SlideShare a Scribd company logo
1 of 39
Privacy Preserved
Data Augmentation
using
Enterprise Data Fabric
Final blow before Tea!
I was like her according to her;
We were both outliers
Twitter: @mantaq10
Atif Rahman
Zetaris
www.zetaris.com
Data Exchanged (without
consent)
• GPS
• HIV Status
• Email addresses
• Weapon: Contract
• Response: Excuse
• Exposure: (Potential) exposure
of marginalized people.
Data Breach:
• Email Addresses
• Username & Passwords
Exposure:
• 150 million customers
Response:
• No clear Apologies
• (Delayed) Corrective Actions
Weapon: Contract
Data Breach:
• Names
• Loyalty data
• Email addresses
• Physical addresses
• DOB
• Credit Card last 4 digits
Exposure:
• Millions of Customers
Response:
• Denial
• Fake Solutions
• 8 months before first action
Paper contracts are still the most common
weapon organizations use to get away with.
As regulations get more mature, the impetus
to be more effective in privacy preservation
will be on service providers.
From the exhibition: "M. Hulot, the protagonist in Jacques Tati's 1967 film Playtime, is
Enterprises have different data landscape than
consumer facing (typically tech) organisations.
Enterprises have silos, legacy systems, have to learn
to be data driven the hard way and have divergent
forces giving a unique focus on
Agenda
• Data Augmentation
• First Principles
• Enterprise Data Fabric
Data Augmentation
ORG A
Class 1
Class 2
Class 3
Data Augmentation
ORG A
Class 1
Class 2
Class 3
ORG A
Class 1
Class 2
Class 3
ORG B
ORG C
Potentially Better
Typical Modeling Exercise
Modeling after data augmentation
ORG A
Class 1
Class 2
Class 3
ORG B
ORG C
Content Shared
• Aggregated Data / Insights
• Open Data
• Stratified Sampling
• Synthetic Data
• De-identified / Anonymized
Channels:
• Public Portals
• Private Marketplaces
• In Person Walk
throughs/handovers
• Gossiping
• Pigeons
Data Augmentation
Data as an asset
• Easy to copy and spawn
• Does not depreciate or depletes
• Really hard to valuate
• Process to yield value
• Various forms and derivatives
Resolve to First Principles
Data has properties that make it
intrinsically hard to ensure privacy
preservation. Therefore, we must
adhere to first principles to better
understand the problem
statement first.
The Five Safes
Safe Data
Safe People
Safe Setting
Safe Project
Safe Output
Great Resources
ACS Data Sharing Frameworks The De-Identification Decision Making Framework
First Principles
Safe Data
Safe People
Safe Setting
Safe Project
Safe Output
Encryption
Authentication & Authorisation
Environment for Data Controllers & Processors
Audit Trail, Lineage and Access & Query Logs
Linkage Problem
First Principles
Safe Data
Safe People
Safe Setting
Safe Project
Safe Output
Encryption
Authentication & Authorisation
Environment for Data Controllers & Processors
Audit Trail, Lineage and Access & Query Logs
Linkage Problem
Safe Data – (Encryption)
Data at Rest Standard Encryption
Data in Transit Secure the Pipe
Data for Compute Homomorphic Encryption
Homomorphic Encryption
Partial Homomorphic Encryption (PHE)
Somewhat Homomorphic Encryption (SWHE)
Full Homomorphic Encryption (FHE)
Addition/Multiplication
Low Order Polynomials
Eval of Arbitrary Functions
More
General
Less
Costly
Data Analytics without seeing the data
Max Ott, YOW Data 2016
First Principles
Safe Data
Safe People
Safe Setting
Safe Project
Safe Output
Encryption
Authentication & Authorisation
Environment for Data Controllers & Processors
Audit Trail, Lineage and Access & Query Logs
Linkage Problem
Safe Setting - Confidential Computing
Trusted Execution Environments (Safe Data in Safe Setting)
Microsoft Azure Confidential Computing
Google Cloud Platform: Asylo Open Source Framework
Confidential Computing at the Software layer?
First Principles
Safe Data
Safe People
Safe Setting
Safe Project
Safe Output
Encryption
Authentication & Authorisation
Environment for Data Controllers & Processors
Audit Trail, Lineage and Access & Query Logs
Linkage Problem
Alice Bob
Safe People – (System Span)
Safe People – (System Span)
First Principles
Safe Data
Safe People
Safe Setting
Safe Project
Safe Output
Encryption
Authentication & Authorisation
Environment for Data Controllers & Processors
Audit Trail, Lineage and Access & Query Logs
Linkage Problem
Safe People – (System Span)
Safe People – (System Span)
Expanding the Span of control
First Principles
Safe Data
Safe People
Safe Setting
Safe Project
Safe Output
Encryption
Authentication & Authorisation
Environment for Data Controllers & Processors
Audit Trail, Lineage and Access & Query Logs
Linkage Problem
Safe Project – Audit Trails & Lineage
Safe Project – Audit Trails & Lineage
?
Data
in the
wild
Its still very hard within enterprises
to have a point to point track of data
lineage and processing.
The problem is expounded when
data leaves the span of vision.
One Ring to Rule them All?
Encryption
Authentication & Authorisation
Environment for Data Controllers & Processors
Audit Trail, Lineage and Access & Query Logs
Linkage Problem
A data landscape must cover all
principles of data privacy.
Monoliths in the era of Microservices
DB Server App
App
DB
Server
DB
Server
DB
Server
AppDB
Server
DB
Server
DB
Server
DB
Caching
DB
In-Memory
DB
Streams
DB
Messaging
App
App
DBServer App
Server
Server
DB
DB
DB
App
App
The Enterprise Data Fabric
A unified data layer that is used by both user facing applications and downstream analytics, a potential holistic five
safes environment
The Zetaris Enterprise Data Fabric – Location Aware, Usage Aware, People Aware, Privacy Preserved data in a secure
environment.
Also check out Apache Ignite, Redhat OpenShift + JBoss Virtualization,.
GDPR Highlights
Data
Portability
Erasure
Access
Consent
Right to transfer personal data from one electronic
processing system to and into another.
Right to withdraw consent and ask for personal
data to be deleted
Right to know what’s been collected and how its
being processed
Consumer is informed in ’clear’ and plain language.
Consent to collect can be withdrawn at any time
By Design
By Design
By Design
By Design
Only through
Serialization
Random writes
are not typical
Limited Purview
Hard
Monoliths e.g. Lakes Data Fabric
As data scientists, we are at
the forefront of disruption
and hold the potential to
change things. We are
automating decisions in all
aspects of society.
Yet, our work has serious
negative implications, we
need to educate ourselves
on the broader societal
questions around
regulations, ethics and
impact
Enjoy the Tribe!

More Related Content

What's hot

Data Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective StrategiesData Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective StrategiesSeccuris Inc.
 
Information Security in Big Data : Privacy and Data Mining
Information Security in Big Data : Privacy and Data MiningInformation Security in Big Data : Privacy and Data Mining
Information Security in Big Data : Privacy and Data Miningwanani181
 
Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss PreventionReza Kopaee
 
Efficiently Handling Subject Access Requests
Efficiently Handling Subject Access RequestsEfficiently Handling Subject Access Requests
Efficiently Handling Subject Access Requestsjcscholtes
 
Data Leakage Presentation
Data Leakage PresentationData Leakage Presentation
Data Leakage PresentationMike Spaulding
 
Are you prepared for eu gdpr indirect identifiers? what are indirect identifi...
Are you prepared for eu gdpr indirect identifiers? what are indirect identifi...Are you prepared for eu gdpr indirect identifiers? what are indirect identifi...
Are you prepared for eu gdpr indirect identifiers? what are indirect identifi...Steven Meister
 
WWW.DSS.LV - Data Protection Basics 2015 - DeviceLock
WWW.DSS.LV - Data Protection Basics 2015 - DeviceLock WWW.DSS.LV - Data Protection Basics 2015 - DeviceLock
WWW.DSS.LV - Data Protection Basics 2015 - DeviceLock Andris Soroka
 
Data Loss Prevention from Symantec
Data Loss Prevention from SymantecData Loss Prevention from Symantec
Data Loss Prevention from SymantecArrow ECS UK
 
GDPR READY SOLUTION FOR UNSTRUCTURED DATA
GDPR READY SOLUTION FOR UNSTRUCTURED DATAGDPR READY SOLUTION FOR UNSTRUCTURED DATA
GDPR READY SOLUTION FOR UNSTRUCTURED DATAXeniT Solutions nv
 
DSS.LV - Principles Of Data Protection - March2015 By Arturs Filatovs
DSS.LV - Principles Of Data Protection - March2015 By Arturs FilatovsDSS.LV - Principles Of Data Protection - March2015 By Arturs Filatovs
DSS.LV - Principles Of Data Protection - March2015 By Arturs FilatovsAndris Soroka
 
DLP 101: Help identify and plug information leaks
 DLP 101: Help identify and plug information leaks DLP 101: Help identify and plug information leaks
DLP 101: Help identify and plug information leaksAbhishek Sood
 
DLP Executive Overview
DLP Executive OverviewDLP Executive Overview
DLP Executive OverviewKim Jensen
 
The Definitive Guide to Data Loss Prevention
The Definitive Guide to Data Loss PreventionThe Definitive Guide to Data Loss Prevention
The Definitive Guide to Data Loss PreventionDigital Guardian
 
New technologies for data protection
New technologies for data protectionNew technologies for data protection
New technologies for data protectionUlf Mattsson
 
The REAL Impact of Big Data on Privacy
The REAL Impact of Big Data on PrivacyThe REAL Impact of Big Data on Privacy
The REAL Impact of Big Data on PrivacyClaudiu Popa
 
data mining privacy concerns ppt presentation
data mining privacy concerns ppt presentationdata mining privacy concerns ppt presentation
data mining privacy concerns ppt presentationiWriteEssays
 

What's hot (20)

Data Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective StrategiesData Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective Strategies
 
Information Security in Big Data : Privacy and Data Mining
Information Security in Big Data : Privacy and Data MiningInformation Security in Big Data : Privacy and Data Mining
Information Security in Big Data : Privacy and Data Mining
 
Data Leakage Prevention - K. K. Mookhey
Data Leakage Prevention - K. K. MookheyData Leakage Prevention - K. K. Mookhey
Data Leakage Prevention - K. K. Mookhey
 
Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss Prevention
 
Efficiently Handling Subject Access Requests
Efficiently Handling Subject Access RequestsEfficiently Handling Subject Access Requests
Efficiently Handling Subject Access Requests
 
Data Leakage Presentation
Data Leakage PresentationData Leakage Presentation
Data Leakage Presentation
 
Information Leakage - A knowledge Based Approach
Information Leakage - A knowledge Based ApproachInformation Leakage - A knowledge Based Approach
Information Leakage - A knowledge Based Approach
 
Are you prepared for eu gdpr indirect identifiers? what are indirect identifi...
Are you prepared for eu gdpr indirect identifiers? what are indirect identifi...Are you prepared for eu gdpr indirect identifiers? what are indirect identifi...
Are you prepared for eu gdpr indirect identifiers? what are indirect identifi...
 
WWW.DSS.LV - Data Protection Basics 2015 - DeviceLock
WWW.DSS.LV - Data Protection Basics 2015 - DeviceLock WWW.DSS.LV - Data Protection Basics 2015 - DeviceLock
WWW.DSS.LV - Data Protection Basics 2015 - DeviceLock
 
Data Sovereignty and the Cloud
Data Sovereignty and the CloudData Sovereignty and the Cloud
Data Sovereignty and the Cloud
 
Data Loss Prevention from Symantec
Data Loss Prevention from SymantecData Loss Prevention from Symantec
Data Loss Prevention from Symantec
 
GDPR READY SOLUTION FOR UNSTRUCTURED DATA
GDPR READY SOLUTION FOR UNSTRUCTURED DATAGDPR READY SOLUTION FOR UNSTRUCTURED DATA
GDPR READY SOLUTION FOR UNSTRUCTURED DATA
 
ZyLAB ACEDS Webinar- GDPR
ZyLAB ACEDS Webinar- GDPR ZyLAB ACEDS Webinar- GDPR
ZyLAB ACEDS Webinar- GDPR
 
DSS.LV - Principles Of Data Protection - March2015 By Arturs Filatovs
DSS.LV - Principles Of Data Protection - March2015 By Arturs FilatovsDSS.LV - Principles Of Data Protection - March2015 By Arturs Filatovs
DSS.LV - Principles Of Data Protection - March2015 By Arturs Filatovs
 
DLP 101: Help identify and plug information leaks
 DLP 101: Help identify and plug information leaks DLP 101: Help identify and plug information leaks
DLP 101: Help identify and plug information leaks
 
DLP Executive Overview
DLP Executive OverviewDLP Executive Overview
DLP Executive Overview
 
The Definitive Guide to Data Loss Prevention
The Definitive Guide to Data Loss PreventionThe Definitive Guide to Data Loss Prevention
The Definitive Guide to Data Loss Prevention
 
New technologies for data protection
New technologies for data protectionNew technologies for data protection
New technologies for data protection
 
The REAL Impact of Big Data on Privacy
The REAL Impact of Big Data on PrivacyThe REAL Impact of Big Data on Privacy
The REAL Impact of Big Data on Privacy
 
data mining privacy concerns ppt presentation
data mining privacy concerns ppt presentationdata mining privacy concerns ppt presentation
data mining privacy concerns ppt presentation
 

Similar to Privacy Preserved Data Augmentation using Enterprise Data Fabric

CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdfCYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdfJenna Murray
 
Solving the Really Big Tech Problems with IoT
 Solving the Really Big Tech Problems with IoT Solving the Really Big Tech Problems with IoT
Solving the Really Big Tech Problems with IoTEric Kavanagh
 
GTB - Protecting PII in the EU
GTB - Protecting PII in the EUGTB - Protecting PII in the EU
GTB - Protecting PII in the EUVCW Security Ltd
 
Understanding Database Encryption & Protecting Against the Insider Threat wit...
Understanding Database Encryption & Protecting Against the Insider Threat wit...Understanding Database Encryption & Protecting Against the Insider Threat wit...
Understanding Database Encryption & Protecting Against the Insider Threat wit...MongoDB
 
Better to Ask Permission? Best Practices for Privacy and Security
Better to Ask Permission? Best Practices for Privacy and SecurityBetter to Ask Permission? Best Practices for Privacy and Security
Better to Ask Permission? Best Practices for Privacy and SecurityEric Kavanagh
 
5 Security Questions To Ask A Cloud Service Provider
5 Security Questions To Ask A Cloud Service Provider5 Security Questions To Ask A Cloud Service Provider
5 Security Questions To Ask A Cloud Service ProviderTyrone Systems
 
dlp-sales-play-sales-customer-deck-2022.pptx
dlp-sales-play-sales-customer-deck-2022.pptxdlp-sales-play-sales-customer-deck-2022.pptx
dlp-sales-play-sales-customer-deck-2022.pptxalex hincapie
 
David valovcin big data - big risk
David valovcin big data - big riskDavid valovcin big data - big risk
David valovcin big data - big riskIBM Sverige
 
IT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 ConferenceIT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 ConferenceJeff Lemmermann
 
Big Data Everywhere Chicago: The Big Data Imperative -- Discovering & Protect...
Big Data Everywhere Chicago: The Big Data Imperative -- Discovering & Protect...Big Data Everywhere Chicago: The Big Data Imperative -- Discovering & Protect...
Big Data Everywhere Chicago: The Big Data Imperative -- Discovering & Protect...BigDataEverywhere
 
The Need for DLP now - A Clearswift White Paper
The Need for DLP now - A Clearswift White PaperThe Need for DLP now - A Clearswift White Paper
The Need for DLP now - A Clearswift White PaperBen Rothke
 
Protect your Database with Data Masking & Enforced Version Control
Protect your Database with Data Masking & Enforced Version Control	Protect your Database with Data Masking & Enforced Version Control
Protect your Database with Data Masking & Enforced Version Control DBmaestro - Database DevOps
 
Cybersecurity…real world solutions
Cybersecurity…real world solutions Cybersecurity…real world solutions
Cybersecurity…real world solutions ErnestStaats
 
Anzo Smart Data Lake 4.0 - a Data Lake Platform for the Enterprise Informatio...
Anzo Smart Data Lake 4.0 - a Data Lake Platform for the Enterprise Informatio...Anzo Smart Data Lake 4.0 - a Data Lake Platform for the Enterprise Informatio...
Anzo Smart Data Lake 4.0 - a Data Lake Platform for the Enterprise Informatio...Cambridge Semantics
 

Similar to Privacy Preserved Data Augmentation using Enterprise Data Fabric (20)

CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdfCYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
 
Solving the Really Big Tech Problems with IoT
 Solving the Really Big Tech Problems with IoT Solving the Really Big Tech Problems with IoT
Solving the Really Big Tech Problems with IoT
 
GTB - Protecting PII in the EU
GTB - Protecting PII in the EUGTB - Protecting PII in the EU
GTB - Protecting PII in the EU
 
The Born Identity
The Born IdentityThe Born Identity
The Born Identity
 
Understanding Database Encryption & Protecting Against the Insider Threat wit...
Understanding Database Encryption & Protecting Against the Insider Threat wit...Understanding Database Encryption & Protecting Against the Insider Threat wit...
Understanding Database Encryption & Protecting Against the Insider Threat wit...
 
Better to Ask Permission? Best Practices for Privacy and Security
Better to Ask Permission? Best Practices for Privacy and SecurityBetter to Ask Permission? Best Practices for Privacy and Security
Better to Ask Permission? Best Practices for Privacy and Security
 
5 Security Questions To Ask A Cloud Service Provider
5 Security Questions To Ask A Cloud Service Provider5 Security Questions To Ask A Cloud Service Provider
5 Security Questions To Ask A Cloud Service Provider
 
dlp-sales-play-sales-customer-deck-2022.pptx
dlp-sales-play-sales-customer-deck-2022.pptxdlp-sales-play-sales-customer-deck-2022.pptx
dlp-sales-play-sales-customer-deck-2022.pptx
 
David valovcin big data - big risk
David valovcin big data - big riskDavid valovcin big data - big risk
David valovcin big data - big risk
 
IT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 ConferenceIT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 Conference
 
Big Data Everywhere Chicago: The Big Data Imperative -- Discovering & Protect...
Big Data Everywhere Chicago: The Big Data Imperative -- Discovering & Protect...Big Data Everywhere Chicago: The Big Data Imperative -- Discovering & Protect...
Big Data Everywhere Chicago: The Big Data Imperative -- Discovering & Protect...
 
The Need for DLP now - A Clearswift White Paper
The Need for DLP now - A Clearswift White PaperThe Need for DLP now - A Clearswift White Paper
The Need for DLP now - A Clearswift White Paper
 
Hadoop and Big Data Security
Hadoop and Big Data SecurityHadoop and Big Data Security
Hadoop and Big Data Security
 
Protect your Database with Data Masking & Enforced Version Control
Protect your Database with Data Masking & Enforced Version Control	Protect your Database with Data Masking & Enforced Version Control
Protect your Database with Data Masking & Enforced Version Control
 
BREACHED: Data Centric Security for SAP
BREACHED: Data Centric Security for SAPBREACHED: Data Centric Security for SAP
BREACHED: Data Centric Security for SAP
 
Gde privacy tf_summit
Gde privacy tf_summitGde privacy tf_summit
Gde privacy tf_summit
 
Cybersecurity…real world solutions
Cybersecurity…real world solutions Cybersecurity…real world solutions
Cybersecurity…real world solutions
 
Data security and compliancy in Office 365
Data security and compliancy in Office 365Data security and compliancy in Office 365
Data security and compliancy in Office 365
 
information security and backup system
information security and backup systeminformation security and backup system
information security and backup system
 
Anzo Smart Data Lake 4.0 - a Data Lake Platform for the Enterprise Informatio...
Anzo Smart Data Lake 4.0 - a Data Lake Platform for the Enterprise Informatio...Anzo Smart Data Lake 4.0 - a Data Lake Platform for the Enterprise Informatio...
Anzo Smart Data Lake 4.0 - a Data Lake Platform for the Enterprise Informatio...
 

More from Atif Shaikh

Patterns and Packages in PostgreSQL for Privacy Preservation
Patterns and Packages in PostgreSQL for Privacy PreservationPatterns and Packages in PostgreSQL for Privacy Preservation
Patterns and Packages in PostgreSQL for Privacy PreservationAtif Shaikh
 
Data Infrastructure for Your Retail Digital Strategy
Data Infrastructure for Your Retail Digital StrategyData Infrastructure for Your Retail Digital Strategy
Data Infrastructure for Your Retail Digital StrategyAtif Shaikh
 
Agile Analytics: Discovering Expectations
Agile Analytics: Discovering ExpectationsAgile Analytics: Discovering Expectations
Agile Analytics: Discovering ExpectationsAtif Shaikh
 
Agile Big Data Practices
Agile Big Data PracticesAgile Big Data Practices
Agile Big Data PracticesAtif Shaikh
 
Transforming Organizations to Better Leverage Analytics
Transforming Organizations to Better Leverage Analytics Transforming Organizations to Better Leverage Analytics
Transforming Organizations to Better Leverage Analytics Atif Shaikh
 
Introduction to Knowledge Management
Introduction to Knowledge ManagementIntroduction to Knowledge Management
Introduction to Knowledge ManagementAtif Shaikh
 
Strategy by Measurement
Strategy by MeasurementStrategy by Measurement
Strategy by MeasurementAtif Shaikh
 

More from Atif Shaikh (10)

Patterns and Packages in PostgreSQL for Privacy Preservation
Patterns and Packages in PostgreSQL for Privacy PreservationPatterns and Packages in PostgreSQL for Privacy Preservation
Patterns and Packages in PostgreSQL for Privacy Preservation
 
HTAP Queries
HTAP QueriesHTAP Queries
HTAP Queries
 
Data Infrastructure for Your Retail Digital Strategy
Data Infrastructure for Your Retail Digital StrategyData Infrastructure for Your Retail Digital Strategy
Data Infrastructure for Your Retail Digital Strategy
 
Agile Analytics: Discovering Expectations
Agile Analytics: Discovering ExpectationsAgile Analytics: Discovering Expectations
Agile Analytics: Discovering Expectations
 
Agile Big Data Practices
Agile Big Data PracticesAgile Big Data Practices
Agile Big Data Practices
 
Agile Analytics
Agile AnalyticsAgile Analytics
Agile Analytics
 
Transforming Organizations to Better Leverage Analytics
Transforming Organizations to Better Leverage Analytics Transforming Organizations to Better Leverage Analytics
Transforming Organizations to Better Leverage Analytics
 
Introduction to Knowledge Management
Introduction to Knowledge ManagementIntroduction to Knowledge Management
Introduction to Knowledge Management
 
Hr Analytics
Hr AnalyticsHr Analytics
Hr Analytics
 
Strategy by Measurement
Strategy by MeasurementStrategy by Measurement
Strategy by Measurement
 

Recently uploaded

ASML's Taxonomy Adventure by Daniel Canter
ASML's Taxonomy Adventure by Daniel CanterASML's Taxonomy Adventure by Daniel Canter
ASML's Taxonomy Adventure by Daniel Cantervoginip
 
PKS-TGC-1084-630 - Stage 1 Proposal.pptx
PKS-TGC-1084-630 - Stage 1 Proposal.pptxPKS-TGC-1084-630 - Stage 1 Proposal.pptx
PKS-TGC-1084-630 - Stage 1 Proposal.pptxPramod Kumar Srivastava
 
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Callshivangimorya083
 
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...soniya singh
 
办理学位证纽约大学毕业证(NYU毕业证书)原版一比一
办理学位证纽约大学毕业证(NYU毕业证书)原版一比一办理学位证纽约大学毕业证(NYU毕业证书)原版一比一
办理学位证纽约大学毕业证(NYU毕业证书)原版一比一fhwihughh
 
Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024
Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024
Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024thyngster
 
专业一比一美国俄亥俄大学毕业证成绩单pdf电子版制作修改
专业一比一美国俄亥俄大学毕业证成绩单pdf电子版制作修改专业一比一美国俄亥俄大学毕业证成绩单pdf电子版制作修改
专业一比一美国俄亥俄大学毕业证成绩单pdf电子版制作修改yuu sss
 
Amazon TQM (2) Amazon TQM (2)Amazon TQM (2).pptx
Amazon TQM (2) Amazon TQM (2)Amazon TQM (2).pptxAmazon TQM (2) Amazon TQM (2)Amazon TQM (2).pptx
Amazon TQM (2) Amazon TQM (2)Amazon TQM (2).pptxAbdelrhman abooda
 
Call Girls In Dwarka 9654467111 Escorts Service
Call Girls In Dwarka 9654467111 Escorts ServiceCall Girls In Dwarka 9654467111 Escorts Service
Call Girls In Dwarka 9654467111 Escorts ServiceSapana Sha
 
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998YohFuh
 
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdfKantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdfSocial Samosa
 
9654467111 Call Girls In Munirka Hotel And Home Service
9654467111 Call Girls In Munirka Hotel And Home Service9654467111 Call Girls In Munirka Hotel And Home Service
9654467111 Call Girls In Munirka Hotel And Home ServiceSapana Sha
 
Industrialised data - the key to AI success.pdf
Industrialised data - the key to AI success.pdfIndustrialised data - the key to AI success.pdf
Industrialised data - the key to AI success.pdfLars Albertsson
 
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...Jack DiGiovanna
 
RadioAdProWritingCinderellabyButleri.pdf
RadioAdProWritingCinderellabyButleri.pdfRadioAdProWritingCinderellabyButleri.pdf
RadioAdProWritingCinderellabyButleri.pdfgstagge
 
GA4 Without Cookies [Measure Camp AMS]
GA4 Without Cookies [Measure Camp AMS]GA4 Without Cookies [Measure Camp AMS]
GA4 Without Cookies [Measure Camp AMS]📊 Markus Baersch
 
DBA Basics: Getting Started with Performance Tuning.pdf
DBA Basics: Getting Started with Performance Tuning.pdfDBA Basics: Getting Started with Performance Tuning.pdf
DBA Basics: Getting Started with Performance Tuning.pdfJohn Sterrett
 
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...dajasot375
 

Recently uploaded (20)

ASML's Taxonomy Adventure by Daniel Canter
ASML's Taxonomy Adventure by Daniel CanterASML's Taxonomy Adventure by Daniel Canter
ASML's Taxonomy Adventure by Daniel Canter
 
PKS-TGC-1084-630 - Stage 1 Proposal.pptx
PKS-TGC-1084-630 - Stage 1 Proposal.pptxPKS-TGC-1084-630 - Stage 1 Proposal.pptx
PKS-TGC-1084-630 - Stage 1 Proposal.pptx
 
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
 
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
 
办理学位证纽约大学毕业证(NYU毕业证书)原版一比一
办理学位证纽约大学毕业证(NYU毕业证书)原版一比一办理学位证纽约大学毕业证(NYU毕业证书)原版一比一
办理学位证纽约大学毕业证(NYU毕业证书)原版一比一
 
Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024
Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024
Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024
 
专业一比一美国俄亥俄大学毕业证成绩单pdf电子版制作修改
专业一比一美国俄亥俄大学毕业证成绩单pdf电子版制作修改专业一比一美国俄亥俄大学毕业证成绩单pdf电子版制作修改
专业一比一美国俄亥俄大学毕业证成绩单pdf电子版制作修改
 
Amazon TQM (2) Amazon TQM (2)Amazon TQM (2).pptx
Amazon TQM (2) Amazon TQM (2)Amazon TQM (2).pptxAmazon TQM (2) Amazon TQM (2)Amazon TQM (2).pptx
Amazon TQM (2) Amazon TQM (2)Amazon TQM (2).pptx
 
Call Girls In Dwarka 9654467111 Escorts Service
Call Girls In Dwarka 9654467111 Escorts ServiceCall Girls In Dwarka 9654467111 Escorts Service
Call Girls In Dwarka 9654467111 Escorts Service
 
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
 
RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998
 
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdfKantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
 
9654467111 Call Girls In Munirka Hotel And Home Service
9654467111 Call Girls In Munirka Hotel And Home Service9654467111 Call Girls In Munirka Hotel And Home Service
9654467111 Call Girls In Munirka Hotel And Home Service
 
Industrialised data - the key to AI success.pdf
Industrialised data - the key to AI success.pdfIndustrialised data - the key to AI success.pdf
Industrialised data - the key to AI success.pdf
 
Deep Generative Learning for All - The Gen AI Hype (Spring 2024)
Deep Generative Learning for All - The Gen AI Hype (Spring 2024)Deep Generative Learning for All - The Gen AI Hype (Spring 2024)
Deep Generative Learning for All - The Gen AI Hype (Spring 2024)
 
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
 
RadioAdProWritingCinderellabyButleri.pdf
RadioAdProWritingCinderellabyButleri.pdfRadioAdProWritingCinderellabyButleri.pdf
RadioAdProWritingCinderellabyButleri.pdf
 
GA4 Without Cookies [Measure Camp AMS]
GA4 Without Cookies [Measure Camp AMS]GA4 Without Cookies [Measure Camp AMS]
GA4 Without Cookies [Measure Camp AMS]
 
DBA Basics: Getting Started with Performance Tuning.pdf
DBA Basics: Getting Started with Performance Tuning.pdfDBA Basics: Getting Started with Performance Tuning.pdf
DBA Basics: Getting Started with Performance Tuning.pdf
 
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
 

Privacy Preserved Data Augmentation using Enterprise Data Fabric

  • 1. Privacy Preserved Data Augmentation using Enterprise Data Fabric Final blow before Tea! I was like her according to her; We were both outliers Twitter: @mantaq10 Atif Rahman Zetaris www.zetaris.com
  • 2. Data Exchanged (without consent) • GPS • HIV Status • Email addresses • Weapon: Contract • Response: Excuse • Exposure: (Potential) exposure of marginalized people.
  • 3. Data Breach: • Email Addresses • Username & Passwords Exposure: • 150 million customers Response: • No clear Apologies • (Delayed) Corrective Actions Weapon: Contract
  • 4. Data Breach: • Names • Loyalty data • Email addresses • Physical addresses • DOB • Credit Card last 4 digits Exposure: • Millions of Customers Response: • Denial • Fake Solutions • 8 months before first action
  • 5. Paper contracts are still the most common weapon organizations use to get away with. As regulations get more mature, the impetus to be more effective in privacy preservation will be on service providers.
  • 6. From the exhibition: "M. Hulot, the protagonist in Jacques Tati's 1967 film Playtime, is Enterprises have different data landscape than consumer facing (typically tech) organisations. Enterprises have silos, legacy systems, have to learn to be data driven the hard way and have divergent forces giving a unique focus on
  • 7. Agenda • Data Augmentation • First Principles • Enterprise Data Fabric
  • 8. Data Augmentation ORG A Class 1 Class 2 Class 3
  • 9. Data Augmentation ORG A Class 1 Class 2 Class 3 ORG A Class 1 Class 2 Class 3 ORG B ORG C Potentially Better Typical Modeling Exercise Modeling after data augmentation
  • 10. ORG A Class 1 Class 2 Class 3 ORG B ORG C Content Shared • Aggregated Data / Insights • Open Data • Stratified Sampling • Synthetic Data • De-identified / Anonymized Channels: • Public Portals • Private Marketplaces • In Person Walk throughs/handovers • Gossiping • Pigeons Data Augmentation
  • 11. Data as an asset • Easy to copy and spawn • Does not depreciate or depletes • Really hard to valuate • Process to yield value • Various forms and derivatives Resolve to First Principles Data has properties that make it intrinsically hard to ensure privacy preservation. Therefore, we must adhere to first principles to better understand the problem statement first.
  • 12. The Five Safes Safe Data Safe People Safe Setting Safe Project Safe Output Great Resources ACS Data Sharing Frameworks The De-Identification Decision Making Framework
  • 13. First Principles Safe Data Safe People Safe Setting Safe Project Safe Output Encryption Authentication & Authorisation Environment for Data Controllers & Processors Audit Trail, Lineage and Access & Query Logs Linkage Problem
  • 14. First Principles Safe Data Safe People Safe Setting Safe Project Safe Output Encryption Authentication & Authorisation Environment for Data Controllers & Processors Audit Trail, Lineage and Access & Query Logs Linkage Problem
  • 15. Safe Data – (Encryption) Data at Rest Standard Encryption Data in Transit Secure the Pipe Data for Compute Homomorphic Encryption
  • 16. Homomorphic Encryption Partial Homomorphic Encryption (PHE) Somewhat Homomorphic Encryption (SWHE) Full Homomorphic Encryption (FHE) Addition/Multiplication Low Order Polynomials Eval of Arbitrary Functions More General Less Costly Data Analytics without seeing the data Max Ott, YOW Data 2016
  • 17. First Principles Safe Data Safe People Safe Setting Safe Project Safe Output Encryption Authentication & Authorisation Environment for Data Controllers & Processors Audit Trail, Lineage and Access & Query Logs Linkage Problem
  • 18. Safe Setting - Confidential Computing Trusted Execution Environments (Safe Data in Safe Setting) Microsoft Azure Confidential Computing Google Cloud Platform: Asylo Open Source Framework Confidential Computing at the Software layer?
  • 19. First Principles Safe Data Safe People Safe Setting Safe Project Safe Output Encryption Authentication & Authorisation Environment for Data Controllers & Processors Audit Trail, Lineage and Access & Query Logs Linkage Problem
  • 20.
  • 22. Safe People – (System Span)
  • 23. Safe People – (System Span)
  • 24. First Principles Safe Data Safe People Safe Setting Safe Project Safe Output Encryption Authentication & Authorisation Environment for Data Controllers & Processors Audit Trail, Lineage and Access & Query Logs Linkage Problem
  • 25. Safe People – (System Span)
  • 26. Safe People – (System Span) Expanding the Span of control
  • 27. First Principles Safe Data Safe People Safe Setting Safe Project Safe Output Encryption Authentication & Authorisation Environment for Data Controllers & Processors Audit Trail, Lineage and Access & Query Logs Linkage Problem
  • 28. Safe Project – Audit Trails & Lineage
  • 29. Safe Project – Audit Trails & Lineage ? Data in the wild Its still very hard within enterprises to have a point to point track of data lineage and processing. The problem is expounded when data leaves the span of vision.
  • 30. One Ring to Rule them All? Encryption Authentication & Authorisation Environment for Data Controllers & Processors Audit Trail, Lineage and Access & Query Logs Linkage Problem A data landscape must cover all principles of data privacy.
  • 31. Monoliths in the era of Microservices
  • 35. DBServer App Server Server DB DB DB App App The Enterprise Data Fabric A unified data layer that is used by both user facing applications and downstream analytics, a potential holistic five safes environment
  • 36. The Zetaris Enterprise Data Fabric – Location Aware, Usage Aware, People Aware, Privacy Preserved data in a secure environment. Also check out Apache Ignite, Redhat OpenShift + JBoss Virtualization,.
  • 37.
  • 38. GDPR Highlights Data Portability Erasure Access Consent Right to transfer personal data from one electronic processing system to and into another. Right to withdraw consent and ask for personal data to be deleted Right to know what’s been collected and how its being processed Consumer is informed in ’clear’ and plain language. Consent to collect can be withdrawn at any time By Design By Design By Design By Design Only through Serialization Random writes are not typical Limited Purview Hard Monoliths e.g. Lakes Data Fabric
  • 39. As data scientists, we are at the forefront of disruption and hold the potential to change things. We are automating decisions in all aspects of society. Yet, our work has serious negative implications, we need to educate ourselves on the broader societal questions around regulations, ethics and impact Enjoy the Tribe!

Editor's Notes

  1. Data Augmentation     Value comes with greater depth of analysis     Data Exchanges Models         Insights as a service         application offloading         marketplaces             virtualization with least cost and exposure routing     data fabric as a data augmenation approach Status Quo: Sampling (stratified sampling or rather top N) De-identified Highly aggregated
  2. Data Augmentation     Value comes with greater depth of analysis     Data Exchanges Models         Insights as a service         application offloading         marketplaces             virtualization with least cost and exposure routing     data fabric as a data augmenation approach Status Quo: Sampling (stratified sampling or rather top N) De-identified Highly aggregated
  3. Aim for simplicity  Monolithic systems     Distributed by Design     Co-Location (NSW Data Sharing Framework)     Same data different use cases     PII embedded.     Resourse Contention in Monolithic Systems The problem of monoliths We are treating this as a separate thing (privacy) Open data movement and the open data publishing Separate teams for data publishing and data creation Dr Eugene – For engineers, data is a commodity that flows through the system
  4. Aim for simplicity  Monolithic systems     Distributed by Design     Co-Location (NSW Data Sharing Framework)     Same data different use cases     PII embedded.     Resourse Contention in Monolithic Systems The problem of monoliths We are treating this as a separate thing (privacy) Open data movement and the open data publishing Separate teams for data publishing and data creation Dr Eugene – For engineers, data is a commodity that flows through the system
  5. Aim for simplicity  Monolithic systems     Distributed by Design     Co-Location (NSW Data Sharing Framework)     Same data different use cases     PII embedded.     Resourse Contention in Monolithic Systems The problem of monoliths We are treating this as a separate thing (privacy) Open data movement and the open data publishing Separate teams for data publishing and data creation Dr Eugene – For engineers, data is a commodity that flows through the system
  6. Aim for simplicity  Monolithic systems     Distributed by Design     Co-Location (NSW Data Sharing Framework)     Same data different use cases     PII embedded.     Resourse Contention in Monolithic Systems The problem of monoliths We are treating this as a separate thing (privacy) Open data movement and the open data publishing Separate teams for data publishing and data creation Dr Eugene – For engineers, data is a commodity that flows through the system
  7. Going for Microservices Background Databases are still monoliths Problem is: we are again replicating data to tie them up behind microservices Meta pattern
  8. Going for Microservices Background Databases are still monoliths Problem is: we are again replicating data to tie them up behind microservices Meta pattern
  9. Going for Microservices Background Databases are still monoliths Problem is: we are again replicating data to tie them up behind microservices Meta pattern
  10. The enterprise data fabric Single envionrment where the data is packaged and lives as its source SOR and Apps and data analysis. Privacy built in by two ways Encyrption embedded. Usage tracked and secure.
  11. Data fabric Data colocation – hybrid vs on-prem vs on cloud Geographically aware Least cost routing Least exposure routing In memory compute grids (unified access and unified controls) Edge computing and IoT data privacy (Boris)