1 / 12

SecureDIS: a Framework for Secure Data Integration Systems

SecureDIS: a Framework for Secure Data Integration Systems. Fatimah Akeel fya1g12@soton.ac.uk Supervisors: Dr. Gary B. Wills & Dr. Andrew Gravell School of Electronics and Computer Science, ESS Group. SARS. Katrina. The use of intensive amount of data creates the so called

azriel
Télécharger la présentation

SecureDIS: a Framework for Secure Data Integration Systems

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. SecureDIS: a Framework for Secure Data Integration Systems Fatimah Akeel fya1g12@soton.ac.uk Supervisors: Dr. Gary B. Wills & Dr. Andrew Gravell School of Electronics and Computer Science, ESS Group

  2. SARS Katrina The use of intensive amount of data creates the so called data integration systems

  3. A Scenario of Data Integration System (DIS)

  4. Unintentional disclosure of private information caused by system design. Security Privacy Trust

  5. 1 2 Build a DIS to be secure by design 3 Focus on disclosure of private data

  6. The Goal is to: • Create a secure and reliable DIS that Produce accurate results, used in decision making and disaster recovery. Which is achieved by having security requirements propagate through the development

  7. Published Completed

  8. M. Lenzerini, “Data integration: A theoretical perspective,” in Proceedings of the 21st ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, 2002, pp. 233–246. • A. Calì, D. Calvanese, G. D. Giacomo, and M. Lenzerini, “Data integration under integrity constraints,” Adv. Inf. Syst. Eng., pp. 262–279, 2006. • C. Clifton, M. Kantarcioǧlu, A. Doan, G. Schadow, J. Vaidya, A. Elmagarmid, and D. Suciu, “Privacy-preserving data integration and sharing,” in Proceedings of the 9th ACM SIGMOD workshop on Research issues in data mining and knowledge discovery - DMKD ’04, 2004, p. 19. • K. Pasierb, T. Kajdanowicz, and P. Kazienko, “Privacy-preserving data mining, sharing and publishing,” J. Med. Informatics Technol., vol. 18, 2011. • M. Haddad, M.-S. Hacid, and R. Laurini, “Data Integration in Presence of Authorization Policies,” in 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, 2012, pp. 92–99. • S. W. Van Den Braak, S. Choenni, R. Meijer, and A. Zuiderwijk, “Trusted third parties for secure and privacy-preserving data integration and sharing in the public sector,” in Proceedings of the 13th Annual International Conference on Digital Government Research - dg.o ’12, 2012, pp. 135 –144. • A. Morton and M. Sasse, “Privacy is a process, not a PET: a theory for effective privacy practice,” in Proceedings of the 2012 workshop on New security paradigms, 2012, pp. 87–104. • S. S. Bhowmick, L. Gruenwald, M. Iwaihara, and S. Chatvichienchai, “PRIVATE-IYE: A Framework for Privacy Preserving Data Integration,” in 22nd International Conference on Data Engineering Workshops (ICDEW’06), 2006, pp. 91–91.

  9. Questions & Comments?

More Related