【24h】

Data Privacy Using MASKETEER

机译:使用Masketeer数据的隐私

获取原文

摘要

Advances in storage, networks, and hardware technology have resulted in an explosion of data and given rise to multiple sources of overlapping data. This, combined with general apathy towards privacy issues while designing systems and processes, leads to frequent breaches in personal identity and data security. What makes this worse is that many of these breaches are committed by the legitimate users of the data. Major countries like the U.S., Japan, Canada, Australia and EU have come up with strict data distribution laws which demand their organizations to implement proper data security measures that respect personal privacy and prohibit dissemination of raw data outside the country. Since companies are not able to provide real data, they often resort to completely random data. It is obvious that such a data would offer complete privacy, but would have very low utility. This has serious implications for an IT services company like Tata Consultancy Services Ltd. (TCS), since application development and testing environments rely on realistic test data to verify that the applications provide the functionality and reliability they were designed to deliver. It is always desirable that the test data is similar to, if not the same as, the production data. Hence, deploying proven tools that make de-identifying production data easy, meaningful and cost-effective is essential. Data masking methods came into existence to permit the legitimate use of data and avoid misuse. In this paper, we consider various such techniques to come up with a comprehensive solution for data privacy requirements. We present a detailed methodology and solutions for enterprise-wide masking. We also present the data masking product MASKETEER, developed at TCS, which implements these techniques for providing maximum privacy for data while maintaining good utility.
机译:存储,网络和硬件技术的进步导致数据爆炸,并给予多个重叠数据来源。这使得在设计系统和流程的同时,将普遍存在隐私问题结合在一起,导致个人身份和数据安全频繁违反。更糟糕的是,许多这些违规者都是由数据的合法用户犯下的。美国,日本,加拿大,澳大利亚和欧盟这样的主要国家已经提出了严格的数据分配法,要求他们的组织实施尊重个人隐私的适当数据安全措施,并禁止传播国家以外的原始数据。由于公司无法提供真实数据,因此他们经常诉诸完全随机数据。很明显,这种数据将提供完整的隐私,但实用性非常低。这对Tata咨询服务有限公司(TCS)这样的IT服务公司具有严重影响,因为应用程序开发和测试环境依赖于现实的测试数据来验证应用程序提供的功能和可靠性,它们旨在提供送达。总是希望测试数据类似于,如果不相同,则为生产数据。因此,部署经过验证的工具,使取消识别生产数据容易,有意义,具有成本效益至关重要。数据掩蔽方法存在,以允许合法使用数据并避免滥用。在本文中,我们考虑了各种这些技术来提出全面的数据隐私要求的解决方案。我们为企业级屏蔽提供了详细的方法和解决方案。我们还提供了在TCS开发的数据掩蔽产品Masketeer,其实现了这些技术,用于在保持良好实用程序的同时为数据提供最大隐私。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号