大数据安全与隐私十大挑战(英文)

合集下载

用,大数据时代的隐私保护,为标题,写一篇英语作文

用,大数据时代的隐私保护,为标题,写一篇英语作文

Title: Privacy Protection in the Era of Big DataIn the rapidly advancing digital landscape of the 21st century, the proliferation of big data has brought forth a myriad of opportunities and challenges, none more pressing than the imperative to safeguard individual privacy. As we navigate this intricate terrain, it becomes increasingly paramount to strike a delicate balance between harnessing the potential of big data for societal progress and upholding the fundamental right to privacy.At the heart of the discourse lies the tension between innovation and regulation. On one hand, the unprecedented volume, velocity, and variety of data generated offer unparalleled insights that drive innovation across industries, from healthcare to finance. Leveraging big data analytics empowers businesses and governments alike to enhance efficiency, optimize resource allocation, and devise tailored solutions to complex problems. However, this vast reservoir of data also presents grave risks to privacy if left unchecked.The very nature of big data, characterized by its sheer scale and scope, poses formidable challenges to traditional notions of privacy protection. With the proliferation of interconnected devices and the digitization of every aspect of human life, individuals unwittingly leave behind a trail of digital footprints that can be meticulously mined, analyzed, and exploited. From browsing habits to social media interactions, from biometric data to geolocation tracking, virtually every facet of our existence is susceptible to scrutiny, raising profound concerns about surveillance, identity theft, and unauthorized disclosure.In response to these challenges, policymakers and stakeholders are grappling with the imperative to establish robust legal frameworks and ethical guidelines that safeguard individual privacy rights while fostering innovation. Legislative measures such as the General Data Protection Regulation (GDPR) in the European Union and the California Consumer Privacy Act (CCPA) in the United States represent significant strides towards empowering individuals with greater control over their personal data. By mandating transparency, consent, and accountability, these regulations seek to rebalance the asymmetry of power between data subjects and data controllers, thereby fostering trust and accountability in the digital ecosystem.Moreover, technological innovations such as differential privacy, homomorphic encryption, and federated learning hold promise in fortifying privacy protections without compromising the utility of big data analytics. By anonymizing and aggregating sensitive information at source, these techniques mitigate the risk of reidentification and unauthorized access, thereby preserving individual privacy while enabling collaborative data analysis across disparate datasets.Nevertheless, the quest for privacy in the age of big data remains an ongoing journey fraught with complex trade-offs and ethical dilemmas. As we harness the transformative potential of big data analytics to tackle pressing global challenges, from climate change to public health, we must remain steadfast in our commitment to upholding the intrinsic rights and dignity of every individual. Only by fostering a culture of responsible data stewardship, grounded in principles of transparency, accountability, and user empowerment, can we navigate the intricate nexus ofinnovation and privacy in the digital era.In conclusion, the advent of big data heralds a new frontier of opportunity and peril, wherein the preservation of individual privacy emerges as a defining challenge of our time. By embracing a multifaceted approach that integrates legal, technological, and ethical dimensions, we can forge a path towards a future where innovation flourishes in harmony with privacy protection, thereby realizing the full potential of the data-driven society.。

如何解决大数据带来的危机英文作文

如何解决大数据带来的危机英文作文

如何解决大数据带来的危机英文作文英文回答:The crisis brought by big data is a complex issue that requires careful consideration and innovative solutions. Big data refers to the massive amount of information thatis generated and collected every day from various sources such as social media, online transactions, and sensor data. While big data has the potential to revolutionizeindustries and improve decision-making processes, it also poses significant challenges and risks.One of the main crises caused by big data is the issue of privacy and security. With the abundance of personal information available, there is a risk of unauthorized access and misuse of data. This can lead to identity theft, fraud, and other cybercrimes. For example, in 2017, the credit reporting agency Equifax experienced a massive data breach, exposing the personal information of millions of people. This incident highlights the need for strongersecurity measures and regulations to protect individuals' data.Another crisis brought by big data is the potential for discrimination and bias. As algorithms and machine learning systems are used to analyze and make decisions based on big data, there is a risk of perpetuating existing biases and discrimination. For instance, if a hiring algorithm is trained on biased data, it may inadvertently discriminate against certain groups of people. This can lead to unfair treatment and exclusion. To address this crisis, it is crucial to ensure that algorithms are trained on diverse and unbiased data and to regularly audit and monitor their performance.Furthermore, the sheer volume and complexity of big data can overwhelm organizations and individuals. It can be challenging to extract meaningful insights and make informed decisions amidst the vast amount of information available. For example, businesses may struggle to identify patterns and trends that can drive innovation and growth. To overcome this crisis, organizations need to invest inadvanced analytics tools and technologies that caneffectively process and analyze big data. Additionally,data literacy and analytical skills should be promoted to enable individuals to navigate and leverage big data effectively.In conclusion, the crisis brought by big data requiresa multi-faceted approach to address the challenges it poses. Privacy and security measures must be strengthened toprotect individuals' data. Bias and discrimination in algorithms need to be mitigated through diverse andunbiased training data. Organizations and individualsshould invest in advanced analytics tools and develop data literacy skills to effectively utilize big data. By addressing these issues, we can harness the potential ofbig data while minimizing its risks.中文回答:大数据带来的危机是一个复杂的问题,需要仔细考虑和创新的解决方案。

21 世纪数字隐私的挑战 英语作文

21 世纪数字隐私的挑战 英语作文

The Challenges of Digital Privacy in the21st CenturyIn the digital age,privacy has emerged as a paramount concern,with the proliferation of internet technologies,social media platforms,and smart devices creating unprecedented challenges for individuals and societies alike.The essence of privacy,once considered a straightforward concept tied to personal space and confidentiality,has been complicated by the digital revolution.This transformation has not only expanded the ways in which personal information can be collected,shared,and used but also raised complex questions about consent,security,and the balance between individual rights and societal interests.Here,we explore the multifaceted challenges of digital privacy in the21st century.Ubiquitous Data CollectionOne of the most significant challenges to digital privacy is the omnipresent collection of personal data.Every digital interaction,from browsing the internet and using social media to shopping online and navigating with GPS,generates data that can be tracked,stored,and analyzed.While this data collection can enhance user experience and provide personalized services,it also poses significant privacy risks,as individuals often have limited control over what information is collected and how it is used.Erosion of ConsentThe notion of consent,a cornerstone of privacy rights,is increasingly difficult to navigate in the digital realm.Terms of service and privacy policies are often lengthy,complex,and subject to change,making it challenging for users to fully understand what they are consenting to. Furthermore,the binary choice of accepting or declining terms often leaves users with little negotiation power,forcing them to consent to data practices they may not fully agree with to access digital services. Security Breaches and Data LeaksEven when data is collected with consent,maintaining its security is a formidable challenge.High-profile data breaches and leaks have exposed the personal information of millions,from financial data to sensitive health records,underscoring the vulnerabilities in data storage andtransmission systems.These incidents not only compromise individual privacy but also erode trust in digital platforms and institutions tasked with protecting personal information.Surveillance and MonitoringThe capacity for surveillance and monitoring in the digital age extends beyond governments to include corporations,hackers,and even individuals.The widespread availability of digital tracking tools and technologies enables a level of surveillance that can intrude on personal privacy and chill free expression.This pervasive monitoring raises ethical questions about the balance between security,commercial interests, and individual rights to privacy and autonomy.The Global Nature of Digital PrivacyDigital privacy challenges are inherently global,as data flows across borders and digital platforms operate in multiple jurisdictions.This global nature complicates regulatory efforts,as differing privacy laws and standards create a patchwork of protections that may be difficult to navigate and enforce.International cooperation and harmonization of privacy standards are crucial but remain challenging in a world of diverse legal systems and cultural attitudes toward privacy.ConclusionThe challenges of digital privacy in the21st century are complex and evolving,reflecting the rapid pace of technological innovation and the increasing centrality of digital platforms in our lives.Addressing these challenges requires a multifaceted approach,including robust legal frameworks,strong encryption and security measures,transparent data practices,and public education on digital literacy and privacy rights.As digital technologies continue to advance,society must remain vigilant in safeguarding privacy as a fundamental right,ensuring that the digital age is characterized not only by innovation but also by a steadfast commitment to individual dignity and autonomy.。

大数据的机遇与挑战英语作文

大数据的机遇与挑战英语作文

The Opportunities and Challenges of Big DataIn the era of information explosion, big data has become a pivotal force that is transforming the way we live, work, and think. It presents us with numerous opportunities but also poses significant challenges that require us to navigate carefully.One of the most significant opportunities of big data lies in its ability to provide insights and predictions. By analyzing vast amounts of data, companies can gain a deeper understanding of consumer behavior, market trends, and operational efficiency. This, in turn, enables them to make more informed decisions, improve customer service, and create innovative products and services. In healthcare, big data can help doctors diagnose diseases more accurately, personalize treatment plans, and even predict outbreaks of epidemics.Moreover, big data has the potential to revolutionize the way we approach problems in areas such as climate change, poverty reduction, and education. By analyzing data from various sources, we can gain a more comprehensive understanding of these complex issues and develop more effective solutions.However, big data also poses a number of challenges. One of the most pressing issues is data privacy and security. As more and more personal data is collected and analyzed, there is an increasing risk of data breaches and misuse of information. It is crucial for companies and organizations to establish robust data security measures to protect the privacy of individuals.Another challenge is the need for skilled professionals who can analyze and interpret big data. The field of data science is rapidly evolving, and there is a shortage of qualified professionals who possess the necessary skills and expertise. This creates a barrier for organizations that want to leverage the power of big data but lack the necessary talent.Furthermore, big data can lead to the problem of "information overload." With so much data available, it is difficult to identify the most relevant and valuable information. This requires the development of advanced algorithms and tools that can help us filter and prioritize information effectively.In conclusion, big data presents us with both opportunities and challenges. By leveraging its power to provide insights and predictions, we can transform various sectors and create positive impact. However, we must also be mindful of the challenges posed by big data, such as data privacy and security, the need for skilled professionals, and the problem of information overload. By addressing these challenges effectively, we can ensure that big data continues to be a force for positive change.。

人工智能在安全与隐私保护方面的挑战与解决方案

人工智能在安全与隐私保护方面的挑战与解决方案

人工智能在安全与隐私保护方面的挑战与解决方案人工智能(Artificial Intelligence,简称AI)在各个领域的广泛应用,带来了巨大的改变和便利。

然而,随着人工智能技术的发展,安全和隐私保护问题也愈发突出。

本文将探讨人工智能在安全与隐私保护方面面临的挑战,并提出一些解决方案。

一、隐私保护的挑战随着人工智能技术的快速发展,个人隐私成为了一大关注焦点。

人工智能所涉及的大数据收集和分析,可能会泄露个人的隐私信息,给个人带来无法预料的麻烦。

隐私保护的挑战主要有以下几个方面:1. 数据安全:人工智能系统需要大量的数据进行训练和学习,然而,这些数据往往包含着个人的隐私信息。

如果这些数据不被妥善保护,有可能被黑客入侵或滥用,导致隐私泄露的风险。

2. 数据共享和交换:人工智能系统需要获得多方面的数据才能更好地进行学习和决策。

然而,数据共享和交换往往需要涉及多个参与方,因此如何在保证数据安全和隐私的前提下进行有效的数据共享是一大挑战。

3. 潜在的滥用风险:人工智能技术的应用范围越来越广泛,而这同样也带来了滥用的风险。

例如,一些人工智能算法可以通过分析用户的行为和兴趣来进行个性化推荐,但如果这些算法被滥用,就有可能导致个人信息的泄露和商业利用。

二、挑战的解决方案为了解决人工智能在安全与隐私保护方面的挑战,需要采取一系列的措施和解决方案。

以下是一些可行的解决方案:1. 强调数据隐私保护:在人工智能系统的设计和开发过程中,应该将数据隐私保护作为一项核心原则。

采取技术手段,如数据加密、访问控制等,保护个人数据的安全性和隐私性。

同时,规范数据的收集和使用行为,遵循合法、透明的原则,明确告知用户数据的使用目的和范围。

2. 加强安全防护:针对人工智能系统的安全风险,需要加强网络安全和系统防护能力。

建立完善的安全机制,对系统进行全面监测和防护,及时发现并应对潜在的威胁和攻击。

同时,加强对人工智能系统的安全性评估和审计,及时修复和弥补系统的安全漏洞。

英语演讲稿范文:数据隐私安全问题及解决方案

英语演讲稿范文:数据隐私安全问题及解决方案

英语演讲稿范文:数据隐私安全问题及解决方案Ladies and Gentlemen,Today, I would like to talk about a very important issue that is concerning everyone who uses the internet and various digital technologies - the issue of data privacy and security.In today's world, data is the new oil. In other words, data is an extremely valuable resource that is collected, analyzed, and used by companies, governments, and individuals around the world. Data helps to inform business decisions, shape public policy, and improve our lives in many other ways.However, the collection and use of data also raises many important ethical and legal questions. One of the mostpressing concerns is the issue of data privacy and security. With so much data being collected and processed on a daily basis, it is essential that we find ways to protectindividuals' privacy and ensure that their information is stored and handled securely.One of the biggest threats to data privacy and securityis cybercrime. Cybercriminals use a range of tactics, such asphishing, malware, and ransomware, to steal personal and sensitive information from individuals and organizations. In recent years, there have been several high-profile data breaches that have compromised the personal information of millions of people.To address these challenges, we need to take a multi-faceted approach. There are several solutions we should consider, including:1. Stronger Data Protection Laws: Governments should pass stronger data protection laws that outline clear guidelines and requirements for how companies and organizations handle consumer data.2. Improved Cybersecurity Measures: Organizations should invest in better cybersecurity measures, such as firewalls, intrusion detection systems, and end-to-end encryption, to reduce the risk of cyberattacks.3. Consumer Education: Education is key to ensuring that consumers are aware of the risks associated with their online behavior and can take steps to protect themselves. Companiesshould offer consumer education and training programs to teach best practices for online safety and data protection.4. Ethical Use of Data: Companies and organizations that collect and process consumer data should do so in an ethical and transparent way. They should be clear about what data they collect and how it will be used, and ensure that consumers have control over their data.5. Data Privacy Officer: To ensure that the company complies with data security and privacy regulations, an organization should assign a specific person (Data Privacy Officer) to look after personal data of customers.In conclusion, data privacy and security are critical issues that must be addressed in the digital age. It is essential that all stakeholders, including governments, organizations, and individuals, work together to find the best solutions to protect our data and our privacy. By taking a collaborative and multi-faceted approach, we can ensurethat we are using data in a responsible and sustainable way and protect individuals' privacy in the digital age. Thank you.。

大数据的机遇和挑战英文作文

大数据的机遇和挑战英文作文

大数据的机遇和挑战英文作文英文回答:Big data presents both opportunities and challenges in today's world. On one hand, it offers a wealth of information that can be used to drive innovation and improve decision-making. For example, companies can analyze large datasets to gain insights into customer behavior and preferences, allowing them to tailor their products and services accordingly. This can lead to increased customer satisfaction and loyalty, ultimately resulting in higher profits.Furthermore, big data can be used to address societal issues and improve the quality of life for individuals. For instance, in healthcare, the analysis of large medical datasets can help identify patterns and trends in diseases, leading to more accurate diagnoses and better treatment plans. This has the potential to save lives and reduce healthcare costs.However, along with these opportunities come challenges. One major challenge is the sheer volume and complexity ofbig data. With the exponential growth of data, it becomes increasingly difficult to store, process, and analyze it effectively. This requires advanced technologies and infrastructure, as well as skilled professionals who can make sense of the data. Additionally, there are concerns regarding data privacy and security. As more data is collected and shared, there is a greater risk of unauthorized access and misuse of personal information.Moreover, big data can also lead to informationoverload and analysis paralysis. With so much data available, it can be overwhelming to extract meaningful insights and make informed decisions. This highlights the importance of data visualization and data analytics tools that can help simplify complex information and present itin a more digestible format.In conclusion, big data presents immense opportunities for innovation and improvement in various industries.However, it also poses challenges in terms of data management, privacy, and analysis. To fully harness the potential of big data, organizations and individuals needto invest in the right technologies, skills, and ethical practices.中文回答:大数据在当今世界中既带来机遇又带来挑战。

大数据应用与隐私保护:探索数据时代的挑战

大数据应用与隐私保护:探索数据时代的挑战

大数据应用与隐私保护:探索数据时代的挑战1. Introduction1.1 OverviewIn recent years, the emergence and rapid development of big data technologies have revolutionized numerous industries and opened up unprecedented opportunities for data-driven decision making. Big data refers to massive volumes of structured and unstructured data that are generated at an increasingly fast pace from various sources such as sensors, social media platforms, online transactions, and mobile devices. These vast amounts of data hold immense potential for businesses, governments, and individuals in terms of gaining valuable insights, improving efficiency, and enhancing overall performance.1.2 Background InformationHowever, along with the widespread adoption of big data applications comes significant concerns over privacy protection. The collection, analysis, and utilization of large-scale personal information raise ethical dilemmas regarding the proper handling and safeguarding of sensitive data. As big data often contains personal identifiers, protectingindividual privacy becomes a critical issue that must be addressed effectively to maintain public trust.1.3 Research ValueThis paper aims to explore the challenges posed by the application of big data analytics in relation to privacy protection. It will delve into various aspects such as the definition and characteristics of big data, diverse application domains within which challenges arise, as well as the importance of safeguarding privacy in these contexts. Furthermore, an analysis will be conducted on current privacy protection techniques encompassing encryption methods, anonymization techniques, and access control mechanisms.The paper will also present practical strategies and practices employed in protecting privacy within big data applications including compliance management practices, data de-identification strategies analysis, and establishing risk assessment and monitoring mechanisms.Lastly, this article will provide future perspectives and recommendations concerning individual data ownership issues for further exploration. The discussion on improving legal regulations pertaining to privacy protection within a rapidly evolving technological landscape will bepresented alongside an examination of how technological innovations can promote effective safeguarding of privacy rights.Overall, this research addresses a crucial topic at the forefront of societal concern during this era defined by the ubiquity of big data usage. By examining the challenges and potential solutions for privacy protection in the application of big data analytics, this paper aims to contribute to a better understanding and management of privacy concerns within the context of our increasingly data-driven world.2. 大数据应用与隐私问题2.1 大数据的定义和特点大数据是指规模庞大、复杂多样且快速增长的数据集合。

  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

Top Ten Big Data Security and Privacy ChallengesNovember2012© 2012 Cloud Security AllianceAll rights reserved. You may download, store, display on your computer, view, print, and link to the Cloud Security Alliance Security as a Service Implementation Guidance at , subject to the following: (a) the Guidance may be used solely for your personal, informational, non-commercial use; (b) the Guidance may not be modified or altered in any way; (c) the Guidance may not be redistributed; and (d) the trademark, copyright or other notices may not be removed. You may quote portions of the Guidance as permitted by the Fair Use provisions of the United States Copyright Act, provided that you attribute the portions to the Cloud Security Alliance Security as a Service Implementation Guidance Version 1.0 (2012).ContentsAcknowledgments (4)1.0 Abstract (5)2.0 Introduction (5)3.0 Secure Computations in Distributed Programming Frameworks (6)3.1 Use Cases (6)4.0 Security Best Practices for Non-Relational Data Stores (6)4.1 Use Cases (6)5.0 Secure Data Storage and Transactions Logs (7)5.1 Use Cases (7)6.0 End-Point Input Validation/Filtering (7)6.1 Use Cases (7)7.0 Real-time Security/Compliance Monitoring (7)7.1 Use Cases (8)8.0 Scalable and Composable Privacy-Preserving Data Mining and Analytics (8)8.1 Use Cases (8)9.0 Cryptographically Enforced Access Control and Secure Communication (9)9.1 Use Cases (9)10.0 Granular Access Control (9)10.1 Use Cases (9)11.0 Granular Audits (10)11.1 Use Cases (10)12.0 Data Provenance (10)12.1 Use Cases (10)13.0 Conclusion (11)Acknowledgments CSA Big Data Working Group Co-Chairs Lead: Sreeranga Rajan, FujitsuCo-Chair: Wilco van Ginkel, VerizonCo-Chair: Neel Sundaresan, eBay ContributorsAlvaro Cardenas Mora, FujitsuYu Chen, SUNY BinghamtonAdam Fuchs, SqrrlAdrian Lane, SecurosisRongxing Lu, University of Waterloo Pratyusa Manadhata, HP LabsJesus Molina, FujitsuPraveen Murthy, FujitsuArnab Roy, FujitsuShiju Sathyadevan, Amrita University CSA Global StaffAaron Alva, Graduate Research Intern Luciano JR Santos, Research Director Evan Scoboria, WebmasterKendall Scoboria, Graphic Designer John Yeoh, Research Analyst1.0AbstractSecurity and privacy issues are magnified by velocity, volume, and variety of big data, such as large-scale cloud infrastructures, diversity of data sources and formats, streaming nature of data acquisition,and high volume inter-cloud migration. Therefore, traditional security mechanisms, which are tailored to securing small-scale static (as opposed to streaming) data, are inadequate.In this paper,we highlight top ten big data-specific security and privacy challenges. Our expectation from highlighting the challenges is that it will bring renewed focus on fortifying big data infrastructures.2.0IntroductionThe term big data refers to the massive amounts of digital information companies and governments collect about us and our surroundings. Every day, we create 2.5 quintillion bytes of data—so much that 90% of the data in the world today has been created in the last two years alone. Security and privacy issues are magnified by velocity, volume, and variety of big data, such as large-scale cloud infrastructures, diversity of data sources and formats, streaming nature of data acquisition and high volume inter-cloud migration. The use of large scale cloud infrastructures, with a diversity of software platforms, spread across large networks of computers, also increases the attack surface of the entire systemTraditional security mechanisms, which are tailored to securing small-scale static (as opposed to streaming) data, are inadequate. For example, analytics for anomaly detection would generate too many outliers. Similarly, it is not clear how to retrofit provenance in existing cloud infrastructures. Streaming data demands ultra-fast response times from security and privacy solutions.In this paper, we highlight the top ten big data specific security and privacy challenges. We interviewed Cloud Security Alliance members and surveyed security practitioner-oriented trade journals to draft an initial list of high-priority security and privacy problems, studied published research,and arrived at the following top ten challenges:1.Secure computations in distributed programming frameworks2.Security best practices for non-relational data stores3.Secure data storage and transactions logs4.End-point input validation/filtering5.Real-time security/compliance monitoring6.Scalable and composable privacy-preserving data mining and analytics7.Cryptographically enforced access control and secure communication8.Granular access control9.Granular audits10.Data provenanceIn the rest of the paper, we provide brief descriptions and narrate use cases.3.0Secure Computations in Distributed Programming FrameworksDistributed programming frameworks utilize parallelism in computation and storage to process massive amounts of data. A popular example is the MapReduce framework,which splits an input file into multiple chunks. In the first phase of MapReduce, a Mapper for each chunk reads the data, performs some computation, and outputs a list of key/value pairs. In the next phase, a Reducer combines the values belonging to each distinct key and outputs the result. There are two major attack prevention measures: securing the mappers and securing the data in the presence of an untrusted mapper.3.1Use CasesUntrusted mappers could return wrong results, which will in turn generate incorrect aggregate results. With large data sets, it is next to impossible to identify,resulting in significant damage, especially for scientific and financial computations.Retailer consumer data is often analyzed by marketing agencies for targeted advertising or customer-segmenting. These tasks involve highly parallel computations over large data sets, and are particularly suited for MapReduce frameworks such as Hadoop. However, the data mappers may contain intentional or unintentional leakages. For example, a mapper may emit a very unique value by analyzing a private record, undermining users’ privacy.4.0Security Best Practices for Non-Relational Data StoresNon-relational data stores popularized by NoSQL databases are still evolving with respect to security infrastructure. For instance, robust solutions to NoSQL injection are still not mature. Each NoSQL DBs were built to tackle different challenges posed by the analytics world and hence security was never part of the model at any point of its design stage. Developers using NoSQL databases usually embed security in the middleware. NoSQL databases do not provide any support for enforcing it explicitly in the database. However, clustering aspect of NoSQL databases poses additional challenges to the robustness of such security practices.4.1Use CasesCompanies dealing with big unstructured data sets may benefit by migrating from a traditional relational database to a NoSQL database in terms of accommodating/processing huge volume of data. In general, the security philosophy of NoSQL databases relies in external enforcing mechanisms. To reduce security incidents, the company must review security policies for the middleware adding items to its engine and at the same time toughen NoSQL database itself to match its counterpart RDBs without compromising on its operational features.5.0Secure Data Storage and Transactions LogsData and transaction logs are stored in multi-tiered storage media. Manually moving data between tiers gives the IT manager direct control over exactly what data is moved and when. However, as the size of data set has been, and continues to be,growing exponentially, scalability and availability have necessitated auto-tiering for big data storage management. Auto-tiering solutions do not keep track of where the data is stored,which poses new challenges to secure data storage. New mechanisms are imperative to thwart unauthorized access and maintain the 24/7 availability.5.1Use CasesA manufacturer wants to integrate data from different divisions. Some of this data is rarely retrieved, while some divisions constantly utilize the same data pools. An auto-tier storage system will save the manufacturer money by pulling the rarely utilized data to a lower (and cheaper) tier. However, this data may consist in R&D results, not popular but containing critical information. As lower-tier often provides decreased security, the company should study carefully tiering strategies.6.0End-Point Input Validation/FilteringMany big data use cases in enterprise settings require data collection from many sources,such as end-point devices. For example, a security information and event management system (SIEM) may collect event logs from millions of hardware devices and software applications in an enterprise network. A key challenge in the data collection process is input validation: how can we trust the data? How can we validate that a source of input data is not malicious and how can we filter malicious input from our collection? Input validation and filtering is a daunting challenge posed by untrusted input sources, especially with the bring your own device (BYOD) model.6.1Use CasesBoth data retrieved from weather sensors and feedback votes sent by an iPhone application share a similar validation problem.A motivated adversary may be able to create “rogue” virtual sensors, or spoof iPhone IDs to rig the results. This is further complicated by the amount of data collected, which may exceed millions of readings/votes. To perform these tasks effectively,algorithms need to be created to validate the input for large data sets.7.0Real-time Security/Compliance MonitoringReal-time security monitoring has always been a challenge, given the number of alerts generated by (security) devices.These alerts (correlated or not)lead to many false positives, which are mostly ignored or simply “clicked away,”as humans cannot cope with the shear amount. This problem might even increase with big data,given the volume and velocity of data streams. However, big data technologies might also provide an opportunity, in the sense that these technologies do allow for fast processing and analytics of different types of data.Which in its turn can be used to provide, for instance, real-time anomaly detection based on scalable security analytics.7.1Use CasesMost industries and government (agencies) will benefit from real-time security analytics, although the use cases may differ. There are use cases which are common, like,“Who is accessing which data from which resource at what time”; “Are we under attack?” or “Do we have a breach of compliance standard C because of action A?”These are not really new, but the difference is that we have more data at our disposal to make faster and better decisions(e.g.,less false positives) in that regard. However, new use cases can be defined or we can redefine existing use cases in lieu of big data.For example, the health industry largely benefits from big data technologies, potentially saving billions to the tax-payer, becoming more accurate with the payment of claims and reducing the fraud related to claims. However, at the same time, the records stored may be extremely sensitive and have to be compliant with HIPAA or regional/local regulations, which call for careful protection of that same data. Detecting in real-time the anomalous retrieval of personal information, intentional or unintentional, allows the health care provider to timely repair the damage created and to prevent further misuse.8.0Scalable and Composable Privacy-Preserving Data Mining and AnalyticsBig data can be seen as a troubling manifestation of Big Brother by potentially enabling invasions of privacy, invasive marketing, decreased civil freedoms, and increase state and corporate control.A recent analysis of how companies are leveraging data analytics for marketing purposes identified an example of how a retailer was able to identify that a teenager was pregnant before her father knew. Similarly, anonymizing data for analytics is not enough to maintain user privacy. For example, AOL released anonymized search logs for academic purposes, but users were easily identified by their searchers. Netflix faced a similar problem when users of their anonymized data set were identified by correlating their Netflix movie scores with IMDB scores.Therefore, it is important to establish guidelines and recommendations for preventing inadvertent privacy disclosures.8.1Use CasesUser data collected by companies and government agencies are constantly mined and analyzed by inside analysts and also potentially outside contractors or business partners. A malicious insider or untrusted partner can abuse these datasets and extract private information from customers.Similarly, intelligence agencies require the collection of vast amounts of data. The data sources are numerous and may include chat-rooms, personal blogs and network routers. Most collected data is, however, innocent in nature, need not be retained,and anonymity preserved.Robust and scalable privacy preserving mining algorithms will increase the chances of collecting relevant information to increase user safety.9.0Cryptographically Enforced Access Control and Secure CommunicationTo ensure that the most sensitive private data is end-to-end secure and only accessible to the authorized entities, data has to be encrypted based on access control policies. Specific research in this area such as attribute-based encryption (ABE) has to be made richer, more efficient,and scalable. To ensure authentication, agreement and fairness among the distributed entities, a cryptographically secure communication framework has to be implemented.9.1Use CasesSensitive data is routinely stored unencrypted in the cloud. The main problem to encrypt data, especially large data sets, is the all-or-nothing retrieval policy of encrypted data, disallowing users to easily perform fine grained actions such as sharing records or searches. ABE alleviates this problem by utilizing a public key cryptosystem where attributes related to the data encrypted serve to unlock the keys. On the other hand, we have unencrypted less sensitive data as well, such as data useful for analytics.Such data has to be communicated in a secure and agreed-upon way using a cryptographically secure communication framework.10.0Granular Access ControlThe security property that matters from the perspective of access control is secrecy—preventing access to data by people that should not have access. The problem with course-grained access mechanisms is that data that could otherwise be shared is often swept into a more restrictive category to guarantee sound security. Granular access control gives data managers a scalpel instead of a sword to share data as much as possible without compromising secrecy.10.1Use CasesBig data analysis and cloud computing are increasingly focused on handling diverse data sets, both in terms of variety of schemas and variety of security requirements. Legal and policy restrictions on data come from numerous sources. The Sarbanes-Oxley Act levees requirements to protect corporate financial information, and the Health Insurance Portability and Accountability Act includes numerous restrictions on sharing personal health records. Executive Order 13526 outlines an elaborate system of protecting national security information.Privacy policies, sharing agreements, and corporate policy also impose requirements on data handling. Managing this plethora of restrictions has so far resulted in increased costs for developing applications and a walled garden approach in which few people can participate in the analysis. Granular access control is necessary for analytical systems to adapt to this increasingly complex security environment.11.0Granular AuditsWith real-time security monitoring (see section 12.0),we try to be notified at the moment an attack takes place. In reality,this will not always be the case (e.g.,new attacks, missed true positives).In order to get to the bottom of a missed attack, we need audit information. This is not only relevant because we want to understand what happened and what went wrong, but also because compliance, regulation and forensics reasons.In that regard, auditing is not something new, but the scope and granularity might be different. For example, we have to deal with more data objects, which probably are (but not necessarily) distributed.11.1Use CasesCompliance requirements (e.g., HIPAA, PCI, Sarbanes-Oxley) require financial firms to provide granular auditing records.Additionally, the loss of records containing private information is estimated at $200/record.Legal action –depending on the geographic region –might follow in case of a data breach.Key personnel at financial institutions require access to large data sets containing PI, such as SSN. Marketing firms want access, for instance,to personal social media information to optimize their customer-centric approach regarding online ads.12.0Data ProvenanceProvenance metadata will grow in complexity due to large provenance graphs generated from provenance-enabled programming environments in big data applications.Analysis of such large provenance graphs to detect metadata dependencies for security/confidentiality applications is computationally intensive.12.1Use CasesSeveral key security applications require the history of a digital record –such as details about its creation. Examples include detecting insider trading for financial companies or to determine the accuracy of the data source for research investigations.These security assessments are time sensitive in nature, and require fast algorithms to handle the provenance metadata containing this information. In addition,data provenance complements audit logs for compliance requirements, such as PCI or Sarbanes-Oxley.CLOUD SECURITY ALLIANCE Top Ten Big Data Security and Privacy Challenges 13.0ConclusionBig data is here to stay.It is practically impossible to imagine the next application without it consuming data, producing new forms of data, and containing data-driven algorithms. As compute environments become cheaper, applications environments become networked, and system and analytics environments become shared over the cloud, security, access control, compression and encryption and compliance introduce challenges that have to be addressed in a systematic way. The Cloud Security Alliance (CSA) Big Data Working Group (BDWG) recognizes these challenges and has a mission for addressing these in a standardized and systematic way.In this paper,we have highlighted the top ten security and privacy problems that need to be addressed for making big data processing and computing infrastructure more secure. Some common elements in this list of top ten issues that are specific to big data arise from the use of multiple infrastructure tiers (both storage and computing) for processing big data, the use of new compute infrastructures such as NoSQL databases (for fast throughput necessitated by big data volumes) that have not been thoroughly vetted for security issues, the non-scalability of encryption for large data sets, non-scalability of real-time monitoring techniques that might be practical for smaller volumes of data, the heterogeneity of devices that produce the data, and confusion with the plethora of diverse legal and policy restrictions that leads to ad hoc approaches for ensuring security and privacy. Many of the items in the list of top ten challenges also serve to clarify specific aspects of the attack surface of the entire big data processing infrastructure that should be analyzed for these types of threats. We plan to use OpenMobius, an open-source,large scale,distributed data processing, analytics,and tools platform from eBay Research Labs as an experimental test bed.Our hope is that this paper will spur action in the research and development community to collaboratively increase focus on the top ten challenges,leading to greater security and privacy in big data platforms.© Copyright 2012, Cloud Security Alliance. All rights reserved.11。

相关文档
最新文档