ADDRESSING BIG DATA CONCERNS THROUGH ANONYMIZATION

Addressing Big Data Concerns

Data privacy and security concerns have mounted in the last few years as the potential of Big Data is tapped and more effectively realized. The bits and bytes of our lives are, more now than ever before, tracked, recorded, and analyzed. And while providing insights both noteworthy and frivolous, it sometimes feels a little like we’re living in the Matrix as the information we consider personal and private is swiftly logged, categorized, and stored in colossal databases, no longer belonging solely to the individual but available to whoever is granted (or illicitly forces) access.

Data Security & Data Privacy

Though the concerns of data security and privacy are typically linked they are two separate, although equally important, matters. Data security refers to the confidentiality and protection of collected data and involves the processes which ensure data is accessed only by those with the necessary authorization. It further warrants that the data being used is both accurate and reliable. When implementing data security plans, most organizations address the obligation of collecting only the required information, securing it during storage, and destroying that which is no longer needed. Data privacy, on the other hand, is the appropriate use of data which addresses organizations only collecting and using information according to agreed purposes and conforming to the regulations of the organization, the state, and the country. Organizations that collect data against an individual’s wishes, or sell it on without first seeking consent, are obstructing data privacy.

De-Identifying Personal Data

Government organizations, healthcare providers, financial institutions, and just about every other responsible organization collecting personal data are under pressure to implement adequate privacy and security policies. Increasingly, the de-identification (also termed anonymizing in the EU) of personal data before sharing it with marketers or research institutions is occurring, but this is not a foolproof strategy. Because so much data is available from such a variety of sources, it’s possible that individuals can be identified through combinations of personal attributes.

Fujitsu Laboratories Ltd. has recently involved itself in the protection of shared personal data, and CloudTweaks discussed the issues and potential solutions with Kouichi Ito, Research Manager of Fujitsu Laboratories Ltd.’s Cyber & Data Security Project. Says Ito, “To support the safe utilization of personal data, in Japan, the Protection of Personal Information Act is being updated. While technologies for de-identification processing are an important tool towards this aim, Fujitsu Laboratories posits that robust assessments of the risks associated with the data itself are indispensable for achieving secure anonymization.”

Some experts suggest that correctly anonymizing data is, in fact, a step further than de-identifying it as it removes all of the identifiable information from data and results in an assemblage of data that no longer requires protection, but instead offers only broad-spectrum data ideal for research and analytics.

New Technologies Addressing Concerns

Currently developing new technology that searches anonymized data for the most easily identifiable records and indicates problematic attribute combinations with a quantified score, Fujitsu plans the practical implementation of their solution for 2017. Says Ito, “Professionals in diverse fields, including marketing and health care, have an increasing demand to utilize personal data. Fujitsu Laboratories’ hope is that our new technology, by visualizing the privacy risks of personal data, will streamline the use of secure, de-identified data, thereby facilitating the co-creation of businesses among Fujitsu’s customers.”

Thanks in part to governments recognizing the necessity of, and insisting on, high data security and privacy, organizations are working hard to mitigate the risks which characterize Big Data and the sharing of it. Few of us would deny the promise of Big Data analytics, but knowing our personal information remains private and secure makes it a far more exciting mechanism.

By Jennifer Klostermann

Threat Security
Azure Red Hat OpenShift: What You Should Know What Is Azure Red Hat OpenShift? Red Hat OpenShift provides a Kubernetes platform for enterprises. Azure Red Hat OpenShift permits you to deploy fully-managed OpenShift clusters in ...
Yuliya Melnik
Heroku or AWS Cloud infrastructures are gradually starting to penetrate into an increasing number of areas and various businesses. And this is not surprising because such a ploy allows you to improve internal processes, protect ...
Brian Rue
What’s Holding DevOps Back And How Developers and Businesses Can Vault Forward to Improve and Succeed Developers spend a lot of valuable time – sometimes after being woken up in the middle of the night ...
Martin Mendelsohn
The Colonial Pipeline Dilemma The Colonial Pipeline is one of a number of essential energy and infrastructure assets that have been recently targeted by the global ransomware group DarkSide, and other aspiring non-state actors, with ...
Rakesh Soni
Customer Experience: Living In A Connected World and Winning the IoT Race IoT and smart interconnected systems have already created an invisible aura of convenience, usability, and a rich user experience around us. However, when ...

SECURITY TRAINING

  • Isc2

    ISC2

    (ISC)² provides IT training, certifications, and exams that run online, on your premises, or in classrooms. Self-study resources are available. You can also train groups of 10 or more of your employees. If you want a job in cybersecurity, this is the route to take.

  • App Academy

    App Academy

    Immersive software engineering programs. No experience required. Pay $0 until you're hired. Join an online info session to learn more

  • Cybrary

    Cybrary

    CYBRARY Open source Cyber Security learning. Free for everyone, forever. The world's largest cyber security community. Cybrary provides free IT training and paid IT certificates. Courses for beginners, intermediates, and advanced users are available.

  • Plural Site

    Pluralsite

    Pluralsight provides online courses on popular programming languages and developer tools. Other courses cover fields such as IT security best practices, server infrastructure, and virtualization.