John M. Abowd Cornell University IASSIST 2010 June 4, 2010.

Slides:



Advertisements
Similar presentations
The NEW American FactFinder New Jersey State Data Center (SDC) Meeting Rutgers University DADSII Update & American FactFinder Demonstration June 17, 2010.
Advertisements

Understanding Response to Intervention
ONS data – improving access Richard Laux National Statistics and International Division, ONS.
The Microdata Analysis System (MAS): A Tool for Data Dissemination Disclaimer: The views expressed are those of the authors and not necessarily those of.
S3-1 © 2001 Carnegie Mellon University OCTAVE SM Process 3 Identify Staff Knowledge Software Engineering Institute Carnegie Mellon University Pittsburgh,
21-1 Last time Database Security  Data Inference  Statistical Inference  Controls against Inference Multilevel Security Databases  Separation  Integrity.
© Statistisches Bundesamt, IIA - Mathematisch Statistische Methoden Summary of Topic ii (Tabular Data Protection) Frequency Tables Magnitude Tables Web.
Measuring Ethno-Cultural Characteristics in Population Censuses United Nations Economic Commission for Europe Statistical Division Regional Training Workshop.
The Special Licence model for access to more detailed micro data IASSIST 2006 Thursday 25 May Karen Dennison UK Data Archive.
United Nations Expert Group Meeting on Revising the Principles and Recommendations for Population and Housing Censuses New York, 29 October – 1 November.
1 Confidentiality and Data Access: Perspectives on Demographic Data Pat Doyle U.S. Census Bureau Prepared for the IASSIST Annual Conference, University.
 Background  Penetration Studies  Example Vulnerabilities  Classification Frameworks  Theory of Penetration Analysis Computer Security: Art and Science.
It’s always better live. MSDN Events Security Best Practices Part 2 of 2 Reducing Vulnerabilities using Visual Studio 2008.
1 Arja Kuula, Development Manager, Finnish Social Science Data Archive, University of Tampere Ethics Review in Finland IASSIST conference 2010 Cornell.
Are Public Use (Micro) Data a Thing of the Past? John M. Abowd Cornell University US Census Bureau Prepared for IASSIST 2002.
Chapter 16 Security. 2 Chapter 16 - Objectives u The scope of database security. u Why database security is a serious concern for an organization. u The.
Developing a Statistical Disclosure Standard for Europe Tanvi Desai LSE Research Laboratory Data Manager Research Laboratory IASSIST 2010: Cornell.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Principles of Analysis and Dissemination Country Course on Analysis and Dissemination of Population and Housing Census Data with Gender Concern October.
Scientific Teaching 28 September 2004 Diane Ebert-May Department of Plant Biology Michigan State University
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Secure Knowledge Management: and.
Chapter 19 Security Transparencies. 2 Chapter 19 - Objectives Scope of database security. Why database security is a serious concern for an organization.
Cloud Computing Cloud Security– an overview Keke Chen.
ISOM MIS3150 Data and Info Mgmt Database Security Arijit Sengupta.
Security Policies University of Sunderland CSEM02 Harry R. Erwin, PhD.
Lecture 18 Page 1 CS 111 Online Design Principles for Secure Systems Economy Complete mediation Open design Separation of privileges Least privilege Least.
Windows 2000 Security Policies & Practices: How to build your plan Mandy Andress, CISSP President ArcSec Technologies.
Changing the perspective: users’involvement in prioritising needs in the Italian National Statistical Programme Monica Attias, ISTAT Q2014 Vienna, June.
© 2008 The MITRE Corporation. All rights reserved. Approved for Public Release; Distribution Unlimited. Case # Alexander Yeh MITRE Corp. October.
Statistics Canada’s Real Time Remote Access Solution 2011 MSIS Meeting – Karen Doherty May 2011.
Transparency and Open Data: GSS Response Iain Bell HoP MoJ.
Systems Analysis and Design in a Changing World, 6th Edition 1 Chapter 12 - Databases, Controls, and Security.
User-focused Threat Identification For Anonymised Microdata Hans-Peter Hafner HTW Saar – Saarland University of Applied Sciences
Daniel Beckler United States Department of Agriculture National Agricultural Statistics Service Timothy Mulcahy NORC at the University of Chicago Topic.
Copyright 2010, The World Bank Group. All Rights Reserved. Part 2 Labor Market Information Produced in Collaboration between World Bank Institute and the.
Assessing Disclosure for a Longitudinal Linked File Sam Hawala – US Census Bureau November 9 th, 2005.
53rd Conference of European Statisticians, 13 to 15 June 2005 Seminar on Sustainable Development Session I: The role of official statistics Discussant:
Methodological questions of migration and ethnocultural diversity in Population Censuses StatCapCA Training Workshop No 3 Dushanbe, March 2007 Werner Haug.
Chapter No 4 Query optimization and Data Integrity & Security.
Stephanie Trapnell PRMPS April 28, AGI Initiative and Data Portal.
Joint UNECE / Eurostat meeting on Population and Housing Censuses 7-9 July 2010, Geneva Disseminating Census information to maximise use and value Keith.
INFO 4470/ILRLE 4470 Ethical Aspects of Data Collection and Privacy Protection John M. Abowd and Lars Vilhuber March 30, 2011.
Differential Privacy Some contents are borrowed from Adam Smith’s slides.
Happy Wednesday! You will have a little time to put your posters together.
Access to microdata in the Netherlands: from a cold war to co-operation projects Eric Schulte Nordholt Senior researcher and project leader of the Census.
ABS Statistical Databases Session 6 Mark Viney Australian Bureau of Statistics 6 June 2007.
NILS Security Access to the NILS for approved researchers working on approved projects only. NILS micro-data can only be accessed in the Safe Setting -
Windows Security Features protect Memory Disk Network.
UNSD/ NSCB Regional workshop on data dissemination & communication Manila, Philippines, June 2012 Promoting (survey) microdata dissemination policies:
Marketing Principles CHAPTER 9 SECTION2.  A common use of computers in retail is the point-of-sale (POS) system.  Managing the relationships the company.
Internet Privacy Define PRIVACY? How important is internet privacy to you? What privacy settings do you utilize for your social media sites?
Handling Personal Data & Security of Information Paula Trim, Information Officer, Children’s Strategic Services, Mon – Thurs 9:15-2:15.
Expanding the Role of Synthetic Data at the U.S. Census Bureau 59 th ISI World Statistics Congress August 28 th, 2013 By Ron S. Jarmin U.S. Census Bureau.
SELF-DEFENDING NETWORK. CONTENTS Introduction What is Self Defending Network? Types of Network Attacks Structure of Self Defending Network Conclusion.
CS457 Introduction to Information Security Systems
Stony Brook University Data Strategy
SE-1021 Software Engineering II
Design for Security Pepper.
Cloud Security– an overview Keke Chen
Enterprise risk management
Advanced Search Engine Optimization
Four Challenges for Statistical Agencies
UK Data Service Secure Lab
CMGT 431 Competitive Success/snaptutorial.com
CMGT 431 Education for Service-- snaptutorial.com.
DLI PRESENTATION University of Victoria December 4, 2002 Raymond Roy
How to Mitigate the Consequences What are the Countermeasures?
Ad Hoc Phase Structured Phase Enterprise Phase
Item 2.2 of the Agenda Remote access to confidential data for researchers: possible actions under the 7th Framework Programme Pascal JACQUES Unit B 5 15.
Mohammad Alauthman Computer Security Mohammad Alauthman
Presentation transcript:

John M. Abowd Cornell University IASSIST 2010 June 4, 2010

Everybody's Got the Same Problem Google Search Logs American Community Survey Micro-data Firewall Leading Indicators Based on Search Frequencies Research Paper from a Census RDC Substantial Data Asset Physical Security Layer Access Protocol Public View on Private Data

But They Don’t Use the Same Strategies Microsoft, Google, Yahoo!, Amazon tend to rely on formal privacy methods Scientific validity and future data integrity are corporate assets Most strategies explicitly integrate content and privacy functions Distinguish between types of data releases: Official statistics Special tabulations Public-use files Protocol data access (RDC, AFF Advanced Query) Most strategies isolate the content and disclosure limitation functions

And They Don’t Make the Same Mistakes AOL and Netflix search log releases were fully preventable Information loss from randomized sanitizers is fully quantifiable but scientifically difficult to digest Not as concerned about the public good aspect of data release Research papers viewed as usually safe when based on statistical modeling Concerned about the public good from statistical publications but limited by ad hoc disclosure avoidance procedures that provide security through obscurity

What To Do Next Recognize that every public view from official statistics to model output in scientific papers can be assessed for both statistical validity and privacy/confidentiality leakage There is a continuum from official statistics through “need- to-know” privileged access that all research paradigms touch—think more about the substance and less about the form Integrate research teams primarily interested in content with teams primarily interested in privacy protection Be certain that both groups know what the other is doing