ADDRESSING BIG DATA CONCERNS THROUGH ANONYMIZATION

Addressing Big Data Concerns

Data privacy and security concerns have mounted in the last few years as the potential of Big Data is tapped and more effectively realized. The bits and bytes of our lives are, more now than ever before, tracked, recorded, and analyzed. And while providing insights both noteworthy and frivolous, it sometimes feels a little like we’re living in the Matrix as the information we consider personal and private is swiftly logged, categorized, and stored in colossal databases, no longer belonging solely to the individual but available to whoever is granted (or illicitly forces) access.

Data Security & Data Privacy

Though the concerns of data security and privacy are typically linked they are two separate, although equally important, matters. Data security refers to the confidentiality and protection of collected data and involves the processes which ensure data is accessed only by those with the necessary authorization. It further warrants that the data being used is both accurate and reliable. When implementing data security plans, most organizations address the obligation of collecting only the required information, securing it during storage, and destroying that which is no longer needed. Data privacy, on the other hand, is the appropriate use of data which addresses organizations only collecting and using information according to agreed purposes and conforming to the regulations of the organization, the state, and the country. Organizations that collect data against an individual’s wishes, or sell it on without first seeking consent, are obstructing data privacy.

De-Identifying Personal Data

Government organizations, healthcare providers, financial institutions, and just about every other responsible organization collecting personal data are under pressure to implement adequate privacy and security policies. Increasingly, the de-identification (also termed anonymizing in the EU) of personal data before sharing it with marketers or research institutions is occurring, but this is not a foolproof strategy. Because so much data is available from such a variety of sources, it’s possible that individuals can be identified through combinations of personal attributes.

Fujitsu Laboratories Ltd. has recently involved itself in the protection of shared personal data, and CloudTweaks discussed the issues and potential solutions with Kouichi Ito, Research Manager of Fujitsu Laboratories Ltd.’s Cyber & Data Security Project. Says Ito, “To support the safe utilization of personal data, in Japan, the Protection of Personal Information Act is being updated. While technologies for de-identification processing are an important tool towards this aim, Fujitsu Laboratories posits that robust assessments of the risks associated with the data itself are indispensable for achieving secure anonymization.”

Some experts suggest that correctly anonymizing data is, in fact, a step further than de-identifying it as it removes all of the identifiable information from data and results in an assemblage of data that no longer requires protection, but instead offers only broad-spectrum data ideal for research and analytics.

New Technologies Addressing Concerns

Currently developing new technology that searches anonymized data for the most easily identifiable records and indicates problematic attribute combinations with a quantified score, Fujitsu plans the practical implementation of their solution for 2017. Says Ito, “Professionals in diverse fields, including marketing and health care, have an increasing demand to utilize personal data. Fujitsu Laboratories’ hope is that our new technology, by visualizing the privacy risks of personal data, will streamline the use of secure, de-identified data, thereby facilitating the co-creation of businesses among Fujitsu’s customers.”

Thanks in part to governments recognizing the necessity of, and insisting on, high data security and privacy, organizations are working hard to mitigate the risks which characterize Big Data and the sharing of it. Few of us would deny the promise of Big Data analytics, but knowing our personal information remains private and secure makes it a far more exciting mechanism.

By Jennifer Klostermann

Cloud For Dummies.png
The Backup.png
The Manuscript.png
Answer To Everything.png
Ronald van Loon
Environmental impacts are far reaching, the effects of climate change devastating, and organizations are striving to shape their business in a way that is environmentally sustainable and equipped to thrive in the future. Ronald van ...
Ronald van Loon
Getting Future Ready Hybrid cloud is the foundation in which modernized organizations are built, and organizations need a modern platform and infrastructure to get the most out of their hybrid cloud environments. Organizations need to ...
Boominathan Shanmugam
Predictive Service Delivery Operations Service delivery operations are vital for the success of Digital Service Providers (DSPs). However, most DSPs struggle with the conventional service delivery process leading to high customer churn and reduced NPS ...
Ian Hayes
Secure HTML Forms With the frequency and severity of cyberattacks on the rise (up 31% from 2020 to 2021, for a total loss of $6.9 billion), businesses need secure methods of data collection to protect ...
Mark Ardito
‘Legacy systems’ often get a bit of a rough time in the IT community. But perhaps this is unfair. After all, in many cases you’re talking about software platforms that have lasted and been effective ...