1 / 13

NIST Big Data Public Working Group

NIST Big Data Public Working Group. Security and Privacy Subgroup Presentation September 30, 2013 Arnab Roy, Fujitsu Akhil Manchanda, GE Nancy Landreville , University of MD. Overview. Process Taxonomy Use Cases Security Reference Architecture Mapping Next Steps. Process.

emmy
Download Presentation

NIST Big Data Public Working Group

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. NIST Big Data Public Working Group • Security and Privacy Subgroup Presentation • September 30, 2013 • Arnab Roy, Fujitsu • Akhil Manchanda, GE • Nancy Landreville, University of MD

  2. Overview • Process • Taxonomy • Use Cases • Security Reference Architecture • Mapping • Next Steps

  3. Process

  4. CSA BDWG: Top Ten Big Data Security and Privacy Challenges10 Challenges Identified by CSA BDWG Secure computations in distributed programming frameworks Security best practices for non-relational datastores Secure data storage and transactions logs End-point input validation/filtering Real time security monitoring Scalable and composable privacy-preserving data mining and analytics Cryptographically enforced access control and secure communication Granular access control Granular audits Data provenance

  5. Top 10 S&P Challenges: Classification

  6. Taxonomy

  7. Use Cases • Retail/Marketing • Modern Day Consumerism • Nielsen Homescan • Web Traffic Analysis • Healthcare • Health Information Exchange • Genetic Privacy • Pharma Clinical Trial Data Sharing • Cyber-security • Government • Military • Education

  8. INFORMATION VALUE CHAIN System Orchestrator Big Data Application Provider Analytics Visualization Curation Data Consumer Data Provider DATA DATA Collection Access SW SW SW DATA Big Data Framework Provider Processing Frameworks (analytic tools, etc.) IT VALUE CHAIN Horizontally Scalable Vertically Scalable Security & Privacy Management Platforms (databases, etc.) Horizontally Scalable Vertically Scalable Infrastructures Horizontally Scalable (VM clusters) Vertically Scalable Physical and Virtual Resources (networking, computing, etc.)

  9. Big Data Security Reference Architecture

  10. Interface of Data Providers -> BD App Provider

  11. Next Steps • Streamline content internally • Consistent vocabulary • Fill up missing content • Discuss new content • Streamline flow across sections • Synchronize terminology with D&T and RA subgroups

  12. Backup

  13. Big Data Application Provider Data Consumer Data Provider Big Data Framework Provider

More Related