Microsoft warns that big data faces privacy and security challenges
Source: Internet
Author: User
KeywordsMicrosoft security big data face warning
In the 2012 RSA Conference keynote address, Microsoft Senior security executives explored the past and future of trusted computing, the risk of large data in the cloud, and the idea that the cloud would better protect data in the future.
Scott Charney, vice president of Microsoft's Trusted computing division, took the opportunity of the RSA Conference to say that since the famous http://www.aliyun.com/zixun/aggregation/9598.html "> Bill Gates proposed that Microsoft's systematic work will be safely integrated into all of its products and processes up to now, it has been 10 years.
He praised the success of trusted computing in reducing Microsoft software vulnerabilities, reducing the number of exploitable vulnerabilities, and creating the End-to-end Trust mechanism on the network. But he also pointed out that since software vulnerabilities could not be completely eliminated, it was necessary to continue to trust computing projects.
To this end, he introduced new security technologies in previous versions of Windows-including neat (necessary, explainable, actionable and testable, necessary, interpretive, operable, and verifiable) threat communication concepts and windows Disk encryption in 7, and the introduction of emerging technologies in the upcoming Windows 8 operating system, including support for hardening UEFI BIOS standards, a trusted boot mechanism for early loading of anti-malware in the process, and dynamic access control.
However, most of the time Charney is focused on the way many large data flows to the cloud in a variety of ways. He specifically mentions geo-positioning data and how critical it is to leverage innovative and beneficial Internet services through mobile devices.
He cited a project example in which Microsoft uses cloud-based analysis to help medical institutions determine trends to determine why some patients return to treatment within 30 days, and the final analysis shows that a virus affects all patients living in a particular ward. Applying this computing power to large data in a cloud environment, Charney says, can be seen as an example of trends, otherwise those trends will be overlooked.
But, Charney says, we may face big data privacy problems because we are tracking personal positions almost all the time. Perhaps the most interesting question is whether the government has access to anyone's data if the data is in the cloud.
Charney says the legal precedent that has been enacted-the individual's Fourth Amendment right does not apply in some cases, such as the willingness of a person to provide information to a third party. But the recent Supreme Court ruling on the United States and Jones (U.S) shows that it is illegal to use GPS equipment to track someone's whereabouts without authorization. The recommendation needs to reconsider this conclusion, especially as more and more people put their own data into the cloud.
Charney advocates the creation of a system in which cloud data is associated with metadata representing data attributes, determining how data should be handled, how it is used, and ultimately destroyed. He believes that the advantage of the system is that cloud data can be tagged with metadata, which instructs cloud providers to destroy data on a specific date, allowing more control over customers who choose to use cloud services.
But the participants questioned the question of whether the concept of Charney could be achieved. DigitalGlobe's Jeremy Ehiert doubts about how such a pattern would be enforced, and whether it is uncertain to force service providers to treat data as the data provider expects, let alone modify metadata.
"Most of the data does not have metadata on the level details associated with it, and the data in the cloud environment will exponentially to a number of levels, which makes it even more difficult to build a system like this," said Adam Hovak, an attendee at ITT Exelis Company.
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.