SlideShare a Scribd company logo
1 of 39
Privacy Preserved
Data Augmentation
using
Enterprise Data Fabric
Final blow before Tea!
I was like her according to her;
We were both outliers
Twitter: @mantaq10
Atif Rahman
Zetaris
www.zetaris.com
Data Exchanged (without
consent)
• GPS
• HIV Status
• Email addresses
• Weapon: Contract
• Response: Excuse
• Exposure: (Potential) exposure
of marginalized people.
Data Breach:
• Email Addresses
• Username & Passwords
Exposure:
• 150 million customers
Response:
• No clear Apologies
• (Delayed) Corrective Actions
Weapon: Contract
Data Breach:
• Names
• Loyalty data
• Email addresses
• Physical addresses
• DOB
• Credit Card last 4 digits
Exposure:
• Millions of Customers
Response:
• Denial
• Fake Solutions
• 8 months before first action
Paper contracts are still the most common
weapon organizations use to get away with.
As regulations get more mature, the impetus
to be more effective in privacy preservation
will be on service providers.
From the exhibition: "M. Hulot, the protagonist in Jacques Tati's 1967 film Playtime, is
Enterprises have different data landscape than
consumer facing (typically tech) organisations.
Enterprises have silos, legacy systems, have to learn
to be data driven the hard way and have divergent
forces giving a unique focus on
Agenda
• Data Augmentation
• First Principles
• Enterprise Data Fabric
Data Augmentation
ORG A
Class 1
Class 2
Class 3
Data Augmentation
ORG A
Class 1
Class 2
Class 3
ORG A
Class 1
Class 2
Class 3
ORG B
ORG C
Potentially Better
Typical Modeling Exercise
Modeling after data augmentation
ORG A
Class 1
Class 2
Class 3
ORG B
ORG C
Content Shared
• Aggregated Data / Insights
• Open Data
• Stratified Sampling
• Synthetic Data
• De-identified / Anonymized
Channels:
• Public Portals
• Private Marketplaces
• In Person Walk
throughs/handovers
• Gossiping
• Pigeons
Data Augmentation
Data as an asset
• Easy to copy and spawn
• Does not depreciate or depletes
• Really hard to valuate
• Process to yield value
• Various forms and derivatives
Resolve to First Principles
Data has properties that make it
intrinsically hard to ensure privacy
preservation. Therefore, we must
adhere to first principles to better
understand the problem
statement first.
The Five Safes
Safe Data
Safe People
Safe Setting
Safe Project
Safe Output
Great Resources
ACS Data Sharing Frameworks The De-Identification Decision Making Framework
First Principles
Safe Data
Safe People
Safe Setting
Safe Project
Safe Output
Encryption
Authentication & Authorisation
Environment for Data Controllers & Processors
Audit Trail, Lineage and Access & Query Logs
Linkage Problem
First Principles
Safe Data
Safe People
Safe Setting
Safe Project
Safe Output
Encryption
Authentication & Authorisation
Environment for Data Controllers & Processors
Audit Trail, Lineage and Access & Query Logs
Linkage Problem
Safe Data – (Encryption)
Data at Rest Standard Encryption
Data in Transit Secure the Pipe
Data for Compute Homomorphic Encryption
Homomorphic Encryption
Partial Homomorphic Encryption (PHE)
Somewhat Homomorphic Encryption (SWHE)
Full Homomorphic Encryption (FHE)
Addition/Multiplication
Low Order Polynomials
Eval of Arbitrary Functions
More
General
Less
Costly
Data Analytics without seeing the data
Max Ott, YOW Data 2016
First Principles
Safe Data
Safe People
Safe Setting
Safe Project
Safe Output
Encryption
Authentication & Authorisation
Environment for Data Controllers & Processors
Audit Trail, Lineage and Access & Query Logs
Linkage Problem
Safe Setting - Confidential Computing
Trusted Execution Environments (Safe Data in Safe Setting)
Microsoft Azure Confidential Computing
Google Cloud Platform: Asylo Open Source Framework
Confidential Computing at the Software layer?
First Principles
Safe Data
Safe People
Safe Setting
Safe Project
Safe Output
Encryption
Authentication & Authorisation
Environment for Data Controllers & Processors
Audit Trail, Lineage and Access & Query Logs
Linkage Problem
Alice Bob
Safe People – (System Span)
Safe People – (System Span)
First Principles
Safe Data
Safe People
Safe Setting
Safe Project
Safe Output
Encryption
Authentication & Authorisation
Environment for Data Controllers & Processors
Audit Trail, Lineage and Access & Query Logs
Linkage Problem
Safe People – (System Span)
Safe People – (System Span)
Expanding the Span of control
First Principles
Safe Data
Safe People
Safe Setting
Safe Project
Safe Output
Encryption
Authentication & Authorisation
Environment for Data Controllers & Processors
Audit Trail, Lineage and Access & Query Logs
Linkage Problem
Safe Project – Audit Trails & Lineage
Safe Project – Audit Trails & Lineage
?
Data
in the
wild
Its still very hard within enterprises
to have a point to point track of data
lineage and processing.
The problem is expounded when
data leaves the span of vision.
One Ring to Rule them All?
Encryption
Authentication & Authorisation
Environment for Data Controllers & Processors
Audit Trail, Lineage and Access & Query Logs
Linkage Problem
A data landscape must cover all
principles of data privacy.
Monoliths in the era of Microservices
DB Server App
App
DB
Server
DB
Server
DB
Server
AppDB
Server
DB
Server
DB
Server
DB
Caching
DB
In-Memory
DB
Streams
DB
Messaging
App
App
DBServer App
Server
Server
DB
DB
DB
App
App
The Enterprise Data Fabric
A unified data layer that is used by both user facing applications and downstream analytics, a potential holistic five
safes environment
The Zetaris Enterprise Data Fabric – Location Aware, Usage Aware, People Aware, Privacy Preserved data in a secure
environment.
Also check out Apache Ignite, Redhat OpenShift + JBoss Virtualization,.
GDPR Highlights
Data
Portability
Erasure
Access
Consent
Right to transfer personal data from one electronic
processing system to and into another.
Right to withdraw consent and ask for personal
data to be deleted
Right to know what’s been collected and how its
being processed
Consumer is informed in ’clear’ and plain language.
Consent to collect can be withdrawn at any time
By Design
By Design
By Design
By Design
Only through
Serialization
Random writes
are not typical
Limited Purview
Hard
Monoliths e.g. Lakes Data Fabric
As data scientists, we are at
the forefront of disruption
and hold the potential to
change things. We are
automating decisions in all
aspects of society.
Yet, our work has serious
negative implications, we
need to educate ourselves
on the broader societal
questions around
regulations, ethics and
impact
Enjoy the Tribe!

More Related Content

What's hot

Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss Prevention
Reza Kopaee
 
Data Loss Prevention from Symantec
Data Loss Prevention from SymantecData Loss Prevention from Symantec
Data Loss Prevention from Symantec
Arrow ECS UK
 

What's hot (20)

Data Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective StrategiesData Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective Strategies
 
Information Security in Big Data : Privacy and Data Mining
Information Security in Big Data : Privacy and Data MiningInformation Security in Big Data : Privacy and Data Mining
Information Security in Big Data : Privacy and Data Mining
 
Data Leakage Prevention - K. K. Mookhey
Data Leakage Prevention - K. K. MookheyData Leakage Prevention - K. K. Mookhey
Data Leakage Prevention - K. K. Mookhey
 
Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss Prevention
 
Efficiently Handling Subject Access Requests
Efficiently Handling Subject Access RequestsEfficiently Handling Subject Access Requests
Efficiently Handling Subject Access Requests
 
Data Leakage Presentation
Data Leakage PresentationData Leakage Presentation
Data Leakage Presentation
 
Information Leakage - A knowledge Based Approach
Information Leakage - A knowledge Based ApproachInformation Leakage - A knowledge Based Approach
Information Leakage - A knowledge Based Approach
 
Are you prepared for eu gdpr indirect identifiers? what are indirect identifi...
Are you prepared for eu gdpr indirect identifiers? what are indirect identifi...Are you prepared for eu gdpr indirect identifiers? what are indirect identifi...
Are you prepared for eu gdpr indirect identifiers? what are indirect identifi...
 
WWW.DSS.LV - Data Protection Basics 2015 - DeviceLock
WWW.DSS.LV - Data Protection Basics 2015 - DeviceLock WWW.DSS.LV - Data Protection Basics 2015 - DeviceLock
WWW.DSS.LV - Data Protection Basics 2015 - DeviceLock
 
Data Sovereignty and the Cloud
Data Sovereignty and the CloudData Sovereignty and the Cloud
Data Sovereignty and the Cloud
 
Data Loss Prevention from Symantec
Data Loss Prevention from SymantecData Loss Prevention from Symantec
Data Loss Prevention from Symantec
 
GDPR READY SOLUTION FOR UNSTRUCTURED DATA
GDPR READY SOLUTION FOR UNSTRUCTURED DATAGDPR READY SOLUTION FOR UNSTRUCTURED DATA
GDPR READY SOLUTION FOR UNSTRUCTURED DATA
 
ZyLAB ACEDS Webinar- GDPR
ZyLAB ACEDS Webinar- GDPR ZyLAB ACEDS Webinar- GDPR
ZyLAB ACEDS Webinar- GDPR
 
DSS.LV - Principles Of Data Protection - March2015 By Arturs Filatovs
DSS.LV - Principles Of Data Protection - March2015 By Arturs FilatovsDSS.LV - Principles Of Data Protection - March2015 By Arturs Filatovs
DSS.LV - Principles Of Data Protection - March2015 By Arturs Filatovs
 
DLP 101: Help identify and plug information leaks
 DLP 101: Help identify and plug information leaks DLP 101: Help identify and plug information leaks
DLP 101: Help identify and plug information leaks
 
DLP Executive Overview
DLP Executive OverviewDLP Executive Overview
DLP Executive Overview
 
The Definitive Guide to Data Loss Prevention
The Definitive Guide to Data Loss PreventionThe Definitive Guide to Data Loss Prevention
The Definitive Guide to Data Loss Prevention
 
New technologies for data protection
New technologies for data protectionNew technologies for data protection
New technologies for data protection
 
The REAL Impact of Big Data on Privacy
The REAL Impact of Big Data on PrivacyThe REAL Impact of Big Data on Privacy
The REAL Impact of Big Data on Privacy
 
data mining privacy concerns ppt presentation
data mining privacy concerns ppt presentationdata mining privacy concerns ppt presentation
data mining privacy concerns ppt presentation
 

Similar to Privacy Preserved Data Augmentation using Enterprise Data Fabric

GTB - Protecting PII in the EU
GTB - Protecting PII in the EUGTB - Protecting PII in the EU
GTB - Protecting PII in the EU
VCW Security Ltd
 
Understanding Database Encryption & Protecting Against the Insider Threat wit...
Understanding Database Encryption & Protecting Against the Insider Threat wit...Understanding Database Encryption & Protecting Against the Insider Threat wit...
Understanding Database Encryption & Protecting Against the Insider Threat wit...
MongoDB
 
dlp-sales-play-sales-customer-deck-2022.pptx
dlp-sales-play-sales-customer-deck-2022.pptxdlp-sales-play-sales-customer-deck-2022.pptx
dlp-sales-play-sales-customer-deck-2022.pptx
alex hincapie
 

Similar to Privacy Preserved Data Augmentation using Enterprise Data Fabric (20)

CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdfCYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
 
Solving the Really Big Tech Problems with IoT
 Solving the Really Big Tech Problems with IoT Solving the Really Big Tech Problems with IoT
Solving the Really Big Tech Problems with IoT
 
GTB - Protecting PII in the EU
GTB - Protecting PII in the EUGTB - Protecting PII in the EU
GTB - Protecting PII in the EU
 
The Born Identity
The Born IdentityThe Born Identity
The Born Identity
 
Understanding Database Encryption & Protecting Against the Insider Threat wit...
Understanding Database Encryption & Protecting Against the Insider Threat wit...Understanding Database Encryption & Protecting Against the Insider Threat wit...
Understanding Database Encryption & Protecting Against the Insider Threat wit...
 
Better to Ask Permission? Best Practices for Privacy and Security
Better to Ask Permission? Best Practices for Privacy and SecurityBetter to Ask Permission? Best Practices for Privacy and Security
Better to Ask Permission? Best Practices for Privacy and Security
 
5 Security Questions To Ask A Cloud Service Provider
5 Security Questions To Ask A Cloud Service Provider5 Security Questions To Ask A Cloud Service Provider
5 Security Questions To Ask A Cloud Service Provider
 
dlp-sales-play-sales-customer-deck-2022.pptx
dlp-sales-play-sales-customer-deck-2022.pptxdlp-sales-play-sales-customer-deck-2022.pptx
dlp-sales-play-sales-customer-deck-2022.pptx
 
David valovcin big data - big risk
David valovcin big data - big riskDavid valovcin big data - big risk
David valovcin big data - big risk
 
IT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 ConferenceIT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 Conference
 
Big Data Everywhere Chicago: The Big Data Imperative -- Discovering & Protect...
Big Data Everywhere Chicago: The Big Data Imperative -- Discovering & Protect...Big Data Everywhere Chicago: The Big Data Imperative -- Discovering & Protect...
Big Data Everywhere Chicago: The Big Data Imperative -- Discovering & Protect...
 
The Need for DLP now - A Clearswift White Paper
The Need for DLP now - A Clearswift White PaperThe Need for DLP now - A Clearswift White Paper
The Need for DLP now - A Clearswift White Paper
 
Hadoop and Big Data Security
Hadoop and Big Data SecurityHadoop and Big Data Security
Hadoop and Big Data Security
 
Protect your Database with Data Masking & Enforced Version Control
Protect your Database with Data Masking & Enforced Version Control	Protect your Database with Data Masking & Enforced Version Control
Protect your Database with Data Masking & Enforced Version Control
 
BREACHED: Data Centric Security for SAP
BREACHED: Data Centric Security for SAPBREACHED: Data Centric Security for SAP
BREACHED: Data Centric Security for SAP
 
Gde privacy tf_summit
Gde privacy tf_summitGde privacy tf_summit
Gde privacy tf_summit
 
Cybersecurity…real world solutions
Cybersecurity…real world solutions Cybersecurity…real world solutions
Cybersecurity…real world solutions
 
Data security and compliancy in Office 365
Data security and compliancy in Office 365Data security and compliancy in Office 365
Data security and compliancy in Office 365
 
information security and backup system
information security and backup systeminformation security and backup system
information security and backup system
 
Anzo Smart Data Lake 4.0 - a Data Lake Platform for the Enterprise Informatio...
Anzo Smart Data Lake 4.0 - a Data Lake Platform for the Enterprise Informatio...Anzo Smart Data Lake 4.0 - a Data Lake Platform for the Enterprise Informatio...
Anzo Smart Data Lake 4.0 - a Data Lake Platform for the Enterprise Informatio...
 

More from Atif Shaikh

Transforming Organizations to Better Leverage Analytics
Transforming Organizations to Better Leverage Analytics Transforming Organizations to Better Leverage Analytics
Transforming Organizations to Better Leverage Analytics
Atif Shaikh
 

More from Atif Shaikh (10)

Patterns and Packages in PostgreSQL for Privacy Preservation
Patterns and Packages in PostgreSQL for Privacy PreservationPatterns and Packages in PostgreSQL for Privacy Preservation
Patterns and Packages in PostgreSQL for Privacy Preservation
 
HTAP Queries
HTAP QueriesHTAP Queries
HTAP Queries
 
Data Infrastructure for Your Retail Digital Strategy
Data Infrastructure for Your Retail Digital StrategyData Infrastructure for Your Retail Digital Strategy
Data Infrastructure for Your Retail Digital Strategy
 
Agile Analytics: Discovering Expectations
Agile Analytics: Discovering ExpectationsAgile Analytics: Discovering Expectations
Agile Analytics: Discovering Expectations
 
Agile Big Data Practices
Agile Big Data PracticesAgile Big Data Practices
Agile Big Data Practices
 
Agile Analytics
Agile AnalyticsAgile Analytics
Agile Analytics
 
Transforming Organizations to Better Leverage Analytics
Transforming Organizations to Better Leverage Analytics Transforming Organizations to Better Leverage Analytics
Transforming Organizations to Better Leverage Analytics
 
Introduction to Knowledge Management
Introduction to Knowledge ManagementIntroduction to Knowledge Management
Introduction to Knowledge Management
 
Hr Analytics
Hr AnalyticsHr Analytics
Hr Analytics
 
Strategy by Measurement
Strategy by MeasurementStrategy by Measurement
Strategy by Measurement
 

Recently uploaded

CHEAP Call Girls in Saket (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Saket (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Saket (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Saket (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 
Call Girls Bommasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Bommasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...Call Girls Bommasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Bommasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
amitlee9823
 
Vip Mumbai Call Girls Thane West Call On 9920725232 With Body to body massage...
Vip Mumbai Call Girls Thane West Call On 9920725232 With Body to body massage...Vip Mumbai Call Girls Thane West Call On 9920725232 With Body to body massage...
Vip Mumbai Call Girls Thane West Call On 9920725232 With Body to body massage...
amitlee9823
 
Escorts Service Kumaraswamy Layout ☎ 7737669865☎ Book Your One night Stand (B...
Escorts Service Kumaraswamy Layout ☎ 7737669865☎ Book Your One night Stand (B...Escorts Service Kumaraswamy Layout ☎ 7737669865☎ Book Your One night Stand (B...
Escorts Service Kumaraswamy Layout ☎ 7737669865☎ Book Your One night Stand (B...
amitlee9823
 
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al BarshaAl Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
AroojKhan71
 
Abortion pills in Doha Qatar (+966572737505 ! Get Cytotec
Abortion pills in Doha Qatar (+966572737505 ! Get CytotecAbortion pills in Doha Qatar (+966572737505 ! Get Cytotec
Abortion pills in Doha Qatar (+966572737505 ! Get Cytotec
Abortion pills in Riyadh +966572737505 get cytotec
 

Recently uploaded (20)

Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 nightCheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
 
Ravak dropshipping via API with DroFx.pptx
Ravak dropshipping via API with DroFx.pptxRavak dropshipping via API with DroFx.pptx
Ravak dropshipping via API with DroFx.pptx
 
VIP Model Call Girls Hinjewadi ( Pune ) Call ON 8005736733 Starting From 5K t...
VIP Model Call Girls Hinjewadi ( Pune ) Call ON 8005736733 Starting From 5K t...VIP Model Call Girls Hinjewadi ( Pune ) Call ON 8005736733 Starting From 5K t...
VIP Model Call Girls Hinjewadi ( Pune ) Call ON 8005736733 Starting From 5K t...
 
Invezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signalsInvezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signals
 
Capstone Project on IBM Data Analytics Program
Capstone Project on IBM Data Analytics ProgramCapstone Project on IBM Data Analytics Program
Capstone Project on IBM Data Analytics Program
 
CHEAP Call Girls in Saket (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Saket (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Saket (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Saket (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
Edukaciniai dropshipping via API with DroFx
Edukaciniai dropshipping via API with DroFxEdukaciniai dropshipping via API with DroFx
Edukaciniai dropshipping via API with DroFx
 
Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Discover Why Less is More in B2B Research
Discover Why Less is More in B2B ResearchDiscover Why Less is More in B2B Research
Discover Why Less is More in B2B Research
 
Call Girls Bommasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Bommasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...Call Girls Bommasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Bommasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
 
Vip Mumbai Call Girls Thane West Call On 9920725232 With Body to body massage...
Vip Mumbai Call Girls Thane West Call On 9920725232 With Body to body massage...Vip Mumbai Call Girls Thane West Call On 9920725232 With Body to body massage...
Vip Mumbai Call Girls Thane West Call On 9920725232 With Body to body massage...
 
Carero dropshipping via API with DroFx.pptx
Carero dropshipping via API with DroFx.pptxCarero dropshipping via API with DroFx.pptx
Carero dropshipping via API with DroFx.pptx
 
April 2024 - Crypto Market Report's Analysis
April 2024 - Crypto Market Report's AnalysisApril 2024 - Crypto Market Report's Analysis
April 2024 - Crypto Market Report's Analysis
 
Call me @ 9892124323 Cheap Rate Call Girls in Vashi with Real Photo 100% Secure
Call me @ 9892124323  Cheap Rate Call Girls in Vashi with Real Photo 100% SecureCall me @ 9892124323  Cheap Rate Call Girls in Vashi with Real Photo 100% Secure
Call me @ 9892124323 Cheap Rate Call Girls in Vashi with Real Photo 100% Secure
 
Escorts Service Kumaraswamy Layout ☎ 7737669865☎ Book Your One night Stand (B...
Escorts Service Kumaraswamy Layout ☎ 7737669865☎ Book Your One night Stand (B...Escorts Service Kumaraswamy Layout ☎ 7737669865☎ Book Your One night Stand (B...
Escorts Service Kumaraswamy Layout ☎ 7737669865☎ Book Your One night Stand (B...
 
BabyOno dropshipping via API with DroFx.pptx
BabyOno dropshipping via API with DroFx.pptxBabyOno dropshipping via API with DroFx.pptx
BabyOno dropshipping via API with DroFx.pptx
 
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al BarshaAl Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
 
Generative AI on Enterprise Cloud with NiFi and Milvus
Generative AI on Enterprise Cloud with NiFi and MilvusGenerative AI on Enterprise Cloud with NiFi and Milvus
Generative AI on Enterprise Cloud with NiFi and Milvus
 
Abortion pills in Doha Qatar (+966572737505 ! Get Cytotec
Abortion pills in Doha Qatar (+966572737505 ! Get CytotecAbortion pills in Doha Qatar (+966572737505 ! Get Cytotec
Abortion pills in Doha Qatar (+966572737505 ! Get Cytotec
 
Smarteg dropshipping via API with DroFx.pptx
Smarteg dropshipping via API with DroFx.pptxSmarteg dropshipping via API with DroFx.pptx
Smarteg dropshipping via API with DroFx.pptx
 

Privacy Preserved Data Augmentation using Enterprise Data Fabric

  • 1. Privacy Preserved Data Augmentation using Enterprise Data Fabric Final blow before Tea! I was like her according to her; We were both outliers Twitter: @mantaq10 Atif Rahman Zetaris www.zetaris.com
  • 2. Data Exchanged (without consent) • GPS • HIV Status • Email addresses • Weapon: Contract • Response: Excuse • Exposure: (Potential) exposure of marginalized people.
  • 3. Data Breach: • Email Addresses • Username & Passwords Exposure: • 150 million customers Response: • No clear Apologies • (Delayed) Corrective Actions Weapon: Contract
  • 4. Data Breach: • Names • Loyalty data • Email addresses • Physical addresses • DOB • Credit Card last 4 digits Exposure: • Millions of Customers Response: • Denial • Fake Solutions • 8 months before first action
  • 5. Paper contracts are still the most common weapon organizations use to get away with. As regulations get more mature, the impetus to be more effective in privacy preservation will be on service providers.
  • 6. From the exhibition: "M. Hulot, the protagonist in Jacques Tati's 1967 film Playtime, is Enterprises have different data landscape than consumer facing (typically tech) organisations. Enterprises have silos, legacy systems, have to learn to be data driven the hard way and have divergent forces giving a unique focus on
  • 7. Agenda • Data Augmentation • First Principles • Enterprise Data Fabric
  • 8. Data Augmentation ORG A Class 1 Class 2 Class 3
  • 9. Data Augmentation ORG A Class 1 Class 2 Class 3 ORG A Class 1 Class 2 Class 3 ORG B ORG C Potentially Better Typical Modeling Exercise Modeling after data augmentation
  • 10. ORG A Class 1 Class 2 Class 3 ORG B ORG C Content Shared • Aggregated Data / Insights • Open Data • Stratified Sampling • Synthetic Data • De-identified / Anonymized Channels: • Public Portals • Private Marketplaces • In Person Walk throughs/handovers • Gossiping • Pigeons Data Augmentation
  • 11. Data as an asset • Easy to copy and spawn • Does not depreciate or depletes • Really hard to valuate • Process to yield value • Various forms and derivatives Resolve to First Principles Data has properties that make it intrinsically hard to ensure privacy preservation. Therefore, we must adhere to first principles to better understand the problem statement first.
  • 12. The Five Safes Safe Data Safe People Safe Setting Safe Project Safe Output Great Resources ACS Data Sharing Frameworks The De-Identification Decision Making Framework
  • 13. First Principles Safe Data Safe People Safe Setting Safe Project Safe Output Encryption Authentication & Authorisation Environment for Data Controllers & Processors Audit Trail, Lineage and Access & Query Logs Linkage Problem
  • 14. First Principles Safe Data Safe People Safe Setting Safe Project Safe Output Encryption Authentication & Authorisation Environment for Data Controllers & Processors Audit Trail, Lineage and Access & Query Logs Linkage Problem
  • 15. Safe Data – (Encryption) Data at Rest Standard Encryption Data in Transit Secure the Pipe Data for Compute Homomorphic Encryption
  • 16. Homomorphic Encryption Partial Homomorphic Encryption (PHE) Somewhat Homomorphic Encryption (SWHE) Full Homomorphic Encryption (FHE) Addition/Multiplication Low Order Polynomials Eval of Arbitrary Functions More General Less Costly Data Analytics without seeing the data Max Ott, YOW Data 2016
  • 17. First Principles Safe Data Safe People Safe Setting Safe Project Safe Output Encryption Authentication & Authorisation Environment for Data Controllers & Processors Audit Trail, Lineage and Access & Query Logs Linkage Problem
  • 18. Safe Setting - Confidential Computing Trusted Execution Environments (Safe Data in Safe Setting) Microsoft Azure Confidential Computing Google Cloud Platform: Asylo Open Source Framework Confidential Computing at the Software layer?
  • 19. First Principles Safe Data Safe People Safe Setting Safe Project Safe Output Encryption Authentication & Authorisation Environment for Data Controllers & Processors Audit Trail, Lineage and Access & Query Logs Linkage Problem
  • 20.
  • 22. Safe People – (System Span)
  • 23. Safe People – (System Span)
  • 24. First Principles Safe Data Safe People Safe Setting Safe Project Safe Output Encryption Authentication & Authorisation Environment for Data Controllers & Processors Audit Trail, Lineage and Access & Query Logs Linkage Problem
  • 25. Safe People – (System Span)
  • 26. Safe People – (System Span) Expanding the Span of control
  • 27. First Principles Safe Data Safe People Safe Setting Safe Project Safe Output Encryption Authentication & Authorisation Environment for Data Controllers & Processors Audit Trail, Lineage and Access & Query Logs Linkage Problem
  • 28. Safe Project – Audit Trails & Lineage
  • 29. Safe Project – Audit Trails & Lineage ? Data in the wild Its still very hard within enterprises to have a point to point track of data lineage and processing. The problem is expounded when data leaves the span of vision.
  • 30. One Ring to Rule them All? Encryption Authentication & Authorisation Environment for Data Controllers & Processors Audit Trail, Lineage and Access & Query Logs Linkage Problem A data landscape must cover all principles of data privacy.
  • 31. Monoliths in the era of Microservices
  • 35. DBServer App Server Server DB DB DB App App The Enterprise Data Fabric A unified data layer that is used by both user facing applications and downstream analytics, a potential holistic five safes environment
  • 36. The Zetaris Enterprise Data Fabric – Location Aware, Usage Aware, People Aware, Privacy Preserved data in a secure environment. Also check out Apache Ignite, Redhat OpenShift + JBoss Virtualization,.
  • 37.
  • 38. GDPR Highlights Data Portability Erasure Access Consent Right to transfer personal data from one electronic processing system to and into another. Right to withdraw consent and ask for personal data to be deleted Right to know what’s been collected and how its being processed Consumer is informed in ’clear’ and plain language. Consent to collect can be withdrawn at any time By Design By Design By Design By Design Only through Serialization Random writes are not typical Limited Purview Hard Monoliths e.g. Lakes Data Fabric
  • 39. As data scientists, we are at the forefront of disruption and hold the potential to change things. We are automating decisions in all aspects of society. Yet, our work has serious negative implications, we need to educate ourselves on the broader societal questions around regulations, ethics and impact Enjoy the Tribe!

Editor's Notes

  1. Data Augmentation     Value comes with greater depth of analysis     Data Exchanges Models         Insights as a service         application offloading         marketplaces             virtualization with least cost and exposure routing     data fabric as a data augmenation approach Status Quo: Sampling (stratified sampling or rather top N) De-identified Highly aggregated
  2. Data Augmentation     Value comes with greater depth of analysis     Data Exchanges Models         Insights as a service         application offloading         marketplaces             virtualization with least cost and exposure routing     data fabric as a data augmenation approach Status Quo: Sampling (stratified sampling or rather top N) De-identified Highly aggregated
  3. Aim for simplicity  Monolithic systems     Distributed by Design     Co-Location (NSW Data Sharing Framework)     Same data different use cases     PII embedded.     Resourse Contention in Monolithic Systems The problem of monoliths We are treating this as a separate thing (privacy) Open data movement and the open data publishing Separate teams for data publishing and data creation Dr Eugene – For engineers, data is a commodity that flows through the system
  4. Aim for simplicity  Monolithic systems     Distributed by Design     Co-Location (NSW Data Sharing Framework)     Same data different use cases     PII embedded.     Resourse Contention in Monolithic Systems The problem of monoliths We are treating this as a separate thing (privacy) Open data movement and the open data publishing Separate teams for data publishing and data creation Dr Eugene – For engineers, data is a commodity that flows through the system
  5. Aim for simplicity  Monolithic systems     Distributed by Design     Co-Location (NSW Data Sharing Framework)     Same data different use cases     PII embedded.     Resourse Contention in Monolithic Systems The problem of monoliths We are treating this as a separate thing (privacy) Open data movement and the open data publishing Separate teams for data publishing and data creation Dr Eugene – For engineers, data is a commodity that flows through the system
  6. Aim for simplicity  Monolithic systems     Distributed by Design     Co-Location (NSW Data Sharing Framework)     Same data different use cases     PII embedded.     Resourse Contention in Monolithic Systems The problem of monoliths We are treating this as a separate thing (privacy) Open data movement and the open data publishing Separate teams for data publishing and data creation Dr Eugene – For engineers, data is a commodity that flows through the system
  7. Going for Microservices Background Databases are still monoliths Problem is: we are again replicating data to tie them up behind microservices Meta pattern
  8. Going for Microservices Background Databases are still monoliths Problem is: we are again replicating data to tie them up behind microservices Meta pattern
  9. Going for Microservices Background Databases are still monoliths Problem is: we are again replicating data to tie them up behind microservices Meta pattern
  10. The enterprise data fabric Single envionrment where the data is packaged and lives as its source SOR and Apps and data analysis. Privacy built in by two ways Encyrption embedded. Usage tracked and secure.
  11. Data fabric Data colocation – hybrid vs on-prem vs on cloud Geographically aware Least cost routing Least exposure routing In memory compute grids (unified access and unified controls) Edge computing and IoT data privacy (Boris)