final blow before tea
play

Final blow before Tea! Atif Rahman Twitter: @mantaq10 Zetaris - PowerPoint PPT Presentation

I was like her according to her; We were both outliers Privacy Preserved Data Augmentation using Enterprise Data Fabric Final blow before Tea! Atif Rahman Twitter: @mantaq10 Zetaris www.zetaris.com Data Exchanged (without consent) GPS


  1. I was like her according to her; We were both outliers Privacy Preserved Data Augmentation using Enterprise Data Fabric Final blow before Tea! Atif Rahman Twitter: @mantaq10 Zetaris www.zetaris.com

  2. Data Exchanged (without consent) • GPS • HIV Status • Email addresses • Weapon: Contract • Response: Excuse • Exposure: (Potential) exposure of marginalized people.

  3. Data Breach: • Email Addresses • Username & Passwords Exposure: • 150 million customers Response: • No clear Apologies • (Delayed) Corrective Actions Weapon: Contract

  4. Data Breach: • Names • Loyalty data • Email addresses • Physical addresses • DOB • Credit Card last 4 digits Exposure: • Millions of Customers Response: • Denial • Fake Solutions • 8 months before first action

  5. Paper contracts are still the most common weapon organizations use to get away with. As regulations get more mature, the impetus to be more effective in privacy preservation will be on service providers.

  6. Enterprises have different data landscape than consumer facing (typically tech) organisations. Enterprises have silos, legacy systems, have to learn to be data driven the hard way and have divergent forces giving a unique focus on From the exhibition: "M. Hulot, the protagonist in Jacques Tati's 1967 film Playtime, is continually frustrated by the endless repetition of office cubicles.

  7. Agenda • Data Augmentation • First Principles • Enterprise Data Fabric

  8. Data Augmentation Class 1 Class 2 ORG A Class 3

  9. Data Augmentation Typical Modeling Exercise Class 1 Class 2 ORG A Class 3 Potentially Better Modeling after data augmentation Class 1 ORG A Class 2 ORG B Class 3 ORG C

  10. Data Augmentation Class 1 ORG A Class 2 ORG B Class 3 ORG C Content Shared Channels: • Aggregated Data / Insights • Public Portals • Open Data • Private Marketplaces • Stratified Sampling • In Person Walk • Synthetic Data throughs/handovers • De-identified / Anonymized • Gossiping • Pigeons

  11. Data as an asset Resolve to First Principles • Easy to copy and spawn Data has properties that make it • Does not depreciate or depletes intrinsically hard to ensure privacy preservation. Therefore, we must • Really hard to valuate adhere to first principles to better • Process to yield value understand the problem • Various forms and derivatives statement first.

  12. The Five Safes Great Resources Safe Data Safe People Safe Setting Safe Project Safe Output ACS Data Sharing Frameworks The De-Identification Decision Making Framework

  13. First Principles Safe Data Encryption Environment for Data Controllers & Processors Safe Setting Safe People Authentication & Authorisation Safe Output Linkage Problem Safe Project Audit Trail, Lineage and Access & Query Logs

  14. First Principles Safe Data Encryption Environment for Data Controllers & Processors Safe Setting Safe People Authentication & Authorisation Safe Output Linkage Problem Safe Project Audit Trail, Lineage and Access & Query Logs

  15. Safe Data – (Encryption) Data at Rest Standard Encryption Data in Transit Secure the Pipe Data for Compute Homomorphic Encryption

  16. Homomorphic Encryption Less Costly Partial Homomorphic Encryption (PHE) Addition/Multiplication Low Order Polynomials Somewhat Homomorphic Encryption (SWHE) Full Homomorphic Encryption (FHE) Eval of Arbitrary Functions Data Analytics without seeing the data Max Ott, YOW Data 2016 More General

  17. First Principles Safe Data Encryption Environment for Data Controllers & Processors Safe Setting Safe People Authentication & Authorisation Safe Output Linkage Problem Safe Project Audit Trail, Lineage and Access & Query Logs

  18. Safe Setting - Confidential Computing Trusted Execution Environments (Safe Data in Safe Setting) Microsoft Azure Confidential Computing Google Cloud Platform: Asylo Open Source Framework Confidential Computing at the Software layer?

  19. First Principles Safe Data Encryption Environment for Data Controllers & Processors Safe Setting Safe People Authentication & Authorisation Safe Project Audit Trail, Lineage and Access & Query Logs Safe Output Linkage Problem

  20. Alice Bob

  21. Safe People – (System Span)

  22. Safe People – (System Span)

  23. First Principles Safe Data Encryption Environment for Data Controllers & Processors Safe Setting Safe People Authentication & Authorisation Safe Output Linkage Problem Safe Project Audit Trail, Lineage and Access & Query Logs

  24. Safe People – (System Span)

  25. Safe People – (System Span) Expanding the Span of control

  26. First Principles Safe Data Encryption Environment for Data Controllers & Processors Safe Setting Safe People Authentication & Authorisation Safe Output Linkage Problem Safe Project Audit Trail, Lineage and Access & Query Logs

  27. Safe Project – Audit Trails & Lineage

  28. Safe Project – Audit Trails & Lineage ? Its still very hard within enterprises to have a point to point track of data lineage and processing. The problem is expounded when data leaves the span of vision. Data in the wild

  29. One Ring to Rule them All? Encryption Environment for Data Controllers & Processors Authentication & Authorisation Linkage Problem A data landscape must cover all principles of data privacy. Audit Trail, Lineage and Access & Query Logs

  30. Monoliths in the era of Microservices

  31. Server App DB

  32. DB Server DB App Server DB Server

  33. DB DB App Caching Server DB DB In-Memory App Server DB Streams DB App Server DB Messaging

  34. The Enterprise Data Fabric DB Server App DB Server App DB Server DB App A unified data layer that is used by both user facing applications and downstream analytics, a potential holistic five safes environment

  35. The Zetaris Enterprise Data Fabric – Location Aware, Usage Aware, People Aware, Privacy Preserved data in a secure environment. Also check out Apache Ignite, Redhat OpenShift + JBoss Virtualization,.

  36. GDPR Highlights Monoliths e.g. Lakes Data Fabric Data Only through Right to transfer personal data from one electronic By Design Serialization processing system to and into another. Portability Random writes Right to withdraw consent and ask for personal Erasure By Design are not typical data to be deleted Right to know what’s been collected and how its Access Limited Purview By Design being processed Consumer is informed in ’clear’ and plain language. Consent Hard By Design Consent to collect can be withdrawn at any time

  37. As data scientists, we are at Yet, our work has serious Enjoy the Tribe! the forefront of disruption negative implications, we and hold the potential to need to educate ourselves change things. We are on the broader societal automating decisions in all questions around aspects of society. regulations, ethics and impact

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend