top of page
Autumn Rivers

Future-proofing big data security

Today’s solutions miss the mark

Today, government teams have three options for attempting to share data, all of them are far from optimal:

  • Complex legal contracts often contain terms so limiting that they don’t allow government teams to collaborate effectively. In addition, creating these agreements is typically expensive and requires months to complete.

  • Data anonymization/de-identification is hard to execute well. It is ineffective if it doesn’t meet three criteria: individualization (it must not be possible to identify an individual), correlation (it must not be possible to cross-check multiple data sets to identify an individual) and inference (it must not be possible to deduce information about an individual from the data set).

  • Other technologies: homomorphic encryption is a slow process that dramatically taxes compute performance, especially problematic given that many government computer systems are not up to date. Differential privacy introduces inaccuracies to the eventual calculations. Secure enclaves are hardware dependent, susceptible to known hacker attacks and difficult to update.


Opmerkingen


bottom of page