SlideShare ist ein Scribd-Unternehmen logo
1 von 29
Downloaden Sie, um offline zu lesen
Applying Data Privacy Techniques on Published Data
                    in Uganda

               Kato Mivule and Claude Turner, PhD

                   Computer Science Department
                      Bowie State University

EEE'12 - The 2012 International Conference on e-Learning, e-Business, Enterprise
                    Information Systems, and e-Government
                       Las Vegas, Nevada, USA July 16-19
Applying Data Privacy Techniques on Published Data in Uganda

Agenda

   •     Introduction
   •     Data Privacy and Security Policies
   •     Related work on data privacy in Uganda
   •     Essential data privacy terms
   •     Data privacy techniques
   •     Data privacy implementation
   •     Results
   •     Conclusion
   •     References



       Uganda flag and map - Image source: Wikipedia
Applying Data Privacy Techniques on Published Data in Uganda

Introduction
•   Higher education institutions post student admission and graduation data online.

•   The Ugandan Electoral Commission posted the 2010 national voter's register online.
•   Uganda Bureau of Statistics publishes statistical data routinely online.

•   Most published datasets from Uganda include personal identifiable information (PII).
•   A growing number of young Ugandans are fans of Online Social Networks (OSN).
Applying Data Privacy Techniques on Published Data in Uganda

Introduction
Exponential Data explosion in Africa:

        •   110 million Internet users as of 2011

        •   17 million Facebook accounts
                                                       Text till you drop Campaign -Image source: Wikipedia
        •   A penetration rate of 10 percent for Internet

        •   1.7 percent penetration rate for Facebook in Africa

        •   500 million mobile subscriptions as of November 2010 in Africa

        •   These numbers are projected grow
Applying Data Privacy Techniques on Published Data in Uganda

Introduction
Current population in Africa is estimated at 1 Billion.




The Mobile Phone has rightly been described by technologist Erik Hersman as “Africa's PC”
(whiteafrican.com) .
Applying Data Privacy Techniques on Published Data in Uganda

Introduction
                                                  Image source: Manypossibilities.net
The Data Privacy Problem: “Africa's PC”.




Companies like SEACOM have already completed laying their fiber optic cable to East Africa.
Applying Data Privacy Techniques on Published Data in Uganda

Introduction
•   Case studies on data privacy in EU and USA have been done.

•   Case studies on data privacy in emerging markets is minimal.

•   With a globalized economy, demands for data privacy is critical.

•   Therefore in this paper…
        • We take a look at current data privacy and security laws in Uganda
        • Implementation of data privacy techniques for a published Ugandan dataset
        • Suggest how this approach may be generalized for data privacy in the country.




                                 African Savanna - Image source: Wikipedia
Applying Data Privacy Techniques on Published Data in Uganda

Data Privacy and Security Policies

• In the USA, state and federal privacy laws require privacy of individuals be protected.
       • The USA is the Privacy Act of 1974.
       • Health Insurance Portability and Accountability Act (HIPAA) of 1996.

• The Ugandan constitution defines privacy in terms of interference, stating that:
      • “…no person shall be subjected to interference with the privacy of that
         person’s home, correspondence, communication or other property…”

• However, no precise definition is given in the context of PII, data privacy, and
  computer security.




                               Kampala City - Image source: Wikipedia
Applying Data Privacy Techniques on Published Data in Uganda

Data Privacy and Security Policies
• Ugandan Bureau of Statistics Act of 1998 describes Ugandan government policy on
  data collected by the Ugandan Bureau of Statistics (UBS).

       • No policy on how non-governmental entities collect and disseminate data.

       • PII in the Ugandan context is not mentioned.

       • “removal of identifiers” is mentioned but is ambiguous.




                                                            UBS Building Kampala- Image source: NBS TV UG

       • UBS with expert care does publish de-identified micro datasets.
Applying Data Privacy Techniques on Published Data in Uganda

Data Privacy and Security Policies

• No clear data privacy policies from:
       • The Uganda Communications Commission (UCC).
       • Ministry of Information and Communications Technology (ICT).

• The set of PII in the USA differs from that in Uganda.
                                                                             A “Mobile” Masai - Image
                                                                              source: Google Images
• There is need to expand Uganda's policy on Data Privacy.

• To date, no clear legal and technological data privacy framework exists in Uganda.

• We suggest data privacy techniques that could be utilized for basic data privacy .
Applying Data Privacy Techniques on Published Data in Uganda

Related work on data privacy in Uganda

• Work on data privacy in Uganda and much of sub-Saharan Africa is sparse.

       • Research on computer security in Uganda exists but centers on:
          • Network security and access control.
          • Cryptographic methodologies.
          • Data mining but privacy preservation not discussed.
          • Calls for electronic privacy policy in Uganda.

       • Data privacy – deals with Confidentiality.
       • Data security – deals with Accessibility.



                                                             Makerere University Faculty of Computing -
                                                                  Image source: Newvision.co.ug
Applying Data Privacy Techniques on Published Data in Uganda

Essential data privacy terms

Data privacy - protection of an individual’s data against unauthorized disclosure.
Data security - safety of data from unauthorized access.

Personally identifiable information (PII) - any identifying data about an individual.
Data De-identification - PII attributes are removed from data.

Data utility verses privacy - how useful a published dataset is to a user of that dataset.
Privacy verses Utility - a balance between privacy and data utility is always sought.
Achieving optimal data privacy while not distorting data utility is an NP-hard challenge.




                               Ancient Nsibidi Nigerian Symbols - Image source: Wikipedia
Applying Data Privacy Techniques on Published Data in Uganda

Essential terms

• Statistical databases - published data sets that do not change.
• Attributes in statistical databases - field names or columns.

• PII attributes - properties that uniquely identify an individual.
                                                                      A San man - Image source: Wikipedia

• Quasi-attributes - attributes not in the PII category .
• Confidential attributes - not PII and quasi-attributes but contain sensitive data.

• Non confidential attributes - attributes that individuals do not consider sensitive.
• Inference and reconstruction attacks - separate pieces of data are used to derive a
  conclusion about a subject.
Applying Data Privacy Techniques on Published Data in Uganda

Data Privacy Techniques
•   Non-perturbative techniques – original data not distorted.
•   Perturbative techniques – original data distorted.


                                                              Ashante Kente wove Pattern - Image source: Wikipedia

•   Suppression - sensitive data values that are unique are omitted.
•   Generalization - sensitive data values are made less informative.
•   k-anonymity - utilizes generalization, and suppression.

        •   k-anonymity requires that for a dataset with quasi-identifier attributes in
            database to be published, values in the quasi-identifier attributes be repeated
            at least k times to ensure privacy; that is, k >1. Sweeney[27].

•   Achieving an optimal k-anonymized dataset is still an NP-Hard challenge.
Applying Data Privacy Techniques on Published Data in Uganda

Methodology

• INPUT: Data from relation or schema
• OUTPUT: Data privacy preserving published tabular dataset
      • Identify PII Attributes
      • Remove PII Attributes
      • Identify quasi-identifier attributes
      • Generalize or Suppress quasi-identifier attributes
           • Check that k>1 in tuples
      • Check for single values that cannot be grouped together to achieve k>1
           • If single values exist, Generalize or Suppress until k-anonymity at k>1
      • Check for utility
      • Publish tabular dataset
Applying Data Privacy Techniques on Published Data in Uganda

Methodology

•   We express our implementation using :
       • Set theory notation.
       • Relational database notation.
       • MySQL implementation.

•   We de-identified a Ugandan Students dataset of 1200 records published online.

•   We utilized the definitions PII as defined by the US data privacy laws (HIPAA).
Applying Data Privacy Techniques on Published Data in Uganda

Methodology
Applying Data Privacy Techniques on Published Data in Uganda

Methodology

The original dataset included the following attributes, in which we let the following:


     A = { RegNo, StudentNo, Lname, Fname, Mname, Sex, BirthDate, Nationality, Hall,
        Program, IndexNo, Year }, all attributes.

     B = { Lname, Fname, Mname, StudentNo, IndexNo, RegNo}, the set of all PII attributes
        that we identified in the published dataset.

     C = { Nationality, Sex, BirthDate,}, the set of all quasi-identifier attributes identified in
        the dataset.


     D = {Hall, Program, Year}, the set of all non-sensitive attributes.


     E = { }, the set of all sensitive attributes.
Applying Data Privacy Techniques on Published Data in Uganda

Methodology
• Thus, we have B⊂ A, C⊂ A, D⊂ A and E⊂ A;
    • Therefore A=B∪ C∪ D∪ E, and A ={ B, C, D, E}.
    • By removing PII, we get A ={ C, D, E}.

• The de-identification of the Admission List set involves a complement of the PII set:
  (B)c = U – B = A – B = C + D + E.
       • Therefore, we remained with the quasi attributes, non-sensitive attributes, and
          sensitive attributes; where U is the universal set, which in this case is all the
           Admission List attributes.
• We suppressed or generalized the quasi attributes: suppress or generalize (C).
    • We then applied k-anonymity: k-anonymity( (B)c ).
    • Finally, we ordered values of (B)c.

    • If k = 1, we suppressed or generalized C until k >1.
Applying Data Privacy Techniques on Published Data in Uganda

Methodology
•Relational model view: For a formal relational model view implementation, we applied the following
notation:

•We let π <attribute list>(R ) ,
     where π is the projection or selecting of attributes from a relation (Table),
     <attribute list> is the list of attributes from Admission List ,
     (R) is the relation from which we select attributes.



•The original projection with all attributes is:
     π<RegNo, StudentNo, Lname, Fname, Mname, Sex, BirthDate, Nationality, Hall, Program,
         IndexNo, Year >( Admission List ).

•The projection void of PII attributes is:
     To_Be_Published_List ← π< Sex, BirthDate, Nationality, Hall, Program, Year >( Admission List).

We apply k-anonymity to the list that is to be published:
    k-anonymity(To_Be_Published_List).
Applying Data Privacy Techniques on Published Data in Uganda

Results




    Original dataset with before data de-identification
Applying Data Privacy Techniques on Published Data in Uganda

Results




Generalization: Results after generalization of the BirthDate Attribute




Suppression: Results after suppression of unique values.
Applying Data Privacy Techniques on Published Data in Uganda

Results




k-anonymity results after applying Generalization and Suppression with k>1.
Applying Data Privacy Techniques on Published Data in Uganda

Discussion

• Removing names and student numbers entirely diminishes utility.
   • The data becomes meaningless to students who simply want to view it to see if
     their names are on the university admission list.

• Possible solution: publish the student number or student names while obscuring other
PII data.

• However, in both scenarios, the issue of balancing data utility and data privacy remain
quite challenging and demands tradeoffs.
Applying Data Privacy Techniques on Published Data in Uganda

Conclusion

We have made the case for the need to revamp Uganda's data privacy policy to
encompass both private and government sectors.

There is a need for more research on how to implement privacy preserving data
publishing tailored to the Ugandan context.




                                       A Lunda Empire Homestead - Image source: Wikipedia
Applying Data Privacy Techniques on Published Data in Uganda

Conclusion

•We have shown that with freely available open source technologies, some level of data
privacy can be implemented on datasets from emerging markets.

•The problem of what PII constitutes in the emerging market nations still remains.

•Although no set of PII has been proposed in Uganda, we suggest that PII include any
information that could specifically identify an individual in the Ugandan context.




                         African woman - Image source: Wikipedia
Applying Data Privacy Techniques on Published Data in Uganda

Conclusion

•Applying the k-anonymity procedure might be practicable in the Ugandan context.

•However, achieving optimal privacy while maximizing utility continues to be a challenge.

•Therefore more studies need to be done on various implementations of optimal data
privacy tailored to Ugandan context.

•Considerations need to be made that PII differs in Uganda from other geographical
locations.


                                      THANK YOU
Applying Data Privacy Techniques on Published Data in Uganda

References
1.    International Telecommunications Union, ITU Free statistics, 2009.
2.    International Telecommunications Union, The World In 2010 The Rise of 3G, 2010.
3.    MUK, Makerere University 2010 Admission List, Academic Registrar's Department, 2010.
4.    The Electoral Commission of Uganda, Online Voter's Register, 2010. http://www.ec.or.ug/
5.    USDOJ, “The Privacy Act of 1974. 5 U.S.C. § 552a”, 1974.
6.    USGPO, HIPAA of 1996-H. Rept.104-736, U.S. Govt Printing Office, 1996.
7.    US Library of Congress, 2009. Personal Data Privacy and Security Act of 2009– S.1490, THOMAS (Library of Congress).
8.    Embassy of the Republic of Uganda, Washington DC, The Constitution of The Republic of Uganda, 1995.
9.    UBS, The Bureau Of Statistics Act 12 1998, Uganda Gazette No.36 Volume XCI, 11th June, 1998.
10.    UCC, Uganda Communications Commission Regulations, 2010.
11.    Privacy International, PHR2006 - Republic Uganda, Constitutional Privacy Framework, 2007.
12.    Ministry of ICT, Ministerial Policy Statement for Ministry of ICT 2007/2008 Presented to Paliament, June 2006.
13.    Ministry of ICT, Ministerial Policy Statement for Ministry of ICT 2009/2010 Presented to Paliament, June 2009.
14.    Ministry of Works, National Information and Communication Technology Policy, October 2003.
15.    Nakyeyune, F., An Internal Intrusion Prevention Model, Makerere University Research Repository, 2009.
16.    Mutebi, R.M., and Rai, I.A., An Integrated Victim-based Approach Against IP Packet Flooding Denial of Service, IJCIR 2010. pp. 295-311.
17.    Makori, A.C. and Oenga, L., A Survey of Information Security Incident Reporting for Enhanced Digital Forensic Investigations, IJCIR 2010. pp.19-31
18.    Kizza, J.M., et al., Using Subgraph Isomorphism as a Zero Knowledge Proof Authentication in Timed Wireless Mobile Networks, IJCIR 2010. pp. 334-351.
19.   Mirembe, D.P. and Muyeba, M., Security Issues in Ambulatory Wireless Sensor Networks (AWSN): Security Vs Mobility, IJCIR 2009. pp.289-301.
20.    Mutyaba R.B., Improving the RSA cryptographic algorithm using double encryption, Makerere Univ Research Repository, 2009.
21.    Makori, A.C., Integration of Biometrics with Cryptographic Techniques for Secure Authentication of Networked Data Access. IJCIR 2009. pp. 1-13
22.    Okwangale, F.R., and Ogao, P., Survey of Data Mining Methods for Crime Analysis and Visualisation, IJCIR 2006. pp. 322-327
23.    Bakibinga, E.M., Managing Electronic Privacy in the Telecommunications Sub-sector: The Ugandan Perspective. Africa Electronic Privacy and Public Voice
      Symposium, 2004.
Applying Data Privacy Techniques on Published Data in Uganda

References
1.    Luyombya, D., Framework for Effective Public Digital Records Management in Uganda. Doctoral Thesis, UCL(University College London), 2010.
2.     Ssekibule, R., and Mirembe, D.P., Security Analysis of Remote E-Voting,” Makerere University Research Repository, 2007.
3.     Kayondo, L.F., A Framework for Security Management of Electronic Health Records By, Makerere University Research Repository, 2009.
4.     Sweeney, L., k-anonymity: A Model for Protecting Privacy, IJUFKS, 2002. pp. 557-570.
5.     UBS, The Bureau Of Statistics Act 12 1998, Acts Supplement No.7, The Uganda Gazette No.36 Volume XCI, 11th June, 1998.
6.     Ciriani, V., et al, Secure Data Management in Decentralized System, Springer, ISBN 0387276947, 2007, pp 291-321, 2007.
7.     Denning, D. E. and Denning, P.J., Data Security, ACM Computing Surveys, Vpl. II,No. 3, September 1, 1979.
8.     U.S. DHS, Handbook for Safeguarding Sensitive PII at The DHS, October 2008.
9.     McCallister, E. and Scarfone, K., Guide to Protecting the Confidentiality of PII, Recommendations of the NIST, 2010.
10.    Ganta, S.R., et al, 2008. Composition attacks and auxiliary information in data privacy, Proceeding of the 14th ACM SIGKDD 2008, p. 265.
11.    Oganian, A. and Domingo-Ferrer, J., On the complexity of optimal micro-aggregation for statistical disclosure control, Statistical Journal of the United Nations
      Economic Commission for Europe, Vol. 18, No. 4. (2001), pp.345-353.
12.    Rastogi et al, The boundary between privacy and utility in data publishing, VLDB ,September 2007, pp. 531-542.
13.   Sramka et al, A Practice-oriented Framework for Measuring Privacy and Utility in Data Sanitization Systems, ACM, EDBT 2010.
14.    Sankar, S.R., Utility and Privacy of Data Sources: Can Shannon Help Conceal and Reveal Information?, presented at CoRR, 2010.
15.    Wong, R.C., et al, Minimality attack in privacy preserving data publishing, VLDB, 2007. pp.543-554.
16.    Adam, N.R. and Wortmann, J.C., A Comparative Methods Study for Statistical Databases: Adam and Wortmann, ACM Comp. Surveys, vol.21, 1989.
17.    Narayanan, A. and Shmatikov, V., Myths and fallacies of "personally identifiable information". Comm. ACM. 2010, 24-26.
18.    Brewster, K.F., 1996. The National Computer Security Center (NCSC) Technical Report - 005 Volume 1/5 Library No. S-243,039, 1996.
19.    Bayardo, R.J., AND Agrawal, R., Data Privacy through Optimal k-anonymization, ICDE, 2005. pp. 217-228.
20.    Ciriani, V., et al, Theory of privacy and anonymity. In Algorithms and theory of computation handbook (2 ed.), 2010.
21.    Samarati, P. and Sweeney, L., Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression, IEEE
      Symp on Research in Security and Privacy, 1998, pp. 384–393.
22.    Samarati, P., Protecting Respondent’s Privacy in Microdata Release. IEEE on TKDE, 2001. pp. 1010-1027.
23.    Meyerson, A., and Williams, R., On the complexity of optimal K-anonymity. ACM PODS, 2004. pp. 223-228.
24.    Rastogi et al, The boundary between privacy and utility in data publishing, VLDB, September 2007, pp. 531-542.
25.    C. Kuner, European data protection law: corporate compliance and regulation. Oxford University Press, ISBN 9780199283859, 2007.

Weitere ähnliche Inhalte

Was ist angesagt?

NESCO: A Closer Look
NESCO: A Closer LookNESCO: A Closer Look
NESCO: A Closer LookEnergySec
 
Information policy ppt
Information policy pptInformation policy ppt
Information policy pptKabir Khan
 
Integrating the prevention of cyber crime into the overall anti-crime strateg...
Integrating the prevention of cyber crime into the overall anti-crime strateg...Integrating the prevention of cyber crime into the overall anti-crime strateg...
Integrating the prevention of cyber crime into the overall anti-crime strateg...Jacqueline Fick
 
Big data and information privacy 20190117
Big data and information privacy 20190117Big data and information privacy 20190117
Big data and information privacy 20190117Maria Correia
 
Guideline Thailand Cybersecure Strate Digital Economy
Guideline Thailand Cybersecure Strate Digital EconomyGuideline Thailand Cybersecure Strate Digital Economy
Guideline Thailand Cybersecure Strate Digital EconomySettapong_CyberSecurity
 
Cybercrime and Cybersecurity Differences
Cybercrime and Cybersecurity DifferencesCybercrime and Cybersecurity Differences
Cybercrime and Cybersecurity DifferencesArthit Suriyawongkul
 
Indonesia Netizen Facts (October - December 2015)
Indonesia Netizen Facts (October - December 2015)Indonesia Netizen Facts (October - December 2015)
Indonesia Netizen Facts (October - December 2015)ICT Watch
 
Policy and legal frameworks and Freedom of Expression in East Africa
Policy and legal frameworks and Freedom of Expression in East Africa Policy and legal frameworks and Freedom of Expression in East Africa
Policy and legal frameworks and Freedom of Expression in East Africa ICT4Democracy in East Africa
 
Governance compliance
Governance   complianceGovernance   compliance
Governance complianceAndy Petrella
 
Indonesia Netizen Facts (July - September 2016)
Indonesia Netizen Facts (July - September 2016)Indonesia Netizen Facts (July - September 2016)
Indonesia Netizen Facts (July - September 2016)ICT Watch
 

Was ist angesagt? (15)

NESCO: A Closer Look
NESCO: A Closer LookNESCO: A Closer Look
NESCO: A Closer Look
 
Information policy ppt
Information policy pptInformation policy ppt
Information policy ppt
 
Integrating the prevention of cyber crime into the overall anti-crime strateg...
Integrating the prevention of cyber crime into the overall anti-crime strateg...Integrating the prevention of cyber crime into the overall anti-crime strateg...
Integrating the prevention of cyber crime into the overall anti-crime strateg...
 
Big data and information privacy 20190117
Big data and information privacy 20190117Big data and information privacy 20190117
Big data and information privacy 20190117
 
Privacy in the Age of Big Data
Privacy in the Age of Big DataPrivacy in the Age of Big Data
Privacy in the Age of Big Data
 
Guideline Thailand Cybersecure Strate Digital Economy
Guideline Thailand Cybersecure Strate Digital EconomyGuideline Thailand Cybersecure Strate Digital Economy
Guideline Thailand Cybersecure Strate Digital Economy
 
Network Neutrality: The Origins, Politics and Implications of New Rules for a...
Network Neutrality: The Origins, Politics and Implications of New Rules for a...Network Neutrality: The Origins, Politics and Implications of New Rules for a...
Network Neutrality: The Origins, Politics and Implications of New Rules for a...
 
Cybercrime and Cybersecurity Differences
Cybercrime and Cybersecurity DifferencesCybercrime and Cybersecurity Differences
Cybercrime and Cybersecurity Differences
 
Indonesia Netizen Facts (October - December 2015)
Indonesia Netizen Facts (October - December 2015)Indonesia Netizen Facts (October - December 2015)
Indonesia Netizen Facts (October - December 2015)
 
NITA-U Presentation at 1st National Communication conference 5-9-2011
NITA-U Presentation at 1st National Communication conference 5-9-2011NITA-U Presentation at 1st National Communication conference 5-9-2011
NITA-U Presentation at 1st National Communication conference 5-9-2011
 
Session 5.3 Alexander Ntoko
Session 5.3 Alexander NtokoSession 5.3 Alexander Ntoko
Session 5.3 Alexander Ntoko
 
Open data
Open dataOpen data
Open data
 
Policy and legal frameworks and Freedom of Expression in East Africa
Policy and legal frameworks and Freedom of Expression in East Africa Policy and legal frameworks and Freedom of Expression in East Africa
Policy and legal frameworks and Freedom of Expression in East Africa
 
Governance compliance
Governance   complianceGovernance   compliance
Governance compliance
 
Indonesia Netizen Facts (July - September 2016)
Indonesia Netizen Facts (July - September 2016)Indonesia Netizen Facts (July - September 2016)
Indonesia Netizen Facts (July - September 2016)
 

Ähnlich wie Applying Data Privacy Techniques on Published Data in Uganda

Serianu - Data security
Serianu - Data securitySerianu - Data security
Serianu - Data securityMyles Freedman
 
Securing your Data, Reporting Recommended Practices
Securing your Data, Reporting Recommended PracticesSecuring your Data, Reporting Recommended Practices
Securing your Data, Reporting Recommended PracticesJohn Martin
 
How to Effectively Equip Your IG Program for the Perilous Journey Into the Fu...
How to Effectively Equip Your IG Program for the Perilous Journey Into the Fu...How to Effectively Equip Your IG Program for the Perilous Journey Into the Fu...
How to Effectively Equip Your IG Program for the Perilous Journey Into the Fu...Aggregage
 
Use of data in safe havens: ethics and reproducibility issues
Use of data in safe havens: ethics and reproducibility issuesUse of data in safe havens: ethics and reproducibility issues
Use of data in safe havens: ethics and reproducibility issuesLouise Corti
 
NCSAM = Cyber Security Awareness Month: Trends and Resources
NCSAM = Cyber Security Awareness Month: Trends and ResourcesNCSAM = Cyber Security Awareness Month: Trends and Resources
NCSAM = Cyber Security Awareness Month: Trends and ResourcesStephen Cobb
 
Functional anonymisation - risk management in a data environment
Functional anonymisation - risk management in a data environmentFunctional anonymisation - risk management in a data environment
Functional anonymisation - risk management in a data environmentJisc
 
Supporting Scientific Research for Sustainable Development Goals in Africa/S...
Supporting Scientific Research for  Sustainable Development Goals in Africa/S...Supporting Scientific Research for  Sustainable Development Goals in Africa/S...
Supporting Scientific Research for Sustainable Development Goals in Africa/S...African Open Science Platform
 
Applying Data Privacy Techniques on Published Data in Uganda
 Applying Data Privacy Techniques on Published Data in Uganda Applying Data Privacy Techniques on Published Data in Uganda
Applying Data Privacy Techniques on Published Data in UgandaKato Mivule
 
The age of data - Putting responsible data into practice
The age of data - Putting responsible data into practiceThe age of data - Putting responsible data into practice
The age of data - Putting responsible data into practicePhuong Vo An
 
Enlightened Privacy – by Design for a Smarter Grid
Enlightened Privacy – by Design for a Smarter GridEnlightened Privacy – by Design for a Smarter Grid
Enlightened Privacy – by Design for a Smarter Gridbradley_g
 
Presentation on Information Privacy
Presentation on Information PrivacyPresentation on Information Privacy
Presentation on Information PrivacyPerry Slack
 
Sirris innovate2011 - Smart Products with smart data - introduction, Dr. Elen...
Sirris innovate2011 - Smart Products with smart data - introduction, Dr. Elen...Sirris innovate2011 - Smart Products with smart data - introduction, Dr. Elen...
Sirris innovate2011 - Smart Products with smart data - introduction, Dr. Elen...Sirris
 
Big and Small Web Data
Big and Small Web DataBig and Small Web Data
Big and Small Web DataMarieke Guy
 
Knoware-Open Data-SUNZ12: Clare Somerville and Trish O'Kane
Knoware-Open Data-SUNZ12: Clare Somerville and Trish O'KaneKnoware-Open Data-SUNZ12: Clare Somerville and Trish O'Kane
Knoware-Open Data-SUNZ12: Clare Somerville and Trish O'Kaneclaress
 
Utilizing Noise Addition For Data Privacy, an Overview
Utilizing Noise Addition For Data Privacy, an OverviewUtilizing Noise Addition For Data Privacy, an Overview
Utilizing Noise Addition For Data Privacy, an OverviewKato Mivule
 

Ähnlich wie Applying Data Privacy Techniques on Published Data in Uganda (20)

Serianu - Data security
Serianu - Data securitySerianu - Data security
Serianu - Data security
 
Securing your Data, Reporting Recommended Practices
Securing your Data, Reporting Recommended PracticesSecuring your Data, Reporting Recommended Practices
Securing your Data, Reporting Recommended Practices
 
How to Effectively Equip Your IG Program for the Perilous Journey Into the Fu...
How to Effectively Equip Your IG Program for the Perilous Journey Into the Fu...How to Effectively Equip Your IG Program for the Perilous Journey Into the Fu...
How to Effectively Equip Your IG Program for the Perilous Journey Into the Fu...
 
Use of data in safe havens: ethics and reproducibility issues
Use of data in safe havens: ethics and reproducibility issuesUse of data in safe havens: ethics and reproducibility issues
Use of data in safe havens: ethics and reproducibility issues
 
NCSAM = Cyber Security Awareness Month: Trends and Resources
NCSAM = Cyber Security Awareness Month: Trends and ResourcesNCSAM = Cyber Security Awareness Month: Trends and Resources
NCSAM = Cyber Security Awareness Month: Trends and Resources
 
Functional anonymisation - risk management in a data environment
Functional anonymisation - risk management in a data environmentFunctional anonymisation - risk management in a data environment
Functional anonymisation - risk management in a data environment
 
Supporting Scientific Research for Sustainable Development Goals in Africa/S...
Supporting Scientific Research for  Sustainable Development Goals in Africa/S...Supporting Scientific Research for  Sustainable Development Goals in Africa/S...
Supporting Scientific Research for Sustainable Development Goals in Africa/S...
 
Reality Check
Reality CheckReality Check
Reality Check
 
DATA SOVEREIGHTY IGF.pptx
DATA SOVEREIGHTY IGF.pptxDATA SOVEREIGHTY IGF.pptx
DATA SOVEREIGHTY IGF.pptx
 
Applying Data Privacy Techniques on Published Data in Uganda
 Applying Data Privacy Techniques on Published Data in Uganda Applying Data Privacy Techniques on Published Data in Uganda
Applying Data Privacy Techniques on Published Data in Uganda
 
NCCT.pptx
NCCT.pptxNCCT.pptx
NCCT.pptx
 
Introduction by ann cavoukian
Introduction by ann cavoukianIntroduction by ann cavoukian
Introduction by ann cavoukian
 
DOWLD SLIDES.pptx
DOWLD SLIDES.pptxDOWLD SLIDES.pptx
DOWLD SLIDES.pptx
 
The age of data - Putting responsible data into practice
The age of data - Putting responsible data into practiceThe age of data - Putting responsible data into practice
The age of data - Putting responsible data into practice
 
Enlightened Privacy – by Design for a Smarter Grid
Enlightened Privacy – by Design for a Smarter GridEnlightened Privacy – by Design for a Smarter Grid
Enlightened Privacy – by Design for a Smarter Grid
 
Presentation on Information Privacy
Presentation on Information PrivacyPresentation on Information Privacy
Presentation on Information Privacy
 
Sirris innovate2011 - Smart Products with smart data - introduction, Dr. Elen...
Sirris innovate2011 - Smart Products with smart data - introduction, Dr. Elen...Sirris innovate2011 - Smart Products with smart data - introduction, Dr. Elen...
Sirris innovate2011 - Smart Products with smart data - introduction, Dr. Elen...
 
Big and Small Web Data
Big and Small Web DataBig and Small Web Data
Big and Small Web Data
 
Knoware-Open Data-SUNZ12: Clare Somerville and Trish O'Kane
Knoware-Open Data-SUNZ12: Clare Somerville and Trish O'KaneKnoware-Open Data-SUNZ12: Clare Somerville and Trish O'Kane
Knoware-Open Data-SUNZ12: Clare Somerville and Trish O'Kane
 
Utilizing Noise Addition For Data Privacy, an Overview
Utilizing Noise Addition For Data Privacy, an OverviewUtilizing Noise Addition For Data Privacy, an Overview
Utilizing Noise Addition For Data Privacy, an Overview
 

Mehr von Kato Mivule

A Study of Usability-aware Network Trace Anonymization
A Study of Usability-aware Network Trace Anonymization A Study of Usability-aware Network Trace Anonymization
A Study of Usability-aware Network Trace Anonymization Kato Mivule
 
Cancer Diagnostic Prediction with Amazon ML – A Tutorial
Cancer Diagnostic Prediction with Amazon ML – A TutorialCancer Diagnostic Prediction with Amazon ML – A Tutorial
Cancer Diagnostic Prediction with Amazon ML – A TutorialKato Mivule
 
A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...
A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...
A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...Kato Mivule
 
Towards A Differential Privacy and Utility Preserving Machine Learning Classi...
Towards A Differential Privacy and Utility Preserving Machine Learning Classi...Towards A Differential Privacy and Utility Preserving Machine Learning Classi...
Towards A Differential Privacy and Utility Preserving Machine Learning Classi...Kato Mivule
 
An Investigation of Data Privacy and Utility Preservation Using KNN Classific...
An Investigation of Data Privacy and Utility Preservation Using KNN Classific...An Investigation of Data Privacy and Utility Preservation Using KNN Classific...
An Investigation of Data Privacy and Utility Preservation Using KNN Classific...Kato Mivule
 
Implementation of Data Privacy and Security in an Online Student Health Recor...
Implementation of Data Privacy and Security in an Online Student Health Recor...Implementation of Data Privacy and Security in an Online Student Health Recor...
Implementation of Data Privacy and Security in an Online Student Health Recor...Kato Mivule
 
Kato Mivule - Utilizing Noise Addition for Data Privacy, an Overview
Kato Mivule - Utilizing Noise Addition for Data Privacy, an OverviewKato Mivule - Utilizing Noise Addition for Data Privacy, an Overview
Kato Mivule - Utilizing Noise Addition for Data Privacy, an OverviewKato Mivule
 
Kato Mivule - Towards Agent-based Data Privacy Engineering
Kato Mivule - Towards Agent-based Data Privacy EngineeringKato Mivule - Towards Agent-based Data Privacy Engineering
Kato Mivule - Towards Agent-based Data Privacy EngineeringKato Mivule
 
A Codon Frequency Obfuscation Heuristic for Raw Genomic Data Privacy
A Codon Frequency Obfuscation Heuristic for Raw Genomic Data PrivacyA Codon Frequency Obfuscation Heuristic for Raw Genomic Data Privacy
A Codon Frequency Obfuscation Heuristic for Raw Genomic Data PrivacyKato Mivule
 
An Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
An Investigation of Data Privacy and Utility Using Machine Learning as a GaugeAn Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
An Investigation of Data Privacy and Utility Using Machine Learning as a GaugeKato Mivule
 
Lit Review Talk by Kato Mivule: A Review of Genetic Algorithms
Lit Review Talk by Kato Mivule: A Review of Genetic AlgorithmsLit Review Talk by Kato Mivule: A Review of Genetic Algorithms
Lit Review Talk by Kato Mivule: A Review of Genetic AlgorithmsKato Mivule
 
Lit Review Talk by Kato Mivule: Protecting DNA Sequence Anonymity with Genera...
Lit Review Talk by Kato Mivule: Protecting DNA Sequence Anonymity with Genera...Lit Review Talk by Kato Mivule: Protecting DNA Sequence Anonymity with Genera...
Lit Review Talk by Kato Mivule: Protecting DNA Sequence Anonymity with Genera...Kato Mivule
 
An Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
An Investigation of Data Privacy and Utility Using Machine Learning as a GaugeAn Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
An Investigation of Data Privacy and Utility Using Machine Learning as a GaugeKato Mivule
 
An Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
An Investigation of Data Privacy and Utility Using Machine Learning as a GaugeAn Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
An Investigation of Data Privacy and Utility Using Machine Learning as a GaugeKato Mivule
 
Lit Review Talk - Signal Processing and Machine Learning with Differential Pr...
Lit Review Talk - Signal Processing and Machine Learning with Differential Pr...Lit Review Talk - Signal Processing and Machine Learning with Differential Pr...
Lit Review Talk - Signal Processing and Machine Learning with Differential Pr...Kato Mivule
 
A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...
A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...
A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...Kato Mivule
 
Kato Mivule: An Overview of CUDA for High Performance Computing
Kato Mivule: An Overview of CUDA for High Performance ComputingKato Mivule: An Overview of CUDA for High Performance Computing
Kato Mivule: An Overview of CUDA for High Performance ComputingKato Mivule
 
Literature Review: The Role of Signal Processing in Meeting Privacy Challenge...
Literature Review: The Role of Signal Processing in Meeting Privacy Challenge...Literature Review: The Role of Signal Processing in Meeting Privacy Challenge...
Literature Review: The Role of Signal Processing in Meeting Privacy Challenge...Kato Mivule
 
Kato Mivule: An Overview of Adaptive Boosting – AdaBoost
Kato Mivule: An Overview of  Adaptive Boosting – AdaBoostKato Mivule: An Overview of  Adaptive Boosting – AdaBoost
Kato Mivule: An Overview of Adaptive Boosting – AdaBoostKato Mivule
 
Kato Mivule: COGNITIVE 2013 - An Overview of Data Privacy in Multi-Agent Lear...
Kato Mivule: COGNITIVE 2013 - An Overview of Data Privacy in Multi-Agent Lear...Kato Mivule: COGNITIVE 2013 - An Overview of Data Privacy in Multi-Agent Lear...
Kato Mivule: COGNITIVE 2013 - An Overview of Data Privacy in Multi-Agent Lear...Kato Mivule
 

Mehr von Kato Mivule (20)

A Study of Usability-aware Network Trace Anonymization
A Study of Usability-aware Network Trace Anonymization A Study of Usability-aware Network Trace Anonymization
A Study of Usability-aware Network Trace Anonymization
 
Cancer Diagnostic Prediction with Amazon ML – A Tutorial
Cancer Diagnostic Prediction with Amazon ML – A TutorialCancer Diagnostic Prediction with Amazon ML – A Tutorial
Cancer Diagnostic Prediction with Amazon ML – A Tutorial
 
A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...
A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...
A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...
 
Towards A Differential Privacy and Utility Preserving Machine Learning Classi...
Towards A Differential Privacy and Utility Preserving Machine Learning Classi...Towards A Differential Privacy and Utility Preserving Machine Learning Classi...
Towards A Differential Privacy and Utility Preserving Machine Learning Classi...
 
An Investigation of Data Privacy and Utility Preservation Using KNN Classific...
An Investigation of Data Privacy and Utility Preservation Using KNN Classific...An Investigation of Data Privacy and Utility Preservation Using KNN Classific...
An Investigation of Data Privacy and Utility Preservation Using KNN Classific...
 
Implementation of Data Privacy and Security in an Online Student Health Recor...
Implementation of Data Privacy and Security in an Online Student Health Recor...Implementation of Data Privacy and Security in an Online Student Health Recor...
Implementation of Data Privacy and Security in an Online Student Health Recor...
 
Kato Mivule - Utilizing Noise Addition for Data Privacy, an Overview
Kato Mivule - Utilizing Noise Addition for Data Privacy, an OverviewKato Mivule - Utilizing Noise Addition for Data Privacy, an Overview
Kato Mivule - Utilizing Noise Addition for Data Privacy, an Overview
 
Kato Mivule - Towards Agent-based Data Privacy Engineering
Kato Mivule - Towards Agent-based Data Privacy EngineeringKato Mivule - Towards Agent-based Data Privacy Engineering
Kato Mivule - Towards Agent-based Data Privacy Engineering
 
A Codon Frequency Obfuscation Heuristic for Raw Genomic Data Privacy
A Codon Frequency Obfuscation Heuristic for Raw Genomic Data PrivacyA Codon Frequency Obfuscation Heuristic for Raw Genomic Data Privacy
A Codon Frequency Obfuscation Heuristic for Raw Genomic Data Privacy
 
An Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
An Investigation of Data Privacy and Utility Using Machine Learning as a GaugeAn Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
An Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
 
Lit Review Talk by Kato Mivule: A Review of Genetic Algorithms
Lit Review Talk by Kato Mivule: A Review of Genetic AlgorithmsLit Review Talk by Kato Mivule: A Review of Genetic Algorithms
Lit Review Talk by Kato Mivule: A Review of Genetic Algorithms
 
Lit Review Talk by Kato Mivule: Protecting DNA Sequence Anonymity with Genera...
Lit Review Talk by Kato Mivule: Protecting DNA Sequence Anonymity with Genera...Lit Review Talk by Kato Mivule: Protecting DNA Sequence Anonymity with Genera...
Lit Review Talk by Kato Mivule: Protecting DNA Sequence Anonymity with Genera...
 
An Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
An Investigation of Data Privacy and Utility Using Machine Learning as a GaugeAn Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
An Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
 
An Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
An Investigation of Data Privacy and Utility Using Machine Learning as a GaugeAn Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
An Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
 
Lit Review Talk - Signal Processing and Machine Learning with Differential Pr...
Lit Review Talk - Signal Processing and Machine Learning with Differential Pr...Lit Review Talk - Signal Processing and Machine Learning with Differential Pr...
Lit Review Talk - Signal Processing and Machine Learning with Differential Pr...
 
A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...
A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...
A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...
 
Kato Mivule: An Overview of CUDA for High Performance Computing
Kato Mivule: An Overview of CUDA for High Performance ComputingKato Mivule: An Overview of CUDA for High Performance Computing
Kato Mivule: An Overview of CUDA for High Performance Computing
 
Literature Review: The Role of Signal Processing in Meeting Privacy Challenge...
Literature Review: The Role of Signal Processing in Meeting Privacy Challenge...Literature Review: The Role of Signal Processing in Meeting Privacy Challenge...
Literature Review: The Role of Signal Processing in Meeting Privacy Challenge...
 
Kato Mivule: An Overview of Adaptive Boosting – AdaBoost
Kato Mivule: An Overview of  Adaptive Boosting – AdaBoostKato Mivule: An Overview of  Adaptive Boosting – AdaBoost
Kato Mivule: An Overview of Adaptive Boosting – AdaBoost
 
Kato Mivule: COGNITIVE 2013 - An Overview of Data Privacy in Multi-Agent Lear...
Kato Mivule: COGNITIVE 2013 - An Overview of Data Privacy in Multi-Agent Lear...Kato Mivule: COGNITIVE 2013 - An Overview of Data Privacy in Multi-Agent Lear...
Kato Mivule: COGNITIVE 2013 - An Overview of Data Privacy in Multi-Agent Lear...
 

Kürzlich hochgeladen

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 

Kürzlich hochgeladen (20)

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 

Applying Data Privacy Techniques on Published Data in Uganda

  • 1. Applying Data Privacy Techniques on Published Data in Uganda Kato Mivule and Claude Turner, PhD Computer Science Department Bowie State University EEE'12 - The 2012 International Conference on e-Learning, e-Business, Enterprise Information Systems, and e-Government Las Vegas, Nevada, USA July 16-19
  • 2. Applying Data Privacy Techniques on Published Data in Uganda Agenda • Introduction • Data Privacy and Security Policies • Related work on data privacy in Uganda • Essential data privacy terms • Data privacy techniques • Data privacy implementation • Results • Conclusion • References Uganda flag and map - Image source: Wikipedia
  • 3. Applying Data Privacy Techniques on Published Data in Uganda Introduction • Higher education institutions post student admission and graduation data online. • The Ugandan Electoral Commission posted the 2010 national voter's register online. • Uganda Bureau of Statistics publishes statistical data routinely online. • Most published datasets from Uganda include personal identifiable information (PII). • A growing number of young Ugandans are fans of Online Social Networks (OSN).
  • 4. Applying Data Privacy Techniques on Published Data in Uganda Introduction Exponential Data explosion in Africa: • 110 million Internet users as of 2011 • 17 million Facebook accounts Text till you drop Campaign -Image source: Wikipedia • A penetration rate of 10 percent for Internet • 1.7 percent penetration rate for Facebook in Africa • 500 million mobile subscriptions as of November 2010 in Africa • These numbers are projected grow
  • 5. Applying Data Privacy Techniques on Published Data in Uganda Introduction Current population in Africa is estimated at 1 Billion. The Mobile Phone has rightly been described by technologist Erik Hersman as “Africa's PC” (whiteafrican.com) .
  • 6. Applying Data Privacy Techniques on Published Data in Uganda Introduction Image source: Manypossibilities.net The Data Privacy Problem: “Africa's PC”. Companies like SEACOM have already completed laying their fiber optic cable to East Africa.
  • 7. Applying Data Privacy Techniques on Published Data in Uganda Introduction • Case studies on data privacy in EU and USA have been done. • Case studies on data privacy in emerging markets is minimal. • With a globalized economy, demands for data privacy is critical. • Therefore in this paper… • We take a look at current data privacy and security laws in Uganda • Implementation of data privacy techniques for a published Ugandan dataset • Suggest how this approach may be generalized for data privacy in the country. African Savanna - Image source: Wikipedia
  • 8. Applying Data Privacy Techniques on Published Data in Uganda Data Privacy and Security Policies • In the USA, state and federal privacy laws require privacy of individuals be protected. • The USA is the Privacy Act of 1974. • Health Insurance Portability and Accountability Act (HIPAA) of 1996. • The Ugandan constitution defines privacy in terms of interference, stating that: • “…no person shall be subjected to interference with the privacy of that person’s home, correspondence, communication or other property…” • However, no precise definition is given in the context of PII, data privacy, and computer security. Kampala City - Image source: Wikipedia
  • 9. Applying Data Privacy Techniques on Published Data in Uganda Data Privacy and Security Policies • Ugandan Bureau of Statistics Act of 1998 describes Ugandan government policy on data collected by the Ugandan Bureau of Statistics (UBS). • No policy on how non-governmental entities collect and disseminate data. • PII in the Ugandan context is not mentioned. • “removal of identifiers” is mentioned but is ambiguous. UBS Building Kampala- Image source: NBS TV UG • UBS with expert care does publish de-identified micro datasets.
  • 10. Applying Data Privacy Techniques on Published Data in Uganda Data Privacy and Security Policies • No clear data privacy policies from: • The Uganda Communications Commission (UCC). • Ministry of Information and Communications Technology (ICT). • The set of PII in the USA differs from that in Uganda. A “Mobile” Masai - Image source: Google Images • There is need to expand Uganda's policy on Data Privacy. • To date, no clear legal and technological data privacy framework exists in Uganda. • We suggest data privacy techniques that could be utilized for basic data privacy .
  • 11. Applying Data Privacy Techniques on Published Data in Uganda Related work on data privacy in Uganda • Work on data privacy in Uganda and much of sub-Saharan Africa is sparse. • Research on computer security in Uganda exists but centers on: • Network security and access control. • Cryptographic methodologies. • Data mining but privacy preservation not discussed. • Calls for electronic privacy policy in Uganda. • Data privacy – deals with Confidentiality. • Data security – deals with Accessibility. Makerere University Faculty of Computing - Image source: Newvision.co.ug
  • 12. Applying Data Privacy Techniques on Published Data in Uganda Essential data privacy terms Data privacy - protection of an individual’s data against unauthorized disclosure. Data security - safety of data from unauthorized access. Personally identifiable information (PII) - any identifying data about an individual. Data De-identification - PII attributes are removed from data. Data utility verses privacy - how useful a published dataset is to a user of that dataset. Privacy verses Utility - a balance between privacy and data utility is always sought. Achieving optimal data privacy while not distorting data utility is an NP-hard challenge. Ancient Nsibidi Nigerian Symbols - Image source: Wikipedia
  • 13. Applying Data Privacy Techniques on Published Data in Uganda Essential terms • Statistical databases - published data sets that do not change. • Attributes in statistical databases - field names or columns. • PII attributes - properties that uniquely identify an individual. A San man - Image source: Wikipedia • Quasi-attributes - attributes not in the PII category . • Confidential attributes - not PII and quasi-attributes but contain sensitive data. • Non confidential attributes - attributes that individuals do not consider sensitive. • Inference and reconstruction attacks - separate pieces of data are used to derive a conclusion about a subject.
  • 14. Applying Data Privacy Techniques on Published Data in Uganda Data Privacy Techniques • Non-perturbative techniques – original data not distorted. • Perturbative techniques – original data distorted. Ashante Kente wove Pattern - Image source: Wikipedia • Suppression - sensitive data values that are unique are omitted. • Generalization - sensitive data values are made less informative. • k-anonymity - utilizes generalization, and suppression. • k-anonymity requires that for a dataset with quasi-identifier attributes in database to be published, values in the quasi-identifier attributes be repeated at least k times to ensure privacy; that is, k >1. Sweeney[27]. • Achieving an optimal k-anonymized dataset is still an NP-Hard challenge.
  • 15. Applying Data Privacy Techniques on Published Data in Uganda Methodology • INPUT: Data from relation or schema • OUTPUT: Data privacy preserving published tabular dataset • Identify PII Attributes • Remove PII Attributes • Identify quasi-identifier attributes • Generalize or Suppress quasi-identifier attributes • Check that k>1 in tuples • Check for single values that cannot be grouped together to achieve k>1 • If single values exist, Generalize or Suppress until k-anonymity at k>1 • Check for utility • Publish tabular dataset
  • 16. Applying Data Privacy Techniques on Published Data in Uganda Methodology • We express our implementation using : • Set theory notation. • Relational database notation. • MySQL implementation. • We de-identified a Ugandan Students dataset of 1200 records published online. • We utilized the definitions PII as defined by the US data privacy laws (HIPAA).
  • 17. Applying Data Privacy Techniques on Published Data in Uganda Methodology
  • 18. Applying Data Privacy Techniques on Published Data in Uganda Methodology The original dataset included the following attributes, in which we let the following: A = { RegNo, StudentNo, Lname, Fname, Mname, Sex, BirthDate, Nationality, Hall, Program, IndexNo, Year }, all attributes. B = { Lname, Fname, Mname, StudentNo, IndexNo, RegNo}, the set of all PII attributes that we identified in the published dataset. C = { Nationality, Sex, BirthDate,}, the set of all quasi-identifier attributes identified in the dataset. D = {Hall, Program, Year}, the set of all non-sensitive attributes. E = { }, the set of all sensitive attributes.
  • 19. Applying Data Privacy Techniques on Published Data in Uganda Methodology • Thus, we have B⊂ A, C⊂ A, D⊂ A and E⊂ A; • Therefore A=B∪ C∪ D∪ E, and A ={ B, C, D, E}. • By removing PII, we get A ={ C, D, E}. • The de-identification of the Admission List set involves a complement of the PII set: (B)c = U – B = A – B = C + D + E. • Therefore, we remained with the quasi attributes, non-sensitive attributes, and sensitive attributes; where U is the universal set, which in this case is all the Admission List attributes. • We suppressed or generalized the quasi attributes: suppress or generalize (C). • We then applied k-anonymity: k-anonymity( (B)c ). • Finally, we ordered values of (B)c. • If k = 1, we suppressed or generalized C until k >1.
  • 20. Applying Data Privacy Techniques on Published Data in Uganda Methodology •Relational model view: For a formal relational model view implementation, we applied the following notation: •We let π <attribute list>(R ) , where π is the projection or selecting of attributes from a relation (Table), <attribute list> is the list of attributes from Admission List , (R) is the relation from which we select attributes. •The original projection with all attributes is: π<RegNo, StudentNo, Lname, Fname, Mname, Sex, BirthDate, Nationality, Hall, Program, IndexNo, Year >( Admission List ). •The projection void of PII attributes is: To_Be_Published_List ← π< Sex, BirthDate, Nationality, Hall, Program, Year >( Admission List). We apply k-anonymity to the list that is to be published: k-anonymity(To_Be_Published_List).
  • 21. Applying Data Privacy Techniques on Published Data in Uganda Results Original dataset with before data de-identification
  • 22. Applying Data Privacy Techniques on Published Data in Uganda Results Generalization: Results after generalization of the BirthDate Attribute Suppression: Results after suppression of unique values.
  • 23. Applying Data Privacy Techniques on Published Data in Uganda Results k-anonymity results after applying Generalization and Suppression with k>1.
  • 24. Applying Data Privacy Techniques on Published Data in Uganda Discussion • Removing names and student numbers entirely diminishes utility. • The data becomes meaningless to students who simply want to view it to see if their names are on the university admission list. • Possible solution: publish the student number or student names while obscuring other PII data. • However, in both scenarios, the issue of balancing data utility and data privacy remain quite challenging and demands tradeoffs.
  • 25. Applying Data Privacy Techniques on Published Data in Uganda Conclusion We have made the case for the need to revamp Uganda's data privacy policy to encompass both private and government sectors. There is a need for more research on how to implement privacy preserving data publishing tailored to the Ugandan context. A Lunda Empire Homestead - Image source: Wikipedia
  • 26. Applying Data Privacy Techniques on Published Data in Uganda Conclusion •We have shown that with freely available open source technologies, some level of data privacy can be implemented on datasets from emerging markets. •The problem of what PII constitutes in the emerging market nations still remains. •Although no set of PII has been proposed in Uganda, we suggest that PII include any information that could specifically identify an individual in the Ugandan context. African woman - Image source: Wikipedia
  • 27. Applying Data Privacy Techniques on Published Data in Uganda Conclusion •Applying the k-anonymity procedure might be practicable in the Ugandan context. •However, achieving optimal privacy while maximizing utility continues to be a challenge. •Therefore more studies need to be done on various implementations of optimal data privacy tailored to Ugandan context. •Considerations need to be made that PII differs in Uganda from other geographical locations. THANK YOU
  • 28. Applying Data Privacy Techniques on Published Data in Uganda References 1. International Telecommunications Union, ITU Free statistics, 2009. 2. International Telecommunications Union, The World In 2010 The Rise of 3G, 2010. 3. MUK, Makerere University 2010 Admission List, Academic Registrar's Department, 2010. 4. The Electoral Commission of Uganda, Online Voter's Register, 2010. http://www.ec.or.ug/ 5. USDOJ, “The Privacy Act of 1974. 5 U.S.C. § 552a”, 1974. 6. USGPO, HIPAA of 1996-H. Rept.104-736, U.S. Govt Printing Office, 1996. 7. US Library of Congress, 2009. Personal Data Privacy and Security Act of 2009– S.1490, THOMAS (Library of Congress). 8. Embassy of the Republic of Uganda, Washington DC, The Constitution of The Republic of Uganda, 1995. 9. UBS, The Bureau Of Statistics Act 12 1998, Uganda Gazette No.36 Volume XCI, 11th June, 1998. 10. UCC, Uganda Communications Commission Regulations, 2010. 11. Privacy International, PHR2006 - Republic Uganda, Constitutional Privacy Framework, 2007. 12. Ministry of ICT, Ministerial Policy Statement for Ministry of ICT 2007/2008 Presented to Paliament, June 2006. 13. Ministry of ICT, Ministerial Policy Statement for Ministry of ICT 2009/2010 Presented to Paliament, June 2009. 14. Ministry of Works, National Information and Communication Technology Policy, October 2003. 15. Nakyeyune, F., An Internal Intrusion Prevention Model, Makerere University Research Repository, 2009. 16. Mutebi, R.M., and Rai, I.A., An Integrated Victim-based Approach Against IP Packet Flooding Denial of Service, IJCIR 2010. pp. 295-311. 17. Makori, A.C. and Oenga, L., A Survey of Information Security Incident Reporting for Enhanced Digital Forensic Investigations, IJCIR 2010. pp.19-31 18. Kizza, J.M., et al., Using Subgraph Isomorphism as a Zero Knowledge Proof Authentication in Timed Wireless Mobile Networks, IJCIR 2010. pp. 334-351. 19. Mirembe, D.P. and Muyeba, M., Security Issues in Ambulatory Wireless Sensor Networks (AWSN): Security Vs Mobility, IJCIR 2009. pp.289-301. 20. Mutyaba R.B., Improving the RSA cryptographic algorithm using double encryption, Makerere Univ Research Repository, 2009. 21. Makori, A.C., Integration of Biometrics with Cryptographic Techniques for Secure Authentication of Networked Data Access. IJCIR 2009. pp. 1-13 22. Okwangale, F.R., and Ogao, P., Survey of Data Mining Methods for Crime Analysis and Visualisation, IJCIR 2006. pp. 322-327 23. Bakibinga, E.M., Managing Electronic Privacy in the Telecommunications Sub-sector: The Ugandan Perspective. Africa Electronic Privacy and Public Voice Symposium, 2004.
  • 29. Applying Data Privacy Techniques on Published Data in Uganda References 1. Luyombya, D., Framework for Effective Public Digital Records Management in Uganda. Doctoral Thesis, UCL(University College London), 2010. 2. Ssekibule, R., and Mirembe, D.P., Security Analysis of Remote E-Voting,” Makerere University Research Repository, 2007. 3. Kayondo, L.F., A Framework for Security Management of Electronic Health Records By, Makerere University Research Repository, 2009. 4. Sweeney, L., k-anonymity: A Model for Protecting Privacy, IJUFKS, 2002. pp. 557-570. 5. UBS, The Bureau Of Statistics Act 12 1998, Acts Supplement No.7, The Uganda Gazette No.36 Volume XCI, 11th June, 1998. 6. Ciriani, V., et al, Secure Data Management in Decentralized System, Springer, ISBN 0387276947, 2007, pp 291-321, 2007. 7. Denning, D. E. and Denning, P.J., Data Security, ACM Computing Surveys, Vpl. II,No. 3, September 1, 1979. 8. U.S. DHS, Handbook for Safeguarding Sensitive PII at The DHS, October 2008. 9. McCallister, E. and Scarfone, K., Guide to Protecting the Confidentiality of PII, Recommendations of the NIST, 2010. 10. Ganta, S.R., et al, 2008. Composition attacks and auxiliary information in data privacy, Proceeding of the 14th ACM SIGKDD 2008, p. 265. 11. Oganian, A. and Domingo-Ferrer, J., On the complexity of optimal micro-aggregation for statistical disclosure control, Statistical Journal of the United Nations Economic Commission for Europe, Vol. 18, No. 4. (2001), pp.345-353. 12. Rastogi et al, The boundary between privacy and utility in data publishing, VLDB ,September 2007, pp. 531-542. 13. Sramka et al, A Practice-oriented Framework for Measuring Privacy and Utility in Data Sanitization Systems, ACM, EDBT 2010. 14. Sankar, S.R., Utility and Privacy of Data Sources: Can Shannon Help Conceal and Reveal Information?, presented at CoRR, 2010. 15. Wong, R.C., et al, Minimality attack in privacy preserving data publishing, VLDB, 2007. pp.543-554. 16. Adam, N.R. and Wortmann, J.C., A Comparative Methods Study for Statistical Databases: Adam and Wortmann, ACM Comp. Surveys, vol.21, 1989. 17. Narayanan, A. and Shmatikov, V., Myths and fallacies of "personally identifiable information". Comm. ACM. 2010, 24-26. 18. Brewster, K.F., 1996. The National Computer Security Center (NCSC) Technical Report - 005 Volume 1/5 Library No. S-243,039, 1996. 19. Bayardo, R.J., AND Agrawal, R., Data Privacy through Optimal k-anonymization, ICDE, 2005. pp. 217-228. 20. Ciriani, V., et al, Theory of privacy and anonymity. In Algorithms and theory of computation handbook (2 ed.), 2010. 21. Samarati, P. and Sweeney, L., Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression, IEEE Symp on Research in Security and Privacy, 1998, pp. 384–393. 22. Samarati, P., Protecting Respondent’s Privacy in Microdata Release. IEEE on TKDE, 2001. pp. 1010-1027. 23. Meyerson, A., and Williams, R., On the complexity of optimal K-anonymity. ACM PODS, 2004. pp. 223-228. 24. Rastogi et al, The boundary between privacy and utility in data publishing, VLDB, September 2007, pp. 531-542. 25. C. Kuner, European data protection law: corporate compliance and regulation. Oxford University Press, ISBN 9780199283859, 2007.