Towards Risk-aware Policy based Framework for Big Data Security and Privacy (Position Paper)
|
|
|
- Shana Floyd
- 10 years ago
- Views:
Transcription
1 Towards Risk-aware Policy based Framework for Big Data Security and Privacy (Position Paper) James Joshi, Balaji Palanisamy School of Information Sciences, University of Pittsburgh, PA, USA Abstract: The volume, velocity, variety and the veracity aspects of Big Data introduce significant security and privacy challenges. While the existing approaches to privacy and security, in particular the issue of access and trust management, themselves face significant challenges to managing the immense volumes and heterogeneity of information, the explosive growth of dynamically generated data in various media forms and formats, which may be inaccurate and incomplete, significantly exacerbates these challenges. Further, considering the increasing heterogeneity of data sources that may or may not be reliable and the issue of multiple security domains with varying security and privacy policies/mechanisms, the Big Data essentially presents seemingly insurmountable challenges. It is critical that security and privacy risks through inference, undesirable information flows, inaccurate and incomplete data, etc., need to be properly understood to synthesize appropriate solutions for Big Data. In this position paper, we discuss challenges and motivate towards a need for a risk-aware policy framework to provide a holistic approach to address these challenges. Realizing such a framework involves solving renewed challenges related to policy engineering and risk management approaches and integrating them. 1. Introduction With the rapid advances in sensor technologies, mobile, cloud and high speed computing, we have already witnessed the emergence of the Big Data era [5]. While the immense volume of data being produced at exponential rates by plethora of increasingly heterogeneous computing devices and sensors, that constitutes the Internet of Things (IoT), show huge potential for the better understanding of various phenomena and events [5, 4, 15] through predictive data analytics, the same data can be significantly misused and exploited for harvesting privacy sensitive information, or affecting the veracity or integrity of results of data analytics that will be used by people and enterprises for decision making purposes. The diversity of data sources introduces immense variety in the media types such as text, images, videos and variations within these; further, establishing reliability and trustworthiness, as well as completeness of data from different sources become very difficult [5]. These exacerbate the problem of ensuring overall quality of data and information related to an individual or an enterprise throughout its lifecycle. The richness of multimedia data generates unique privacy risks as they can be correlated to reveal very sensitive information [16]. The velocity with which multimedia data flows through the networks and devices enabled by rapid advances in mobile and cloud computing, and networking technologies, adds another level of challenge with regards to securely processing potentially inaccurate, unfiltered data in motion [5]. The increasing volume, velocity, and variety of data and the increasing challenge with regards to establishing veracity of such data, thus, present an unprecedented level of security and privacy challenges. In particular, the threat landscape has seen an immense growth resulting in a significant increase in number of threats witnessed in short periods of time. This rapid growth in the threat spectrum have also resulted in many sophisticated hacker tools and cyber criminals now have computing power that never existed before. Seen along with such increase in threats are also many sophisticated hacker tools, which if coupled with emerging big data analytics tools, will enable cyber criminals to acquire computing resources to create large scale security incidents that never existed before. Critical to devising a holistic solution for security and privacy challenges faced by individuals as well as enterprises is the understanding of what the various security and privacy risks are and how they can be
2 appropriately assessed and integrated as a key part of such a solution. Various characteristics of Big Data (the 4Vs) introduce various risks. A crucial privacy risk, for instance, is that of re-identification of individuals and inference of privacy sensitive information about them, even when information may have been de-identified [4, 15]. This may be possible because of multiple overlapping data available through multiple sources employing varying levels of security and privacy controls. Similarly, inaccurate data and models may be collected or created related to people because of potentially faulty data sources (various data capture sensors or computing devices) that generate inaccurate data or maintain low integrity/quality data. Analytic results from such data and associated models may be used for decision making purposes without appropriate validation; this may result in significant risks in individual s safety and well-being, besides raising various security and privacy risks. Because of the scale at which data may be collected, and the possibility of the high rate of flow of such data to various parties with different motives, as well as the potential to use effective data analytics to derive targeted information, significant risks of high impact data breaches is possible [4, 15]. Similarly, the exponential growth of devices with varying capabilities related to providing protection of information that flows through them create significant issues related to secure interoperation and trust management, as well as trustworthiness of data. At the same time, the Big Data provides tremendous opportunities to understand access behaviors of users so as to assess their trustworthiness and construct risk profiles which can be used to fine tune access control and privacy policies. 2. Risk Aware Access Control and Trust Management Approach We believe that a risk aware access control and trust management approach is the key to addressing many of the crucial issues related to big data security and privacy challenges. More and more, huge volumes of data related to individuals and enterprises are being generated from a huge variety of sources and stored in many different places in cyberspace (e.g., social media, service providers) this makes the overall task of tracking and managing restricted accesses to information very difficult. For instance, nowadays, personal information in various forms and details, and protected at varying levels of authorization controls, is easily available over the internet such as user s profile and information in multiple social media sites. These can be easily harvested to infer private information about a targeted person. Such information can be used to initiate more elaborate privacy attacks; for instance, in social networks, profile cloning attacks, identity clone attacks and other social media feature based attacks can be launched by accumulating and inferring a user s personal information and also by exploiting the features of applications harvesting the information [9]. To support an individual user (or an enterprise) in securely managing his personal big data (e.g., social media, health related information, profession related information) distributed over other various external application environments, as well as to securely share such data with other external entities in secure and privacy preserving manner, a user-centric, or enterprise-centric policy framework is crucial. Such a framework should have the following capabilities: It should be able to capture various content and context based, and situation aware access control policies over multimedia data. In particular, it is essentially impossible to label each protection object and specify policies on them. The size and dynamic nature of personal multimedia data make it imperative to devise content abstractions and policy templates to specify semantic based policy. Use of big multimedia data analytics can help identify potential security and privacy threats that may arise through, data fusion, aggregation and inference which can be used to potentially specify policies to control sensitive data leakage. Such a framework should be able to specify policies based and attributes and characteristics of both the subjects as well as the protection objects. Various context parameters such as local, time and social relationships are important access control decision factors; work in this area has already started to appear. Similarly, expressive policies that capture purpose, obligations and consent are critical to address privacy protection needs [12, 13].
3 To capture risk of security and privacy violations, it is important to model historical access behavior and patterns of subjects so as to establish trust values for the users or third party or external applications accessing information. For instance, how obligations have been fulfilled over time can indicate a potential malfeasor (e.g., an insider attacker) [12, 13]. Similarly, a trust based role activation scheme that minimizes the risk exposure such as one proposed in [12] could be extended. In particular, it is important to understand the risk of allowing a permission as well as a group of permissions based on the trustworthiness of the subjects accessing the protected resources. Basis to compute risk of inference by using access control relevant entities (permissions, roles, etc.) is crucial [12, 13]. It is also important to understand the risk posed by the external entities such as a social network application environment (e.g., Facebook) or a cloud provider. For instance, it is typically not clear how much risk is posed by Facebook with regards to the privacy of a user s information. In this case, Facebook system enforces certain system defined policies, and users can specify their privacy preferences; on the other hand, some controls may be undefined as shown in [1]. While a user has an expectation of privacy protection, it is important to understand whether the Facebook environment and his privacy preferences together achieve the privacy expectation he has. Our recent work in [1] provides a basis for seeing what level of privacy controls can be achieved by users in Facebook like social network and indicates what level of privacy exposure risks may be possible. Further, the user-centric policy component may be also developed to assess the privacy policies of third applications to understand the risks to the users. Use of such knowledge can help users to tune up their policies so as to ensure lower security and privacy risks. In the context of cloud, understanding the risk to data protection from other users as well as the cloud provider themselves is important to help towards better policy design. Role engineering has gained momentum in role based access control research that can be leveraged to develop better policy engineering approaches. The policy framework should be able to interact with external applications to ensure proper policy enforcement. In particular, use of cloud providers or external applications that have their own mechanisms can become very challenging with regards to policy enforcement. For instance, personal data may need to be protected based on a temporal access control policy; however, the cloud provider as such may not provide support for that. Hence, the user-centric policy component either needs to mediate each access or generate policy snapshots at different time instances and update the cloud provider side so that it enforces correctly the policy restrictions using its local mechanism [6]. Policy as a service (PaaS) proposed in [6] aim to address such an issue as an initial step. The virtualization layer for the Hadoop Distributed Filesytem proposed in [3] provides an efficient control point for seamlessly introducing such access control mechanisms as part of Hadoop MapReduce systems in Clouds. Privacy protection of data from cloud providers itself is a huge challenge that have generated interest in employing cryptographic techniques such as attribute based encryption. Further, such a framework should also provide a basis for enabling secure interoperability or securely sharing sensitive information between interested parties. Secure sharing or interoperation environments could be loosely coupled or tightly coupled [7, 11]. In a tightly coupled environment one can assume tight integration of policies of multiple domains. On the other hand, in the loosely coupled environment the information sharing requirements are typically transient and ad hoc, and policies are not known to partners which may necessitate policy and trust negotiation []. Significant work in trust management and trust negotiation exists; however, these are not able to handle the scale of big data. Policy integration/combination is a huge challenge because of the semantic heterogeneity issue with regards to information being shared by different domains, as well as the diversity of protection requirements and policies [10, 11, 14]. Several existing work have attempted to provide solutions for policy integration and decentralized trust management approaches [10, 11]. However,
4 the scale of data and the dynamic nature makes these approaches inadequate [9]. More effective and efficient risk based access and trust management approaches are needed. Developing such a framework has multiple challenges, including: developing better policy engineering approaches founded on risk management activities, formal policy specification and verification/validation approaches, policy integration and analysis approaches, utilizing big data analytics to provide better contextual and situation awareness for policy updates and supporting policy evolution management, as well as more effective and efficient policy enforcement approaches. 3. Conclusion Secure Management of Big Data with today s threat spectrum is a challenging problem. While we have been witnessing an overwhelming growth of data in terms of volume, velocity and variety, interestingly, from a security and privacy standpoint, the threat landscape and security and privacy risks have also seen an unprecedented growth. We believe that significant research effort is needed to build a generic architectural framework towards addressing these security and privacy challenges in a holistic manner. In particular, we believe a risk-based policy framework is crucial towards providing such an integrative solution. Various policy engineering and risk management challenges need to be addressed towards realizing such a framework. References 1. A. Masoumzadeh and J. Joshi, "Privacy Settings in Social Networking Systems: What You Cannot Control," in Proc. 8th ACM Symposium on Information, Computer and Communications Security (ASIA CCS 2013). ACM Press, May 2013, pp Anna Cinzia Squicciarini, Alberto Trombetta, Elisa Bertino, Supporting Robust and Secure Interactions in Open Domains through Recovery of Trust Negotiations, 27th International Conference on Distributed Computing Systems (ICDCS'07) /07 3. Balaji Palanisamy, Aameek Singh, Nagapramod Mandagere, Gabriel Alatore and Ling Liu, "VNCache: Map Reduce Analysis for Cloud-archived Data", IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (IEEE/ACM CCGrid 14), Chicago, USA, European Data Protection Supervisor s Preliminary Opinion, Privacy and Competitiveness in the age of Big data:.. March H. V. Jagadish, Johannes Gehrke, Alexandros Labrinidis, Yannis Papakonstantinou, Jignesh M. Patel, Raghu Ramakrishnan, Cyrus Shahabi, Big Data and Its Technical Challenges, Communications of the ACM, Vol. 57 No. 7, Pages H. Takabi, and James B. D. Joshi. Semantic Based Policy Management for Cloud Computing Environments. International Journal of Cloud Computing, Vol. 1, No. 2, H. Takabi, James B. D. Joshi, and Gail-Joon Ahn. Security and Privacy Challenges in Cloud Computing Environments. IEEE Security and Privacy, Vol. 8, No. 6, Min Chen, Shiwen Mao, Yunhao Liu, Big Data: A Survey, April 2014, Mobile Networks and ApplicationsVolume 19, Issue 2, pp Lei Jin, James B. D. Joshi, Mohd Anwar: Mutual-friend based attacks in social network systems. Computers & Security 37: (2013) 10. Matt Blaze, Sampath Kannan, Insup Lee, Oleg Sokolsky, Jonathan M. Smith, Angelos D. Keromytis, Wenke Lee: Dynamic Trust Management. IEEE Computer 42(2): (2009) 11. Michael Chuang, Suronapee Phoomvuthisarn, James B. D. Joshi, An Integrated Framework for Trust-Based Access Control for Open Systems, CollaborateCom 2006, GA, USA 12. Nathalie Baracaldo, James Joshi "An Adaptive Risk Management and Access Control Framework to Mitigate Insider Threats" Computers & Security Nathalie Baracaldo, James Joshi "Beyond Accountability: Using Obligations to Reduce Risk Exposure and Deter Insider Attacks" ACM Symposium on Access Control Models and Technologies (SACMAT), Amsterdam, The Netherlands Suroop M Chandran, Korporn Panyim, James B. D. Joshi, A Requirements-Driven Trust Framework for Secure Interoperation in Open Environments", The Fourth International Conference on Trust Management, (itrust-06) 15. Weitzner et. al, Consumer Privacy Bill of Rights and Big Data: response to White House Office of Science and technology Policy Request for Information, April 4, 2014
5 16. James B. D. Joshi, Mei-Ling Shyu, Shu-Ching Chen, Walid Aref, Arif Ghafoor, "A Multimedia-Based Threat Management and Information Security Framework," in Multimedia Technologies: Concepts, Methodologies, Tools, and Applications (3 Volumes) Edited By: Mahbubur Rahman Syed, Minnesota State University, Mankato, USA, June, 2008
SecureCloud: Towards a Comprehensive Security Framework for Cloud Computing Environments
2010 34th Annual IEEE Computer Software and Applications Conference Workshops SecureCloud: Towards a Comprehensive Security Framework for Cloud Computing Environments Hassan Takabi School of Information
BIG-Data Challenges: A Review on Existing Solutions
American Journal of Information Science and Computer Engineering Vol. 1, No. 2, 2015, pp. 38-43 http://www.aiscience.org/journal/ajisce BIG-Data Challenges: A Review on Existing Solutions Sheikh Muhammad
HEALTH CARE AND CYBER SECURITY:
HEALTH CARE AND CYBER SECURITY: Increasing Threats Require Increased Capabilities kpmg.com 1 HEALTH CARE AND CYBER SECURITY EXECUTIVE SUMMARY Four-fifths of executives at healthcare providers and payers
JAMES BIKRAM DHOJ JOSHI
JAMES BIKRAM DHOJ JOSHI 706A IS Building 227 MacDuff Court 135 N. Bellefield Avenue, PA 15260 Gibsonia, PA 15044 Office: (412) 624-9982 Home: (724) 502-4076 EDUCATION PhD, Computer Engineering, Purdue
Associate Prof. Dr. Victor Onomza Waziri
BIG DATA ANALYTICS AND DATA SECURITY IN THE CLOUD VIA FULLY HOMOMORPHIC ENCRYPTION Associate Prof. Dr. Victor Onomza Waziri Department of Cyber Security Science, School of ICT, Federal University of Technology,
Data Refinery with Big Data Aspects
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 3, Number 7 (2013), pp. 655-662 International Research Publications House http://www. irphouse.com /ijict.htm Data
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK REVIEW ON BIG DATA SECURITY IN CLOUD COMPUTING MISS. ANKITA S. AMBADKAR 1, PROF.
NSF Workshop on Big Data Security and Privacy
NSF Workshop on Big Data Security and Privacy Report Summary Bhavani Thuraisingham The University of Texas at Dallas (UTD) February 19, 2015 Acknowledgement NSF SaTC Program for support Chris Clifton and
Cloud computing has generated significant
Security and Privacy Challenges in Cloud Computing Environments Cloud computing is an evolving paradigm with tremendous momentum, but its unique aspects exacerbate security and privacy challenges. This
Sustainability and Energy Efficiency in Data Centers Design and Operation
Sustainability and Energy Efficiency in Data Centers Design and Operation Krishna Kant Intel and GMU [email protected] David Du University of Minnesota [email protected] Abstract The tutorial will provide
Mining Big Data to Predicting Future
27 Mining Big Data to Predicting Future Department of Computer Science and Engineering, Pondicherry Engineering College, Puducherry-605014, INDIA [email protected] Abstract Due to technological
Cisco SAFE: A Security Reference Architecture
Cisco SAFE: A Security Reference Architecture The Changing Network and Security Landscape The past several years have seen tremendous changes in the network, both in the kinds of devices being deployed
Assessing Risks in the Cloud
Assessing Risks in the Cloud Jim Reavis Executive Director Cloud Security Alliance Agenda Definitions of Cloud & Cloud Usage Key Cloud Risks About CSA CSA Guidance approach to Addressing Risks Research
Information Security Management System for Cloud Computing
ICT Innovations 2011 Web Proceedings ISSN 1857-7288 49 Information Security Management System for Cloud Computing Sashko Ristov, Marjan Gushev, and Magdalena Kostoska Ss. Cyril and Methodius University
Internet of Things (IoT): A vision, architectural elements, and future directions
SeoulTech UCS Lab 2014-2 st Internet of Things (IoT): A vision, architectural elements, and future directions 2014. 11. 18 Won Min Kang Email: [email protected] Table of contents Open challenges
Big Data Driven Knowledge Discovery for Autonomic Future Internet
Big Data Driven Knowledge Discovery for Autonomic Future Internet Professor Geyong Min Chair in High Performance Computing and Networking Department of Mathematics and Computer Science College of Engineering,
Top Ten Security and Privacy Challenges for Big Data and Smartgrids. Arnab Roy Fujitsu Laboratories of America
1 Top Ten Security and Privacy Challenges for Big Data and Smartgrids Arnab Roy Fujitsu Laboratories of America 2 User Roles and Security Concerns [SKCP11] Users and Security Concerns [SKCP10] Utilities:
Cloud Courses Description
Courses Description 101: Fundamental Computing and Architecture Computing Concepts and Models. Data center architecture. Fundamental Architecture. Virtualization Basics. platforms: IaaS, PaaS, SaaS. deployment
Network Mission Assurance
Network Mission Assurance Michael F. Junod, Patrick A. Muckelbauer, PhD, Todd C. Hughes, PhD, Julius M. Etzl, and James E. Denny Lockheed Martin Advanced Technology Laboratories Camden, NJ 08102 {mjunod,pmuckelb,thughes,jetzl,jdenny}@atl.lmco.com
1. Understanding Big Data
Big Data and its Real Impact on Your Security & Privacy Framework: A Pragmatic Overview Erik Luysterborg Partner, Deloitte EMEA Data Protection & Privacy leader Prague, SCCE, March 22 nd 2016 1. 2016 Deloitte
Cloud Courses Description
Cloud Courses Description Cloud 101: Fundamental Cloud Computing and Architecture Cloud Computing Concepts and Models. Fundamental Cloud Architecture. Virtualization Basics. Cloud platforms: IaaS, PaaS,
Security Infrastructure for Trusted Offloading in Mobile Cloud Computing
Security Infrastructure for Trusted Offloading in Mobile Cloud Computing Professor Kai Hwang University of Southern California Presentation at Huawei Forum, Santa Clara, Nov. 8, 2014 Mobile Cloud Security
Big Data, Big Risk, Big Rewards. Hussein Syed
Big Data, Big Risk, Big Rewards Hussein Syed Discussion Topics Information Security in healthcare Cyber Security Big Data Security Security and Privacy concerns Security and Privacy Governance Big Data
Big Data: Study in Structured and Unstructured Data
Big Data: Study in Structured and Unstructured Data Motashim Rasool 1, Wasim Khan 2 [email protected], [email protected] Abstract With the overlay of digital world, Information is available
International Journal of Engineering Research ISSN: 2348-4039 & Management Technology November-2015 Volume 2, Issue-6
International Journal of Engineering Research ISSN: 2348-4039 & Management Technology Email: [email protected] November-2015 Volume 2, Issue-6 www.ijermt.org Modeling Big Data Characteristics for Discovering
IT Infrastructure Services. White Paper. Cyber Risk Mitigation for Smart Cities
IT Infrastructure Services White Paper Cyber Risk Mitigation for Smart Cities About the Author Abhik Chaudhuri Abhik Chaudhuri is a Domain Consultant with the Information Technology Infrastructure Services
Big Data: Tools and Technologies in Big Data
Big Data: Tools and Technologies in Big Data Jaskaran Singh Student Lovely Professional University, Punjab Varun Singla Assistant Professor Lovely Professional University, Punjab ABSTRACT Big data can
A HELPING HAND TO PROTECT YOUR REPUTATION
OVERVIEW SECURITY SOLUTIONS A HELPING HAND TO PROTECT YOUR REPUTATION CONTENTS INFORMATION SECURITY MATTERS 01 TAKE NOTE! 02 LAYERS OF PROTECTION 04 ON GUARD WITH OPTUS 05 THREE STEPS TO SECURITY PROTECTION
Challenges in Database Security. Elisa Bertino CERIAS Purdue University
Challenges in Database Security Elisa Bertino CERIAS Purdue University Why Today is Database Security more Challenging Data security concerns are evolving We have massive amounts of data Data is very valuable
Cyber Situational Awareness for Enterprise Security
Cyber Situational Awareness for Enterprise Security Tzvi Kasten AVP, Business Development Biju Varghese Director, Engineering Sudhir Garg Technical Architect The security world is changing as the nature
A Study on Security and Privacy in Big Data Processing
A Study on Security and Privacy in Big Data Processing C.Yosepu P Srinivasulu Bathala Subbarayudu Assistant Professor, Dept of CSE, St.Martin's Engineering College, Hyderabad, India Assistant Professor,
Master big data to optimize the oil and gas lifecycle
Viewpoint paper Master big data to optimize the oil and gas lifecycle Information management and analytics (IM&A) helps move decisions from reactive to predictive Table of contents 4 Getting a handle on
CYBERSECURITY IN FINANCIAL SERVICES POINT OF VIEW CHALLENGE 1 REGULATORY COMPLIANCE ACROSS GEOGRAPHIES
POINT OF VIEW CYBERSECURITY IN FINANCIAL SERVICES Financial services institutions are globally challenged to keep pace with changing and covert cybersecurity threats while relying on traditional response
Big Data - Security and Privacy
Big Data - Security and Privacy Elisa Bertino CS Department, Cyber Center, and CERIAS Purdue University Cyber Center! Big Data EveryWhere! Lots of data is being collected, warehoused, and mined Web data,
How To Understand Data Theory
Predictive Analytics & Business Insights 2015, Chicago Mudit Mangal Project Lead, Data Analytics, Supply Chain Sears Holdings Corporation 06/11/2015 Agenda WHAT IS HAPPENING WHAT ARE BENEFITS AND CHALLENGES
Improved Event Logging for Security and Forensics: developing audit management infrastructure requirements
Improved Event Logging for Security and Forensics: developing audit management infrastructure requirements Atif Ahmad & Anthonie Ruighaver University of Melbourne, Australia Abstract The design and implementation
Unified Cyber Security Monitoring and Management Framework By Vijay Bharti Happiest Minds, Security Services Practice
Unified Cyber Security Monitoring and Management Framework By Vijay Bharti Happiest Minds, Security Services Practice Introduction There are numerous statistics published by security vendors, Government
Preface Introduction
Preface Introduction Cloud computing is revolutionizing all aspects of technologies to provide scalability, flexibility and cost-effectiveness. It has become a challenge to ensure the security of cloud
Federation of Cloud Computing Infrastructure
IJSTE International Journal of Science Technology & Engineering Vol. 1, Issue 1, July 2014 ISSN(online): 2349 784X Federation of Cloud Computing Infrastructure Riddhi Solani Kavita Singh Rathore B. Tech.
Compliance Guide: ASD ISM OVERVIEW
Compliance Guide: ASD ISM OVERVIEW Australian Information Security Manual Mapping to the Principles using Huntsman INTRODUCTION In June 2010, The Australian Government Protective Security Policy Framework
A Systems of Systems. The Internet of Things. perspective on. Johan Lukkien. Eindhoven University
A Systems of Systems perspective on The Internet of Things Johan Lukkien Eindhoven University System applications platform In-vehicle network network Local Control Local Control Local Control Reservations,
Data Security: Fight Insider Threats & Protect Your Sensitive Data
Data Security: Fight Insider Threats & Protect Your Sensitive Data Marco Ercolani Agenda Data is challenging to secure A look at security incidents Cost of a Data Breach Data Governance and Security Understand
Data- centric Security: A New Information Security Perimeter Date: March 2015 Author: Jon Oltsik, Senior Principal Analyst
ESG Solution Showcase Data- centric Security: A New Information Security Perimeter Date: March 2015 Author: Jon Oltsik, Senior Principal Analyst Abstract: Information security practices are in the midst
Enhancing Cybersecurity with Big Data: Challenges & Opportunities
Enhancing Cybersecurity with Big Data: Challenges & Opportunities Independently Conducted by Ponemon Institute LLC Sponsored by Microsoft Corporation November 2014 CONTENTS 2 3 6 9 10 Introduction The
Test Data Management for Security and Compliance
White Paper Test Data Management for Security and Compliance Reducing Risk in the Era of Big Data WHITE PAPER This document contains Confidential, Proprietary and Trade Secret Information ( Confidential
Cloud security architecture
ericsson White paper Uen 284 23-3244 January 2015 Cloud security architecture from process to deployment The Trust Engine concept and logical cloud security architecture presented in this paper provide
National and Transnational Security Implications of Big Data in the Life Sciences
Prepared by the American Association for the Advancement of Science in conjunction with the Federal Bureau of Investigation and the United Nations Interregional Crime and Justice Research Institute National
Access Control Framework of Personal Cloud based on XACML
Access Control Framework of Personal Cloud based on XACML 1 Jun-Young Park, 2 Young-Rok Shin, 3 Kyoung-Hun Kim, 4 Eui-Nam Huh 1First Author, 2 Kyung Hee University, {parkhans, shinyr}@khu.ac.kr 3 Gangdong
Services. Cybersecurity. Capgemini & Sogeti. Guiding enterprises and government through digital transformation while keeping them secure
Home Secure digital transformation SMACT Advise, Protect & Monitor Why Capgemini & Sogeti? In safe hands Capgemini & Sogeti Cybersecurity Services Guiding enterprises and government through digital transformation
Data-Centric Security vs. Database-Level Security
TECHNICAL BRIEF Data-Centric Security vs. Database-Level Security Contrasting Voltage SecureData to solutions such as Oracle Advanced Security Transparent Data Encryption Introduction This document provides
ISSN: 2320-1363 CONTEXTUAL ADVERTISEMENT MINING BASED ON BIG DATA ANALYTICS
CONTEXTUAL ADVERTISEMENT MINING BASED ON BIG DATA ANALYTICS A.Divya *1, A.M.Saravanan *2, I. Anette Regina *3 MPhil, Research Scholar, Muthurangam Govt. Arts College, Vellore, Tamilnadu, India Assistant
Enhancing Cloud Security By: Gotcha (Generating Panoptic Turing Tests to Tell Computers and Human Aparts)
International Journal of Electronic and Electrical Engineering. ISSN 0974-2174 Volume 7, Number 8 (2014), pp. 837-841 International Research Publication House http://www.irphouse.com Enhancing Cloud Security
Teradata and Protegrity High-Value Protection for High-Value Data
Teradata and Protegrity High-Value Protection for High-Value Data 03.16 EB7178 DATA SECURITY Table of Contents 2 Data-Centric Security: Providing High-Value Protection for High-Value Data 3 Visibility:
Big Data: Overview and Roadmap. 2015 eglobaltech. All rights reserved.
Big Data: Overview and Roadmap 2015 eglobaltech. All rights reserved. What is Big Data? Large volumes of complex and variable data that require advanced techniques and technologies to enable capture, storage,
Securing the Microsoft Cloud
Securing the Microsoft Cloud Page 1 Securing the Microsoft Cloud Microsoft recognizes that trust is necessary for organizations and customers to fully embrace and benefit from cloud services. We are committed
Big Data: Opportunities & Challenges, Myths & Truths 資 料 來 源 : 台 大 廖 世 偉 教 授 課 程 資 料
Big Data: Opportunities & Challenges, Myths & Truths 資 料 來 源 : 台 大 廖 世 偉 教 授 課 程 資 料 美 國 13 歲 學 生 用 Big Data 找 出 霸 淩 熱 點 Puri 架 設 網 站 Bullyvention, 藉 由 分 析 Twitter 上 找 出 提 到 跟 霸 凌 相 關 的 詞, 搭 配 地 理 位 置
NIST Big Data Public Working Group
NIST Big Data Public Working Group Requirements May 13, 2014 Arnab Roy, Fujitsu On behalf of the NIST BDWG S&P Subgroup S&P Requirements Emerging due to Big Data Characteristics Variety: Traditional encryption
Context-Aware Role Based Access Control Using User Relationship
International Journal of Computer Theory and Engineering, Vol. 5, No. 3, June 2013 Context-Aware Role Based Access Control Using User Relationship Kangsoo Jung and Seog Park We suggest relationship-based
Information Services for Smart Grids
Smart Grid and Renewable Energy, 2009, 8 12 Published Online September 2009 (http://www.scirp.org/journal/sgre/). ABSTRACT Interconnected and integrated electrical power systems, by their very dynamic
APPLICATION OF MULTI-AGENT SYSTEMS FOR NETWORK AND INFORMATION PROTECTION
18-19 September 2014, BULGARIA 137 Proceedings of the International Conference on Information Technologies (InfoTech-2014) 18-19 September 2014, Bulgaria APPLICATION OF MULTI-AGENT SYSTEMS FOR NETWORK
PKI: THE SECURITY SOLUTION FOR THE INTERNET OF THINGS
PKI: THE SECURITY SOLUTION FOR THE INTERNET OF THINGS TABLE OF CONTENTS 2 EXECUTIVE SUMMARY 3 THE EMERGENCE OF THE INTERNET OF THINGS 4 SECURITY RISKS IN NETWORKED DEVICES 6 PKI S FOUNDATION OF STRONG
Key Cyber Risks at the ERP Level
Key Cyber Risks at the ERP Level Process & Industrial Products (P&IP) Sector December, 2014 Today s presenters Bhavin Barot, Sr. Manager Deloitte & Touche LLP Goran Ristovski, Manager Deloitte & Touche
IoT Security Platform
IoT Security Platform 2 Introduction Wars begin when the costs of attack are low, the benefits for a victor are high, and there is an inability to enforce law. The same is true in cyberwars. Today there
CHAPTER 1 INTRODUCTION
1 CHAPTER 1 INTRODUCTION 1.1 Overview Cloud computing has emerged as a business IT solution that provides a new way to manage and deliver automated computing services to consumers via the Internet (Shawish
ACL Based Dynamic Network Reachability in Cross Domain
South Asian Journal of Engineering and Technology Vol.2, No.15 (2016) 68 72 ISSN No: 2454-9614 ACL Based Dynamic Network Reachability in Cross Domain P. Nandhini a, K. Sankar a* a) Department Of Computer
Boarding to Big data
Database Systems Journal vol. VI, no. 4/2015 11 Boarding to Big data Oana Claudia BRATOSIN University of Economic Studies, Bucharest, Romania [email protected] Today Big data is an emerging topic,
An Experimental Approach Towards Big Data for Analyzing Memory Utilization on a Hadoop cluster using HDFS and MapReduce.
An Experimental Approach Towards Big Data for Analyzing Memory Utilization on a Hadoop cluster using HDFS and MapReduce. Amrit Pal Stdt, Dept of Computer Engineering and Application, National Institute
POLICIES TO MITIGATE CYBER RISK
POLICIES TO MITIGATE CYBER RISK http://www.tutorialspoint.com/information_security_cyber_law/policies_to_mitigate_cyber_risk.htm Copyright tutorialspoint.com This chapter takes you through the various
Innovative Security for an Accelerating World New Approaches for Chief Security Officers
Information Systems Security Association Innovative Security for an Accelerating World New Approaches for Chief Security Officers John N. Stewart Senior Vice President Chief Security and Trust Officer
Data Storage Security in Cloud Computing for Ensuring Effective and Flexible Distributed System
Data Storage Security in Cloud Computing for Ensuring Effective and Flexible Distributed System 1 K.Valli Madhavi A.P [email protected] Mobile: 9866034900 2 R.Tamilkodi A.P [email protected] Mobile:
Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist, CISSP @TheGrantBrown
Cyber Resilience Implementing the Right Strategy Grant Brown specialist, CISSP @TheGrantBrown 1 2 Network + Technology + Customers = $$ 3 Perfect Storm? 1) Increase in Bandwidth (extended reach) 2) Available
An Object Oriented Role-based Access Control Model for Secure Domain Environments
International Journal of Network Security, Vol.4, No.1, PP.10 16, Jan. 2007 10 An Object Oriented -based Access Control Model for Secure Domain Environments Cungang Yang Department of Electrical and Computer
Sytorus Information Security Assessment Overview
Sytorus Information Assessment Overview Contents Contents 2 Section 1: Our Understanding of the challenge 3 1 The Challenge 4 Section 2: IT-CMF 5 2 The IT-CMF 6 Section 3: Information Management (ISM)
Some Specific Parawise Suggestinons. 2. An application which collects and analyzes this data for further consolidation and,
Comments by Amcham India on draft Internet of Things (IoT) Policy released by the Department of Electronics & Information Technology (DeitY), on October 16, 2014 Standards The Draft IoT Policy already
Keywords: Big Data, HDFS, Map Reduce, Hadoop
Volume 5, Issue 7, July 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Configuration Tuning
Keywords: Cloudsim, MIPS, Gridlet, Virtual machine, Data center, Simulation, SaaS, PaaS, IaaS, VM. Introduction
Vol. 3 Issue 1, January-2014, pp: (1-5), Impact Factor: 1.252, Available online at: www.erpublications.com Performance evaluation of cloud application with constant data center configuration and variable
Research Topics in the National Cyber Security Research Agenda
Research Topics in the National Cyber Security Research Agenda Trust and Security for our Digital Life About this document: This document summarizes the research topics as identified in the National Cyber
ProtectWise: Shifting Network Security to the Cloud Date: March 2015 Author: Tony Palmer, Senior Lab Analyst and Aviv Kaufmann, Lab Analyst
ESG Lab Spotlight ProtectWise: Shifting Network Security to the Cloud Date: March 2015 Author: Tony Palmer, Senior Lab Analyst and Aviv Kaufmann, Lab Analyst Abstract: This ESG Lab Spotlight examines the
Securing the Cloud Infrastructure
EXECUTIVE STRATEGY BRIEF Microsoft recognizes that security and privacy protections are essential to building the necessary customer trust for cloud computing to reach its full potential. This strategy
GAO. INFORMATION SECURITY Persistent Weaknesses Highlight Need for Further Improvement
GAO For Release on Delivery Expected at time 1:00 p.m. EDT Thursday, April 19, 2007 United States Government Accountability Office Testimony Before the Subcommittee on Emerging Threats, Cybersecurity,
