QUANTIFYING INFORMATION LOSS AFTER REDACTING DATA PROVENANCE TEAM: AVINI SOGANI VAISHNAVI SUNKU VENUGOPAL BOPPA.

Slides:



Advertisements
Similar presentations
QUN NI 1, SHOUHUAI XU 2, ELISA BERTINO 1, RAVI SANDHU 2, AND WEILI HAN 3 1 PURDUE UNIVERSITY USA 2 UT SAN ANTONIO USA 3 FUDAN UNIVERSITY CHINA PRESENTED.
Advertisements

Operating System Security
Q UERY L ANGUAGE C ONSTRUCTS FOR P ROVENANCE Murali Mani, Mohamad Alawa, Arunlal Kalyanasundaram University of Michigan, Flint Presented at IDEAS 2011.
Dr. Bhavani Thuraisingham February 18, 2011 Building Trustworthy Semantic Webs RDF and RDF Security.
Changes to HIPAA (as they pertain to records management) Health Information Technology for Economic Clinical Health Act (HITECH) – federal regulation included.
Professional Nursing Services.  Privacy and Security Training explains:  The requirements of the federal HIPAA/HITEC regulations, state privacy laws.
Provenance in Open Distributed Information Systems Syed Imran Jami PhD Candidate FAST-NU.
HEAVEN’S HANDS COMMUNITY SERVICE H.I.P.A.A. What is HIPAA? HIPAA stands for the Health Insurance Portability and Accountability Act, which was passed.
ReQuest (Validating Semantic Searches) Norman Piedade de Noronha 16 th July, 2004.
TextMOLE: Text Mining Operations Library and Environment Daniel B. Waegel and April Kontostathis, Ph.D. Ursinus College Collegeville PA.
“A Service-enabled Access Control Model for Distributed Data” Mark Turner, Philip Woodall Pennine Forum - 16 th September 2004.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
1 Developed by: U-MIC To start the presentation, click on this button in the lower right corner of your screen. The presentation will begin after the.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Secure Knowledge Management: and.
Access Control in Data Management Systems Dr. Bhavani Thuraisingham The University of Texas at Dallas Access Control and Policies in Data Management Systems.
Managing Large RDF Graphs (Infinite Graph) Vaibhav Khadilkar Department of Computer Science, The University of Texas at Dallas FEARLESS engineering.
1 Secure Commonwealth Panel Health and Medical Subpanel Debbie Condrey - Chief Information Officer Virginia Department of Health December 16, 2013 Virginia.
Digital Enterprise Research Institute HADA – An Access Controlled Application for Publishing and Discovering Linked Government Data Owen Sacco.
1 A National Virtual Specimen Database for Early Cancer Detection June 26, 2003 Daniel Crichton NASA Jet Propulsion Laboratory Sean Kelly NASA Jet Propulsion.
Data Warehousing Data Mining Privacy. Reading Bhavani Thuraisingham, Murat Kantarcioglu, and Srinivasan Iyer Extended RBAC-design and implementation.
The Paradox in HIPAA Deven McGraw, JD, MPH, LLM Partner Manatt, Phelps & Phillips, LLP December 8, 2014.
Developing “Geo” Ontology Layers for Web Query Faculty of Design & Technology Conference David George, Department of Computing.
Patient Confidentiality and Electronic Medical Records Ann J. Olsen, MBA, MA Information Security Officer and Director, Information Management Planning.
Scalable and E ffi cient Reasoning for Enforcing Role-Based Access Control Tyrone Cadenhead Murat Kantarcioglu, and Bhavani Thuraisingham 1.
Dr. Bhavani Thuraisingham August 2006 Building Trustworthy Semantic Webs Unit #1: Introduction to The Semantic Web.
Keyword Query Routing.
Dr. Bhavani Thuraisingham The University of Texas at Dallas Trustworthy Semantic Webs March 25, 2011 Data and Applications Security Developments and Directions.
Using Semantic Mapping to Manage Heterogeneity in XLIFF Interoperability by Dave Lewis, Rob Brennan, Alan Meehan, Declan O’Sullivan CNGL Centre for Global.
Trustworthy Semantic Webs Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #4 Vision for Semantic Web.
Modern Information Retrieval Presented by Miss Prattana Chanpolto Faculty of Information Technology.
A Road Map to Research at Jefferson: HIPAA Privacy and Security Rules for Researchers Presented By: Privacy Officer/Office of Legal Counsel October 2015.
Information Retrieval CSE 8337 Spring 2007 Introduction/Overview Some Material for these slides obtained from: Modern Information Retrieval by Ricardo.
Recuperação de Informação Cap. 01: Introdução 21 de Fevereiro de 1999 Berthier Ribeiro-Neto.
Information Retrieval
Dr. Bhavani Thuraisingham September 24, 2008 Building Trustworthy Semantic Webs Lecture #9: RDF and RDF Security.
What Does the User Really Want ? Relevance, Precision and Recall.
Security Methods for Statistical Databases. Introduction  Statistical Databases containing medical information are often used for research  Some of.
Selected Semantic Web UMBC CoBrA – Context Broker Architecture  Using OWL to define ontologies for context modeling and reasoning  Taking.
Scalable and E ffi cient Reasoning for Enforcing Role-Based Access Control Tyrone Cadenhead Advisors: Murat Kantarcioglu, and.
Managing Large RDF Graphs Vaibhav Khadilkar Dr. Bhavani Thuraisingham Department of Computer Science, The University of Texas at Dallas December 2008.
Privacy: HIPAA Emerson Murphy-Hill. Rosie Callender, RHIA, web.msm.edu/hipaa/An%20Introduction%20to%20HIPAA.ppt What is HIPAA? A Federal Law Created in.
HIPAA PRIVACY & SECURITY TRAINING
TCSEC: The Orange Book.
To start the presentation, click on this button in the lower right corner of your screen. The presentation will begin after the screen changes and you.
The Semantic Web By: Maulik Parikh.
Research using Registries
Scientific Reproducibility using the Provenance for Healthcare and Clinical Research Framework Satya S. Sahoo Collaborators/Co-Authors: Joshua Valdez,
Building the Semantic Web
Data and Applications Security Developments and Directions
Middleware independent Information Service
Building Trustworthy Semantic Webs
YourDataStories: Transparency and Corruption Fighting through Data Interlinking and Visual Exploration Georgios Petasis1, Anna Triantafillou2, Eric Karstens3.
Cloud Access Security Broker Lets Enterprises Enforce Security and Compliance in Office 365 Partner Logo “Skyhigh helps us securely enable high-impact.
Data and Applications Security Developments and Directions
Scalable and Efficient Reasoning for Enforcing Role-Based Access Control
Lecture #6: RDF and RDF Security Dr. Bhavani Thuraisingham
Scalable and Efficient Reasoning for Enforcing Role-Based Access Control
Mayo Clinic Privacy Office
Building Trustworthy Semantic Webs
Building Trustworthy Semantic Web
Prof. Bhavani Thuraisingham The University of Texas at Dallas
Trustworthy Semantic Webs
Data and Applications Security Developments and Directions
Scalable and Efficient Reasoning for Enforcing Role-Based Access Control
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Building Trustworthy Semantic Web
Office of Audit, Compliance & Privacy
The Health Insurance Portability and Accountability Act
Presentation transcript:

QUANTIFYING INFORMATION LOSS AFTER REDACTING DATA PROVENANCE TEAM: AVINI SOGANI VAISHNAVI SUNKU VENUGOPAL BOPPA

INTERNET OF THINGS

SEMANTIC WEB AND PROVENANCE Meaning behind anything you say Semantic web is the platform that provides secure sharing of heterogeneous data on the web. Provenance of data can be traced down to the origin of the data or can be simply an immediate source. Provides assessment of authenticity, enables trust, and provides assurance for data quality and thereby allows reproducibility of that resource.

REDACTION Imposing restrictions to data access by users Types – DAC, MAC, RBAC Process of removing or hiding sensitive data Protect sensitive information from unauthorized users

RELATED WORK

PRIVACY CONTROL ACTS HIPAA – Health Insurance Portability and Accountability Act Regulates EMR/EPR PHI – Protected Health Information PII – Personally Identifiable Information HITECH Act – Health Information Technology for Economic and Clinical Health Minimum necessary for the stated purpose

W3C RECOMMENDATIONS A.C. model applications File systems Database Provenance? Data Models: RDF (Triples, subject, predicate, object) OPM Querying: OPQL (From(e), to, from -1 (n), to -1, prev(n), next) SPARQL (Regular expressions)

REDACTION POLICIES Medical Scenario

REDACTION ON DATA PROVENANCE Why med: Doc1_2?

REDACTION BY GRAPH GRAMMAR AND R.E.

ARCHITECTURE

LIMITATIONS

No Quantification of the information lost by the process of redaction The availability of redacted information available from different source (internet, knowledge of the context..)

OUR PROPOSALS

INFORMATION LOSS Relevance of the data to the user Vectorial model formula for calculating the relevance Terms: True relevant data Retrieved data Relevant data F Measure (precision and recall) NMI (Normalized Mutual Information)

INFORMATION LOSS

CONCLUSION

REFERENCES: Query Language Constructs for Provenance, Murali Mani, Mohamad Alawa, Arunlal Kalyanasundaram Tyrone Cadenhead, Vaibhav Khadilkar, Murat Kantarcioglu, and Bhavani Thuraisingham Transforming provenance using redaction. In Proceedings of the 16th ACM symposium on Access control models and technologies (SACMAT '11). ACM, New York, NY, USA, Tyrone Cadenhead, Vaibhav Khadilkar, Murat Kantarcioglu and Bhavani Thuraisingham, A Language for Provenance Access Control Nettleton, David F., and Daniel Abril. "An Information Retrieval Approach to Document Sanitization." Advanced Research in Data Privacy. Springer International Publishing, Baeza-Yates, R., Ribeiro-Neto, B.: Modern Information Retrieval: The Concepts and Technology Behind Search, 2nd edn. ACM Press Books, England (2011)

THANK YOU..