26.08.2016 Views

trademark

2c2kIhh

2c2kIhh

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

6.0 Scalable and Composable Privacy-Preserving Analytics (cont.)<br />

6.8 Encrypt data at rest<br />

6.8.1 Why?<br />

To prevent access to sensitive information. Threats against end user devices may allow<br />

unauthorized parties to access personal information. To prevent such inappropriate<br />

disclosures, particularly of personally identifiable information (PII) and other sensitive<br />

data, the confidentiality of data needs to be secured on the devices.<br />

6.8.2 How?<br />

The primary security control for restricting access to sensitive information stored on<br />

end-user devices is encryption. Encryption can be applied granularly, such as to an<br />

individual file containing sensitive information, or broadly, such as encrypting all stored<br />

data. In the case of database infrastructure, primary keys are used for indexing and<br />

joining tables. Therefore, encryption may not be applicable. Sensitive data, such as<br />

personally identifiable information, should not be used as a primary key. Ensure that the<br />

encryption algorithm used is current and appropriate for the given data set.<br />

6.9 Implement privacy-preserving data composition<br />

6.9.1 Why?<br />

To address privacy concerns preemptively. In some real-world circumstances (such as those<br />

that may occur in the healthcare industry), it is often necessary to aggregate and/or query<br />

data from multiple data sources, such as electronic healthcare record systems in multiple<br />

hospitals or research institutes. Privacy issues are likely to emerge during that process.<br />

6.9.2 How?<br />

Ensure that leakage of private information is controlled when multiple databases and/or<br />

services are linked by reviewing and monitoring the functionality that links them.<br />

6.10 Design and implement linking anonymized datastores<br />

6.10.1 Why?<br />

To ensure privacy. Even if data in each datastore is anonymized (i.e. personally<br />

identifiable information is appropriately removed), this is not often sufficient if multiple<br />

CLOUD SECURITY ALLIANCE Big Data Working Group Guidance<br />

© Copyright 2016, Cloud Security Alliance. All rights reserved.<br />

35

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!