Towards Trusted Data Processing for Information and Intelligence Systems

dc.contributor.authorWang, Yong
dc.contributor.authorMuthusamy Ragothaman, Kaushik Nagarajan
dc.contributor.authorShakya, Bijay
dc.date.accessioned2020-12-24T20:17:59Z
dc.date.available2020-12-24T20:17:59Z
dc.date.issued2021-01-05
dc.description.abstractData is a valued asset and its security is essential for any enterprise and organization. This paper introduces Trusted Data Processing (TDP) and addresses three fundamental questions in TDP: 1) what are the essential requirements to achieve TDP? 2) what security mechanisms and safeguards are available to ensure TDP? 3) how to integrate TDP to practice? Based on the attacks targeting at data assets and their consequences, the requirements to achieve TDP, including data security, data privacy, accountability, transparency, distributed computing, and trusted elements, are identified. Available security mechanisms and safeguards to ensure TDP are discussed. This paper also summarizes the challenges to achieve TDP and provides a practical guidance to achieve TDP through the integration with NIST Cybersecurity Framework.
dc.format.extent10 pages
dc.identifier.doi10.24251/HICSS.2021.753
dc.identifier.isbn978-0-9981331-4-0
dc.identifier.urihttp://hdl.handle.net/10125/71373
dc.language.isoEnglish
dc.relation.ispartofProceedings of the 54th Hawaii International Conference on System Sciences
dc.rightsAttribution-NonCommercial-NoDerivatives 4.0 International
dc.rights.urihttps://creativecommons.org/licenses/by-nc-nd/4.0/
dc.subjectOrganizational Cybersecurity: Advanced Cyber Defense, Cyber Analytics, and Security
dc.subjectchallenges
dc.subjectprivacy
dc.subjectsecurity
dc.subjecttrusted data processing
dc.titleTowards Trusted Data Processing for Information and Intelligence Systems
prism.startingpage6242

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
0610.pdf
Size:
2.29 MB
Format:
Adobe Portable Document Format