Protecting privacy in terrorist tracking applications l.jpg
Advertisement
This presentation is the property of its rightful owner.
1 / 5

Terrorist PowerPoint PPT Presentation

Download Presentation

Terrorist

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -

Presentation Transcript


Protecting privacy in terrorist tracking applications l.jpg

Protecting Privacy in Terrorist Tracking Applications


Privacy appliance l.jpg

privacy appliance

privacy appliance

privacy appliance

cross-source privacy appliance

user query

data source

data source

Government owned

Independently operated

Privately owned

data source

Privacy Appliance

  • Standalone devices

    • Under private control

    • Better assurance of correct operation

  • Sits between the analyst and each private data source

    • Easily added to an enterprise’s computing infrastructure

    • Like firewalls

Benefits

  • Private data stays in private hands

  • Privacy controls isolated from the government


Access control l.jpg

  • For lowest authorization:

    • Withhold identifying attributes

    • Prevent completion of inference channels

  • The privacy appliance will recognize

    • Which queries touch inference channels

    • Whether the user is authorized for the query

Analyst query

Check authorizations

Input special authorizations

Access control DB

Modify query

as needed to withhold data

Mark access “history”

  • For higher authorization:

    • Can retrieve specific identifying info

    • Must specify scope of data authorized

Analysis can’t combine non-sensitive queries to obtain sensitive info

Send modified query to data source

Access Control


Inference tool l.jpg

Inference Tool

  • Earlier life: MLS databases

    • Detect inference channels from unclassified to classified data

  • Now: Privacy-Protection

    • Detect inference channels from non-sensitive to sensitive data

    • Example:

      • Select count(name) where gender = female

      • Select avg(grade) where gender = female

= 1


Systems issues l.jpg

Systems Issues

  • Logging

    • Log classified stuff at third-party sites!

    • Search through (encrypted) logs to prove abuse.

  • Trust issues

    • Finally a legitimate use for Palladium!

    • This is a big system!


  • Login