NIST Big Data Public Working Group Security and Privacy Subgroup Presentation September 30, 2013 Arnab Roy, Fujitsu Akhil Manchanda, GE Nancy Landreville,

Slides:



Advertisements
Similar presentations
HCQ P MEDICARES HEALTH CARE QUALITY IMPROVEMENT PROGRAM QualityNet Exchange Dennis Stricker Director, Information Systems Group Office of Clinical Standards.
Advertisements

Potential Smart Grid standardisation work in ETSI Security and privacy aspects Carmine Rizzo on behalf of Scott CADZOW, C3L © ETSI All rights reserved.
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Presentation by Priyanka Sawarkar
ASCR Data Science Centers Infrastructure Demonstration S. Canon, N. Desai, M. Ernst, K. Kleese-Van Dam, G. Shipman, B. Tierney.
Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
NIST Big Data Public Working Group Security and Privacy Subgroup Presentation September 30, 2013 Arnab Roy, Fujitsu Akhil Manchanda, GE Nancy Landreville,
NIST Big Data Public Working Group Big Data PWG Overview Presentation September 30, 2013 Wo Chang, NIST Robert Marcus, ET-Strategies Chaitanya Baru, UC.
IEEE BigData Overview October NIST Big Data Public Working Group NBD-PWG Based on September 30, 2013 Presentations at one day workshop at NIST Leaders.
Reference Architecture Subgroup NIST Big Data Public Working Group Reference Architecture Subgroup September 30, 2013 Co-chairs: Orit LevinMicrosoft James.
Security Controls – What Works
Unified Logs and Reporting for Hybrid Centralized Management
MS DB Proposal Scott Canaan B. Thomas Golisano College of Computing & Information Sciences.
Tools and Services for the Long Term Preservation and Access of Digital Archives Joseph JaJa, Mike Smorul, and Sangchul Song Institute for Advanced Computer.
Applied Cryptography for Network Security
Cryptography and Network Security Chapter 1. Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming,
NIST Big Data Public Working Group Reference Architecture Subgroup September 30, 2013 Co-chairs: Orit LevinMicrosoft James KetnerAT&T Don KrapohlAugmented.
NIST BIG DATA WG Reference Architecture Subgroup Meeting Agenda Co-chairs: Orit Levin (Microsoft) James Ketner (AT&T) Don Krapohl (Augmented Intelligence)
8/15/2013NIST Big Data WG / Ref Arch Subgroup1 NIST Big Data Program Alignment: Roadmap & Reference Architecture Version 1.3 Roadmap Subgroup NIST Big.
N. GSU Slide 1 Chapter 04 Cloud Computing Systems N. Xiong Georgia State University.
A Robust Health Data Infrastructure P. Jon White, MD Director, Health IT Agency for Healthcare Research and Quality
Cloud Computing Cloud Security– an overview Keke Chen.
Best Practices in Deploying a PKI Solution BIEN Nguyen Thanh Product Consultant – M.Tech Vietnam
© 2011 IBM Corporation Smarter Software for a Smarter Planet The Capabilities of IBM Software Borislav Borissov SWG Manager, IBM.
DuraCloud Managing durable data in the cloud Michele Kimpton, Director DuraSpace.
European Interoperability Architecture e-SENS Workshop : Document Interoperability Solutions use case 7-8 January 2015.
Joseph Ferracin Director IT Security Solutions Managing Security.
K E Y : SW Service Use Big Data Information Flow SW Tools and Algorithms Transfer Application Provider Visualization Access Analytics Curation Collection.
WHEN TITLE IS NOT A QUESTION N O ‘WE CAN’ WHEN TITLE IS NOT A QUESTION N O ‘WE CAN’ WHEN TITLE IS NOT A QUESTION N O ‘WE CAN’ Identity and Privacy: the.
Enterprise Privacy Architectures Leveraging Encryption to Keep Data Private Karim Toubba VP of Product Management Ingrian Networks.
Un peu de recherche…. 2 LIRIS/DCS/DRIM 3 Nostalgia: an overview of the past 10 years Some contributions to the management of data in grids Some contributions.
NIST BIG DATA WG Reference Architecture Subgroup Draft Co-chairs: Orit Levin (Microsoft) James Ketner (AT&T) Don Krapohl (Augmented Intelligence) August.
Microsoft TechForge 2009 SQL Server 2008 Unplugged Microsoft’s Data Platform Vinod Kumar Technology Evangelist – DB and BI
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
IoT, Big Data and Emerging Technologies
Privacy Communication Privacy Confidentiality Access Policies Systems Crypto Enforced Computing on Encrypted Data Searching and Reporting Fully Homomorphic.
Secure Sensor Data/Information Management and Mining Bhavani Thuraisingham The University of Texas at Dallas October 2005.
Data Warehousing Data Mining Privacy. Reading Bhavani Thuraisingham, Murat Kantarcioglu, and Srinivasan Iyer Extended RBAC-design and implementation.
. 1. Computer Security Concepts 2. The OSI Security Architecture 3. Security Attacks 4. Security Services 5. Security Mechanisms 6. A Model for Network.
Alert Logic Provides a Fully Managed Security and Compliance Solution Based in the Cloud, Powered by the Robust Microsoft Azure Platform MICROSOFT AZURE.
Securing Data in Transit and Storage Sanjay Beri Co-Founder & Senior Director of Product Management Ingrian Networks.
Computing Ontology Part II. So far, We have seen the history of the ACM computing classification system – What have you observed? – What topics from CS2013.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #22 Secure Web Information.
NIST BIG DATA WG Reference Architecture Subgroup Agenda for the Subgroup Call Co-chairs: Orit Levin (Microsoft) James Ketner (AT&T) Don Krapohl (Augmented.
NIST BIG DATA WG Reference Architecture Subgroup Intermediate Report Co-chairs: Orit Levin (Microsoft) James Ketner (AT&T) Don Krapohl (Augmented Intelligence)
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
K E Y : SW Service Use Big Data Information Flow SW Tools and Algorithms Transfer Transformation Provider Visualization Access Analytics Curation Collection.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
8/20/2013NIST Big Data WG / Roadmap Subgroup1 Architecture Storage Architecture Processing Architecture Resource Managers Architecture Infrastructure Architecture.
NIST BIG DATA WG Reference Architecture Subgroup Draft Co-chairs: Orit Levin (Microsoft) James Ketner (AT&T) Don Krapohl (Augmented Intelligence) August.
Security Patterns for Web Services 02/03/05 Nelly A. Delessy.
© Cloud Security Alliance, 2015 Wilco van Ginkel, Co-Chair BDWG.
The ERA of API in the World of IoT Jing Zhang-Lee November, 2015.
GRID ANATOMY Advanced Computing Concepts – Dr. Emmanuel Pilli.
Cryptography and Network Security Chapter 1. Background  Information Security requirements have changed in recent times  traditionally provided by physical.
K E Y : DATA SW Service Use Big Data Information Flow SW Tools and Algorithms Transfer Hardware (Storage, Networking, etc.) Big Data Framework Scalable.
Role Activity Sub-role Functional Components Control Data Software.
Big Data Security Issues in Cloud Management. BDWG Big Data Working Group Researchers 1: Data analytics for security 2: Privacy preserving 3: Big data-scale.
CMSC 818J: Privacy enhancing technologies Lecture 2.
Copyright © 2006, Oracle. All rights reserved Oracle Web Services Manager.
Cloud Security– an overview Keke Chen
TRUST Area 3 Overview: Privacy, Usability, & Social Impact
Joseph JaJa, Mike Smorul, and Sangchul Song
Modern Data Management
Blockchain technology at Change Healthcare
Thales Alenia Space Competence Center Software Solutions
BluSync by ParaBlu Offers Secure Enterprise File Collaboration and Synchronization Solution That Uses Azure Blob Storage to Enable Secure Sharing MICROSOFT.
Computer Science and Engineering
Data Warehousing Data Mining Privacy
Every 80 Secs – someone dies from this curable disease
Presentation transcript:

NIST Big Data Public Working Group Security and Privacy Subgroup Presentation September 30, 2013 Arnab Roy, Fujitsu Akhil Manchanda, GE Nancy Landreville, University of MD

Security and Privacy Overview 2 Process Taxonomy Use Cases Security Reference Architecture Mapping Next Steps

Security and Privacy Process 3 The CSA Big Data Working Group Top 10 S&P Challenges Googledoc with initial set of topics and solicitation of use cases Taxonomy of topics Input from Reference Architecture Group Security Reference Architecture overlaid on RA Mapping use cases to the SRA Editorial phase Current Working Draft (M0110)

Security and Privacy CSA BDWG: Top Ten Big Data Security and Privacy Challenges10 Challenges Identified by CSA BDWG 4 1)Secure computations in distributed programming frameworks 2)Security best practices for non- relational datastores 3)Secure data storage and transactions logs 4)End-point input validation/filtering 5)Real time security monitoring 6)Scalable and composable privacy- preserving data mining and analytics 7)Cryptographically enforced access control and secure communication 8)Granular access control 9)Granular audits 10)Data provenance

Security and Privacy Top 10 S&P Challenges: Classification 5 Infrastructure security Secure Computations in Distributed Programming Frameworks Security Best Practices for Non- Relational Data Stores Data Privacy Privacy Preserving Data Mining and Analytics Cryptographically Enforced Data Centric Security Granular Access Control Data Management Secure Data Storage and Transaction Logs Granular AuditsData Provenance Integrity and Reactive Security End-point validation and filtering Real time Security Monitoring

Security and Privacy Privacy Communication Privacy Data Confidentiality Access Policies Systems Crypto Enforced Computing on Encrypted Data Searching and Reporting Fully Homomorphic Encryption Secure Data Aggregation Key Management Provenance End-point Input Validation Syntactic Validation Semantic Validation Communication Integrity Authenticated Computations on Data Trusted Platforms Crypto Enforced Granular Audits Control of Valuable Assets Lifecycle Management Retention, Disposition, Hold Digital Rights Management System Health Security against DoS Construction of cryptographic protocols proactively resistant to DoS Big Data for Security Analytics for Security Intelligence Data-driven Abuse Detection Event Detection Forensics Taxonomy

Security and Privacy Use Cases 7 Retail/Marketing –Modern Day Consumerism –Nielsen Homescan –Web Traffic Analysis Healthcare –Health Information Exchange –Genetic Privacy –Pharma Clinical Trial Data Sharing Cyber-security Government –Military –Education

Security and Privacy Management Security & Privacy 8 Big Data Application Provider Visualization Access Analytics Curation Collection System Orchestrator DATA SW DATA SW INFORMATION VALUE CHAIN IT VALUE CHAIN Data Consumer Data Provider Horizontally Scalable (VM clusters) Vertically Scalable Horizontally Scalable Vertically Scalable Horizontally Scalable Vertically Scalable Big Data Framework Provider Processing Frameworks (analytic tools, etc.) Platforms (databases, etc.) Infrastructures Physical and Virtual Resources (networking, computing, etc.) DATA SW

Security and Privacy Big Data Security Reference Architecture

Security and Privacy Interface of Data Providers -> BD App Provider 10

Security and Privacy Next Steps 11 Streamline content internally –Consistent vocabulary –Fill up missing content –Discuss new content –Streamline flow across sections Synchronize terminology with D&T and RA subgroups

Backup 12

Big Data Application Provider Data Consumer Data Provider Big Data Framework Provider Securing Data Storage and Transaction logs Key Management Security Best Practices for non-relational data stores Security against DoS attacks Data Provenance