Many big data-driven companies today are moving to protect certain types of data against intrusion, leaks, or unauthorized eyes. But how do you lock down data while granting access to people who need to see it? In this practical book, authors Ted Dunning and Ellen Friedman offer two novel and practical solutions that you can implement right away. Ideal for both technical and non-technical decision makers, group leaders, developers, and data scientists, this book shows you how
I think that the title of this book is misleading. Safely sharing data implies confidentiality, integrity, authenticity etc. Contrary, this book only talks about obfuscating values by using a tool written by the authors. Even in its limited context it fails to explain its most important challenge: how to design KPIs to asses the goodness of fake data.
Interesting pointers as to why anonymising data is hard. Introduces log-synth, a tool for generating random data that can be used to share data models without the real data.