SlideShare a Scribd company logo
Current Trends in Data Security Dan Suciu Joint work with Gerome Miklau
Data Security ,[object Object],[object Object],[object Object]
Data Security ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Outline ,[object Object],[object Object],[object Object],[object Object]
Traditional Data Security ,[object Object],[object Object]
Access Control in SQL GRANT privileges ON object TO users   [WITH GRANT OPTIONS] privileges =  SELECT  |  INSERT  |  DELETE |  . . .  object = table  |  attribute REVOKE  privileges ON object FROM users   [CASCADE ] [Griffith&Wade'76, Fagin'78]
Views in SQL ,[object Object],[object Object],GRANT  SELECT ON pmpStudents TO DavidRispoli CREATE VIEW pmpStudents AS    SELECT *  FROM Students WHERE…
Summary of SQL Security ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Access control = great success story of the DB community...
Summary (cont) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[Rosenthal&Winslett’2004]
Security in Statistical DBs ,[object Object],[object Object],[object Object],[ Adam&Wortmann’89] SELECT count(*) FROM  Patients WHERE age=42  and sex=‘M’ and diagnostic=‘schizophrenia’ OK SELECT name FROM  Patient WHERE age=42  and sex=‘M’ and diagnostic=‘schizophrenia’ Not OK
Security in Statistical DBs ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[ Adam&Wortmann’89]
Summary on Security in Statistical DB ,[object Object],[object Object]
Outline ,[object Object],[object Object],[object Object],[object Object]
SQL Injection Your health insurance company lets you see the claims online: Now search through the claims : Dr. Lee  First login: SELECT…FROM…WHERE doctor=‘Dr. Lee’ and patientID=‘fred’ [Chris Anley,  Advanced SQL Injection In SQL ] Search claims by:  User: Password:  fred  ********
SQL Injection Now try this: Search claims by:  Dr. Lee’  OR patientID = ‘suciu’;  -- … ..WHERE doctor=‘Dr. Lee’  OR patientID=‘suciu’;  --’ and patientID=‘fred’ Better: Search claims by:  Dr. Lee’  OR  1 = 1;  --
SQL Injection When you’re done, do this: Search claims by:  Dr. Lee’;  DROP TABLE Patients; --
SQL Injection ,[object Object],[object Object],[object Object],[object Object],[object Object]
Latanya Sweeney’s Finding ,[object Object],[object Object],GIC( zip, dob, sex , diagnosis, procedure, ...)
Latanya Sweeney’s Finding ,[object Object],GIC( zip, dob, sex , diagnosis, procedure, ...) VOTER(name, party, ...,  zip, dob, sex )
Latanya Sweeney’s Finding ,[object Object],[object Object],[object Object],[object Object],[object Object],zip, dob, sex
Latanya Sweeney’s Finding ,[object Object],[object Object],Some of today’s research in data security address breaches that happen even if all systems work correctly
Summary on Attacks ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Outline ,[object Object],[object Object],[object Object],[object Object]
Research Topics in Data Security ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Information Leakage: k-Anonymity Definition : each tuple is equal to at least k-1 others Anonymizing: through suppression and generalization Hard:  NP-complete for supression only Approximations exists [Samarati&Sweeney’98, Meyerson&Williams’04] Hisp 22 Ramos John Afr-am 47 Stone Beatrice Cauc 36 Reyser John Afr-Am 34 Stone Harry Race Age Last First * 20-40 R* John Afr-am 30-50 Stone * * 20-40 R* John Afr-Am 30-50 Stone * Race Age Last First
Information Leakage: Query-view Security TABLE Employee(name, dept, phone) Have data: total big tiny none [Miklau&S’04, Miklau&Dalvi&S’05,Yang&Li’04] V(name,phone) S(name) Disclosure ? View(s) Secret Query V1(name,dept) V2(dept,phone) S(name,phone) V(dept) S(name) V(name) where dept=‘RD’ S(name) where dept=‘HR’
Summary on Information Disclosure ,[object Object],[object Object],[object Object],[object Object],[Abadi&Warinschi’05]
Privacy ,[object Object],[object Object],[Agrawal’03]
Privacy ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Example: Alice gives her email   to a web service [email_address] Privacy policy: P3P
Hippocratic Databases ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[Agrawal’03, LeFevrey’04] Hippocratic DB ,[object Object],[object Object],[object Object],[email_address] Privacy policy: P3P
Privacy for Paranoids ,[object Object],[email_address] Agent [email_address] [Aggarwal’04]  ,[object Object],[object Object],[object Object],[email_address] foreign keys ?
Summary on Privacy ,[object Object],[object Object],[object Object],[object Object],[object Object]
Fine-grained Access Control ,[object Object],[object Object],[object Object]
Policy Specification Language CREATE AUTHORIZATION VIEW PatientsForDoctors AS SELECT Patient.* FROM Patient, Doctor   WHERE Patient.doctorID = Doctor.ID  and  Doctor.login =  %currentUser Context parameters No standard, but usually based on parameterized views.
Implementation SELECT Patient.name, Patient.age FROM Patient WHERE Patient.disease = ‘flu’ SELECT Patient.name, Patient.age FROM Patient,  Doctor WHERE Patient.disease = ‘flu’ and Patient.doctorID = Doctor.ID and Patient.login = %currentUser e.g. Oracle
Two Semantics ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[Rizvi’04] SELECT count(*) FROM Patients WHERE disease=‘flu’
Summary of Fine Grained Access Control ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[Rosenthal&Winslett’2004]
Data Encryption for Publishing ,[object Object],[object Object],All authorized users:  K user Patient:  K pat Doctor:  K dr Nurse:  K nu Administrator :  K admin What is the encryption granularity ? Doctor researchers may access trials  Nurses may access diagnostic Etc… Scientist wants to publish  medical research data on the Web
Data Encryption for Publishing ,[object Object],<patient> <privateData> <name> <age> <diagnostic> JoeDoe 28 <address> Seattle <trial> <drug> flu <placebo> Tylenol Candy [Miklau&S.’03] Doctor:  K user,  K dr Nurse:  K user,  K nu Nurse+admin:  K user,  K nu , K adm K user K pat   (K nu  K adm ) K nu    K dr K dr K pat K master K master
Summary on Data Encryption ,[object Object],[object Object],[object Object],[object Object],[object Object],[Abadi&Warinschi’05]
Secure Shared Processing ,[object Object],[object Object],[object Object],[object Object],[object Object]
Secure Shared Processing [Agrawal’03] Alice Bob a  b  c  d c  d  e What’s wrong ? Task: find intersection without revealing the rest h(a) h(b) h(c) h(d) h(c) h(d) h(e) Compute one-way hash Exchange h(c) h(d) h(e) h(a) h(b) h(c) h(d)
Secure Shared Processing Alice Bob a  b  c  d c  d  e commutative encryption: h(x) = E A (E B (x)) = E B (E A (x)) [Agrawal’03] E B (c) E B (d) E B (e) E A (a) E A (b) E A (c) E A (d) E A (a) E A (b) E A (c) E A (d) E B (c) E B (d) E B (e) E A E B h(c)  h(d)  h(e) h(a)  h(b)  h(c)  h(d) E A E B h(a)  h(b)  h(c)  h(d) h(c)  h(d)  h(e)
Summary on Secure Shared Processing ,[object Object],[object Object]
Outline ,[object Object],[object Object],[object Object],[object Object]
Conclusions ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Conclusions ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Questions ?

More Related Content

What's hot

Privacy preserving dm_ppt
Privacy preserving dm_pptPrivacy preserving dm_ppt
Privacy preserving dm_ppt
Sagar Verma
 
Security bigdata
Security bigdataSecurity bigdata
Security bigdata
Jitendra Chauhan
 
Final review m score
Final review m scoreFinal review m score
Final review m scoreazhar4010
 
Data mining and privacy preserving in data mining
Data mining and privacy preserving in data miningData mining and privacy preserving in data mining
Data mining and privacy preserving in data miningNeeda Multani
 
Cryptography for privacy preserving data mining
Cryptography for privacy preserving data miningCryptography for privacy preserving data mining
Cryptography for privacy preserving data mining
Mesbah Uddin Khan
 
Whitepaper- User Behavior-Based Anomaly Detection for Cyber Network Security
Whitepaper- User Behavior-Based Anomaly Detection for Cyber Network SecurityWhitepaper- User Behavior-Based Anomaly Detection for Cyber Network Security
Whitepaper- User Behavior-Based Anomaly Detection for Cyber Network Security
Happiest Minds Technologies
 
Privacy Preserving Data Mining
Privacy Preserving Data MiningPrivacy Preserving Data Mining
Privacy Preserving Data Mining
ROMALEE AMOLIC
 
Big Data Meets Privacy:De-identification Maturity Model for Benchmarking and ...
Big Data Meets Privacy:De-identification Maturity Model for Benchmarking and ...Big Data Meets Privacy:De-identification Maturity Model for Benchmarking and ...
Big Data Meets Privacy:De-identification Maturity Model for Benchmarking and ...
Khaled El Emam
 
Performance Analysis of Hybrid Approach for Privacy Preserving in Data Mining
Performance Analysis of Hybrid Approach for Privacy Preserving in Data MiningPerformance Analysis of Hybrid Approach for Privacy Preserving in Data Mining
Performance Analysis of Hybrid Approach for Privacy Preserving in Data Mining
idescitation
 
CuttingEEG - Open Science, Open Data and BIDS for EEG
CuttingEEG - Open Science, Open Data and BIDS for EEGCuttingEEG - Open Science, Open Data and BIDS for EEG
CuttingEEG - Open Science, Open Data and BIDS for EEG
Robert Oostenveld
 
Achieving Privacy in Publishing Search logs
Achieving Privacy in Publishing Search logsAchieving Privacy in Publishing Search logs
Achieving Privacy in Publishing Search logs
IOSR Journals
 
Optim test data management for IMS 2011
Optim test data management for IMS 2011Optim test data management for IMS 2011
Optim test data management for IMS 2011evgeni77
 
A Review Study on the Privacy Preserving Data Mining Techniques and Approaches
A Review Study on the Privacy Preserving Data Mining Techniques and ApproachesA Review Study on the Privacy Preserving Data Mining Techniques and Approaches
A Review Study on the Privacy Preserving Data Mining Techniques and Approaches
14894
 
Using Randomized Response Techniques for Privacy-Preserving Data Mining
Using Randomized Response Techniques for Privacy-Preserving Data MiningUsing Randomized Response Techniques for Privacy-Preserving Data Mining
Using Randomized Response Techniques for Privacy-Preserving Data Mining
14894
 
Donders Repository - removing barriers for management and sharing of research...
Donders Repository - removing barriers for management and sharing of research...Donders Repository - removing barriers for management and sharing of research...
Donders Repository - removing barriers for management and sharing of research...
Robert Oostenveld
 
Donders neuroimage toolkit - open science and good practices
Donders neuroimage toolkit -  open science and good practicesDonders neuroimage toolkit -  open science and good practices
Donders neuroimage toolkit - open science and good practices
Robert Oostenveld
 
Cluster Based Access Privilege Management Scheme for Databases
Cluster Based Access Privilege Management Scheme for DatabasesCluster Based Access Privilege Management Scheme for Databases
Cluster Based Access Privilege Management Scheme for Databases
Editor IJMTER
 
BIOMAG2018 - Denis Engemann - MNE-HCP
BIOMAG2018 - Denis Engemann - MNE-HCPBIOMAG2018 - Denis Engemann - MNE-HCP
BIOMAG2018 - Denis Engemann - MNE-HCP
Robert Oostenveld
 
Privacy and Auditing in Clouds
Privacy and Auditing in CloudsPrivacy and Auditing in Clouds
Privacy and Auditing in Clouds
Tyrone Grandison
 
Exploring New Methods for Protecting and Distributing Confidential Research ...
Exploring New Methods for Protecting and Distributing Confidential Research ...Exploring New Methods for Protecting and Distributing Confidential Research ...
Exploring New Methods for Protecting and Distributing Confidential Research ...
Bryan Beecher
 

What's hot (20)

Privacy preserving dm_ppt
Privacy preserving dm_pptPrivacy preserving dm_ppt
Privacy preserving dm_ppt
 
Security bigdata
Security bigdataSecurity bigdata
Security bigdata
 
Final review m score
Final review m scoreFinal review m score
Final review m score
 
Data mining and privacy preserving in data mining
Data mining and privacy preserving in data miningData mining and privacy preserving in data mining
Data mining and privacy preserving in data mining
 
Cryptography for privacy preserving data mining
Cryptography for privacy preserving data miningCryptography for privacy preserving data mining
Cryptography for privacy preserving data mining
 
Whitepaper- User Behavior-Based Anomaly Detection for Cyber Network Security
Whitepaper- User Behavior-Based Anomaly Detection for Cyber Network SecurityWhitepaper- User Behavior-Based Anomaly Detection for Cyber Network Security
Whitepaper- User Behavior-Based Anomaly Detection for Cyber Network Security
 
Privacy Preserving Data Mining
Privacy Preserving Data MiningPrivacy Preserving Data Mining
Privacy Preserving Data Mining
 
Big Data Meets Privacy:De-identification Maturity Model for Benchmarking and ...
Big Data Meets Privacy:De-identification Maturity Model for Benchmarking and ...Big Data Meets Privacy:De-identification Maturity Model for Benchmarking and ...
Big Data Meets Privacy:De-identification Maturity Model for Benchmarking and ...
 
Performance Analysis of Hybrid Approach for Privacy Preserving in Data Mining
Performance Analysis of Hybrid Approach for Privacy Preserving in Data MiningPerformance Analysis of Hybrid Approach for Privacy Preserving in Data Mining
Performance Analysis of Hybrid Approach for Privacy Preserving in Data Mining
 
CuttingEEG - Open Science, Open Data and BIDS for EEG
CuttingEEG - Open Science, Open Data and BIDS for EEGCuttingEEG - Open Science, Open Data and BIDS for EEG
CuttingEEG - Open Science, Open Data and BIDS for EEG
 
Achieving Privacy in Publishing Search logs
Achieving Privacy in Publishing Search logsAchieving Privacy in Publishing Search logs
Achieving Privacy in Publishing Search logs
 
Optim test data management for IMS 2011
Optim test data management for IMS 2011Optim test data management for IMS 2011
Optim test data management for IMS 2011
 
A Review Study on the Privacy Preserving Data Mining Techniques and Approaches
A Review Study on the Privacy Preserving Data Mining Techniques and ApproachesA Review Study on the Privacy Preserving Data Mining Techniques and Approaches
A Review Study on the Privacy Preserving Data Mining Techniques and Approaches
 
Using Randomized Response Techniques for Privacy-Preserving Data Mining
Using Randomized Response Techniques for Privacy-Preserving Data MiningUsing Randomized Response Techniques for Privacy-Preserving Data Mining
Using Randomized Response Techniques for Privacy-Preserving Data Mining
 
Donders Repository - removing barriers for management and sharing of research...
Donders Repository - removing barriers for management and sharing of research...Donders Repository - removing barriers for management and sharing of research...
Donders Repository - removing barriers for management and sharing of research...
 
Donders neuroimage toolkit - open science and good practices
Donders neuroimage toolkit -  open science and good practicesDonders neuroimage toolkit -  open science and good practices
Donders neuroimage toolkit - open science and good practices
 
Cluster Based Access Privilege Management Scheme for Databases
Cluster Based Access Privilege Management Scheme for DatabasesCluster Based Access Privilege Management Scheme for Databases
Cluster Based Access Privilege Management Scheme for Databases
 
BIOMAG2018 - Denis Engemann - MNE-HCP
BIOMAG2018 - Denis Engemann - MNE-HCPBIOMAG2018 - Denis Engemann - MNE-HCP
BIOMAG2018 - Denis Engemann - MNE-HCP
 
Privacy and Auditing in Clouds
Privacy and Auditing in CloudsPrivacy and Auditing in Clouds
Privacy and Auditing in Clouds
 
Exploring New Methods for Protecting and Distributing Confidential Research ...
Exploring New Methods for Protecting and Distributing Confidential Research ...Exploring New Methods for Protecting and Distributing Confidential Research ...
Exploring New Methods for Protecting and Distributing Confidential Research ...
 

Viewers also liked

ms_word_2007_winxp
ms_word_2007_winxpms_word_2007_winxp
ms_word_2007_winxp
Quickoffice Test
 
blahblah
blahblahblahblah
ms_pps_2010
ms_pps_2010ms_pps_2010
ms_pps_2010
Quickoffice Test
 
TEST_DOCUMENT2
TEST_DOCUMENT2TEST_DOCUMENT2
TEST_DOCUMENT2
Quickoffice Test
 
여보세요견본원본한국어Korean
여보세요견본원본한국어Korean여보세요견본원본한국어Korean
여보세요견본원본한국어KoreanQuickoffice Test
 
여보세요견본원본한국어Korean
여보세요견본원본한국어Korean여보세요견본원본한국어Korean
여보세요견본원본한국어KoreanQuickoffice Test
 
LavaCon_PPpresentationcurrent1
LavaCon_PPpresentationcurrent1LavaCon_PPpresentationcurrent1
LavaCon_PPpresentationcurrent1Quickoffice Test
 
여보세요견본원본한국어Korean
여보세요견본원본한국어Korean여보세요견본원본한국어Korean
여보세요견본원본한국어KoreanQuickoffice Test
 
sample_doc
sample_docsample_doc
sample_doc
Quickoffice Test
 

Viewers also liked (9)

ms_word_2007_winxp
ms_word_2007_winxpms_word_2007_winxp
ms_word_2007_winxp
 
blahblah
blahblahblahblah
blahblah
 
ms_pps_2010
ms_pps_2010ms_pps_2010
ms_pps_2010
 
TEST_DOCUMENT2
TEST_DOCUMENT2TEST_DOCUMENT2
TEST_DOCUMENT2
 
여보세요견본원본한국어Korean
여보세요견본원본한국어Korean여보세요견본원본한국어Korean
여보세요견본원본한국어Korean
 
여보세요견본원본한국어Korean
여보세요견본원본한국어Korean여보세요견본원본한국어Korean
여보세요견본원본한국어Korean
 
LavaCon_PPpresentationcurrent1
LavaCon_PPpresentationcurrent1LavaCon_PPpresentationcurrent1
LavaCon_PPpresentationcurrent1
 
여보세요견본원본한국어Korean
여보세요견본원본한국어Korean여보세요견본원본한국어Korean
여보세요견본원본한국어Korean
 
sample_doc
sample_docsample_doc
sample_doc
 

Similar to current-trends

Meetup presenation 06192013
Meetup presenation 06192013 Meetup presenation 06192013
Meetup presenation 06192013
Sqrrl
 
Privacy Engineering: Enabling Mobility of Mental Health Services with Data Pr...
Privacy Engineering: Enabling Mobility of Mental Health Services with Data Pr...Privacy Engineering: Enabling Mobility of Mental Health Services with Data Pr...
Privacy Engineering: Enabling Mobility of Mental Health Services with Data Pr...
CREST
 
Data attribute security and privacy in Collaborative distributed database Pub...
Data attribute security and privacy in Collaborative distributed database Pub...Data attribute security and privacy in Collaborative distributed database Pub...
Data attribute security and privacy in Collaborative distributed database Pub...
International Journal of Engineering Inventions www.ijeijournal.com
 
CSE_Instructor_Materials_Chapter2.pptx
CSE_Instructor_Materials_Chapter2.pptxCSE_Instructor_Materials_Chapter2.pptx
CSE_Instructor_Materials_Chapter2.pptx
Mohammad512578
 
Data+security+sp10
Data+security+sp10Data+security+sp10
Data+security+sp10ismaelhaider
 
Lecture 15-16.pdf
Lecture 15-16.pdfLecture 15-16.pdf
Lecture 15-16.pdf
FumikageTokoyami4
 
Database security
Database securityDatabase security
Database security
CAS
 
Keeping Private Data Private
Keeping Private Data PrivateKeeping Private Data Private
Keeping Private Data PrivateDobler Consulting
 
Privacy Preserved Data Augmentation using Enterprise Data Fabric
Privacy Preserved Data Augmentation using Enterprise Data FabricPrivacy Preserved Data Augmentation using Enterprise Data Fabric
Privacy Preserved Data Augmentation using Enterprise Data Fabric
Atif Shaikh
 
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdfCYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
Jenna Murray
 
Network security unit 1,2,3
Network security unit 1,2,3 Network security unit 1,2,3
Network security unit 1,2,3
WE-IT TUTORIALS
 
Privacy-Preserving Data Analysis, Adria Gascon
Privacy-Preserving Data Analysis, Adria GasconPrivacy-Preserving Data Analysis, Adria Gascon
Privacy-Preserving Data Analysis, Adria Gascon
Ulrik Lyngs
 
The Role of Audit Analysis in CyberSecurity
The Role of Audit Analysis in CyberSecurityThe Role of Audit Analysis in CyberSecurity
The Role of Audit Analysis in CyberSecurity
Tyrone Grandison
 
Security Training: #3 Threat Modelling - Practices and Tools
Security Training: #3 Threat Modelling - Practices and ToolsSecurity Training: #3 Threat Modelling - Practices and Tools
Security Training: #3 Threat Modelling - Practices and ToolsYulian Slobodyan
 
Data quality and data profiling
Data quality and data profilingData quality and data profiling
Data quality and data profiling
Shailja Khurana
 
Application Security 101 (OWASP DC)
Application Security 101 (OWASP DC)Application Security 101 (OWASP DC)
Application Security 101 (OWASP DC)
mikemcbryde
 
Meeting 15. network security
Meeting 15. network securityMeeting 15. network security
Meeting 15. network security
Syaiful Ahdan
 
Modern Data Security for the Enterprises – SQL Server & Azure SQL Database
Modern Data Security for the Enterprises – SQL Server & Azure SQL DatabaseModern Data Security for the Enterprises – SQL Server & Azure SQL Database
Modern Data Security for the Enterprises – SQL Server & Azure SQL Database
WinWire Technologies Inc
 
A survey on data security in data warehousing1
A survey on data security in data warehousing1A survey on data security in data warehousing1
A survey on data security in data warehousing1
Rezgar Mohammad
 
A survey on data security in data warehousing
A survey on data security in data warehousing A survey on data security in data warehousing
A survey on data security in data warehousing
Rezgar Mohammad
 

Similar to current-trends (20)

Meetup presenation 06192013
Meetup presenation 06192013 Meetup presenation 06192013
Meetup presenation 06192013
 
Privacy Engineering: Enabling Mobility of Mental Health Services with Data Pr...
Privacy Engineering: Enabling Mobility of Mental Health Services with Data Pr...Privacy Engineering: Enabling Mobility of Mental Health Services with Data Pr...
Privacy Engineering: Enabling Mobility of Mental Health Services with Data Pr...
 
Data attribute security and privacy in Collaborative distributed database Pub...
Data attribute security and privacy in Collaborative distributed database Pub...Data attribute security and privacy in Collaborative distributed database Pub...
Data attribute security and privacy in Collaborative distributed database Pub...
 
CSE_Instructor_Materials_Chapter2.pptx
CSE_Instructor_Materials_Chapter2.pptxCSE_Instructor_Materials_Chapter2.pptx
CSE_Instructor_Materials_Chapter2.pptx
 
Data+security+sp10
Data+security+sp10Data+security+sp10
Data+security+sp10
 
Lecture 15-16.pdf
Lecture 15-16.pdfLecture 15-16.pdf
Lecture 15-16.pdf
 
Database security
Database securityDatabase security
Database security
 
Keeping Private Data Private
Keeping Private Data PrivateKeeping Private Data Private
Keeping Private Data Private
 
Privacy Preserved Data Augmentation using Enterprise Data Fabric
Privacy Preserved Data Augmentation using Enterprise Data FabricPrivacy Preserved Data Augmentation using Enterprise Data Fabric
Privacy Preserved Data Augmentation using Enterprise Data Fabric
 
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdfCYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
 
Network security unit 1,2,3
Network security unit 1,2,3 Network security unit 1,2,3
Network security unit 1,2,3
 
Privacy-Preserving Data Analysis, Adria Gascon
Privacy-Preserving Data Analysis, Adria GasconPrivacy-Preserving Data Analysis, Adria Gascon
Privacy-Preserving Data Analysis, Adria Gascon
 
The Role of Audit Analysis in CyberSecurity
The Role of Audit Analysis in CyberSecurityThe Role of Audit Analysis in CyberSecurity
The Role of Audit Analysis in CyberSecurity
 
Security Training: #3 Threat Modelling - Practices and Tools
Security Training: #3 Threat Modelling - Practices and ToolsSecurity Training: #3 Threat Modelling - Practices and Tools
Security Training: #3 Threat Modelling - Practices and Tools
 
Data quality and data profiling
Data quality and data profilingData quality and data profiling
Data quality and data profiling
 
Application Security 101 (OWASP DC)
Application Security 101 (OWASP DC)Application Security 101 (OWASP DC)
Application Security 101 (OWASP DC)
 
Meeting 15. network security
Meeting 15. network securityMeeting 15. network security
Meeting 15. network security
 
Modern Data Security for the Enterprises – SQL Server & Azure SQL Database
Modern Data Security for the Enterprises – SQL Server & Azure SQL DatabaseModern Data Security for the Enterprises – SQL Server & Azure SQL Database
Modern Data Security for the Enterprises – SQL Server & Azure SQL Database
 
A survey on data security in data warehousing1
A survey on data security in data warehousing1A survey on data security in data warehousing1
A survey on data security in data warehousing1
 
A survey on data security in data warehousing
A survey on data security in data warehousing A survey on data security in data warehousing
A survey on data security in data warehousing
 

More from Quickoffice Test

egnyte rename
egnyte renameegnyte rename
egnyte rename
Quickoffice Test
 
Quickword How To
Quickword How ToQuickword How To
Quickword How To
Quickoffice Test
 
evi
evievi
Docx test
Docx testDocx test
Docx test
Quickoffice Test
 
Presentation
PresentationPresentation
Presentation
Quickoffice Test
 
!!!zzz To
!!!zzz To!!!zzz To
!!!zzz To
Quickoffice Test
 
!!!zzz itttest1
!!!zzz itttest1!!!zzz itttest1
!!!zzz itttest1
Quickoffice Test
 
mac_pp_2011
mac_pp_2011mac_pp_2011
mac_pp_2011
Quickoffice Test
 

More from Quickoffice Test (20)

call02
call02call02
call02
 
call03
call03call03
call03
 
call06
call06call06
call06
 
call07
call07call07
call07
 
test
testtest
test
 
EGNYTE
EGNYTEEGNYTE
EGNYTE
 
egnyte rename
egnyte renameegnyte rename
egnyte rename
 
A
AA
A
 
Quickword How To
Quickword How ToQuickword How To
Quickword How To
 
evi
evievi
evi
 
Docx test
Docx testDocx test
Docx test
 
Presentation
PresentationPresentation
Presentation
 
april
aprilapril
april
 
April
AprilApril
April
 
April
AprilApril
April
 
April
AprilApril
April
 
test
testtest
test
 
!!!zzz To
!!!zzz To!!!zzz To
!!!zzz To
 
!!!zzz itttest1
!!!zzz itttest1!!!zzz itttest1
!!!zzz itttest1
 
mac_pp_2011
mac_pp_2011mac_pp_2011
mac_pp_2011
 

Recently uploaded

Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
ViralQR
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 

Recently uploaded (20)

Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 

current-trends

  • 1. Current Trends in Data Security Dan Suciu Joint work with Gerome Miklau
  • 2.
  • 3.
  • 4.
  • 5.
  • 6. Access Control in SQL GRANT privileges ON object TO users [WITH GRANT OPTIONS] privileges = SELECT | INSERT | DELETE | . . . object = table | attribute REVOKE privileges ON object FROM users [CASCADE ] [Griffith&Wade'76, Fagin'78]
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14. SQL Injection Your health insurance company lets you see the claims online: Now search through the claims : Dr. Lee First login: SELECT…FROM…WHERE doctor=‘Dr. Lee’ and patientID=‘fred’ [Chris Anley, Advanced SQL Injection In SQL ] Search claims by: User: Password: fred ********
  • 15. SQL Injection Now try this: Search claims by: Dr. Lee’ OR patientID = ‘suciu’; -- … ..WHERE doctor=‘Dr. Lee’ OR patientID=‘suciu’; --’ and patientID=‘fred’ Better: Search claims by: Dr. Lee’ OR 1 = 1; --
  • 16. SQL Injection When you’re done, do this: Search claims by: Dr. Lee’; DROP TABLE Patients; --
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25. Information Leakage: k-Anonymity Definition : each tuple is equal to at least k-1 others Anonymizing: through suppression and generalization Hard: NP-complete for supression only Approximations exists [Samarati&Sweeney’98, Meyerson&Williams’04] Hisp 22 Ramos John Afr-am 47 Stone Beatrice Cauc 36 Reyser John Afr-Am 34 Stone Harry Race Age Last First * 20-40 R* John Afr-am 30-50 Stone * * 20-40 R* John Afr-Am 30-50 Stone * Race Age Last First
  • 26. Information Leakage: Query-view Security TABLE Employee(name, dept, phone) Have data: total big tiny none [Miklau&S’04, Miklau&Dalvi&S’05,Yang&Li’04] V(name,phone) S(name) Disclosure ? View(s) Secret Query V1(name,dept) V2(dept,phone) S(name,phone) V(dept) S(name) V(name) where dept=‘RD’ S(name) where dept=‘HR’
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34. Policy Specification Language CREATE AUTHORIZATION VIEW PatientsForDoctors AS SELECT Patient.* FROM Patient, Doctor WHERE Patient.doctorID = Doctor.ID and Doctor.login = %currentUser Context parameters No standard, but usually based on parameterized views.
  • 35. Implementation SELECT Patient.name, Patient.age FROM Patient WHERE Patient.disease = ‘flu’ SELECT Patient.name, Patient.age FROM Patient, Doctor WHERE Patient.disease = ‘flu’ and Patient.doctorID = Doctor.ID and Patient.login = %currentUser e.g. Oracle
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42. Secure Shared Processing [Agrawal’03] Alice Bob a b c d c d e What’s wrong ? Task: find intersection without revealing the rest h(a) h(b) h(c) h(d) h(c) h(d) h(e) Compute one-way hash Exchange h(c) h(d) h(e) h(a) h(b) h(c) h(d)
  • 43. Secure Shared Processing Alice Bob a b c d c d e commutative encryption: h(x) = E A (E B (x)) = E B (E A (x)) [Agrawal’03] E B (c) E B (d) E B (e) E A (a) E A (b) E A (c) E A (d) E A (a) E A (b) E A (c) E A (d) E B (c) E B (d) E B (e) E A E B h(c) h(d) h(e) h(a) h(b) h(c) h(d) E A E B h(a) h(b) h(c) h(d) h(c) h(d) h(e)
  • 44.
  • 45.
  • 46.
  • 47.

Editor's Notes

  1. Views hide sensitive data by omitting rows, columns, braking associations, or computing aggregates
  2. Example: [LeFevrey et al. Limiting Disclosure in Hippocratic Databases, VLDB’04] adds the following Policy definitions Much like in fine-grained access control Privacy metadata What data owners opt Purpose From P3P and EPAL Summary: a refinement and extension of fine-grained access control
  3. Suppose we allow SELECT count(*) FROM Patients WHERE Patient.disease = %d, but only when the count is &gt; 10. Suppose that there are &gt; 10 patients with flue, and the user knows that. Adopting an instance-independent definition, this query is invalid; but with an instance-dependent definition the query is valid.