05-big_data_privacy - BIG DATA PRIVACY AND GOVERNANCE CSIT...

This preview shows page 1 - 14 out of 54 pages.

BIG DATA PRIVACY ANDGOVERNANCECSIT 6000DSPRING 2017
BIG DATA SECURITY RELATED CHALLENGESBig data privacyThe protection of personal privacy, personal interests, habits and body properties, etc.of users may be more easily acquired, of which the user may not be awarePersonal privacy data may be leaked during storage, transmission, and usageData QualityBig data safety mechanismData encryption in large scale and high varietyBig data application in information securityOpportunities for the development of information security mechanisms
BIG DATA SECURITY CHALLENGESSource: CLOUD SECURITY ALLIANCE (CSA).“ExpandedTop Ten Big Data Security and PrivacyChallenges”.April 2013
BIG DATA PRIVACY
PRIVACY ISSUESsource: slashfilm.comsource: bestforfilm.com
PRIVACY ISSUESsource: predpol.comsource: gcn.com
PRIVACY ISSUESsource: allnewspipeline.com
PRIVACY ISSUES
PRIVACY ISSUESBig data is brining a new level of scale and capability not foreseen before onprivacyUsers have an inadequate understanding of how privacy violationsimpact individuals and social behaviorA lack of transparency regarding privacy policies or predictive analyticsapplied to usersA lack of data due process of lawUnplanned disclosures of dataFalse data or false analytic results shared, and difficult to make amendsthrough a data due processIt is possible to predict private traits using Big Data analytics
PRIVACY ISSUESA mismatch of provider’s claimed policies and the actual controlsavailable to usersEconomic incentive to disclose users’ dataPolicing incentive to use advanced surveillance techniques to gather dataTechnical limitations to some of the most advanced techniques revisedto allow analytics on private dataCentralization of information tilts the gain-loss trade-off in favor ofpotential attackers and intrudersInformation privacy laws are out of paceGovernment investigative agencies have a tendency to violate reasonableexpectation of privacy
PERSONALLY IDENTIFIABLE INFORMATIONPersonally identifiable information (PII)A legal concept“Informationthat can be used on its own or with other information toidentify, contact, or locate a single person, or to identify an individual incontext”Used in U.S. privacy laws
MODELS OF PRIVACY PROTECTIONComprehensive lawsAdopted by European Union, Canada,AustraliaSectoral lawsAdopted by USFinancial privacy, protected health informationLack of legal protections for individual’s privacy on the InternetSelf-regulationCompanies and industry bodies establish codes of practicePrivacy enhancing technologies
PRIVACY ENHANCING TECHNIQUESNumerous privacy-enhancing techniques have been proposed rangingfrom cryptographic techniques to data anonymizationSuch techniques either do not scale for large datasets and/or do notaddress the problem of reconciling security with privacy.

Upload your study docs or become a

Course Hero member to access this document

Upload your study docs or become a

Course Hero member to access this document

End of preview. Want to read all 54 pages?

Upload your study docs or become a

Course Hero member to access this document

Term
Spring
Professor
Qiang Yang

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture