SlideShare una empresa de Scribd logo
1 de 40
Descargar para leer sin conexión
Partners in Building UAE's Security & Economy




 Privacy in the Age of
 Big Data




                                                                                                                                       © 2013 Emirates Identity Authority. All rights reserved
 Presented by Dr. Ali M. Al-Khouri




                                                                                                                   www.emiratesid.ae
 In: Big Data Systems, Applications and Privacy Conference –
 Organised by New York University, Abu Dhabi, UAE.
 10 – 11 March 2013 | Injazat Data Systems | Abu Dhabi | UAE
 Federal Authority | ‫هيئــــــــة اتحــــــــــــادية‬
 Our Vision: To be a role model and reference point in proofing individual identity and build wealth informatics
 that guarantees innovative and sophisticated services for the benefit of UAE
Agenda
                      • Introduction: The Age of Big Data
                      • Big Data Characteristics
                      • Constructing Identity from Digital Behaviour
                      • Government IdM and Privacy
                      • Concluding Remarks




Federal Authority   | ‫هيئــــــــة اتحــــــــــــادية‬                 www.emiratesid.ae
                                                                       © 2012 Emirates Identity Authority. All rights reserved
Agenda
                      • Introduction: The Age of Big Data
                      • Introduction: The Age of Big Data
                      • Big Data Characteristics
                      • Constructing Identity from Digital Behaviour
                      • Government IdM and Privacy
                      • Concluding Remarks




Federal Authority   | ‫هيئــــــــة اتحــــــــــــادية‬                 www.emiratesid.ae
                                                                       © 2012 Emirates Identity Authority. All rights reserved
Big Data in Digital World ?




     • The proliferation of modern technologies, smart devices and
                                              Climate Change
       popularity of social networking is generating unprecedented
       amounts of data, both structured and unstructured, whether it be
       text, audio or video.

     • Data has become                                   ubiquitous in this digital world.
     • Sheer amount of bytes that we generate daily is indeed mind
       boggling!

Federal Authority   | ‫هيئــــــــة اتحــــــــــــادية‬                                       www.emiratesid.ae
                                                                                             © 2012 Emirates Identity Authority. All rights reserved
The Age of Big Data ?

              every day, we create
              2.5 quintillion                                    bytes
              of data ..
                                                                                 This data is
                                                                                  big data
              90%                                   of the data in the
              world today has been created                               Climate Change
              in the last two years.

              IBM Report


                We are truly in a
                digital explosion era!


Federal Authority   | ‫هيئــــــــة اتحــــــــــــادية‬                           www.emiratesid.ae
                                                                                 © 2012 Emirates Identity Authority. All rights reserved
Data Growth
                                                               112 Zettabytes


                        all computer hard drives in the
                        world = 160 exabytes in 2006

                        all storage systems didn’t reach
                        one zettabyte of information in
                        2012!
                                                         295




    Global Growth of Digital Storage Capacity 1986-2021
                    By 2020, 112 Zettabytes of data (75% growth rate)
                    One Zettabyte = 1,000,000,000,000,000,000,000 byte, or 1000 exabytes
Federal Authority   | ‫هيئــــــــة اتحــــــــــــادية‬                          www.emiratesid.ae
                                                                                © 2012 Emirates Identity Authority. All rights reserved
Big Data ?

  • is generated from practically
    every where:
             - Social media sites
               (facebook, twitter, linked-in..)
             - digital pictures and videos,
             - e-mails,
             - purchase transaction
               records,                                  Climate Change
             - cell phone, GPS signals,
             - geo-stationary satellites,
             - meteorological sensors
             - to name a few.

  • This continues to grow at an
    exponential rate.

Federal Authority   | ‫هيئــــــــة اتحــــــــــــادية‬           www.emiratesid.ae
                                                                 © 2012 Emirates Identity Authority. All rights reserved
Agenda
                      • Introduction: The Age of Big Data
                      • Big Data Characteristics
                      • Big Data Characteristics
                      • Constructing Identity from Digital Behaviour
                      • Government IdM and Privacy
                      • Concluding Remarks




Federal Authority   | ‫هيئــــــــة اتحــــــــــــادية‬                 www.emiratesid.ae
                                                                       © 2012 Emirates Identity Authority. All rights reserved
Big Data characteristics?



        • Big Data has come
          to be characterized
          by the Volume,
          Velocity and
          Variety of Data that
          is generated.

        • These constitute the
          3Vs of Big Data.




                                                         TWDI Best Practices Report Q4 2011- Big Data Analysis- Philip Russom

Federal Authority   | ‫هيئــــــــة اتحــــــــــــادية‬                                                 www.emiratesid.ae
                                                                                                       © 2012 Emirates Identity Authority. All rights reserved
3Vs of Big Data ?



                                                                                                      Velocity
              Volume                                                                              provides the
       provides the                                                                              time at which
      amount of data                                                                               the data is
      and the form of                                                                            collected and
           data                                                                                     analyzed




                                       Variety provides the
                                    type of data collected
                                                              TWDI Best Practices Report Q4 2011- Big Data Analysis- Philip Russom

Federal Authority   | ‫هيئــــــــة اتحــــــــــــادية‬                                         www.emiratesid.ae
                                                                                              © 2012 Emirates Identity Authority. All rights reserved
4th ‘V’ of Big Data ?


     • However, there is the
       fourth dimension - a
       fourth V- Veracity
       which encompasses
       the 3Vs!

     • Veracity provides the
            confidence in
            the truthfulness of
            the data.




                                                         TWDI Best Practices Report Q4 2011- Big Data Analysis- Philip Russom

Federal Authority   | ‫هيئــــــــة اتحــــــــــــادية‬                                                 www.emiratesid.ae
                                                                                                       © 2012 Emirates Identity Authority. All rights reserved
Personal ID and Big Data ?
    Veracity of Data itself can be depicted using three dimensions:


     1. Veracity of Data is
     established by how the
     data itself is enabled-                                        2. Veracity of Data
     which stands for the                                           is established by the
     source of data.                                                means and
                                                                    methods of
                                                                    analysis- providing
                                                         Identity   discernible
                                                                    information



            3. Veracity of Data is then characterized by Personal
            Identity Management. This is the critical dimension
            of Big Data Veracity.

Federal Authority   | ‫هيئــــــــة اتحــــــــــــادية‬                   www.emiratesid.ae
                                                                         © 2012 Emirates Identity Authority. All rights reserved
Big Data ?

  • is not a new or unknown phenomenon.

  • Big Data as Volume Data has been used
    in Clinical Trials since long, resulting in many
    a ground breaking medicines.

  • Big Data as Volume Data has been in
    existence in DNA mapping and Genetics
    leading to many life-saving healthcare
    procedures.

  • While the Healthcare industry has been the
    initiator of big data analysis, retailers and
    marketing organizations have now started
    to make use of Big Data to further their
    commercial activities.

Federal Authority   | ‫هيئــــــــة اتحــــــــــــادية‬   www.emiratesid.ae
                                                         © 2012 Emirates Identity Authority. All rights reserved
Web Analytics
• Numerous web analytics
  companies have now made
  it their business to collect all
  this trail and construct
  meaningful data from this
  huge data.

• Billions of posts in social
  networks, blogs, commerce
  sites, e-mails, text messages,
  utility payments are being
  “piggy-backed” to result in
  patterns of the digital
  interactions and individual
  behavior patterns then
  constructed from here.

• This is brilliant from a
  marketing point of view!

Federal Authority   | ‫هيئــــــــة اتحــــــــــــادية‬   www.emiratesid.ae
                                                         © 2012 Emirates Identity Authority. All rights reserved
Privacy ?




                                     But, from a privacy perspective, this could
                                      be construed as a blatant violation of
                                                individual privacy.


Federal Authority   | ‫هيئــــــــة اتحــــــــــــادية‬                       www.emiratesid.ae
                                                                             © 2012 Emirates Identity Authority. All rights reserved
Agenda
                      • Introduction: The Age of Big Data
                      • Big Data Characteristics
                      • Constructing Identity from Digital Behaviour
                      • Constructing Identity from Digital Behaviour
                      • Government IdM and Privacy
                      • Concluding Remarks




Federal Authority   | ‫هيئــــــــة اتحــــــــــــادية‬                 www.emiratesid.ae
                                                                       © 2012 Emirates Identity Authority. All rights reserved
Personal ID and Digital Behaviour ?
  • as individuals, we Interact, we Transact, we
    Collaborate, we Communicate on a daily basis

  • .. which is sought to be
    analyzed for bringing
    commercial
    entities closer
    to the
    psyche of
    the individual
    (knowing
    customers –
    personalising
    services and
    products).




Federal Authority   | ‫هيئــــــــة اتحــــــــــــادية‬   www.emiratesid.ae
                                                         © 2012 Emirates Identity Authority. All rights reserved
Personal ID and Digital Behaviour ?




               Big Data as in information and
               datasets have started to be
               cultivated based on the                   digital
               data we leave in
               our transactions.




Federal Authority   | ‫هيئــــــــة اتحــــــــــــادية‬             www.emiratesid.ae
                                                                   © 2012 Emirates Identity Authority. All rights reserved
Digital Behaviour and Data Sets ?

    • We live in the digital world and are
      ubiquitously connected.

    • The Phone is no longer a calling device.

    • Our laptops, Tablets, Phablets and Phones
      keep us constantly engaged.

    • Every interaction leaves a huge trail of
      data leaving behind bits and pieces
          of us with pointers to our real
          behaviour.

    • This raises then many issues governing
      privacy..

Federal Authority   | ‫هيئــــــــة اتحــــــــــــادية‬   www.emiratesid.ae
                                                         © 2012 Emirates Identity Authority. All rights reserved
Digital Behaviour and Data Sets ?

      • It is understood that collection of
        information from digital transactions
        and interactions is something that is
        unstoppable.

      • Whether we like it or not, the
        amount of digital trail we leave
        behind in the e-world is amazingly
        large.

      • This digital trail when analyzed is
        almost like a signature that we
        leave behind, making it very easy
        for analysts to identify us as
        individuals in the purported
        anonymity of the web.

Federal Authority   | ‫هيئــــــــة اتحــــــــــــادية‬   www.emiratesid.ae
                                                         © 2012 Emirates Identity Authority. All rights reserved
Anonymity ?

    • The West, particularly the USA and the EU have
      made conscious moves to protect individual
      privacy from being abused with legal provisions.

    • Anonymity has been the key consideration on
          which the legal provisions have been made so far.

    • However, it has been proved beyond any
      reasonable doubt that anonymity is not
      guaranteed even when personal identifiers are
      removed from the data sets for analysis.

    • Even IP Addresses that relate to machines have
      been cracked to relate them to personal users.

    • So,    where does this leave an individual
          with respect to his/ her privacy?

Federal Authority   | ‫هيئــــــــة اتحــــــــــــادية‬        www.emiratesid.ae
                                                              © 2012 Emirates Identity Authority. All rights reserved
Big Data and Privacy ?



                    Data can be either useful or
                    perfectly anonymous but
                    never both.
                                                                 PAUL OHM
                                                            Associate Professor of Law
                                                         University of Colorado Law School




                    How True?!
Federal Authority   | ‫هيئــــــــة اتحــــــــــــادية‬          www.emiratesid.ae
                                                                © 2012 Emirates Identity Authority. All rights reserved
Google Saying ?

               .. while anonymized information will always carry some risk of re-
               identification . . . . many of the most pressing privacy risks . . . exist only if
               there is certainty in re-identification, that is if the information can be
               authenticated. As uncertainty is introduced into the re-identification
               equation, we cannot know that the information truly corresponds to a
               particular individual; it becomes more anonymous as larger amounts of
               uncertainty are introduced.




                     Betsy Masiello                              Alma Whitten
                    Global Public Policy at Google              Privacy for Product and Engineering at Google
                    Betsy Masiello, Alma Whitten: Engineering Privacy in an Age of Information Abundance. AAAI Spring
                    Symposium: Intelligent Information Privacy Management 2010



Federal Authority    | ‫هيئــــــــة اتحــــــــــــادية‬                                                                 www.emiratesid.ae
                                                                                                                        © 2012 Emirates Identity Authority. All rights reserved
Agenda
                      • Introduction: The Age of Big Data
                      • Big Data Characteristics
                      • Constructing Identity from Digital Behaviour
                      • Government IdM and Privacy
                      • Government IdM and Privacy
                      • Concluding Remarks




Federal Authority   | ‫هيئــــــــة اتحــــــــــــادية‬                 www.emiratesid.ae
                                                                       © 2012 Emirates Identity Authority. All rights reserved
National ID for Big Data Analysis

     • an intense role of
       Government Issued
            Personal Identity as
            a Unique National ID.

     • this will be extremely
       critical in Big Data and
            Big Data Analytics
            providing the required
            privacy in anonymity
            and yet provide
            meaningful data for
            analysis.




Federal Authority   | ‫هيئــــــــة اتحــــــــــــادية‬   www.emiratesid.ae
                                                         © 2012 Emirates Identity Authority. All rights reserved
National ID for Big Data Analysis


  • A secure ID would encourage
    users to be engaged more actively
    and more expansively in the digital
    world.

  • It is in this context that the                       Digital
         Identity profile provided and
         packaged in a Secure Smart Card is
         expected to play a pivotal role.




Federal Authority   | ‫هيئــــــــة اتحــــــــــــادية‬             www.emiratesid.ae
                                                                   © 2012 Emirates Identity Authority. All rights reserved
Personal ID and UAE National ID




                                                         The Digital Identity provides the perfect PROXY
                                                                      for the personal identity.

Federal Authority   | ‫هيئــــــــة اتحــــــــــــادية‬                                    www.emiratesid.ae
                                                                                         © 2012 Emirates Identity Authority. All rights reserved
Personal ID and UAE National ID




                    The individuals would be known and authenticated as genuine persons
                          by the National Identity Authority providing a THIRD PARTY
                                        authentication for the identity.
Federal Authority   | ‫هيئــــــــة اتحــــــــــــادية‬                   www.emiratesid.ae
                                                                         © 2012 Emirates Identity Authority. All rights reserved
Personal ID and UAE National ID




                Thus, service providers can identify the potential service seeker securely
                       from the authentication provided by the Emirates ID Authority.

Federal Authority   | ‫هيئــــــــة اتحــــــــــــادية‬                    www.emiratesid.ae
                                                                          © 2012 Emirates Identity Authority. All rights reserved
Personal ID and UAE National ID




                        An individual will then be able to transact and interact freely without
                                       compromising his/her personal identity.


Federal Authority   | ‫هيئــــــــة اتحــــــــــــادية‬                           www.emiratesid.ae
                                                                                 © 2012 Emirates Identity Authority. All rights reserved
National ID for Big Data Analysis

         • The UAE National ID Card is
           designed to provide multi
           factor authentication.

         • At the core of the Digital ID is
           the Unique Identity Number
           issued by the Emirates ID
           Authority.

         • With this ID is associated with
           the Digital Identity Profile
           consisting of Biometric Data-
           Fingerprints and ICAO
           compliant photograph, and
           Digital Certificates issued for
           Identification and Signatures
           issued as a Secure Smart Card.


Federal Authority   | ‫هيئــــــــة اتحــــــــــــادية‬   www.emiratesid.ae
                                                         © 2012 Emirates Identity Authority. All rights reserved
Personal ID and UAE National ID

         • Apart from the classical ID verification
           and authentication methods, projects
           are underway to upgrade the features
           to provide OTP (One-time-password)
           as per OATH Standards.

         • The ID card is a combi-card to work
           with contactless readers.

         • Projects are underway to develop the
           NFC enabled authentication methods
           using the GSM mobile phones and
           other mobile devices.

         • Each of the Digital ID profile
           components provides the ability for the
           user to be verified and further
           authenticated for access.

Federal Authority   | ‫هيئــــــــة اتحــــــــــــادية‬   www.emiratesid.ae
                                                         © 2012 Emirates Identity Authority. All rights reserved
Protection of Individual Privacy

    • The Emirates ID Authority
      provides the necessary
          credential verification on
          the web.

    • The National ID Card could be
      used only with the Digital
      Credentials on the web
      transactions.

    • Emirates ID Authority does not
      share the personal information
          but provides only credential
          verification




Federal Authority   | ‫هيئــــــــة اتحــــــــــــادية‬   www.emiratesid.ae
                                                         © 2012 Emirates Identity Authority. All rights reserved
Protection of Individual Privacy

       • Service Providers are
         accorded with Verification
         and Authentication Services
         enabling secure remote
              transactions.

       • Service Seekers remain
         anonymous on the web
         since only Digital
              Certificates or Biometrics
              would be used to
              establish credential
              verification.




Federal Authority   | ‫هيئــــــــة اتحــــــــــــادية‬   www.emiratesid.ae
                                                         © 2012 Emirates Identity Authority. All rights reserved
Agenda
                      • Introduction: The Age of Big Data
                      • Big Data Characteristics
                      • Constructing Identity from Digital Behaviour
                      • Government IdM and Privacy
                      • Concluding Remarks
                      • Concluding Remarks




Federal Authority   | ‫هيئــــــــة اتحــــــــــــادية‬                 www.emiratesid.ae
                                                                       © 2012 Emirates Identity Authority. All rights reserved
Concluding remarks
         • Big Data should be
           viewed to be about
           building Knowledge to
           support social,
           environmental, and
           economical development.

         • i.e., to improve efficiency,
           speed & accuracy of
           decisions, ability to
           forecast, cut costs, save
           energy, improve services,
           optimise infrastructure,
           enhance citizens quality of
           life, reduce environmental
           footprints, fuel innovation
           and diverse sustainable
           economic growth.


Federal Authority   | ‫هيئــــــــة اتحــــــــــــادية‬   www.emiratesid.ae
                                                         © 2012 Emirates Identity Authority. All rights reserved
Concluding remarks

                                                         • Complexity will remain an issue!

                                                         • Successfully exploiting the value in
                                                           big data requires experimentation and
                                                           exploration.


         • Private sector will still lead the game, as Big Data will be viewed as a
           source of competition and growth.

         • Public sector will need to take Big Data more seriously, and put in
           place data-strategies to create new waves of productivity growth.

         • Main challenge: shortage of skills            [USA by 2018 will face shortage of around 2
               million managers and analysts with know-how to create and use big data to make
               effective decisions].


         • Need to address policies related to privacy, security, etc.

Federal Authority   | ‫هيئــــــــة اتحــــــــــــادية‬                                 www.emiratesid.ae
                                                                                       © 2012 Emirates Identity Authority. All rights reserved
UAE National ID and Privacy




         • All data should be treated as personally identifiable and
               subjected to the regulatory framework.

         • UAE (Emirates ID Authority) would provide this regulatory framework
           to ensure identity protection.

         • Technical and Technology Solutions are already in place to support the
           regulatory and legal framework.


Federal Authority   | ‫هيئــــــــة اتحــــــــــــادية‬             www.emiratesid.ae
                                                                   © 2012 Emirates Identity Authority. All rights reserved
More Information:

     Read our recent research from:
     http://www.emiratesid.gov.ae/ar/media-center/publications.aspx




Federal Authority   | ‫هيئــــــــة اتحــــــــــــادية‬         www.emiratesid.ae
                                                               © 2012 Emirates Identity Authority. All rights reserved
You can use all
  the quantitative
  data you can get,
  but you still
  have to
  distrust it and
  use your own
  intelligence
  and judgment.
  [Alvin Toffler]
  Dr. Ail M. Al-Khouri
  Director General |
  Emirates Identity Authority |
  United Arab Emirates |
  ali.alkhouri@emiratesid.ae |
  www.emiratesid.ae

Federal Authority   | ‫هيئــــــــة اتحــــــــــــادية‬   www.emiratesid.ae
                                                         © 2012 Emirates Identity Authority. All rights reserved

Más contenido relacionado

La actualidad más candente

Data mining slides
Data mining slidesData mining slides
Data mining slides
smj
 
HOW AI CAN HELP IN CYBERSECURITY
HOW AI CAN HELP IN CYBERSECURITYHOW AI CAN HELP IN CYBERSECURITY
HOW AI CAN HELP IN CYBERSECURITY
Priyanshu Ratnakar
 

La actualidad más candente (20)

Data Leakage Presentation
Data Leakage PresentationData Leakage Presentation
Data Leakage Presentation
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Data mining slides
Data mining slidesData mining slides
Data mining slides
 
Denodo’s Data Catalog: Bridging the Gap between Data and Business (APAC)
Denodo’s Data Catalog: Bridging the Gap between Data and Business (APAC)Denodo’s Data Catalog: Bridging the Gap between Data and Business (APAC)
Denodo’s Data Catalog: Bridging the Gap between Data and Business (APAC)
 
Cybersecurity Goverence for Boards of Directors
Cybersecurity Goverence for Boards of DirectorsCybersecurity Goverence for Boards of Directors
Cybersecurity Goverence for Boards of Directors
 
Data Science Project Lifecycle and Skill Set
Data Science Project Lifecycle and Skill SetData Science Project Lifecycle and Skill Set
Data Science Project Lifecycle and Skill Set
 
Big data project management
Big data project managementBig data project management
Big data project management
 
Responsible AI
Responsible AIResponsible AI
Responsible AI
 
HOW AI CAN HELP IN CYBERSECURITY
HOW AI CAN HELP IN CYBERSECURITYHOW AI CAN HELP IN CYBERSECURITY
HOW AI CAN HELP IN CYBERSECURITY
 
Big Data & Privacy
Big Data & PrivacyBig Data & Privacy
Big Data & Privacy
 
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
 
Data Science vs Machine Learning – What’s The Difference? | Data Science Cour...
Data Science vs Machine Learning – What’s The Difference? | Data Science Cour...Data Science vs Machine Learning – What’s The Difference? | Data Science Cour...
Data Science vs Machine Learning – What’s The Difference? | Data Science Cour...
 
Introduction To Analytics
Introduction To AnalyticsIntroduction To Analytics
Introduction To Analytics
 
How can AI & Automation make your business processes intelligent
How can AI & Automation make your business processes intelligentHow can AI & Automation make your business processes intelligent
How can AI & Automation make your business processes intelligent
 
Managing Personally Identifiable Information (PII)
Managing Personally Identifiable Information (PII)Managing Personally Identifiable Information (PII)
Managing Personally Identifiable Information (PII)
 
Blockchain and AI
Blockchain and AIBlockchain and AI
Blockchain and AI
 
Data Pipline Observability meetup
Data Pipline Observability meetup Data Pipline Observability meetup
Data Pipline Observability meetup
 
History of Data Science
History of Data ScienceHistory of Data Science
History of Data Science
 
CDMP Overview Professional Information Management Certification
CDMP Overview Professional Information Management CertificationCDMP Overview Professional Information Management Certification
CDMP Overview Professional Information Management Certification
 
Data analytics
Data analyticsData analytics
Data analytics
 

Similar a Privacy in the Age of Big Data

2.ICESCO-Mr ADEL SMEDA -Role of Big Data on Achieving Smart Cities-1.pptx
2.ICESCO-Mr ADEL SMEDA -Role of Big Data on Achieving Smart Cities-1.pptx2.ICESCO-Mr ADEL SMEDA -Role of Big Data on Achieving Smart Cities-1.pptx
2.ICESCO-Mr ADEL SMEDA -Role of Big Data on Achieving Smart Cities-1.pptx
HamidHajaoui1
 
Smarter Computing in a New Era of IT - Dr. Gururaj Rao
Smarter Computing in a New Era of IT - Dr. Gururaj RaoSmarter Computing in a New Era of IT - Dr. Gururaj Rao
Smarter Computing in a New Era of IT - Dr. Gururaj Rao
Jyothi Satyanathan
 
Opening Keynote and Welcome
Opening Keynote and WelcomeOpening Keynote and Welcome
Opening Keynote and Welcome
Carahsoft
 
ESWC SS 2012 - Wednesday Keynote Spyros Kotoulas : Managing the Information o...
ESWC SS 2012 - Wednesday Keynote Spyros Kotoulas : Managing the Information o...ESWC SS 2012 - Wednesday Keynote Spyros Kotoulas : Managing the Information o...
ESWC SS 2012 - Wednesday Keynote Spyros Kotoulas : Managing the Information o...
eswcsummerschool
 

Similar a Privacy in the Age of Big Data (20)

Developing More Inclusive and Innovative Government
Developing More Inclusive and Innovative GovernmentDeveloping More Inclusive and Innovative Government
Developing More Inclusive and Innovative Government
 
Strategic Vision: Public eID Programs in GCC Countries
Strategic Vision: Public eID Programs in GCC CountriesStrategic Vision: Public eID Programs in GCC Countries
Strategic Vision: Public eID Programs in GCC Countries
 
The Development of Digital Economy
The Development of Digital EconomyThe Development of Digital Economy
The Development of Digital Economy
 
Konceptuelt overblik over Big Data, Flemming Bagger, IBM
Konceptuelt overblik over Big Data, Flemming Bagger, IBMKonceptuelt overblik over Big Data, Flemming Bagger, IBM
Konceptuelt overblik over Big Data, Flemming Bagger, IBM
 
Data Science Courses - BigData VS Data Science
Data Science Courses - BigData VS Data ScienceData Science Courses - BigData VS Data Science
Data Science Courses - BigData VS Data Science
 
KMWorld Presentation
KMWorld PresentationKMWorld Presentation
KMWorld Presentation
 
ٍSmart Government Circle of Attention
ٍSmart Government Circle of AttentionٍSmart Government Circle of Attention
ٍSmart Government Circle of Attention
 
Big Data and Mobile Recruitment - Irish Recruiters Conf Dec 2012
Big Data and Mobile Recruitment - Irish Recruiters Conf Dec 2012Big Data and Mobile Recruitment - Irish Recruiters Conf Dec 2012
Big Data and Mobile Recruitment - Irish Recruiters Conf Dec 2012
 
Trends and Development in Government Sector: Building e-Government Backbone
Trends and Development in Government Sector: Building e-Government BackboneTrends and Development in Government Sector: Building e-Government Backbone
Trends and Development in Government Sector: Building e-Government Backbone
 
The Development of a Federal Digital Identity
The Development of a Federal Digital IdentityThe Development of a Federal Digital Identity
The Development of a Federal Digital Identity
 
Identity Assertion, Emerging Trends,Identity Service in the Cloud
Identity Assertion, Emerging Trends,Identity Service in the CloudIdentity Assertion, Emerging Trends,Identity Service in the Cloud
Identity Assertion, Emerging Trends,Identity Service in the Cloud
 
Big data and analytics
Big data and analyticsBig data and analytics
Big data and analytics
 
2.ICESCO-Mr ADEL SMEDA -Role of Big Data on Achieving Smart Cities-1.pptx
2.ICESCO-Mr ADEL SMEDA -Role of Big Data on Achieving Smart Cities-1.pptx2.ICESCO-Mr ADEL SMEDA -Role of Big Data on Achieving Smart Cities-1.pptx
2.ICESCO-Mr ADEL SMEDA -Role of Big Data on Achieving Smart Cities-1.pptx
 
The Development of a National Identity Management System to Support National ...
The Development of a National Identity Management System to Support National ...The Development of a National Identity Management System to Support National ...
The Development of a National Identity Management System to Support National ...
 
An Innovative Framework for e Government Transformation
An Innovative Framework for e Government TransformationAn Innovative Framework for e Government Transformation
An Innovative Framework for e Government Transformation
 
Smarter Computing in a New Era of IT - Dr. Gururaj Rao
Smarter Computing in a New Era of IT - Dr. Gururaj RaoSmarter Computing in a New Era of IT - Dr. Gururaj Rao
Smarter Computing in a New Era of IT - Dr. Gururaj Rao
 
OWF12/Java Michael hirt
OWF12/Java Michael hirtOWF12/Java Michael hirt
OWF12/Java Michael hirt
 
Opening Keynote and Welcome
Opening Keynote and WelcomeOpening Keynote and Welcome
Opening Keynote and Welcome
 
ESWC SS 2012 - Wednesday Keynote Spyros Kotoulas : Managing the Information o...
ESWC SS 2012 - Wednesday Keynote Spyros Kotoulas : Managing the Information o...ESWC SS 2012 - Wednesday Keynote Spyros Kotoulas : Managing the Information o...
ESWC SS 2012 - Wednesday Keynote Spyros Kotoulas : Managing the Information o...
 
Smart & Safer Cities by Richard Knight
Smart & Safer Cities by Richard KnightSmart & Safer Cities by Richard Knight
Smart & Safer Cities by Richard Knight
 

Más de Arab Federation for Digital Economy

المدفوعات الإلكترونية والعملات الرقمية
المدفوعات الإلكترونية والعملات الرقميةالمدفوعات الإلكترونية والعملات الرقمية
المدفوعات الإلكترونية والعملات الرقمية
Arab Federation for Digital Economy
 
القمة في العمل المؤسسي
القمة في العمل المؤسسيالقمة في العمل المؤسسي
القمة في العمل المؤسسي
Arab Federation for Digital Economy
 
Policy Needs for Digital Economy
Policy Needs for Digital EconomyPolicy Needs for Digital Economy
Policy Needs for Digital Economy
Arab Federation for Digital Economy
 
بعد الميزانيات الهائلة، هل حققت مشاريع التحول الرقمي أهدافها؟
بعد الميزانيات الهائلة، هل حققت مشاريع التحول الرقمي أهدافها؟بعد الميزانيات الهائلة، هل حققت مشاريع التحول الرقمي أهدافها؟
بعد الميزانيات الهائلة، هل حققت مشاريع التحول الرقمي أهدافها؟
Arab Federation for Digital Economy
 

Más de Arab Federation for Digital Economy (20)

اقتصاد البيانات ودوره في تعزيز الأنظمة الاقتصادية العربية
اقتصاد البيانات  ودوره في تعزيز الأنظمة الاقتصادية العربيةاقتصاد البيانات  ودوره في تعزيز الأنظمة الاقتصادية العربية
اقتصاد البيانات ودوره في تعزيز الأنظمة الاقتصادية العربية
 
Foundations of the UAE and GCC Economies with Covid-19
Foundations of the UAE and GCC Economies with Covid-19Foundations of the UAE and GCC Economies with Covid-19
Foundations of the UAE and GCC Economies with Covid-19
 
سلطة العقل
سلطة العقلسلطة العقل
سلطة العقل
 
الحكومة الرقمية: مفاهيم وممارسات
الحكومة الرقمية: مفاهيم وممارساتالحكومة الرقمية: مفاهيم وممارسات
الحكومة الرقمية: مفاهيم وممارسات
 
المدفوعات الإلكترونية والعملات الرقمية
المدفوعات الإلكترونية والعملات الرقميةالمدفوعات الإلكترونية والعملات الرقمية
المدفوعات الإلكترونية والعملات الرقمية
 
القمة في العمل المؤسسي
القمة في العمل المؤسسيالقمة في العمل المؤسسي
القمة في العمل المؤسسي
 
القمة في العمل المؤسسي
القمة في العمل المؤسسيالقمة في العمل المؤسسي
القمة في العمل المؤسسي
 
Challenges and Opportunities in Africa: A case of a Digital Economy Blueprint...
Challenges and Opportunities in Africa: A case of a Digital Economy Blueprint...Challenges and Opportunities in Africa: A case of a Digital Economy Blueprint...
Challenges and Opportunities in Africa: A case of a Digital Economy Blueprint...
 
الاقتصاد العالمي بين مطرقة كورونا وسندان الأزمات
الاقتصاد العالمي بين مطرقة كورونا وسندان الأزماتالاقتصاد العالمي بين مطرقة كورونا وسندان الأزمات
الاقتصاد العالمي بين مطرقة كورونا وسندان الأزمات
 
Digital economy and national security
Digital economy and national securityDigital economy and national security
Digital economy and national security
 
New World Economy
New World EconomyNew World Economy
New World Economy
 
كوفيد 19 والآثار الاقتصادية للأوبئة
كوفيد 19 والآثار الاقتصادية للأوبئةكوفيد 19 والآثار الاقتصادية للأوبئة
كوفيد 19 والآثار الاقتصادية للأوبئة
 
كيف يمكننا بناء الاقتصاد الرقمي: نحو مخطط استراتيجي
كيف يمكننا بناء الاقتصاد الرقمي: نحو مخطط استراتيجيكيف يمكننا بناء الاقتصاد الرقمي: نحو مخطط استراتيجي
كيف يمكننا بناء الاقتصاد الرقمي: نحو مخطط استراتيجي
 
Digital Economy and Policy Needs for Digital Transformation
Digital Economy and Policy Needs for Digital TransformationDigital Economy and Policy Needs for Digital Transformation
Digital Economy and Policy Needs for Digital Transformation
 
Reconstruction: A Gateway to Promote Arab Economic Integration and Joint Action
Reconstruction: A Gateway to Promote Arab Economic Integration and Joint ActionReconstruction: A Gateway to Promote Arab Economic Integration and Joint Action
Reconstruction: A Gateway to Promote Arab Economic Integration and Joint Action
 
Conflicts in Organisations
Conflicts in OrganisationsConflicts in Organisations
Conflicts in Organisations
 
مستقبل الاقتصاد العربي تحت وطأة الأزمات المُركّبة
مستقبل الاقتصاد العربي تحت وطأة الأزمات المُركّبةمستقبل الاقتصاد العربي تحت وطأة الأزمات المُركّبة
مستقبل الاقتصاد العربي تحت وطأة الأزمات المُركّبة
 
Policy Needs for Digital Economy
Policy Needs for Digital EconomyPolicy Needs for Digital Economy
Policy Needs for Digital Economy
 
بعد الميزانيات الهائلة، هل حققت مشاريع التحول الرقمي أهدافها؟
بعد الميزانيات الهائلة، هل حققت مشاريع التحول الرقمي أهدافها؟بعد الميزانيات الهائلة، هل حققت مشاريع التحول الرقمي أهدافها؟
بعد الميزانيات الهائلة، هل حققت مشاريع التحول الرقمي أهدافها؟
 
التطور التكنولوجي وضروة أجندات العمل المشتركة لمواجهة التهديدات الاقتصادية وا...
التطور التكنولوجي وضروة أجندات العمل المشتركة لمواجهة التهديدات الاقتصادية وا...التطور التكنولوجي وضروة أجندات العمل المشتركة لمواجهة التهديدات الاقتصادية وا...
التطور التكنولوجي وضروة أجندات العمل المشتركة لمواجهة التهديدات الاقتصادية وا...
 

Último

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Último (20)

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 

Privacy in the Age of Big Data

  • 1. Partners in Building UAE's Security & Economy Privacy in the Age of Big Data © 2013 Emirates Identity Authority. All rights reserved Presented by Dr. Ali M. Al-Khouri www.emiratesid.ae In: Big Data Systems, Applications and Privacy Conference – Organised by New York University, Abu Dhabi, UAE. 10 – 11 March 2013 | Injazat Data Systems | Abu Dhabi | UAE Federal Authority | ‫هيئــــــــة اتحــــــــــــادية‬ Our Vision: To be a role model and reference point in proofing individual identity and build wealth informatics that guarantees innovative and sophisticated services for the benefit of UAE
  • 2. Agenda • Introduction: The Age of Big Data • Big Data Characteristics • Constructing Identity from Digital Behaviour • Government IdM and Privacy • Concluding Remarks Federal Authority | ‫هيئــــــــة اتحــــــــــــادية‬ www.emiratesid.ae © 2012 Emirates Identity Authority. All rights reserved
  • 3. Agenda • Introduction: The Age of Big Data • Introduction: The Age of Big Data • Big Data Characteristics • Constructing Identity from Digital Behaviour • Government IdM and Privacy • Concluding Remarks Federal Authority | ‫هيئــــــــة اتحــــــــــــادية‬ www.emiratesid.ae © 2012 Emirates Identity Authority. All rights reserved
  • 4. Big Data in Digital World ? • The proliferation of modern technologies, smart devices and Climate Change popularity of social networking is generating unprecedented amounts of data, both structured and unstructured, whether it be text, audio or video. • Data has become ubiquitous in this digital world. • Sheer amount of bytes that we generate daily is indeed mind boggling! Federal Authority | ‫هيئــــــــة اتحــــــــــــادية‬ www.emiratesid.ae © 2012 Emirates Identity Authority. All rights reserved
  • 5. The Age of Big Data ? every day, we create 2.5 quintillion bytes of data .. This data is big data 90% of the data in the world today has been created Climate Change in the last two years. IBM Report We are truly in a digital explosion era! Federal Authority | ‫هيئــــــــة اتحــــــــــــادية‬ www.emiratesid.ae © 2012 Emirates Identity Authority. All rights reserved
  • 6. Data Growth 112 Zettabytes all computer hard drives in the world = 160 exabytes in 2006 all storage systems didn’t reach one zettabyte of information in 2012! 295 Global Growth of Digital Storage Capacity 1986-2021 By 2020, 112 Zettabytes of data (75% growth rate) One Zettabyte = 1,000,000,000,000,000,000,000 byte, or 1000 exabytes Federal Authority | ‫هيئــــــــة اتحــــــــــــادية‬ www.emiratesid.ae © 2012 Emirates Identity Authority. All rights reserved
  • 7. Big Data ? • is generated from practically every where: - Social media sites (facebook, twitter, linked-in..) - digital pictures and videos, - e-mails, - purchase transaction records, Climate Change - cell phone, GPS signals, - geo-stationary satellites, - meteorological sensors - to name a few. • This continues to grow at an exponential rate. Federal Authority | ‫هيئــــــــة اتحــــــــــــادية‬ www.emiratesid.ae © 2012 Emirates Identity Authority. All rights reserved
  • 8. Agenda • Introduction: The Age of Big Data • Big Data Characteristics • Big Data Characteristics • Constructing Identity from Digital Behaviour • Government IdM and Privacy • Concluding Remarks Federal Authority | ‫هيئــــــــة اتحــــــــــــادية‬ www.emiratesid.ae © 2012 Emirates Identity Authority. All rights reserved
  • 9. Big Data characteristics? • Big Data has come to be characterized by the Volume, Velocity and Variety of Data that is generated. • These constitute the 3Vs of Big Data. TWDI Best Practices Report Q4 2011- Big Data Analysis- Philip Russom Federal Authority | ‫هيئــــــــة اتحــــــــــــادية‬ www.emiratesid.ae © 2012 Emirates Identity Authority. All rights reserved
  • 10. 3Vs of Big Data ? Velocity Volume provides the provides the time at which amount of data the data is and the form of collected and data analyzed Variety provides the type of data collected TWDI Best Practices Report Q4 2011- Big Data Analysis- Philip Russom Federal Authority | ‫هيئــــــــة اتحــــــــــــادية‬ www.emiratesid.ae © 2012 Emirates Identity Authority. All rights reserved
  • 11. 4th ‘V’ of Big Data ? • However, there is the fourth dimension - a fourth V- Veracity which encompasses the 3Vs! • Veracity provides the confidence in the truthfulness of the data. TWDI Best Practices Report Q4 2011- Big Data Analysis- Philip Russom Federal Authority | ‫هيئــــــــة اتحــــــــــــادية‬ www.emiratesid.ae © 2012 Emirates Identity Authority. All rights reserved
  • 12. Personal ID and Big Data ? Veracity of Data itself can be depicted using three dimensions: 1. Veracity of Data is established by how the data itself is enabled- 2. Veracity of Data which stands for the is established by the source of data. means and methods of analysis- providing Identity discernible information 3. Veracity of Data is then characterized by Personal Identity Management. This is the critical dimension of Big Data Veracity. Federal Authority | ‫هيئــــــــة اتحــــــــــــادية‬ www.emiratesid.ae © 2012 Emirates Identity Authority. All rights reserved
  • 13. Big Data ? • is not a new or unknown phenomenon. • Big Data as Volume Data has been used in Clinical Trials since long, resulting in many a ground breaking medicines. • Big Data as Volume Data has been in existence in DNA mapping and Genetics leading to many life-saving healthcare procedures. • While the Healthcare industry has been the initiator of big data analysis, retailers and marketing organizations have now started to make use of Big Data to further their commercial activities. Federal Authority | ‫هيئــــــــة اتحــــــــــــادية‬ www.emiratesid.ae © 2012 Emirates Identity Authority. All rights reserved
  • 14. Web Analytics • Numerous web analytics companies have now made it their business to collect all this trail and construct meaningful data from this huge data. • Billions of posts in social networks, blogs, commerce sites, e-mails, text messages, utility payments are being “piggy-backed” to result in patterns of the digital interactions and individual behavior patterns then constructed from here. • This is brilliant from a marketing point of view! Federal Authority | ‫هيئــــــــة اتحــــــــــــادية‬ www.emiratesid.ae © 2012 Emirates Identity Authority. All rights reserved
  • 15. Privacy ? But, from a privacy perspective, this could be construed as a blatant violation of individual privacy. Federal Authority | ‫هيئــــــــة اتحــــــــــــادية‬ www.emiratesid.ae © 2012 Emirates Identity Authority. All rights reserved
  • 16. Agenda • Introduction: The Age of Big Data • Big Data Characteristics • Constructing Identity from Digital Behaviour • Constructing Identity from Digital Behaviour • Government IdM and Privacy • Concluding Remarks Federal Authority | ‫هيئــــــــة اتحــــــــــــادية‬ www.emiratesid.ae © 2012 Emirates Identity Authority. All rights reserved
  • 17. Personal ID and Digital Behaviour ? • as individuals, we Interact, we Transact, we Collaborate, we Communicate on a daily basis • .. which is sought to be analyzed for bringing commercial entities closer to the psyche of the individual (knowing customers – personalising services and products). Federal Authority | ‫هيئــــــــة اتحــــــــــــادية‬ www.emiratesid.ae © 2012 Emirates Identity Authority. All rights reserved
  • 18. Personal ID and Digital Behaviour ? Big Data as in information and datasets have started to be cultivated based on the digital data we leave in our transactions. Federal Authority | ‫هيئــــــــة اتحــــــــــــادية‬ www.emiratesid.ae © 2012 Emirates Identity Authority. All rights reserved
  • 19. Digital Behaviour and Data Sets ? • We live in the digital world and are ubiquitously connected. • The Phone is no longer a calling device. • Our laptops, Tablets, Phablets and Phones keep us constantly engaged. • Every interaction leaves a huge trail of data leaving behind bits and pieces of us with pointers to our real behaviour. • This raises then many issues governing privacy.. Federal Authority | ‫هيئــــــــة اتحــــــــــــادية‬ www.emiratesid.ae © 2012 Emirates Identity Authority. All rights reserved
  • 20. Digital Behaviour and Data Sets ? • It is understood that collection of information from digital transactions and interactions is something that is unstoppable. • Whether we like it or not, the amount of digital trail we leave behind in the e-world is amazingly large. • This digital trail when analyzed is almost like a signature that we leave behind, making it very easy for analysts to identify us as individuals in the purported anonymity of the web. Federal Authority | ‫هيئــــــــة اتحــــــــــــادية‬ www.emiratesid.ae © 2012 Emirates Identity Authority. All rights reserved
  • 21. Anonymity ? • The West, particularly the USA and the EU have made conscious moves to protect individual privacy from being abused with legal provisions. • Anonymity has been the key consideration on which the legal provisions have been made so far. • However, it has been proved beyond any reasonable doubt that anonymity is not guaranteed even when personal identifiers are removed from the data sets for analysis. • Even IP Addresses that relate to machines have been cracked to relate them to personal users. • So, where does this leave an individual with respect to his/ her privacy? Federal Authority | ‫هيئــــــــة اتحــــــــــــادية‬ www.emiratesid.ae © 2012 Emirates Identity Authority. All rights reserved
  • 22. Big Data and Privacy ? Data can be either useful or perfectly anonymous but never both. PAUL OHM Associate Professor of Law University of Colorado Law School How True?! Federal Authority | ‫هيئــــــــة اتحــــــــــــادية‬ www.emiratesid.ae © 2012 Emirates Identity Authority. All rights reserved
  • 23. Google Saying ? .. while anonymized information will always carry some risk of re- identification . . . . many of the most pressing privacy risks . . . exist only if there is certainty in re-identification, that is if the information can be authenticated. As uncertainty is introduced into the re-identification equation, we cannot know that the information truly corresponds to a particular individual; it becomes more anonymous as larger amounts of uncertainty are introduced. Betsy Masiello Alma Whitten Global Public Policy at Google Privacy for Product and Engineering at Google Betsy Masiello, Alma Whitten: Engineering Privacy in an Age of Information Abundance. AAAI Spring Symposium: Intelligent Information Privacy Management 2010 Federal Authority | ‫هيئــــــــة اتحــــــــــــادية‬ www.emiratesid.ae © 2012 Emirates Identity Authority. All rights reserved
  • 24. Agenda • Introduction: The Age of Big Data • Big Data Characteristics • Constructing Identity from Digital Behaviour • Government IdM and Privacy • Government IdM and Privacy • Concluding Remarks Federal Authority | ‫هيئــــــــة اتحــــــــــــادية‬ www.emiratesid.ae © 2012 Emirates Identity Authority. All rights reserved
  • 25. National ID for Big Data Analysis • an intense role of Government Issued Personal Identity as a Unique National ID. • this will be extremely critical in Big Data and Big Data Analytics providing the required privacy in anonymity and yet provide meaningful data for analysis. Federal Authority | ‫هيئــــــــة اتحــــــــــــادية‬ www.emiratesid.ae © 2012 Emirates Identity Authority. All rights reserved
  • 26. National ID for Big Data Analysis • A secure ID would encourage users to be engaged more actively and more expansively in the digital world. • It is in this context that the Digital Identity profile provided and packaged in a Secure Smart Card is expected to play a pivotal role. Federal Authority | ‫هيئــــــــة اتحــــــــــــادية‬ www.emiratesid.ae © 2012 Emirates Identity Authority. All rights reserved
  • 27. Personal ID and UAE National ID The Digital Identity provides the perfect PROXY for the personal identity. Federal Authority | ‫هيئــــــــة اتحــــــــــــادية‬ www.emiratesid.ae © 2012 Emirates Identity Authority. All rights reserved
  • 28. Personal ID and UAE National ID The individuals would be known and authenticated as genuine persons by the National Identity Authority providing a THIRD PARTY authentication for the identity. Federal Authority | ‫هيئــــــــة اتحــــــــــــادية‬ www.emiratesid.ae © 2012 Emirates Identity Authority. All rights reserved
  • 29. Personal ID and UAE National ID Thus, service providers can identify the potential service seeker securely from the authentication provided by the Emirates ID Authority. Federal Authority | ‫هيئــــــــة اتحــــــــــــادية‬ www.emiratesid.ae © 2012 Emirates Identity Authority. All rights reserved
  • 30. Personal ID and UAE National ID An individual will then be able to transact and interact freely without compromising his/her personal identity. Federal Authority | ‫هيئــــــــة اتحــــــــــــادية‬ www.emiratesid.ae © 2012 Emirates Identity Authority. All rights reserved
  • 31. National ID for Big Data Analysis • The UAE National ID Card is designed to provide multi factor authentication. • At the core of the Digital ID is the Unique Identity Number issued by the Emirates ID Authority. • With this ID is associated with the Digital Identity Profile consisting of Biometric Data- Fingerprints and ICAO compliant photograph, and Digital Certificates issued for Identification and Signatures issued as a Secure Smart Card. Federal Authority | ‫هيئــــــــة اتحــــــــــــادية‬ www.emiratesid.ae © 2012 Emirates Identity Authority. All rights reserved
  • 32. Personal ID and UAE National ID • Apart from the classical ID verification and authentication methods, projects are underway to upgrade the features to provide OTP (One-time-password) as per OATH Standards. • The ID card is a combi-card to work with contactless readers. • Projects are underway to develop the NFC enabled authentication methods using the GSM mobile phones and other mobile devices. • Each of the Digital ID profile components provides the ability for the user to be verified and further authenticated for access. Federal Authority | ‫هيئــــــــة اتحــــــــــــادية‬ www.emiratesid.ae © 2012 Emirates Identity Authority. All rights reserved
  • 33. Protection of Individual Privacy • The Emirates ID Authority provides the necessary credential verification on the web. • The National ID Card could be used only with the Digital Credentials on the web transactions. • Emirates ID Authority does not share the personal information but provides only credential verification Federal Authority | ‫هيئــــــــة اتحــــــــــــادية‬ www.emiratesid.ae © 2012 Emirates Identity Authority. All rights reserved
  • 34. Protection of Individual Privacy • Service Providers are accorded with Verification and Authentication Services enabling secure remote transactions. • Service Seekers remain anonymous on the web since only Digital Certificates or Biometrics would be used to establish credential verification. Federal Authority | ‫هيئــــــــة اتحــــــــــــادية‬ www.emiratesid.ae © 2012 Emirates Identity Authority. All rights reserved
  • 35. Agenda • Introduction: The Age of Big Data • Big Data Characteristics • Constructing Identity from Digital Behaviour • Government IdM and Privacy • Concluding Remarks • Concluding Remarks Federal Authority | ‫هيئــــــــة اتحــــــــــــادية‬ www.emiratesid.ae © 2012 Emirates Identity Authority. All rights reserved
  • 36. Concluding remarks • Big Data should be viewed to be about building Knowledge to support social, environmental, and economical development. • i.e., to improve efficiency, speed & accuracy of decisions, ability to forecast, cut costs, save energy, improve services, optimise infrastructure, enhance citizens quality of life, reduce environmental footprints, fuel innovation and diverse sustainable economic growth. Federal Authority | ‫هيئــــــــة اتحــــــــــــادية‬ www.emiratesid.ae © 2012 Emirates Identity Authority. All rights reserved
  • 37. Concluding remarks • Complexity will remain an issue! • Successfully exploiting the value in big data requires experimentation and exploration. • Private sector will still lead the game, as Big Data will be viewed as a source of competition and growth. • Public sector will need to take Big Data more seriously, and put in place data-strategies to create new waves of productivity growth. • Main challenge: shortage of skills [USA by 2018 will face shortage of around 2 million managers and analysts with know-how to create and use big data to make effective decisions]. • Need to address policies related to privacy, security, etc. Federal Authority | ‫هيئــــــــة اتحــــــــــــادية‬ www.emiratesid.ae © 2012 Emirates Identity Authority. All rights reserved
  • 38. UAE National ID and Privacy • All data should be treated as personally identifiable and subjected to the regulatory framework. • UAE (Emirates ID Authority) would provide this regulatory framework to ensure identity protection. • Technical and Technology Solutions are already in place to support the regulatory and legal framework. Federal Authority | ‫هيئــــــــة اتحــــــــــــادية‬ www.emiratesid.ae © 2012 Emirates Identity Authority. All rights reserved
  • 39. More Information: Read our recent research from: http://www.emiratesid.gov.ae/ar/media-center/publications.aspx Federal Authority | ‫هيئــــــــة اتحــــــــــــادية‬ www.emiratesid.ae © 2012 Emirates Identity Authority. All rights reserved
  • 40. You can use all the quantitative data you can get, but you still have to distrust it and use your own intelligence and judgment. [Alvin Toffler] Dr. Ail M. Al-Khouri Director General | Emirates Identity Authority | United Arab Emirates | ali.alkhouri@emiratesid.ae | www.emiratesid.ae Federal Authority | ‫هيئــــــــة اتحــــــــــــادية‬ www.emiratesid.ae © 2012 Emirates Identity Authority. All rights reserved