Your SlideShare is downloading. ×
Securing the privacy of customer
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Securing the privacy of customer

486
views

Published on


0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
486
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
5
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide
  • Computer security definition from Dictionary of Computing, Fourth Ed. (Oxford: Oxford University Press, 1996).
  • Transcript

    • 1. Securing the privacy of Customer Presentation On 01/29/15 1
    • 2. • Privacy is the right of individuals. • Computer security is the prevention or protection against – access to information by unauthorized recipients – intentional but unauthorized destruction or alteration of that information Introduction 01/29/15 2
    • 3. • Traditional databases • Statistical databases • Secure databases Related Work 01/29/15 3
    • 4. • Hippocratic databases require all the capabilities provided by current database systems • Different focus • Need to rethink data definition and query languages, query processing, indexing and storage structures, and access control mechanisms Traditional Database 01/29/15 4
    • 5. • Goal: Provide statistical information • Query restriction • Data perturbation Statistical Databases 01/29/15 5
    • 6. • Sensitive information is transmitted over a secure channel and stored securely • Access controls • Encryption • Multilevel secure databases Secure Databases 01/29/15 6
    • 7. • Purpose Specification • Consent • Limited Collection • Limited Use • Limited Disclosure Principles of Hippocratic 01/29/15 7
    • 8. • Limited Retention • Accuracy • Safety • Openness • Compliance Continue……. 01/29/15 8
    • 9. • Team Formation • Setting the responsibility • Setting the objective • Aware the Customer Key Requisites for Privacy Policy 01/29/15 9
    • 10. • Lawful collection • Maintaining the accuracy • Obtaining complete information • Data Security Continue……. 01/29/15 10
    • 11. • Disclosure norms • Storage norms • Updated norms • Information norms Continue……. 01/29/15 11
    • 12. • Privacy Metadata • Data Collection • Querying • Retention • Data Collection Organizer Proposed Design and Implementation 01/29/15 12
    • 13. • External recipients • Retention Period • Authorized users Privacy Metadata 01/29/15 13
    • 14. • Data is inserted with the purpose for which it may be used. • Data Accuracy Analyzer addresses the Principle of Accuracy Data Collection 01/29/15 14
    • 15. • Queries are tagged with a purpose • Before query execution • During query execution • After query execution Querying 01/29/15 15
    • 16. • A data item should be retained for the maximum retention period among all the purposes for which it has been collected. • After this period, it should be deleted. Retention 01/29/15 16
    • 17. • Data is fed into the database. • It has to be retained till its purpose is solved. • Data manager deletes all the data once purpose is solved. Applicable Restriction 01/29/15 17
    • 18. • Fine grained access control (FGAC) • In order to maintain the retention restriction along with sustaining data consider a example The Proposed Model 01/29/15 18
    • 19. Table1 Customer details Constraints Data type Cust_id Not NULL Integer Cust_name Char(32) Cust_add Varchar2 01/29/15 19
    • 20. Table2 Restriction details Constraints Data type Restrict_id NotNULL Integer Restrict_name Varchar2 Restrict_date date 01/29/15 20
    • 21. Table3 Restriction date Data type Restrict_id Integer Restrict_startdate date Restrict_enddate date 01/29/15 21
    • 22. Table4 Customer_acc Data type Cust_id Integer Cust_acc Integer Cust_bal Integer 01/29/15 22
    • 23. • Create restriction <restriction_name> On <table> For <authorization> (((to columns<column list>|to rows [Where search_condition] |to cells <column_list[where search_condition]+)) [for retension time time_interval])+ [restriction access to commands>] Syntax for creating the restriction 01/29/15 23
    • 24. • Create restriction rest1 on table Customer_acc For user manager To Columns(cust_bal) for retension time12 Restricting access to select Example 01/29/15 24
    • 25. • If the clause for retention 12 is omitted then the restriction is set for unspecified period Continue……. 01/29/15 25
    • 26. Create restriction_user On Customer_acc For public To rows where name=user Restricting access to all User specific accessing 01/29/15 26
    • 27. • This type of restriction helps in building the confidence level of customers for the company. Brand Stability and proposed model 01/29/15 27
    • 28. Conclusion 01/29/15 28
    • 29. Thank You alllllllllllllllllllllll Presented by: Harjinder Mann Shelly Sonia Anupama MCA-final 01/29/15 29