An Overview of Big Data Technology and Security Implications



Similar documents
An Overview of Cloud & Big Data Technology and Security Implications. Tim Grance Senior Computer Scientist NIST Information Technology Laboratory

An Overview of Big Data Technology and Security Implications

Tackling Big Data. Michael Cooper & Peter Mell NIST Information Technology Laboratory Computer Security Division

Perspectives on Cloud Computing and Standards. Peter Mell, Tim Grance NIST, Information Technology Laboratory

Perspectives on Cloud Computing and Standards. Peter Mell, Tim Grance NIST, Information Technology Laboratory

Use of the Common Vulnerabilities and Exposures (CVE) Vulnerability Naming Scheme

Perspectives on Moving to the Cloud Paradigm and the Need for Standards. Peter Mell, Tim Grance NIST, Information Technology Laboratory

BIG DATA IN THE CLOUD : CHALLENGES AND OPPORTUNITIES MARY- JANE SULE & PROF. MAOZHEN LI BRUNEL UNIVERSITY, LONDON

ITL BULLETIN FOR JUNE 2012 CLOUD COMPUTING: A REVIEW OF FEATURES, BENEFITS, AND RISKS, AND RECOMMENDATIONS FOR SECURE, EFFICIENT IMPLEMENTATIONS

A STUDY OF OPEN INNOVATION IN CLOUD COMPUTING

Oracle Database - Engineered for Innovation. Sedat Zencirci Teknoloji Satış Danışmanlığı Direktörü Türkiye ve Orta Asya

Security & Trust in the Cloud

The NIST Definition of Cloud Computing

Data, Data Everywhere

Information Auditing and Governance of Cloud Computing IT Capstone Spring 2013 Sona Aryal Laura Webb Cameron University.

Cloud Security: Evaluating Risks within IAAS/PAAS/SAAS

Big Data on the Open Cloud

A Survey on Cloud Security Issues and Techniques

Designing a Data Solution with Microsoft SQL Server 2014

Data Modeling for Big Data

Increasing Business Productivity and Value in Financial Services with Secure Big Data Architecture

The? Data: Introduction and Future

SECURITY METRICS: MEASUREMENTS TO SUPPORT THE CONTINUED DEVELOPMENT OF INFORMATION SECURITY TECHNOLOGY

Mobile, Cloud, Advanced Threats: A Unified Approach to Security

The NIST Definition of Cloud Computing (Draft)

Testing Big data is one of the biggest

Critical Controls for Cyber Security.

Information Blue Valley Schools FEBRUARY 2015

PSG College of Technology, Coimbatore Department of Computer & Information Sciences BSc (CT) G1 & G2 Sixth Semester PROJECT DETAILS.

Enterprise and Standard Feature Compare

International Journal of Advancements in Research & Technology, Volume 3, Issue 5, May ISSN BIG DATA: A New Technology

John Essner, CISO Office of Information Technology State of New Jersey

Using Classification to manage File Servers. Nir Ben-Zvi, Microsoft Corporation

Big Data: An Introduction, Challenges & Analysis using Splunk

Information Security Guideline: Cloud Computing Services. Information Security and Privacy Committee Draft version 8/1/2012

Introduction to Big Data! with Apache Spark" UC#BERKELEY#

Designing Database Solutions for Microsoft SQL Server 2012

WINDOWS AZURE DATA MANAGEMENT

Key Management Challenges in a Cloud Ecosystem

Alliance AES Key Management

Designing Database Solutions for Microsoft SQL Server 2012 MOC 20465

Implement Hadoop jobs to extract business value from large and varied data sets

Data Catalogs for Hadoop Achieving Shared Knowledge and Re-usable Data Prep. Neil Raden Hired Brains Research, LLC

The Hybrid Cloud: Bringing Cloud-Based IT Services to State Government

Enterprise Acquisition of Cloud Computing Services

SharePlex for SQL Server

Big Data, Big Risk, Big Rewards. Hussein Syed

Trust: When Physical and Logical Security Worlds Collide

Cloud Security. Peter Jopling IBM UK Ltd Software Group Hursley Labs. peterjopling IBM Corporation

The Magical Cloud. Lennart Franked. Department for Information and Communicationsystems (ICS), Mid Sweden University, Sundsvall.

Cloud Security. DLT Solutions LLC June #DLTCloud

Chapter3: Understanding Cloud Computing

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist,

Your Data, Any Place, Any Time. Microsoft SQL Server 2008 provides a trusted, productive, and intelligent data platform that enables you to:

BIG DATA ANALYTICS REFERENCE ARCHITECTURES AND CASE STUDIES

Big Data & Data Gate : Auditing Big Data : What do we need to know?

Designing a Data Solution with Microsoft SQL Server 2014

An Enterprise Continuous Monitoring Technical Reference Architecture

Cloud security: A matter of trust? Dr Mark Ian Williams CEO, Muon Consulting

Designing a Data Solution with Microsoft SQL Server

IT ASSET MANAGEMENT Securing Assets for the Financial Services Sector

Oracle Big Data Strategy Simplified Infrastrcuture

Securing NoSQL Clusters

Cloud Courses Description

Course 20465: Designing a Data Solution with Microsoft SQL Server

Reference Architecture: Enterprise Security For The Cloud

Designing a Data Solution with Microsoft SQL Server

This Symposium brought to you by

Cloud Courses Description

Security Issues in Cloud Computing

Goals. What is Cloud Computing? 11/11/2010. Understand what cloud computing is and how. Understand the challenges and advantages of cloud computing

BIG DATA-AS-A-SERVICE

Transforming the Telecoms Business using Big Data and Analytics

Business white paper. Missioncritical. defense. Creating a coordinated response to application security attacks

and NoSQL Data Governance for Regulated Industries Using Hadoop Justin Makeig, Director Product Management, MarkLogic October 2013

Addressing Risk Data Aggregation and Risk Reporting Ben Sharma, CEO. Big Data Everywhere Conference, NYC November 2015

Big Data and Natural Language: Extracting Insight From Text

How To Understand Cloud Usability

MODEL OF SOLUTIONS FOR DATA SECURITY IN CLOUD COMPUTING

Choosing The Right Big Data Tools For The Job A Polyglot Approach

IBM Cloud Security Draft for Discussion September 12, IBM Corporation

BIG DATA FOR YOUR DC

Making Sense of Big Data in Insurance

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

Big Data and Analytics at the IRS:

Security Controls for the Autodesk 360 Managed Services

What do Big Data & HAVEn mean? Robert Lejnert HP Autonomy

Security Management of Cloud-Native Applications. Presented By: Rohit Sharma MSc in Dependable Software Systems (DESEM)

Novell Sentinel Log Manager 1.2 Release Notes. 1 What s New. 1.1 Enhancements to Licenses. Novell. February 2011

Instructional Model for Building effective Big Data Curricula for Online and Campus Education

Hortonworks & SAS. Analytics everywhere. Page 1. Hortonworks Inc All Rights Reserved

Oracle Database 12c Plug In. Switch On. Get SMART.

CLUSTER ANALYSIS WITH R

Big Data Analytics Nokia

Big Data Architectures: Concerns and Strategies for Cyber Security

How to Enhance Traditional BI Architecture to Leverage Big Data

Securing Data on Microsoft SQL Server 2012

Your Data, Any Place, Any Time.

Logically Securing a Public Cloud Service

Transcription:

An Overview of Big Data Technology and Security Implications Tim Grance Senior Computer Scientist NIST Information Technology Laboratory grance@nist.gov

Disclaimer The ideas herein represent the author s notional views on big data technology and do not necessarily represent the official opinion of NIST. Any mention of commercial and not-for-profit entities, products, and technology is for informational purposes only; it does not imply recommendation or endorsement by NIST or usability for any specific purpose. Slides derived from research done by Peter Mell NIST Information Technology Laboratory

Predictions of the Industrial Revolution of Data Tim O Reilly Data is the new raw material of business Economist Challenges to achieving the revolution It is not possible to store all the data we produce 95% of created information was unstructured in 2010 Key observation Relational database management systems (RDBMS) will be challenged to scale up or out to meet the demand Credit: Data data everywhere, Economist; Extracting Value from Chaos, Gantz et al. 3

Notional Definition for Big Data Big Data Big data is where the data volume, acquisition velocity, or data representation limits the ability to perform effective analysis using traditional relational approaches or requires the use of significant horizontal scaling for efficient processing. Big Data Big Data Science Big Data Framework Big Data Infrastructure 4

More Notional Definitions Big Data Science Big data science is the study of techniques covering the acquisition, conditioning, and evaluation of big data. These techniques are a synthesis of both information technology and mathematical approaches. Big Data Frameworks Big data frameworks are software libraries along with their associated algorithms that enable distributed processing and analysis of big data problems across clusters of compute units (e.g., servers, CPUs, or GPUs). Big Data Infrastructure Big data infrastructure is an instantiation of one or more big data frameworks that includes management interfaces, actual servers (physical or virtual), storage facilities, networking, and possibly back-up systems. Big data infrastructure can be instantiated to solve specific big data problems or to serve as a general purpose analysis and processing engine. 5

Hypothesis: Big Data approaches will open up new avenues of IT security metrology Revolutions in science have often been preceded by revolutions in measurement, - Sinan Aral, New York University Arthur Coviello, Chairman RSA Security must adopt a big data view The age of big data has arrived in security management. We must collect data throughout the enterprise, not just logs We must provide context and perform real time analysis There is precious little information on how to do this Credit: Data, data everywhere, Economist; http://searchcloudsecurity.techtarget.com/news/2240111123/coviello-talks-about-building-a-trusted-cloud-resilient-security 6

Big Data is Moving into IT Security Products Several years ago, some security companies had an epiphany: Traditional relational implementations were not always keeping up with data demands A changed industry: Some were able to stick with traditional relational approaches Some partitioned their data and used multiple relational silos Some quietly switched over to NoSQL approaches Some adopted a hybrid approach, putting high value data in a relational store and lower value data in NoSQL stores Credit: This is based on my discussions with IT security companies in 12/2011 at the Government Technology Research Alliance Security Council 2011

Security Features are Slowly Moving into Big Data Implementations Many big data systems were not designed with security in mind Tim Mather, KPMG There are far more security controls for relational systems than for NoSQL systems SQL security: secure configuration management, multifactor authentication, data classification, data encryption, consolidated auditing/reporting, database firewalls, vulnerability assessment scanners NoSQL security: cell-level access labels, kerberos-based authentication, access control lists for tables/column families Credit: Securing Big Data, Cloud Security Alliance Congress 2011, Tim Mather KPMG 8

Research Area 1: The Computer Science of Big Data 1. What is a definition of big data? What computer science properties are we trying to instantiate? 2. What types of big data frameworks exist? Can we identify a taxonomy that relates them hierarchically? 3. What are the strengths, weaknesses, and appropriateness of big data frameworks for specific classes of problems? What are the mathematical foundations for big data frameworks? 4. How can we measure the consistency provided by a big data solution? 5. Can we define standard for querying big data solutions? With an understanding of the capabilities available and their suitability for types of problems, we can then apply this knowledge to computer security. 9

Research Area 2: Furthering IT Security Metrology through Big Data Technology 1. Determine how IT security metrology is limited by traditional data representations (i.e., highly structured relational storage) 2. Investigate how big data frameworks can benefit IT security measurement What new metrics could be available? 3. Identify specific security problems that can benefit from big data approaches Conduct experiments to test solving identified problems 4. Explore the use of big data frameworks within existing security products What new capabilities are available? How has this changed processing capacity? 10

Research Area 3: The Security of Big Data Infrastructure 1. Evaluate the security capabilities of big data infrastructure Do the available tools provide needed security features? What security models can be used when implementing big data infrastructure? 2. Identify techniques to enhance security in big data frameworks (e.g., data tagging approaches, shadoop) Conduct experiments on enhanced security framework implementations 11

Research Area 4: The Privacy of Big Data Implementations Big data technology enables massive data aggregation beyond what has been previously possible Inferencing concerns with non-sensitive data Legal foundations for privacy in data aggregation Application of NIST Special Publication 800-53 privacy controls 12