Survey
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
SecureDIS: a Framework for Secure Data Integration Systems Fatimah Akeel [email protected] Supervisors: Dr. Gary B. Wills & Dr. Andrew Gravell School of Electronics and Computer Science, ESS Group Motivation Research Problem Previous Attempts Research Gap Research Objective SecureDIS Future Work References SARS Katrina The use of intensive amount of data creates the so called data integration systems 2 Motivation Research Problem Previous Attempts Research Gap Research Objective SecureDIS Future Work References A Scenario of Data Integration System (DIS) Data Data Sources Sources NHS DS1 Data Integrator (DI) Data Integration Application Integration Approach (IA) ONS DS2 Media DS3 Social Networks DS4 System Security Management (SSM) 3 Motivation Research Problem Previous Attempts Research Gap Research Objective SecureDIS Future Work References Unintentional disclosure of private information caused by system design. Data Data Sources Sources Security NHS DS1 Privacy Trust Data Integrator (DI) Data Integration Application Integration Approach (IA) ONS DS2 Media DS3 Social Networks DS4 System Security Management (SSM) 4 Motivation Research Problem Previous Attempts Research Gap Research Objective SecureDIS Future Work References Data-centric Security Security of Specific Components DIS security is addressed as: Integration Approach Integrator Security Specific aspect over the whole system Privacy preserving approaches 5 Motivation Research Problem Previous Attempts Research Gap 1 Research Objective SecureDIS Future Work References 2 Security Privacy Build a DIS to be secure by design Trust 3 Focus on disclosure of private data 6 Motivation Research Problem Previous Attempts Research Gap Research Objective SecureDIS Future Work References The Goal is to: Create a secure and reliable DIS that Produce accurate results, used in decision making and disaster recovery. Which is achieved by having security requirements propagate through the development 7 Motivation Research Problem Previous Attempts Research Gap Research Objective Future Work SecureDIS References Secure Data Integration Systems (SecureDIS) Data Sources (DS) Security Trust Privacy Integration Approach (IA) Data Integrator (DI) System Security Management (SSM) Data Consumers (DC) 8 Motivation Research Problem All DIS components Previous Attempts Heterogeneit y of data sources Research Gap Research Objective An integration approach with a middle layer SecureDIS SPT Future Work References Data Leakage SecureDIS 9 Motivation Research Problem Previous Attempts Research Gap Research Objective SecureDIS Future Work References Literature Review SecureDIS[V1] Published Completed Expert Reviews to Validate the Components Interviews to Extend and Amend Activities SecureDIS[V2] Test Applicability through a Case Study Motivation Research Problem Previous Attempts Research Gap Research Objective SecureDIS Future Work References M. Lenzerini, “Data integration: A theoretical perspective,” in Proceedings of the 21st ACM SIGMODSIGACT-SIGART Symposium on Principles of Database Systems, 2002, pp. 233–246. A. Calì, D. Calvanese, G. D. Giacomo, and M. Lenzerini, “Data integration under integrity constraints,” Adv. Inf. Syst. Eng., pp. 262–279, 2006. C. Clifton, M. Kantarcioǧlu, A. Doan, G. Schadow, J. Vaidya, A. Elmagarmid, and D. Suciu, “Privacy-preserving data integration and sharing,” in Proceedings of the 9th ACM SIGMOD workshop on Research issues in data mining and knowledge discovery - DMKD ’04, 2004, p. 19. K. Pasierb, T. Kajdanowicz, and P. Kazienko, “Privacy-preserving data mining, sharing and publishing,” J. Med. Informatics Technol., vol. 18, 2011. M. Haddad, M.-S. Hacid, and R. Laurini, “Data Integration in Presence of Authorization Policies,” in 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, 2012, pp. 92–99. S. W. Van Den Braak, S. Choenni, R. Meijer, and A. Zuiderwijk, “Trusted third parties for secure and privacypreserving data integration and sharing in the public sector,” in Proceedings of the 13th Annual International Conference on Digital Government Research - dg.o ’12, 2012, pp. 135 –144. A. Morton and M. Sasse, “Privacy is a process, not a PET: a theory for effective privacy practice,” in Proceedings of the 2012 workshop on New security paradigms, 2012, pp. 87–104. S. S. Bhowmick, L. Gruenwald, M. Iwaihara, and S. Chatvichienchai, “PRIVATE-IYE: A Framework for Privacy Preserving Data Integration,” in 22nd International Conference on Data Engineering Workshops (ICDEW’06), 2006, pp. 91–91. 11 Questions & Comments? 12