SlideShare uma empresa Scribd logo
1 de 2
Baixar para ler offline
The revolution in big data and cloud computing has ignited a “gold rush” to extract value
from the mountains of digital information collected and stored by government and industry.
The benefit to agencies and competitive advantage for business will be substantial.
A significant challenge is that current data storage systems and processes were not archi-
tected for the new cloud environment. In particular, conventional approaches make it difficult
to bring together and analyze large data sets efficiently or securely. Moreover, as data stores
get larger and more diverse, the challenges to integrating and protecting data will become
even greater.
Booz Allen Can Help You with Secure Cloud Solutions
To help organizations overcome these challenges, Booz Allen Hamilton, a leading strategy
and technology consulting firm, has pioneered an entirely new approach for implementing
big data. Known as the Cloud Analytics Reference Architecture, this approach removes the
conventional constraints and enables systems to accommodate petabytes of data and run
analytics at previously unattainable scales—all securely, efficiently, and reasonably fast.
This innovative approach allows machines to do the bulk of the work, freeing people to do the
creative analysis.
The Cloud Analytics Reference Architecture is built on the foundation of a “data lake” that
facilitates both the unencumbered mixing of diverse data sets and rigorous data-level
­security. Unlike conventional approaches, which typically store information in rigid, regi-
mented data structures, the Cloud Analytics Architecture ingests all data—such as struc-
tured, unstructured, streaming, batch, classified, unclassified—into a common storage pool:
the data lake. Using this construct, analysts can direct every inquiry to the entire data lake.
Embedding Security within the Data
The data lake not only facilitates more powerful analytic inquiries, it also enables the high
levels of security required for storing and mixing data in cloud environments. As data enters
the data lake, each piece of data is tagged with a range of security information—security
metadata—that embeds security within the data.
About Booz Allen
Booz Allen Hamilton is
a leading provider of
management and technology
consulting services to the
US government in defense,
intelligence, and civil markets,
and to major corporations,
institutions, and not-for-profit
organizations. Booz Allen is
headquartered in McLean,
Virginia, employs approximately
25,000 people, and had
revenue of $5.86 billion
for the 12 months ended
March 31, 2012. (NYSE: BAH)
For more information contact
Jason Escaravage
Principal
escaravage_jason@bah.com
703-902-5635
Peter Guerra
Senior Associate
guerra_peter@bah.com
301-497-6754
www.boozallen.com/cloud
S T R A T E G Y & O R G A N I Z A T I O N | T E C H N O L O G Y | E N G I N E E R I N G & O P E R A T I O N S | A N A L Y T I C S
Enabling Big Data with Data-Level Security
The Cloud Analytics Reference Architecture
The metadata tags can control or prescribe every aspect of security. And the number of tags is
virtually limitless. The metadata tags can control (or prescribe) who can access the data, when
they access the data, what networks and devices can access the data, and the regulations,
standards, and legal restrictions that apply.
Organizations can also use the security tags to define other parameters and restrictions. For
example, the tags could contain the dimension of time, thus helping organizations maintain the
integrity of the data and record changes over time. Similarly, the tags could allow certain people
access to all historical data while limiting others to just the most recent data; or the tags could
embed an expiration date on the data. The security tags work in concert with—and reinforce—
cyber defenses already in place in areas such as identity management, configuration manage-
ment, and compliance.
By tagging data with security controls as it enters the data lake, organizations can implement an
unprecedented level of data security within the cloud. The security resides within and moves with
the data, whether the data is in motion or at rest. As a result, organizations can confidently mix
multiple data sets and provide analysts with fast and efficient access to the data, knowing the
security tags will remain permanently attached to the data.
In the data lake, security becomes an “enabler” of big data analytics to power insights and
­solutions addressing our nation’s most pressing social, political, and economic challenges.
See our ideas in action at boozallen.com/cloud
12.032.12N
Streaming
Indexes
Human Insights and Actions
Enabled by customizable interfaces
and visualizations of the data
Analytics and Services
Your tools for analysis, modeling,
testing, and simulations
Data Management
The single, secure repository
for all of your valuable data
Infrastructure
The technology platform for
storing and managing your data
Services (SOA)
Analytics and
Discovery
Views and Indexes
Data Lake
Metadata Tagging
Data Sources
Infrastructure/
Management
Visualization, Reporting,
Dash-boards, and Query
Interface
Reference Architecture

Mais conteúdo relacionado

Mais procurados

Information economics and big data
Information economics and big dataInformation economics and big data
Information economics and big data
Mark Albala
 
ebook.driving decision-making, security
ebook.driving decision-making, securityebook.driving decision-making, security
ebook.driving decision-making, security
Roman Chanclor
 
BBDO Proximity: Big-data May 2013
BBDO Proximity: Big-data May 2013BBDO Proximity: Big-data May 2013
BBDO Proximity: Big-data May 2013
Brian Crotty
 
Business_Analytics_Presentation_Luke_Caratan
Business_Analytics_Presentation_Luke_CaratanBusiness_Analytics_Presentation_Luke_Caratan
Business_Analytics_Presentation_Luke_Caratan
Luke Caratan
 
LS_WhitePaper_NextGenAnalyticsMay2016
LS_WhitePaper_NextGenAnalyticsMay2016LS_WhitePaper_NextGenAnalyticsMay2016
LS_WhitePaper_NextGenAnalyticsMay2016
Anjan Roy, PMP
 
IBM-Infoworld Big Data deep dive
IBM-Infoworld Big Data deep diveIBM-Infoworld Big Data deep dive
IBM-Infoworld Big Data deep dive
Kun Le
 

Mais procurados (19)

Information economics and big data
Information economics and big dataInformation economics and big data
Information economics and big data
 
Big data
Big dataBig data
Big data
 
ebook.driving decision-making, security
ebook.driving decision-making, securityebook.driving decision-making, security
ebook.driving decision-making, security
 
BBDO Proximity: Big-data May 2013
BBDO Proximity: Big-data May 2013BBDO Proximity: Big-data May 2013
BBDO Proximity: Big-data May 2013
 
Big Data
Big DataBig Data
Big Data
 
Fraud and Risk in Big Data
Fraud and Risk in Big DataFraud and Risk in Big Data
Fraud and Risk in Big Data
 
Business_Analytics_Presentation_Luke_Caratan
Business_Analytics_Presentation_Luke_CaratanBusiness_Analytics_Presentation_Luke_Caratan
Business_Analytics_Presentation_Luke_Caratan
 
Unlocking Value in the Fragmented World of Big Data Analytics (POV Paper)
Unlocking Value in the Fragmented World of Big Data Analytics (POV Paper)Unlocking Value in the Fragmented World of Big Data Analytics (POV Paper)
Unlocking Value in the Fragmented World of Big Data Analytics (POV Paper)
 
Hadoop Overview
Hadoop OverviewHadoop Overview
Hadoop Overview
 
Everis big data_wilson_v1.4
Everis big data_wilson_v1.4Everis big data_wilson_v1.4
Everis big data_wilson_v1.4
 
Big Data Applications | Big Data Analytics Use-Cases | Big Data Tutorial for ...
Big Data Applications | Big Data Analytics Use-Cases | Big Data Tutorial for ...Big Data Applications | Big Data Analytics Use-Cases | Big Data Tutorial for ...
Big Data Applications | Big Data Analytics Use-Cases | Big Data Tutorial for ...
 
Big Data Analytics
Big Data AnalyticsBig Data Analytics
Big Data Analytics
 
Big Data: 8 facts and 8 fictions
Big Data: 8 facts and 8 fictionsBig Data: 8 facts and 8 fictions
Big Data: 8 facts and 8 fictions
 
Big Data, NoSQL, NewSQL & The Future of Data Management
Big Data, NoSQL, NewSQL & The Future of Data ManagementBig Data, NoSQL, NewSQL & The Future of Data Management
Big Data, NoSQL, NewSQL & The Future of Data Management
 
LS_WhitePaper_NextGenAnalyticsMay2016
LS_WhitePaper_NextGenAnalyticsMay2016LS_WhitePaper_NextGenAnalyticsMay2016
LS_WhitePaper_NextGenAnalyticsMay2016
 
IT FUTURE- Big data
IT FUTURE- Big dataIT FUTURE- Big data
IT FUTURE- Big data
 
Developing a Business Case for Cloud
Developing a Business Case for CloudDeveloping a Business Case for Cloud
Developing a Business Case for Cloud
 
Dealing with Dark Data
Dealing with Dark DataDealing with Dark Data
Dealing with Dark Data
 
IBM-Infoworld Big Data deep dive
IBM-Infoworld Big Data deep diveIBM-Infoworld Big Data deep dive
IBM-Infoworld Big Data deep dive
 

Destaque

Pp kegemaran saya- miera
Pp kegemaran saya- mieraPp kegemaran saya- miera
Pp kegemaran saya- miera
Imma MieYa
 
Basic of guitar
Basic of guitarBasic of guitar
Basic of guitar
javamofcb
 
Wireless greenhouse environment monitoring through sensors
Wireless greenhouse environment monitoring through sensorsWireless greenhouse environment monitoring through sensors
Wireless greenhouse environment monitoring through sensors
Sudhanshu Tripathi
 

Destaque (20)

Using Advanced Analytics for Data-Driven Decision Making
Using Advanced Analytics for Data-Driven Decision MakingUsing Advanced Analytics for Data-Driven Decision Making
Using Advanced Analytics for Data-Driven Decision Making
 
Improving Intelligence Analysis Through Cloud Analytics
Improving Intelligence Analysis Through  Cloud AnalyticsImproving Intelligence Analysis Through  Cloud Analytics
Improving Intelligence Analysis Through Cloud Analytics
 
An Analysis of Different MOOC Environments from the Students’ Perspective , e...
An Analysis of Different MOOC Environments from the Students’ Perspective , e...An Analysis of Different MOOC Environments from the Students’ Perspective , e...
An Analysis of Different MOOC Environments from the Students’ Perspective , e...
 
It Shouldn't Be Scary to Go Digital
It Shouldn't Be Scary to Go DigitalIt Shouldn't Be Scary to Go Digital
It Shouldn't Be Scary to Go Digital
 
[insert period joke here] Researching Menstruation Online
[insert period joke here] Researching Menstruation Online[insert period joke here] Researching Menstruation Online
[insert period joke here] Researching Menstruation Online
 
Helping Haiti in the Wake of Hurricane Matthew
Helping Haiti in the Wake of Hurricane MatthewHelping Haiti in the Wake of Hurricane Matthew
Helping Haiti in the Wake of Hurricane Matthew
 
Pp kegemaran saya- miera
Pp kegemaran saya- mieraPp kegemaran saya- miera
Pp kegemaran saya- miera
 
Basic of guitar
Basic of guitarBasic of guitar
Basic of guitar
 
Software Educativo
Software EducativoSoftware Educativo
Software Educativo
 
Tech Backpack pitch for Students - get 3 months free
Tech Backpack pitch for Students - get 3 months freeTech Backpack pitch for Students - get 3 months free
Tech Backpack pitch for Students - get 3 months free
 
Gough enfoquecapacidadesnusbaum
Gough enfoquecapacidadesnusbaumGough enfoquecapacidadesnusbaum
Gough enfoquecapacidadesnusbaum
 
Real-time Data De-duplication using Locality-sensitive Hashing powered by Sto...
Real-time Data De-duplication using Locality-sensitive Hashing powered by Sto...Real-time Data De-duplication using Locality-sensitive Hashing powered by Sto...
Real-time Data De-duplication using Locality-sensitive Hashing powered by Sto...
 
In depth: New financial instruments impairment model
In depth: New financial instruments impairment modelIn depth: New financial instruments impairment model
In depth: New financial instruments impairment model
 
Presentations As Social Media In (talk at Portland Presentation Camp)
Presentations As Social Media In (talk at Portland Presentation Camp)Presentations As Social Media In (talk at Portland Presentation Camp)
Presentations As Social Media In (talk at Portland Presentation Camp)
 
Honest Slogans
Honest SlogansHonest Slogans
Honest Slogans
 
The Future of Business London - 10 06 16
The Future of Business London - 10 06 16The Future of Business London - 10 06 16
The Future of Business London - 10 06 16
 
Gamglm
GamglmGamglm
Gamglm
 
Mitra
MitraMitra
Mitra
 
PHOTOBOOK OF 2014 FIFA WORLD CUP SUPERSTARS
PHOTOBOOK OF 2014 FIFA WORLD CUP SUPERSTARSPHOTOBOOK OF 2014 FIFA WORLD CUP SUPERSTARS
PHOTOBOOK OF 2014 FIFA WORLD CUP SUPERSTARS
 
Wireless greenhouse environment monitoring through sensors
Wireless greenhouse environment monitoring through sensorsWireless greenhouse environment monitoring through sensors
Wireless greenhouse environment monitoring through sensors
 

Semelhante a Enabling Big Data with Data-Level Security:The Cloud Analytics Reference Architecture

Running head Database and Data Warehousing design1Database and.docx
Running head Database and Data Warehousing design1Database and.docxRunning head Database and Data Warehousing design1Database and.docx
Running head Database and Data Warehousing design1Database and.docx
healdkathaleen
 
Running head Database and Data Warehousing design1Database and.docx
Running head Database and Data Warehousing design1Database and.docxRunning head Database and Data Warehousing design1Database and.docx
Running head Database and Data Warehousing design1Database and.docx
todd271
 

Semelhante a Enabling Big Data with Data-Level Security:The Cloud Analytics Reference Architecture (20)

The Cloud Analytics Reference Architecture: Harnessing Big Data to Solve Comp...
The Cloud Analytics Reference Architecture: Harnessing Big Data to Solve Comp...The Cloud Analytics Reference Architecture: Harnessing Big Data to Solve Comp...
The Cloud Analytics Reference Architecture: Harnessing Big Data to Solve Comp...
 
Big data security
Big data securityBig data security
Big data security
 
Big data security
Big data securityBig data security
Big data security
 
Global Security Certification for Governments
Global Security Certification for GovernmentsGlobal Security Certification for Governments
Global Security Certification for Governments
 
Security issues in big data
Security issues in big data Security issues in big data
Security issues in big data
 
Opteamix_whitepaper_Data Masking Strategy.pdf
Opteamix_whitepaper_Data Masking Strategy.pdfOpteamix_whitepaper_Data Masking Strategy.pdf
Opteamix_whitepaper_Data Masking Strategy.pdf
 
Security for Big Data
Security for Big DataSecurity for Big Data
Security for Big Data
 
Protect your confidential information while improving services
Protect your confidential information while improving servicesProtect your confidential information while improving services
Protect your confidential information while improving services
 
A blueprint for data in a multicloud world
A blueprint for data in a multicloud worldA blueprint for data in a multicloud world
A blueprint for data in a multicloud world
 
Fueling Next-generation Data Management with Data Fabric
Fueling Next-generation Data Management with Data FabricFueling Next-generation Data Management with Data Fabric
Fueling Next-generation Data Management with Data Fabric
 
Data Breaches: The Untold Story
Data Breaches: The Untold Story  Data Breaches: The Untold Story
Data Breaches: The Untold Story
 
Data Analytics.pptx
Data Analytics.pptxData Analytics.pptx
Data Analytics.pptx
 
Securing sensitive data for the health care industry
Securing sensitive data for the health care industrySecuring sensitive data for the health care industry
Securing sensitive data for the health care industry
 
eBook: 5 Steps to Secure Cloud Data Governance
eBook: 5 Steps to Secure Cloud Data GovernanceeBook: 5 Steps to Secure Cloud Data Governance
eBook: 5 Steps to Secure Cloud Data Governance
 
Article data-centric security key to cloud and digital business
Article   data-centric security key to cloud and digital businessArticle   data-centric security key to cloud and digital business
Article data-centric security key to cloud and digital business
 
Data centric security key to cloud and digital business
Data centric security key to cloud and digital businessData centric security key to cloud and digital business
Data centric security key to cloud and digital business
 
Isaca journal - bridging the gap between access and security in big data...
Isaca journal  - bridging the gap between access and security in big data...Isaca journal  - bridging the gap between access and security in big data...
Isaca journal - bridging the gap between access and security in big data...
 
Running head Database and Data Warehousing design1Database and.docx
Running head Database and Data Warehousing design1Database and.docxRunning head Database and Data Warehousing design1Database and.docx
Running head Database and Data Warehousing design1Database and.docx
 
Running head Database and Data Warehousing design1Database and.docx
Running head Database and Data Warehousing design1Database and.docxRunning head Database and Data Warehousing design1Database and.docx
Running head Database and Data Warehousing design1Database and.docx
 
Cloud Analytics Playbook
Cloud Analytics PlaybookCloud Analytics Playbook
Cloud Analytics Playbook
 

Mais de Booz Allen Hamilton

You Can Hack That: How to Use Hackathons to Solve Your Toughest Challenges
You Can Hack That: How to Use Hackathons to Solve Your Toughest ChallengesYou Can Hack That: How to Use Hackathons to Solve Your Toughest Challenges
You Can Hack That: How to Use Hackathons to Solve Your Toughest Challenges
Booz Allen Hamilton
 

Mais de Booz Allen Hamilton (20)

You Can Hack That: How to Use Hackathons to Solve Your Toughest Challenges
You Can Hack That: How to Use Hackathons to Solve Your Toughest ChallengesYou Can Hack That: How to Use Hackathons to Solve Your Toughest Challenges
You Can Hack That: How to Use Hackathons to Solve Your Toughest Challenges
 
Examining Flexibility in the Workplace for Working Moms
Examining Flexibility in the Workplace for Working MomsExamining Flexibility in the Workplace for Working Moms
Examining Flexibility in the Workplace for Working Moms
 
The True Cost of Childcare
The True Cost of ChildcareThe True Cost of Childcare
The True Cost of Childcare
 
Booz Allen's 10 Cyber Priorities for Boards of Directors
Booz Allen's 10 Cyber Priorities for Boards of DirectorsBooz Allen's 10 Cyber Priorities for Boards of Directors
Booz Allen's 10 Cyber Priorities for Boards of Directors
 
Inaugural Addresses
Inaugural AddressesInaugural Addresses
Inaugural Addresses
 
Military Spouse Career Roadmap
Military Spouse Career Roadmap Military Spouse Career Roadmap
Military Spouse Career Roadmap
 
Homeland Threats: Today and Tomorrow
Homeland Threats: Today and TomorrowHomeland Threats: Today and Tomorrow
Homeland Threats: Today and Tomorrow
 
Preparing for New Healthcare Payment Models
Preparing for New Healthcare Payment ModelsPreparing for New Healthcare Payment Models
Preparing for New Healthcare Payment Models
 
The Product Owner’s Universe: Agile Coaching
The Product Owner’s Universe: Agile CoachingThe Product Owner’s Universe: Agile Coaching
The Product Owner’s Universe: Agile Coaching
 
Immersive Learning: The Future of Training is Here
Immersive Learning: The Future of Training is HereImmersive Learning: The Future of Training is Here
Immersive Learning: The Future of Training is Here
 
Nuclear Promise: Reducing Cost While Improving Performance
Nuclear Promise: Reducing Cost While Improving PerformanceNuclear Promise: Reducing Cost While Improving Performance
Nuclear Promise: Reducing Cost While Improving Performance
 
Frenemies – When Unlikely Partners Join Forces
Frenemies – When Unlikely Partners Join ForcesFrenemies – When Unlikely Partners Join Forces
Frenemies – When Unlikely Partners Join Forces
 
Booz Allen Secure Agile Development
Booz Allen Secure Agile DevelopmentBooz Allen Secure Agile Development
Booz Allen Secure Agile Development
 
Booz Allen Industrial Cybersecurity Threat Briefing
Booz Allen Industrial Cybersecurity Threat BriefingBooz Allen Industrial Cybersecurity Threat Briefing
Booz Allen Industrial Cybersecurity Threat Briefing
 
Booz Allen Hamilton and Market Connections: C4ISR Survey Report
Booz Allen Hamilton and Market Connections: C4ISR Survey ReportBooz Allen Hamilton and Market Connections: C4ISR Survey Report
Booz Allen Hamilton and Market Connections: C4ISR Survey Report
 
CITRIX IN AMAZON WEB SERVICES
CITRIX IN AMAZON WEB SERVICESCITRIX IN AMAZON WEB SERVICES
CITRIX IN AMAZON WEB SERVICES
 
Modern C4ISR Integrates, Innovates and Secures Military Networks
Modern C4ISR Integrates, Innovates and Secures Military NetworksModern C4ISR Integrates, Innovates and Secures Military Networks
Modern C4ISR Integrates, Innovates and Secures Military Networks
 
Agile and Open C4ISR Systems - Helping the Military Integrate, Innovate and S...
Agile and Open C4ISR Systems - Helping the Military Integrate, Innovate and S...Agile and Open C4ISR Systems - Helping the Military Integrate, Innovate and S...
Agile and Open C4ISR Systems - Helping the Military Integrate, Innovate and S...
 
Women On The Leading Edge
Women On The Leading Edge Women On The Leading Edge
Women On The Leading Edge
 
Booz Allen Field Guide to Data Science
Booz Allen Field Guide to Data Science Booz Allen Field Guide to Data Science
Booz Allen Field Guide to Data Science
 

Último

Abortion pills in Doha Qatar (+966572737505 ! Get Cytotec
Abortion pills in Doha Qatar (+966572737505 ! Get CytotecAbortion pills in Doha Qatar (+966572737505 ! Get Cytotec
Abortion pills in Doha Qatar (+966572737505 ! Get Cytotec
Abortion pills in Riyadh +966572737505 get cytotec
 
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
shivangimorya083
 
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
amitlee9823
 
Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...
Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...
Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...
amitlee9823
 
Determinants of health, dimensions of health, positive health and spectrum of...
Determinants of health, dimensions of health, positive health and spectrum of...Determinants of health, dimensions of health, positive health and spectrum of...
Determinants of health, dimensions of health, positive health and spectrum of...
shambhavirathore45
 
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in Kishangarh
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in  KishangarhDelhi 99530 vip 56974 Genuine Escort Service Call Girls in  Kishangarh
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in Kishangarh
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Schema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfSchema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdf
Lars Albertsson
 

Último (20)

Abortion pills in Doha Qatar (+966572737505 ! Get Cytotec
Abortion pills in Doha Qatar (+966572737505 ! Get CytotecAbortion pills in Doha Qatar (+966572737505 ! Get Cytotec
Abortion pills in Doha Qatar (+966572737505 ! Get Cytotec
 
Mature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptxMature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptx
 
VIP Model Call Girls Hinjewadi ( Pune ) Call ON 8005736733 Starting From 5K t...
VIP Model Call Girls Hinjewadi ( Pune ) Call ON 8005736733 Starting From 5K t...VIP Model Call Girls Hinjewadi ( Pune ) Call ON 8005736733 Starting From 5K t...
VIP Model Call Girls Hinjewadi ( Pune ) Call ON 8005736733 Starting From 5K t...
 
Week-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interactionWeek-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interaction
 
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
(NEHA) Call Girls Katra Call Now 8617697112 Katra Escorts 24x7
(NEHA) Call Girls Katra Call Now 8617697112 Katra Escorts 24x7(NEHA) Call Girls Katra Call Now 8617697112 Katra Escorts 24x7
(NEHA) Call Girls Katra Call Now 8617697112 Katra Escorts 24x7
 
Sampling (random) method and Non random.ppt
Sampling (random) method and Non random.pptSampling (random) method and Non random.ppt
Sampling (random) method and Non random.ppt
 
Introduction-to-Machine-Learning (1).pptx
Introduction-to-Machine-Learning (1).pptxIntroduction-to-Machine-Learning (1).pptx
Introduction-to-Machine-Learning (1).pptx
 
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
 
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...
 
Generative AI on Enterprise Cloud with NiFi and Milvus
Generative AI on Enterprise Cloud with NiFi and MilvusGenerative AI on Enterprise Cloud with NiFi and Milvus
Generative AI on Enterprise Cloud with NiFi and Milvus
 
VidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptxVidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptx
 
Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...
Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...
Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...
 
Best VIP Call Girls Noida Sector 39 Call Me: 8448380779
Best VIP Call Girls Noida Sector 39 Call Me: 8448380779Best VIP Call Girls Noida Sector 39 Call Me: 8448380779
Best VIP Call Girls Noida Sector 39 Call Me: 8448380779
 
Determinants of health, dimensions of health, positive health and spectrum of...
Determinants of health, dimensions of health, positive health and spectrum of...Determinants of health, dimensions of health, positive health and spectrum of...
Determinants of health, dimensions of health, positive health and spectrum of...
 
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in Kishangarh
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in  KishangarhDelhi 99530 vip 56974 Genuine Escort Service Call Girls in  Kishangarh
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in Kishangarh
 
Invezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signalsInvezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signals
 
Best VIP Call Girls Noida Sector 22 Call Me: 8448380779
Best VIP Call Girls Noida Sector 22 Call Me: 8448380779Best VIP Call Girls Noida Sector 22 Call Me: 8448380779
Best VIP Call Girls Noida Sector 22 Call Me: 8448380779
 
BDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort Service
BDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort ServiceBDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort Service
BDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort Service
 
Schema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfSchema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdf
 

Enabling Big Data with Data-Level Security:The Cloud Analytics Reference Architecture

  • 1. The revolution in big data and cloud computing has ignited a “gold rush” to extract value from the mountains of digital information collected and stored by government and industry. The benefit to agencies and competitive advantage for business will be substantial. A significant challenge is that current data storage systems and processes were not archi- tected for the new cloud environment. In particular, conventional approaches make it difficult to bring together and analyze large data sets efficiently or securely. Moreover, as data stores get larger and more diverse, the challenges to integrating and protecting data will become even greater. Booz Allen Can Help You with Secure Cloud Solutions To help organizations overcome these challenges, Booz Allen Hamilton, a leading strategy and technology consulting firm, has pioneered an entirely new approach for implementing big data. Known as the Cloud Analytics Reference Architecture, this approach removes the conventional constraints and enables systems to accommodate petabytes of data and run analytics at previously unattainable scales—all securely, efficiently, and reasonably fast. This innovative approach allows machines to do the bulk of the work, freeing people to do the creative analysis. The Cloud Analytics Reference Architecture is built on the foundation of a “data lake” that facilitates both the unencumbered mixing of diverse data sets and rigorous data-level ­security. Unlike conventional approaches, which typically store information in rigid, regi- mented data structures, the Cloud Analytics Architecture ingests all data—such as struc- tured, unstructured, streaming, batch, classified, unclassified—into a common storage pool: the data lake. Using this construct, analysts can direct every inquiry to the entire data lake. Embedding Security within the Data The data lake not only facilitates more powerful analytic inquiries, it also enables the high levels of security required for storing and mixing data in cloud environments. As data enters the data lake, each piece of data is tagged with a range of security information—security metadata—that embeds security within the data. About Booz Allen Booz Allen Hamilton is a leading provider of management and technology consulting services to the US government in defense, intelligence, and civil markets, and to major corporations, institutions, and not-for-profit organizations. Booz Allen is headquartered in McLean, Virginia, employs approximately 25,000 people, and had revenue of $5.86 billion for the 12 months ended March 31, 2012. (NYSE: BAH) For more information contact Jason Escaravage Principal escaravage_jason@bah.com 703-902-5635 Peter Guerra Senior Associate guerra_peter@bah.com 301-497-6754 www.boozallen.com/cloud S T R A T E G Y & O R G A N I Z A T I O N | T E C H N O L O G Y | E N G I N E E R I N G & O P E R A T I O N S | A N A L Y T I C S Enabling Big Data with Data-Level Security The Cloud Analytics Reference Architecture
  • 2. The metadata tags can control or prescribe every aspect of security. And the number of tags is virtually limitless. The metadata tags can control (or prescribe) who can access the data, when they access the data, what networks and devices can access the data, and the regulations, standards, and legal restrictions that apply. Organizations can also use the security tags to define other parameters and restrictions. For example, the tags could contain the dimension of time, thus helping organizations maintain the integrity of the data and record changes over time. Similarly, the tags could allow certain people access to all historical data while limiting others to just the most recent data; or the tags could embed an expiration date on the data. The security tags work in concert with—and reinforce— cyber defenses already in place in areas such as identity management, configuration manage- ment, and compliance. By tagging data with security controls as it enters the data lake, organizations can implement an unprecedented level of data security within the cloud. The security resides within and moves with the data, whether the data is in motion or at rest. As a result, organizations can confidently mix multiple data sets and provide analysts with fast and efficient access to the data, knowing the security tags will remain permanently attached to the data. In the data lake, security becomes an “enabler” of big data analytics to power insights and ­solutions addressing our nation’s most pressing social, political, and economic challenges. See our ideas in action at boozallen.com/cloud 12.032.12N Streaming Indexes Human Insights and Actions Enabled by customizable interfaces and visualizations of the data Analytics and Services Your tools for analysis, modeling, testing, and simulations Data Management The single, secure repository for all of your valuable data Infrastructure The technology platform for storing and managing your data Services (SOA) Analytics and Discovery Views and Indexes Data Lake Metadata Tagging Data Sources Infrastructure/ Management Visualization, Reporting, Dash-boards, and Query Interface Reference Architecture