securing the privacy of customer

29
Securing the privacy of Customer Presentation On 12/25/21 1

Upload: shelly

Post on 02-Nov-2014

710 views

Category:

Documents


0 download

DESCRIPTION

 

TRANSCRIPT

Page 1: Securing the privacy of customer

Securing the privacy of Customer

Presentation

On

04/08/23 1

Page 2: Securing the privacy of customer

• Privacy is the right of individuals.

• Computer security is the prevention or

protection against

– access to information by unauthorized

recipients

– intentional but unauthorized destruction

or alteration of that information

Introduction

04/08/23 2

Page 3: Securing the privacy of customer

• Traditional databases

• Statistical databases

• Secure databases

Related Work

04/08/23 3

Page 4: Securing the privacy of customer

• Hippocratic databases require all the capabilities

provided by current database systems

• Different focus

• Need to rethink data definition and query

languages, query processing, indexing and

storage structures, and access control

mechanisms

Traditional Database

04/08/23 4

Page 5: Securing the privacy of customer

• Goal: Provide statistical information

• Query restriction

• Data perturbation

Statistical Databases

04/08/23 5

Page 6: Securing the privacy of customer

• Sensitive information is transmitted over a

secure channel and stored securely

• Access controls

• Encryption

• Multilevel secure databases

Secure Databases

04/08/23 6

Page 7: Securing the privacy of customer

• Purpose Specification

• Consent

• Limited Collection

• Limited Use

• Limited Disclosure

Principles of Hippocratic

04/08/23 7

Page 8: Securing the privacy of customer

• Limited Retention

• Accuracy

• Safety

• Openness

• Compliance

Continue…….

04/08/23 8

Page 9: Securing the privacy of customer

• Team Formation

• Setting the responsibility

• Setting the objective

• Aware the Customer

Key Requisites for Privacy Policy

04/08/23 9

Page 10: Securing the privacy of customer

• Lawful collection

• Maintaining the accuracy

• Obtaining complete information

• Data Security

Continue…….

04/08/23 10

Page 11: Securing the privacy of customer

• Disclosure norms

• Storage norms

• Updated norms

• Information norms

Continue…….

04/08/23 11

Page 12: Securing the privacy of customer

• Privacy Metadata

• Data Collection

• Querying

• Retention

• Data Collection Organizer

Proposed Design and Implementation

04/08/23 12

Page 13: Securing the privacy of customer

• External recipients

• Retention Period

• Authorized users

Privacy Metadata

04/08/23 13

Page 14: Securing the privacy of customer

• Data is inserted with the purpose for which it

may be used.

• Data Accuracy Analyzer addresses the Principle

of Accuracy

Data Collection

04/08/23 14

Page 15: Securing the privacy of customer

• Queries are tagged with a purpose

• Before query execution

• During query execution

• After query execution

Querying

04/08/23 15

Page 16: Securing the privacy of customer

• A data  item should be retained for the maximum

retention period among all the  purposes for which

it has been collected.

• After this period, it should be deleted.

Retention

04/08/23 16

Page 17: Securing the privacy of customer

• Data is fed into the database.

• It has to be retained till its purpose is solved.

• Data manager deletes all the data once

purpose is solved.

Applicable Restriction

04/08/23 17

Page 18: Securing the privacy of customer

• Fine grained access control (FGAC)

• In order to maintain the retention restriction along

with sustaining data consider a example

The Proposed Model

04/08/23 18

Page 19: Securing the privacy of customer

Table1

Customer details Constraints Data type

Cust_id Not NULL Integer

Cust_name Char(32)

Cust_add Varchar2

04/08/23 19

Page 20: Securing the privacy of customer

Table2

Restriction details Constraints Data type

Restrict_id NotNULL Integer

Restrict_name Varchar2

Restrict_date date

04/08/23 20

Page 21: Securing the privacy of customer

Table3

Restriction date Data type

Restrict_id Integer

Restrict_startdate date

Restrict_enddate date

04/08/23 21

Page 22: Securing the privacy of customer

Table4

Customer_acc Data type

Cust_id Integer

Cust_acc Integer

Cust_bal Integer

04/08/23 22

Page 23: Securing the privacy of customer

• Create restriction<restriction_name>

On <table>

For <authorization>

(((to columns<column list>|to rows

[Where search_condition] |to cells

<column_list[where search_condition]+))

[for retension time time_interval])+ [restriction access to commands>]

Syntax for creating the restriction

04/08/23 23

Page 24: Securing the privacy of customer

• Create restriction rest1 on table Customer_acc For user manager To Columns(cust_bal) for retension time12 Restricting access to select

Example

04/08/23 24

Page 25: Securing the privacy of customer

• If the clause for retention 12 is omitted then the restriction is set for unspecified period

Continue…….

04/08/23 25

Page 26: Securing the privacy of customer

Create restriction_user

On Customer_acc

For public

To rows where name=user Restricting access to all

User specific accessing

04/08/23 26

Page 27: Securing the privacy of customer

• This type of restriction helps in building the confidence level of customers for the company.

Brand Stability and proposed model

04/08/23 27

Page 28: Securing the privacy of customer

Conclusion

04/08/23 28

Page 29: Securing the privacy of customer

Thank You

alllllllllllllllllllllll

Presented by:

Harjinder Mann

Shelly

Sonia

Anupama

MCA-final04/08/23 29