Executive Director and Endowed Chair

Slides:



Advertisements
Similar presentations
1 Cyber Security Research: A Personal Perspective Prof. Ravi Sandhu Executive Director and Endowed Chair January 18, 2013
Advertisements

1 Privacy Prof. Ravi Sandhu Executive Director and Endowed Chair March 8, © Ravi Sandhu World-Leading Research.
HIPAA Security Regulations Jean C. Hemphill Ballard Spahr Andrews & Ingersoll, LLP November 30, 2004.
© 2004 Property Casualty Insurers Association of America The Alphabet of Federal Legislation Kathleen Jensen Property and Casualty Insurers Association.
1 Grand Challenges in Data Usage Control Prof. Ravi Sandhu Executive Director and Endowed Chair
1 Privacy in Microdata Release Prof. Ravi Sandhu Executive Director and Endowed Chair March 22, © Ravi Sandhu.
1 Privacy Preserving Data Publishing Prof. Ravi Sandhu Executive Director and Endowed Chair March 29, © Ravi.
UTEPComputer Science Dept.1 University of Texas at El Paso Privacy in Statistical Databases Dr. Luc Longpré Computer Science Department Spring 2006.
Privacy Research Overview
1 Privacy and Access Control: How are These Two Concepts Related? Prof. Ravi Sandhu Executive Director and Endowed Chair SACMAT Panel June 3, 2015
1 Institute for Cyber Security Prof. Ravi Sandhu Executive Director and Endowed Chair February 4, 2015
Student Confidentiality: The FERPA/HIPAA Facts AISD Policy Student Records AISD Procedure AP. 11.
Dimensions of Privacy 18739A: Foundations of Security and Privacy Anupam Datta Fall 2009.
1 The Quest for Single-Sign On Prof. Ravi Sandhu Executive Director and Endowed Chair February 8, © Ravi Sandhu.
1 Cloud Computing and Security Prof. Ravi Sandhu Executive Director and Endowed Chair April 19, © Ravi Sandhu.
Privacy vs. Utility Xintao Wu University of North Carolina at Charlotte Nov 10, 2008.
CS573 Data Privacy and Security Secure data outsourcing – Combining encryption and fragmentation.
Differential Privacy Xintao Wu Oct 31, Sanitization approaches Input perturbation –Add noise to data –Generalize data Summary statistics –Means,
1 Panel on Data Usage Management: Technology or Regulation? Prof. Ravi Sandhu Executive Director and Endowed Chair DUMA 2013 May 23, 2013
Confidentiality Annual Training. Board Policy JG Please follow the link below to access the board policy dealing with student discipline and confidentiality.
1 Cyber Security A Personal Perspective Prof. Ravi Sandhu Executive Director and Endowed Chair January 15, 2016
1 Security and Privacy in Human-Centric Computing and Big Data Management Prof. Ravi Sandhu Executive Director and Endowed Chair CODASPY 2013 February.
1 Open Discussion PSOSM 2012 Prof. Ravi Sandhu Executive Director and Endowed Chair © Ravi Sandhu.
Table of Contents. Lessons 1. Introduction to HIPAA Go Go 2. The Privacy Rule Go Go.
Intrusion Detection Evaluation
Executive Director and Endowed Chair
ACHIEVING k-ANONYMITY PRIVACY PROTECTION USING GENERALIZATION AND SUPPRESSION International Journal on Uncertainty, Fuzziness and Knowledge-based Systems,
Symmetric Cryptography
Data Sharing, Storage, & Consent
Asymmetric Cryptography
Student Confidentiality: The FERPA/HIPAA Facts
Privacy-preserving Release of Statistics: Differential Privacy
Security and Privacy in the Networked World
Discretionary Access Control (DAC)
Data Sharing, Storage, & Consent
Executive Director and Endowed Chair
Introduction to Cyber Security
Introduction and Basic Concepts
Authentication by Passwords
Role-Based Access Control (RBAC)
Identity and Access Control in the
Executive Director and Endowed Chair
Executive Director and Endowed Chair
Cyber Security Research: Applied and Basic Combined*
Challenge-Response Authentication
ABAC Panel Prof. Ravi Sandhu Executive Director and Endowed Chair
Asymmetric Cryptography
Public-Key Certificates
Discretionary Access Control (DAC)
Attribute-Based Access Control (ABAC)
Cyber Security Research: Applied and Basic Combined*
Security and Privacy in the Age of the Internet of Things:
Intersection of Data, Policy and Privacy
Authentication and Authorization Federation
Executive Director and Endowed Chair
Intrusion Detection Evaluation
Cyber Security and Privacy: An Optimist’s Perspective
Identity and Access Control in the
Big Data and Privacy Panel Prof. Ravi Sandhu
Executive Director and Endowed Chair
Presented by : SaiVenkatanikhil Nimmagadda
Challenge-Response Authentication
TELE3119: Trusted Networks Week 4
Cyber Security Research: A Personal Perspective
Cyber Security Research: Applied and Basic Combined*
Attribute-Based Access Control (ABAC)
SHUFFLING-SLICING IN DATA MINING
World-Leading Research with Real-World Impact!
Evaluation and assessment
Student Confidentiality: The FERPA/HIPAA Facts
Presentation transcript:

Executive Director and Endowed Chair CS 5323 Privacy Prof. Ravi Sandhu Executive Director and Endowed Chair Lecture 17 ravi.utsa@gmail.com www.profsandhu.com © Ravi Sandhu World-Leading Research with Real-World Impact!

Security versus Privacy © Ravi Sandhu World-Leading Research with Real-World Impact! 2

Security versus Privacy © Ravi Sandhu World-Leading Research with Real-World Impact! 3

Security and Privacy Objectives USAGE purpose INTEGRITY modification AVAILABILITY access CONFIDENTIALITY disclosure © Ravi Sandhu World-Leading Research with Real-World Impact! 4

Privacy Goals Browsing privacy Interaction privacy Drive-by privacy Data disclosure privacy …… © Ravi Sandhu World-Leading Research with Real-World Impact! 5

Privacy Legislation in USA Case by case approach Fragmented Reactive Fair Credit Reporting Act (FCRA), 1970 Privacy Act 1974 Family Educational Rights & Privacy Act (FERPA), 1974 Video Privacy Protection Act (VPAA) 1988 Health Insurance Portability and Accountability Act (HIPAA) 1996 Gramm-Leach-Bliley Act (GLBA) 1999 ……… © Ravi Sandhu World-Leading Research with Real-World Impact! 6

3 Ongoing Experiments World-Leading Research with Real-World Impact! © Ravi Sandhu World-Leading Research with Real-World Impact! 7

Data Disclosure Syntactic Anonymity Differential Privacy Clifton, Chris, and Tamir Tassa. "On Syntactic Anonymity and Differential Privacy." Transactions on Data Privacy 6, no. 2 (2013): 161-183. © Ravi Sandhu World-Leading Research with Real-World Impact!

Data Disclosure PPDP Privacy-Preserving Data Publication Suppression Generalization Rearrange PPDM Privacy-Preserving Data Mining Respond to queries on the data Add random noise © Ravi Sandhu World-Leading Research with Real-World Impact! 9

Data Disclosure ?? Syntactic anonymity Differential privacy PPDP Privacy-Preserving Data Publication Suppression Generalization Rearrange PPDM Privacy-Preserving Data Mining Respond to queries on the data Add random noise ?? Syntactic anonymity Differential privacy © Ravi Sandhu World-Leading Research with Real-World Impact! 10

Data Disclosure Syntactic Anonymity © Ravi Sandhu World-Leading Research with Real-World Impact!

k-Anonymization World-Leading Research with Real-World Impact! quasi- Identifiers QIs sensitive attribute generalization QI block QI block © Ravi Sandhu World-Leading Research with Real-World Impact! 12

l-Diversity World-Leading Research with Real-World Impact! Frequency of occurrence of sensitive attribute QI block ≤ 1/3 © Ravi Sandhu World-Leading Research with Real-World Impact! 13

stricter than l-diversity t-Closeness Frequency of occurrence of sensitive attribute QI block ≤ 1/3 Distribution in each QI block should be t-close to distribution in entire population stricter than l-diversity © Ravi Sandhu World-Leading Research with Real-World Impact! 14

weaker than l-diversity p-Sensitivity at least p distinct values in each QI block QI block weaker than l-diversity © Ravi Sandhu World-Leading Research with Real-World Impact! 15

Anatomy Anonymization randomly shuffle Sensitive attribute in each QI block © Ravi Sandhu World-Leading Research with Real-World Impact! 16

Curse of Dimensionality Given a large number of Quasi-Identifiers, need to suppress most of the table to achieve k-anonymity LKC-privacy for high dimensional data: Attacker knows at most L quasi-identifiers Every combination of L quasi-identifiers is shared by at least K records Diversity in each group of K is not more than 1/C Release different versions of the data with different Quasi-Identifiers for different research purposes © Ravi Sandhu World-Leading Research with Real-World Impact! 17

Data Disclosure Differential Privacy © Ravi Sandhu World-Leading Research with Real-World Impact!

Intuition Database 1 PPDM Database 2 Query Response PPDM Cannot tell which Database is used within specified probability Differ in only 1 record © Ravi Sandhu World-Leading Research with Real-World Impact! 19