490 likes | 663 Views
If ramayana can be reduced to one shlok….then can’t I Complete covering “SPATIAL Big DATA & SECURITY “ IN 15 MIN ?. Do lafzon ki hai DATA ki kahani. Ek hai ZERO ....duja hai ONE. Big Data. Security. WELCOME.
E N D
If ramayana can be reduced to one shlok….then can’t I Complete covering “SPATIAL Big DATA & SECURITY “ IN 15 MIN ?
Do lafzon ki hai DATA ki kahani............... Ek hai ZERO....duja hai ONE.....
Big Data Security WELCOME
SPATIAL BIG DATA has been with us for ages in various forms…but pretty invisible!!
Ancient Egypt • River nile • Engineers used to try data analysis to predict crop yields • LOGS & LEVEL • 6695 Km long
Challenges Perceptions Concepts Basic Intro …the 15 min route to THANK YOU slide
An English professor wrote the words : “A Woman without her man is nothing” On the chalk board and asked his students to punctuate it correctly…. “A Woman,without her man,is nothing”. “A Woman: Without her, man is nothing”
How we understand it ? DEFINING BIG SPATIAL DATA
BIG SPATIAL DATA Spatial data sets exceeding capacity of current computing systems…… ….to manage, process or analyze the data with reasonable effort due to Volume, Velocity, Variety and Veracity DEFINING BIG SPATIAL DATA
DATA is Exploding in Volume Velocity VARIETY While decreasing in Veracity
BIG SPATIAL DATA Data at rest Finding actionable info in Massive volumes of both structured and unstructured geo data that is so large and complexthat it’s difficult to process with traditional database and software techniques…… Volume Data in Motion Velocity Data in Many forms VARIETY VERACITY Data in Doubt DEFINING BIG SPATIAL DATA
Gigabyte (GB) - 1,024MB Terabyte (TB) - 1,024GB Petabyte (PB) - 1,024TB Exabyte (EB) - 1,024PB U.S. drone aircraft sent back 35 years worth of video footage in 2012 90% of data in the world was created in the last 2 years 3 EB of data is created every day
growth of geospatial data is outpacing both software and services and is set to become a major contributor to the overall growth of the industry * Estimated revenue FY 2013
The bad things in life open your eyes to the good things you weren’t paying attention to before SECURITY 100% security is a myth No one has said this!!! But it remains a fact Increasing attack surface
The technology is ready…. But are we ready ?
DISASTER RELIEF RETAIL UTILITIES FINANCIAL FRAUD DETECTION DISEASE SURVEILLANCE ECO-ROUTING TELECOMMUNICATIONS INSURANCE CALL CENTER REQUESTS 17
The other of the side story
Security challenges before we adopt spatial Big data
Ek Distributed programming frameworks
Utilise parallelism in computation & storage to process massive amounts of data Local Reduce Reduce Map Intermediate Combining Input file Shuffle Output File Mapper performs computation & outputs a key/value pairs Reducer combines the values belonging to each distinct key and outputs the result Distributed programming frameworks
MAP REDUCE • Aggregate results from map phase • performs a summary operation • Splits the input data-set into independent chunks which are processed • in a completely parallel manner FRAMEWORK • Schedules and re-runs tasks • Splits the input • Moves map outputs to reduce inputs • Receive the results Distributed programming frameworks
Read 1 TB 10 Machine’s One Machine 4 i/o Channels Each channel : 100 MB/s 4 i/o Channels Each channel : 100 MB/s 4.5 Min 45 Min So challenge is not storage but it is I/O speed
Untrusted Mappers Securing the data in the presence of an untrusted mapper Distributed programming frameworks
TWO NO SQL ISSUES
First off : the name NoSQL is not “NEVER SQL” NoSQL is not “No To SQL “
NoSQL Is simply Not Only SQL!!!!!
MongoDB NoSQL DB are still evolving with respect to security infrastructure Redis
STORAGE TIERS - Multi-tiered storage media • Necessitated by scalability, availability & the growth ie exponential • Different categories of data • Different types of storage Data storage & transaction logs
Keeping track of data location Lower tier means reduced security, loose access controls Data storage & transaction logs
How can we trust data ? Validating data when source of input data is not reliable? Filtering malicious data @ BYOD Input validation/filtering
Humongous number of alerts!!!! False positives Filtering malicious data @ BYOD REAL TIME MONITORING
End to end security ? Data encryption : attribute based encryption!!!to be made richer Secure communication
New attacks will keep happening…and to find out we need detailed audit logs Missed true positives Granular audits
EG : How a retailer was able to identify that a teenager was pregnant before her father knew In the world of big data,privacy invasion is a business model PRIVACY ISSUES
And... We Also Have cloud with us?
At 1.4% in 2011-12 Cloud was a very small percentage of the total IT spend
There is unlikely to be a day soon in near future when we have a “FIND TERRORIST” BUTTON
USE KERBEROS FOR NODE AUTHENTICATION – (BUT WE KNOW IT’S A PAIN TO SET UP) STRINGENT POLICIES STANDARD TO INTRA COUNTRY LAWS SECURE COMMUNICATION EXHAUSTIVE LOGS STRINGENT POLICIES
DISCLAIMER This presentation reflected the personal views and opinions in my individual capacity only. It does not represent the views and opinions of my organization or anyone else, and is not sponsored or endorsed by them in any way. This is an individual presentation.