED PRIVACY PRESERVING ALGORITHM USING ASSOCIATION RULE MINING AN IMPROVED PRIVACY PRESERVING ALGORITHM USING ASSOCIATION RULE MINING Ravindra Kumar Tiwari Ph.D Scholar, Computer Sc. AISECT University, Bhopal Abstract-The recent advancement in data mining technology

More information

Outsourcing Privacy-Preserving Social Networks to a Cloud

Outsourcing Privacy-Preserving Social Networks to a Cloud Outsourcing Privacy-Preserving Social Networks to a Cloud Guojun Wang, Qin Liu, Feng Li, Shuhui Yang, and Jie Wu School of Information Science and Engineering, Central South University, P. R. China Department

More information

IMPROVED BYZANTINE FAULT TOLERANCE TWO PHASE COMMIT PROTOCOL

IMPROVED BYZANTINE FAULT TOLERANCE TWO PHASE COMMIT PROTOCOL IMPROVED BYZANTINE FAULT TOLERANCE TWO PHASE COMMIT PROTOCOL Robert Benny.B 1, Saravanan.M.C 2 1 PG Scholar, Dhanalakshmi Srinivasan College of Engineering, Coimbatore. 2 Asstistant Professor, Dhanalakshmi

More information

Secure Data Sharing in Cloud Computing using Hybrid cloud

Secure Data Sharing in Cloud Computing using Hybrid cloud International Journal of Electronics and Computer Science Engineering 144 Available Online at www.ijecse.org ISSN: 2277-1956 Secure Data Sharing in Cloud Computing using Hybrid cloud Er. Inderdeep Singh

More information

A Brief Survey on Anonymization Techniques for Privacy Preserving Publishing of Social Network Data

A Brief Survey on Anonymization Techniques for Privacy Preserving Publishing of Social Network Data A Brief Survey on Anonymization Techniques for Privacy Preserving Publishing of Social Network Data Bin Zhou School of Computing Science Simon Fraser University, Canada bzhou@cs.sfu.ca Jian Pei School

More information

Privacy-by-design in big data analytics and social mining

Privacy-by-design in big data analytics and social mining Monreale et al. EPJ Data Science 2014, 2014:10 REGULAR ARTICLE OpenAccess Privacy-by-design in big data analytics and social mining Anna Monreale 1,2*, Salvatore Rinzivillo 2, Francesca Pratesi 1,2, Fosca

More information

Data Outsourcing based on Secure Association Rule Mining Processes

Data Outsourcing based on Secure Association Rule Mining Processes , pp. 41-48 http://dx.doi.org/10.14257/ijsia.2015.9.3.05 Data Outsourcing based on Secure Association Rule Mining Processes V. Sujatha 1, Debnath Bhattacharyya 2, P. Silpa Chaitanya 3 and Tai-hoon Kim

More information

Security in Outsourcing of Association Rule Mining

Security in Outsourcing of Association Rule Mining Security in Outsourcing of Association Rule Mining W. K. Wong The University of Hong Kong wkwong2@cs.hku.hk David W. Cheung The University of Hong Kong dcheung@cs.hku.hk Ben Kao The University of Hong

More information

A Novel Technique of Privacy Protection. Mining of Association Rules from Outsourced. Transaction Databases

A Novel Technique of Privacy Protection. Mining of Association Rules from Outsourced. Transaction Databases A Novel Technique of Privacy Protection Mining of Association Rules from Outsource Transaction Databases 1 Dhananjay D. Wadkar, 2 Santosh N. Shelke 1 Computer Engineering, Sinhgad Academy of Engineering

More information

Data Privacy in Remote Data Integrity Checking for Secure Cloud Storage

Data Privacy in Remote Data Integrity Checking for Secure Cloud Storage Data Privacy in Remote Data Integrity Checking for Secure Cloud Storage Yong Yu Centre for Computer and Information Security University of Wollongong Australia 1 Yong Yu, Man Ho Au, Yi Mu, Willy Susilo

More information

Privacy Preserved Association Rule Mining For Attack Detection and Prevention

Privacy Preserved Association Rule Mining For Attack Detection and Prevention Privacy Preserved Association Rule Mining For Attack Detection and Prevention V.Ragunath 1, C.R.Dhivya 2 P.G Scholar, Department of Computer Science and Engineering, Nandha College of Technology, Erode,

More information

Secure Personal Information by Analyzing Online Social Networks

Secure Personal Information by Analyzing Online Social Networks Secure Personal Information by Analyzing Online Social Networks T. Satyendra kumar 1, C.Vijaya Rani 2 Assistant Professor, Dept. of C.S.E, S.V. Engineering College for Women, Tirupati, Chittoor, Andhra

More information

Current Developments of k-anonymous Data Releasing

Current Developments of k-anonymous Data Releasing Current Developments of k-anonymous Data Releasing Jiuyong Li 1 Hua Wang 1 Huidong Jin 2 Jianming Yong 3 Abstract Disclosure-control is a traditional statistical methodology for protecting privacy when

More information

An Anonymization-Based Approach For Privacy-Preserving BPaaS

An Anonymization-Based Approach For Privacy-Preserving BPaaS Cloud Intelligence A VLDB 2012 Workshop An Anonymization-Based Approach For Privacy-Preserving BPaaS Mehdi Bentounsi, S. Benbernou, M.J. Atallah and C. Deme Université Paris Descartes, France mehdi.bentounsi@parisdescartes.fr.

More information

Arnab Roy Fujitsu Laboratories of America and CSA Big Data WG

Arnab Roy Fujitsu Laboratories of America and CSA Big Data WG Arnab Roy Fujitsu Laboratories of America and CSA Big Data WG 1 Security Analytics Crypto and Privacy Technologies Infrastructure Security 60+ members Framework and Taxonomy Chair - Sree Rajan, Fujitsu

More information

Anonymizing Healthcare Data: A Case Study on the Blood Transfusion Service

Anonymizing Healthcare Data: A Case Study on the Blood Transfusion Service Anonymizing Healthcare Data: A Case Study on the Blood Transfusion Service Noman Mohammed Benjamin C. M. Fung Patrick C. K. Hung Cheuk-kwong Lee CIISE, Concordia University, Montreal, QC, Canada University

More information

Enhancement of Security in Distributed Data Mining

Enhancement of Security in Distributed Data Mining Enhancement of Security in Distributed Data Mining Sharda Darekar 1, Prof.D.K.Chitre, 2 1,2 Department Of Computer Engineering, Terna Engineering College,Nerul,Navi Mumbai. 1 sharda.darekar@gmail.com,

More information

Secure Computation Martin Beck

Secure Computation Martin Beck Institute of Systems Architecture, Chair of Privacy and Data Security Secure Computation Martin Beck Dresden, 05.02.2015 Index Homomorphic Encryption The Cloud problem (overview & example) System properties

More information

131-1. Adding New Level in KDD to Make the Web Usage Mining More Efficient. Abstract. 1. Introduction [1]. 1/10

131-1. Adding New Level in KDD to Make the Web Usage Mining More Efficient. Abstract. 1. Introduction [1]. 1/10 1/10 131-1 Adding New Level in KDD to Make the Web Usage Mining More Efficient Mohammad Ala a AL_Hamami PHD Student, Lecturer m_ah_1@yahoocom Soukaena Hassan Hashem PHD Student, Lecturer soukaena_hassan@yahoocom

More information

DATA MINING - 1DL360

DATA MINING - 1DL360 DATA MINING - 1DL360 Fall 2013" An introductory class in data mining http://www.it.uu.se/edu/course/homepage/infoutv/per1ht13 Kjell Orsborn Uppsala Database Laboratory Department of Information Technology,

More information

2014 Only Influencers Email Marketing Salary Guide

2014 Only Influencers Email Marketing Salary Guide 2014 Only Influencers Email Marketing Salary Guide by Bill McCloskey, Only Influencers EMAIL MARKETING SALARIES (ALL)... 2 EMAIL MARKETING SALARIES BROKEN OUT BY SEX... 3 (ALL RESULTS MALE ONLY)... 3 (ALL

More information

Information Security in Big Data: Privacy and Data Mining (IEEE, 2014) Dilara USTAÖMER 2065787

Information Security in Big Data: Privacy and Data Mining (IEEE, 2014) Dilara USTAÖMER 2065787 Information Security in Big Data: Privacy and Data Mining (IEEE, 2014) Dilara USTAÖMER 2065787 2015/5/13 OUTLINE Introduction User Role Based Methodology Data Provider Data Collector Data Miner Decision

More information

Protein Protein Interaction Networks

Protein Protein Interaction Networks Functional Pattern Mining from Genome Scale Protein Protein Interaction Networks Young-Rae Cho, Ph.D. Assistant Professor Department of Computer Science Baylor University it My Definition of Bioinformatics

More information

Identity Obfuscation in Graphs Through the Information Theoretic Lens

Identity Obfuscation in Graphs Through the Information Theoretic Lens Identity Obfuscation in Graphs Through the Information Theoretic Lens Francesco Bonchi #1, Aristides Gionis #2, Tamir Tassa 3 # Yahoo! Research, Barcelona, Spain 1 bonchi@yahoo-inc.com 2 gionis@yahoo-inc.com

More information

Encryption for Cloud Services Security: Problem or Panacea? @Zulfikar_Ramzan / CTO / www.elastica.net

Encryption for Cloud Services Security: Problem or Panacea? @Zulfikar_Ramzan / CTO / www.elastica.net Encryption for Cloud Services Security: Problem or Panacea? @Zulfikar_Ramzan / CTO / www.elastica.net Tectonic Shift in the Market SaaS On-Premise Many pieces to Buy, Assemble & Operate No visibility /

More information

How To Create A Privacy Preserving And Dynamic Load Balancing System In A Distributed System

How To Create A Privacy Preserving And Dynamic Load Balancing System In A Distributed System Enforcing Secure and Privacy-Preserving Information Brokering with Dynamic Load Balancing in Distributed Information Sharing. 1 M.E. Computer Engineering Department GHRCEM, Wagholi, Pune. Jyotimore2283@gmail.com

More information

COST EFFECTIVE PRIVACY PRESERVED INTERMEDIATE DATASETS FOR CLOUD DATA SERVICES

COST EFFECTIVE PRIVACY PRESERVED INTERMEDIATE DATASETS FOR CLOUD DATA SERVICES COST EFFECTIVE PRIVACY PRESERVED INTERMEDIATE DATASETS FOR CLOUD DATA SERVICES Chaya.Y.K 1, Bharathi V Kalmath 2 1 PG Student, Department of CSE, S.V.C.E,Bengaluru 2 Asst.Professor, Department of CSE,

More information

NSF Workshop on Big Data Security and Privacy

NSF Workshop on Big Data Security and Privacy NSF Workshop on Big Data Security and Privacy Report Summary Bhavani Thuraisingham The University of Texas at Dallas (UTD) February 19, 2015 Acknowledgement NSF SaTC Program for support Chris Clifton and

More information

A Secure Decentralized Access Control Scheme for Data stored in Clouds

A Secure Decentralized Access Control Scheme for Data stored in Clouds A Secure Decentralized Access Control Scheme for Data stored in Clouds Priyanka Palekar 1, Abhijeet Bharate 2, Nisar Anjum 3 1 SKNSITS, University of Pune 2 SKNSITS, University of Pune 3 SKNSITS, University

More information

Li Xiong, Emory University

Li Xiong, Emory University Healthcare Industry Skills Innovation Award Proposal Hippocratic Database Technology Li Xiong, Emory University I propose to design and develop a course focused on the values and principles of the Hippocratic

More information

Arnab Roy Fujitsu Laboratories of America and CSA Big Data WG

Arnab Roy Fujitsu Laboratories of America and CSA Big Data WG Arnab Roy Fujitsu Laboratories of America and CSA Big Data WG 1 The Big Data Working Group (BDWG) will be identifying scalable techniques for data-centric security and privacy problems. BDWG s investigation

More information

Evaluating Online Payment Transaction Reliability using Rules Set Technique and Graph Model

Evaluating Online Payment Transaction Reliability using Rules Set Technique and Graph Model Evaluating Online Payment Transaction Reliability using Rules Set Technique and Graph Model Trung Le 1, Ba Quy Tran 2, Hanh Dang Thi My 3, Thanh Hung Ngo 4 1 GSR, Information System Lab., University of

More information

IncSpan: Incremental Mining of Sequential Patterns in Large Database

IncSpan: Incremental Mining of Sequential Patterns in Large Database IncSpan: Incremental Mining of Sequential Patterns in Large Database Hong Cheng Department of Computer Science University of Illinois at Urbana-Champaign Urbana, Illinois 61801 hcheng3@uiuc.edu Xifeng

More information

ACL Based Dynamic Network Reachability in Cross Domain

ACL Based Dynamic Network Reachability in Cross Domain South Asian Journal of Engineering and Technology Vol.2, No.15 (2016) 68 72 ISSN No: 2454-9614 ACL Based Dynamic Network Reachability in Cross Domain P. Nandhini a, K. Sankar a* a) Department Of Computer

More information

A Q&A with the Commissioner: Big Data and Privacy Health Research: Big Data, Health Research Yes! Personal Data No!

A Q&A with the Commissioner: Big Data and Privacy Health Research: Big Data, Health Research Yes! Personal Data No! A Q&A with the Commissioner: Big Data and Privacy Health Research: Big Data, Health Research Yes! Personal Data No! Ann Cavoukian, Ph.D. Information and Privacy Commissioner Ontario, Canada THE AGE OF

More information

Access-Private Outsourcing of Markov Chain and Random Walk based Data Analysis Applications

Access-Private Outsourcing of Markov Chain and Random Walk based Data Analysis Applications Access-Private Outsourcing of Markov Chain and Random Walk based Data Analysis Applications Ping Lin, KSelçuk Candan Department of Computer Science and Engineering Arizona State University Tempe, AZ,85287-5406,

More information

Secure and Efficient Data Retrieval Process based on Hilbert Space Filling Curve

Secure and Efficient Data Retrieval Process based on Hilbert Space Filling Curve Secure and Efficient Data Retrieval Process based on Hilbert Space Filling Curve N.S. Jeya karthikka PG Scholar Sri Ramakrishna Engg Collg S.Bhaggiaraj Assistant Professor Sri Ramakrishna Engg Collg V.Sumathy

More information

MINING THE DATA FROM DISTRIBUTED DATABASE USING AN IMPROVED MINING ALGORITHM

MINING THE DATA FROM DISTRIBUTED DATABASE USING AN IMPROVED MINING ALGORITHM MINING THE DATA FROM DISTRIBUTED DATABASE USING AN IMPROVED MINING ALGORITHM J. Arokia Renjit Asst. Professor/ CSE Department, Jeppiaar Engineering College, Chennai, TamilNadu,India 600119. Dr.K.L.Shunmuganathan

More information

MALLET-Privacy Preserving Influencer Mining in Social Media Networks via Hypergraph

MALLET-Privacy Preserving Influencer Mining in Social Media Networks via Hypergraph MALLET-Privacy Preserving Influencer Mining in Social Media Networks via Hypergraph Janani K 1, Narmatha S 2 Assistant Professor, Department of Computer Science and Engineering, Sri Shakthi Institute of

More information

An Efficient Multi-Keyword Ranked Secure Search On Crypto Drive With Privacy Retaining

An Efficient Multi-Keyword Ranked Secure Search On Crypto Drive With Privacy Retaining An Efficient Multi-Keyword Ranked Secure Search On Crypto Drive With Privacy Retaining 1 B.Sahaya Emelda and 2 Mrs. P. Maria Jesi M.E.,Ph.D., 1 PG Student and 2 Associate Professor, Department of Computer

More information

Secure Group Oriented Data Access Model with Keyword Search Property in Cloud Computing Environment

Secure Group Oriented Data Access Model with Keyword Search Property in Cloud Computing Environment Secure Group Oriented Data Access Model with Keyword Search Property in Cloud Computing Environment Chih Hung Wang Computer Science and Information Engineering National Chiayi University Chiayi City 60004,

More information

Big Data Analytics in Mobile Environments

Big Data Analytics in Mobile Environments 1 Big Data Analytics in Mobile Environments 熊 辉 教 授 罗 格 斯 - 新 泽 西 州 立 大 学 2012-10-2 Rutgers, the State University of New Jersey Why big data: historical view? Productivity versus Complexity (interrelatedness,

More information

Centralized and Distributed Anonymization for High-Dimensional Healthcare Data

Centralized and Distributed Anonymization for High-Dimensional Healthcare Data Centralized and Distributed Anonymization for High-Dimensional Healthcare Data NOMAN MOHAMMED and BENJAMIN C. M. FUNG Concordia University PATRICK C. K. HUNG University of Ontario Institute of Technology

More information

Constrained Obfuscation of Relational Databases

Constrained Obfuscation of Relational Databases Constrained Obfuscation of Relational Databases Erez Shmueli a,b, Tomer Zrihen a,b, Ran Yahalom b, Tamir Tassa c a Department of Information Systems Engineering, Ben-Gurion University, Be er Sheva, Israel

More information

A Comprehensive Data Forwarding Technique under Cloud with Dynamic Notification

A Comprehensive Data Forwarding Technique under Cloud with Dynamic Notification Research Journal of Applied Sciences, Engineering and Technology 7(14): 2946-2953, 2014 ISSN: 2040-7459; e-issn: 2040-7467 Maxwell Scientific Organization, 2014 Submitted: July 7, 2013 Accepted: August

More information

Preserving Privacy in Social Networks Against Neighborhood Attacks

Preserving Privacy in Social Networks Against Neighborhood Attacks Preserving Privacy in Social Networks Against Neighborhood Attacks Bin Zhou Jian Pei School of Computing Science, Simon Fraser University 8888 University Drive, Burnaby, B.C., V5A1S6 Canada {bzhou, jpei}@cs.sfu.ca

More information

SECURITY ANALYSIS OF A SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTER NETWORKS

SECURITY ANALYSIS OF A SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTER NETWORKS SECURITY ANALYSIS OF A SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTER NETWORKS Abstract: The Single sign-on (SSO) is a new authentication mechanism that enables a legal user with a single credential

More information

Obfuscation of sensitive data in network flows 1

Obfuscation of sensitive data in network flows 1 Obfuscation of sensitive data in network flows 1 D. Riboni 2, A. Villani 1, D. Vitali 1 C. Bettini 2, L.V. Mancini 1 1 Dipartimento di Informatica,Universitá di Roma, Sapienza. E-mail: {villani, vitali,

More information

A SECURE DECISION SUPPORT ESTIMATION USING GAUSSIAN BAYES CLASSIFICATION IN HEALTH CARE SERVICES

A SECURE DECISION SUPPORT ESTIMATION USING GAUSSIAN BAYES CLASSIFICATION IN HEALTH CARE SERVICES A SECURE DECISION SUPPORT ESTIMATION USING GAUSSIAN BAYES CLASSIFICATION IN HEALTH CARE SERVICES K.M.Ruba Malini #1 and R.Lakshmi *2 # P.G.Scholar, Computer Science and Engineering, K. L. N College Of

More information

Big Data - Security and Privacy

Big Data - Security and Privacy Big Data - Security and Privacy Elisa Bertino CS Department, Cyber Center, and CERIAS Purdue University Cyber Center! Big Data EveryWhere! Lots of data is being collected, warehoused, and mined Web data,

More information

Privacy Protection in Personalized Web Search- A Survey

Privacy Protection in Personalized Web Search- A Survey Privacy Protection in Personalized Web Search- A Survey Greeshma A S. * Lekshmy P. L. M.Tech Student Assistant Professor Dept. of CSE & Kerala University Dept. of CSE & Kerala University Thiruvananthapuram

More information

Attacking Anonymized Social Network

Attacking Anonymized Social Network Attacking Anonymized Social Network From: Wherefore Art Thou RX3579X? Anonymized Social Networks, Hidden Patterns, and Structural Steganography Presented By: Machigar Ongtang (Ongtang@cse.psu.edu ) Social

More information

Privacy-preserving Data Mining: current research and trends

Privacy-preserving Data Mining: current research and trends Privacy-preserving Data Mining: current research and trends Stan Matwin School of Information Technology and Engineering University of Ottawa, Canada stan@site.uottawa.ca Few words about our research Universit[é

More information

Survey on Efficient Information Retrieval for Ranked Query in Cost-Efficient Clouds

Survey on Efficient Information Retrieval for Ranked Query in Cost-Efficient Clouds Survey on Efficient Information Retrieval for Ranked Query in Cost-Efficient Clouds Ms. Jyotsna T. Kumbhar 1 ME Student, Department of Computer Engineering, TSSM S, P.V.P.I.T., Bavdhan, Pune University,

More information

CS346: Advanced Databases

CS346: Advanced Databases CS346: Advanced Databases Alexandra I. Cristea A.I.Cristea@warwick.ac.uk Data Security and Privacy Outline Chapter: Database Security in Elmasri and Navathe (chapter 24, 6 th Edition) Brief overview of

More information

Privacy-Preserving Outsourcing Support Vector Machines with Random Transformation

Privacy-Preserving Outsourcing Support Vector Machines with Random Transformation Privacy-Preserving Outsourcing Support Vector Machines with Random Transformation Keng-Pei Lin Ming-Syan Chen Department of Electrical Engineering, National Taiwan University, Taipei, Taiwan Research Center

More information

Protecting Respondents' Identities in Microdata Release

Protecting Respondents' Identities in Microdata Release 1010 IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 13, NO. 6, NOVEMBER/DECEMBER 2001 Protecting Respondents' Identities in Microdata Release Pierangela Samarati, Member, IEEE Computer Society

More information

A Hybrid Data Mining Approach for Analysis of Patient Behaviors in RFID Environments

A Hybrid Data Mining Approach for Analysis of Patient Behaviors in RFID Environments A Hybrid Data Mining Approach for Analysis of Patient Behaviors in RFID Environments incent S. Tseng 1, Eric Hsueh-Chan Lu 1, Chia-Ming Tsai 1, and Chun-Hung Wang 1 Department of Computer Science and Information

More information

EFFECTIVE DATA RECOVERY FOR CONSTRUCTIVE CLOUD PLATFORM

EFFECTIVE DATA RECOVERY FOR CONSTRUCTIVE CLOUD PLATFORM INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE EFFECTIVE DATA RECOVERY FOR CONSTRUCTIVE CLOUD PLATFORM Macha Arun 1, B.Ravi Kumar 2 1 M.Tech Student, Dept of CSE, Holy Mary

More information

Sustaining Privacy Protection in Personalized Web Search with Temporal Behavior

Sustaining Privacy Protection in Personalized Web Search with Temporal Behavior Sustaining Privacy Protection in Personalized Web Search with Temporal Behavior N.Jagatheshwaran 1 R.Menaka 2 1 Final B.Tech (IT), jagatheshwaran.n@gmail.com, Velalar College of Engineering and Technology,

More information

Babel: Using a Common Bridge Node to Deliver Multiple Keys in Wireless Sensor Networks

Babel: Using a Common Bridge Node to Deliver Multiple Keys in Wireless Sensor Networks Babel: Using a Common Bridge Node to Deliver Multiple Keys in Wireless Sensor Networks Jing Deng Department of Computer Science University of New Orleans New Orleans, LA 7048, USA jing@cs.uno.edu Yunghsiang

More information

Project Participants

Project Participants Annual Report for Period:10/2006-09/2007 Submitted on: 08/15/2007 Principal Investigator: Yang, Li. Award ID: 0414857 Organization: Western Michigan Univ Title: Projection and Interactive Exploration of

More information

(Big) Data Anonymization Claude Castelluccia Inria, Privatics

(Big) Data Anonymization Claude Castelluccia Inria, Privatics (Big) Data Anonymization Claude Castelluccia Inria, Privatics BIG DATA: The Risks Singling-out/ Re-Identification: ADV is able to identify the target s record in the published dataset from some know information

More information

Privacy Challenges of Telco Big Data

Privacy Challenges of Telco Big Data Dr. Günter Karjoth June 17, 2014 ITU telco big data workshop Privacy Challenges of Telco Big Data Mobile phones are great sources of data but we must be careful about privacy 1 / 15 Sources of Big Data

More information

SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTING SECURITY ENVIRONMENT

SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTING SECURITY ENVIRONMENT SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTING SECURITY ENVIRONMENT K.karthika 1, M. Daya kanimozhi Rani 2 1 K.karthika, Assistant professor, Department of IT, Adhiyamaan College of Engineering, Hosur

More information

Privacy Preserving Mining of Transaction Databases Sunil R 1 Dr. N P Kavya 2

Privacy Preserving Mining of Transaction Databases Sunil R 1 Dr. N P Kavya 2 IJSRD - International Journal for Scientific Research & Development Vol. 2, Issue 04, 2014 ISSN (online): 2321-0613 Privacy Preserving Mining of Transaction Databases Sunil R 1 Dr. N P Kavya 2 1 M.Tech

More information

Anonymization of Administrative Billing Codes with Repeated Diagnoses Through Censoring

Anonymization of Administrative Billing Codes with Repeated Diagnoses Through Censoring Anonymization of Administrative Billing Codes with Repeated Diagnoses Through Censoring Acar Tamersoy, Grigorios Loukides PhD, Joshua C. Denny MD MS, and Bradley Malin PhD Department of Biomedical Informatics,

More information

A generalized Framework of Privacy Preservation in Distributed Data mining for Unstructured Data Environment

A generalized Framework of Privacy Preservation in Distributed Data mining for Unstructured Data Environment www.ijcsi.org 434 A generalized Framework of Privacy Preservation in Distributed Data mining for Unstructured Data Environment V.THAVAVEL and S.SIVAKUMAR* Department of Computer Applications, Karunya University,

More information

Degrees of De-identification of Clinical Research Data

Degrees of De-identification of Clinical Research Data Vol. 7, No. 11, November 2011 Can You Handle the Truth? Degrees of De-identification of Clinical Research Data By Jeanne M. Mattern Two sets of U.S. government regulations govern the protection of personal

More information

SURVEY ON: CLOUD DATA RETRIEVAL FOR MULTIKEYWORD BASED ON DATA MINING TECHNOLOGY

SURVEY ON: CLOUD DATA RETRIEVAL FOR MULTIKEYWORD BASED ON DATA MINING TECHNOLOGY SURVEY ON: CLOUD DATA RETRIEVAL FOR MULTIKEYWORD BASED ON DATA MINING TECHNOLOGY 1 Kavya G, 2 K.S. Rajesh 1 P.G Scholar, Dept. of Computer Science & Engineering RajaRajeswari College of Engineering, Bangalore,

More information

Privacy-preserving Ranked Multi-Keyword Search Leveraging Polynomial Function in Cloud Computing

Privacy-preserving Ranked Multi-Keyword Search Leveraging Polynomial Function in Cloud Computing Privacy-preserving Ranked Multi-Keyword Search Leveraging Polynomial Function in Cloud Computing Yanzhi Ren, Yingying Chen, Jie Yang, Bin Xie 3 Department of ECE, Stevens Institute of Technology, Hoboken,

More information

Top Ten Security and Privacy Challenges for Big Data and Smartgrids. Arnab Roy Fujitsu Laboratories of America

Top Ten Security and Privacy Challenges for Big Data and Smartgrids. Arnab Roy Fujitsu Laboratories of America 1 Top Ten Security and Privacy Challenges for Big Data and Smartgrids Arnab Roy Fujitsu Laboratories of America 2 User Roles and Security Concerns [SKCP11] Users and Security Concerns [SKCP10] Utilities:

More information

BIG DATA IN THE CLOUD : CHALLENGES AND OPPORTUNITIES MARY- JANE SULE & PROF. MAOZHEN LI BRUNEL UNIVERSITY, LONDON

BIG DATA IN THE CLOUD : CHALLENGES AND OPPORTUNITIES MARY- JANE SULE & PROF. MAOZHEN LI BRUNEL UNIVERSITY, LONDON BIG DATA IN THE CLOUD : CHALLENGES AND OPPORTUNITIES MARY- JANE SULE & PROF. MAOZHEN LI BRUNEL UNIVERSITY, LONDON Overview * Introduction * Multiple faces of Big Data * Challenges of Big Data * Cloud Computing

More information

A Model For Revelation Of Data Leakage In Data Distribution

A Model For Revelation Of Data Leakage In Data Distribution A Model For Revelation Of Data Leakage In Data Distribution Saranya.R Assistant Professor, Department Of Computer Science and Engineering Lord Jegannath college of Engineering and Technology Nagercoil,

More information

A study on keyword searchable frameworks for efficient data utilization in cloud storage

A study on keyword searchable frameworks for efficient data utilization in cloud storage A study on able frameworks for efficient data utilization in cloud storage Bhagyashree M V 1, Pushpalatha M N 2 1 Student, Dept. of ISE, M S Ramaiah institute of technology, Karnataka, India 2Asst. professor,

More information

Principles and Best Practices for Sharing Data from Environmental Health Research: Challenges Associated with Data-Sharing: HIPAA De-identification

Principles and Best Practices for Sharing Data from Environmental Health Research: Challenges Associated with Data-Sharing: HIPAA De-identification Principles and Best Practices for Sharing Data from Environmental Health Research: Challenges Associated with Data-Sharing: HIPAA De-identification Daniel C. Barth-Jones, M.P.H., Ph.D Assistant Professor

More information

Module outline. CS 458 / 658 Computer Security and Privacy. (Relational) Databases. Module outline. Module 6 Database Security and Privacy.

Module outline. CS 458 / 658 Computer Security and Privacy. (Relational) Databases. Module outline. Module 6 Database Security and Privacy. Module outline CS 458 / 658 Computer Security and Privacy Module 6 Database Security and Privacy Fall 2008 1 Introduction to databases 2 Security requirements 3 Data disclosure and inference 4 Multilevel

More information