Welcome!

SDN Journal Authors: Liz McMillan, Yeshim Deniz, Elizabeth White, Pat Romanski, TJ Randall

Related Topics: @DXWorldExpo, Microservices Expo, Agile Computing, @CloudExpo, Cloud Security, SDN Journal

@DXWorldExpo: Article

How Do You Kill Something That Lives Forever?

The Dark Side of Big Data

Who doesn't love a good zombie flick, right? Hordes of undead ambling around in tattered clothing looking for something to eat. The low, drawn-out moans of a once-productive member of society, who now possesses the brainpower of a teenager on an 8-hour Call of Duty bender.

While I don't believe the zombie apocalypse is happening anytime soon (at least not for another six months), there is another form of undead that is very much alive and well today. I'm talking of course about... digital data.

We're at the point now where anything you do online leaves a digital footprint, whether it's a photo posted to Instagram, a purchase on Amazon, or a patient intake form completed on an iPad.

This data, stored in the cloud, is often moved and replicated, but it really can't be destroyed, and companies place a great deal of value on it. We often talk about this phenomenon of Big Data. It's the increasing flow of varied forms of data that ultimately reaches petabyte scale. And it contains little bits and pieces about you that are next to impossible to erase.

Consider the following:

Data can literally be kept forever. Thanks to the nature of big data architectures, most organizations will never run out of storage capacity. So data, regardless of it's importance, can be retained forever. That means 40 years from now, a company might still retain all the metadata associated with a purchase you made online last week. It stands to reason that the more data that gets scooped up, the more personal data gets scooped up. Organizations, particularly those in Europe that must comply with strict privacy regulations, will need to make some tough decisions about how to keep personally identifiable information (PII) confidential.

Companies should care more about privacy than consumers. While individuals may care about privacy, particularly when it comes to their children, I don't believe that the collective masses do. Social media sharing, providing an email address in exchange for online coupons, giving a mobile gaming app access to your contacts, lack of outrage at the NSA spying scandal are all evidence of that. On the other hand, companies care greatly about their reputation and their competitive advantage, so they can't afford to be viewed as having a laissez faire attitude toward protecting sensitive data. Gazzang works with a number of SaaS companies who have gone to great lengths to keep their customer data private.

Anonymizing certain datasets is not the answer. A commonly held belief is that anonymizing or tokenizing certain personally identifiable information like names, addresses and phone numbers is the best way to ensure user privacy. This is simply not true. With as much user data as there is floating around, today's analytics systems make it possible to take a series of disparate bits of data and piece them together to figure out exactly who an individual is.

How analyzed data is used depends on the company. Whether data is used to predict future behavior or condemn those with past transgressions is up to the company. I suspect there will be use cases for both since the data and tools are available. Take the airline industry for example. A frequent flyer in good standing who is known to travel abroad for two weeks in October, may in late September receive a gratis global TSA Pre check to get them through the security line more quickly. That same airline may also decide to charge a premium on business travelers in late March, June and September because they know from historical data who the salespeople are that need to travel in order close out a successful quarter.

Don't just pay lip service to data security. Do something about it. C-level execs need to have a serious security and privacy conversation BEFORE their company embarks on a big data project. You don’t wait until after a burglary to put locks on your doors, and you should not wait until after a breach to secure your data. It is possible to respect customer and employee privacy, even as you pile up terabytes of data. Here are a few tips on how:

  • Encrypt all data at rest. This ensures a data breach or leak won't result in the embarrassing or illegal disclosure of private or confidential data.
  • Establish and enforce access policies. This keeps unauthorized parties from gaining access to the data or the encryption keys.
  • If you store encrypted data in the cloud, make sure your keys are stored locally or on a separate server. Separating the keys from the encrypted data ensures a breach or subpoena doesn't result in the loss of the keys
  • Don't trade off security for big data performance and availability, because you can have both. Find a security solution that's built to work in a cloud or big data environment. There are plenty of options out there that are lightning quick and don't rely on clunky, expensive hardware.

More Stories By David Tishgart

David Tishgart is a Director of Product Marketing at Cloudera, focused on the company's cloud products, strategy, and partnerships. Prior to joining Cloudera, he ran business development and marketing at Gazzang, an enterprise security software company that was eventually acquired by Cloudera. He brings nearly two decades of experience in enterprise software, hardware, and services marketing to Cloudera. He holds a bachelor's degree in journalism from the University of Texas at Austin.

CloudEXPO Stories
Founded in 2002 and headquartered in Chicago, Nexum® takes a comprehensive approach to security. Nexum approaches business with one simple statement: “Do what’s right for the customer and success will follow.” Nexum helps you mitigate risks, protect your data, increase business continuity and meet your unique business objectives by: Detecting and preventing network threats, intrusions and disruptions Equipping you with the information, tools, training and resources you need to effectively manage IT risk Nexum, Latin for an arrangement by which one pledged one’s very liberty as security, Nexum is committed to ensuring your security. At Nexum, We Mean Security®.
The Transparent Cloud-computing Consortium (T-Cloud) is a neutral organization for researching new computing models and business opportunities in IoT era. In his session, Ikuo Nakagawa, Co-Founder and Board Member at Transparent Cloud Computing Consortium, will introduce the big change toward the "connected-economy" in the digital age. He'll introduce and describe some leading-edge business cases from his original points of view, and discuss models & strategies in the connected-economy. Nowadays, "digital innovation" is a big wave of business transformation based on digital technologies. IoT, Big Data, AI, FinTech and various leading-edge technologies are key components of such business drivers.
Doug was appointed CEO of Big Switch in 2013 to lead the company on its mission to provide modern cloud and data center networking solutions capable of disrupting the stronghold by legacy vendors. Under his guidance, Big Switch has experienced 30+% average QoQ growth for the last 16 quarters; more than quadrupled headcount; successfully shifted to a software-only and subscription-based recurring revenue model; solidified key partnerships with Accton/Edgecore, Dell EMC, HPE, Nutanix, RedHat and VMware; developed Open Network Linux, an open source NOS foundational component designed in partnership with Facebook and Google; and he played an integral role in raising two-thirds of the company's $120MM of funding. Prior to Big Switch, Doug was SVP & GM of Juniper Networks $1BN business across Asia-Pacific, Japan and Greater China, and he began his time at Juniper as SVP & GM of its Security bu...
Having been in the web hosting industry since 2002, dhosting has gained a great deal of experience while working on a wide range of projects. This experience has enabled the company to develop our amazing new product, which they are now excited to present! Among dHosting's greatest achievements, they can include the development of their own hosting panel, the building of their fully redundant server system, and the creation of dhHosting's unique product, Dynamic Edge.
Digital transformation is about embracing digital technologies into a company's culture to better connect with its customers, automate processes, create better tools, enter new markets, etc. Such a transformation requires continuous orchestration across teams and an environment based on open collaboration and daily experiments. In his session at 21st Cloud Expo, Alex Casalboni, Technical (Cloud) Evangelist at Cloud Academy, explored and discussed the most urgent unsolved challenges to achieve full cloud literacy in the enterprise world.