Security for Data Scientists
Security for Data Scientists
Pascal Lafourcade Mars 2017
1 / 101
Security for Data Scientists Pascal Lafourcade Mars 2017 1 / 101 - - PowerPoint PPT Presentation
Security for Data Scientists Security for Data Scientists Pascal Lafourcade Mars 2017 1 / 101 Security for Data Scientists Contexte Big Data 2 / 101 Security for Data Scientists Contexte IoT 3 / 101 Security for Data Scientists
Security for Data Scientists
1 / 101
Security for Data Scientists Contexte
2 / 101
Security for Data Scientists Contexte
3 / 101
Security for Data Scientists Contexte
4 / 101
Security for Data Scientists Contexte
5 / 101
Security for Data Scientists Contexte
6 / 101
Security for Data Scientists Contexte
7 / 101
Security for Data Scientists Contexte
8 / 101
Security for Data Scientists Cadre juridique
9 / 101
Security for Data Scientists Cadre juridique
10 / 101
Security for Data Scientists Cadre juridique
11 / 101
Security for Data Scientists Cadre juridique
12 / 101
Security for Data Scientists Cadre juridique
13 / 101
Security for Data Scientists Cadre juridique
◮ la nature des donn´
◮ les risques pr´
14 / 101
Security for Data Scientists Cadre juridique
15 / 101
Security for Data Scientists Cadre juridique
16 / 101
Security for Data Scientists Cadre juridique
17 / 101
Security for Data Scientists Cadre juridique
18 / 101
Security for Data Scientists Cadre juridique
18 / 101
Security for Data Scientists Un peu de cryptographie
19 / 101
Security for Data Scientists Un peu de cryptographie
Clef symétrique Clef symétrique
20 / 101
Security for Data Scientists Un peu de cryptographie
21 / 101
Security for Data Scientists Un peu de cryptographie
Clef publique
Clef privée
22 / 101
Security for Data Scientists Un peu de cryptographie
23 / 101
Security for Data Scientists Un peu de cryptographie
24 / 101
Security for Data Scientists Un peu de cryptographie
25 / 101
Security for Data Scientists Un peu de cryptographie
25 / 101
Security for Data Scientists Un peu de cryptographie
25 / 101
Security for Data Scientists Un peu de cryptographie
25 / 101
Security for Data Scientists Un peu de cryptographie
26 / 101
Security for Data Scientists Un peu de cryptographie
26 / 101
Security for Data Scientists Un peu de cryptographie
27 / 101
Security for Data Scientists Un peu de cryptographie
28 / 101
Security for Data Scientists Un peu de cryptographie
29 / 101
Security for Data Scientists Un peu de cryptographie
30 / 101
Security for Data Scientists Un peu de cryptographie
31 / 101
Security for Data Scientists Un peu de cryptographie
Clef privée
Clef publique
31 / 101
Security for Data Scientists Propri´ et´ es
32 / 101
Security for Data Scientists Propri´ et´ es
33 / 101
Security for Data Scientists Propri´ et´ es
34 / 101
Security for Data Scientists Propri´ et´ es
35 / 101
Security for Data Scientists Propri´ et´ es
36 / 101
Security for Data Scientists Propri´ et´ es
◮ only registered voters vote, ◮ each voter can only vote once, ◮ integrity of votes, ◮ privacy of voting information (only used for tallying), and ◮ availability of system during voting period 37 / 101
Security for Data Scientists Different Adversaries
38 / 101
Security for Data Scientists Different Adversaries
39 / 101
Security for Data Scientists Different Adversaries
◮ Do not consider attack in 260. ◮ Otherwise a Brute force by enumeration is always possible.
40 / 101
Security for Data Scientists Different Adversaries
41 / 101
Security for Data Scientists Different Adversaries
42 / 101
Security for Data Scientists Different Adversaries
43 / 101
Security for Data Scientists Different Adversaries
44 / 101
Security for Data Scientists Different Adversaries
45 / 101
Security for Data Scientists Intuition of Computational Security
46 / 101
Security for Data Scientists Intuition of Computational Security
47 / 101
Security for Data Scientists Intuition of Computational Security
47 / 101
Security for Data Scientists Intuition of Computational Security
48 / 101
Security for Data Scientists Intuition of Computational Security
48 / 101
Security for Data Scientists Intuition of Computational Security
48 / 101
Security for Data Scientists Intuition of Computational Security
48 / 101
Security for Data Scientists Intuition of Computational Security
49 / 101
Security for Data Scientists Intuition of Computational Security
49 / 101
Security for Data Scientists Intuition of Computational Security
49 / 101
Security for Data Scientists Intuition of Computational Security
◮ Subject: XXXX ◮ From: XXXX 49 / 101
Security for Data Scientists Intuition of Computational Security
50 / 101
Security for Data Scientists Intuition of Computational Security
50 / 101
Security for Data Scientists Intuition of Computational Security
51 / 101
Security for Data Scientists Intuition of Computational Security
51 / 101
Security for Data Scientists Intuition of Computational Security
51 / 101
Security for Data Scientists Intuition of Computational Security
52 / 101
Security for Data Scientists Intuition of Computational Security
52 / 101
Security for Data Scientists Intuition of Computational Security
53 / 101
Security for Data Scientists Cloud Security
54 / 101
Security for Data Scientists Cloud Security
55 / 101
Security for Data Scientists Cloud Security
55 / 101
Security for Data Scientists Cloud Security
55 / 101
Security for Data Scientists Cloud Security
56 / 101
Security for Data Scientists Cloud Security
56 / 101
Security for Data Scientists Cloud Security
57 / 101
Security for Data Scientists Cloud Security
58 / 101
Security for Data Scientists Cloud Security
59 / 101
Security for Data Scientists Cloud Security
60 / 101
Security for Data Scientists Cloud Security
61 / 101
Security for Data Scientists Cloud Security
62 / 101
Security for Data Scientists Cloud Security
63 / 101
Security for Data Scientists Partial and Full Homomorphic Encryption
64 / 101
Security for Data Scientists Partial and Full Homomorphic Encryption
65 / 101
Security for Data Scientists Partial and Full Homomorphic Encryption
66 / 101
Security for Data Scientists Partial and Full Homomorphic Encryption
67 / 101
Security for Data Scientists Partial and Full Homomorphic Encryption
68 / 101
Security for Data Scientists Partial and Full Homomorphic Encryption
69 / 101
Security for Data Scientists Partial and Full Homomorphic Encryption
70 / 101
Security for Data Scientists Partial and Full Homomorphic Encryption
71 / 101
Security for Data Scientists Partial and Full Homomorphic Encryption
71 / 101
Security for Data Scientists Partial and Full Homomorphic Encryption
72 / 101
Security for Data Scientists SSE
73 / 101
Security for Data Scientists SSE
74 / 101
Security for Data Scientists SSE
75 / 101
Security for Data Scientists SSE
76 / 101
Security for Data Scientists SSE
77 / 101
Security for Data Scientists SSE
78 / 101
Security for Data Scientists SSE
78 / 101
Security for Data Scientists SSE
79 / 101
Security for Data Scientists SSE
80 / 101
Security for Data Scientists SSE
81 / 101
Security for Data Scientists SSE
81 / 101
Security for Data Scientists SSE
82 / 101
Security for Data Scientists SSE
83 / 101
Security for Data Scientists Privacy in DB
84 / 101
Security for Data Scientists Privacy in DB
85 / 101
Security for Data Scientists Privacy in DB
86 / 101
Security for Data Scientists Privacy in DB
87 / 101
Security for Data Scientists Privacy in DB
88 / 101
Security for Data Scientists Privacy in DB
89 / 101
Security for Data Scientists Privacy in DB
90 / 101
Security for Data Scientists Privacy in DB
91 / 101
Security for Data Scientists Privacy in DB
92 / 101
Security for Data Scientists Privacy in DB
93 / 101
Security for Data Scientists Privacy in DB
94 / 101
Security for Data Scientists Privacy in DB
95 / 101
Security for Data Scientists Privacy in DB
96 / 101
Security for Data Scientists Privacy in DB
97 / 101
Security for Data Scientists Privacy in DB
98 / 101
Security for Data Scientists Conclusion
99 / 101
Security for Data Scientists Conclusion
100 / 101
Security for Data Scientists Conclusion
101 / 101