Welcome!

IBM Cloud Authors: Pat Romanski, Liz McMillan, Yeshim Deniz, Carmen Gonzalez, Elizabeth White

Blog Feed Post

It’s Time To Get Serious About Big Data Security

By

Over the last few years, we have witnessed a substantial amount of buzz about Big Data, and we have seen the large-scale adoption of Big Data analytics solutions. Organizations are collecting and analyzing massive amounts of data in a way that most were unable to do ten years ago. Pattern recognition, non-obvious relationship detection, graph analysis, predictive processing, and other analytical approaches can enable our organizations to turn oceans of data into knowledge, allowing us to make the best use of the data that we have.

At the same time, there exists an ever-growing concern that revolves around the security and protection of the information that we are analyzing. As we watch the explosive growth of data that we are processing from multiple disparate data sources, our IT environments are growing increasingly more complex, and we are witnessing new challenges related to data management, security, and privacy. Many organizations are now required to enforce access control and privacy restrictions in order to meet data and privacy regulations, and these same organizations face steep penalties and fines for non-compliance. At the same time, data security breaches (both from the insider and outsider) are on the rise, and a study released this year by Symantec and the Ponemon institute found that the average organizational cost of one security breach in the United States is 5.4 million dollars. Civil court records show a growing list of organizations that have faced millions of dollars in lawsuits related to their exposure of information, and new studies are showing that most organizations are not prepared to respond to the fallout.

So what does that mean for organizations focusing on Big Data? With evolving cyber security threats, growing security and privacy concerns, the reality of insider attacks, and the legal and regulatory requirements that many organizations face, it means that we need to start getting serious about Big Data Security. It’s an issue – but one that many organizations haven’t thought about.

Although security and privacy issues related to Big Data are starting to get more attention in the mainstream media, the issues are not new – many of these concerns have been documented in academic papers in the Data Mining and Knowledge Discovery communities for decades. As distributed analytics technologies have become more prevalent and available in recent years, these concerns that were once raised in academia are now being realized in Big Data implementations.

Further complicating the matter is that many Big Data platforms, like Apache Hadoop, were not originally designed with security in mind. Many security professionals over the years have highlighted challenges related to Hadoop’s security model, and as a result there has been an explosive growth in security-focused tools that complement Hadoop offerings, with products like Cloudera SentryIBM InfoSphere Optim Data MaskingIntel’s secure Hadoop distributionDataStax EnterpriseDataGuise for HadoopProtegrity Big Data Protector for HadoopRevelytix LoomZettaset Secure Data Warehouse — and the list could go on. At the same time, Hadoop’s security model is slowly evolving to meet some of these security challenges because of some great work happening in the source community.

Regardless of your Big Data platform, however, there are some critical steps that organizations must do in order to understand and be prepared for Big Data security challenges.

  1. Identify and understand the sensitivity levels of your data. In order to understand the challenges, it is critical to understand the sensitivity levels of your data and the access control policies associated with your data. The sensitivity levels of your information will drive your security strategy. In some cases, it may be necessary to filter access to the data retrieved by data scientists and analysts running jobs and queries, based on what they are allowed to see. As data sets from different information sources are combined with others for processing – where each data set may have inherent access control policies – defining and enforcing the access control policies on the combined sets can become a tricky problem.
  2. Understand the impact of the release of your data. Even organizations that are careful to strip out sensitive information from data sets that they release to their business partners are finding that their data sets are vulnerable to attacks related to differential privacy, and many companies have learned this the hard way. A few years ago, for example, Netflix anonymized movie ratings of about 480,000 customers, and held a contest, offering 1 million dollars for the contestant who could improve their “Recommended for You” movie suggestions. A few researchers found that by combining anonymous ratings in the Netflix data set with public ratings in the IMDB data set, they could successfully de-anonymize the ratings of many viewers, exposing information about the sexual interests, political leanings, and religious views of many viewers. The publication of their findings led to a multi-million dollar lawsuit against Netflix, which Netflix later settled.
  3. Develop policies & procedures related to Big Data Security and Privacy. These will vary from organization to organization, based on the sensitivity levels and inherent release policies of your data, but should include policies and procedures related to data ingest and release, access control within the organization, data destruction and sanitation, monitoring procedures, and policies and procedures for incident response.   
  4. Develop and execute a technical security approach that complements the security of your analytics platforms.  Security controls on many Big Data platforms aren’t providing the amount of security that some of our organizations need.  Requirements for authorization at the data level, on-disk encryption, and integration with Identity and Access Management infrastructure, as well as  proactive monitoring of your data (just to name a few) often need to be solved by tools that complement your analytics platform. Many times, certain requirements may involve the integration of third party encryption solutions into your analytics platforms or the use of other tools built on top of them to satisfy other requirements (Apache Accumulo provides cell-based authorization over top of Hadoop, for example). Because of concerns related to security, some organizations segregate their analytics clusters on their internal networks, and provide perimeter access control to authorized users. While this certainly provides a certain level of protection, it doesn’t provide authorization at the data level mandated by some organizations. Because of the complexity of distributed analytics platforms, security configuration is often tricky and complex.  Developing security solutions for analytics platforms therefore requires much attention to detail, a certain degree of creativity, and requires that you develop a security approach that revolves around the security policies of your organization and data.

These steps towards “getting serious about Big Data Security” are extremely necessary in our interconnected digital world, where the cost of data breaches are rising, and the penalties of not protecting our information are steep –  they certainly affect our organization’s budget outlook, but more importantly, security breaches will affect our reputation.  As security and privacy concerns around Big Data continue to attract attention, look for much innovation to occur in this exciting technology space.

About the Author

Kevin T. Smith is the Director of Technology Solutions and Outreach for the Applied Mission Solutions division of Novetta Solutions, where he provides strategic technology leadership and develops innovative, data-focused and highly-secure solutions for customers. He is the author of numerous technology articles, including a recent article at InfoQ : Big Data Security – The Evolution of Hadoop’s Security Model. He has authored many technology books, including the upcoming book Professional Hadoop Solutions (Wrox Press) as well as Applied SOA: Service-Oriented Architecture and Design Strategies (Wiley), The Semantic Web: A Guide to the Future of XML, Web Services, and Knowledge Management (Wiley), and many others. He can be reached at KSmith@Novetta.com.

Read the original blog entry...

More Stories By Bob Gourley

Bob Gourley writes on enterprise IT. He is a founder and partner at Cognitio Corp and publsher of CTOvision.com

@ThingsExpo Stories
"Cloud Academy is an enterprise training platform for the cloud, specifically public clouds. We offer guided learning experiences on AWS, Azure, Google Cloud and all the surrounding methodologies and technologies that you need to know and your teams need to know in order to leverage the full benefits of the cloud," explained Alex Brower, VP of Marketing at Cloud Academy, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clar...
In his session at 21st Cloud Expo, Carl J. Levine, Senior Technical Evangelist for NS1, will objectively discuss how DNS is used to solve Digital Transformation challenges in large SaaS applications, CDNs, AdTech platforms, and other demanding use cases. Carl J. Levine is the Senior Technical Evangelist for NS1. A veteran of the Internet Infrastructure space, he has over a decade of experience with startups, networking protocols and Internet infrastructure, combined with the unique ability to it...
"Akvelon is a software development company and we also provide consultancy services to folks who are looking to scale or accelerate their engineering roadmaps," explained Jeremiah Mothersell, Marketing Manager at Akvelon, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
"Space Monkey by Vivent Smart Home is a product that is a distributed cloud-based edge storage network. Vivent Smart Home, our parent company, is a smart home provider that places a lot of hard drives across homes in North America," explained JT Olds, Director of Engineering, and Brandon Crowfeather, Product Manager, at Vivint Smart Home, in this SYS-CON.tv interview at @ThingsExpo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
It is of utmost importance for the future success of WebRTC to ensure that interoperability is operational between web browsers and any WebRTC-compliant client. To be guaranteed as operational and effective, interoperability must be tested extensively by establishing WebRTC data and media connections between different web browsers running on different devices and operating systems. In his session at WebRTC Summit at @ThingsExpo, Dr. Alex Gouaillard, CEO and Founder of CoSMo Software, presented ...
"There's plenty of bandwidth out there but it's never in the right place. So what Cedexis does is uses data to work out the best pathways to get data from the origin to the person who wants to get it," explained Simon Jones, Evangelist and Head of Marketing at Cedexis, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
WebRTC is great technology to build your own communication tools. It will be even more exciting experience it with advanced devices, such as a 360 Camera, 360 microphone, and a depth sensor camera. In his session at @ThingsExpo, Masashi Ganeko, a manager at INFOCOM Corporation, introduced two experimental projects from his team and what they learned from them. "Shotoku Tamago" uses the robot audition software HARK to track speakers in 360 video of a remote party. "Virtual Teleport" uses a multip...
"IBM is really all in on blockchain. We take a look at sort of the history of blockchain ledger technologies. It started out with bitcoin, Ethereum, and IBM evaluated these particular blockchain technologies and found they were anonymous and permissionless and that many companies were looking for permissioned blockchain," stated René Bostic, Technical VP of the IBM Cloud Unit in North America, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Conventi...
Gemini is Yahoo’s native and search advertising platform. To ensure the quality of a complex distributed system that spans multiple products and components and across various desktop websites and mobile app and web experiences – both Yahoo owned and operated and third-party syndication (supply), with complex interaction with more than a billion users and numerous advertisers globally (demand) – it becomes imperative to automate a set of end-to-end tests 24x7 to detect bugs and regression. In th...
SYS-CON Events announced today that Telecom Reseller has been named “Media Sponsor” of SYS-CON's 22nd International Cloud Expo, which will take place on June 5-7, 2018, at the Javits Center in New York, NY. Telecom Reseller reports on Unified Communications, UCaaS, BPaaS for enterprise and SMBs. They report extensively on both customer premises based solutions such as IP-PBX as well as cloud based and hosted platforms.
SYS-CON Events announced today that CrowdReviews.com has been named “Media Sponsor” of SYS-CON's 22nd International Cloud Expo, which will take place on June 5–7, 2018, at the Javits Center in New York City, NY. CrowdReviews.com is a transparent online platform for determining which products and services are the best based on the opinion of the crowd. The crowd consists of Internet users that have experienced products and services first-hand and have an interest in letting other potential buye...
"MobiDev is a software development company and we do complex, custom software development for everybody from entrepreneurs to large enterprises," explained Alan Winters, U.S. Head of Business Development at MobiDev, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
Coca-Cola’s Google powered digital signage system lays the groundwork for a more valuable connection between Coke and its customers. Digital signs pair software with high-resolution displays so that a message can be changed instantly based on what the operator wants to communicate or sell. In their Day 3 Keynote at 21st Cloud Expo, Greg Chambers, Global Group Director, Digital Innovation, Coca-Cola, and Vidya Nagarajan, a Senior Product Manager at Google, discussed how from store operations and ...
A strange thing is happening along the way to the Internet of Things, namely far too many devices to work with and manage. It has become clear that we'll need much higher efficiency user experiences that can allow us to more easily and scalably work with the thousands of devices that will soon be in each of our lives. Enter the conversational interface revolution, combining bots we can literally talk with, gesture to, and even direct with our thoughts, with embedded artificial intelligence, whic...
SYS-CON Events announced today that Evatronix will exhibit at SYS-CON's 21st International Cloud Expo®, which will take place on Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. Evatronix SA offers comprehensive solutions in the design and implementation of electronic systems, in CAD / CAM deployment, and also is a designer and manufacturer of advanced 3D scanners for professional applications.
Leading companies, from the Global Fortune 500 to the smallest companies, are adopting hybrid cloud as the path to business advantage. Hybrid cloud depends on cloud services and on-premises infrastructure working in unison. Successful implementations require new levels of data mobility, enabled by an automated and seamless flow across on-premises and cloud resources. In his general session at 21st Cloud Expo, Greg Tevis, an IBM Storage Software Technical Strategist and Customer Solution Architec...
To get the most out of their data, successful companies are not focusing on queries and data lakes, they are actively integrating analytics into their operations with a data-first application development approach. Real-time adjustments to improve revenues, reduce costs, or mitigate risk rely on applications that minimize latency on a variety of data sources. In his session at @BigDataExpo, Jack Norris, Senior Vice President, Data and Applications at MapR Technologies, reviewed best practices to ...
An increasing number of companies are creating products that combine data with analytical capabilities. Running interactive queries on Big Data requires complex architectures to store and query data effectively, typically involving data streams, an choosing efficient file format/database and multiple independent systems that are tied together through custom-engineered pipelines. In his session at @BigDataExpo at @ThingsExpo, Tomer Levi, a senior software engineer at Intel’s Advanced Analytics gr...
When talking IoT we often focus on the devices, the sensors, the hardware itself. The new smart appliances, the new smart or self-driving cars (which are amalgamations of many ‘things’). When we are looking at the world of IoT, we should take a step back, look at the big picture. What value are these devices providing? IoT is not about the devices, it’s about the data consumed and generated. The devices are tools, mechanisms, conduits. In his session at Internet of Things at Cloud Expo | DXWor...
Everything run by electricity will eventually be connected to the Internet. Get ahead of the Internet of Things revolution. In his session at @ThingsExpo, Akvelon expert and IoT industry leader Sergey Grebnov provided an educational dive into the world of managing your home, workplace and all the devices they contain with the power of machine-based AI and intelligent Bot services for a completely streamlined experience.