Telemetry Post-Processing in the Clouds: A Data Security Challenge
Author
Kalibjian, J. R.Affiliation
Hewlett Packard CorporationIssue Date
2011-10Keywords
Data securitynetwork security
cloud computing
Enterprise Rights Management (ERM)
Enterprise Key Management (EKM)
Data Loss Prevention (DLP)
Database Activity Monitoring (DAM)
tokenization
Metadata
Show full item recordRights
Copyright © held by the author; distribution rights International Foundation for TelemeteringCollection Information
Proceedings from the International Telemetering Conference are made available by the International Foundation for Telemetering and the University of Arizona Libraries. Visit http://www.telemetry.org/index.php/contact-us if you have questions about items in this collection.Abstract
As organizations move toward cloud [1] computing environments, data security challenges will begin to take precedence over network security issues. This will potentially impact telemetry post processing in a myriad of ways. After reviewing how data security tools like Enterprise Rights Management (ERM), Enterprise Key Management (EKM), Data Loss Prevention (DLP), Database Activity Monitoring (DAM), and tokenization are impacting cloud security, their effect on telemetry post-processing will also be examined. An architecture will be described detailing how these data security tools can be utilized to make telemetry post-processing environments in the cloud more robust.Sponsors
International Foundation for TelemeteringISSN
0884-51230074-9079