Sk¨
- vde 2017
Data privacy: an introduction (part II) Vicen¸ c Torra February, 2017
School of Informatics, University of Sk¨
- vde, Sweden
Data privacy: an introduction (part II) Vicen c Torra February, - - PowerPoint PPT Presentation
Sk ovde 2017 Data privacy: an introduction (part II) Vicen c Torra February, 2017 School of Informatics, University of Sk ovde, Sweden Outline Outline 1. Basics 2. A classification Dimensions 3. Masking methods 4. Privacy
Outline
Sk¨
1 / 33
Introduction Outline
Sk¨
2 / 33
Introduction Outline
Vicen¸ c Torra; Data privacy Sk¨
3 / 33
Introduction Outline
Vicen¸ c Torra; Data privacy Sk¨
4 / 33
Introduction Outline
Vicen¸ c Torra; Data privacy Sk¨
5 / 33
Introduction Outline
Vicen¸ c Torra; Data privacy Sk¨
6 / 33
Introduction Outline
Vicen¸ c Torra; Data privacy Sk¨
7 / 33
Introduction Outline
Vicen¸ c Torra; Data privacy Sk¨
8 / 33
Introduction Outline
Vicen¸ c Torra; Data privacy Sk¨
9 / 33
Introduction > Settings Outline
Vicen¸ c Torra; Data privacy Sk¨
10 / 33
Introduction Outline
Vicen¸ c Torra; Data privacy Sk¨
11 / 33
Introduction Outline
Vicen¸ c Torra; Data privacy Sk¨
12 / 33
Introduction Outline
Vicen¸ c Torra; Data privacy Sk¨
12 / 33
Introduction Outline
Vicen¸ c Torra; Data privacy Sk¨
12 / 33
Introduction Outline
Vicen¸ c Torra; Data privacy Sk¨
13 / 33
Introduction Outline
Vicen¸ c Torra; Data privacy Sk¨
14 / 33
Introduction Outline
Vicen¸ c Torra; Data privacy Sk¨
15 / 33
Introduction Outline
Vicen¸ c Torra; Data privacy Sk¨
16 / 33
Introduction Outline
Vicen¸ c Torra; Data privacy Sk¨
17 / 33
Introduction Outline
Vicen¸ c Torra; Data privacy Sk¨
18 / 33
Introduction Outline
Data−driven Computation−driven (specific−purpose) (general−purpose) Result−driven User privacy Protecting the identity of the user Protecting the data generated by the activity of the user Number of sources Multiple data sources Single data source Respondent and holder privacy
Vicen¸ c Torra; Data privacy Sk¨
19 / 33
Introduction > Settings Outline
Vicen¸ c Torra; Data privacy Sk¨
20 / 33
Introduction > Masking methods Outline
Vicen¸ c Torra; Data privacy Sk¨
21 / 33
Introduction > Masking methods Outline
X X’
Vicen¸ c Torra; Data privacy Sk¨
22 / 33
Introduction > Masking methods Outline
Vicen¸ c Torra; Data privacy Sk¨
23 / 33
Anonymization > Masking methods Outline
X X’
Vicen¸ c Torra; Data privacy Sk¨
24 / 33
Introduction > Masking methods Outline
Identifiers non-confidential quasi-identifier attributes confidential Protected microdata (X′) Protected Original id Xc id Xnc Xc X′
nc
(data masking) anonymization Identifiers Original non-confidential quasi-identifier attributes Original confidential Original microdata (X) attributes attributes
Vicen¸ c Torra; Data privacy Sk¨
25 / 33
Introduction > Masking methods Outline
Original microdata (X) Masking method Protected microdata (X’) Result(X’) Disclosure Measure Information Loss Measure Data analysis Result(X) Data analysis Risk
Vicen¸ c Torra; Data privacy Sk¨
26 / 33
Introduction > Masking methods Outline
Vicen¸ c Torra; Data privacy Sk¨
27 / 33
Introduction > Masking methods Outline
Vicen¸ c Torra; Data privacy Sk¨
27 / 33
Introduction > Masking methods Outline
Vicen¸ c Torra; Data privacy Sk¨
27 / 33
Introduction > Masking methods Outline
Vicen¸ c Torra; Data privacy Sk¨
27 / 33
Introduction > Masking methods Outline
X X’
Vicen¸ c Torra; Data privacy Sk¨
28 / 33
Introduction > Disclosure risk Outline
Vicen¸ c Torra; Data privacy Sk¨
29 / 33
Introduction > Disclosure risk Outline
Vicen¸ c Torra; Data privacy Sk¨
30 / 33
Introduction > Disclosure risk Outline
Vicen¸ c Torra; Data privacy Sk¨
31 / 33
Introduction > Disclosure risk Outline
Vicen¸ c Torra; Data privacy Sk¨
31 / 33
Introduction > Disclosure risk Outline
Vicen¸ c Torra; Data privacy Sk¨
31 / 33
Summary Outline
Vicen¸ c Torra; Data privacy Sk¨
32 / 33
References Outline
Foundations, new developments, and the big data challenge, Springer, forthcomming.
Springer.
P.-P. (2012) Statistical Disclosure Control, Wiley.
Vicen¸ c Torra; Data privacy Sk¨
33 / 33