Bài giảng Bảo mật cơ sở dữ liệu: Security methods for statistical databases - Trần Thị Kim Chi
Số trang: 24
Loại file: pptx
Dung lượng: 352.17 KB
Lượt xem: 6
Lượt tải: 0
Xem trước 3 trang đầu tiên của tài liệu này:
Thông tin tài liệu:
Bài giảng "Bảo mật cơ sở dữ liệu: Security methods for statistical databases" trình bày các nội dung: Laws, HIPAA compliance, types of statistical databases, security methods, query set restriction, microaggregation, output perturbation,... Mời các bạn cùng tham khảo.
Nội dung trích xuất từ tài liệu:
Bài giảng Bảo mật cơ sở dữ liệu: Security methods for statistical databases - Trần Thị Kim ChiSecurity Methods forStatistical Databases Introduction§ Statistical Databases containing medical information are often used for research§ Some of the data is protected by laws to help protect the privacy of the patient§ Proper security precautions must be implemented to comply with laws and respect the sensitivity of the data Accuracy vs. ConfidentialityAccuracy – Confidentiality – Researchers Patients, lawswant to extract and databaseaccurate and administratorsmeaningful data want to maintain the privacy of patients and the confidentiality of their information Laws§ Health Insurance Portability and Accountability Act – HIPAA (Privacy Rule)§ Covered organizations must comply by April 14, 2003§ Designed to improve efficiency of healthcare system by using electronic exchange of data and maintaining security§ Covered entities (health plans, healthcare clearinghouses, healthcare providers) may not use or disclose protected information except as permitted or required§ Privacy Rule establishes a “minimum necessary standard” for the purpose of making covered entities evaluate their current regulations and security precautions HIPAA Compliance§ Companies offer 3rd Party Certification of covered entities§ Such companies will check your company and associating companies for compliance with HIPAA§ Can help with rapid implementation and compliance to HIPAA regulations Types of Statistical Databases§ Static – a static § Dynamic – changes database is made continuously to reflect once and never real-time data changes § Example: most online§ Example: U.S. Census research databasesSecurity Methods§ Access Restriction§ Query Set Restriction§ Microaggregation§ Data Perturbation§ Output Perturbation§ Auditing§ Random Sampling Access Restriction§ Databases normally have different access levels for different types of users§ User ID and passwords are the most common methods for restricting access § In a medical database: § Doctors/Healthcare Representative – full access to information § Researchers – only access to partial information (e.g. aggregate information) Query Set Restriction§ A query-set size control can limit the number of records that must be in the result set§ Allows the query results to be displayed only if the size of the query set satisfies the condition§ Setting a minimum query-set size can help protect against the disclosure of individual data Query Set Restriction§ Let K represents the minimum number or records to be present for the query set§ Let R represents the size of the query set§ The query set can only be displayed if K R Query Set Restriction Query 2 Query 1 Original Database Query 2 Query Results K ResultsQuery 1 K QueryResults Results Microaggregation§ Raw (individual) data is grouped into small aggregates before publication§ The average value of the group replaces each value of the individual§ Data with the most similarities are grouped together to maintain data accuracy§ Helps to prevent disclosure of individual data Microaggregation§ National Agricultural Statistics Service (NASS) publishes data about farms§ To protect against data disclosure, data is only released at the county level§ Farms in each county are averaged together to maintain as much purity, yet still protect against disclosureMicroaggregation Age Microaggregated Age 10 11.67 12 Average 11.67 13 11.67 57 56.67 54 Average 56.67 59 56.67 Microaggregation UserOriginal Averaged Microaggregated Data Data Data Perturbation§ Perturbed data is raw data with noise added§ Pro: With perturbed databases, if unauthorized data is accessed, the true value is not disclosed§ Con: Data perturbation runs the ri ...
Nội dung trích xuất từ tài liệu:
Bài giảng Bảo mật cơ sở dữ liệu: Security methods for statistical databases - Trần Thị Kim ChiSecurity Methods forStatistical Databases Introduction§ Statistical Databases containing medical information are often used for research§ Some of the data is protected by laws to help protect the privacy of the patient§ Proper security precautions must be implemented to comply with laws and respect the sensitivity of the data Accuracy vs. ConfidentialityAccuracy – Confidentiality – Researchers Patients, lawswant to extract and databaseaccurate and administratorsmeaningful data want to maintain the privacy of patients and the confidentiality of their information Laws§ Health Insurance Portability and Accountability Act – HIPAA (Privacy Rule)§ Covered organizations must comply by April 14, 2003§ Designed to improve efficiency of healthcare system by using electronic exchange of data and maintaining security§ Covered entities (health plans, healthcare clearinghouses, healthcare providers) may not use or disclose protected information except as permitted or required§ Privacy Rule establishes a “minimum necessary standard” for the purpose of making covered entities evaluate their current regulations and security precautions HIPAA Compliance§ Companies offer 3rd Party Certification of covered entities§ Such companies will check your company and associating companies for compliance with HIPAA§ Can help with rapid implementation and compliance to HIPAA regulations Types of Statistical Databases§ Static – a static § Dynamic – changes database is made continuously to reflect once and never real-time data changes § Example: most online§ Example: U.S. Census research databasesSecurity Methods§ Access Restriction§ Query Set Restriction§ Microaggregation§ Data Perturbation§ Output Perturbation§ Auditing§ Random Sampling Access Restriction§ Databases normally have different access levels for different types of users§ User ID and passwords are the most common methods for restricting access § In a medical database: § Doctors/Healthcare Representative – full access to information § Researchers – only access to partial information (e.g. aggregate information) Query Set Restriction§ A query-set size control can limit the number of records that must be in the result set§ Allows the query results to be displayed only if the size of the query set satisfies the condition§ Setting a minimum query-set size can help protect against the disclosure of individual data Query Set Restriction§ Let K represents the minimum number or records to be present for the query set§ Let R represents the size of the query set§ The query set can only be displayed if K R Query Set Restriction Query 2 Query 1 Original Database Query 2 Query Results K ResultsQuery 1 K QueryResults Results Microaggregation§ Raw (individual) data is grouped into small aggregates before publication§ The average value of the group replaces each value of the individual§ Data with the most similarities are grouped together to maintain data accuracy§ Helps to prevent disclosure of individual data Microaggregation§ National Agricultural Statistics Service (NASS) publishes data about farms§ To protect against data disclosure, data is only released at the county level§ Farms in each county are averaged together to maintain as much purity, yet still protect against disclosureMicroaggregation Age Microaggregated Age 10 11.67 12 Average 11.67 13 11.67 57 56.67 54 Average 56.67 59 56.67 Microaggregation UserOriginal Averaged Microaggregated Data Data Data Perturbation§ Perturbed data is raw data with noise added§ Pro: With perturbed databases, if unauthorized data is accessed, the true value is not disclosed§ Con: Data perturbation runs the ri ...
Tìm kiếm theo từ khóa liên quan:
Bài giảng Bảo mật cơ sở dữ liệu Bảo mật cơ sở dữ liệu Cơ sở dữ liệu HIPAA compliance Types of statistical databases Security methods Query set restriction Output perturbationGợi ý tài liệu liên quan:
-
62 trang 401 3 0
-
Đề thi kết thúc học phần học kì 2 môn Cơ sở dữ liệu năm 2019-2020 có đáp án - Trường ĐH Đồng Tháp
5 trang 377 6 0 -
Giáo trình Cơ sở dữ liệu: Phần 2 - TS. Nguyễn Hoàng Sơn
158 trang 291 0 0 -
13 trang 290 0 0
-
Phân tích thiết kế hệ thống - Biểu đồ trạng thái
20 trang 284 0 0 -
Tài liệu học tập Tin học văn phòng: Phần 2 - Vũ Thu Uyên
85 trang 254 1 0 -
Đề cương chi tiết học phần Quản trị cơ sở dữ liệu (Database Management Systems - DBMS)
14 trang 244 0 0 -
8 trang 186 0 0
-
Giáo trình về dữ liệu và các mô hình cơ sở dữ liệu
62 trang 182 0 0 -
Giáo trình Cơ sở dữ liệu: Phần 2 - Đại học Kinh tế TP. HCM
115 trang 175 0 0