复旦大学:《数据库新技术》PPT教学课件_隐私保护技术 Privacy Preserving in Data Management and Publication

Privacy Preserving in Data Management and Publication ●●●●● ●●●● ●●。●●
1 Privacy Preserving in Data Management and Publication

●●●●● ●●●● ●●0 Reference ●●● ●●●● Kristen LeFevre, David J. DeWitt, Raghu Ramakrishnan Incognito: Efficient Full-Domain K-Anonymity, SIGMOD 2005 Ashwin Machanavajhala, Johannes Gehrke, Daniel Kifer Diversity: Privacy Beyond k-Anonymity, ICDE06 Rakesh Agrawal, Jerry Kiernan, Ramakrishnan Srikant, Yirong Xu, Hippocratic Databases, VLdb 2002 Kristen LeFevrey, Rakesh Agrawal, Vuk Ercegovac, Raghu Ramakrishnan, Yirong Xu, David DeWitt, Limiting Disclosure in Hippocratic Databases, VLDB 2004
2 Reference ⚫ Kristen LeFevre, David J. DeWitt, Raghu Ramakrishnan, Incognito: Efficient Full-Domain K-Anonymity, SIGMOD 2005 ⚫ Ashwin Machanavajjhala, Johannes Gehrke, Daniel Kifer, lDiversity: Privacy Beyond k-Anonymity, ICDE’06 ⚫ Rakesh Agrawal, Jerry Kiernan, Ramakrishnan Srikant, Yirong Xu, Hippocratic Databasees, VLDB 2002 ⚫ Kristen LeFevrey, Rakesh Agrawal, Vuk Ercegovac, Raghu Ramakrishnan, Yirong Xu, David DeWitt, Limiting Disclosure in Hippocratic Databases, VLDB 2004

●●●●● ●●●● ●●0 Background ●●● ●●●● o Privacy has become an important issue in many area ●E- Commerce e Healthcare data management e Personal information management Research topics Privacy in data management K-anonymity Privacy preserving data mining
3 Background ⚫ Privacy has become an important issue in many area ⚫ E-Commerce ⚫ Healthcare data management ⚫ Personal information management ⚫ … ⚫ Research topics ⚫ Privacy in data management ⚫ K-anonymity ⚫ Privacy preserving data mining

●●●●● ●●●● ●●0 Privacy Regulations ●●● ●●●● United States Privacy Act(1974) e fair Information Practices Applies to federal agencies ● Requirements Permit an individual to determine what personal records are collected. maintained. used or disseminated Permit an individual to prevent personal records collected for one purpose from being used for another purpose( without consent) Permit an individual to access records about him and to correct these records Collect personal information in a lawful way, and incorporate safeguards preventing misuse Make exceptions only when there is a public policy need Be subject to civil suit for violating this Act
4 Privacy Regulations ⚫ United States Privacy Act (1974) ⚫ Fair Information Practices ⚫ Applies to federal agencies ⚫ Requirements ⚫ Permit an individual to determine what personal records are collected, maintained, used, or disseminated ⚫ Permit an individual to prevent personal records collected for one purpose from being used for another purpose (without consent) ⚫ Permit an individual to access records about him, and to correct these records ⚫ Collect personal information in a lawful way, and incorporate safeguards preventing misuse ⚫ Make exceptions only when there is a public policy need ⚫ Be subject to civil suit for violating this Act

●●●●● ●●●● ●●0 Privacy Regulations ●●● ●●●● e Recent privacy documents o 1996 Health Insurance Portability and Accountability Act(HIPAA) 1999 Gramm-Leach-Bliley Financial Services Modernization Act o 2000 Personal Information protection and Electronic Documents Act(PIPEDA) 2003 Personal Information Protection Act(PIPA)
5 Privacy Regulations ⚫ Recent privacy documents ⚫ 1996 Health Insurance Portability and Accountability Act (HIPAA) ⚫ 1999 Gramm-Leach-Bliley Financial Services Modernization Act ⚫ 2000 Personal Information Protection and Electronic Documents Act (PIPEDA) ⚫ 2003 Personal Information Protection Act (PIPA)

●●●●● ●●●● Privacy in data management 9:80 ●●●● ●Task Preventing disclosure of private information while database query Privacy vs access control Privacy Application purpose oriented Users requirement e Access control security database e Data oriented Hippocratic Databases A prototype database system from the Intelligent Information Systems Group of IBM Almaden Research Center
6 Privacy in data management ⚫ Task ⚫ Preventing disclosure of private information while database query ⚫ Privacy vs access control ⚫ Privacy ⚫ Application purpose oriented ⚫ Users requirement ⚫ Access control & security database ⚫ Data oriented ⚫ Hippocratic Databases ⚫ A prototype database system from the Intelligent Information Systems Group of IBM Almaden Research Center

●●●●● ●●●● ●●0 ippocratic Databases ●●● ●●●● ● Background o The Hippocratic Oath has guided the conduct of physicians for centuries. Inspired by its tenet of preserving privacy, we argue that future database systems must include responsibility for the privacy of data Propose a strawman design for Hippocratic databases identify the technical challenges and problems in designing such databases, will serve to catalyze a fruitful and exciting direction for future database research
7 Hippocratic Databases ⚫ Background ⚫ The Hippocratic Oath has guided the conduct of physicians for centuries. Inspired by its tenet of preserving privacy, we argue that future database systems must include responsibility for the privacy of data. ⚫ Propose a strawman design for Hippocratic databases, identify the technical challenges and problems in designing such databases, will serve to catalyze a fruitful and exciting direction for future database research

●●●●● Ten Principles of Privacy ●●●● ●●0 ●●● ●●●● o Purpose Specification The purposes for which the information has been collected shall be associated with that information o Questions like"why specific data is being collected ?)must be answered
8 Ten Principles of Privacy ⚫ Purpose Specification ⚫ The purposes for which the information has been collected shall be associated with that information. ⚫ Questions like “why specific data is being collected?” must be answered

●●●●● Ten Principles of Privacy ●●●● ●●0 ●●● ●●●● ● Consent o The donor of the information must provide his consent for usage of the data they have provided for the specific purpose Example: a user can give consent for his information to be released for research purposes
9 Ten Principles of Privacy ⚫ Consent ⚫ The donor of the information must provide his consent for usage of the data they have provided for the specific purpose. ⚫ Example: A user can give consent for his information to be released for research purposes

●●●●● Ten Principles of Privacy ●●●● ●●0 ●●● ●●●● ● Limited co| ection o The personal information collected shall be limited to the minimum necessary for accomplishing the specified purposes. o Example: For medical records, requirement of information like which car the patient drives is absurd and not required
10 Ten Principles of Privacy ⚫ Limited Collection ⚫ The personal information collected shall be limited to the minimum necessary for accomplishing the specified purposes. ⚫ Example: For medical records, requirement of information like which car the patient drives is absurd, and not required
按次数下载不扣除下载券;
注册用户24小时内重复下载只扣除一次;
顺序:VIP每日次数-->可用次数-->下载券;
- 复旦大学:手机传感器应用APP-Phyphox使用简介(PDF版本).pdf
- 手机传感器应用APP-Phyphox使用简介(PPTX版本).pptx
- Python3 基础教程【完整版】PDF电子书.pdf
- 北京大学:《数据结构与算法》课程教学资源(实验班PPT课件)第十二章 高级树结构.pdf
- 北京大学:《数据结构与算法》课程教学资源(实验班讲义)第十二章 高级树结构.pdf
- 北京大学:《数据结构与算法》课程教学资源(实验班PPT课件)第十一章 高级线性表.pdf
- 北京大学:《数据结构与算法》课程教学资源(实验班讲义)第十一章 高级线性表.pdf
- 北京大学:《数据结构与算法》课程教学资源(实验班PPT课件)第十章 索引技术(内存索引——红黑树).pdf
- 北京大学:《数据结构与算法》课程教学资源(实验班讲义)第十章 索引技术(内存索引——红黑树).pdf
- 北京大学:《数据结构与算法》课程教学资源(实验班PPT课件)第十章 索引技术.pdf
- 北京大学:《数据结构与算法》课程教学资源(实验班讲义)第十章 索引技术.pdf
- 北京大学:《数据结构与算法》课程教学资源(实验班PPT课件)第九章 检索.pdf
- 北京大学:《数据结构与算法》课程教学资源(实验班讲义)第九章 检索.pdf
- 北京大学:《数据结构与算法》课程教学资源(实验班PPT课件)第八章 文件管理和外排序.pdf
- 北京大学:《数据结构与算法》课程教学资源(实验班讲义)第八章 文件管理和外排序.pdf
- 北京大学:《数据结构与算法》课程教学资源(实验班PPT课件)第七章 内排序.pdf
- 北京大学:《数据结构与算法》课程教学资源(实验班讲义)第七章 内排序.pdf
- 北京大学:《数据结构与算法》课程教学资源(实验班PPT课件)第六章 图.pdf
- 北京大学:《数据结构与算法》课程教学资源(实验班讲义)第六章 图.pdf
- 北京大学:《数据结构与算法》课程教学资源(实验班PPT课件)第五章 树.pdf
- 复旦大学:《数据库新技术》PPT教学课件_时空数据管理技术应用——移动对象.ppt
- 复旦大学:《数据库新技术》PPT教学课件_查询处理与查询优化技术新进展.ppt
- 复旦大学:《数据库新技术》PPT教学课件_数据库技术介绍.ppt
- 复旦大学:《数据库新技术》PPT教学课件_时空数据管理技术基础 Spatial Data Management.ppt
- 复旦大学:《数据库新技术》PPT教学课件_数据库管理系统技术基础.ppt
- 复旦大学:《商务智能》课程教学大纲(混合教学)商务数据分析 Business Intelligence.doc
- 复旦大学:《商务智能》课程教学讲座(商务数据分析)机器学习及其应用(主讲:赵卫东).pdf
- 复旦大学:《商务智能》课程学习资料(商务数据分析)基于项目沉浸式教学方法的数据分析类课程实践.pdf
- 复旦大学:《商务智能》课程学习资料(商务数据分析)数据分析类课程案例实验实训教学交流.pdf
- 复旦大学:《商务智能》课程学习资料(商务数据分析)一个课程内容专题(主题)的详细教学设计与实施方案.pdf
- 《计算机教育Computer Education》:基于项目实践的机器学习课程改革(复旦大学:赵卫东,袁雪茹).pdf
- 《计算机教育Computer Education》:数据分析类课程的技能培养方法探讨(复旦大学:赵卫东,蒲实).pdf
- 复旦大学《商务智能》课程参考资料:室内位置服务与商业智能.pdf
- 复旦大学:《商务智能》课程教学讲义(商务数据分析)电子推荐系统.pdf
- 《商务智能》课程学习资料:集成学习实用机器学习方法 Ensemble Learning.pdf
- 复旦大学:《商务智能》课程PPT教学课件(商务数据分析)01 商务智能概论 Introduction to Business Intelligence.ppt
- 复旦大学:《商务智能》课程PPT教学课件(商务数据分析)10 流程智能 Process Intelligence.ppt
- 复旦大学:《商务智能》课程PPT教学课件(商务数据分析)11 大数据分析与应用 Big data analytics and applications.ppt
- 复旦大学:《商务智能》课程PPT教学课件(商务数据分析)02 数据仓库 Data Warehouse.ppt
- 复旦大学:《商务智能》课程PPT教学课件(商务数据分析)03 在线分析处理 Online Analytical Processing.ppt