SlideShare une entreprise Scribd logo
1  sur  17
Classification of Data in a
Multidimensional Dataset
Protecting Quasi-Identifiers
• Masking EI alone is not sufficient, as an adversary can still
use QI to re-identify a record owner
• This linking is called record linkage where a record from a
database is linked with a record in an external data source.
There are two important aspects that need to be
considered while anonymizing QI:
• The analytical utility of QI needs to be preserved
• The correlation of QI attributes with sensitive data needs to
be maintained to support the utility of anonymized data
Challenges in Protecting QI
• Protection of QI is key to the success of any anonymization program,
especially with respect to multidimensional data.
The main challenges in anonymizing QI attributes are
• High dimensionality
• Background knowledge of the adversary
• Availability of external knowledge
• Correlation with SD to ensure utility
• Maintaining analytical utility
Challenge!
• Principle (6) offers guidance
Principle of data structure complexity—Anonymization design is
dependent on the data structure.
• Another important aspect to consider while anonymizing QI
attributes is that the correlation between QI and SD attributes must
be maintained.
• For example, in a life insurance application, the age of a policy holder
and the premium she pays for a particular insurance product are
correlated.
• Here, AGE is a QI attribute and PREMIUM is an SD attribute.
• Therefore, as part of the anonymization, it is important to maintain
this relationship between QI and SD attributes wherever applicable.
“Higher the age, higher the premium"
• Another aspect that needs to be looked into is the analytical utility of
anonymized QI attributes.
Table a) Anonymized
Table b) Anonymized
• How many employees with EDUCATION = “Doctorate” are part of this
company?
• Perturbative method is used in the above tables for anonymization.
• Perturbative techniques are generally referred to as masking and non-
perturbative techniques as anonymization.
• QI attributes are generally composed of a record owner’s
demographics, which are available in external data sources, such as a
voters database.
• It is indeed a challenge to anonymize QI attributes especially in the
presence of external data sources, protect outlier records, and
provide high utility.
• Principle (13) comes into play here.
• One of the techniques suggested is group-based anonymization
where data are anonymized in a group-specific manner. This
technique is called k-anonymization.
• k-anonymity achieves this through suppression and generalization of
identifiers.
Protecting Sensitive Data (SD)
• Data protection design ensures that EI are completely masked and QI
are anonymized, leaving out SD in original form as it is required for
analysis or as test data.
• As EI are completely masked, the transformed data make no sense
and are not useful for re-identification, and properly anonymized QI
also prevent re-identification.
• If sensitive data are in original form, then it provides a channel for re-
identification.
Example: Anonymized SD
• Even though the data have been randomly perturbed, they have been
ensured that the mean and covariance of the original table and
perturbed tables are the same.
• This means that the transformed table is still valid for analysis
rendering the data to be useful at the same time maintaining the
privacy of the data.

Contenu connexe

Similaire à 11-Privacy Preserving Methods-20-02-2024 (1).pptx

Software Defined Networking in the ATMOSPHERE project
Software Defined Networking in the ATMOSPHERE projectSoftware Defined Networking in the ATMOSPHERE project
Software Defined Networking in the ATMOSPHERE projectATMOSPHERE .
 
GDPR Compliance Made Easy with Data Virtualization
GDPR Compliance Made Easy with Data VirtualizationGDPR Compliance Made Easy with Data Virtualization
GDPR Compliance Made Easy with Data VirtualizationDenodo
 
Module-1.pptxcjxifkgzkzigoyxyxoxoyztiai. Tisi
Module-1.pptxcjxifkgzkzigoyxyxoxoyztiai. TisiModule-1.pptxcjxifkgzkzigoyxyxoxoyztiai. Tisi
Module-1.pptxcjxifkgzkzigoyxyxoxoyztiai. TisiArunnaik63
 
Data masking techniques for Insurance
Data masking techniques for InsuranceData masking techniques for Insurance
Data masking techniques for InsuranceNIIT Technologies
 
SQLCAT: Addressing Security and Compliance Issues with SQL Server 2008
SQLCAT: Addressing Security and Compliance Issues with SQL Server 2008SQLCAT: Addressing Security and Compliance Issues with SQL Server 2008
SQLCAT: Addressing Security and Compliance Issues with SQL Server 2008Denny Lee
 
Lecture 2 - Security Requirments.ppt
Lecture 2 - Security Requirments.pptLecture 2 - Security Requirments.ppt
Lecture 2 - Security Requirments.pptDrBasemMohamedElomda
 
Enabling Use of Dynamic Anonymization for Enhanced Security in Cloud
Enabling Use of Dynamic Anonymization for Enhanced Security in CloudEnabling Use of Dynamic Anonymization for Enhanced Security in Cloud
Enabling Use of Dynamic Anonymization for Enhanced Security in CloudIOSR Journals
 
Privacies are coming
Privacies are comingPrivacies are coming
Privacies are comingErnest Staats
 
A P/C Insurance Data Modernization Journey Featuring Pekin Insurance, ValueMo...
A P/C Insurance Data Modernization Journey Featuring Pekin Insurance, ValueMo...A P/C Insurance Data Modernization Journey Featuring Pekin Insurance, ValueMo...
A P/C Insurance Data Modernization Journey Featuring Pekin Insurance, ValueMo...ValueMomentum
 
1. Security and Risk Management
1. Security and Risk Management1. Security and Risk Management
1. Security and Risk ManagementSam Bowne
 
Strategic Enterprise Risk and Data Architecture
Strategic Enterprise Risk and Data ArchitectureStrategic Enterprise Risk and Data Architecture
Strategic Enterprise Risk and Data ArchitectureSandeepMaira
 
GDPR and evolving international privacy regulations
GDPR and evolving international privacy regulationsGDPR and evolving international privacy regulations
GDPR and evolving international privacy regulationsUlf Mattsson
 
DATA MINING TOOL- ORANGE
DATA MINING TOOL- ORANGEDATA MINING TOOL- ORANGE
DATA MINING TOOL- ORANGENeeraj Goswami
 
Data Mining Module 1 Business Analytics.
Data Mining Module 1 Business Analytics.Data Mining Module 1 Business Analytics.
Data Mining Module 1 Business Analytics.Jayanti Pande
 

Similaire à 11-Privacy Preserving Methods-20-02-2024 (1).pptx (20)

Software Defined Networking in the ATMOSPHERE project
Software Defined Networking in the ATMOSPHERE projectSoftware Defined Networking in the ATMOSPHERE project
Software Defined Networking in the ATMOSPHERE project
 
Burton - Security, Privacy and Trust
Burton - Security, Privacy and TrustBurton - Security, Privacy and Trust
Burton - Security, Privacy and Trust
 
Intro to Data Management
Intro to Data ManagementIntro to Data Management
Intro to Data Management
 
GDPR Compliance Made Easy with Data Virtualization
GDPR Compliance Made Easy with Data VirtualizationGDPR Compliance Made Easy with Data Virtualization
GDPR Compliance Made Easy with Data Virtualization
 
Dealing with Dark Data
Dealing with Dark DataDealing with Dark Data
Dealing with Dark Data
 
Module-1.pptxcjxifkgzkzigoyxyxoxoyztiai. Tisi
Module-1.pptxcjxifkgzkzigoyxyxoxoyztiai. TisiModule-1.pptxcjxifkgzkzigoyxyxoxoyztiai. Tisi
Module-1.pptxcjxifkgzkzigoyxyxoxoyztiai. Tisi
 
Data masking techniques for Insurance
Data masking techniques for InsuranceData masking techniques for Insurance
Data masking techniques for Insurance
 
SQLCAT: Addressing Security and Compliance Issues with SQL Server 2008
SQLCAT: Addressing Security and Compliance Issues with SQL Server 2008SQLCAT: Addressing Security and Compliance Issues with SQL Server 2008
SQLCAT: Addressing Security and Compliance Issues with SQL Server 2008
 
Ch~2.pdf
Ch~2.pdfCh~2.pdf
Ch~2.pdf
 
Lecture 2 - Security Requirments.ppt
Lecture 2 - Security Requirments.pptLecture 2 - Security Requirments.ppt
Lecture 2 - Security Requirments.ppt
 
Enabling Use of Dynamic Anonymization for Enhanced Security in Cloud
Enabling Use of Dynamic Anonymization for Enhanced Security in CloudEnabling Use of Dynamic Anonymization for Enhanced Security in Cloud
Enabling Use of Dynamic Anonymization for Enhanced Security in Cloud
 
Privacies are coming
Privacies are comingPrivacies are coming
Privacies are coming
 
A P/C Insurance Data Modernization Journey Featuring Pekin Insurance, ValueMo...
A P/C Insurance Data Modernization Journey Featuring Pekin Insurance, ValueMo...A P/C Insurance Data Modernization Journey Featuring Pekin Insurance, ValueMo...
A P/C Insurance Data Modernization Journey Featuring Pekin Insurance, ValueMo...
 
1. Security and Risk Management
1. Security and Risk Management1. Security and Risk Management
1. Security and Risk Management
 
Strategic Enterprise Risk and Data Architecture
Strategic Enterprise Risk and Data ArchitectureStrategic Enterprise Risk and Data Architecture
Strategic Enterprise Risk and Data Architecture
 
Data attribute security and privacy in Collaborative distributed database Pub...
Data attribute security and privacy in Collaborative distributed database Pub...Data attribute security and privacy in Collaborative distributed database Pub...
Data attribute security and privacy in Collaborative distributed database Pub...
 
GDPR and evolving international privacy regulations
GDPR and evolving international privacy regulationsGDPR and evolving international privacy regulations
GDPR and evolving international privacy regulations
 
Goans-Helms-IT Security at Georgia Tech Library
Goans-Helms-IT Security at Georgia Tech LibraryGoans-Helms-IT Security at Georgia Tech Library
Goans-Helms-IT Security at Georgia Tech Library
 
DATA MINING TOOL- ORANGE
DATA MINING TOOL- ORANGEDATA MINING TOOL- ORANGE
DATA MINING TOOL- ORANGE
 
Data Mining Module 1 Business Analytics.
Data Mining Module 1 Business Analytics.Data Mining Module 1 Business Analytics.
Data Mining Module 1 Business Analytics.
 

Dernier

Fundamentals of Structure in C Programming
Fundamentals of Structure in C ProgrammingFundamentals of Structure in C Programming
Fundamentals of Structure in C ProgrammingChandrakantDivate1
 
Introduction to Artificial Intelligence ( AI)
Introduction to Artificial Intelligence ( AI)Introduction to Artificial Intelligence ( AI)
Introduction to Artificial Intelligence ( AI)ChandrakantDivate1
 
Computer Graphics Introduction To Curves
Computer Graphics Introduction To CurvesComputer Graphics Introduction To Curves
Computer Graphics Introduction To CurvesChandrakantDivate1
 
engineering chemistry power point presentation
engineering chemistry  power point presentationengineering chemistry  power point presentation
engineering chemistry power point presentationsj9399037128
 
Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Ramkumar k
 
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdflitvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdfAlexander Litvinenko
 
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...ronahami
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdfAldoGarca30
 
Artificial intelligence presentation2-171219131633.pdf
Artificial intelligence presentation2-171219131633.pdfArtificial intelligence presentation2-171219131633.pdf
Artificial intelligence presentation2-171219131633.pdfKira Dess
 
21P35A0312 Internship eccccccReport.docx
21P35A0312 Internship eccccccReport.docx21P35A0312 Internship eccccccReport.docx
21P35A0312 Internship eccccccReport.docxrahulmanepalli02
 
Overview of Transformation in Computer Graphics
Overview of Transformation in Computer GraphicsOverview of Transformation in Computer Graphics
Overview of Transformation in Computer GraphicsChandrakantDivate1
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxSCMS School of Architecture
 
Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...
Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...
Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...ssuserdfc773
 
Danikor Product Catalog- Screw Feeder.pdf
Danikor Product Catalog- Screw Feeder.pdfDanikor Product Catalog- Screw Feeder.pdf
Danikor Product Catalog- Screw Feeder.pdfthietkevietthinh
 
Degrees of freedom for the robots 1.pptx
Degrees of freedom for the robots 1.pptxDegrees of freedom for the robots 1.pptx
Degrees of freedom for the robots 1.pptxMostafa Mahmoud
 
History of Indian Railways - the story of Growth & Modernization
History of Indian Railways - the story of Growth & ModernizationHistory of Indian Railways - the story of Growth & Modernization
History of Indian Railways - the story of Growth & ModernizationEmaan Sharma
 
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdf
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdfInstruct Nirmaana 24-Smart and Lean Construction Through Technology.pdf
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdfEr.Sonali Nasikkar
 
Circuit Breakers for Engineering Students
Circuit Breakers for Engineering StudentsCircuit Breakers for Engineering Students
Circuit Breakers for Engineering Studentskannan348865
 
Introduction-to- Metrology and Quality.pptx
Introduction-to- Metrology and Quality.pptxIntroduction-to- Metrology and Quality.pptx
Introduction-to- Metrology and Quality.pptxProfASKolap
 
Working Principle of Echo Sounder and Doppler Effect.pdf
Working Principle of Echo Sounder and Doppler Effect.pdfWorking Principle of Echo Sounder and Doppler Effect.pdf
Working Principle of Echo Sounder and Doppler Effect.pdfSkNahidulIslamShrabo
 

Dernier (20)

Fundamentals of Structure in C Programming
Fundamentals of Structure in C ProgrammingFundamentals of Structure in C Programming
Fundamentals of Structure in C Programming
 
Introduction to Artificial Intelligence ( AI)
Introduction to Artificial Intelligence ( AI)Introduction to Artificial Intelligence ( AI)
Introduction to Artificial Intelligence ( AI)
 
Computer Graphics Introduction To Curves
Computer Graphics Introduction To CurvesComputer Graphics Introduction To Curves
Computer Graphics Introduction To Curves
 
engineering chemistry power point presentation
engineering chemistry  power point presentationengineering chemistry  power point presentation
engineering chemistry power point presentation
 
Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)
 
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdflitvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
 
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
 
Artificial intelligence presentation2-171219131633.pdf
Artificial intelligence presentation2-171219131633.pdfArtificial intelligence presentation2-171219131633.pdf
Artificial intelligence presentation2-171219131633.pdf
 
21P35A0312 Internship eccccccReport.docx
21P35A0312 Internship eccccccReport.docx21P35A0312 Internship eccccccReport.docx
21P35A0312 Internship eccccccReport.docx
 
Overview of Transformation in Computer Graphics
Overview of Transformation in Computer GraphicsOverview of Transformation in Computer Graphics
Overview of Transformation in Computer Graphics
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
 
Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...
Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...
Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...
 
Danikor Product Catalog- Screw Feeder.pdf
Danikor Product Catalog- Screw Feeder.pdfDanikor Product Catalog- Screw Feeder.pdf
Danikor Product Catalog- Screw Feeder.pdf
 
Degrees of freedom for the robots 1.pptx
Degrees of freedom for the robots 1.pptxDegrees of freedom for the robots 1.pptx
Degrees of freedom for the robots 1.pptx
 
History of Indian Railways - the story of Growth & Modernization
History of Indian Railways - the story of Growth & ModernizationHistory of Indian Railways - the story of Growth & Modernization
History of Indian Railways - the story of Growth & Modernization
 
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdf
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdfInstruct Nirmaana 24-Smart and Lean Construction Through Technology.pdf
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdf
 
Circuit Breakers for Engineering Students
Circuit Breakers for Engineering StudentsCircuit Breakers for Engineering Students
Circuit Breakers for Engineering Students
 
Introduction-to- Metrology and Quality.pptx
Introduction-to- Metrology and Quality.pptxIntroduction-to- Metrology and Quality.pptx
Introduction-to- Metrology and Quality.pptx
 
Working Principle of Echo Sounder and Doppler Effect.pdf
Working Principle of Echo Sounder and Doppler Effect.pdfWorking Principle of Echo Sounder and Doppler Effect.pdf
Working Principle of Echo Sounder and Doppler Effect.pdf
 

11-Privacy Preserving Methods-20-02-2024 (1).pptx

  • 1. Classification of Data in a Multidimensional Dataset
  • 2. Protecting Quasi-Identifiers • Masking EI alone is not sufficient, as an adversary can still use QI to re-identify a record owner • This linking is called record linkage where a record from a database is linked with a record in an external data source.
  • 3.
  • 4. There are two important aspects that need to be considered while anonymizing QI: • The analytical utility of QI needs to be preserved • The correlation of QI attributes with sensitive data needs to be maintained to support the utility of anonymized data
  • 5. Challenges in Protecting QI • Protection of QI is key to the success of any anonymization program, especially with respect to multidimensional data.
  • 6. The main challenges in anonymizing QI attributes are • High dimensionality • Background knowledge of the adversary • Availability of external knowledge • Correlation with SD to ensure utility • Maintaining analytical utility
  • 7. Challenge! • Principle (6) offers guidance Principle of data structure complexity—Anonymization design is dependent on the data structure.
  • 8. • Another important aspect to consider while anonymizing QI attributes is that the correlation between QI and SD attributes must be maintained. • For example, in a life insurance application, the age of a policy holder and the premium she pays for a particular insurance product are correlated.
  • 9. • Here, AGE is a QI attribute and PREMIUM is an SD attribute. • Therefore, as part of the anonymization, it is important to maintain this relationship between QI and SD attributes wherever applicable. “Higher the age, higher the premium" • Another aspect that needs to be looked into is the analytical utility of anonymized QI attributes.
  • 12. • How many employees with EDUCATION = “Doctorate” are part of this company? • Perturbative method is used in the above tables for anonymization.
  • 13. • Perturbative techniques are generally referred to as masking and non- perturbative techniques as anonymization. • QI attributes are generally composed of a record owner’s demographics, which are available in external data sources, such as a voters database. • It is indeed a challenge to anonymize QI attributes especially in the presence of external data sources, protect outlier records, and provide high utility. • Principle (13) comes into play here.
  • 14. • One of the techniques suggested is group-based anonymization where data are anonymized in a group-specific manner. This technique is called k-anonymization. • k-anonymity achieves this through suppression and generalization of identifiers.
  • 15. Protecting Sensitive Data (SD) • Data protection design ensures that EI are completely masked and QI are anonymized, leaving out SD in original form as it is required for analysis or as test data. • As EI are completely masked, the transformed data make no sense and are not useful for re-identification, and properly anonymized QI also prevent re-identification. • If sensitive data are in original form, then it provides a channel for re- identification.
  • 17. • Even though the data have been randomly perturbed, they have been ensured that the mean and covariance of the original table and perturbed tables are the same. • This means that the transformed table is still valid for analysis rendering the data to be useful at the same time maintaining the privacy of the data.