Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Securing the privacy of customer

877 views

Published on

  • Be the first to comment

Securing the privacy of customer

  1. 1. Securing the privacy of Customer Presentation On 01/29/15 1
  2. 2. • Privacy is the right of individuals. • Computer security is the prevention or protection against – access to information by unauthorized recipients – intentional but unauthorized destruction or alteration of that information Introduction 01/29/15 2
  3. 3. • Traditional databases • Statistical databases • Secure databases Related Work 01/29/15 3
  4. 4. • Hippocratic databases require all the capabilities provided by current database systems • Different focus • Need to rethink data definition and query languages, query processing, indexing and storage structures, and access control mechanisms Traditional Database 01/29/15 4
  5. 5. • Goal: Provide statistical information • Query restriction • Data perturbation Statistical Databases 01/29/15 5
  6. 6. • Sensitive information is transmitted over a secure channel and stored securely • Access controls • Encryption • Multilevel secure databases Secure Databases 01/29/15 6
  7. 7. • Purpose Specification • Consent • Limited Collection • Limited Use • Limited Disclosure Principles of Hippocratic 01/29/15 7
  8. 8. • Limited Retention • Accuracy • Safety • Openness • Compliance Continue……. 01/29/15 8
  9. 9. • Team Formation • Setting the responsibility • Setting the objective • Aware the Customer Key Requisites for Privacy Policy 01/29/15 9
  10. 10. • Lawful collection • Maintaining the accuracy • Obtaining complete information • Data Security Continue……. 01/29/15 10
  11. 11. • Disclosure norms • Storage norms • Updated norms • Information norms Continue……. 01/29/15 11
  12. 12. • Privacy Metadata • Data Collection • Querying • Retention • Data Collection Organizer Proposed Design and Implementation 01/29/15 12
  13. 13. • External recipients • Retention Period • Authorized users Privacy Metadata 01/29/15 13
  14. 14. • Data is inserted with the purpose for which it may be used. • Data Accuracy Analyzer addresses the Principle of Accuracy Data Collection 01/29/15 14
  15. 15. • Queries are tagged with a purpose • Before query execution • During query execution • After query execution Querying 01/29/15 15
  16. 16. • A data item should be retained for the maximum retention period among all the purposes for which it has been collected. • After this period, it should be deleted. Retention 01/29/15 16
  17. 17. • Data is fed into the database. • It has to be retained till its purpose is solved. • Data manager deletes all the data once purpose is solved. Applicable Restriction 01/29/15 17
  18. 18. • Fine grained access control (FGAC) • In order to maintain the retention restriction along with sustaining data consider a example The Proposed Model 01/29/15 18
  19. 19. Table1 Customer details Constraints Data type Cust_id Not NULL Integer Cust_name Char(32) Cust_add Varchar2 01/29/15 19
  20. 20. Table2 Restriction details Constraints Data type Restrict_id NotNULL Integer Restrict_name Varchar2 Restrict_date date 01/29/15 20
  21. 21. Table3 Restriction date Data type Restrict_id Integer Restrict_startdate date Restrict_enddate date 01/29/15 21
  22. 22. Table4 Customer_acc Data type Cust_id Integer Cust_acc Integer Cust_bal Integer 01/29/15 22
  23. 23. • Create restriction <restriction_name> On <table> For <authorization> (((to columns<column list>|to rows [Where search_condition] |to cells <column_list[where search_condition]+)) [for retension time time_interval])+ [restriction access to commands>] Syntax for creating the restriction 01/29/15 23
  24. 24. • Create restriction rest1 on table Customer_acc For user manager To Columns(cust_bal) for retension time12 Restricting access to select Example 01/29/15 24
  25. 25. • If the clause for retention 12 is omitted then the restriction is set for unspecified period Continue……. 01/29/15 25
  26. 26. Create restriction_user On Customer_acc For public To rows where name=user Restricting access to all User specific accessing 01/29/15 26
  27. 27. • This type of restriction helps in building the confidence level of customers for the company. Brand Stability and proposed model 01/29/15 27
  28. 28. Conclusion 01/29/15 28
  29. 29. Thank You alllllllllllllllllllllll Presented by: Harjinder Mann Shelly Sonia Anupama MCA-final 01/29/15 29

×