Final blow before Tea! Atif Rahman Twitter: @mantaq10 Zetaris - - PowerPoint PPT Presentation

final blow before tea
SMART_READER_LITE
LIVE PREVIEW

Final blow before Tea! Atif Rahman Twitter: @mantaq10 Zetaris - - PowerPoint PPT Presentation

I was like her according to her; We were both outliers Privacy Preserved Data Augmentation using Enterprise Data Fabric Final blow before Tea! Atif Rahman Twitter: @mantaq10 Zetaris www.zetaris.com Data Exchanged (without consent) GPS


slide-1
SLIDE 1

Privacy Preserved Data Augmentation using Enterprise Data Fabric

Final blow before Tea!

I was like her according to her; We were both outliers Twitter: @mantaq10 Atif Rahman Zetaris www.zetaris.com

slide-2
SLIDE 2

Data Exchanged (without consent)

  • GPS
  • HIV Status
  • Email addresses
  • Weapon: Contract
  • Response: Excuse
  • Exposure: (Potential) exposure
  • f marginalized people.
slide-3
SLIDE 3

Data Breach:

  • Email Addresses
  • Username & Passwords

Exposure:

  • 150 million customers

Response:

  • No clear Apologies
  • (Delayed) Corrective Actions

Weapon: Contract

slide-4
SLIDE 4

Data Breach:

  • Names
  • Loyalty data
  • Email addresses
  • Physical addresses
  • DOB
  • Credit Card last 4 digits

Exposure:

  • Millions of Customers

Response:

  • Denial
  • Fake Solutions
  • 8 months before first action
slide-5
SLIDE 5

Paper contracts are still the most common weapon organizations use to get away with. As regulations get more mature, the impetus to be more effective in privacy preservation will be on service providers.

slide-6
SLIDE 6

From the exhibition: "M. Hulot, the protagonist in Jacques Tati's 1967 film Playtime, is continually frustrated by the endless repetition of office cubicles.

Enterprises have different data landscape than consumer facing (typically tech) organisations. Enterprises have silos, legacy systems, have to learn to be data driven the hard way and have divergent forces giving a unique focus on

slide-7
SLIDE 7

Agenda

  • Data Augmentation
  • First Principles
  • Enterprise Data Fabric
slide-8
SLIDE 8

Data Augmentation

ORG A Class 1 Class 2 Class 3

slide-9
SLIDE 9

Data Augmentation

ORG A Class 1 Class 2 Class 3 ORG A Class 1 Class 2 Class 3 ORG B ORG C

Potentially Better

Typical Modeling Exercise Modeling after data augmentation

slide-10
SLIDE 10

ORG A Class 1 Class 2 Class 3 ORG B ORG C

Content Shared

  • Aggregated Data / Insights
  • Open Data
  • Stratified Sampling
  • Synthetic Data
  • De-identified / Anonymized

Channels:

  • Public Portals
  • Private Marketplaces
  • In Person Walk

throughs/handovers

  • Gossiping
  • Pigeons

Data Augmentation

slide-11
SLIDE 11

Data as an asset

  • Easy to copy and spawn
  • Does not depreciate or depletes
  • Really hard to valuate
  • Process to yield value
  • Various forms and derivatives

Resolve to First Principles

Data has properties that make it intrinsically hard to ensure privacy

  • preservation. Therefore, we must

adhere to first principles to better understand the problem statement first.

slide-12
SLIDE 12

The Five Safes

Safe Data Safe People Safe Setting Safe Project Safe Output

Great Resources

ACS Data Sharing Frameworks The De-Identification Decision Making Framework

slide-13
SLIDE 13

First Principles

Safe Data Safe People Safe Setting Safe Project Safe Output Encryption Authentication & Authorisation Environment for Data Controllers & Processors Audit Trail, Lineage and Access & Query Logs Linkage Problem

slide-14
SLIDE 14

First Principles

Safe Data Safe People Safe Setting Safe Project Safe Output Encryption Authentication & Authorisation Environment for Data Controllers & Processors Audit Trail, Lineage and Access & Query Logs Linkage Problem

slide-15
SLIDE 15

Safe Data – (Encryption)

Data at Rest Standard Encryption Data in Transit Secure the Pipe Data for Compute Homomorphic Encryption

slide-16
SLIDE 16

Homomorphic Encryption

Partial Homomorphic Encryption (PHE) Somewhat Homomorphic Encryption (SWHE) Full Homomorphic Encryption (FHE) Addition/Multiplication Low Order Polynomials Eval of Arbitrary Functions

More General Less Costly

Data Analytics without seeing the data Max Ott, YOW Data 2016

slide-17
SLIDE 17

First Principles

Safe Data Safe People Safe Setting Safe Project Safe Output Encryption Authentication & Authorisation Environment for Data Controllers & Processors Audit Trail, Lineage and Access & Query Logs Linkage Problem

slide-18
SLIDE 18

Safe Setting - Confidential Computing

Trusted Execution Environments (Safe Data in Safe Setting)

Microsoft Azure Confidential Computing Google Cloud Platform: Asylo Open Source Framework Confidential Computing at the Software layer?

slide-19
SLIDE 19

First Principles

Safe Data Safe People Safe Setting Safe Project Safe Output Encryption Authentication & Authorisation Environment for Data Controllers & Processors Audit Trail, Lineage and Access & Query Logs Linkage Problem

slide-20
SLIDE 20
slide-21
SLIDE 21

Alice Bob

slide-22
SLIDE 22

Safe People – (System Span)

slide-23
SLIDE 23

Safe People – (System Span)

slide-24
SLIDE 24

First Principles

Safe Data Safe People Safe Setting Safe Project Safe Output Encryption Authentication & Authorisation Environment for Data Controllers & Processors Audit Trail, Lineage and Access & Query Logs Linkage Problem

slide-25
SLIDE 25

Safe People – (System Span)

slide-26
SLIDE 26

Safe People – (System Span)

Expanding the Span of control

slide-27
SLIDE 27

First Principles

Safe Data Safe People Safe Setting Safe Project Safe Output Encryption Authentication & Authorisation Environment for Data Controllers & Processors Audit Trail, Lineage and Access & Query Logs Linkage Problem

slide-28
SLIDE 28

Safe Project – Audit Trails & Lineage

slide-29
SLIDE 29

Safe Project – Audit Trails & Lineage

?

Data in the wild

Its still very hard within enterprises to have a point to point track of data lineage and processing. The problem is expounded when data leaves the span of vision.

slide-30
SLIDE 30

One Ring to Rule them All?

Encryption Authentication & Authorisation Environment for Data Controllers & Processors Audit Trail, Lineage and Access & Query Logs Linkage Problem

A data landscape must cover all principles of data privacy.

slide-31
SLIDE 31

Monoliths in the era of Microservices

slide-32
SLIDE 32

DB Server App

slide-33
SLIDE 33

App DB Server DB Server DB Server

slide-34
SLIDE 34

App DB Server DB Server DB Server DB Caching DB In-Memory DB Streams DB Messaging App App

slide-35
SLIDE 35

DB Server App Server Server DB DB DB App App The Enterprise Data Fabric A unified data layer that is used by both user facing applications and downstream analytics, a potential holistic five safes environment

slide-36
SLIDE 36

The Zetaris Enterprise Data Fabric – Location Aware, Usage Aware, People Aware, Privacy Preserved data in a secure environment. Also check out Apache Ignite, Redhat OpenShift + JBoss Virtualization,.

slide-37
SLIDE 37
slide-38
SLIDE 38

GDPR Highlights

Data Portability Erasure Access Consent

Right to transfer personal data from one electronic processing system to and into another. Right to withdraw consent and ask for personal data to be deleted Right to know what’s been collected and how its being processed Consumer is informed in ’clear’ and plain language. Consent to collect can be withdrawn at any time By Design By Design By Design By Design Only through Serialization Random writes are not typical Limited Purview Hard

Monoliths e.g. Lakes Data Fabric

slide-39
SLIDE 39

As data scientists, we are at the forefront of disruption and hold the potential to change things. We are automating decisions in all aspects of society. Yet, our work has serious negative implications, we need to educate ourselves

  • n the broader societal

questions around regulations, ethics and impact Enjoy the Tribe!