SlideShare une entreprise Scribd logo
1  sur  2
IDC Research Paper Looks at Ensuring and Proving Big Data is Tamper-Free

"Data Integrity in the Big Data Digital Age" gives data its proof in court.

San Francisco, CA (USA), Wednesday - April 18th, 2012 -- A new executive brief published by
IDC examines one of the major obstacles organizations face when committing resources and
applications to cloud computing. At stake is the issue of validating the integrity and authenticity of
data within a cloud environment.

"When the data is hosted onsite, this process of data integrity can certainly be a challenge.
However, when data is not hosted within the traditional internal IT data center environment, there
needs to be a method of ensuring indisputable data integrity," cites the report.

Titled "Data Integrity in the Big Data Digital Age", the research paper ties the current Big Data
phenomenon with cloud computing, making a case for how organizations must grapple with
analyzing and basing decisions on petabytes of unstructured data, yet rarely questioning the
authenticity of this data.

Questions the report seeks to answer include: Has my data been tampered with? Is the data
source legitimate? How can indisputable proof be offered that data integrity remains intact? And
in cases that involve the legal system, how to bring documents, log files, or audio files to the level
where they can be admitted as irrefutable evidence?

These questions take the data integrity argument well beyond the premise and perimeter of IT
security matters. Few options exist today that can achieve tamper-proof data security outside of
the reliance on third-party certification authorities, or the unwieldy management of a public key
infrastructure. What’s required is a way to validate, verify, and self-authenticate the data
independently of any third-party agency.

Sponsored by GuardTime ( http://www.guardtime.com ), the executive brief details a compelling
case for the adoption of Keyless Signatures, explaining how the mathematically-driven system
works. The Keyless Signature technology is used to provide indisputable proof of time, origin, and
integrity for electronic data.

"The goal of the keyless signature technology is to provide mass-scale, non-expiring data
validation while eliminating the need for secrets or other forms of trust, thereby reducing or even
eliminating the need for more complex certificate-based solutions, as these are ripe with
certificate management issues, including expiration and revocation," the paper explains.

"A keyless signature provides an alternative method to key-based technologies by providing proof
and non-repudiation of electronic data using only hash functions for verification. The
implementation of keyless signature is done via a globally distributed machine, taking hash
values of data as inputs and returning keyless signatures that prove the time, integrity, and origin
(machine, organization, individual) of the input data."

"Any client using the keyless signature service can make a request to sign any data item it has
access to; a log file, XML file, office document, database record, SWIFT transaction, FPML
message, eDiscovery productions, etc. In return, the client will receive a keyless signature which
can be stored along side the signed data, within the signed data, or in a repository separate from
the signed data for backup and archival purposes."

By signing the data using GuardTime’s Keyless Signatures ( http://www.guardtime.com ), an
organization can automatically detect when and where the data was created or transferred, and if
the data has been tampered with or not. An alert is sent to the customer when an abnormal status
is detected.
In this manner, organizations can assure the integrity of data and confirm the location where data
exists, providing a full audit trail of data usage and storage in the Cloud.

The report concludes with "The keyless nature of this technology helps reduce the footprint by
removing the need for cipher keys and passwords, which arguably can also be lost or mislaid,
and since the integrity can be validated by the document owners, the ability to leverage the cloud
computing platform places it well for future adoption."

The full report can be found here: http://www.guardtime.com/whitepapers

About GuardTime:
GuardTime was founded with the goal of solving one of the biggest problems in computing: how
to be sure electronic data is authentic. GuardTime's Keyless Signatures provide proof of origin
and that not a single bit of the data has changed since a specific point in time. The verification of
the signatures can be done offline without reliance on keys, secrets, or the existence of a trusted
third party. GuardTime's mission is to change the world to one in which Keyless Signatures are
ubiquitous and a natural part of the everyday data lifecycle, whether on disk, in transit, or in the
Cloud. The company was recently selected as co-winner of the Innotribe $100K Start-Up
Challenge, honoring the company as one of the world's most promising financial technology start-
ups. Visit http://www.guardtime.com for more information about using Keyless Signatures for
signing your data.

Press & Media Contact:
Victor Cruz, Principal
MediaPR.net Inc
San Francisco, CA - USA
+1 978-594-4134
vcruz@mediapr.net
http://www.guardtime.com

Contenu connexe

Tendances

A.Schumacher (2017) Blockchain & Healthcare: A Strategy Guide
A.Schumacher (2017) Blockchain & Healthcare:  A Strategy GuideA.Schumacher (2017) Blockchain & Healthcare:  A Strategy Guide
A.Schumacher (2017) Blockchain & Healthcare: A Strategy GuideGalen Growth
 
Healthcare Blockchain Summit, Washington DC Mar 21, 2017
Healthcare Blockchain Summit, Washington DC Mar 21, 2017Healthcare Blockchain Summit, Washington DC Mar 21, 2017
Healthcare Blockchain Summit, Washington DC Mar 21, 2017Edward Bukstel
 
Permissioned v. Permissionless Blockchain 10XTS
Permissioned v. Permissionless Blockchain 10XTSPermissioned v. Permissionless Blockchain 10XTS
Permissioned v. Permissionless Blockchain 10XTSJohn Bentley, II
 
Blockchain + Healthcare Innovation
Blockchain + Healthcare Innovation Blockchain + Healthcare Innovation
Blockchain + Healthcare Innovation Jeff Brandt
 
Top 10 companies using blockchain for healthcare security
Top 10 companies using blockchain for healthcare securityTop 10 companies using blockchain for healthcare security
Top 10 companies using blockchain for healthcare securityBlockchain Council
 
Blockchain in Health Care
Blockchain in Health CareBlockchain in Health Care
Blockchain in Health CarePolsinelli PC
 
Blockchain in Insurance 101
Blockchain in Insurance 101Blockchain in Insurance 101
Blockchain in Insurance 101Peter Ing
 
CB insights: How Blockchain Technology Could Disrupt Healthcare
CB insights: How Blockchain Technology Could Disrupt HealthcareCB insights: How Blockchain Technology Could Disrupt Healthcare
CB insights: How Blockchain Technology Could Disrupt HealthcareLevi Shapiro
 
AWIP Pink Innov Blockchain Workshop deck - May 23, 2019
AWIP Pink Innov Blockchain Workshop deck - May 23, 2019AWIP Pink Innov Blockchain Workshop deck - May 23, 2019
AWIP Pink Innov Blockchain Workshop deck - May 23, 2019Samantha Reynolds
 
Blockchain & Pharma
Blockchain & PharmaBlockchain & Pharma
Blockchain & PharmaCraig Ford
 
Blockchain, Predictive Analytics and Healthcare
Blockchain, Predictive Analytics and HealthcareBlockchain, Predictive Analytics and Healthcare
Blockchain, Predictive Analytics and HealthcareRuchi Dass
 
Pistoia Alliance Blockchain Webinar 20 June 2017
Pistoia Alliance Blockchain Webinar 20 June 2017Pistoia Alliance Blockchain Webinar 20 June 2017
Pistoia Alliance Blockchain Webinar 20 June 2017Pistoia Alliance
 
Blockchain- Why, How and Where to use?
Blockchain- Why, How and Where to use?Blockchain- Why, How and Where to use?
Blockchain- Why, How and Where to use?Asghar Khan
 
Blockchain: A Catalyst for the Next Wave of Progress in the Life Sciences Ind...
Blockchain: A Catalyst for the Next Wave of Progress in the Life Sciences Ind...Blockchain: A Catalyst for the Next Wave of Progress in the Life Sciences Ind...
Blockchain: A Catalyst for the Next Wave of Progress in the Life Sciences Ind...Cognizant
 
Is there a Blockchain Future for Healthcare?
Is there a Blockchain Future for Healthcare?Is there a Blockchain Future for Healthcare?
Is there a Blockchain Future for Healthcare?Jody Ranck
 
Implementing Blockchain applications in healthcare
Implementing Blockchain applications in healthcareImplementing Blockchain applications in healthcare
Implementing Blockchain applications in healthcarePistoia Alliance
 
Workshop handout for blockchain workshop
Workshop handout for blockchain workshopWorkshop handout for blockchain workshop
Workshop handout for blockchain workshopSamantha Reynolds
 

Tendances (19)

Blockchain in life sciences
Blockchain in life sciencesBlockchain in life sciences
Blockchain in life sciences
 
A.Schumacher (2017) Blockchain & Healthcare: A Strategy Guide
A.Schumacher (2017) Blockchain & Healthcare:  A Strategy GuideA.Schumacher (2017) Blockchain & Healthcare:  A Strategy Guide
A.Schumacher (2017) Blockchain & Healthcare: A Strategy Guide
 
Block chain
Block chainBlock chain
Block chain
 
Healthcare Blockchain Summit, Washington DC Mar 21, 2017
Healthcare Blockchain Summit, Washington DC Mar 21, 2017Healthcare Blockchain Summit, Washington DC Mar 21, 2017
Healthcare Blockchain Summit, Washington DC Mar 21, 2017
 
Permissioned v. Permissionless Blockchain 10XTS
Permissioned v. Permissionless Blockchain 10XTSPermissioned v. Permissionless Blockchain 10XTS
Permissioned v. Permissionless Blockchain 10XTS
 
Blockchain + Healthcare Innovation
Blockchain + Healthcare Innovation Blockchain + Healthcare Innovation
Blockchain + Healthcare Innovation
 
Top 10 companies using blockchain for healthcare security
Top 10 companies using blockchain for healthcare securityTop 10 companies using blockchain for healthcare security
Top 10 companies using blockchain for healthcare security
 
Blockchain in Health Care
Blockchain in Health CareBlockchain in Health Care
Blockchain in Health Care
 
Blockchain in Insurance 101
Blockchain in Insurance 101Blockchain in Insurance 101
Blockchain in Insurance 101
 
CB insights: How Blockchain Technology Could Disrupt Healthcare
CB insights: How Blockchain Technology Could Disrupt HealthcareCB insights: How Blockchain Technology Could Disrupt Healthcare
CB insights: How Blockchain Technology Could Disrupt Healthcare
 
AWIP Pink Innov Blockchain Workshop deck - May 23, 2019
AWIP Pink Innov Blockchain Workshop deck - May 23, 2019AWIP Pink Innov Blockchain Workshop deck - May 23, 2019
AWIP Pink Innov Blockchain Workshop deck - May 23, 2019
 
Blockchain & Pharma
Blockchain & PharmaBlockchain & Pharma
Blockchain & Pharma
 
Blockchain, Predictive Analytics and Healthcare
Blockchain, Predictive Analytics and HealthcareBlockchain, Predictive Analytics and Healthcare
Blockchain, Predictive Analytics and Healthcare
 
Pistoia Alliance Blockchain Webinar 20 June 2017
Pistoia Alliance Blockchain Webinar 20 June 2017Pistoia Alliance Blockchain Webinar 20 June 2017
Pistoia Alliance Blockchain Webinar 20 June 2017
 
Blockchain- Why, How and Where to use?
Blockchain- Why, How and Where to use?Blockchain- Why, How and Where to use?
Blockchain- Why, How and Where to use?
 
Blockchain: A Catalyst for the Next Wave of Progress in the Life Sciences Ind...
Blockchain: A Catalyst for the Next Wave of Progress in the Life Sciences Ind...Blockchain: A Catalyst for the Next Wave of Progress in the Life Sciences Ind...
Blockchain: A Catalyst for the Next Wave of Progress in the Life Sciences Ind...
 
Is there a Blockchain Future for Healthcare?
Is there a Blockchain Future for Healthcare?Is there a Blockchain Future for Healthcare?
Is there a Blockchain Future for Healthcare?
 
Implementing Blockchain applications in healthcare
Implementing Blockchain applications in healthcareImplementing Blockchain applications in healthcare
Implementing Blockchain applications in healthcare
 
Workshop handout for blockchain workshop
Workshop handout for blockchain workshopWorkshop handout for blockchain workshop
Workshop handout for blockchain workshop
 

En vedette

Google Doodles 2002
Google Doodles 2002Google Doodles 2002
Google Doodles 2002ecsette
 
Turkey needs less money in politics and less politics in court
Turkey needs less money in politics and less politics in courtTurkey needs less money in politics and less politics in court
Turkey needs less money in politics and less politics in courtFTI Consulting FR
 
Blenderbookv01
Blenderbookv01Blenderbookv01
Blenderbookv01whiedhie
 
Puntos de monitoreo de aire y ruido
Puntos de monitoreo de aire y ruidoPuntos de monitoreo de aire y ruido
Puntos de monitoreo de aire y ruidobrica07
 
Bei Tongkat Ali handelt es sich um ein Bittereschengewächs. Neben dieser volk...
Bei Tongkat Ali handelt es sich um ein Bittereschengewächs. Neben dieser volk...Bei Tongkat Ali handelt es sich um ein Bittereschengewächs. Neben dieser volk...
Bei Tongkat Ali handelt es sich um ein Bittereschengewächs. Neben dieser volk...dryersheet99
 
Play Nicely - Exciting Opportunity for 2014
Play Nicely - Exciting Opportunity for 2014Play Nicely - Exciting Opportunity for 2014
Play Nicely - Exciting Opportunity for 2014AffordableMedia
 
Vmware mquinas-virtuales-19365
Vmware mquinas-virtuales-19365Vmware mquinas-virtuales-19365
Vmware mquinas-virtuales-19365camila1727
 

En vedette (13)

Google Doodles 2002
Google Doodles 2002Google Doodles 2002
Google Doodles 2002
 
Faltam apenas 03 dias
Faltam apenas 03 diasFaltam apenas 03 dias
Faltam apenas 03 dias
 
mercator résumé chapitre 19
mercator résumé chapitre 19mercator résumé chapitre 19
mercator résumé chapitre 19
 
PowerPoint Prueba
PowerPoint PruebaPowerPoint Prueba
PowerPoint Prueba
 
Campaña de Iglesia en Singapur
Campaña de Iglesia en SingapurCampaña de Iglesia en Singapur
Campaña de Iglesia en Singapur
 
Turkey needs less money in politics and less politics in court
Turkey needs less money in politics and less politics in courtTurkey needs less money in politics and less politics in court
Turkey needs less money in politics and less politics in court
 
Blenderbookv01
Blenderbookv01Blenderbookv01
Blenderbookv01
 
sugarsync
sugarsyncsugarsync
sugarsync
 
Puntos de monitoreo de aire y ruido
Puntos de monitoreo de aire y ruidoPuntos de monitoreo de aire y ruido
Puntos de monitoreo de aire y ruido
 
Bei Tongkat Ali handelt es sich um ein Bittereschengewächs. Neben dieser volk...
Bei Tongkat Ali handelt es sich um ein Bittereschengewächs. Neben dieser volk...Bei Tongkat Ali handelt es sich um ein Bittereschengewächs. Neben dieser volk...
Bei Tongkat Ali handelt es sich um ein Bittereschengewächs. Neben dieser volk...
 
Play Nicely - Exciting Opportunity for 2014
Play Nicely - Exciting Opportunity for 2014Play Nicely - Exciting Opportunity for 2014
Play Nicely - Exciting Opportunity for 2014
 
Vmware mquinas-virtuales-19365
Vmware mquinas-virtuales-19365Vmware mquinas-virtuales-19365
Vmware mquinas-virtuales-19365
 
Das hotel Singgasana, Makassar
Das hotel Singgasana, MakassarDas hotel Singgasana, Makassar
Das hotel Singgasana, Makassar
 

Similaire à IDC Research Paper Looks at Ensuring and Proving Big Data is Tamper-Free

COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITYCOST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITYShakas Technologies
 
Arkibiz Partners with GuardTime to Provide Auditable E-Documents and Records ...
Arkibiz Partners with GuardTime to Provide Auditable E-Documents and Records ...Arkibiz Partners with GuardTime to Provide Auditable E-Documents and Records ...
Arkibiz Partners with GuardTime to Provide Auditable E-Documents and Records ...flashnewsrelease
 
Cost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward securityCost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward securityPvrtechnologies Nellore
 
An Efficient implementation of PKI architecture based Digital Signature using...
An Efficient implementation of PKI architecture based Digital Signature using...An Efficient implementation of PKI architecture based Digital Signature using...
An Efficient implementation of PKI architecture based Digital Signature using...IOSR Journals
 
Data provenance - world in 2030
Data provenance -  world in 2030Data provenance -  world in 2030
Data provenance - world in 2030Future Agenda
 
Research Paper Digital Forensics on Google Cloud Platform
Research Paper Digital Forensics on Google Cloud PlatformResearch Paper Digital Forensics on Google Cloud Platform
Research Paper Digital Forensics on Google Cloud PlatformSamuel Borthwick
 
Digital certificate management v1 (Draft)
Digital certificate management v1 (Draft)Digital certificate management v1 (Draft)
Digital certificate management v1 (Draft)Avirot Mitamura
 
Why eSignatures are Imperative for Data Security.pdf
Why eSignatures are Imperative for Data Security.pdfWhy eSignatures are Imperative for Data Security.pdf
Why eSignatures are Imperative for Data Security.pdfDrysign By Exela
 
itapro201606-New Tech In Town
itapro201606-New Tech In Townitapro201606-New Tech In Town
itapro201606-New Tech In TownKaenan Hertz
 
Blockchain in Identity Management - An Overview.pdf
Blockchain in Identity Management - An Overview.pdfBlockchain in Identity Management - An Overview.pdf
Blockchain in Identity Management - An Overview.pdfJamieDornan2
 
Insecure magazine - 51
Insecure magazine - 51Insecure magazine - 51
Insecure magazine - 51Felipe Prado
 
Information Leakage Prevention Using Public Key Encryption System and Fingerp...
Information Leakage Prevention Using Public Key Encryption System and Fingerp...Information Leakage Prevention Using Public Key Encryption System and Fingerp...
Information Leakage Prevention Using Public Key Encryption System and Fingerp...CSCJournals
 
NoHidingInTheCloud
NoHidingInTheCloudNoHidingInTheCloud
NoHidingInTheCloudJoan Ross
 
AnevaluationofsecurestorageofauthenticationdataIJISR.pdf
AnevaluationofsecurestorageofauthenticationdataIJISR.pdfAnevaluationofsecurestorageofauthenticationdataIJISR.pdf
AnevaluationofsecurestorageofauthenticationdataIJISR.pdftonkung6
 
En ebook-digital-signature-for-the-remote-workplace
En ebook-digital-signature-for-the-remote-workplaceEn ebook-digital-signature-for-the-remote-workplace
En ebook-digital-signature-for-the-remote-workplaceNiranjanaDhumal
 
Benefits of Blockchain for Identity and Access Management - By Azgari Lipshy
Benefits of Blockchain for Identity and Access Management - By Azgari Lipshy Benefits of Blockchain for Identity and Access Management - By Azgari Lipshy
Benefits of Blockchain for Identity and Access Management - By Azgari Lipshy Azgari Lipshy
 

Similaire à IDC Research Paper Looks at Ensuring and Proving Big Data is Tamper-Free (20)

COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITYCOST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
 
Arkibiz Partners with GuardTime to Provide Auditable E-Documents and Records ...
Arkibiz Partners with GuardTime to Provide Auditable E-Documents and Records ...Arkibiz Partners with GuardTime to Provide Auditable E-Documents and Records ...
Arkibiz Partners with GuardTime to Provide Auditable E-Documents and Records ...
 
Cost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward securityCost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward security
 
An Efficient implementation of PKI architecture based Digital Signature using...
An Efficient implementation of PKI architecture based Digital Signature using...An Efficient implementation of PKI architecture based Digital Signature using...
An Efficient implementation of PKI architecture based Digital Signature using...
 
Data provenance - world in 2030
Data provenance -  world in 2030Data provenance -  world in 2030
Data provenance - world in 2030
 
Research Paper Digital Forensics on Google Cloud Platform
Research Paper Digital Forensics on Google Cloud PlatformResearch Paper Digital Forensics on Google Cloud Platform
Research Paper Digital Forensics on Google Cloud Platform
 
Digital certificate management v1 (Draft)
Digital certificate management v1 (Draft)Digital certificate management v1 (Draft)
Digital certificate management v1 (Draft)
 
Automating trust with new technologies
Automating trust with new technologiesAutomating trust with new technologies
Automating trust with new technologies
 
Sqrrl
SqrrlSqrrl
Sqrrl
 
Why eSignatures are Imperative for Data Security.pdf
Why eSignatures are Imperative for Data Security.pdfWhy eSignatures are Imperative for Data Security.pdf
Why eSignatures are Imperative for Data Security.pdf
 
itapro201606-New Tech In Town
itapro201606-New Tech In Townitapro201606-New Tech In Town
itapro201606-New Tech In Town
 
Blockchain in Identity Management - An Overview.pdf
Blockchain in Identity Management - An Overview.pdfBlockchain in Identity Management - An Overview.pdf
Blockchain in Identity Management - An Overview.pdf
 
Insecure magazine - 51
Insecure magazine - 51Insecure magazine - 51
Insecure magazine - 51
 
Information Leakage Prevention Using Public Key Encryption System and Fingerp...
Information Leakage Prevention Using Public Key Encryption System and Fingerp...Information Leakage Prevention Using Public Key Encryption System and Fingerp...
Information Leakage Prevention Using Public Key Encryption System and Fingerp...
 
NoHidingInTheCloud
NoHidingInTheCloudNoHidingInTheCloud
NoHidingInTheCloud
 
AnevaluationofsecurestorageofauthenticationdataIJISR.pdf
AnevaluationofsecurestorageofauthenticationdataIJISR.pdfAnevaluationofsecurestorageofauthenticationdataIJISR.pdf
AnevaluationofsecurestorageofauthenticationdataIJISR.pdf
 
En ebook-digital-signature-for-the-remote-workplace
En ebook-digital-signature-for-the-remote-workplaceEn ebook-digital-signature-for-the-remote-workplace
En ebook-digital-signature-for-the-remote-workplace
 
Digital Signatures
Digital SignaturesDigital Signatures
Digital Signatures
 
Digital Signatures
Digital SignaturesDigital Signatures
Digital Signatures
 
Benefits of Blockchain for Identity and Access Management - By Azgari Lipshy
Benefits of Blockchain for Identity and Access Management - By Azgari Lipshy Benefits of Blockchain for Identity and Access Management - By Azgari Lipshy
Benefits of Blockchain for Identity and Access Management - By Azgari Lipshy
 

Dernier

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 

Dernier (20)

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 

IDC Research Paper Looks at Ensuring and Proving Big Data is Tamper-Free

  • 1. IDC Research Paper Looks at Ensuring and Proving Big Data is Tamper-Free "Data Integrity in the Big Data Digital Age" gives data its proof in court. San Francisco, CA (USA), Wednesday - April 18th, 2012 -- A new executive brief published by IDC examines one of the major obstacles organizations face when committing resources and applications to cloud computing. At stake is the issue of validating the integrity and authenticity of data within a cloud environment. "When the data is hosted onsite, this process of data integrity can certainly be a challenge. However, when data is not hosted within the traditional internal IT data center environment, there needs to be a method of ensuring indisputable data integrity," cites the report. Titled "Data Integrity in the Big Data Digital Age", the research paper ties the current Big Data phenomenon with cloud computing, making a case for how organizations must grapple with analyzing and basing decisions on petabytes of unstructured data, yet rarely questioning the authenticity of this data. Questions the report seeks to answer include: Has my data been tampered with? Is the data source legitimate? How can indisputable proof be offered that data integrity remains intact? And in cases that involve the legal system, how to bring documents, log files, or audio files to the level where they can be admitted as irrefutable evidence? These questions take the data integrity argument well beyond the premise and perimeter of IT security matters. Few options exist today that can achieve tamper-proof data security outside of the reliance on third-party certification authorities, or the unwieldy management of a public key infrastructure. What’s required is a way to validate, verify, and self-authenticate the data independently of any third-party agency. Sponsored by GuardTime ( http://www.guardtime.com ), the executive brief details a compelling case for the adoption of Keyless Signatures, explaining how the mathematically-driven system works. The Keyless Signature technology is used to provide indisputable proof of time, origin, and integrity for electronic data. "The goal of the keyless signature technology is to provide mass-scale, non-expiring data validation while eliminating the need for secrets or other forms of trust, thereby reducing or even eliminating the need for more complex certificate-based solutions, as these are ripe with certificate management issues, including expiration and revocation," the paper explains. "A keyless signature provides an alternative method to key-based technologies by providing proof and non-repudiation of electronic data using only hash functions for verification. The implementation of keyless signature is done via a globally distributed machine, taking hash values of data as inputs and returning keyless signatures that prove the time, integrity, and origin (machine, organization, individual) of the input data." "Any client using the keyless signature service can make a request to sign any data item it has access to; a log file, XML file, office document, database record, SWIFT transaction, FPML message, eDiscovery productions, etc. In return, the client will receive a keyless signature which can be stored along side the signed data, within the signed data, or in a repository separate from the signed data for backup and archival purposes." By signing the data using GuardTime’s Keyless Signatures ( http://www.guardtime.com ), an organization can automatically detect when and where the data was created or transferred, and if the data has been tampered with or not. An alert is sent to the customer when an abnormal status is detected.
  • 2. In this manner, organizations can assure the integrity of data and confirm the location where data exists, providing a full audit trail of data usage and storage in the Cloud. The report concludes with "The keyless nature of this technology helps reduce the footprint by removing the need for cipher keys and passwords, which arguably can also be lost or mislaid, and since the integrity can be validated by the document owners, the ability to leverage the cloud computing platform places it well for future adoption." The full report can be found here: http://www.guardtime.com/whitepapers About GuardTime: GuardTime was founded with the goal of solving one of the biggest problems in computing: how to be sure electronic data is authentic. GuardTime's Keyless Signatures provide proof of origin and that not a single bit of the data has changed since a specific point in time. The verification of the signatures can be done offline without reliance on keys, secrets, or the existence of a trusted third party. GuardTime's mission is to change the world to one in which Keyless Signatures are ubiquitous and a natural part of the everyday data lifecycle, whether on disk, in transit, or in the Cloud. The company was recently selected as co-winner of the Innotribe $100K Start-Up Challenge, honoring the company as one of the world's most promising financial technology start- ups. Visit http://www.guardtime.com for more information about using Keyless Signatures for signing your data. Press & Media Contact: Victor Cruz, Principal MediaPR.net Inc San Francisco, CA - USA +1 978-594-4134 vcruz@mediapr.net http://www.guardtime.com