1 / 20

Privacy Data Sharing Platform

Privacy Data Sharing Platform. PDSP. Scenario & Solution. Situation: Tom is 78 years old, lives alone in his rented house. CentreLink has Tom’s most of situation information, but not allowed to share by law.

caroun
Télécharger la présentation

Privacy Data Sharing Platform

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Privacy Data Sharing Platform PDSP

  2. Scenario & Solution • Situation: • Tom is 78 years old, lives alone in his rented house. • CentreLink has Tom’s most of situation information, but not allowed to share by law. • Aged care department supply varieties services, e.g. visited care assistant, but Tom don’t even know where he could ask help from. • Solution: • User controlled and monitored data sharing. • Instant Message tools supported notification and authorization. • Workflow based data sharing processing. • Policy-based access control on privacy data. • Ted supported authentication. • Integrated Decision Making Model based on Accountability&Reputation. CSIRO.

  3. Data and Control Flow Framework Host 2. Request for approval 1. Request for private data Policy Filtering Private Data Access Control 3. Approval/Deny CSIRO.

  4. Privacy Data Sharing • Privacy Data • E.g.Medical,Financial,Contact,Internet • PD sharing Issues: • Legacy • Security • Preserving • Technologies: • TED security device • Policy-based Access Control(XACML) • Accountability&Reputation based Decision Making Model • Implemented: • User Controlled Access Control • Workflow Framework • Instant Message Tools • Reserved Interface for • XACML • DMM CSIRO.

  5. Feature Overview • Policy based Access Control • 3 Party involved Privacy Data Sharing • Decision Making Model(Accountability&Reputation Based) • Workflow Processing • Instant Message Tools • Digital Signature CSIRO.

  6. XACML Concept Target Target Target Condition Effect Rules Obligations Policies Obligations PolicySet CSIRO.

  7. XACML Data-flow Diagram CSIRO.

  8. Who can access what information • Policy & PolicySet – combining of applicable policies using CombiningAlgorithm • Target – Rapidly index to find applicable Policies or Rules • Conditions – Complex boolean expression with many operands, arithmetic & string functions • Effect – “Permit” or “Deny” • Obligations – Other required actions • Reference: • Sun XACML Implementation v 1.2 (http://sunxacml.sourceforge.net/) • XACML Documents(http://www.oasis-open.org/committees/xacml/) • XACML Tutorial with Usecase CSIRO.

  9. XML Data Format CSIRO.

  10. Procedure & Interface • Login(Ind,Org,Admin) • Subscribe(Ind) • Query(Org) • Review(Admin) • Policy checking and content filtering(Sys) • Message(Ind) • Authorisation(Ind) • Get Released Result (Org) CSIRO.

  11. Login CSIRO.

  12. Subscribe CSIRO.

  13. Query CSIRO.

  14. Review CSIRO.

  15. Admin workflows CSIRO.

  16. Receive Messages CSIRO.

  17. Message Approve CSIRO.

  18. Task Manage CSIRO.

  19. Released Result CSIRO.

  20. Released Result In GoogleMap CSIRO.

More Related