DocumentCode :
249453
Title :
Making Big Data, Privacy, and Anonymization Work Together in the Enterprise: Experiences and Issues
Author :
Sedayao, Jeff ; Bhardwaj, Romil ; Gorade, Nakul
Author_Institution :
Intel Corp., Santa Clara, CA, USA
fYear :
2014
fDate :
June 27 2014-July 2 2014
Firstpage :
601
Lastpage :
607
Abstract :
Some scholars feel that Big Data techniques render anonymization (also known as de-identification) useless as a privacy protection technique. This paper discusses our experiences and issues encountered when we successfully combined anonymization, privacy protection, and Big Data techniques to analyze usage data while protecting the identities of users. Our Human Factors Engineering team wanted to use web page access logs and Big Data tools to improve usability of Intel´s heavily used internal web portal. To protect Intel employees´ privacy, they needed to remove personally identifying information (PII) from the portal´s usage log repository but in a way that did not affect the use of Big Data tools to do analysis or the ability to re-identify a log entry in order to investigate unusual behavior. To meet these objectives, we created an open architecture for anonymization that allowed a variety of tools to be used for both de-identifying and re-identifying web log records. In the process of implementing our architecture, we found that enterprise data has properties different from the standard examples in anonymization literature. Our proof of concept showed that Big Data techniques could yield benefits in the enterprise environment even when working on anonymized data. We also found that despite masking obvious PII like usernames and IP addresses, the anonymized data was vulnerable to correlation attacks. We explored the tradeoffs of correcting these vulnerabilities and found that User Agent (Browser/OS) information strongly correlates to individual users. While browser fingerprinting has been known before, it has implications for tools and products currently used to de-identify enterprise data. We conclude that Big Data, anonymization, and privacy can be successfully combined but requires analysis of data sets to make sure that anonymization is not vulnerable to correlation attacks.
Keywords :
Internet; business data processing; cloud computing; data privacy; Web page access logs; anonymization; anonymized data; big data techniques; enterprise environment; internal Web portal; privacy protection technique; user agent information; Big data; Browsers; Cryptography; Data privacy; IP networks; Portals; Privacy; Anonymization; Big Data; Hadoop; de-identification; encryption; privacy; tokenization;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Big Data (BigData Congress), 2014 IEEE International Congress on
Conference_Location :
Anchorage, AK
Print_ISBN :
978-1-4799-5056-0
Type :
conf
DOI :
10.1109/BigData.Congress.2014.92
Filename :
6906834
Link To Document :
بازگشت