SlideShare ist ein Scribd-Unternehmen logo
1 von 16
Downloaden Sie, um offline zu lesen
by
Jason Escaravage
escaravage_jason@bah.com
Peter Guerra
guerra_peter@bah.com
Enabling Cloud Analytics with Data-Level Security
Tapping the Full Value of Big Data and the Cloud
Table of Contents
Introduction........................................................................................................................ 1
The Cloud Analytics Imperative............................................................................................. 1
Embedding Data-Level Security in the Cloud.......................................................................... 2
Implementing Data-Level Security......................................................................................... 5
JIEDDO Bolsters Cloud Analytics with Data-Level Security....................................................... 5
Conclusion......................................................................................................................... 6
Appendix: Cloud Analytics Reference Architecture.................................................................. 7
D
1
Introduction
We are entering an era of big data and cloud computing.
The combination, termed “cloud analytics,” holds
enormous promise for improved productivity, cost
savings, and enhanced mission performance. The Big
Data Research and Development Initiative, launched
by the White House Office of Science and Technology
Policy (OSTP) in March 2012, underscores a growing
recognition that big data analytics can help solve some
of the nation’s most complex problems. Developed by
OSTP in concert with several federal departments and
agencies, the big data initiative provides funding and
guidance aimed at improving our ability to collect, store,
preserve, manage, analyze, and share huge quantities
of data, with the ultimate goal of harnessing big data
technologies to accelerate the pace of discovery in
science and engineering, strengthen national security,
and transform teaching and learning.1
Despite the evident benefits of cloud analytics, many
federal leaders hesitate to adopt a cloud-based
services model because of worries about both costs
and security. How will my organization pay for these
new capabilities? And will our data be secure in the
cloud? How do we secure data in the cloud while still
meeting our information sharing obligations? These
are legitimate questions, particularly given today’s
constrained fiscal environment and government’s
strict privacy and security requirements. Booz Allen
Hamilton’s viewpoint, “Developing a Business Case
for Cloud-based Services,” shows how agencies can
address cost concerns through a combination of cost-
savings and productivity gains that more than justify
their cloud investments.2
The current viewpoint examines how an innovation
in cloud data storage and management known as a
“data lake” is opening new avenues for agencies to
meet their security and compliance requirements in a
cloud environment. The data lake approach enables
agencies to embed security controls within each
individual piece of data to reinforce existing layers
of security and dramatically reduce risk. Government
agencies — including military and intelligence
agencies —  are using this proven security approach to
secure data and fully capitalize on the promise of big
data and the cloud.
The Cloud Analytics Imperative
To understand the power of cloud analytics, it helps
to see the progression from basic data analytics
performed in most organizations today to cloud
analytics (Exhibit 1). As a system is built out along the
continuum to cloud analytics, the size and scale of
data the system can process increases, along with its
analytic capabilities. The combination of large datasets
and powerful analytics create a platform — cloud
Tapping the Full Value of Big Data and the Cloud
Enabling Cloud Analytics with Data-Level Security
1
“Obama Administration Unveils ‘Big Data‘ Initiative: Announces $200 Million In New RD
Investments.” http://www.whitehouse.gov/sites/default/files/microsites/ostp/big_data_
press_release_final_2.pdf.
2
For more information about Booz Allen’s Cloud Cost Model, see our viewpoint, “Developing
a Business Case for Cloud-based Services,” available at http://www.boozallen.com/
insights/insight-detail-spec/concepts-in-the-cloud.
Exhibit 1 | Progression to Cloud Analytics
Source: Booz Allen Hamilton
2
analytics — for enormous leaps forward in problem
solving, decisionmaking, and overall performance.
Numerous factors are driving federal agencies to
adopt cloud analytics. The Office of Management and
Budget (OMB) mandated a rapid move to embrace
“infrastructure as a service” in its “Federal Cloud
Computing Strategy,” issued in February 2011. The
cloud-first strategy called for agencies to begin by
moving at least three services to the cloud within 18
months, so they could begin harnessing the anticipated
savings and efficiencies. For example, cloud computing
facilitates federal efforts to consolidate data centers,
improve server utilization, and reduce the energy
footprint and management costs associated with data
centers. Agencies can also reduce costs and improve
IT performance with cloud-based services that enable
rapid provisioning, efficient use of resources, and greater
agility in adopting new technologies and solutions.
Another key driver is the desire to achieve cost
efficiencies by consolidating stove-pipes of
data — basically assessing legacy systems to identify
integration opportunities, consolidating interfaces,
and so on. For example, an agency that maintains 15
separate data systems would look to consolidate them
down to just 1, with an eye to reducing overall IT “cost
of ownership.” However, with that consolidation comes
a host of the security concerns.
Security is also a key component in the White House’s
“Digital Government Strategy,” which calls for agencies
to make better use of digital technologies, including
analytics for data-driven decisionmaking. Finally, the
White House’s “Big Data Research and Development
Initiative” would exploit the fast-growing volume of
federal data using cloud-based services and emerging
analytics tools. Cloud analytics offers a wealth of
potential insights and benefits in medicine and
healthcare, military operations, intelligence analysis,
fraud detection, border protection, anti-terrorism, and
other critical government missions. Together, cloud
computing and data analytics provide a foundation for
productivity gains and enhanced mission performance
too compelling to ignore. The question is: How can
agencies realize these benefits while also ensuring
security and compliance?
Embedding Data-Level Security in the Cloud
Many organizations today rely on techniques and
approaches for storing and accessing data that
were created before the advent of the cloud and big
data. These legacy approaches typically store data
in “siloed” servers that house different types of data
based on a variety of characteristics, such as their
source, function, and security restrictions, or whether
they are batch, streaming, structured, or unstructured.
Security approaches for protecting data “at rest” have
naturally focused on protecting the individual silos that
store the data. Unfortunately, these approaches for
storing and securing data create significant challenges
for cloud analytics. The cloud’s value stems from its
ability to bring together vast amounts of data from
multiple sources and in multiple combinations for
analysis — and to do so quickly and efficiently. Rigid,
regimented silos make the data difficult to access
and nearly impossible to mix and use all at once,
reducing the effectiveness of the analytical tools.
Organizations can build bridges between silos to enable
sharing and analysis, but this approach becomes
increasingly cumbersome and costly as more and
more bridges are required to facilitate sharing among
multiple combinations of databases. In addition, it
becomes more difficult to determine who is accessing
the data, what they do with it, and why they need it
across all their systems because there is no record
of data provenance, data lineage, or data access.
Combining data from databases that have different
levels of security is especially problematic, often
requiring designation of the mixed data (and resulting
analysis) with high levels of security restrictions.
Another complicating factor for many organizations is
that some of the more effective methods for protecting
data — such as using polymorphous techniques, mixing
bogus data with real data, changing where the data
resides, and disaggregating data — become difficult
to implement as the datasets become larger and
3
larger. These techniques do not scale easily with the
data. Ultimately, conventional approaches for securing
data become impossible to sustain in a growing cloud
environment, and the full potential of cloud analytics
remains unfulfilled.
The new, complex cloud environment requires
organizations to re-imagine how they store, manage,
and secure data to facilitate the free flow and mixing
of different types of data. An innovative approach
called the data lake has proven extremely effective in
addressing the challenges of managing and securing
large, diverse datasets in the cloud. Rather than
storing data in siloed servers, this approach ingests
all data — structured, unstructured, streaming, batch,
etc. — into a common storage pool: the data lake. As
data enters the data lake, each piece is tagged with
security information — security metadata — that embeds
security within the data. The metadata tags can control
(or prescribe) security parameters such as who can
access the data; when they can access the data;
what networks and devices can access the data; and
the regulations, standards, and legal restrictions that
apply. Security resides within and moves with the data,
whether the data is in motion or at rest. As a result,
organizations can confidently mix multiple datasets and
provide analysts with fast and efficient access to the
data, knowing the security tags will remain permanently
attached to the data.
Before examining how security metadata is attached
to the data, it is important to understand the types of
security controls needed in a cloud environment. Within
the cloud, data is typically shared among multiple
users, devices, networks, platforms, and applications;
consequently, effective cloud security encompasses
three essential activities: identity management,
configuration management, and compliance. Identity
management is critical to ensure that the right
people — and only those people — have access to
the different types of data. For most government
and commercial organizations, the requirements
for multilevel identity management complicate this
task because they give some employees access to
some but not all types of information, such as top-
secret intelligence reports or proprietary financial
data. Cloud-based data is also shared across many
different types of platforms, applications, and devices,
which further complicates the security task, because
employees might be authorized to access some data
only from specific types of devices (e.g., a secure
computer located within a government building) or
only on authorized networks (e.g., a secure intranet).
Consequently, secure cloud–based systems require
effective configuration management to manage data
access for many combinations of approved networks,
platforms, and devices, while also taking into account
user identities and authorizations. Finally, organizations
require security controls to ensure they comply
with relevant regulations and standards as data is
accessed, shared, and analyzed. For example, federal
agencies must comply with a host of security standards
and authorizations, such the Federal Information
Security Management Act (FISMA) National Institute of
Standards and Technology (NIST) security standards
and guidelines, Health Insurance Portability and
Accountability Act (HIPAA) privacy requirements, and the
Federal Risk and Authorization Management Program
(FedRAMP) program for accreditation of cloud products
and services.
The data lake enables organizations to address
these security requirements efficiently and effectively
through the security tags attached to the data as it
flows into and out of the data lake. In carrying out
this security function, the data lake acts as though it
were a massive spreadsheet with an infinite number
of columns and rows, and each cell within the
spreadsheet contains a unique piece of data, with a
defined set of security conditions or restrictions. As
each piece of data enters the lake and is tagged, it is
assigned to its cell, along with its particular security
parameters. For example, a piece of data could be
tagged with information describing who can use the
data, as well as with information describing the types
of approved devices, networks, platforms, or locations.
The tags could also describe the types of compliance
4
5
regulations and standards that apply. And the tags
could contain the dimension of time, thus helping
organizations maintain the integrity of the data and
have a record of changes over time. Similarly, the tags
could allow certain people access to all historical data
while limiting others to just the most recent data; or the
tags could embed an expiration date on the data. Many
data elements will have multiple security descriptors;
there are no limits to the number or combinations
assigned. Every piece of data is tagged with security
metadata describing the applicable security restrictions
and conditions of its use.
Also noteworthy, organizations can code the tags
to recognize and work with security controls in the
other layers of the architecture — that is, with the
infrastructure, platform, application, and software
layers. In this way, data-level security complements
and reinforces the identity management, configuration
management, and compliance controls already in place
(or later implemented) while also facilitating the free
flow of data that gives cloud computing and analytics
their power.3
For example, the data lake approach
uses an identity management system that can handle
Attribute-Based Access Control (ABAC), a public key
infrastructure (PKI), to protect the communications
between the servers and to bind the tags to the
data elements, and a process for developing the
security controls to apply to each data element.
These technology elements are usually combined
with an organization’s existing security policies and
are then applied as analytics on top of the data once
it is ingested. In addition, unlike many conventional
security techniques, data tagging can easily scale with
an organization’s expanding infrastructure, datasets,
devices, and user population.
Implementing Data-Level Security
The data-level security made possible by the data
lake approach can be used within a variety of cloud
frameworks. A number of federal agencies have
recently implemented it with great success using the
Cloud Analytics Reference Architecture, a breakthrough
approach for storing, managing, securing, and analyzing
data in the cloud.4
Developed by Booz Allen Hamilton
in collaboration with its US government partners, the
Cloud Analytics Reference Architecture automatically
tags each piece of data with security metadata as
the data enters the data lake. Organizations can
use a variety of commercial off-the-shelf (COTS)
or government off-the-shelf (GOTS) tools, including
open-source tools, to tag the data. The tagging
technology — basically a preprocessor with the ability
add metadata to data streams — has not proven
difficult to implement. However, resolving the policy
and legal issues surrounding the sharing and mixing
of data can be problematic. The complex process to
decide which policies and laws apply to which pieces
of data requires a determined effort by the relevant
stakeholders and decisionmakers. Each organization
is different and so will apply the rules, standards,
laws, and policies in accordance with its culture and
mission. However, once these decisions are made
and the appropriate mechanisms are put in place,
the security metadata can be attached automatically
based on the agreed-upon, preconfigured rules
addressing the relevant aspects of security, including
identity management, configuration management,
and compliance.
JIEDDO Bolsters Cloud Analytics
with Data-Level Security
A government organization that is successfully
implementing data-level security within the Cloud
Analytics Reference Architecture is the Joint Improvised
Explosives Device Defeat Organization (JIEDDO).
Established in 2006, JIEDDO seeks to improve threat
intelligence-gathering, acquire counter-IED technologies
and solutions, and develop counter-IED training for
US forces. To identify and eliminate threats, JIEDDO
analysts constantly comb through hundreds of different
data sources, such as message traffic from the
intelligence community, operations summaries from
3
In addition to applying metadata security tags to their data, organizations can also encrypt
selected pieces of data to further control access and risk. As with other security controls that
organizations put in place, the decision to encrypt data should be determined by an assess-
ment of the overall benefits relative to the costs and risks of encrypting the information.
4
For an overview of the Cloud Analytics Reference Architecture, see the Appendix.
6
on-the-ground deployed units, RS feeds, news reports,
websites, and other open sources. The diverse sets of
data enter JIEDDO in every kind of format. Combining
all of JIEDDO’s information so that analysts could
conduct a single search was difficult and sometimes
impossible before JIEDDO adopted the Cloud Analytics
Reference Architecture and data-security tagging.
Typically, analysts were forced to query separate
databases using processes and tools that were
specific to each database, which meant the analysts
needed to master each database and format.
After receiving the results, analysts would then
manually combine the results to find the answers
they were seeking. The process, although valuable,
could be cumbersome and time consuming, even
for thosewith experience and expertise in using
the databases.
In contrast, the Cloud Analytics Reference Architecture
allows analysts to run a single query of all JIEDDO’s
data because the data is stored together in the data
lake. When looking for patterns and trends, such as
what types of IEDs certain groups are using or where
the danger spots are located, analysts can tap every
available source. Analysts can also ask any type of
question regarding information in the data lake; in
contrast, the types of questions that analysts can ask
using conventional databases are often limited by how
the data is formatted. In addition, one of the benefits
of security tagging is that it creates hierarchies of
access control to identify who can and cannot see
the data and the analytical results. This is extremely
important for JIEDDO, because it supports the US
military and international security assistance forces.
Security tagging enables analysts and commanding
officers to more readily share information with foreign
allies because the metadata protects the data.
Previously, without such tagging, valuable information
and analyses often defaulted to the highest level of
security, thus limiting their usefulness because the
information and analyses could not be widely shared.
Data tagging and the Cloud Analytics Reference
Architecture are enabling JIEDDO to more effectively
carry out its mission responsibilities to analyze
intelligence, attack terrorist networks, and protect US
and coalition forces from IEDs.
Conclusion
Federal chief information officers and IT managers
overwhelmingly cite security as their chief concern
when moving to cloud computing. Many fear a loss of
control over their data. Data-level security within a data
lake addresses their concerns by providing security that
is fine-grained and expressive. It is expressive in that
organizations can tag their data with a limitless number
of security and business rules; and it is fine-grained in
that organizations can affix those rules with rigorous,
detailed precision to specify approved user identities,
devices, physical locations, networks, and applications,
applicable privacy and security regulations, and other
security parameters to each piece of data. Data
tagging also reinforces existing layers of security
embedded at the infrastructure, platform, application,
and network levels. And the metadata tags embed
each piece of data with security throughout its lifecycle,
from data generation to data elimination when the hard
drive and data are destroyed.
Together, the data lake and data-level security
represent an entirely new approach that gives both
government and business organizations a powerful tool
to solve their most complex problems. By re-imagining
data security in the cloud, organizations can unlock
the full value of cloud analytics to address scientific,
social, and economic challenges in ways that were
unimaginable a decade ago.
7
Appendix:
Cloud Analytics Reference Architecture
The Cloud Analytics Reference Architecture, as shown
in Exhibit 2, is built on a cloud computing and network
infrastructure that ingests all data — structured,
unstructured, streaming, batch, etc. — into a
common storage pool called a data lake. Storing
data in the data lake has many advantages over
conventional techniques. It is stored on commodity
hardware and can scale rapidly in performance and
storage. This gives the data lake the flexibility to
expand to accommodate the natural growth of an
organization’s data, as well as additional data from
multiple outside sources. Thus, unlike conventional
approaches, it enables organizations to pursue new
analytical approaches with few changes, if any, to the
underlying infrastructure. It also precludes the need
for building bridges between data silos, because all
of the information is already stored together. Perhaps
most important, the data lake treats structured and
unstructured data equally. There is no “second-class”
data based on how easy it is to use. Given that an
estimated 80 percent of the data created today is
unstructured, organizations must have the ability to
use this data. Overall, the data lake makes all of the
data easy to access and opens the door to the more
efficient and effective use of big data analytical tools.
The Cloud Analytics Reference Architecture also
allows computers to take over much of the work,
freeing people to focus on analysis and insight. As
data flows into the data lake, it is automatically
tagged and indexed for analytics and services.
Unlike in conventional approaches, the data is not
pre-summarized or pre-categorized as structured or
unstructured or by its different locations (given that
all data is stored in the data lake), but rather for
indexing, sorting, identification, and security across
multiple dimensions. The data lake smoothly accepts
all types of data, including unstructured data, through
this automated tagging process. When organization are
ready to apply analytic tools to the data, pre-analytics
filers help sort the data and prepare it for deeper
Exhibit 2 | Primary Elements of the Cloud Analytics Reference Architecture
Source: Booz Allen Hamilton
Streaming
Indexes
Human Insights and Actions
Enabled by customizable interfaces
and visualizations of the data
Analytics and Services
Your tools for analysis, modeling,
testing, and simulations
Data Management
The single, secure repository
for all of your valuable data
Infrastructure
The technology platform for storing 
and managing your data
Services (SOA)
Analytics and
Discovery
Views and Indexes
Data Lake
Metadata Tagging
Data Sources
Infrastructure/
Management
Visualization, Reporting,
Dash-boards, and Query
Interface
8
9
analysis, using the tags to locate and pull out the
relevant information from the data lake. Pre-analytical
tools are also used in the conventional approach, but
they are typically part of a rigid structure that must be
reassembled as inquiries change. In contrast, the pre-
analytics in the Cloud Analytics Reference Architecture
are designed for use with the data lake, and so are
both flexible and reusable.
The Cloud Analytics Reference Architecture opens
up the enormous potential of big data analytics in
multiple ways. For example, it removes the constraints
created by data silos. Rather than having to move from
database to database to pull out specific information,
users can access all of the data at once, including
data from outside sources, expanding exponentially the
spectrum of analysis. This approach also expands the
range of questions that can be asked of data through
multiple analytic tools and processes, including:
•	 Ad hoc queries. Unlike conventional approaches,
where analytics are part of the narrow, custom-
built structure, in the Cloud Analytics Reference
Architecture, analysts are free to pursue ad hoc
queries employing any line of inquiry, including
improvised follow-up questions that can yield
particularly valuable results.
•	 Machine learning. Analytics can search for patterns
examining all of the available data at once without
needing to hypothesize in advance what patterns
might exist.
•	 Alerting. An analytic alert notifying an organization
that something unexpected has occurred — such
as an anomaly in a pattern — can signal important
changes and trends in cyber threats, enemy
activities, health and disease status, consumer
behavior, market activity, and other areas.
The Cloud Analytics Reference Architecture also
supports interfaces and visualization dashboards to
contextualize and package the insights, patterns, and
other results for decisionmakers. Although the Cloud
Analytics Reference Architecture opens a wide aperture
to data, it incorporates visualization and interaction
tools that present the analyses in clear formats tailored
to the specific issues and decisions at hand, enabling
insight and confident action by decisionmakers.
A number of defense, civilian, and intelligence agencies
are already using the Cloud Analytics Reference
Architecture to generate valuable insights and achieve
mission goals previously unattainable in conventional
cloud environments. For example, the US military
is using the Cloud Analytics Reference Architecture
to search for patterns in war zone intelligence data,
mapping out convoy routes least likely to encounter
IEDs. The Centers for Medicare and Medicaid Services
(CMS) are using this approach to combat fraud by
analyzing mountains of data, which enables CMS to
assess doctors and others who bill Medicare on their
risk to commit fraud. And intelligence agencies are
using this new cloud architecture to apply aggressive
indexing techniques and on-demand analytics across
the agencies’ massive and increasing volume of
both structured and unstructured data. Booz Allen
itself is also adopting the Cloud Analytics Reference
Architecture to maximize its cloud analytics capabilities,
both for the firm and its clients.
Many organizations today have an urgent need to
make sense of data from diverse sources, including
those that have previously been inaccessible
or extremely difficult to use, such as streams
of unstructured data from social networks or
remote sensors. The Cloud Analytics Reference
Architecture enables analysts and decisionmakers
to see new connections within all of this data to
uncover previously hidden trends and relationships.
Organizations can extract real business and mission
value from their data to address pressing challenges
and requirements, while improving operational
effectiveness and overall performance.
10
11
About Booz Allen Hamilton
ContactsBooz Allen Hamilton has been at the forefront of
strategy and technology consulting for nearly a century.
Today, Booz Allen Hamilton is a leading provider of
management and technology consulting services to
the US and international governments in defense,
intelligence, and civil sectors, and to major corporations,
institutions, and not-for-profit organizations. In the
commercial sector, the firm focuses on leveraging its
existing expertise for clients in the financial services,
healthcare, and energy markets, and to international
clients in the Middle East. Booz Allen Hamilton offers
clients deep functional knowledge spanning strategy and
organization, engineering and operations, technology,
and analytics—which it combines with specialized
expertise in clients’ mission and domain areas to help
solve their toughest problems.
The firm’s management consulting heritage is the
basis for its unique collaborative culture and operating
model, enabling Booz Allen Hamilton to anticipate
needs and opportunities, rapidly deploy talent and
resources, and deliver enduring results. By combining
a consultant’s problem-solving orientation with deep
technical knowledge and strong execution, Booz
Allen Hamilton helps clients achieve success in their
most critical missions—as evidenced by the firm’s
many client relationships that span decades. Booz
Allen Hamilton helps shape thinking and prepare for
future developments in areas of national importance,
including cybersecurity, homeland security, healthcare,
and information technology.
Booz Allen is headquartered in McLean, Virginia,
employs approximately 25,000 people, and had
revenue of $5.86 billion for the 12 months ended
March 31, 2012. For over a decade, Booz Allen’s high
standing as a business and an employer has been
recognized by dozens of organizations and publications,
including Fortune, Working Mother, G.I. Jobs, and
DiversityInc. More information is available at
www.boozallen.com. (NYSE: BAH)
Jason Escaravage
Principal
escaravage_jason@bah.com
703-902-5635
Peter Guerra
Senior Associate
guerra_peter@bah.com
301-497-6754
The most complete, recent list of offices and their addresses and telephone numbers can be found on
www.boozallen.com
Principal Offices
Huntsville, Alabama
Montgomery, Alabama
Sierra Vista, Arizona
Los Angeles, California
San Diego, California
San Francisco, California
Colorado Springs, Colorado
Denver, Colorado
District of Columbia
Pensacola, Florida
Sarasota, Florida
Tampa, Florida
Atlanta, Georgia
Honolulu, Hawaii
O’Fallon, Illinois
Indianapolis, Indiana
Leavenworth, Kansas
Radcliff, Kentucky
Aberdeen, Maryland
Annapolis Junction, Maryland
Lexington Park, Maryland
Linthicum, Maryland
Rockville, Maryland
Troy, Michigan
Kansas City, Missouri
Omaha, Nebraska
Red Bank, New Jersey
New York, New York
Rome, New York
Fayetteville, North Carolina
Cleveland, Ohio
Dayton, Ohio
Philadelphia, Pennsylvania
Charleston, South Carolina
Houston, Texas
San Antonio, Texas
Abu Dhabi, UAE
Alexandria, Virginia
Arlington, Virginia
Chantilly, Virginia
Charlottesville, Virginia
Falls Church, Virginia
Herndon, Virginia
Lorton, Virginia
McLean, Virginia
Norfolk, Virginia
Stafford, Virginia
Seattle, Washington
www.boozallen.com/cloud ©2013 Booz Allen Hamilton Inc.
12.032.12M

Weitere ähnliche Inhalte

Was ist angesagt?

Nuestar "Big Data Cloud" Major Data Center Technology nuestarmobilemarketing...
Nuestar "Big Data Cloud" Major Data Center Technology  nuestarmobilemarketing...Nuestar "Big Data Cloud" Major Data Center Technology  nuestarmobilemarketing...
Nuestar "Big Data Cloud" Major Data Center Technology nuestarmobilemarketing...IT Support Engineer
 
Data Virtualization for Compliance – Creating a Controlled Data Environment
Data Virtualization for Compliance – Creating a Controlled Data EnvironmentData Virtualization for Compliance – Creating a Controlled Data Environment
Data Virtualization for Compliance – Creating a Controlled Data EnvironmentDenodo
 
Logical Data Fabric: Architectural Components
Logical Data Fabric: Architectural ComponentsLogical Data Fabric: Architectural Components
Logical Data Fabric: Architectural ComponentsDenodo
 
5 Factors Impacting Your Big Data Project's Performance
5 Factors Impacting Your Big Data Project's Performance 5 Factors Impacting Your Big Data Project's Performance
5 Factors Impacting Your Big Data Project's Performance Qubole
 
A Journey to the Cloud with Data Virtualization
A Journey to the Cloud with Data VirtualizationA Journey to the Cloud with Data Virtualization
A Journey to the Cloud with Data VirtualizationDenodo
 
Accelerating Time to Success for Your Big Data Initiatives
Accelerating Time to Success for Your Big Data InitiativesAccelerating Time to Success for Your Big Data Initiatives
Accelerating Time to Success for Your Big Data Initiatives☁Jake Weaver ☁
 
Introduction to Modern Data Virtualization 2021 (APAC)
Introduction to Modern Data Virtualization 2021 (APAC)Introduction to Modern Data Virtualization 2021 (APAC)
Introduction to Modern Data Virtualization 2021 (APAC)Denodo
 
Big data analysis concepts and references by Cloud Security Alliance
Big data analysis concepts and references by Cloud Security AllianceBig data analysis concepts and references by Cloud Security Alliance
Big data analysis concepts and references by Cloud Security AllianceInformation Security Awareness Group
 
Reinventing and Simplifying Data Management for a Successful Hybrid and Multi...
Reinventing and Simplifying Data Management for a Successful Hybrid and Multi...Reinventing and Simplifying Data Management for a Successful Hybrid and Multi...
Reinventing and Simplifying Data Management for a Successful Hybrid and Multi...Denodo
 
Big, small or just complex data?
Big, small or just complex data?Big, small or just complex data?
Big, small or just complex data?panoratio
 
Business_Analytics_Presentation_Luke_Caratan
Business_Analytics_Presentation_Luke_CaratanBusiness_Analytics_Presentation_Luke_Caratan
Business_Analytics_Presentation_Luke_CaratanLuke Caratan
 
Partner Keynote: How Logical Data Fabric Knits Together Data Visualization wi...
Partner Keynote: How Logical Data Fabric Knits Together Data Visualization wi...Partner Keynote: How Logical Data Fabric Knits Together Data Visualization wi...
Partner Keynote: How Logical Data Fabric Knits Together Data Visualization wi...Denodo
 
Advanced Analytics and Machine Learning with Data Virtualization (India)
Advanced Analytics and Machine Learning with Data Virtualization (India)Advanced Analytics and Machine Learning with Data Virtualization (India)
Advanced Analytics and Machine Learning with Data Virtualization (India)Denodo
 
Advanced Analytics and Machine Learning with Data Virtualization
Advanced Analytics and Machine Learning with Data VirtualizationAdvanced Analytics and Machine Learning with Data Virtualization
Advanced Analytics and Machine Learning with Data VirtualizationDenodo
 
Information economics and big data
Information economics and big dataInformation economics and big data
Information economics and big dataMark Albala
 
Logical Data Fabric: An Introduction
Logical Data Fabric: An IntroductionLogical Data Fabric: An Introduction
Logical Data Fabric: An IntroductionDenodo
 

Was ist angesagt? (20)

Big data and oracle
Big data and oracleBig data and oracle
Big data and oracle
 
Nuestar "Big Data Cloud" Major Data Center Technology nuestarmobilemarketing...
Nuestar "Big Data Cloud" Major Data Center Technology  nuestarmobilemarketing...Nuestar "Big Data Cloud" Major Data Center Technology  nuestarmobilemarketing...
Nuestar "Big Data Cloud" Major Data Center Technology nuestarmobilemarketing...
 
Data Virtualization for Compliance – Creating a Controlled Data Environment
Data Virtualization for Compliance – Creating a Controlled Data EnvironmentData Virtualization for Compliance – Creating a Controlled Data Environment
Data Virtualization for Compliance – Creating a Controlled Data Environment
 
Logical Data Fabric: Architectural Components
Logical Data Fabric: Architectural ComponentsLogical Data Fabric: Architectural Components
Logical Data Fabric: Architectural Components
 
5 Factors Impacting Your Big Data Project's Performance
5 Factors Impacting Your Big Data Project's Performance 5 Factors Impacting Your Big Data Project's Performance
5 Factors Impacting Your Big Data Project's Performance
 
A Journey to the Cloud with Data Virtualization
A Journey to the Cloud with Data VirtualizationA Journey to the Cloud with Data Virtualization
A Journey to the Cloud with Data Virtualization
 
Big Data (security Issue)
Big Data (security Issue)Big Data (security Issue)
Big Data (security Issue)
 
Accelerating Time to Success for Your Big Data Initiatives
Accelerating Time to Success for Your Big Data InitiativesAccelerating Time to Success for Your Big Data Initiatives
Accelerating Time to Success for Your Big Data Initiatives
 
Introduction to Modern Data Virtualization 2021 (APAC)
Introduction to Modern Data Virtualization 2021 (APAC)Introduction to Modern Data Virtualization 2021 (APAC)
Introduction to Modern Data Virtualization 2021 (APAC)
 
Big data analysis concepts and references by Cloud Security Alliance
Big data analysis concepts and references by Cloud Security AllianceBig data analysis concepts and references by Cloud Security Alliance
Big data analysis concepts and references by Cloud Security Alliance
 
TierPoint_ColocationWhitepaper-Six_Reasons
TierPoint_ColocationWhitepaper-Six_ReasonsTierPoint_ColocationWhitepaper-Six_Reasons
TierPoint_ColocationWhitepaper-Six_Reasons
 
Reinventing and Simplifying Data Management for a Successful Hybrid and Multi...
Reinventing and Simplifying Data Management for a Successful Hybrid and Multi...Reinventing and Simplifying Data Management for a Successful Hybrid and Multi...
Reinventing and Simplifying Data Management for a Successful Hybrid and Multi...
 
Big, small or just complex data?
Big, small or just complex data?Big, small or just complex data?
Big, small or just complex data?
 
Business_Analytics_Presentation_Luke_Caratan
Business_Analytics_Presentation_Luke_CaratanBusiness_Analytics_Presentation_Luke_Caratan
Business_Analytics_Presentation_Luke_Caratan
 
Partner Keynote: How Logical Data Fabric Knits Together Data Visualization wi...
Partner Keynote: How Logical Data Fabric Knits Together Data Visualization wi...Partner Keynote: How Logical Data Fabric Knits Together Data Visualization wi...
Partner Keynote: How Logical Data Fabric Knits Together Data Visualization wi...
 
Advanced Analytics and Machine Learning with Data Virtualization (India)
Advanced Analytics and Machine Learning with Data Virtualization (India)Advanced Analytics and Machine Learning with Data Virtualization (India)
Advanced Analytics and Machine Learning with Data Virtualization (India)
 
Advanced Analytics and Machine Learning with Data Virtualization
Advanced Analytics and Machine Learning with Data VirtualizationAdvanced Analytics and Machine Learning with Data Virtualization
Advanced Analytics and Machine Learning with Data Virtualization
 
Information economics and big data
Information economics and big dataInformation economics and big data
Information economics and big data
 
Bigdata analytics
Bigdata analyticsBigdata analytics
Bigdata analytics
 
Logical Data Fabric: An Introduction
Logical Data Fabric: An IntroductionLogical Data Fabric: An Introduction
Logical Data Fabric: An Introduction
 

Ähnlich wie Enabling Cloud Analytics with Data-Level Security

Privacy and Integrity Preserving in Cloud Storage Devices
Privacy and Integrity Preserving in Cloud Storage DevicesPrivacy and Integrity Preserving in Cloud Storage Devices
Privacy and Integrity Preserving in Cloud Storage DevicesIOSR Journals
 
Enabling Public Audit Ability and Data Dynamics for Storage Security in Clou...
Enabling Public Audit Ability and Data Dynamics for Storage  Security in Clou...Enabling Public Audit Ability and Data Dynamics for Storage  Security in Clou...
Enabling Public Audit Ability and Data Dynamics for Storage Security in Clou...IOSR Journals
 
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud ComputingDistributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud ComputingAIRCC Publishing Corporation
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGAIRCC Publishing Corporation
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGijcsit
 
Expanded top ten_big_data_security_and_privacy_challenges
Expanded top ten_big_data_security_and_privacy_challengesExpanded top ten_big_data_security_and_privacy_challenges
Expanded top ten_big_data_security_and_privacy_challengesTom Kirby
 
Top ten big data security and privacy challenges
Top ten big data security and privacy challengesTop ten big data security and privacy challenges
Top ten big data security and privacy challengesBee_Ware
 
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...ijsrd.com
 
A blueprint for data in a multicloud world
A blueprint for data in a multicloud worldA blueprint for data in a multicloud world
A blueprint for data in a multicloud worldMehdi Charafeddine
 
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...IRJET Journal
 
Enhancement of the Cloud Data Storage Architectural Framework in Private Cloud
Enhancement of the Cloud Data Storage Architectural Framework in Private CloudEnhancement of the Cloud Data Storage Architectural Framework in Private Cloud
Enhancement of the Cloud Data Storage Architectural Framework in Private CloudINFOGAIN PUBLICATION
 
M.Phil Computer Science Cloud Computing Projects
M.Phil Computer Science Cloud Computing ProjectsM.Phil Computer Science Cloud Computing Projects
M.Phil Computer Science Cloud Computing ProjectsVijay Karan
 
M.Phil Computer Science Cloud Computing Projects
M.Phil Computer Science Cloud Computing ProjectsM.Phil Computer Science Cloud Computing Projects
M.Phil Computer Science Cloud Computing ProjectsVijay Karan
 
A Brief Survey on Various Technologies Involved in Cloud Computing Security
A Brief Survey on Various Technologies Involved in Cloud Computing SecurityA Brief Survey on Various Technologies Involved in Cloud Computing Security
A Brief Survey on Various Technologies Involved in Cloud Computing SecurityAssociate Professor in VSB Coimbatore
 
Global Security Certification for Governments
Global Security Certification for GovernmentsGlobal Security Certification for Governments
Global Security Certification for GovernmentsCloudMask inc.
 
A Survey on Different Techniques Used in Decentralized Cloud Computing
A Survey on Different Techniques Used in Decentralized Cloud ComputingA Survey on Different Techniques Used in Decentralized Cloud Computing
A Survey on Different Techniques Used in Decentralized Cloud ComputingEditor IJCATR
 
Authenticated and unrestricted auditing of big data space on cloud through v...
Authenticated and unrestricted auditing of big data space on  cloud through v...Authenticated and unrestricted auditing of big data space on  cloud through v...
Authenticated and unrestricted auditing of big data space on cloud through v...IJMER
 

Ähnlich wie Enabling Cloud Analytics with Data-Level Security (20)

Privacy and Integrity Preserving in Cloud Storage Devices
Privacy and Integrity Preserving in Cloud Storage DevicesPrivacy and Integrity Preserving in Cloud Storage Devices
Privacy and Integrity Preserving in Cloud Storage Devices
 
Enabling Public Audit Ability and Data Dynamics for Storage Security in Clou...
Enabling Public Audit Ability and Data Dynamics for Storage  Security in Clou...Enabling Public Audit Ability and Data Dynamics for Storage  Security in Clou...
Enabling Public Audit Ability and Data Dynamics for Storage Security in Clou...
 
Data Security and Privacy in Cloud Computing
Data Security and Privacy in Cloud ComputingData Security and Privacy in Cloud Computing
Data Security and Privacy in Cloud Computing
 
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud ComputingDistributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
 
Expanded top ten_big_data_security_and_privacy_challenges
Expanded top ten_big_data_security_and_privacy_challengesExpanded top ten_big_data_security_and_privacy_challenges
Expanded top ten_big_data_security_and_privacy_challenges
 
Top ten big data security and privacy challenges
Top ten big data security and privacy challengesTop ten big data security and privacy challenges
Top ten big data security and privacy challenges
 
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
 
A blueprint for data in a multicloud world
A blueprint for data in a multicloud worldA blueprint for data in a multicloud world
A blueprint for data in a multicloud world
 
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
 
journal paper
journal paperjournal paper
journal paper
 
Ccsw
CcswCcsw
Ccsw
 
Enhancement of the Cloud Data Storage Architectural Framework in Private Cloud
Enhancement of the Cloud Data Storage Architectural Framework in Private CloudEnhancement of the Cloud Data Storage Architectural Framework in Private Cloud
Enhancement of the Cloud Data Storage Architectural Framework in Private Cloud
 
M.Phil Computer Science Cloud Computing Projects
M.Phil Computer Science Cloud Computing ProjectsM.Phil Computer Science Cloud Computing Projects
M.Phil Computer Science Cloud Computing Projects
 
M.Phil Computer Science Cloud Computing Projects
M.Phil Computer Science Cloud Computing ProjectsM.Phil Computer Science Cloud Computing Projects
M.Phil Computer Science Cloud Computing Projects
 
A Brief Survey on Various Technologies Involved in Cloud Computing Security
A Brief Survey on Various Technologies Involved in Cloud Computing SecurityA Brief Survey on Various Technologies Involved in Cloud Computing Security
A Brief Survey on Various Technologies Involved in Cloud Computing Security
 
Global Security Certification for Governments
Global Security Certification for GovernmentsGlobal Security Certification for Governments
Global Security Certification for Governments
 
A Survey on Different Techniques Used in Decentralized Cloud Computing
A Survey on Different Techniques Used in Decentralized Cloud ComputingA Survey on Different Techniques Used in Decentralized Cloud Computing
A Survey on Different Techniques Used in Decentralized Cloud Computing
 
Authenticated and unrestricted auditing of big data space on cloud through v...
Authenticated and unrestricted auditing of big data space on  cloud through v...Authenticated and unrestricted auditing of big data space on  cloud through v...
Authenticated and unrestricted auditing of big data space on cloud through v...
 

Mehr von Booz Allen Hamilton

You Can Hack That: How to Use Hackathons to Solve Your Toughest Challenges
You Can Hack That: How to Use Hackathons to Solve Your Toughest ChallengesYou Can Hack That: How to Use Hackathons to Solve Your Toughest Challenges
You Can Hack That: How to Use Hackathons to Solve Your Toughest ChallengesBooz Allen Hamilton
 
Examining Flexibility in the Workplace for Working Moms
Examining Flexibility in the Workplace for Working MomsExamining Flexibility in the Workplace for Working Moms
Examining Flexibility in the Workplace for Working MomsBooz Allen Hamilton
 
Booz Allen's 10 Cyber Priorities for Boards of Directors
Booz Allen's 10 Cyber Priorities for Boards of DirectorsBooz Allen's 10 Cyber Priorities for Boards of Directors
Booz Allen's 10 Cyber Priorities for Boards of DirectorsBooz Allen Hamilton
 
Homeland Threats: Today and Tomorrow
Homeland Threats: Today and TomorrowHomeland Threats: Today and Tomorrow
Homeland Threats: Today and TomorrowBooz Allen Hamilton
 
Preparing for New Healthcare Payment Models
Preparing for New Healthcare Payment ModelsPreparing for New Healthcare Payment Models
Preparing for New Healthcare Payment ModelsBooz Allen Hamilton
 
The Product Owner’s Universe: Agile Coaching
The Product Owner’s Universe: Agile CoachingThe Product Owner’s Universe: Agile Coaching
The Product Owner’s Universe: Agile CoachingBooz Allen Hamilton
 
Immersive Learning: The Future of Training is Here
Immersive Learning: The Future of Training is HereImmersive Learning: The Future of Training is Here
Immersive Learning: The Future of Training is HereBooz Allen Hamilton
 
Nuclear Promise: Reducing Cost While Improving Performance
Nuclear Promise: Reducing Cost While Improving PerformanceNuclear Promise: Reducing Cost While Improving Performance
Nuclear Promise: Reducing Cost While Improving PerformanceBooz Allen Hamilton
 
Frenemies – When Unlikely Partners Join Forces
Frenemies – When Unlikely Partners Join ForcesFrenemies – When Unlikely Partners Join Forces
Frenemies – When Unlikely Partners Join ForcesBooz Allen Hamilton
 
Booz Allen Secure Agile Development
Booz Allen Secure Agile DevelopmentBooz Allen Secure Agile Development
Booz Allen Secure Agile DevelopmentBooz Allen Hamilton
 
Booz Allen Industrial Cybersecurity Threat Briefing
Booz Allen Industrial Cybersecurity Threat BriefingBooz Allen Industrial Cybersecurity Threat Briefing
Booz Allen Industrial Cybersecurity Threat BriefingBooz Allen Hamilton
 
Booz Allen Hamilton and Market Connections: C4ISR Survey Report
Booz Allen Hamilton and Market Connections: C4ISR Survey ReportBooz Allen Hamilton and Market Connections: C4ISR Survey Report
Booz Allen Hamilton and Market Connections: C4ISR Survey ReportBooz Allen Hamilton
 
Modern C4ISR Integrates, Innovates and Secures Military Networks
Modern C4ISR Integrates, Innovates and Secures Military NetworksModern C4ISR Integrates, Innovates and Secures Military Networks
Modern C4ISR Integrates, Innovates and Secures Military NetworksBooz Allen Hamilton
 
Agile and Open C4ISR Systems - Helping the Military Integrate, Innovate and S...
Agile and Open C4ISR Systems - Helping the Military Integrate, Innovate and S...Agile and Open C4ISR Systems - Helping the Military Integrate, Innovate and S...
Agile and Open C4ISR Systems - Helping the Military Integrate, Innovate and S...Booz Allen Hamilton
 
Booz Allen Field Guide to Data Science
Booz Allen Field Guide to Data Science Booz Allen Field Guide to Data Science
Booz Allen Field Guide to Data Science Booz Allen Hamilton
 

Mehr von Booz Allen Hamilton (20)

You Can Hack That: How to Use Hackathons to Solve Your Toughest Challenges
You Can Hack That: How to Use Hackathons to Solve Your Toughest ChallengesYou Can Hack That: How to Use Hackathons to Solve Your Toughest Challenges
You Can Hack That: How to Use Hackathons to Solve Your Toughest Challenges
 
Examining Flexibility in the Workplace for Working Moms
Examining Flexibility in the Workplace for Working MomsExamining Flexibility in the Workplace for Working Moms
Examining Flexibility in the Workplace for Working Moms
 
The True Cost of Childcare
The True Cost of ChildcareThe True Cost of Childcare
The True Cost of Childcare
 
Booz Allen's 10 Cyber Priorities for Boards of Directors
Booz Allen's 10 Cyber Priorities for Boards of DirectorsBooz Allen's 10 Cyber Priorities for Boards of Directors
Booz Allen's 10 Cyber Priorities for Boards of Directors
 
Inaugural Addresses
Inaugural AddressesInaugural Addresses
Inaugural Addresses
 
Military Spouse Career Roadmap
Military Spouse Career Roadmap Military Spouse Career Roadmap
Military Spouse Career Roadmap
 
Homeland Threats: Today and Tomorrow
Homeland Threats: Today and TomorrowHomeland Threats: Today and Tomorrow
Homeland Threats: Today and Tomorrow
 
Preparing for New Healthcare Payment Models
Preparing for New Healthcare Payment ModelsPreparing for New Healthcare Payment Models
Preparing for New Healthcare Payment Models
 
The Product Owner’s Universe: Agile Coaching
The Product Owner’s Universe: Agile CoachingThe Product Owner’s Universe: Agile Coaching
The Product Owner’s Universe: Agile Coaching
 
Immersive Learning: The Future of Training is Here
Immersive Learning: The Future of Training is HereImmersive Learning: The Future of Training is Here
Immersive Learning: The Future of Training is Here
 
Nuclear Promise: Reducing Cost While Improving Performance
Nuclear Promise: Reducing Cost While Improving PerformanceNuclear Promise: Reducing Cost While Improving Performance
Nuclear Promise: Reducing Cost While Improving Performance
 
Frenemies – When Unlikely Partners Join Forces
Frenemies – When Unlikely Partners Join ForcesFrenemies – When Unlikely Partners Join Forces
Frenemies – When Unlikely Partners Join Forces
 
Booz Allen Secure Agile Development
Booz Allen Secure Agile DevelopmentBooz Allen Secure Agile Development
Booz Allen Secure Agile Development
 
Booz Allen Industrial Cybersecurity Threat Briefing
Booz Allen Industrial Cybersecurity Threat BriefingBooz Allen Industrial Cybersecurity Threat Briefing
Booz Allen Industrial Cybersecurity Threat Briefing
 
Booz Allen Hamilton and Market Connections: C4ISR Survey Report
Booz Allen Hamilton and Market Connections: C4ISR Survey ReportBooz Allen Hamilton and Market Connections: C4ISR Survey Report
Booz Allen Hamilton and Market Connections: C4ISR Survey Report
 
CITRIX IN AMAZON WEB SERVICES
CITRIX IN AMAZON WEB SERVICESCITRIX IN AMAZON WEB SERVICES
CITRIX IN AMAZON WEB SERVICES
 
Modern C4ISR Integrates, Innovates and Secures Military Networks
Modern C4ISR Integrates, Innovates and Secures Military NetworksModern C4ISR Integrates, Innovates and Secures Military Networks
Modern C4ISR Integrates, Innovates and Secures Military Networks
 
Agile and Open C4ISR Systems - Helping the Military Integrate, Innovate and S...
Agile and Open C4ISR Systems - Helping the Military Integrate, Innovate and S...Agile and Open C4ISR Systems - Helping the Military Integrate, Innovate and S...
Agile and Open C4ISR Systems - Helping the Military Integrate, Innovate and S...
 
Women On The Leading Edge
Women On The Leading Edge Women On The Leading Edge
Women On The Leading Edge
 
Booz Allen Field Guide to Data Science
Booz Allen Field Guide to Data Science Booz Allen Field Guide to Data Science
Booz Allen Field Guide to Data Science
 

Kürzlich hochgeladen

Student Profile Sample report on improving academic performance by uniting gr...
Student Profile Sample report on improving academic performance by uniting gr...Student Profile Sample report on improving academic performance by uniting gr...
Student Profile Sample report on improving academic performance by uniting gr...Seán Kennedy
 
6 Tips for Interpretable Topic Models _ by Nicha Ruchirawat _ Towards Data Sc...
6 Tips for Interpretable Topic Models _ by Nicha Ruchirawat _ Towards Data Sc...6 Tips for Interpretable Topic Models _ by Nicha Ruchirawat _ Towards Data Sc...
6 Tips for Interpretable Topic Models _ by Nicha Ruchirawat _ Towards Data Sc...Dr Arash Najmaei ( Phd., MBA, BSc)
 
Learn How Data Science Changes Our World
Learn How Data Science Changes Our WorldLearn How Data Science Changes Our World
Learn How Data Science Changes Our WorldEduminds Learning
 
Data Analysis Project : Targeting the Right Customers, Presentation on Bank M...
Data Analysis Project : Targeting the Right Customers, Presentation on Bank M...Data Analysis Project : Targeting the Right Customers, Presentation on Bank M...
Data Analysis Project : Targeting the Right Customers, Presentation on Bank M...Boston Institute of Analytics
 
wepik-insightful-infographics-a-data-visualization-overview-20240401133220kwr...
wepik-insightful-infographics-a-data-visualization-overview-20240401133220kwr...wepik-insightful-infographics-a-data-visualization-overview-20240401133220kwr...
wepik-insightful-infographics-a-data-visualization-overview-20240401133220kwr...KarteekMane1
 
Defining Constituents, Data Vizzes and Telling a Data Story
Defining Constituents, Data Vizzes and Telling a Data StoryDefining Constituents, Data Vizzes and Telling a Data Story
Defining Constituents, Data Vizzes and Telling a Data StoryJeremy Anderson
 
Real-Time AI Streaming - AI Max Princeton
Real-Time AI  Streaming - AI Max PrincetonReal-Time AI  Streaming - AI Max Princeton
Real-Time AI Streaming - AI Max PrincetonTimothy Spann
 
Data Factory in Microsoft Fabric (MsBIP #82)
Data Factory in Microsoft Fabric (MsBIP #82)Data Factory in Microsoft Fabric (MsBIP #82)
Data Factory in Microsoft Fabric (MsBIP #82)Cathrine Wilhelmsen
 
SMOTE and K-Fold Cross Validation-Presentation.pptx
SMOTE and K-Fold Cross Validation-Presentation.pptxSMOTE and K-Fold Cross Validation-Presentation.pptx
SMOTE and K-Fold Cross Validation-Presentation.pptxHaritikaChhatwal1
 
English-8-Q4-W3-Synthesizing-Essential-Information-From-Various-Sources-1.pdf
English-8-Q4-W3-Synthesizing-Essential-Information-From-Various-Sources-1.pdfEnglish-8-Q4-W3-Synthesizing-Essential-Information-From-Various-Sources-1.pdf
English-8-Q4-W3-Synthesizing-Essential-Information-From-Various-Sources-1.pdfblazblazml
 
modul pembelajaran robotic Workshop _ by Slidesgo.pptx
modul pembelajaran robotic Workshop _ by Slidesgo.pptxmodul pembelajaran robotic Workshop _ by Slidesgo.pptx
modul pembelajaran robotic Workshop _ by Slidesgo.pptxaleedritatuxx
 
NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...
NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...
NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...Amil Baba Dawood bangali
 
Bank Loan Approval Analysis: A Comprehensive Data Analysis Project
Bank Loan Approval Analysis: A Comprehensive Data Analysis ProjectBank Loan Approval Analysis: A Comprehensive Data Analysis Project
Bank Loan Approval Analysis: A Comprehensive Data Analysis ProjectBoston Institute of Analytics
 
Predictive Analysis for Loan Default Presentation : Data Analysis Project PPT
Predictive Analysis for Loan Default  Presentation : Data Analysis Project PPTPredictive Analysis for Loan Default  Presentation : Data Analysis Project PPT
Predictive Analysis for Loan Default Presentation : Data Analysis Project PPTBoston Institute of Analytics
 
What To Do For World Nature Conservation Day by Slidesgo.pptx
What To Do For World Nature Conservation Day by Slidesgo.pptxWhat To Do For World Nature Conservation Day by Slidesgo.pptx
What To Do For World Nature Conservation Day by Slidesgo.pptxSimranPal17
 
Data Analysis Project Presentation: Unveiling Your Ideal Customer, Bank Custo...
Data Analysis Project Presentation: Unveiling Your Ideal Customer, Bank Custo...Data Analysis Project Presentation: Unveiling Your Ideal Customer, Bank Custo...
Data Analysis Project Presentation: Unveiling Your Ideal Customer, Bank Custo...Boston Institute of Analytics
 
Principles and Practices of Data Visualization
Principles and Practices of Data VisualizationPrinciples and Practices of Data Visualization
Principles and Practices of Data VisualizationKianJazayeri1
 
Minimizing AI Hallucinations/Confabulations and the Path towards AGI with Exa...
Minimizing AI Hallucinations/Confabulations and the Path towards AGI with Exa...Minimizing AI Hallucinations/Confabulations and the Path towards AGI with Exa...
Minimizing AI Hallucinations/Confabulations and the Path towards AGI with Exa...Thomas Poetter
 
Decoding Patterns: Customer Churn Prediction Data Analysis Project
Decoding Patterns: Customer Churn Prediction Data Analysis ProjectDecoding Patterns: Customer Churn Prediction Data Analysis Project
Decoding Patterns: Customer Churn Prediction Data Analysis ProjectBoston Institute of Analytics
 

Kürzlich hochgeladen (20)

Student Profile Sample report on improving academic performance by uniting gr...
Student Profile Sample report on improving academic performance by uniting gr...Student Profile Sample report on improving academic performance by uniting gr...
Student Profile Sample report on improving academic performance by uniting gr...
 
6 Tips for Interpretable Topic Models _ by Nicha Ruchirawat _ Towards Data Sc...
6 Tips for Interpretable Topic Models _ by Nicha Ruchirawat _ Towards Data Sc...6 Tips for Interpretable Topic Models _ by Nicha Ruchirawat _ Towards Data Sc...
6 Tips for Interpretable Topic Models _ by Nicha Ruchirawat _ Towards Data Sc...
 
Learn How Data Science Changes Our World
Learn How Data Science Changes Our WorldLearn How Data Science Changes Our World
Learn How Data Science Changes Our World
 
Data Analysis Project : Targeting the Right Customers, Presentation on Bank M...
Data Analysis Project : Targeting the Right Customers, Presentation on Bank M...Data Analysis Project : Targeting the Right Customers, Presentation on Bank M...
Data Analysis Project : Targeting the Right Customers, Presentation on Bank M...
 
wepik-insightful-infographics-a-data-visualization-overview-20240401133220kwr...
wepik-insightful-infographics-a-data-visualization-overview-20240401133220kwr...wepik-insightful-infographics-a-data-visualization-overview-20240401133220kwr...
wepik-insightful-infographics-a-data-visualization-overview-20240401133220kwr...
 
Defining Constituents, Data Vizzes and Telling a Data Story
Defining Constituents, Data Vizzes and Telling a Data StoryDefining Constituents, Data Vizzes and Telling a Data Story
Defining Constituents, Data Vizzes and Telling a Data Story
 
Real-Time AI Streaming - AI Max Princeton
Real-Time AI  Streaming - AI Max PrincetonReal-Time AI  Streaming - AI Max Princeton
Real-Time AI Streaming - AI Max Princeton
 
Data Factory in Microsoft Fabric (MsBIP #82)
Data Factory in Microsoft Fabric (MsBIP #82)Data Factory in Microsoft Fabric (MsBIP #82)
Data Factory in Microsoft Fabric (MsBIP #82)
 
SMOTE and K-Fold Cross Validation-Presentation.pptx
SMOTE and K-Fold Cross Validation-Presentation.pptxSMOTE and K-Fold Cross Validation-Presentation.pptx
SMOTE and K-Fold Cross Validation-Presentation.pptx
 
English-8-Q4-W3-Synthesizing-Essential-Information-From-Various-Sources-1.pdf
English-8-Q4-W3-Synthesizing-Essential-Information-From-Various-Sources-1.pdfEnglish-8-Q4-W3-Synthesizing-Essential-Information-From-Various-Sources-1.pdf
English-8-Q4-W3-Synthesizing-Essential-Information-From-Various-Sources-1.pdf
 
modul pembelajaran robotic Workshop _ by Slidesgo.pptx
modul pembelajaran robotic Workshop _ by Slidesgo.pptxmodul pembelajaran robotic Workshop _ by Slidesgo.pptx
modul pembelajaran robotic Workshop _ by Slidesgo.pptx
 
NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...
NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...
NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...
 
Bank Loan Approval Analysis: A Comprehensive Data Analysis Project
Bank Loan Approval Analysis: A Comprehensive Data Analysis ProjectBank Loan Approval Analysis: A Comprehensive Data Analysis Project
Bank Loan Approval Analysis: A Comprehensive Data Analysis Project
 
Data Analysis Project: Stroke Prediction
Data Analysis Project: Stroke PredictionData Analysis Project: Stroke Prediction
Data Analysis Project: Stroke Prediction
 
Predictive Analysis for Loan Default Presentation : Data Analysis Project PPT
Predictive Analysis for Loan Default  Presentation : Data Analysis Project PPTPredictive Analysis for Loan Default  Presentation : Data Analysis Project PPT
Predictive Analysis for Loan Default Presentation : Data Analysis Project PPT
 
What To Do For World Nature Conservation Day by Slidesgo.pptx
What To Do For World Nature Conservation Day by Slidesgo.pptxWhat To Do For World Nature Conservation Day by Slidesgo.pptx
What To Do For World Nature Conservation Day by Slidesgo.pptx
 
Data Analysis Project Presentation: Unveiling Your Ideal Customer, Bank Custo...
Data Analysis Project Presentation: Unveiling Your Ideal Customer, Bank Custo...Data Analysis Project Presentation: Unveiling Your Ideal Customer, Bank Custo...
Data Analysis Project Presentation: Unveiling Your Ideal Customer, Bank Custo...
 
Principles and Practices of Data Visualization
Principles and Practices of Data VisualizationPrinciples and Practices of Data Visualization
Principles and Practices of Data Visualization
 
Minimizing AI Hallucinations/Confabulations and the Path towards AGI with Exa...
Minimizing AI Hallucinations/Confabulations and the Path towards AGI with Exa...Minimizing AI Hallucinations/Confabulations and the Path towards AGI with Exa...
Minimizing AI Hallucinations/Confabulations and the Path towards AGI with Exa...
 
Decoding Patterns: Customer Churn Prediction Data Analysis Project
Decoding Patterns: Customer Churn Prediction Data Analysis ProjectDecoding Patterns: Customer Churn Prediction Data Analysis Project
Decoding Patterns: Customer Churn Prediction Data Analysis Project
 

Enabling Cloud Analytics with Data-Level Security

  • 1. by Jason Escaravage escaravage_jason@bah.com Peter Guerra guerra_peter@bah.com Enabling Cloud Analytics with Data-Level Security Tapping the Full Value of Big Data and the Cloud
  • 2.
  • 3. Table of Contents Introduction........................................................................................................................ 1 The Cloud Analytics Imperative............................................................................................. 1 Embedding Data-Level Security in the Cloud.......................................................................... 2 Implementing Data-Level Security......................................................................................... 5 JIEDDO Bolsters Cloud Analytics with Data-Level Security....................................................... 5 Conclusion......................................................................................................................... 6 Appendix: Cloud Analytics Reference Architecture.................................................................. 7
  • 4. D
  • 5. 1 Introduction We are entering an era of big data and cloud computing. The combination, termed “cloud analytics,” holds enormous promise for improved productivity, cost savings, and enhanced mission performance. The Big Data Research and Development Initiative, launched by the White House Office of Science and Technology Policy (OSTP) in March 2012, underscores a growing recognition that big data analytics can help solve some of the nation’s most complex problems. Developed by OSTP in concert with several federal departments and agencies, the big data initiative provides funding and guidance aimed at improving our ability to collect, store, preserve, manage, analyze, and share huge quantities of data, with the ultimate goal of harnessing big data technologies to accelerate the pace of discovery in science and engineering, strengthen national security, and transform teaching and learning.1 Despite the evident benefits of cloud analytics, many federal leaders hesitate to adopt a cloud-based services model because of worries about both costs and security. How will my organization pay for these new capabilities? And will our data be secure in the cloud? How do we secure data in the cloud while still meeting our information sharing obligations? These are legitimate questions, particularly given today’s constrained fiscal environment and government’s strict privacy and security requirements. Booz Allen Hamilton’s viewpoint, “Developing a Business Case for Cloud-based Services,” shows how agencies can address cost concerns through a combination of cost- savings and productivity gains that more than justify their cloud investments.2 The current viewpoint examines how an innovation in cloud data storage and management known as a “data lake” is opening new avenues for agencies to meet their security and compliance requirements in a cloud environment. The data lake approach enables agencies to embed security controls within each individual piece of data to reinforce existing layers of security and dramatically reduce risk. Government agencies — including military and intelligence agencies —  are using this proven security approach to secure data and fully capitalize on the promise of big data and the cloud. The Cloud Analytics Imperative To understand the power of cloud analytics, it helps to see the progression from basic data analytics performed in most organizations today to cloud analytics (Exhibit 1). As a system is built out along the continuum to cloud analytics, the size and scale of data the system can process increases, along with its analytic capabilities. The combination of large datasets and powerful analytics create a platform — cloud Tapping the Full Value of Big Data and the Cloud Enabling Cloud Analytics with Data-Level Security 1 “Obama Administration Unveils ‘Big Data‘ Initiative: Announces $200 Million In New RD Investments.” http://www.whitehouse.gov/sites/default/files/microsites/ostp/big_data_ press_release_final_2.pdf. 2 For more information about Booz Allen’s Cloud Cost Model, see our viewpoint, “Developing a Business Case for Cloud-based Services,” available at http://www.boozallen.com/ insights/insight-detail-spec/concepts-in-the-cloud. Exhibit 1 | Progression to Cloud Analytics Source: Booz Allen Hamilton
  • 6. 2 analytics — for enormous leaps forward in problem solving, decisionmaking, and overall performance. Numerous factors are driving federal agencies to adopt cloud analytics. The Office of Management and Budget (OMB) mandated a rapid move to embrace “infrastructure as a service” in its “Federal Cloud Computing Strategy,” issued in February 2011. The cloud-first strategy called for agencies to begin by moving at least three services to the cloud within 18 months, so they could begin harnessing the anticipated savings and efficiencies. For example, cloud computing facilitates federal efforts to consolidate data centers, improve server utilization, and reduce the energy footprint and management costs associated with data centers. Agencies can also reduce costs and improve IT performance with cloud-based services that enable rapid provisioning, efficient use of resources, and greater agility in adopting new technologies and solutions. Another key driver is the desire to achieve cost efficiencies by consolidating stove-pipes of data — basically assessing legacy systems to identify integration opportunities, consolidating interfaces, and so on. For example, an agency that maintains 15 separate data systems would look to consolidate them down to just 1, with an eye to reducing overall IT “cost of ownership.” However, with that consolidation comes a host of the security concerns. Security is also a key component in the White House’s “Digital Government Strategy,” which calls for agencies to make better use of digital technologies, including analytics for data-driven decisionmaking. Finally, the White House’s “Big Data Research and Development Initiative” would exploit the fast-growing volume of federal data using cloud-based services and emerging analytics tools. Cloud analytics offers a wealth of potential insights and benefits in medicine and healthcare, military operations, intelligence analysis, fraud detection, border protection, anti-terrorism, and other critical government missions. Together, cloud computing and data analytics provide a foundation for productivity gains and enhanced mission performance too compelling to ignore. The question is: How can agencies realize these benefits while also ensuring security and compliance? Embedding Data-Level Security in the Cloud Many organizations today rely on techniques and approaches for storing and accessing data that were created before the advent of the cloud and big data. These legacy approaches typically store data in “siloed” servers that house different types of data based on a variety of characteristics, such as their source, function, and security restrictions, or whether they are batch, streaming, structured, or unstructured. Security approaches for protecting data “at rest” have naturally focused on protecting the individual silos that store the data. Unfortunately, these approaches for storing and securing data create significant challenges for cloud analytics. The cloud’s value stems from its ability to bring together vast amounts of data from multiple sources and in multiple combinations for analysis — and to do so quickly and efficiently. Rigid, regimented silos make the data difficult to access and nearly impossible to mix and use all at once, reducing the effectiveness of the analytical tools. Organizations can build bridges between silos to enable sharing and analysis, but this approach becomes increasingly cumbersome and costly as more and more bridges are required to facilitate sharing among multiple combinations of databases. In addition, it becomes more difficult to determine who is accessing the data, what they do with it, and why they need it across all their systems because there is no record of data provenance, data lineage, or data access. Combining data from databases that have different levels of security is especially problematic, often requiring designation of the mixed data (and resulting analysis) with high levels of security restrictions. Another complicating factor for many organizations is that some of the more effective methods for protecting data — such as using polymorphous techniques, mixing bogus data with real data, changing where the data resides, and disaggregating data — become difficult to implement as the datasets become larger and
  • 7. 3 larger. These techniques do not scale easily with the data. Ultimately, conventional approaches for securing data become impossible to sustain in a growing cloud environment, and the full potential of cloud analytics remains unfulfilled. The new, complex cloud environment requires organizations to re-imagine how they store, manage, and secure data to facilitate the free flow and mixing of different types of data. An innovative approach called the data lake has proven extremely effective in addressing the challenges of managing and securing large, diverse datasets in the cloud. Rather than storing data in siloed servers, this approach ingests all data — structured, unstructured, streaming, batch, etc. — into a common storage pool: the data lake. As data enters the data lake, each piece is tagged with security information — security metadata — that embeds security within the data. The metadata tags can control (or prescribe) security parameters such as who can access the data; when they can access the data; what networks and devices can access the data; and the regulations, standards, and legal restrictions that apply. Security resides within and moves with the data, whether the data is in motion or at rest. As a result, organizations can confidently mix multiple datasets and provide analysts with fast and efficient access to the data, knowing the security tags will remain permanently attached to the data. Before examining how security metadata is attached to the data, it is important to understand the types of security controls needed in a cloud environment. Within the cloud, data is typically shared among multiple users, devices, networks, platforms, and applications; consequently, effective cloud security encompasses three essential activities: identity management, configuration management, and compliance. Identity management is critical to ensure that the right people — and only those people — have access to the different types of data. For most government and commercial organizations, the requirements for multilevel identity management complicate this task because they give some employees access to some but not all types of information, such as top- secret intelligence reports or proprietary financial data. Cloud-based data is also shared across many different types of platforms, applications, and devices, which further complicates the security task, because employees might be authorized to access some data only from specific types of devices (e.g., a secure computer located within a government building) or only on authorized networks (e.g., a secure intranet). Consequently, secure cloud–based systems require effective configuration management to manage data access for many combinations of approved networks, platforms, and devices, while also taking into account user identities and authorizations. Finally, organizations require security controls to ensure they comply with relevant regulations and standards as data is accessed, shared, and analyzed. For example, federal agencies must comply with a host of security standards and authorizations, such the Federal Information Security Management Act (FISMA) National Institute of Standards and Technology (NIST) security standards and guidelines, Health Insurance Portability and Accountability Act (HIPAA) privacy requirements, and the Federal Risk and Authorization Management Program (FedRAMP) program for accreditation of cloud products and services. The data lake enables organizations to address these security requirements efficiently and effectively through the security tags attached to the data as it flows into and out of the data lake. In carrying out this security function, the data lake acts as though it were a massive spreadsheet with an infinite number of columns and rows, and each cell within the spreadsheet contains a unique piece of data, with a defined set of security conditions or restrictions. As each piece of data enters the lake and is tagged, it is assigned to its cell, along with its particular security parameters. For example, a piece of data could be tagged with information describing who can use the data, as well as with information describing the types of approved devices, networks, platforms, or locations. The tags could also describe the types of compliance
  • 8. 4
  • 9. 5 regulations and standards that apply. And the tags could contain the dimension of time, thus helping organizations maintain the integrity of the data and have a record of changes over time. Similarly, the tags could allow certain people access to all historical data while limiting others to just the most recent data; or the tags could embed an expiration date on the data. Many data elements will have multiple security descriptors; there are no limits to the number or combinations assigned. Every piece of data is tagged with security metadata describing the applicable security restrictions and conditions of its use. Also noteworthy, organizations can code the tags to recognize and work with security controls in the other layers of the architecture — that is, with the infrastructure, platform, application, and software layers. In this way, data-level security complements and reinforces the identity management, configuration management, and compliance controls already in place (or later implemented) while also facilitating the free flow of data that gives cloud computing and analytics their power.3 For example, the data lake approach uses an identity management system that can handle Attribute-Based Access Control (ABAC), a public key infrastructure (PKI), to protect the communications between the servers and to bind the tags to the data elements, and a process for developing the security controls to apply to each data element. These technology elements are usually combined with an organization’s existing security policies and are then applied as analytics on top of the data once it is ingested. In addition, unlike many conventional security techniques, data tagging can easily scale with an organization’s expanding infrastructure, datasets, devices, and user population. Implementing Data-Level Security The data-level security made possible by the data lake approach can be used within a variety of cloud frameworks. A number of federal agencies have recently implemented it with great success using the Cloud Analytics Reference Architecture, a breakthrough approach for storing, managing, securing, and analyzing data in the cloud.4 Developed by Booz Allen Hamilton in collaboration with its US government partners, the Cloud Analytics Reference Architecture automatically tags each piece of data with security metadata as the data enters the data lake. Organizations can use a variety of commercial off-the-shelf (COTS) or government off-the-shelf (GOTS) tools, including open-source tools, to tag the data. The tagging technology — basically a preprocessor with the ability add metadata to data streams — has not proven difficult to implement. However, resolving the policy and legal issues surrounding the sharing and mixing of data can be problematic. The complex process to decide which policies and laws apply to which pieces of data requires a determined effort by the relevant stakeholders and decisionmakers. Each organization is different and so will apply the rules, standards, laws, and policies in accordance with its culture and mission. However, once these decisions are made and the appropriate mechanisms are put in place, the security metadata can be attached automatically based on the agreed-upon, preconfigured rules addressing the relevant aspects of security, including identity management, configuration management, and compliance. JIEDDO Bolsters Cloud Analytics with Data-Level Security A government organization that is successfully implementing data-level security within the Cloud Analytics Reference Architecture is the Joint Improvised Explosives Device Defeat Organization (JIEDDO). Established in 2006, JIEDDO seeks to improve threat intelligence-gathering, acquire counter-IED technologies and solutions, and develop counter-IED training for US forces. To identify and eliminate threats, JIEDDO analysts constantly comb through hundreds of different data sources, such as message traffic from the intelligence community, operations summaries from 3 In addition to applying metadata security tags to their data, organizations can also encrypt selected pieces of data to further control access and risk. As with other security controls that organizations put in place, the decision to encrypt data should be determined by an assess- ment of the overall benefits relative to the costs and risks of encrypting the information. 4 For an overview of the Cloud Analytics Reference Architecture, see the Appendix.
  • 10. 6 on-the-ground deployed units, RS feeds, news reports, websites, and other open sources. The diverse sets of data enter JIEDDO in every kind of format. Combining all of JIEDDO’s information so that analysts could conduct a single search was difficult and sometimes impossible before JIEDDO adopted the Cloud Analytics Reference Architecture and data-security tagging. Typically, analysts were forced to query separate databases using processes and tools that were specific to each database, which meant the analysts needed to master each database and format. After receiving the results, analysts would then manually combine the results to find the answers they were seeking. The process, although valuable, could be cumbersome and time consuming, even for thosewith experience and expertise in using the databases. In contrast, the Cloud Analytics Reference Architecture allows analysts to run a single query of all JIEDDO’s data because the data is stored together in the data lake. When looking for patterns and trends, such as what types of IEDs certain groups are using or where the danger spots are located, analysts can tap every available source. Analysts can also ask any type of question regarding information in the data lake; in contrast, the types of questions that analysts can ask using conventional databases are often limited by how the data is formatted. In addition, one of the benefits of security tagging is that it creates hierarchies of access control to identify who can and cannot see the data and the analytical results. This is extremely important for JIEDDO, because it supports the US military and international security assistance forces. Security tagging enables analysts and commanding officers to more readily share information with foreign allies because the metadata protects the data. Previously, without such tagging, valuable information and analyses often defaulted to the highest level of security, thus limiting their usefulness because the information and analyses could not be widely shared. Data tagging and the Cloud Analytics Reference Architecture are enabling JIEDDO to more effectively carry out its mission responsibilities to analyze intelligence, attack terrorist networks, and protect US and coalition forces from IEDs. Conclusion Federal chief information officers and IT managers overwhelmingly cite security as their chief concern when moving to cloud computing. Many fear a loss of control over their data. Data-level security within a data lake addresses their concerns by providing security that is fine-grained and expressive. It is expressive in that organizations can tag their data with a limitless number of security and business rules; and it is fine-grained in that organizations can affix those rules with rigorous, detailed precision to specify approved user identities, devices, physical locations, networks, and applications, applicable privacy and security regulations, and other security parameters to each piece of data. Data tagging also reinforces existing layers of security embedded at the infrastructure, platform, application, and network levels. And the metadata tags embed each piece of data with security throughout its lifecycle, from data generation to data elimination when the hard drive and data are destroyed. Together, the data lake and data-level security represent an entirely new approach that gives both government and business organizations a powerful tool to solve their most complex problems. By re-imagining data security in the cloud, organizations can unlock the full value of cloud analytics to address scientific, social, and economic challenges in ways that were unimaginable a decade ago.
  • 11. 7 Appendix: Cloud Analytics Reference Architecture The Cloud Analytics Reference Architecture, as shown in Exhibit 2, is built on a cloud computing and network infrastructure that ingests all data — structured, unstructured, streaming, batch, etc. — into a common storage pool called a data lake. Storing data in the data lake has many advantages over conventional techniques. It is stored on commodity hardware and can scale rapidly in performance and storage. This gives the data lake the flexibility to expand to accommodate the natural growth of an organization’s data, as well as additional data from multiple outside sources. Thus, unlike conventional approaches, it enables organizations to pursue new analytical approaches with few changes, if any, to the underlying infrastructure. It also precludes the need for building bridges between data silos, because all of the information is already stored together. Perhaps most important, the data lake treats structured and unstructured data equally. There is no “second-class” data based on how easy it is to use. Given that an estimated 80 percent of the data created today is unstructured, organizations must have the ability to use this data. Overall, the data lake makes all of the data easy to access and opens the door to the more efficient and effective use of big data analytical tools. The Cloud Analytics Reference Architecture also allows computers to take over much of the work, freeing people to focus on analysis and insight. As data flows into the data lake, it is automatically tagged and indexed for analytics and services. Unlike in conventional approaches, the data is not pre-summarized or pre-categorized as structured or unstructured or by its different locations (given that all data is stored in the data lake), but rather for indexing, sorting, identification, and security across multiple dimensions. The data lake smoothly accepts all types of data, including unstructured data, through this automated tagging process. When organization are ready to apply analytic tools to the data, pre-analytics filers help sort the data and prepare it for deeper Exhibit 2 | Primary Elements of the Cloud Analytics Reference Architecture Source: Booz Allen Hamilton Streaming Indexes Human Insights and Actions Enabled by customizable interfaces and visualizations of the data Analytics and Services Your tools for analysis, modeling, testing, and simulations Data Management The single, secure repository for all of your valuable data Infrastructure The technology platform for storing  and managing your data Services (SOA) Analytics and Discovery Views and Indexes Data Lake Metadata Tagging Data Sources Infrastructure/ Management Visualization, Reporting, Dash-boards, and Query Interface
  • 12. 8
  • 13. 9 analysis, using the tags to locate and pull out the relevant information from the data lake. Pre-analytical tools are also used in the conventional approach, but they are typically part of a rigid structure that must be reassembled as inquiries change. In contrast, the pre- analytics in the Cloud Analytics Reference Architecture are designed for use with the data lake, and so are both flexible and reusable. The Cloud Analytics Reference Architecture opens up the enormous potential of big data analytics in multiple ways. For example, it removes the constraints created by data silos. Rather than having to move from database to database to pull out specific information, users can access all of the data at once, including data from outside sources, expanding exponentially the spectrum of analysis. This approach also expands the range of questions that can be asked of data through multiple analytic tools and processes, including: • Ad hoc queries. Unlike conventional approaches, where analytics are part of the narrow, custom- built structure, in the Cloud Analytics Reference Architecture, analysts are free to pursue ad hoc queries employing any line of inquiry, including improvised follow-up questions that can yield particularly valuable results. • Machine learning. Analytics can search for patterns examining all of the available data at once without needing to hypothesize in advance what patterns might exist. • Alerting. An analytic alert notifying an organization that something unexpected has occurred — such as an anomaly in a pattern — can signal important changes and trends in cyber threats, enemy activities, health and disease status, consumer behavior, market activity, and other areas. The Cloud Analytics Reference Architecture also supports interfaces and visualization dashboards to contextualize and package the insights, patterns, and other results for decisionmakers. Although the Cloud Analytics Reference Architecture opens a wide aperture to data, it incorporates visualization and interaction tools that present the analyses in clear formats tailored to the specific issues and decisions at hand, enabling insight and confident action by decisionmakers. A number of defense, civilian, and intelligence agencies are already using the Cloud Analytics Reference Architecture to generate valuable insights and achieve mission goals previously unattainable in conventional cloud environments. For example, the US military is using the Cloud Analytics Reference Architecture to search for patterns in war zone intelligence data, mapping out convoy routes least likely to encounter IEDs. The Centers for Medicare and Medicaid Services (CMS) are using this approach to combat fraud by analyzing mountains of data, which enables CMS to assess doctors and others who bill Medicare on their risk to commit fraud. And intelligence agencies are using this new cloud architecture to apply aggressive indexing techniques and on-demand analytics across the agencies’ massive and increasing volume of both structured and unstructured data. Booz Allen itself is also adopting the Cloud Analytics Reference Architecture to maximize its cloud analytics capabilities, both for the firm and its clients. Many organizations today have an urgent need to make sense of data from diverse sources, including those that have previously been inaccessible or extremely difficult to use, such as streams of unstructured data from social networks or remote sensors. The Cloud Analytics Reference Architecture enables analysts and decisionmakers to see new connections within all of this data to uncover previously hidden trends and relationships. Organizations can extract real business and mission value from their data to address pressing challenges and requirements, while improving operational effectiveness and overall performance.
  • 14. 10
  • 15. 11 About Booz Allen Hamilton ContactsBooz Allen Hamilton has been at the forefront of strategy and technology consulting for nearly a century. Today, Booz Allen Hamilton is a leading provider of management and technology consulting services to the US and international governments in defense, intelligence, and civil sectors, and to major corporations, institutions, and not-for-profit organizations. In the commercial sector, the firm focuses on leveraging its existing expertise for clients in the financial services, healthcare, and energy markets, and to international clients in the Middle East. Booz Allen Hamilton offers clients deep functional knowledge spanning strategy and organization, engineering and operations, technology, and analytics—which it combines with specialized expertise in clients’ mission and domain areas to help solve their toughest problems. The firm’s management consulting heritage is the basis for its unique collaborative culture and operating model, enabling Booz Allen Hamilton to anticipate needs and opportunities, rapidly deploy talent and resources, and deliver enduring results. By combining a consultant’s problem-solving orientation with deep technical knowledge and strong execution, Booz Allen Hamilton helps clients achieve success in their most critical missions—as evidenced by the firm’s many client relationships that span decades. Booz Allen Hamilton helps shape thinking and prepare for future developments in areas of national importance, including cybersecurity, homeland security, healthcare, and information technology. Booz Allen is headquartered in McLean, Virginia, employs approximately 25,000 people, and had revenue of $5.86 billion for the 12 months ended March 31, 2012. For over a decade, Booz Allen’s high standing as a business and an employer has been recognized by dozens of organizations and publications, including Fortune, Working Mother, G.I. Jobs, and DiversityInc. More information is available at www.boozallen.com. (NYSE: BAH) Jason Escaravage Principal escaravage_jason@bah.com 703-902-5635 Peter Guerra Senior Associate guerra_peter@bah.com 301-497-6754
  • 16. The most complete, recent list of offices and their addresses and telephone numbers can be found on www.boozallen.com Principal Offices Huntsville, Alabama Montgomery, Alabama Sierra Vista, Arizona Los Angeles, California San Diego, California San Francisco, California Colorado Springs, Colorado Denver, Colorado District of Columbia Pensacola, Florida Sarasota, Florida Tampa, Florida Atlanta, Georgia Honolulu, Hawaii O’Fallon, Illinois Indianapolis, Indiana Leavenworth, Kansas Radcliff, Kentucky Aberdeen, Maryland Annapolis Junction, Maryland Lexington Park, Maryland Linthicum, Maryland Rockville, Maryland Troy, Michigan Kansas City, Missouri Omaha, Nebraska Red Bank, New Jersey New York, New York Rome, New York Fayetteville, North Carolina Cleveland, Ohio Dayton, Ohio Philadelphia, Pennsylvania Charleston, South Carolina Houston, Texas San Antonio, Texas Abu Dhabi, UAE Alexandria, Virginia Arlington, Virginia Chantilly, Virginia Charlottesville, Virginia Falls Church, Virginia Herndon, Virginia Lorton, Virginia McLean, Virginia Norfolk, Virginia Stafford, Virginia Seattle, Washington www.boozallen.com/cloud ©2013 Booz Allen Hamilton Inc. 12.032.12M