DocumentCode
659398
Title
Security — A big question for big data
Author
Schell, Roger
Author_Institution
Univ. of Southern California, Los Angeles, CA, USA
fYear
2013
fDate
6-9 Oct. 2013
Firstpage
5
Lastpage
5
Abstract
Summary form only given. Big data implies performing computation and database operations for massive amounts of data, remotely from the data owner´s enterprise. Since a key value proposition of big data is access to data from multiple and diverse domains, security and privacy will play a very important role in big data research and technology. The limitations of standard IT security practices are well-known, making the ability of attackers to use software subversion to insert malicious software into applications and operating systems a serious and growing threat whose adverse impact is intensified by big data. So, a big question is what security and privacy technology is adequate for controlled assured sharing for efficient direct access to big data. Making effective use of big data requires access from any domain to data in that domain, or any other domain it is authorized to access. Several decades of trusted systems developments have produced a rich set of proven concepts for verifiable protection to substantially cope with determined adversaries, but this technology has largely been marginalized as “overkill” and vendors do not widely offer it. This talk will discuss pivotal choices for big data to leverage this mature security and privacy technology, while identifying remaining research challenges.
Keywords
data handling; data privacy; invasive software; operating systems (computers); big data; data owner enterprise; database operations; malicious software; operating systems; privacy technology; software subversion; standard IT security practices; verifiable protection;
fLanguage
English
Publisher
ieee
Conference_Titel
Big Data, 2013 IEEE International Conference on
Conference_Location
Silicon Valley, CA
Type
conf
DOI
10.1109/BigData.2013.6691547
Filename
6691547
Link To Document