SlideShare uma empresa Scribd logo
1 de 18
Baixar para ler offline
Open Access and Database Anonymization
an Open Source Procedure
Based on an Italian Case Study
Danube University Krems, 21-23 May 2014
L. Leschiutta, G.Futia
dd
th
Month Year What 222nd May 2014 Giuseppe Futia – Politecnico di Torino 2
Introduction (1)
 The principal way to openly share a database is to remove all
data that could lead to the identification of the involved
subjects (i.e. database anonymization);
 we describe a procedure on how to process and anonymize a
collection of data that includes personal, sensitive and
judicial data;
 the procedure is general purpose and implemented relying
solely on common open-source software applications.
dd
th
Month Year What 322nd May 2014 Giuseppe Futia – Politecnico di Torino 3
Introduction (2)
• Our study is based on a real case in which a database
consisting of 352 data fields of car accidents related data
(TWIST) needs to be open accessed;
• this work was developed in the framework of the Open-DAI
project. Open-DAI is “Opening Data Architectures and
Infrastructures” for European Public Administrations. It is a
project funded under the ICT Policy Support Programme as
part of the Competitiveness and Innovation framework
Programme (CIP) Call 2011.
dd
th
Month Year What 422nd May 2014 Giuseppe Futia – Politecnico di Torino 4
Non Anonymous Data
ID1 NID1 ID2 ID3 NID2 ID4 NID3 NID4
Item 1
Item 2
Item N
dd
th
Month Year What 522nd May 2014 Giuseppe Futia – Politecnico di Torino 5
Ordered Non Anonymous Data
ID1 ID2 ID3 ID4 NID1 NID2 NID3 NID4
Item 1
Item 2
Item N
dd
th
Month Year What 622nd May 2014 Giuseppe Futia – Politecnico di Torino 6
Ordered Non Anonymous Data
including Anonymous IDs
ID1 ID2 ID3 ID4 AID NID1 NID2 NID3 NID4
Item 1
1053
Item 2
1001
1057
Item N
1133
dd
th
Month Year What 722nd May 2014 Giuseppe Futia – Politecnico di Torino 7
Anonymous Data
AID NID1 NID2 NID3 NID4
1053
1001
1057
1133
dd
th
Month Year What 822nd May 2014 Giuseppe Futia – Politecnico di Torino 8
Random AIDs generation
dd
th
Month Year What 922nd May 2014 Giuseppe Futia – Politecnico di Torino 9
Advanced techniques: repeating IDs
IF(ISNA(VLOOKUP(C4;C$1:C3;1; ));AID.A8;VLOOKUP(C4;C$1:F3;4; ))
dd
th
Month Year What 1022nd May 2014 Giuseppe Futia – Politecnico di Torino 10
Non Unique IDs In Multiple Cells (1)
ID1 ID2 ID3 ID4 NID1 NID2 NID3 NID4
Item 1 Lorem ipsum
Item 2
Lorem ipsum
Item N Lorem ipsum
dd
th
Month Year What 1122nd May 2014 Giuseppe Futia – Politecnico di Torino 11
Non Unique IDs In Multiple Cells (2)
flag=false;
for (i=0; i<n: i++){
for (j=0; j<m: j++){
if(ID_Matrix[i][j]==ID_Matrix[n][m]{
AID_Matrix[n][m] =
AID_Matrix[i][j];
flag=true;
break;
}
}
}
if (flag==false){
AID_Matrix[n][m] = Next_Availabe_AID(k);
k++;
}
dd
th
Month Year What 1222nd May 2014 Giuseppe Futia – Politecnico di Torino 12
Data Wiping
• To perform this operation on Windows,
you can use the open source program
Eraser (http://eraser.heidi.ie );
• on Linux, you can use the following
commands:
> shred NonAnonymousData.csv
> rm NonAnonymousData.csv
dd
th
Month Year What 1322nd May 2014 Giuseppe Futia – Politecnico di Torino 13
Cryptograph the file
• On Windows this can be achieved by using the
open source 7zip program (http://www.7-
zip.org/ ) that allows to achieve a strong AES-
256 encryption.
• On Linux you can use the following command:
> gpg -c NonAnonymousData.csv
The encrypted file must then be backed up to a
safe location e.g. a non-rewritable DVD or a
WORM (Write Once Read Many) tape.
dd
th
Month Year What 1422nd May 2014 Giuseppe Futia – Politecnico di Torino 14
Data Degradation (location)
dd
th
Month Year What 1522nd May 2014 Giuseppe Futia – Politecnico di Torino 15
Data Degradation (location)
dd
th
Month Year What 1622nd May 2014 Giuseppe Futia – Politecnico di Torino 16
Data Degradation (time)
• 10 November 2011 at 10:25
• 10 November 2011 between 10 and 11
• Winter 2011
dd
th
Month Year What 1722nd May 2014 Giuseppe Futia – Politecnico di Torino 17
Conclusions: de-anonymization test
• How to test if a database is anonymous
enough?
• Reasonable efforts “the means possibly
required to effect identification are to be
considered disproportionate compared
with the (risk of) damage resulting”
• de-anonymization test
22nd May 2014 Giuseppe Futia – Politecnico di Torino 18
Thank you
Luca Leschiutta (luca.leschiutta@polito.it)
Giuseppe Futia (giuseppe.futia@polito.it)
Nexa Center for Internet & Society (http://nexa.polito.it)
Dept. of Computer and Control Engineering (DAUIN)
Politecnico di Torino, Italy

Mais conteúdo relacionado

Semelhante a Presentation cedem luca

Domenico Donvito - Istat - Open Data in Official Statistics - 10 July 2013
Domenico Donvito - Istat - Open Data in Official Statistics - 10 July 2013Domenico Donvito - Istat - Open Data in Official Statistics - 10 July 2013
Domenico Donvito - Istat - Open Data in Official Statistics - 10 July 2013AmbasciatadelCanada
 
5 Key Steps Involved In Digital Forensic Science
5 Key Steps Involved In Digital Forensic Science5 Key Steps Involved In Digital Forensic Science
5 Key Steps Involved In Digital Forensic ScienceICFECI
 
The Emergence of Digital Forensic Bangalore
The Emergence of Digital Forensic BangaloreThe Emergence of Digital Forensic Bangalore
The Emergence of Digital Forensic Bangaloreehackacademy
 
Aligning stakeholders' perspectives in Open Government Data Community
Aligning stakeholders' perspectives in Open Government Data CommunityAligning stakeholders' perspectives in Open Government Data Community
Aligning stakeholders' perspectives in Open Government Data CommunityAdegboyega Ojo
 
The Swiss OGD-Portal (Offene Archive 2.2, 4.12.2015)
The Swiss OGD-Portal (Offene Archive 2.2, 4.12.2015)The Swiss OGD-Portal (Offene Archive 2.2, 4.12.2015)
The Swiss OGD-Portal (Offene Archive 2.2, 4.12.2015)Offene Archive
 
Visualizing Internet-Measurements Data for Research Purposes: the NeuViz Data...
Visualizing Internet-Measurements Data for Research Purposes: the NeuViz Data...Visualizing Internet-Measurements Data for Research Purposes: the NeuViz Data...
Visualizing Internet-Measurements Data for Research Purposes: the NeuViz Data...giuseppe_futia
 
digital forensic examination of mobile phone data
digital forensic examination of mobile phone datadigital forensic examination of mobile phone data
digital forensic examination of mobile phone dataINFOGAIN PUBLICATION
 
Anti-Forensic Techniques and Its Impact on Digital Forensic
Anti-Forensic Techniques and Its Impact on Digital ForensicAnti-Forensic Techniques and Its Impact on Digital Forensic
Anti-Forensic Techniques and Its Impact on Digital ForensicIRJET Journal
 
SC7 Workshop 3: Copernicus Data and Information Access Services (DIAS)
SC7 Workshop 3: Copernicus Data and Information Access Services (DIAS)SC7 Workshop 3: Copernicus Data and Information Access Services (DIAS)
SC7 Workshop 3: Copernicus Data and Information Access Services (DIAS)BigData_Europe
 
Digital Forensics Assignment One UEL and Unicaf
Digital Forensics Assignment One UEL and UnicafDigital Forensics Assignment One UEL and Unicaf
Digital Forensics Assignment One UEL and UnicafDamaineFranklinMScBE
 
Learning with the Web. Structuring data to ease machine understanding
Learning with the Web. Structuring data to ease  machine understandingLearning with the Web. Structuring data to ease  machine understanding
Learning with the Web. Structuring data to ease machine understandingGiuseppe Rizzo
 
Collaboration Between Infosec Community and CERT Teams : Project Sonar case
Collaboration Between Infosec Community and CERT Teams : Project Sonar caseCollaboration Between Infosec Community and CERT Teams : Project Sonar case
Collaboration Between Infosec Community and CERT Teams : Project Sonar caseValdes Nzalli
 
INSPEC2T System Security & Privacy Considerations
INSPEC2T System Security & Privacy ConsiderationsINSPEC2T System Security & Privacy Considerations
INSPEC2T System Security & Privacy ConsiderationsTrilateral Research
 
FINODEX: open data for business (if you trust it)
FINODEX: open data for business (if you trust it)FINODEX: open data for business (if you trust it)
FINODEX: open data for business (if you trust it)Maurizio Napolitano
 
Selected funding calls 2014, tentative.
Selected funding calls 2014, tentative. Selected funding calls 2014, tentative.
Selected funding calls 2014, tentative. bgatorcom
 
TIMELINESS OF OPEN DATA IN OPEN GOVERNMENT DATA PORTALS THROUGH PANDEMIC-RELA...
TIMELINESS OF OPEN DATA IN OPEN GOVERNMENT DATA PORTALS THROUGH PANDEMIC-RELA...TIMELINESS OF OPEN DATA IN OPEN GOVERNMENT DATA PORTALS THROUGH PANDEMIC-RELA...
TIMELINESS OF OPEN DATA IN OPEN GOVERNMENT DATA PORTALS THROUGH PANDEMIC-RELA...Anastasija Nikiforova
 
Hamburg Transparency Law
Hamburg Transparency LawHamburg Transparency Law
Hamburg Transparency LawePSI Platform
 

Semelhante a Presentation cedem luca (20)

Domenico Donvito - Istat - Open Data in Official Statistics - 10 July 2013
Domenico Donvito - Istat - Open Data in Official Statistics - 10 July 2013Domenico Donvito - Istat - Open Data in Official Statistics - 10 July 2013
Domenico Donvito - Istat - Open Data in Official Statistics - 10 July 2013
 
5 Key Steps Involved In Digital Forensic Science
5 Key Steps Involved In Digital Forensic Science5 Key Steps Involved In Digital Forensic Science
5 Key Steps Involved In Digital Forensic Science
 
The Emergence of Digital Forensic Bangalore
The Emergence of Digital Forensic BangaloreThe Emergence of Digital Forensic Bangalore
The Emergence of Digital Forensic Bangalore
 
Aligning stakeholders' perspectives in Open Government Data Community
Aligning stakeholders' perspectives in Open Government Data CommunityAligning stakeholders' perspectives in Open Government Data Community
Aligning stakeholders' perspectives in Open Government Data Community
 
The Swiss OGD-Portal (Offene Archive 2.2, 4.12.2015)
The Swiss OGD-Portal (Offene Archive 2.2, 4.12.2015)The Swiss OGD-Portal (Offene Archive 2.2, 4.12.2015)
The Swiss OGD-Portal (Offene Archive 2.2, 4.12.2015)
 
Visualizing Internet-Measurements Data for Research Purposes: the NeuViz Data...
Visualizing Internet-Measurements Data for Research Purposes: the NeuViz Data...Visualizing Internet-Measurements Data for Research Purposes: the NeuViz Data...
Visualizing Internet-Measurements Data for Research Purposes: the NeuViz Data...
 
digital forensic examination of mobile phone data
digital forensic examination of mobile phone datadigital forensic examination of mobile phone data
digital forensic examination of mobile phone data
 
3170725_Unit-1.pptx
3170725_Unit-1.pptx3170725_Unit-1.pptx
3170725_Unit-1.pptx
 
Anti-Forensic Techniques and Its Impact on Digital Forensic
Anti-Forensic Techniques and Its Impact on Digital ForensicAnti-Forensic Techniques and Its Impact on Digital Forensic
Anti-Forensic Techniques and Its Impact on Digital Forensic
 
SC7 Workshop 3: Copernicus Data and Information Access Services (DIAS)
SC7 Workshop 3: Copernicus Data and Information Access Services (DIAS)SC7 Workshop 3: Copernicus Data and Information Access Services (DIAS)
SC7 Workshop 3: Copernicus Data and Information Access Services (DIAS)
 
Digital Forensics Assignment One UEL and Unicaf
Digital Forensics Assignment One UEL and UnicafDigital Forensics Assignment One UEL and Unicaf
Digital Forensics Assignment One UEL and Unicaf
 
Learning with the Web. Structuring data to ease machine understanding
Learning with the Web. Structuring data to ease  machine understandingLearning with the Web. Structuring data to ease  machine understanding
Learning with the Web. Structuring data to ease machine understanding
 
14a Conferenza Nazionale di Statistica
14a Conferenza Nazionale di Statistica14a Conferenza Nazionale di Statistica
14a Conferenza Nazionale di Statistica
 
Collaboration Between Infosec Community and CERT Teams : Project Sonar case
Collaboration Between Infosec Community and CERT Teams : Project Sonar caseCollaboration Between Infosec Community and CERT Teams : Project Sonar case
Collaboration Between Infosec Community and CERT Teams : Project Sonar case
 
INSPEC2T System Security & Privacy Considerations
INSPEC2T System Security & Privacy ConsiderationsINSPEC2T System Security & Privacy Considerations
INSPEC2T System Security & Privacy Considerations
 
FINODEX: open data for business (if you trust it)
FINODEX: open data for business (if you trust it)FINODEX: open data for business (if you trust it)
FINODEX: open data for business (if you trust it)
 
Selected funding calls 2014, tentative.
Selected funding calls 2014, tentative. Selected funding calls 2014, tentative.
Selected funding calls 2014, tentative.
 
TIMELINESS OF OPEN DATA IN OPEN GOVERNMENT DATA PORTALS THROUGH PANDEMIC-RELA...
TIMELINESS OF OPEN DATA IN OPEN GOVERNMENT DATA PORTALS THROUGH PANDEMIC-RELA...TIMELINESS OF OPEN DATA IN OPEN GOVERNMENT DATA PORTALS THROUGH PANDEMIC-RELA...
TIMELINESS OF OPEN DATA IN OPEN GOVERNMENT DATA PORTALS THROUGH PANDEMIC-RELA...
 
3170725_Unit-1.pptx
3170725_Unit-1.pptx3170725_Unit-1.pptx
3170725_Unit-1.pptx
 
Hamburg Transparency Law
Hamburg Transparency LawHamburg Transparency Law
Hamburg Transparency Law
 

Mais de Danube University Krems, Centre for E-Governance

Mais de Danube University Krems, Centre for E-Governance (20)

Smart Cities workshop at CeDEM17
Smart Cities workshop at CeDEM17Smart Cities workshop at CeDEM17
Smart Cities workshop at CeDEM17
 
#CeDEM17 - Towards an Open Data based ICT Reference Architecture for Smart Ci...
#CeDEM17 - Towards an Open Data based ICT Reference Architecture for Smart Ci...#CeDEM17 - Towards an Open Data based ICT Reference Architecture for Smart Ci...
#CeDEM17 - Towards an Open Data based ICT Reference Architecture for Smart Ci...
 
#CeDEM17 - Financial Payments and Smart Cities
#CeDEM17 - Financial Payments and Smart Cities #CeDEM17 - Financial Payments and Smart Cities
#CeDEM17 - Financial Payments and Smart Cities
 
#CeDEM2017 Smart Cities of Self-Determined Data Subjects
#CeDEM2017 Smart Cities of Self-Determined Data Subjects#CeDEM2017 Smart Cities of Self-Determined Data Subjects
#CeDEM2017 Smart Cities of Self-Determined Data Subjects
 
Open Data as Enabler of Public Service Co-creation: Exploring the Drivers and...
Open Data as Enabler of Public Service Co-creation:Exploring the Drivers and...Open Data as Enabler of Public Service Co-creation:Exploring the Drivers and...
Open Data as Enabler of Public Service Co-creation: Exploring the Drivers and...
 
DatalEt-Ecosystem Provider - The DEEP project
DatalEt-Ecosystem Provider - The DEEP projectDatalEt-Ecosystem Provider - The DEEP project
DatalEt-Ecosystem Provider - The DEEP project
 
Towards Open Justice: ICT acceptance in the Greek justice system
Towards Open Justice: ICT acceptance in the Greek justice systemTowards Open Justice: ICT acceptance in the Greek justice system
Towards Open Justice: ICT acceptance in the Greek justice system
 
[X]CHANGING PERSPECTIVES
[X]CHANGING PERSPECTIVES[X]CHANGING PERSPECTIVES
[X]CHANGING PERSPECTIVES
 
Using fuzzy cognitive maps as decision support tool for smart cities goraczek
Using fuzzy cognitive maps as decision support tool for smart cities  goraczekUsing fuzzy cognitive maps as decision support tool for smart cities  goraczek
Using fuzzy cognitive maps as decision support tool for smart cities goraczek
 
Understanding of smartphone divide dal yong
Understanding of smartphone divide  dal yongUnderstanding of smartphone divide  dal yong
Understanding of smartphone divide dal yong
 
The motivations behind open access publishing judith schossboeck
The motivations behind open access publishing  judith schossboeckThe motivations behind open access publishing  judith schossboeck
The motivations behind open access publishing judith schossboeck
 
Social media as hobed of racism and hate speech kobayashi, kaigo, kwak
Social media as hobed of racism and hate speech kobayashi, kaigo, kwakSocial media as hobed of racism and hate speech kobayashi, kaigo, kwak
Social media as hobed of racism and hate speech kobayashi, kaigo, kwak
 
Social media and citizen engagement in asia skoric
Social media and citizen engagement in asia  skoricSocial media and citizen engagement in asia  skoric
Social media and citizen engagement in asia skoric
 
Realizin modeling and evaluation city's enerfy efficiency leonidas anthopoulos
Realizin modeling and evaluation city's enerfy efficiency leonidas anthopoulosRealizin modeling and evaluation city's enerfy efficiency leonidas anthopoulos
Realizin modeling and evaluation city's enerfy efficiency leonidas anthopoulos
 
Post 2015 paris c limate conference politics on the internet manuela hartwig
Post 2015 paris c limate conference politics on the internet  manuela hartwigPost 2015 paris c limate conference politics on the internet  manuela hartwig
Post 2015 paris c limate conference politics on the internet manuela hartwig
 
Open government and national sovereignty ivo babaja
Open government and national sovereignty  ivo babajaOpen government and national sovereignty  ivo babaja
Open government and national sovereignty ivo babaja
 
Health r isk communication in the digital era myojung chung
Health r isk communication in the digital era myojung chungHealth r isk communication in the digital era myojung chung
Health r isk communication in the digital era myojung chung
 
An analysis of japanese local government facebook profiles muneo kaigo
An analysis of japanese local government facebook profiles muneo kaigoAn analysis of japanese local government facebook profiles muneo kaigo
An analysis of japanese local government facebook profiles muneo kaigo
 
GovCamp 2016 - Co-Creation
GovCamp 2016 - Co-CreationGovCamp 2016 - Co-Creation
GovCamp 2016 - Co-Creation
 
Datenschutzbeauftragte werden in Zukunft eine wichtige Rolle im Unternehmen s...
Datenschutzbeauftragte werden in Zukunft eine wichtige Rolle im Unternehmen s...Datenschutzbeauftragte werden in Zukunft eine wichtige Rolle im Unternehmen s...
Datenschutzbeauftragte werden in Zukunft eine wichtige Rolle im Unternehmen s...
 

Último

Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 

Último (20)

Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 

Presentation cedem luca

  • 1. Open Access and Database Anonymization an Open Source Procedure Based on an Italian Case Study Danube University Krems, 21-23 May 2014 L. Leschiutta, G.Futia
  • 2. dd th Month Year What 222nd May 2014 Giuseppe Futia – Politecnico di Torino 2 Introduction (1)  The principal way to openly share a database is to remove all data that could lead to the identification of the involved subjects (i.e. database anonymization);  we describe a procedure on how to process and anonymize a collection of data that includes personal, sensitive and judicial data;  the procedure is general purpose and implemented relying solely on common open-source software applications.
  • 3. dd th Month Year What 322nd May 2014 Giuseppe Futia – Politecnico di Torino 3 Introduction (2) • Our study is based on a real case in which a database consisting of 352 data fields of car accidents related data (TWIST) needs to be open accessed; • this work was developed in the framework of the Open-DAI project. Open-DAI is “Opening Data Architectures and Infrastructures” for European Public Administrations. It is a project funded under the ICT Policy Support Programme as part of the Competitiveness and Innovation framework Programme (CIP) Call 2011.
  • 4. dd th Month Year What 422nd May 2014 Giuseppe Futia – Politecnico di Torino 4 Non Anonymous Data ID1 NID1 ID2 ID3 NID2 ID4 NID3 NID4 Item 1 Item 2 Item N
  • 5. dd th Month Year What 522nd May 2014 Giuseppe Futia – Politecnico di Torino 5 Ordered Non Anonymous Data ID1 ID2 ID3 ID4 NID1 NID2 NID3 NID4 Item 1 Item 2 Item N
  • 6. dd th Month Year What 622nd May 2014 Giuseppe Futia – Politecnico di Torino 6 Ordered Non Anonymous Data including Anonymous IDs ID1 ID2 ID3 ID4 AID NID1 NID2 NID3 NID4 Item 1 1053 Item 2 1001 1057 Item N 1133
  • 7. dd th Month Year What 722nd May 2014 Giuseppe Futia – Politecnico di Torino 7 Anonymous Data AID NID1 NID2 NID3 NID4 1053 1001 1057 1133
  • 8. dd th Month Year What 822nd May 2014 Giuseppe Futia – Politecnico di Torino 8 Random AIDs generation
  • 9. dd th Month Year What 922nd May 2014 Giuseppe Futia – Politecnico di Torino 9 Advanced techniques: repeating IDs IF(ISNA(VLOOKUP(C4;C$1:C3;1; ));AID.A8;VLOOKUP(C4;C$1:F3;4; ))
  • 10. dd th Month Year What 1022nd May 2014 Giuseppe Futia – Politecnico di Torino 10 Non Unique IDs In Multiple Cells (1) ID1 ID2 ID3 ID4 NID1 NID2 NID3 NID4 Item 1 Lorem ipsum Item 2 Lorem ipsum Item N Lorem ipsum
  • 11. dd th Month Year What 1122nd May 2014 Giuseppe Futia – Politecnico di Torino 11 Non Unique IDs In Multiple Cells (2) flag=false; for (i=0; i<n: i++){ for (j=0; j<m: j++){ if(ID_Matrix[i][j]==ID_Matrix[n][m]{ AID_Matrix[n][m] = AID_Matrix[i][j]; flag=true; break; } } } if (flag==false){ AID_Matrix[n][m] = Next_Availabe_AID(k); k++; }
  • 12. dd th Month Year What 1222nd May 2014 Giuseppe Futia – Politecnico di Torino 12 Data Wiping • To perform this operation on Windows, you can use the open source program Eraser (http://eraser.heidi.ie ); • on Linux, you can use the following commands: > shred NonAnonymousData.csv > rm NonAnonymousData.csv
  • 13. dd th Month Year What 1322nd May 2014 Giuseppe Futia – Politecnico di Torino 13 Cryptograph the file • On Windows this can be achieved by using the open source 7zip program (http://www.7- zip.org/ ) that allows to achieve a strong AES- 256 encryption. • On Linux you can use the following command: > gpg -c NonAnonymousData.csv The encrypted file must then be backed up to a safe location e.g. a non-rewritable DVD or a WORM (Write Once Read Many) tape.
  • 14. dd th Month Year What 1422nd May 2014 Giuseppe Futia – Politecnico di Torino 14 Data Degradation (location)
  • 15. dd th Month Year What 1522nd May 2014 Giuseppe Futia – Politecnico di Torino 15 Data Degradation (location)
  • 16. dd th Month Year What 1622nd May 2014 Giuseppe Futia – Politecnico di Torino 16 Data Degradation (time) • 10 November 2011 at 10:25 • 10 November 2011 between 10 and 11 • Winter 2011
  • 17. dd th Month Year What 1722nd May 2014 Giuseppe Futia – Politecnico di Torino 17 Conclusions: de-anonymization test • How to test if a database is anonymous enough? • Reasonable efforts “the means possibly required to effect identification are to be considered disproportionate compared with the (risk of) damage resulting” • de-anonymization test
  • 18. 22nd May 2014 Giuseppe Futia – Politecnico di Torino 18 Thank you Luca Leschiutta (luca.leschiutta@polito.it) Giuseppe Futia (giuseppe.futia@polito.it) Nexa Center for Internet & Society (http://nexa.polito.it) Dept. of Computer and Control Engineering (DAUIN) Politecnico di Torino, Italy