Download SecureDIS: A Framework for Secure Data

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts
no text concepts found
Transcript
SecureDIS: a Framework for Secure
Data Integration Systems
Fatimah Akeel
[email protected]
Supervisors: Dr. Gary B. Wills & Dr. Andrew Gravell
School of Electronics and Computer Science, ESS Group
Motivation
Research
Problem
Previous
Attempts
Research
Gap
Research
Objective
SecureDIS
Future
Work
References
SARS
Katrina
The use of intensive amount of data creates the so called
data integration systems
2
Motivation
Research
Problem
Previous
Attempts
Research
Gap
Research
Objective
SecureDIS
Future
Work
References
A Scenario of Data Integration System (DIS)
Data
Data Sources
Sources
NHS
DS1
Data Integrator (DI)
Data Integration
Application
Integration Approach
(IA)
ONS
DS2
Media
DS3
Social
Networks
DS4
System Security Management (SSM)
3
Motivation
Research
Problem
Previous
Attempts
Research
Gap
Research
Objective
SecureDIS
Future
Work
References
 Unintentional disclosure of private information caused
by system design.
Data
Data Sources
Sources
Security
NHS
DS1
Privacy
Trust
Data Integrator (DI)
Data Integration
Application
Integration Approach
(IA)
ONS
DS2
Media
DS3
Social
Networks
DS4
System Security Management (SSM)
4
Motivation
Research
Problem
Previous
Attempts
Research
Gap
Research
Objective
SecureDIS
Future
Work
References
Data-centric
Security
Security of
Specific
Components
DIS security is
addressed as:
Integration
Approach
Integrator
Security
Specific aspect
over the whole
system
Privacy
preserving
approaches
5
Motivation
Research
Problem
Previous
Attempts
Research
Gap
1
Research
Objective
SecureDIS
Future
Work
References
2
Security
Privacy
Build a DIS to be secure by design
Trust
3
Focus on disclosure of private data
6
Motivation
Research
Problem
Previous
Attempts
Research
Gap
Research
Objective
SecureDIS
Future
Work
References
The Goal is to:
Create a secure and reliable DIS
that Produce accurate results,
used in decision making and disaster recovery.
Which is achieved by having
security requirements propagate through the development
7
Motivation
Research
Problem
Previous
Attempts
Research
Gap
Research
Objective
Future
Work
SecureDIS
References
Secure Data Integration Systems (SecureDIS)
Data Sources (DS)
Security
Trust
Privacy
Integration Approach (IA)
Data Integrator (DI)
System Security Management (SSM)
Data Consumers (DC)
8
Motivation
Research
Problem
All DIS
components
Previous
Attempts
Heterogeneit
y of data
sources
Research
Gap
Research
Objective
An
integration
approach
with a
middle layer
SecureDIS
SPT
Future
Work
References
Data Leakage
SecureDIS
9
Motivation
Research
Problem
Previous
Attempts
Research
Gap
Research
Objective
SecureDIS
Future
Work
References
Literature Review
SecureDIS[V1]
Published
Completed
Expert Reviews to
Validate the
Components
Interviews to Extend
and Amend Activities
SecureDIS[V2]
Test Applicability
through a Case Study
Motivation
Research
Problem
Previous
Attempts
Research
Gap
Research
Objective
SecureDIS
Future Work
References

M. Lenzerini, “Data integration: A theoretical perspective,” in Proceedings of the 21st ACM SIGMODSIGACT-SIGART Symposium on Principles of Database Systems, 2002, pp. 233–246.

A. Calì, D. Calvanese, G. D. Giacomo, and M. Lenzerini, “Data integration under integrity constraints,” Adv.
Inf. Syst. Eng., pp. 262–279, 2006.

C. Clifton, M. Kantarcioǧlu, A. Doan, G. Schadow, J. Vaidya, A. Elmagarmid, and D. Suciu, “Privacy-preserving
data integration and sharing,” in Proceedings of the 9th ACM SIGMOD workshop on Research issues in data
mining and knowledge discovery - DMKD ’04, 2004, p. 19.

K. Pasierb, T. Kajdanowicz, and P. Kazienko, “Privacy-preserving data mining, sharing and publishing,” J.
Med. Informatics Technol., vol. 18, 2011.

M. Haddad, M.-S. Hacid, and R. Laurini, “Data Integration in Presence of Authorization Policies,” in 2012
IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, 2012,
pp. 92–99.

S. W. Van Den Braak, S. Choenni, R. Meijer, and A. Zuiderwijk, “Trusted third parties for secure and privacypreserving data integration and sharing in the public sector,” in Proceedings of the 13th Annual
International Conference on Digital Government Research - dg.o ’12, 2012, pp. 135 –144.

A. Morton and M. Sasse, “Privacy is a process, not a PET: a theory for effective privacy practice,” in
Proceedings of the 2012 workshop on New security paradigms, 2012, pp. 87–104.

S. S. Bhowmick, L. Gruenwald, M. Iwaihara, and S. Chatvichienchai, “PRIVATE-IYE: A Framework for Privacy
Preserving Data Integration,” in 22nd International Conference on Data Engineering Workshops (ICDEW’06),
2006, pp. 91–91.
11
Questions & Comments?
12