1 / 5

Terrorist

Protecting Privacy in Terrorist Tracking Applications

guest179
Télécharger la présentation

Terrorist

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Protecting Privacy in Terrorist Tracking Applications

  2. privacy appliance privacy appliance privacy appliance cross-source privacy appliance user query data source data source Government owned Independently operated Privately owned data source Privacy Appliance • Standalone devices • Under private control • Better assurance of correct operation • Sits between the analyst and each private data source • Easily added to an enterprise’s computing infrastructure • Like firewalls Benefits • Private data stays in private hands • Privacy controls isolated from the government

  3. For lowest authorization: • Withhold identifying attributes • Prevent completion of inference channels • The privacy appliance will recognize • Which queries touch inference channels • Whether the user is authorized for the query Analyst query Check authorizations Input special authorizations Access control DB Modify query as needed to withhold data Mark access “history” • For higher authorization: • Can retrieve specific identifying info • Must specify scope of data authorized Analysis can’t combine non-sensitive queries to obtain sensitive info Send modified query to data source Access Control

  4. Inference Tool • Earlier life: MLS databases • Detect inference channels from unclassified to classified data • Now: Privacy-Protection • Detect inference channels from non-sensitive to sensitive data • Example: • Select count(name) where gender = female • Select avg(grade) where gender = female = 1

  5. Systems Issues • Logging • Log classified stuff at third-party sites! • Search through (encrypted) logs to prove abuse. • Trust issues • Finally a legitimate use for Palladium! • … • This is a big system!

More Related