Towards trusted data processing for information and intelligence systems

2Citations
Citations of this article
10Readers
Mendeley users who have this article in their library.

Abstract

Data is a valued asset and its security is essential for any enterprise and organization. This paper introduces Trusted Data Processing (TDP) and addresses three fundamental questions in TDP: 1) what are the essential requirements to achieve TDP? 2) what security mechanisms and safeguards are available to ensure TDP? 3) how to integrate TDP to practice? Based on the attacks targeting at data assets and their consequences, the requirements to achieve TDP, including data security, data privacy, accountability, transparency, distributed computing, and trusted elements, are identified. Available security mechanisms and safeguards to ensure TDP are discussed. This paper also summarizes the challenges to achieve TDP and provides a practical guidance to achieve TDP through the integration with NIST Cybersecurity Framework.

Cite

CITATION STYLE

APA

Wang, Y., Ragothaman, K., & Shakya, B. (2021). Towards trusted data processing for information and intelligence systems. In Proceedings of the Annual Hawaii International Conference on System Sciences (Vol. 2020-January, pp. 6242–6251). IEEE Computer Society. https://doi.org/10.24251/hicss.2021.753

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free