Data is a valued asset and its security is essential for any enterprise and organization. This paper introduces Trusted Data Processing (TDP) and addresses three fundamental questions in TDP: 1) what are the essential requirements to achieve TDP? 2) what security mechanisms and safeguards are available to ensure TDP? 3) how to integrate TDP to practice? Based on the attacks targeting at data assets and their consequences, the requirements to achieve TDP, including data security, data privacy, accountability, transparency, distributed computing, and trusted elements, are identified. Available security mechanisms and safeguards to ensure TDP are discussed. This paper also summarizes the challenges to achieve TDP and provides a practical guidance to achieve TDP through the integration with NIST Cybersecurity Framework.
CITATION STYLE
Wang, Y., Ragothaman, K., & Shakya, B. (2021). Towards trusted data processing for information and intelligence systems. In Proceedings of the Annual Hawaii International Conference on System Sciences (Vol. 2020-January, pp. 6242–6251). IEEE Computer Society. https://doi.org/10.24251/hicss.2021.753
Mendeley helps you to discover research relevant for your work.