SlideShare ist ein Scribd-Unternehmen logo
1 von 29
Securing the privacy
of Customer
Presentation
On
01/29/15 1
• Privacy is the right of individuals.
• Computer security is the prevention or
protection against
– access to information by unauthorized
recipients
– intentional but unauthorized destruction
or alteration of that information
Introduction
01/29/15 2
• Traditional databases
• Statistical databases
• Secure databases
Related Work
01/29/15 3
• Hippocratic databases require all the capabilities
provided by current database systems
• Different focus
• Need to rethink data definition and query
languages, query processing, indexing and
storage structures, and access control
mechanisms
Traditional Database
01/29/15 4
• Goal: Provide statistical information
• Query restriction
• Data perturbation
Statistical Databases
01/29/15 5
• Sensitive information is transmitted over a
secure channel and stored securely
• Access controls
• Encryption
• Multilevel secure databases
Secure Databases
01/29/15 6
• Purpose Specification
• Consent
• Limited Collection
• Limited Use
• Limited Disclosure
Principles of Hippocratic
01/29/15 7
• Limited Retention
• Accuracy
• Safety
• Openness
• Compliance
Continue…….
01/29/15 8
• Team Formation
• Setting the responsibility
• Setting the objective
• Aware the Customer
Key Requisites for Privacy Policy
01/29/15 9
• Lawful collection
• Maintaining the accuracy
• Obtaining complete information
• Data Security
Continue…….
01/29/15 10
• Disclosure norms
• Storage norms
• Updated norms
• Information norms
Continue…….
01/29/15 11
• Privacy Metadata
• Data Collection
• Querying
• Retention
• Data Collection Organizer
Proposed Design and Implementation
01/29/15 12
• External recipients
• Retention Period
• Authorized users
Privacy Metadata
01/29/15 13
• Data is inserted with the purpose for which it
may be used.
• Data Accuracy Analyzer addresses the Principle
of Accuracy
Data Collection
01/29/15 14
• Queries are tagged with a purpose
• Before query execution
• During query execution
• After query execution
Querying
01/29/15 15
• A data item should be retained for the maximum
retention period among all the purposes for which
it has been collected.
• After this period, it should be deleted.
Retention
01/29/15 16
• Data is fed into the database.
• It has to be retained till its purpose is solved.
• Data manager deletes all the data once
purpose is solved.
Applicable Restriction
01/29/15 17
• Fine grained access control (FGAC)
• In order to maintain the retention restriction along
with sustaining data consider a example
The Proposed Model
01/29/15 18
Table1
Customer details Constraints Data type
Cust_id Not NULL Integer
Cust_name Char(32)
Cust_add Varchar2
01/29/15 19
Table2
Restriction details Constraints Data type
Restrict_id NotNULL Integer
Restrict_name Varchar2
Restrict_date date
01/29/15 20
Table3
Restriction date Data type
Restrict_id Integer
Restrict_startdate date
Restrict_enddate date
01/29/15 21
Table4
Customer_acc Data type
Cust_id Integer
Cust_acc Integer
Cust_bal Integer
01/29/15 22
• Create restriction
<restriction_name>
On <table>
For <authorization>
(((to columns<column list>|to rows
[Where search_condition] |to cells
<column_list[where search_condition]+))
[for retension time time_interval])+ [restriction
access to commands>]
Syntax for creating the restriction
01/29/15 23
• Create restriction rest1 on table Customer_acc
For user manager To Columns(cust_bal) for
retension time12 Restricting access to select
Example
01/29/15 24
• If the clause for retention 12 is omitted
then the restriction is set for unspecified
period
Continue…….
01/29/15 25
Create restriction_user
On Customer_acc
For public
To rows where name=user Restricting
access to all
User specific accessing
01/29/15 26
• This type of restriction helps in building the
confidence level of customers for the
company.
Brand Stability and proposed model
01/29/15 27
Conclusion
01/29/15 28
Thank
You
alllllllllllllllllllllll
Presented by:
Harjinder Mann
Shelly
Sonia
Anupama
MCA-final
01/29/15 29

Weitere ähnliche Inhalte

Andere mochten auch

Simulation Project in ARENA
Simulation Project in ARENASimulation Project in ARENA
Simulation Project in ARENA
Aditya Nakate
 
Chapter 2 pertubation
Chapter 2 pertubationChapter 2 pertubation
Chapter 2 pertubation
NBER
 
SM Lecture One : Introducing Strategy
SM Lecture One : Introducing StrategySM Lecture One : Introducing Strategy
SM Lecture One : Introducing Strategy
StratMgt Advisor
 
What is international strategy
What is international strategyWhat is international strategy
What is international strategy
rhizluna
 
SM Lecture Nine (A) - International Strategy
SM Lecture Nine (A)  - International StrategySM Lecture Nine (A)  - International Strategy
SM Lecture Nine (A) - International Strategy
StratMgt Advisor
 
Chapter 8 international strategy
Chapter 8 international strategyChapter 8 international strategy
Chapter 8 international strategy
Dr. Lam D. Nguyen
 
Access Control Presentation
Access Control PresentationAccess Control Presentation
Access Control Presentation
Wajahat Rajab
 
International strategy
International strategyInternational strategy
International strategy
daryl10
 

Andere mochten auch (20)

Modeling & Simulation Lecture Notes
Modeling & Simulation Lecture NotesModeling & Simulation Lecture Notes
Modeling & Simulation Lecture Notes
 
Simulation Project in ARENA
Simulation Project in ARENASimulation Project in ARENA
Simulation Project in ARENA
 
Understanding strategic development
Understanding strategic developmentUnderstanding strategic development
Understanding strategic development
 
Simulation with ARENA - SM Paints
Simulation with ARENA - SM PaintsSimulation with ARENA - SM Paints
Simulation with ARENA - SM Paints
 
Simulation Project Report
Simulation Project ReportSimulation Project Report
Simulation Project Report
 
Chapter 2 pertubation
Chapter 2 pertubationChapter 2 pertubation
Chapter 2 pertubation
 
Generalized audit-software
Generalized audit-softwareGeneralized audit-software
Generalized audit-software
 
Intro to Deadlocks
Intro to DeadlocksIntro to Deadlocks
Intro to Deadlocks
 
SM Lecture One : Introducing Strategy
SM Lecture One : Introducing StrategySM Lecture One : Introducing Strategy
SM Lecture One : Introducing Strategy
 
What is international strategy
What is international strategyWhat is international strategy
What is international strategy
 
SM Lecture Nine (A) - International Strategy
SM Lecture Nine (A)  - International StrategySM Lecture Nine (A)  - International Strategy
SM Lecture Nine (A) - International Strategy
 
Ppt 02 international strategy
Ppt 02   international strategyPpt 02   international strategy
Ppt 02 international strategy
 
Deadlock ppt
Deadlock ppt Deadlock ppt
Deadlock ppt
 
Chapter 8 international strategy
Chapter 8 international strategyChapter 8 international strategy
Chapter 8 international strategy
 
Access Control Presentation
Access Control PresentationAccess Control Presentation
Access Control Presentation
 
Ch07 Access Control Fundamentals
Ch07 Access Control FundamentalsCh07 Access Control Fundamentals
Ch07 Access Control Fundamentals
 
Chp. 2 simulation examples
Chp. 2 simulation examplesChp. 2 simulation examples
Chp. 2 simulation examples
 
International strategy
International strategyInternational strategy
International strategy
 
Corporate level strategies
Corporate level strategiesCorporate level strategies
Corporate level strategies
 
SIMULATION
SIMULATIONSIMULATION
SIMULATION
 

Ähnlich wie Securing the privacy of customer

Current trends in data security nursing research ppt
Current trends in data security nursing research pptCurrent trends in data security nursing research ppt
Current trends in data security nursing research ppt
Nursing Path
 
Database Security, Threats & Countermeasures.pptx
Database Security, Threats & Countermeasures.pptxDatabase Security, Threats & Countermeasures.pptx
Database Security, Threats & Countermeasures.pptx
SaqibAhmedKhan4
 
Data Privacy Patterns in databricks for data engineering professional certifi...
Data Privacy Patterns in databricks for data engineering professional certifi...Data Privacy Patterns in databricks for data engineering professional certifi...
Data Privacy Patterns in databricks for data engineering professional certifi...
TusharAgarwal49094
 

Ähnlich wie Securing the privacy of customer (20)

Privacy: The New Software Development Dilemma
Privacy: The New Software Development DilemmaPrivacy: The New Software Development Dilemma
Privacy: The New Software Development Dilemma
 
Database security
Database securityDatabase security
Database security
 
Current trends in data security nursing research ppt
Current trends in data security nursing research pptCurrent trends in data security nursing research ppt
Current trends in data security nursing research ppt
 
Database Security, Threats & Countermeasures.pptx
Database Security, Threats & Countermeasures.pptxDatabase Security, Threats & Countermeasures.pptx
Database Security, Threats & Countermeasures.pptx
 
Unit - 4(2).pdf
Unit - 4(2).pdfUnit - 4(2).pdf
Unit - 4(2).pdf
 
Introduction To Analytics
Introduction To AnalyticsIntroduction To Analytics
Introduction To Analytics
 
An introduction to data protection - Manchester - 24/06/15
An introduction to data protection - Manchester - 24/06/15An introduction to data protection - Manchester - 24/06/15
An introduction to data protection - Manchester - 24/06/15
 
SQLCAT: Addressing Security and Compliance Issues with SQL Server 2008
SQLCAT: Addressing Security and Compliance Issues with SQL Server 2008SQLCAT: Addressing Security and Compliance Issues with SQL Server 2008
SQLCAT: Addressing Security and Compliance Issues with SQL Server 2008
 
Data Mining & Data Warehousing
Data Mining & Data WarehousingData Mining & Data Warehousing
Data Mining & Data Warehousing
 
An introduction to data protection - 2/09/2015
An introduction to data protection - 2/09/2015An introduction to data protection - 2/09/2015
An introduction to data protection - 2/09/2015
 
Data warehousing
Data warehousingData warehousing
Data warehousing
 
Data managment
Data managmentData managment
Data managment
 
Introduction to data protection - Edinburgh - 29/04/15
Introduction to data protection - Edinburgh - 29/04/15Introduction to data protection - Edinburgh - 29/04/15
Introduction to data protection - Edinburgh - 29/04/15
 
4482L3.ppt
4482L3.ppt4482L3.ppt
4482L3.ppt
 
Legal and data protection update
Legal and data protection updateLegal and data protection update
Legal and data protection update
 
Data Privacy Patterns in databricks for data engineering professional certifi...
Data Privacy Patterns in databricks for data engineering professional certifi...Data Privacy Patterns in databricks for data engineering professional certifi...
Data Privacy Patterns in databricks for data engineering professional certifi...
 
CISSP - Chapter 2 - Asset Security
CISSP - Chapter 2 -  Asset SecurityCISSP - Chapter 2 -  Asset Security
CISSP - Chapter 2 - Asset Security
 
Adbms 46 security and integrity of databases
Adbms 46 security and integrity of databasesAdbms 46 security and integrity of databases
Adbms 46 security and integrity of databases
 
4482 l3
4482 l34482 l3
4482 l3
 
BigInsight seminar on Practical Privacy-Preserving Distributed Statistical Co...
BigInsight seminar on Practical Privacy-Preserving Distributed Statistical Co...BigInsight seminar on Practical Privacy-Preserving Distributed Statistical Co...
BigInsight seminar on Practical Privacy-Preserving Distributed Statistical Co...
 

Securing the privacy of customer

  • 1. Securing the privacy of Customer Presentation On 01/29/15 1
  • 2. • Privacy is the right of individuals. • Computer security is the prevention or protection against – access to information by unauthorized recipients – intentional but unauthorized destruction or alteration of that information Introduction 01/29/15 2
  • 3. • Traditional databases • Statistical databases • Secure databases Related Work 01/29/15 3
  • 4. • Hippocratic databases require all the capabilities provided by current database systems • Different focus • Need to rethink data definition and query languages, query processing, indexing and storage structures, and access control mechanisms Traditional Database 01/29/15 4
  • 5. • Goal: Provide statistical information • Query restriction • Data perturbation Statistical Databases 01/29/15 5
  • 6. • Sensitive information is transmitted over a secure channel and stored securely • Access controls • Encryption • Multilevel secure databases Secure Databases 01/29/15 6
  • 7. • Purpose Specification • Consent • Limited Collection • Limited Use • Limited Disclosure Principles of Hippocratic 01/29/15 7
  • 8. • Limited Retention • Accuracy • Safety • Openness • Compliance Continue……. 01/29/15 8
  • 9. • Team Formation • Setting the responsibility • Setting the objective • Aware the Customer Key Requisites for Privacy Policy 01/29/15 9
  • 10. • Lawful collection • Maintaining the accuracy • Obtaining complete information • Data Security Continue……. 01/29/15 10
  • 11. • Disclosure norms • Storage norms • Updated norms • Information norms Continue……. 01/29/15 11
  • 12. • Privacy Metadata • Data Collection • Querying • Retention • Data Collection Organizer Proposed Design and Implementation 01/29/15 12
  • 13. • External recipients • Retention Period • Authorized users Privacy Metadata 01/29/15 13
  • 14. • Data is inserted with the purpose for which it may be used. • Data Accuracy Analyzer addresses the Principle of Accuracy Data Collection 01/29/15 14
  • 15. • Queries are tagged with a purpose • Before query execution • During query execution • After query execution Querying 01/29/15 15
  • 16. • A data item should be retained for the maximum retention period among all the purposes for which it has been collected. • After this period, it should be deleted. Retention 01/29/15 16
  • 17. • Data is fed into the database. • It has to be retained till its purpose is solved. • Data manager deletes all the data once purpose is solved. Applicable Restriction 01/29/15 17
  • 18. • Fine grained access control (FGAC) • In order to maintain the retention restriction along with sustaining data consider a example The Proposed Model 01/29/15 18
  • 19. Table1 Customer details Constraints Data type Cust_id Not NULL Integer Cust_name Char(32) Cust_add Varchar2 01/29/15 19
  • 20. Table2 Restriction details Constraints Data type Restrict_id NotNULL Integer Restrict_name Varchar2 Restrict_date date 01/29/15 20
  • 21. Table3 Restriction date Data type Restrict_id Integer Restrict_startdate date Restrict_enddate date 01/29/15 21
  • 22. Table4 Customer_acc Data type Cust_id Integer Cust_acc Integer Cust_bal Integer 01/29/15 22
  • 23. • Create restriction <restriction_name> On <table> For <authorization> (((to columns<column list>|to rows [Where search_condition] |to cells <column_list[where search_condition]+)) [for retension time time_interval])+ [restriction access to commands>] Syntax for creating the restriction 01/29/15 23
  • 24. • Create restriction rest1 on table Customer_acc For user manager To Columns(cust_bal) for retension time12 Restricting access to select Example 01/29/15 24
  • 25. • If the clause for retention 12 is omitted then the restriction is set for unspecified period Continue……. 01/29/15 25
  • 26. Create restriction_user On Customer_acc For public To rows where name=user Restricting access to all User specific accessing 01/29/15 26
  • 27. • This type of restriction helps in building the confidence level of customers for the company. Brand Stability and proposed model 01/29/15 27

Hinweis der Redaktion

  1. Computer security definition from Dictionary of Computing, Fourth Ed. (Oxford: Oxford University Press, 1996).