SlideShare ist ein Scribd-Unternehmen logo
1 von 18
Downloaden Sie, um offline zu lesen
Open Access and Database Anonymization
an Open Source Procedure
Based on an Italian Case Study
Danube University Krems, 21-23 May 2014
L. Leschiutta, G.Futia
dd
th
Month Year What 222nd May 2014 Giuseppe Futia – Politecnico di Torino 2
Introduction (1)
 The principal way to openly share a database is to remove all
data that could lead to the identification of the involved
subjects (i.e. database anonymization);
 we describe a procedure on how to process and anonymize a
collection of data that includes personal, sensitive and
judicial data;
 the procedure is general purpose and implemented relying
solely on common open-source software applications.
dd
th
Month Year What 322nd May 2014 Giuseppe Futia – Politecnico di Torino 3
Introduction (2)
• Our study is based on a real case in which a database
consisting of 352 data fields of car accidents related data
(TWIST) needs to be open accessed;
• this work was developed in the framework of the Open-DAI
project. Open-DAI is “Opening Data Architectures and
Infrastructures” for European Public Administrations. It is a
project funded under the ICT Policy Support Programme as
part of the Competitiveness and Innovation framework
Programme (CIP) Call 2011.
dd
th
Month Year What 422nd May 2014 Giuseppe Futia – Politecnico di Torino 4
Non Anonymous Data
ID1 NID1 ID2 ID3 NID2 ID4 NID3 NID4
Item 1
Item 2
Item N
dd
th
Month Year What 522nd May 2014 Giuseppe Futia – Politecnico di Torino 5
Ordered Non Anonymous Data
ID1 ID2 ID3 ID4 NID1 NID2 NID3 NID4
Item 1
Item 2
Item N
dd
th
Month Year What 622nd May 2014 Giuseppe Futia – Politecnico di Torino 6
Ordered Non Anonymous Data
including Anonymous IDs
ID1 ID2 ID3 ID4 AID NID1 NID2 NID3 NID4
Item 1
1053
Item 2
1001
1057
Item N
1133
dd
th
Month Year What 722nd May 2014 Giuseppe Futia – Politecnico di Torino 7
Anonymous Data
AID NID1 NID2 NID3 NID4
1053
1001
1057
1133
dd
th
Month Year What 822nd May 2014 Giuseppe Futia – Politecnico di Torino 8
Random AIDs generation
dd
th
Month Year What 922nd May 2014 Giuseppe Futia – Politecnico di Torino 9
Advanced techniques: repeating IDs
IF(ISNA(VLOOKUP(C4;C$1:C3;1; ));AID.A8;VLOOKUP(C4;C$1:F3;4; ))
dd
th
Month Year What 1022nd May 2014 Giuseppe Futia – Politecnico di Torino 10
Non Unique IDs In Multiple Cells (1)
ID1 ID2 ID3 ID4 NID1 NID2 NID3 NID4
Item 1 Lorem ipsum
Item 2
Lorem ipsum
Item N Lorem ipsum
dd
th
Month Year What 1122nd May 2014 Giuseppe Futia – Politecnico di Torino 11
Non Unique IDs In Multiple Cells (2)
flag=false;
for (i=0; i<n: i++){
for (j=0; j<m: j++){
if(ID_Matrix[i][j]==ID_Matrix[n][m]{
AID_Matrix[n][m] =
AID_Matrix[i][j];
flag=true;
break;
}
}
}
if (flag==false){
AID_Matrix[n][m] = Next_Availabe_AID(k);
k++;
}
dd
th
Month Year What 1222nd May 2014 Giuseppe Futia – Politecnico di Torino 12
Data Wiping
• To perform this operation on Windows,
you can use the open source program
Eraser (http://eraser.heidi.ie );
• on Linux, you can use the following
commands:
> shred NonAnonymousData.csv
> rm NonAnonymousData.csv
dd
th
Month Year What 1322nd May 2014 Giuseppe Futia – Politecnico di Torino 13
Cryptograph the file
• On Windows this can be achieved by using the
open source 7zip program (http://www.7-
zip.org/ ) that allows to achieve a strong AES-
256 encryption.
• On Linux you can use the following command:
> gpg -c NonAnonymousData.csv
The encrypted file must then be backed up to a
safe location e.g. a non-rewritable DVD or a
WORM (Write Once Read Many) tape.
dd
th
Month Year What 1422nd May 2014 Giuseppe Futia – Politecnico di Torino 14
Data Degradation (location)
dd
th
Month Year What 1522nd May 2014 Giuseppe Futia – Politecnico di Torino 15
Data Degradation (location)
dd
th
Month Year What 1622nd May 2014 Giuseppe Futia – Politecnico di Torino 16
Data Degradation (time)
• 10 November 2011 at 10:25
• 10 November 2011 between 10 and 11
• Winter 2011
dd
th
Month Year What 1722nd May 2014 Giuseppe Futia – Politecnico di Torino 17
Conclusions: de-anonymization test
• How to test if a database is anonymous
enough?
• Reasonable efforts “the means possibly
required to effect identification are to be
considered disproportionate compared
with the (risk of) damage resulting”
• de-anonymization test
22nd May 2014 Giuseppe Futia – Politecnico di Torino 18
Thank you
Luca Leschiutta (luca.leschiutta@polito.it)
Giuseppe Futia (giuseppe.futia@polito.it)
Nexa Center for Internet & Society (http://nexa.polito.it)
Dept. of Computer and Control Engineering (DAUIN)
Politecnico di Torino, Italy

Weitere ähnliche Inhalte

Ähnlich wie Presentation cedem luca

Domenico Donvito - Istat - Open Data in Official Statistics - 10 July 2013
Domenico Donvito - Istat - Open Data in Official Statistics - 10 July 2013Domenico Donvito - Istat - Open Data in Official Statistics - 10 July 2013
Domenico Donvito - Istat - Open Data in Official Statistics - 10 July 2013AmbasciatadelCanada
 
5 Key Steps Involved In Digital Forensic Science
5 Key Steps Involved In Digital Forensic Science5 Key Steps Involved In Digital Forensic Science
5 Key Steps Involved In Digital Forensic ScienceICFECI
 
The Emergence of Digital Forensic Bangalore
The Emergence of Digital Forensic BangaloreThe Emergence of Digital Forensic Bangalore
The Emergence of Digital Forensic Bangaloreehackacademy
 
Aligning stakeholders' perspectives in Open Government Data Community
Aligning stakeholders' perspectives in Open Government Data CommunityAligning stakeholders' perspectives in Open Government Data Community
Aligning stakeholders' perspectives in Open Government Data CommunityAdegboyega Ojo
 
The Swiss OGD-Portal (Offene Archive 2.2, 4.12.2015)
The Swiss OGD-Portal (Offene Archive 2.2, 4.12.2015)The Swiss OGD-Portal (Offene Archive 2.2, 4.12.2015)
The Swiss OGD-Portal (Offene Archive 2.2, 4.12.2015)Offene Archive
 
Visualizing Internet-Measurements Data for Research Purposes: the NeuViz Data...
Visualizing Internet-Measurements Data for Research Purposes: the NeuViz Data...Visualizing Internet-Measurements Data for Research Purposes: the NeuViz Data...
Visualizing Internet-Measurements Data for Research Purposes: the NeuViz Data...giuseppe_futia
 
digital forensic examination of mobile phone data
digital forensic examination of mobile phone datadigital forensic examination of mobile phone data
digital forensic examination of mobile phone dataINFOGAIN PUBLICATION
 
Anti-Forensic Techniques and Its Impact on Digital Forensic
Anti-Forensic Techniques and Its Impact on Digital ForensicAnti-Forensic Techniques and Its Impact on Digital Forensic
Anti-Forensic Techniques and Its Impact on Digital ForensicIRJET Journal
 
SC7 Workshop 3: Copernicus Data and Information Access Services (DIAS)
SC7 Workshop 3: Copernicus Data and Information Access Services (DIAS)SC7 Workshop 3: Copernicus Data and Information Access Services (DIAS)
SC7 Workshop 3: Copernicus Data and Information Access Services (DIAS)BigData_Europe
 
Digital Forensics Assignment One UEL and Unicaf
Digital Forensics Assignment One UEL and UnicafDigital Forensics Assignment One UEL and Unicaf
Digital Forensics Assignment One UEL and UnicafDamaineFranklinMScBE
 
Learning with the Web. Structuring data to ease machine understanding
Learning with the Web. Structuring data to ease  machine understandingLearning with the Web. Structuring data to ease  machine understanding
Learning with the Web. Structuring data to ease machine understandingGiuseppe Rizzo
 
Collaboration Between Infosec Community and CERT Teams : Project Sonar case
Collaboration Between Infosec Community and CERT Teams : Project Sonar caseCollaboration Between Infosec Community and CERT Teams : Project Sonar case
Collaboration Between Infosec Community and CERT Teams : Project Sonar caseValdes Nzalli
 
INSPEC2T System Security & Privacy Considerations
INSPEC2T System Security & Privacy ConsiderationsINSPEC2T System Security & Privacy Considerations
INSPEC2T System Security & Privacy ConsiderationsTrilateral Research
 
FINODEX: open data for business (if you trust it)
FINODEX: open data for business (if you trust it)FINODEX: open data for business (if you trust it)
FINODEX: open data for business (if you trust it)Maurizio Napolitano
 
Selected funding calls 2014, tentative.
Selected funding calls 2014, tentative. Selected funding calls 2014, tentative.
Selected funding calls 2014, tentative. bgatorcom
 
TIMELINESS OF OPEN DATA IN OPEN GOVERNMENT DATA PORTALS THROUGH PANDEMIC-RELA...
TIMELINESS OF OPEN DATA IN OPEN GOVERNMENT DATA PORTALS THROUGH PANDEMIC-RELA...TIMELINESS OF OPEN DATA IN OPEN GOVERNMENT DATA PORTALS THROUGH PANDEMIC-RELA...
TIMELINESS OF OPEN DATA IN OPEN GOVERNMENT DATA PORTALS THROUGH PANDEMIC-RELA...Anastasija Nikiforova
 
Hamburg Transparency Law
Hamburg Transparency LawHamburg Transparency Law
Hamburg Transparency LawePSI Platform
 

Ähnlich wie Presentation cedem luca (20)

Domenico Donvito - Istat - Open Data in Official Statistics - 10 July 2013
Domenico Donvito - Istat - Open Data in Official Statistics - 10 July 2013Domenico Donvito - Istat - Open Data in Official Statistics - 10 July 2013
Domenico Donvito - Istat - Open Data in Official Statistics - 10 July 2013
 
5 Key Steps Involved In Digital Forensic Science
5 Key Steps Involved In Digital Forensic Science5 Key Steps Involved In Digital Forensic Science
5 Key Steps Involved In Digital Forensic Science
 
The Emergence of Digital Forensic Bangalore
The Emergence of Digital Forensic BangaloreThe Emergence of Digital Forensic Bangalore
The Emergence of Digital Forensic Bangalore
 
Aligning stakeholders' perspectives in Open Government Data Community
Aligning stakeholders' perspectives in Open Government Data CommunityAligning stakeholders' perspectives in Open Government Data Community
Aligning stakeholders' perspectives in Open Government Data Community
 
The Swiss OGD-Portal (Offene Archive 2.2, 4.12.2015)
The Swiss OGD-Portal (Offene Archive 2.2, 4.12.2015)The Swiss OGD-Portal (Offene Archive 2.2, 4.12.2015)
The Swiss OGD-Portal (Offene Archive 2.2, 4.12.2015)
 
Visualizing Internet-Measurements Data for Research Purposes: the NeuViz Data...
Visualizing Internet-Measurements Data for Research Purposes: the NeuViz Data...Visualizing Internet-Measurements Data for Research Purposes: the NeuViz Data...
Visualizing Internet-Measurements Data for Research Purposes: the NeuViz Data...
 
digital forensic examination of mobile phone data
digital forensic examination of mobile phone datadigital forensic examination of mobile phone data
digital forensic examination of mobile phone data
 
3170725_Unit-1.pptx
3170725_Unit-1.pptx3170725_Unit-1.pptx
3170725_Unit-1.pptx
 
Anti-Forensic Techniques and Its Impact on Digital Forensic
Anti-Forensic Techniques and Its Impact on Digital ForensicAnti-Forensic Techniques and Its Impact on Digital Forensic
Anti-Forensic Techniques and Its Impact on Digital Forensic
 
SC7 Workshop 3: Copernicus Data and Information Access Services (DIAS)
SC7 Workshop 3: Copernicus Data and Information Access Services (DIAS)SC7 Workshop 3: Copernicus Data and Information Access Services (DIAS)
SC7 Workshop 3: Copernicus Data and Information Access Services (DIAS)
 
Digital Forensics Assignment One UEL and Unicaf
Digital Forensics Assignment One UEL and UnicafDigital Forensics Assignment One UEL and Unicaf
Digital Forensics Assignment One UEL and Unicaf
 
Learning with the Web. Structuring data to ease machine understanding
Learning with the Web. Structuring data to ease  machine understandingLearning with the Web. Structuring data to ease  machine understanding
Learning with the Web. Structuring data to ease machine understanding
 
14a Conferenza Nazionale di Statistica
14a Conferenza Nazionale di Statistica14a Conferenza Nazionale di Statistica
14a Conferenza Nazionale di Statistica
 
Collaboration Between Infosec Community and CERT Teams : Project Sonar case
Collaboration Between Infosec Community and CERT Teams : Project Sonar caseCollaboration Between Infosec Community and CERT Teams : Project Sonar case
Collaboration Between Infosec Community and CERT Teams : Project Sonar case
 
INSPEC2T System Security & Privacy Considerations
INSPEC2T System Security & Privacy ConsiderationsINSPEC2T System Security & Privacy Considerations
INSPEC2T System Security & Privacy Considerations
 
FINODEX: open data for business (if you trust it)
FINODEX: open data for business (if you trust it)FINODEX: open data for business (if you trust it)
FINODEX: open data for business (if you trust it)
 
Selected funding calls 2014, tentative.
Selected funding calls 2014, tentative. Selected funding calls 2014, tentative.
Selected funding calls 2014, tentative.
 
TIMELINESS OF OPEN DATA IN OPEN GOVERNMENT DATA PORTALS THROUGH PANDEMIC-RELA...
TIMELINESS OF OPEN DATA IN OPEN GOVERNMENT DATA PORTALS THROUGH PANDEMIC-RELA...TIMELINESS OF OPEN DATA IN OPEN GOVERNMENT DATA PORTALS THROUGH PANDEMIC-RELA...
TIMELINESS OF OPEN DATA IN OPEN GOVERNMENT DATA PORTALS THROUGH PANDEMIC-RELA...
 
3170725_Unit-1.pptx
3170725_Unit-1.pptx3170725_Unit-1.pptx
3170725_Unit-1.pptx
 
Hamburg Transparency Law
Hamburg Transparency LawHamburg Transparency Law
Hamburg Transparency Law
 

Mehr von Danube University Krems, Centre for E-Governance

Mehr von Danube University Krems, Centre for E-Governance (20)

Smart Cities workshop at CeDEM17
Smart Cities workshop at CeDEM17Smart Cities workshop at CeDEM17
Smart Cities workshop at CeDEM17
 
#CeDEM17 - Towards an Open Data based ICT Reference Architecture for Smart Ci...
#CeDEM17 - Towards an Open Data based ICT Reference Architecture for Smart Ci...#CeDEM17 - Towards an Open Data based ICT Reference Architecture for Smart Ci...
#CeDEM17 - Towards an Open Data based ICT Reference Architecture for Smart Ci...
 
#CeDEM17 - Financial Payments and Smart Cities
#CeDEM17 - Financial Payments and Smart Cities #CeDEM17 - Financial Payments and Smart Cities
#CeDEM17 - Financial Payments and Smart Cities
 
#CeDEM2017 Smart Cities of Self-Determined Data Subjects
#CeDEM2017 Smart Cities of Self-Determined Data Subjects#CeDEM2017 Smart Cities of Self-Determined Data Subjects
#CeDEM2017 Smart Cities of Self-Determined Data Subjects
 
Open Data as Enabler of Public Service Co-creation: Exploring the Drivers and...
Open Data as Enabler of Public Service Co-creation:Exploring the Drivers and...Open Data as Enabler of Public Service Co-creation:Exploring the Drivers and...
Open Data as Enabler of Public Service Co-creation: Exploring the Drivers and...
 
DatalEt-Ecosystem Provider - The DEEP project
DatalEt-Ecosystem Provider - The DEEP projectDatalEt-Ecosystem Provider - The DEEP project
DatalEt-Ecosystem Provider - The DEEP project
 
Towards Open Justice: ICT acceptance in the Greek justice system
Towards Open Justice: ICT acceptance in the Greek justice systemTowards Open Justice: ICT acceptance in the Greek justice system
Towards Open Justice: ICT acceptance in the Greek justice system
 
[X]CHANGING PERSPECTIVES
[X]CHANGING PERSPECTIVES[X]CHANGING PERSPECTIVES
[X]CHANGING PERSPECTIVES
 
Using fuzzy cognitive maps as decision support tool for smart cities goraczek
Using fuzzy cognitive maps as decision support tool for smart cities  goraczekUsing fuzzy cognitive maps as decision support tool for smart cities  goraczek
Using fuzzy cognitive maps as decision support tool for smart cities goraczek
 
Understanding of smartphone divide dal yong
Understanding of smartphone divide  dal yongUnderstanding of smartphone divide  dal yong
Understanding of smartphone divide dal yong
 
The motivations behind open access publishing judith schossboeck
The motivations behind open access publishing  judith schossboeckThe motivations behind open access publishing  judith schossboeck
The motivations behind open access publishing judith schossboeck
 
Social media as hobed of racism and hate speech kobayashi, kaigo, kwak
Social media as hobed of racism and hate speech kobayashi, kaigo, kwakSocial media as hobed of racism and hate speech kobayashi, kaigo, kwak
Social media as hobed of racism and hate speech kobayashi, kaigo, kwak
 
Social media and citizen engagement in asia skoric
Social media and citizen engagement in asia  skoricSocial media and citizen engagement in asia  skoric
Social media and citizen engagement in asia skoric
 
Realizin modeling and evaluation city's enerfy efficiency leonidas anthopoulos
Realizin modeling and evaluation city's enerfy efficiency leonidas anthopoulosRealizin modeling and evaluation city's enerfy efficiency leonidas anthopoulos
Realizin modeling and evaluation city's enerfy efficiency leonidas anthopoulos
 
Post 2015 paris c limate conference politics on the internet manuela hartwig
Post 2015 paris c limate conference politics on the internet  manuela hartwigPost 2015 paris c limate conference politics on the internet  manuela hartwig
Post 2015 paris c limate conference politics on the internet manuela hartwig
 
Open government and national sovereignty ivo babaja
Open government and national sovereignty  ivo babajaOpen government and national sovereignty  ivo babaja
Open government and national sovereignty ivo babaja
 
Health r isk communication in the digital era myojung chung
Health r isk communication in the digital era myojung chungHealth r isk communication in the digital era myojung chung
Health r isk communication in the digital era myojung chung
 
An analysis of japanese local government facebook profiles muneo kaigo
An analysis of japanese local government facebook profiles muneo kaigoAn analysis of japanese local government facebook profiles muneo kaigo
An analysis of japanese local government facebook profiles muneo kaigo
 
GovCamp 2016 - Co-Creation
GovCamp 2016 - Co-CreationGovCamp 2016 - Co-Creation
GovCamp 2016 - Co-Creation
 
Datenschutzbeauftragte werden in Zukunft eine wichtige Rolle im Unternehmen s...
Datenschutzbeauftragte werden in Zukunft eine wichtige Rolle im Unternehmen s...Datenschutzbeauftragte werden in Zukunft eine wichtige Rolle im Unternehmen s...
Datenschutzbeauftragte werden in Zukunft eine wichtige Rolle im Unternehmen s...
 

Kürzlich hochgeladen

"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfOverkill Security
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 

Kürzlich hochgeladen (20)

"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 

Presentation cedem luca

  • 1. Open Access and Database Anonymization an Open Source Procedure Based on an Italian Case Study Danube University Krems, 21-23 May 2014 L. Leschiutta, G.Futia
  • 2. dd th Month Year What 222nd May 2014 Giuseppe Futia – Politecnico di Torino 2 Introduction (1)  The principal way to openly share a database is to remove all data that could lead to the identification of the involved subjects (i.e. database anonymization);  we describe a procedure on how to process and anonymize a collection of data that includes personal, sensitive and judicial data;  the procedure is general purpose and implemented relying solely on common open-source software applications.
  • 3. dd th Month Year What 322nd May 2014 Giuseppe Futia – Politecnico di Torino 3 Introduction (2) • Our study is based on a real case in which a database consisting of 352 data fields of car accidents related data (TWIST) needs to be open accessed; • this work was developed in the framework of the Open-DAI project. Open-DAI is “Opening Data Architectures and Infrastructures” for European Public Administrations. It is a project funded under the ICT Policy Support Programme as part of the Competitiveness and Innovation framework Programme (CIP) Call 2011.
  • 4. dd th Month Year What 422nd May 2014 Giuseppe Futia – Politecnico di Torino 4 Non Anonymous Data ID1 NID1 ID2 ID3 NID2 ID4 NID3 NID4 Item 1 Item 2 Item N
  • 5. dd th Month Year What 522nd May 2014 Giuseppe Futia – Politecnico di Torino 5 Ordered Non Anonymous Data ID1 ID2 ID3 ID4 NID1 NID2 NID3 NID4 Item 1 Item 2 Item N
  • 6. dd th Month Year What 622nd May 2014 Giuseppe Futia – Politecnico di Torino 6 Ordered Non Anonymous Data including Anonymous IDs ID1 ID2 ID3 ID4 AID NID1 NID2 NID3 NID4 Item 1 1053 Item 2 1001 1057 Item N 1133
  • 7. dd th Month Year What 722nd May 2014 Giuseppe Futia – Politecnico di Torino 7 Anonymous Data AID NID1 NID2 NID3 NID4 1053 1001 1057 1133
  • 8. dd th Month Year What 822nd May 2014 Giuseppe Futia – Politecnico di Torino 8 Random AIDs generation
  • 9. dd th Month Year What 922nd May 2014 Giuseppe Futia – Politecnico di Torino 9 Advanced techniques: repeating IDs IF(ISNA(VLOOKUP(C4;C$1:C3;1; ));AID.A8;VLOOKUP(C4;C$1:F3;4; ))
  • 10. dd th Month Year What 1022nd May 2014 Giuseppe Futia – Politecnico di Torino 10 Non Unique IDs In Multiple Cells (1) ID1 ID2 ID3 ID4 NID1 NID2 NID3 NID4 Item 1 Lorem ipsum Item 2 Lorem ipsum Item N Lorem ipsum
  • 11. dd th Month Year What 1122nd May 2014 Giuseppe Futia – Politecnico di Torino 11 Non Unique IDs In Multiple Cells (2) flag=false; for (i=0; i<n: i++){ for (j=0; j<m: j++){ if(ID_Matrix[i][j]==ID_Matrix[n][m]{ AID_Matrix[n][m] = AID_Matrix[i][j]; flag=true; break; } } } if (flag==false){ AID_Matrix[n][m] = Next_Availabe_AID(k); k++; }
  • 12. dd th Month Year What 1222nd May 2014 Giuseppe Futia – Politecnico di Torino 12 Data Wiping • To perform this operation on Windows, you can use the open source program Eraser (http://eraser.heidi.ie ); • on Linux, you can use the following commands: > shred NonAnonymousData.csv > rm NonAnonymousData.csv
  • 13. dd th Month Year What 1322nd May 2014 Giuseppe Futia – Politecnico di Torino 13 Cryptograph the file • On Windows this can be achieved by using the open source 7zip program (http://www.7- zip.org/ ) that allows to achieve a strong AES- 256 encryption. • On Linux you can use the following command: > gpg -c NonAnonymousData.csv The encrypted file must then be backed up to a safe location e.g. a non-rewritable DVD or a WORM (Write Once Read Many) tape.
  • 14. dd th Month Year What 1422nd May 2014 Giuseppe Futia – Politecnico di Torino 14 Data Degradation (location)
  • 15. dd th Month Year What 1522nd May 2014 Giuseppe Futia – Politecnico di Torino 15 Data Degradation (location)
  • 16. dd th Month Year What 1622nd May 2014 Giuseppe Futia – Politecnico di Torino 16 Data Degradation (time) • 10 November 2011 at 10:25 • 10 November 2011 between 10 and 11 • Winter 2011
  • 17. dd th Month Year What 1722nd May 2014 Giuseppe Futia – Politecnico di Torino 17 Conclusions: de-anonymization test • How to test if a database is anonymous enough? • Reasonable efforts “the means possibly required to effect identification are to be considered disproportionate compared with the (risk of) damage resulting” • de-anonymization test
  • 18. 22nd May 2014 Giuseppe Futia – Politecnico di Torino 18 Thank you Luca Leschiutta (luca.leschiutta@polito.it) Giuseppe Futia (giuseppe.futia@polito.it) Nexa Center for Internet & Society (http://nexa.polito.it) Dept. of Computer and Control Engineering (DAUIN) Politecnico di Torino, Italy