Download presentation
Presentation is loading. Please wait.
Published byMitchell Williamson Modified over 9 years ago
1
www.cloudsecurityalliance.org John Howie Big Data: Answering Questions and Solving Society’s Problems, but at What Cost?
2
www.cloudsecurityalliance.org Copyright © 2013 Cloud Security Alliance Chief Operating Officer, Cloud Security Alliance Visiting Research Professor and Research Associate, University of Arizona Visiting Professor, Edinburgh Napier University
3
www.cloudsecurityalliance.org Copyright © 2013 Cloud Security Alliance Big Data Example The Rise of Big Data Explosion of Data Sources Privacy Impact Government use of Big Data?
4
www.cloudsecurityalliance.org Copyright © 2013 Cloud Security Alliance Global, not-for-profit organization Building security best practices for next generation IT Research and Educational Programs Cloud Provider Certification User Certification Awareness and Marketing The globally authoritative source for Trust in the Cloud “To promote the use of best practices for providing security assurance within Cloud Computing, and provide education on the uses of Cloud Computing to help secure all other forms of computing.”
5
www.cloudsecurityalliance.org Copyright © 2013 Cloud Security Alliance Founded in 2009 Membership stats as of Feb 2013 44,000 individual members, 66 chapters globally 145 corporate members Major cloud providers, tech companies, infosec leaders, governments, financial institutions, retail, healthcare and more Offices in Seattle USA, Singapore, Heraklion Greece Over 30 research projects in 25 working groups Strategic partnerships with governments, research institutions, professional associations and industry
6
www.cloudsecurityalliance.org Copyright © 2013 Cloud Security Alliance Big Data Identifying scalable techniques for data-centric security and privacy problems Lead to crystallization of best practices for security and privacy in big data Help industry and government on adoption of best practices Establish liaisons with other organizations in order to coordinate the development of big data security and privacy standards Accelerate the adoption of novel research aimed to address security and privacy issues
7
www.cloudsecurityalliance.org Copyright © 2013 Cloud Security Alliance Target assigns every customer a Guest ID number, tied to their credit card, name, or email address that becomes a bucket that stores a history of everything they’ve bought and any demographic information Target has collected from them or bought from other sources.
8
www.cloudsecurityalliance.org Copyright © 2013 Cloud Security Alliance Kryder’s Law By 2020, 2.5” drive with 14TB storage will cost $40 Disk Storage has kept pace with Moore’s Law Moore’s Law Most people consider it to mean that computing power will double every two years
9
www.cloudsecurityalliance.org Copyright © 2013 Cloud Security Alliance
10
www.cloudsecurityalliance.org Copyright © 2013 Cloud Security Alliance It is now cheaper to keep data than to delete it Increase in processing power allows us to analyze stored data in ways not done before You can use cloud computing to get (cheap) access to storage and processing power
11
www.cloudsecurityalliance.org Copyright © 2013 Cloud Security Alliance US, UK and other governments are publishing tax-payer funded data Intended for use by researchers, application developers and others No barrier to corporate use
12
www.cloudsecurityalliance.org Copyright © 2013 Cloud Security Alliance
13
www.cloudsecurityalliance.org Copyright © 2013 Cloud Security Alliance
14
www.cloudsecurityalliance.org Copyright © 2013 Cloud Security Alliance
15
www.cloudsecurityalliance.org Copyright © 2013 Cloud Security Alliance Immensely useful to sociologists and anthropologists today and in future Assuming data format can be understood Other researchers are finding use for datasets published by government Especially about government business transactions and interactions with citizens
16
www.cloudsecurityalliance.org Copyright © 2013 Cloud Security Alliance Many companies sell data Risks are often underplayed (or misunderstood) Steps are taken to anonymize or pseudonymize identities with varying levels of success
17
www.cloudsecurityalliance.org Copyright © 2013 Cloud Security Alliance
18
www.cloudsecurityalliance.org Copyright © 2013 Cloud Security Alliance
19
www.cloudsecurityalliance.org Copyright © 2013 Cloud Security Alliance 87% of Americans can be identified with three pieces of information: ZIP, DOB and sex
20
www.cloudsecurityalliance.org Copyright © 2013 Cloud Security Alliance American Diabetes Association released figures this year Direct cost of diabetes in US was $245B in 2012 41% increase in five years from 2007 ($174B) Roughly 20% of healthcare spending Indirect cost of diabetes in economy was $68.6B What if Big Data could cut these costs?
21
www.cloudsecurityalliance.org Copyright © 2013 Cloud Security Alliance Anonymization and pseudonymization strategies need to be closely examined Identification may be possible when datasets are combined Consent to release private data should be obtained first Problem is that consent is often implied in contract Preventing colocation of data will not prevent worst case scenarios
22
www.cloudsecurityalliance.org Copyright © 2013 Cloud Security Alliance Causation versus correlation! Developers and managers without research experience may jump to conclusions
23
www.cloudsecurityalliance.org Copyright © 2013 Cloud Security Alliance www.cloudsecurityalliance.org Copyright © 2011 Cloud Security Alliance www.cloudsecurityalliance.org John Howie jhowie@cloudsecurityalliance.org jhowie@email.arizona.edu J.Howie@napier.ac.uk Big Data Research available at: www.cloudsecurityalliance.org Copyright © 2013 Cloud Security Alliance
24
www.cloudsecurityalliance.org Copyright © 2013 Cloud Security Alliance www.cloudsecurityalliance.org Copyright © 2013 Cloud Security Alliance
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.