SlideShare ist ein Scribd-Unternehmen logo
1 von 2
IDC Research Paper Looks at Ensuring and Proving Big Data is Tamper-Free

"Data Integrity in the Big Data Digital Age" gives data its proof in court.

San Francisco, CA (USA), Wednesday - April 18th, 2012 -- A new executive brief published by
IDC examines one of the major obstacles organizations face when committing resources and
applications to cloud computing. At stake is the issue of validating the integrity and authenticity of
data within a cloud environment.

"When the data is hosted onsite, this process of data integrity can certainly be a challenge.
However, when data is not hosted within the traditional internal IT data center environment, there
needs to be a method of ensuring indisputable data integrity," cites the report.

Titled "Data Integrity in the Big Data Digital Age", the research paper ties the current Big Data
phenomenon with cloud computing, making a case for how organizations must grapple with
analyzing and basing decisions on petabytes of unstructured data, yet rarely questioning the
authenticity of this data.

Questions the report seeks to answer include: Has my data been tampered with? Is the data
source legitimate? How can indisputable proof be offered that data integrity remains intact? And
in cases that involve the legal system, how to bring documents, log files, or audio files to the level
where they can be admitted as irrefutable evidence?

These questions take the data integrity argument well beyond the premise and perimeter of IT
security matters. Few options exist today that can achieve tamper-proof data security outside of
the reliance on third-party certification authorities, or the unwieldy management of a public key
infrastructure. What’s required is a way to validate, verify, and self-authenticate the data
independently of any third-party agency.

Sponsored by GuardTime ( http://www.guardtime.com ), the executive brief details a compelling
case for the adoption of Keyless Signatures, explaining how the mathematically-driven system
works. The Keyless Signature technology is used to provide indisputable proof of time, origin, and
integrity for electronic data.

"The goal of the keyless signature technology is to provide mass-scale, non-expiring data
validation while eliminating the need for secrets or other forms of trust, thereby reducing or even
eliminating the need for more complex certificate-based solutions, as these are ripe with
certificate management issues, including expiration and revocation," the paper explains.

"A keyless signature provides an alternative method to key-based technologies by providing proof
and non-repudiation of electronic data using only hash functions for verification. The
implementation of keyless signature is done via a globally distributed machine, taking hash
values of data as inputs and returning keyless signatures that prove the time, integrity, and origin
(machine, organization, individual) of the input data."

"Any client using the keyless signature service can make a request to sign any data item it has
access to; a log file, XML file, office document, database record, SWIFT transaction, FPML
message, eDiscovery productions, etc. In return, the client will receive a keyless signature which
can be stored along side the signed data, within the signed data, or in a repository separate from
the signed data for backup and archival purposes."

By signing the data using GuardTime’s Keyless Signatures ( http://www.guardtime.com ), an
organization can automatically detect when and where the data was created or transferred, and if
the data has been tampered with or not. An alert is sent to the customer when an abnormal status
is detected.
In this manner, organizations can assure the integrity of data and confirm the location where data
exists, providing a full audit trail of data usage and storage in the Cloud.

The report concludes with "The keyless nature of this technology helps reduce the footprint by
removing the need for cipher keys and passwords, which arguably can also be lost or mislaid,
and since the integrity can be validated by the document owners, the ability to leverage the cloud
computing platform places it well for future adoption."

The full report can be found here: http://www.guardtime.com/whitepapers

About GuardTime:
GuardTime was founded with the goal of solving one of the biggest problems in computing: how
to be sure electronic data is authentic. GuardTime's Keyless Signatures provide proof of origin
and that not a single bit of the data has changed since a specific point in time. The verification of
the signatures can be done offline without reliance on keys, secrets, or the existence of a trusted
third party. GuardTime's mission is to change the world to one in which Keyless Signatures are
ubiquitous and a natural part of the everyday data lifecycle, whether on disk, in transit, or in the
Cloud. The company was recently selected as co-winner of the Innotribe $100K Start-Up
Challenge, honoring the company as one of the world's most promising financial technology start-
ups. Visit http://www.guardtime.com for more information about using Keyless Signatures for
signing your data.

Press & Media Contact:
Victor Cruz, Principal
MediaPR.net Inc
San Francisco, CA - USA
+1 978-594-4134
vcruz@mediapr.net
http://www.guardtime.com

Weitere ähnliche Inhalte

Was ist angesagt?

A.Schumacher (2017) Blockchain & Healthcare: A Strategy Guide
A.Schumacher (2017) Blockchain & Healthcare:  A Strategy GuideA.Schumacher (2017) Blockchain & Healthcare:  A Strategy Guide
A.Schumacher (2017) Blockchain & Healthcare: A Strategy GuideGalen Growth
 
Healthcare Blockchain Summit, Washington DC Mar 21, 2017
Healthcare Blockchain Summit, Washington DC Mar 21, 2017Healthcare Blockchain Summit, Washington DC Mar 21, 2017
Healthcare Blockchain Summit, Washington DC Mar 21, 2017Edward Bukstel
 
Permissioned v. Permissionless Blockchain 10XTS
Permissioned v. Permissionless Blockchain 10XTSPermissioned v. Permissionless Blockchain 10XTS
Permissioned v. Permissionless Blockchain 10XTSJohn Bentley, II
 
Blockchain + Healthcare Innovation
Blockchain + Healthcare Innovation Blockchain + Healthcare Innovation
Blockchain + Healthcare Innovation Jeff Brandt
 
Top 10 companies using blockchain for healthcare security
Top 10 companies using blockchain for healthcare securityTop 10 companies using blockchain for healthcare security
Top 10 companies using blockchain for healthcare securityBlockchain Council
 
Blockchain in Health Care
Blockchain in Health CareBlockchain in Health Care
Blockchain in Health CarePolsinelli PC
 
Blockchain in Insurance 101
Blockchain in Insurance 101Blockchain in Insurance 101
Blockchain in Insurance 101Peter Ing
 
CB insights: How Blockchain Technology Could Disrupt Healthcare
CB insights: How Blockchain Technology Could Disrupt HealthcareCB insights: How Blockchain Technology Could Disrupt Healthcare
CB insights: How Blockchain Technology Could Disrupt HealthcareLevi Shapiro
 
AWIP Pink Innov Blockchain Workshop deck - May 23, 2019
AWIP Pink Innov Blockchain Workshop deck - May 23, 2019AWIP Pink Innov Blockchain Workshop deck - May 23, 2019
AWIP Pink Innov Blockchain Workshop deck - May 23, 2019Samantha Reynolds
 
Blockchain & Pharma
Blockchain & PharmaBlockchain & Pharma
Blockchain & PharmaCraig Ford
 
Blockchain, Predictive Analytics and Healthcare
Blockchain, Predictive Analytics and HealthcareBlockchain, Predictive Analytics and Healthcare
Blockchain, Predictive Analytics and HealthcareRuchi Dass
 
Pistoia Alliance Blockchain Webinar 20 June 2017
Pistoia Alliance Blockchain Webinar 20 June 2017Pistoia Alliance Blockchain Webinar 20 June 2017
Pistoia Alliance Blockchain Webinar 20 June 2017Pistoia Alliance
 
Blockchain- Why, How and Where to use?
Blockchain- Why, How and Where to use?Blockchain- Why, How and Where to use?
Blockchain- Why, How and Where to use?Asghar Khan
 
Blockchain: A Catalyst for the Next Wave of Progress in the Life Sciences Ind...
Blockchain: A Catalyst for the Next Wave of Progress in the Life Sciences Ind...Blockchain: A Catalyst for the Next Wave of Progress in the Life Sciences Ind...
Blockchain: A Catalyst for the Next Wave of Progress in the Life Sciences Ind...Cognizant
 
Is there a Blockchain Future for Healthcare?
Is there a Blockchain Future for Healthcare?Is there a Blockchain Future for Healthcare?
Is there a Blockchain Future for Healthcare?Jody Ranck
 
Implementing Blockchain applications in healthcare
Implementing Blockchain applications in healthcareImplementing Blockchain applications in healthcare
Implementing Blockchain applications in healthcarePistoia Alliance
 
Workshop handout for blockchain workshop
Workshop handout for blockchain workshopWorkshop handout for blockchain workshop
Workshop handout for blockchain workshopSamantha Reynolds
 

Was ist angesagt? (19)

Blockchain in life sciences
Blockchain in life sciencesBlockchain in life sciences
Blockchain in life sciences
 
A.Schumacher (2017) Blockchain & Healthcare: A Strategy Guide
A.Schumacher (2017) Blockchain & Healthcare:  A Strategy GuideA.Schumacher (2017) Blockchain & Healthcare:  A Strategy Guide
A.Schumacher (2017) Blockchain & Healthcare: A Strategy Guide
 
Block chain
Block chainBlock chain
Block chain
 
Healthcare Blockchain Summit, Washington DC Mar 21, 2017
Healthcare Blockchain Summit, Washington DC Mar 21, 2017Healthcare Blockchain Summit, Washington DC Mar 21, 2017
Healthcare Blockchain Summit, Washington DC Mar 21, 2017
 
Permissioned v. Permissionless Blockchain 10XTS
Permissioned v. Permissionless Blockchain 10XTSPermissioned v. Permissionless Blockchain 10XTS
Permissioned v. Permissionless Blockchain 10XTS
 
Blockchain + Healthcare Innovation
Blockchain + Healthcare Innovation Blockchain + Healthcare Innovation
Blockchain + Healthcare Innovation
 
Top 10 companies using blockchain for healthcare security
Top 10 companies using blockchain for healthcare securityTop 10 companies using blockchain for healthcare security
Top 10 companies using blockchain for healthcare security
 
Blockchain in Health Care
Blockchain in Health CareBlockchain in Health Care
Blockchain in Health Care
 
Blockchain in Insurance 101
Blockchain in Insurance 101Blockchain in Insurance 101
Blockchain in Insurance 101
 
CB insights: How Blockchain Technology Could Disrupt Healthcare
CB insights: How Blockchain Technology Could Disrupt HealthcareCB insights: How Blockchain Technology Could Disrupt Healthcare
CB insights: How Blockchain Technology Could Disrupt Healthcare
 
AWIP Pink Innov Blockchain Workshop deck - May 23, 2019
AWIP Pink Innov Blockchain Workshop deck - May 23, 2019AWIP Pink Innov Blockchain Workshop deck - May 23, 2019
AWIP Pink Innov Blockchain Workshop deck - May 23, 2019
 
Blockchain & Pharma
Blockchain & PharmaBlockchain & Pharma
Blockchain & Pharma
 
Blockchain, Predictive Analytics and Healthcare
Blockchain, Predictive Analytics and HealthcareBlockchain, Predictive Analytics and Healthcare
Blockchain, Predictive Analytics and Healthcare
 
Pistoia Alliance Blockchain Webinar 20 June 2017
Pistoia Alliance Blockchain Webinar 20 June 2017Pistoia Alliance Blockchain Webinar 20 June 2017
Pistoia Alliance Blockchain Webinar 20 June 2017
 
Blockchain- Why, How and Where to use?
Blockchain- Why, How and Where to use?Blockchain- Why, How and Where to use?
Blockchain- Why, How and Where to use?
 
Blockchain: A Catalyst for the Next Wave of Progress in the Life Sciences Ind...
Blockchain: A Catalyst for the Next Wave of Progress in the Life Sciences Ind...Blockchain: A Catalyst for the Next Wave of Progress in the Life Sciences Ind...
Blockchain: A Catalyst for the Next Wave of Progress in the Life Sciences Ind...
 
Is there a Blockchain Future for Healthcare?
Is there a Blockchain Future for Healthcare?Is there a Blockchain Future for Healthcare?
Is there a Blockchain Future for Healthcare?
 
Implementing Blockchain applications in healthcare
Implementing Blockchain applications in healthcareImplementing Blockchain applications in healthcare
Implementing Blockchain applications in healthcare
 
Workshop handout for blockchain workshop
Workshop handout for blockchain workshopWorkshop handout for blockchain workshop
Workshop handout for blockchain workshop
 

Andere mochten auch

Google Doodles 2002
Google Doodles 2002Google Doodles 2002
Google Doodles 2002ecsette
 
Turkey needs less money in politics and less politics in court
Turkey needs less money in politics and less politics in courtTurkey needs less money in politics and less politics in court
Turkey needs less money in politics and less politics in courtFTI Consulting FR
 
Blenderbookv01
Blenderbookv01Blenderbookv01
Blenderbookv01whiedhie
 
Puntos de monitoreo de aire y ruido
Puntos de monitoreo de aire y ruidoPuntos de monitoreo de aire y ruido
Puntos de monitoreo de aire y ruidobrica07
 
Bei Tongkat Ali handelt es sich um ein Bittereschengewächs. Neben dieser volk...
Bei Tongkat Ali handelt es sich um ein Bittereschengewächs. Neben dieser volk...Bei Tongkat Ali handelt es sich um ein Bittereschengewächs. Neben dieser volk...
Bei Tongkat Ali handelt es sich um ein Bittereschengewächs. Neben dieser volk...dryersheet99
 
Play Nicely - Exciting Opportunity for 2014
Play Nicely - Exciting Opportunity for 2014Play Nicely - Exciting Opportunity for 2014
Play Nicely - Exciting Opportunity for 2014AffordableMedia
 
Vmware mquinas-virtuales-19365
Vmware mquinas-virtuales-19365Vmware mquinas-virtuales-19365
Vmware mquinas-virtuales-19365camila1727
 

Andere mochten auch (13)

Google Doodles 2002
Google Doodles 2002Google Doodles 2002
Google Doodles 2002
 
Faltam apenas 03 dias
Faltam apenas 03 diasFaltam apenas 03 dias
Faltam apenas 03 dias
 
mercator résumé chapitre 19
mercator résumé chapitre 19mercator résumé chapitre 19
mercator résumé chapitre 19
 
PowerPoint Prueba
PowerPoint PruebaPowerPoint Prueba
PowerPoint Prueba
 
Campaña de Iglesia en Singapur
Campaña de Iglesia en SingapurCampaña de Iglesia en Singapur
Campaña de Iglesia en Singapur
 
Turkey needs less money in politics and less politics in court
Turkey needs less money in politics and less politics in courtTurkey needs less money in politics and less politics in court
Turkey needs less money in politics and less politics in court
 
Blenderbookv01
Blenderbookv01Blenderbookv01
Blenderbookv01
 
sugarsync
sugarsyncsugarsync
sugarsync
 
Puntos de monitoreo de aire y ruido
Puntos de monitoreo de aire y ruidoPuntos de monitoreo de aire y ruido
Puntos de monitoreo de aire y ruido
 
Bei Tongkat Ali handelt es sich um ein Bittereschengewächs. Neben dieser volk...
Bei Tongkat Ali handelt es sich um ein Bittereschengewächs. Neben dieser volk...Bei Tongkat Ali handelt es sich um ein Bittereschengewächs. Neben dieser volk...
Bei Tongkat Ali handelt es sich um ein Bittereschengewächs. Neben dieser volk...
 
Play Nicely - Exciting Opportunity for 2014
Play Nicely - Exciting Opportunity for 2014Play Nicely - Exciting Opportunity for 2014
Play Nicely - Exciting Opportunity for 2014
 
Vmware mquinas-virtuales-19365
Vmware mquinas-virtuales-19365Vmware mquinas-virtuales-19365
Vmware mquinas-virtuales-19365
 
Das hotel Singgasana, Makassar
Das hotel Singgasana, MakassarDas hotel Singgasana, Makassar
Das hotel Singgasana, Makassar
 

Ähnlich wie IDC Research Paper Looks at Ensuring and Proving Big Data is Tamper-Free

COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITYCOST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITYShakas Technologies
 
Arkibiz Partners with GuardTime to Provide Auditable E-Documents and Records ...
Arkibiz Partners with GuardTime to Provide Auditable E-Documents and Records ...Arkibiz Partners with GuardTime to Provide Auditable E-Documents and Records ...
Arkibiz Partners with GuardTime to Provide Auditable E-Documents and Records ...flashnewsrelease
 
Cost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward securityCost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward securityPvrtechnologies Nellore
 
An Efficient implementation of PKI architecture based Digital Signature using...
An Efficient implementation of PKI architecture based Digital Signature using...An Efficient implementation of PKI architecture based Digital Signature using...
An Efficient implementation of PKI architecture based Digital Signature using...IOSR Journals
 
Data provenance - world in 2030
Data provenance -  world in 2030Data provenance -  world in 2030
Data provenance - world in 2030Future Agenda
 
Research Paper Digital Forensics on Google Cloud Platform
Research Paper Digital Forensics on Google Cloud PlatformResearch Paper Digital Forensics on Google Cloud Platform
Research Paper Digital Forensics on Google Cloud PlatformSamuel Borthwick
 
Digital certificate management v1 (Draft)
Digital certificate management v1 (Draft)Digital certificate management v1 (Draft)
Digital certificate management v1 (Draft)Avirot Mitamura
 
Why eSignatures are Imperative for Data Security.pdf
Why eSignatures are Imperative for Data Security.pdfWhy eSignatures are Imperative for Data Security.pdf
Why eSignatures are Imperative for Data Security.pdfDrysign By Exela
 
itapro201606-New Tech In Town
itapro201606-New Tech In Townitapro201606-New Tech In Town
itapro201606-New Tech In TownKaenan Hertz
 
Blockchain in Identity Management - An Overview.pdf
Blockchain in Identity Management - An Overview.pdfBlockchain in Identity Management - An Overview.pdf
Blockchain in Identity Management - An Overview.pdfJamieDornan2
 
Insecure magazine - 51
Insecure magazine - 51Insecure magazine - 51
Insecure magazine - 51Felipe Prado
 
Information Leakage Prevention Using Public Key Encryption System and Fingerp...
Information Leakage Prevention Using Public Key Encryption System and Fingerp...Information Leakage Prevention Using Public Key Encryption System and Fingerp...
Information Leakage Prevention Using Public Key Encryption System and Fingerp...CSCJournals
 
NoHidingInTheCloud
NoHidingInTheCloudNoHidingInTheCloud
NoHidingInTheCloudJoan Ross
 
AnevaluationofsecurestorageofauthenticationdataIJISR.pdf
AnevaluationofsecurestorageofauthenticationdataIJISR.pdfAnevaluationofsecurestorageofauthenticationdataIJISR.pdf
AnevaluationofsecurestorageofauthenticationdataIJISR.pdftonkung6
 
En ebook-digital-signature-for-the-remote-workplace
En ebook-digital-signature-for-the-remote-workplaceEn ebook-digital-signature-for-the-remote-workplace
En ebook-digital-signature-for-the-remote-workplaceNiranjanaDhumal
 
Benefits of Blockchain for Identity and Access Management - By Azgari Lipshy
Benefits of Blockchain for Identity and Access Management - By Azgari Lipshy Benefits of Blockchain for Identity and Access Management - By Azgari Lipshy
Benefits of Blockchain for Identity and Access Management - By Azgari Lipshy Azgari Lipshy
 

Ähnlich wie IDC Research Paper Looks at Ensuring and Proving Big Data is Tamper-Free (20)

COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITYCOST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
 
Arkibiz Partners with GuardTime to Provide Auditable E-Documents and Records ...
Arkibiz Partners with GuardTime to Provide Auditable E-Documents and Records ...Arkibiz Partners with GuardTime to Provide Auditable E-Documents and Records ...
Arkibiz Partners with GuardTime to Provide Auditable E-Documents and Records ...
 
Cost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward securityCost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward security
 
An Efficient implementation of PKI architecture based Digital Signature using...
An Efficient implementation of PKI architecture based Digital Signature using...An Efficient implementation of PKI architecture based Digital Signature using...
An Efficient implementation of PKI architecture based Digital Signature using...
 
Data provenance - world in 2030
Data provenance -  world in 2030Data provenance -  world in 2030
Data provenance - world in 2030
 
Research Paper Digital Forensics on Google Cloud Platform
Research Paper Digital Forensics on Google Cloud PlatformResearch Paper Digital Forensics on Google Cloud Platform
Research Paper Digital Forensics on Google Cloud Platform
 
Digital certificate management v1 (Draft)
Digital certificate management v1 (Draft)Digital certificate management v1 (Draft)
Digital certificate management v1 (Draft)
 
Automating trust with new technologies
Automating trust with new technologiesAutomating trust with new technologies
Automating trust with new technologies
 
Sqrrl
SqrrlSqrrl
Sqrrl
 
Why eSignatures are Imperative for Data Security.pdf
Why eSignatures are Imperative for Data Security.pdfWhy eSignatures are Imperative for Data Security.pdf
Why eSignatures are Imperative for Data Security.pdf
 
itapro201606-New Tech In Town
itapro201606-New Tech In Townitapro201606-New Tech In Town
itapro201606-New Tech In Town
 
Blockchain in Identity Management - An Overview.pdf
Blockchain in Identity Management - An Overview.pdfBlockchain in Identity Management - An Overview.pdf
Blockchain in Identity Management - An Overview.pdf
 
Insecure magazine - 51
Insecure magazine - 51Insecure magazine - 51
Insecure magazine - 51
 
Information Leakage Prevention Using Public Key Encryption System and Fingerp...
Information Leakage Prevention Using Public Key Encryption System and Fingerp...Information Leakage Prevention Using Public Key Encryption System and Fingerp...
Information Leakage Prevention Using Public Key Encryption System and Fingerp...
 
NoHidingInTheCloud
NoHidingInTheCloudNoHidingInTheCloud
NoHidingInTheCloud
 
AnevaluationofsecurestorageofauthenticationdataIJISR.pdf
AnevaluationofsecurestorageofauthenticationdataIJISR.pdfAnevaluationofsecurestorageofauthenticationdataIJISR.pdf
AnevaluationofsecurestorageofauthenticationdataIJISR.pdf
 
En ebook-digital-signature-for-the-remote-workplace
En ebook-digital-signature-for-the-remote-workplaceEn ebook-digital-signature-for-the-remote-workplace
En ebook-digital-signature-for-the-remote-workplace
 
Digital Signatures
Digital SignaturesDigital Signatures
Digital Signatures
 
Digital Signatures
Digital SignaturesDigital Signatures
Digital Signatures
 
Benefits of Blockchain for Identity and Access Management - By Azgari Lipshy
Benefits of Blockchain for Identity and Access Management - By Azgari Lipshy Benefits of Blockchain for Identity and Access Management - By Azgari Lipshy
Benefits of Blockchain for Identity and Access Management - By Azgari Lipshy
 

Kürzlich hochgeladen

"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 

Kürzlich hochgeladen (20)

"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 

IDC Research Paper Looks at Ensuring and Proving Big Data is Tamper-Free

  • 1. IDC Research Paper Looks at Ensuring and Proving Big Data is Tamper-Free "Data Integrity in the Big Data Digital Age" gives data its proof in court. San Francisco, CA (USA), Wednesday - April 18th, 2012 -- A new executive brief published by IDC examines one of the major obstacles organizations face when committing resources and applications to cloud computing. At stake is the issue of validating the integrity and authenticity of data within a cloud environment. "When the data is hosted onsite, this process of data integrity can certainly be a challenge. However, when data is not hosted within the traditional internal IT data center environment, there needs to be a method of ensuring indisputable data integrity," cites the report. Titled "Data Integrity in the Big Data Digital Age", the research paper ties the current Big Data phenomenon with cloud computing, making a case for how organizations must grapple with analyzing and basing decisions on petabytes of unstructured data, yet rarely questioning the authenticity of this data. Questions the report seeks to answer include: Has my data been tampered with? Is the data source legitimate? How can indisputable proof be offered that data integrity remains intact? And in cases that involve the legal system, how to bring documents, log files, or audio files to the level where they can be admitted as irrefutable evidence? These questions take the data integrity argument well beyond the premise and perimeter of IT security matters. Few options exist today that can achieve tamper-proof data security outside of the reliance on third-party certification authorities, or the unwieldy management of a public key infrastructure. What’s required is a way to validate, verify, and self-authenticate the data independently of any third-party agency. Sponsored by GuardTime ( http://www.guardtime.com ), the executive brief details a compelling case for the adoption of Keyless Signatures, explaining how the mathematically-driven system works. The Keyless Signature technology is used to provide indisputable proof of time, origin, and integrity for electronic data. "The goal of the keyless signature technology is to provide mass-scale, non-expiring data validation while eliminating the need for secrets or other forms of trust, thereby reducing or even eliminating the need for more complex certificate-based solutions, as these are ripe with certificate management issues, including expiration and revocation," the paper explains. "A keyless signature provides an alternative method to key-based technologies by providing proof and non-repudiation of electronic data using only hash functions for verification. The implementation of keyless signature is done via a globally distributed machine, taking hash values of data as inputs and returning keyless signatures that prove the time, integrity, and origin (machine, organization, individual) of the input data." "Any client using the keyless signature service can make a request to sign any data item it has access to; a log file, XML file, office document, database record, SWIFT transaction, FPML message, eDiscovery productions, etc. In return, the client will receive a keyless signature which can be stored along side the signed data, within the signed data, or in a repository separate from the signed data for backup and archival purposes." By signing the data using GuardTime’s Keyless Signatures ( http://www.guardtime.com ), an organization can automatically detect when and where the data was created or transferred, and if the data has been tampered with or not. An alert is sent to the customer when an abnormal status is detected.
  • 2. In this manner, organizations can assure the integrity of data and confirm the location where data exists, providing a full audit trail of data usage and storage in the Cloud. The report concludes with "The keyless nature of this technology helps reduce the footprint by removing the need for cipher keys and passwords, which arguably can also be lost or mislaid, and since the integrity can be validated by the document owners, the ability to leverage the cloud computing platform places it well for future adoption." The full report can be found here: http://www.guardtime.com/whitepapers About GuardTime: GuardTime was founded with the goal of solving one of the biggest problems in computing: how to be sure electronic data is authentic. GuardTime's Keyless Signatures provide proof of origin and that not a single bit of the data has changed since a specific point in time. The verification of the signatures can be done offline without reliance on keys, secrets, or the existence of a trusted third party. GuardTime's mission is to change the world to one in which Keyless Signatures are ubiquitous and a natural part of the everyday data lifecycle, whether on disk, in transit, or in the Cloud. The company was recently selected as co-winner of the Innotribe $100K Start-Up Challenge, honoring the company as one of the world's most promising financial technology start- ups. Visit http://www.guardtime.com for more information about using Keyless Signatures for signing your data. Press & Media Contact: Victor Cruz, Principal MediaPR.net Inc San Francisco, CA - USA +1 978-594-4134 vcruz@mediapr.net http://www.guardtime.com