• DocumentCode
    249453
  • Title

    Making Big Data, Privacy, and Anonymization Work Together in the Enterprise: Experiences and Issues

  • Author

    Sedayao, Jeff ; Bhardwaj, Romil ; Gorade, Nakul

  • Author_Institution
    Intel Corp., Santa Clara, CA, USA
  • fYear
    2014
  • fDate
    June 27 2014-July 2 2014
  • Firstpage
    601
  • Lastpage
    607
  • Abstract
    Some scholars feel that Big Data techniques render anonymization (also known as de-identification) useless as a privacy protection technique. This paper discusses our experiences and issues encountered when we successfully combined anonymization, privacy protection, and Big Data techniques to analyze usage data while protecting the identities of users. Our Human Factors Engineering team wanted to use web page access logs and Big Data tools to improve usability of Intel´s heavily used internal web portal. To protect Intel employees´ privacy, they needed to remove personally identifying information (PII) from the portal´s usage log repository but in a way that did not affect the use of Big Data tools to do analysis or the ability to re-identify a log entry in order to investigate unusual behavior. To meet these objectives, we created an open architecture for anonymization that allowed a variety of tools to be used for both de-identifying and re-identifying web log records. In the process of implementing our architecture, we found that enterprise data has properties different from the standard examples in anonymization literature. Our proof of concept showed that Big Data techniques could yield benefits in the enterprise environment even when working on anonymized data. We also found that despite masking obvious PII like usernames and IP addresses, the anonymized data was vulnerable to correlation attacks. We explored the tradeoffs of correcting these vulnerabilities and found that User Agent (Browser/OS) information strongly correlates to individual users. While browser fingerprinting has been known before, it has implications for tools and products currently used to de-identify enterprise data. We conclude that Big Data, anonymization, and privacy can be successfully combined but requires analysis of data sets to make sure that anonymization is not vulnerable to correlation attacks.
  • Keywords
    Internet; business data processing; cloud computing; data privacy; Web page access logs; anonymization; anonymized data; big data techniques; enterprise environment; internal Web portal; privacy protection technique; user agent information; Big data; Browsers; Cryptography; Data privacy; IP networks; Portals; Privacy; Anonymization; Big Data; Hadoop; de-identification; encryption; privacy; tokenization;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Big Data (BigData Congress), 2014 IEEE International Congress on
  • Conference_Location
    Anchorage, AK
  • Print_ISBN
    978-1-4799-5056-0
  • Type

    conf

  • DOI
    10.1109/BigData.Congress.2014.92
  • Filename
    6906834