Data privacy: principles and practice
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Boca Raton ; London ; New York
CRC Press
[2017]
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | Literaturangaben und Index |
Beschreibung: | xx, 211 Seiten Diagramme |
ISBN: | 9781498721042 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV044247889 | ||
003 | DE-604 | ||
005 | 20181017 | ||
007 | t | ||
008 | 170329s2017 xxu|||| |||| 00||| eng d | ||
010 | |a 016009691 | ||
020 | |a 9781498721042 |9 978-1-4987-2104-2 | ||
035 | |a (OCoLC)992493604 | ||
035 | |a (DE-599)BVBBV044247889 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
044 | |a xxu |c US | ||
049 | |a DE-355 |a DE-473 |a DE-M382 |a DE-739 |a DE-706 | ||
050 | 0 | |a HF5548.37 | |
082 | 0 | |a 005.8 |2 23 | |
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
100 | 1 | |a Venkataramanan, Nataraj |e Verfasser |0 (DE-588)114398921X |4 aut | |
245 | 1 | 0 | |a Data privacy |b principles and practice |c Nataraj Venkataramanan ; Ashwin Shriram |
264 | 1 | |a Boca Raton ; London ; New York |b CRC Press |c [2017] | |
300 | |a xx, 211 Seiten |b Diagramme | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a Literaturangaben und Index | ||
650 | 4 | |a Data protection | |
650 | 4 | |a Management information systems |x Security measures | |
650 | 4 | |a Computer networks |x Security measures | |
650 | 4 | |a Privacy, Right of | |
650 | 4 | |a Customer relations | |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Shriram, Ashwin |e Verfasser |0 (DE-588)1143989295 |4 aut | |
776 | 0 | 8 | |i Erscheint auch als |n Onlineausgabe |z 978-1-4987-2105-9 |
856 | 4 | 2 | |m Digitalisierung UB Regensburg - ADAM Catalogue Enrichment |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029653038&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-029653038 |
Datensatz im Suchindex
_version_ | 1804177413911871488 |
---|---|
adam_text | Contents
Preface..........................................................xiii
Acknowledgments....................................................xv
Authors..........................................................xvii
List of Abbreviations......................................... xix
1. Introduction to Data Privacy...................................1
1.1 Introduction..............................................1
1.2 What Is Data Privacy and Why Is It Important?.............3
1.2.1 Protecting Sensitive Data...........................5
1.2.2 Privacy and Anonymity: Two Sides of the Same Coin...8
1.3 Use Cases: Need for Sharing Data..........................9
1.3.1 Data Mining and Analysis...........................12
1.3.2 Software Application Testing.......................13
1.3.3 Business Operations................................13
1.4 Methods of Protecting Data...............................14
1.5 Importance of Balancing Data Privacy and Utility.........15
1.5.1 Measuring Privacy of Anonymized Data...............18
1.5.2 Measuring Utility of Anonymized Data...............19
1.6 Introduction to Anonymization Design Principles..........19
1.7 Nature of Data in the Enterprise.........................21
1.7.1 Multidimensional Data..............................21
1.7.1.1 Challenges in Privacy Preservation
of Multidimensional Data...................22
1.7.2 Transaction Data...................................22
1.7.2.1 Challenges in Privacy Preservation
of Transaction Data........................23
1.7.3 Longitudinal Data................................ 23
1.7.3.1 Challenges in Anonymizing Longitudinal
Data.......................................24
1.7.4 Graph Data.........................................24
1.7.4.1 Challenges in Anonymizing Graph Data......26
1.7.5 Time Series Data...................................26
1.7.5.1 Challenges in Privacy Preservation of Time
Series Data................................27
References................................................... 27
7 m
viii
Contents
2. Static Data Anonymization Part I: Multidimensional Data.........29
2.1 Introduction..............................................29
2.2 Classification of Privacy Preserving Methods..............29
2.3 Classification of Data in a Multidimensional Data Set.....31
2.3.1 Protecting Explicit Identifiers.....................31
2.3.2 Protecting Quasi-Identifiers........................34
2.3.2.1 Challenges in Protecting QI................35
2.3.3 Protecting Sensitive Data (SD)......................38
2.4 Group-Based Anonymization.................................42
2.4.1 k-Anonymity.........................................42
2.4.1.1 Why k-Anonymization?..................... 42
2.4.1.2 How to Generalize Data?....................47
2.4.1.3 Implementing k-Anonymization...............52
2.4.1.4 How Do You Select the Value of k?..........54
2.4.1.5 Challenges in Implementing
k-Anonymization.............................55
2.4.1.6 What Are the Drawbacks of
k-Anonymization?............................57
2.4.2 /-Diversity.........................................58
2.4.2.1 Drawbacks of /-Diversity...................59
2.4.3 t-Closeness.........................................60
2.4.3.1 What Is t-Closeness?.......................60
2.4.4 Algorithm Comparison................................60
2.5 Summary...................................................62
References.....................................................63
3. Static Data Anonymization Part II: Complex Data Structures......65
3.1 Introduction..............................................65
3.2 Privacy Preserving Graph Data.............................66
3.2.1 Structure of Graph Data.............................66
3.2.2 Privacy Model for Graph Data........................67
3.2.2.1 Identity Protection........................68
3.2.2.2 Content Protection.........................69
3.2.2.3 Link Protection............................69
3.2.2.4 Graph Metrics............................ 71
3.3 Privacy Preserving Time Series Data.......................71
3.3.1 Challenges in Privacy Preservation of Time
Series Data........................................73
3.3.1.1 High Dimensionality........................73
3.3.1.2 Background Knowledge of the Adversary.....74
3.3.1.3 Pattern Preservation.......................74
3.3.1.4 Preservation of Statistical Properties ....74
3.3.1.5 Preservation of Frequency-Domain
Properties.......................
75
Contents XX
3.3.2 Time Series Data Protection Methods ...............75
3.3.2.1 Additive Random Noise......................76
3.3.2.2 Perturbation of Time Series Data Using
Generalization: k-Anonymization............78
3.4 Privacy Preservation of Longitudinal Data.................79
3.4.1 Characteristics of Longitudinal Data...............80
3.4.1.1 Challenges in Anonymizing Longitudinal
Data.......................................80
3.5 Privacy Preservation of Transaction Data..................81
3.6 Summary...................................................83
References.....................................................83
4. Static Data Anonymization Part III: Threats to Anonymized Data....85
4.1 Threats to Anonymized Data............................... 85
4.2 Threats to Data Structures.............................. 89
4.2.1 Multidimensional Data..............................92
4.2.2 Longitudinal Data..................................92
4.2.3 Graph Data.........................................93
4.2.4 Time Series Data...................................93
4.2.5 Transaction Data...................................94
4.3 Threats by Anonymization Techniques.......................95
4.3.1 Randomization (Additive)...........................96
4.3.2 k-Anonymization....................................96
4.3.3 /-Diversity........................................96
4.3.4 t֊Closeness........................................96
4.4 Summary...................................................96
References.....................................................97
5. Privacy Preserving Data Mining.................................99
5.1 Introduction..............................................99
5.2 Data Mining: Key Functional Areas of
Multidimensional Data....................................100
5.2.1 Association Rule Mining...........................100
5.2.1.1 Privacy Preserving of Association Rule
Mining: Random Perturbation...............102
5.2.2 Clustering........................................104
5.2.2.1 A Brief Survey of Privacy Preserving
Clustering Algorithms.....................106
5.3 Summary..................................................108
References..................................................108
6. Privacy Preserving Test Data Manufacturing..................109
6.1 Introduction.............................................109
6.2 Related Work.............................................110
X
Contents
6.3 Test Data Fundamentals.....................................110
6.3.1 Testing.............................................Ill
6.3.1.1 Functional Testing: System and Integration
Testing.....................................Ill
6.3.1.2 Nonfunctional Testing.......................Ill
6.3.2 Test Data...........................................Ill
6.3.2.1 Test Data and Reliability...................112
6.3.2.2 How Are Test Data Created Today?............114
6.3.3 A Note on Subsets...................................115
6.4 Utility of Test Data: Test Coverage........................115
6.4.1 Privacy versus Utility..............................117
6.4.2 Outliers.......................................... 118
6.4.3 Measuring Test Coverage against Privacy.............119
6.5 Privacy Preservation of Test Data..........................119
6.5.1 Protecting Explicit Identifiers.....................119
6.5.1.1 Essentials of Protecting El.................120
6.5.1.2 What Do Tools Offer?........................121
6.5.1.3 How Do Masking Techniques Affect
Testing?....................................121
6.5.2 Protecting Quasi-Identifiers........................124
6.5.2.1 Essentials of Protecting QI............... 124
6.5.2.2 Tool Offerings to Anonymize QI..............125
6.5.2.3 How Does QI Anonymization Affect Test
Coverage?...................................126
6.5.3 Protecting Sensitive Data (SD)......................130
6.6 Quality of Test Data.......................................130
6.6.1 Lines of Code Covered...............................131
6.6.2 Query Ability..................................... 132
6.6.3 Time for Testing....................................133
6.6.3.1 Test Completion Criteria....................133
6.6.3.2 Time Factor.................................134
6.6.4 Defect Detection....................................135
6.7 Anonymization Design for PPTDM.............................135
6.8 Insufficiencies of Anonymized Test Data....................137
6.8.1 Negative Testing....................................137
6.8.2 Sensitive Domains...................................137
6.8.3 Nonfunctional Testing...............................138
6.8.4 Regression Testing..................................138
6.8.5 Trust Deficit..................................... 138
6.9 Summary.................................................. 138
References.......................................................139
7. Synthetic Data Generation.......................................141
7.1 Introduction...............................................141
7.2 Related Work...............................................141
Contents xi
7.3 Synthetic Data and Their Use...............................142
7.4 Privacy and Utility in Synthetic Data......................144
7.4.1 Explicit Identifiers................................144
7.4.1.1 Privacy.....................................144
7.4.1.2 Utility.....................................145
7.4.1.3 Generation Algorithms.......................145
7.4.2 Quasi-Identifiers................................. 145
7.4.2.1 Privacy.....................................146
7.4.2.2 Utility.....................................146
7.4.2.3 Generation Algorithms.......................147
7.4.3 Sensitive Data......................................148
7.4.3.1 Privacy ....................................148
7.4.3.2 Utility.....................................148
7.5 How Safe Are Synthetic Data?............................. 151
7.5.1 Testing.............................................151
7.5.1.1 Error and Exception Data....................152
7.5.1.2 Scaling.....................................152
7.5.1.3 Regression Testing..........................152
7.5.2 Data Mining.........................................152
7.5.3 Public Data.........................................152
7.6 Summary....................................................153
References.......................................................153
8. Dynamic Data Protection: Tokenization............................155
8.1 Introduction...............................................155
8.2 Revisiting the Definitions of Anonymization and Privacy....155
8.3 Understanding Tokenization.................................157
8.3.1 Dependent Tokenization..............................157
8.3.2 Independent Tokenization............................159
8.4 Use Cases for Dynamic Data Protection......................159
8.4.1 Business Operations.................................160
8.4.2 Ad Hoc Reports for Regulatory Compliance............161
8.5 Benefits of Tokenization Compared to Other Methods.........161
8.6 Components for Tokenization................................162
8.6.1 Data Store..........................................162
8.6.2 Tokenization Server.................................163
8.7 Summary....................................................163
Reference........................................................163
9. Privacy Regulations..............................................165
9.1 Introduction...............................................165
9.2 UK Data Protection Act 1998................................167
9.2.1 Definitions....................................... 167
9.2.2 Problems in DPA.....................................168
Xll
Contents
9.3 Federal Act of Data Protection of Switzerland 1992.......171
9.3.1 Storing Patients Records in the Cloud............171
9.3.2 Health Questionnaires for Job Applicants..........171
9.3.3 Transferring Pseudonymized Bank Customer Data
Outside Switzerland...............................172
9.4 Payment Card Industry Data Security Standard (PCI DSS)...172
9.5 The Health Insurance Portability and Accountability Act
of 1996 (HIPAA)..........................................174
9.5.1 Effects of Protection........................... 176
9.5.2 Anonymization Considerations......................176
9.5.2.1 Record Owner..............................177
9.5.2.2 Business Associate........................178
9.5.3 Anonymization Design for HIPAA....................178
9.5.4 Notes on Els, QIs, and SD.........................181
9.5.4.1 Explicit Identifiers......................181
9.5.4.2 Quasi-Identifiers.........................182
9.5.4.3 Sensitive Data............................182
9.6 Anonymization Design Checklist...........................182
9.7 Summary..................................................185
9.8 Points to Ponder.........................................185
References....................................................185
Appendix A: Anonymization Design Principles
for Multidimensional Data.........................................189
Appendix B: PPTDM Manifesto.......................................207
Index.............................................................209
|
any_adam_object | 1 |
author | Venkataramanan, Nataraj Shriram, Ashwin |
author_GND | (DE-588)114398921X (DE-588)1143989295 |
author_facet | Venkataramanan, Nataraj Shriram, Ashwin |
author_role | aut aut |
author_sort | Venkataramanan, Nataraj |
author_variant | n v nv a s as |
building | Verbundindex |
bvnumber | BV044247889 |
callnumber-first | H - Social Science |
callnumber-label | HF5548 |
callnumber-raw | HF5548.37 |
callnumber-search | HF5548.37 |
callnumber-sort | HF 45548.37 |
callnumber-subject | HF - Commerce |
classification_rvk | ST 276 |
ctrlnum | (OCoLC)992493604 (DE-599)BVBBV044247889 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01790nam a2200457 c 4500</leader><controlfield tag="001">BV044247889</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20181017 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">170329s2017 xxu|||| |||| 00||| eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">016009691</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781498721042</subfield><subfield code="9">978-1-4987-2104-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)992493604</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV044247889</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">US</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-355</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-M382</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-706</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">HF5548.37</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Venkataramanan, Nataraj</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)114398921X</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Data privacy</subfield><subfield code="b">principles and practice</subfield><subfield code="c">Nataraj Venkataramanan ; Ashwin Shriram</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boca Raton ; London ; New York</subfield><subfield code="b">CRC Press</subfield><subfield code="c">[2017]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xx, 211 Seiten</subfield><subfield code="b">Diagramme</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Literaturangaben und Index</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Management information systems</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Privacy, Right of</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Customer relations</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Shriram, Ashwin</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1143989295</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Onlineausgabe</subfield><subfield code="z">978-1-4987-2105-9</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Regensburg - ADAM Catalogue Enrichment</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029653038&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029653038</subfield></datafield></record></collection> |
id | DE-604.BV044247889 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:47:41Z |
institution | BVB |
isbn | 9781498721042 |
language | English |
lccn | 016009691 |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-029653038 |
oclc_num | 992493604 |
open_access_boolean | |
owner | DE-355 DE-BY-UBR DE-473 DE-BY-UBG DE-M382 DE-739 DE-706 |
owner_facet | DE-355 DE-BY-UBR DE-473 DE-BY-UBG DE-M382 DE-739 DE-706 |
physical | xx, 211 Seiten Diagramme |
publishDate | 2017 |
publishDateSearch | 2017 |
publishDateSort | 2017 |
publisher | CRC Press |
record_format | marc |
spelling | Venkataramanan, Nataraj Verfasser (DE-588)114398921X aut Data privacy principles and practice Nataraj Venkataramanan ; Ashwin Shriram Boca Raton ; London ; New York CRC Press [2017] xx, 211 Seiten Diagramme txt rdacontent n rdamedia nc rdacarrier Literaturangaben und Index Data protection Management information systems Security measures Computer networks Security measures Privacy, Right of Customer relations Datensicherung (DE-588)4011144-1 gnd rswk-swf Datensicherung (DE-588)4011144-1 s DE-604 Shriram, Ashwin Verfasser (DE-588)1143989295 aut Erscheint auch als Onlineausgabe 978-1-4987-2105-9 Digitalisierung UB Regensburg - ADAM Catalogue Enrichment application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029653038&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Venkataramanan, Nataraj Shriram, Ashwin Data privacy principles and practice Data protection Management information systems Security measures Computer networks Security measures Privacy, Right of Customer relations Datensicherung (DE-588)4011144-1 gnd |
subject_GND | (DE-588)4011144-1 |
title | Data privacy principles and practice |
title_auth | Data privacy principles and practice |
title_exact_search | Data privacy principles and practice |
title_full | Data privacy principles and practice Nataraj Venkataramanan ; Ashwin Shriram |
title_fullStr | Data privacy principles and practice Nataraj Venkataramanan ; Ashwin Shriram |
title_full_unstemmed | Data privacy principles and practice Nataraj Venkataramanan ; Ashwin Shriram |
title_short | Data privacy |
title_sort | data privacy principles and practice |
title_sub | principles and practice |
topic | Data protection Management information systems Security measures Computer networks Security measures Privacy, Right of Customer relations Datensicherung (DE-588)4011144-1 gnd |
topic_facet | Data protection Management information systems Security measures Computer networks Security measures Privacy, Right of Customer relations Datensicherung |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029653038&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT venkataramanannataraj dataprivacyprinciplesandpractice AT shriramashwin dataprivacyprinciplesandpractice |