Click here to close now.


Related Topics: @CloudExpo, Java IoT, Microservices Expo, Containers Expo Blog, Apache, Cloud Security

@CloudExpo: Article

Why Security Matters for Big Data and Health Care

Data integrity requires good data security

Data is quickly becoming one of those certainties in life, like death and taxes. It'll always be there, and like the Once-ler's Thneed factory from The Lorax (sorry, I have kids), data figures to keep on biggering, and biggering, and biggering and biggering.

More data means more knowledge, greater insights, smarter ideas and expanded opportunities for organizations to harness and learn from their data. Banks, retailers and even government are embracing big data, but while IDC estimated the big data market at $2.2 billion in 2011, only 6% of that investment came from health care.

On the flip side, a 2011 report from McKinsey Global Institute suggests if health care in the U.S. used big data to drive efficiency and quality, the potential could be more than $300 billion in value every year.

So big data investment by health care is small and growing, but the potential is significant. To realize that potential requires data to be secured and protected at all times, assuring information accuracy and integrity. A major concern with big data systems is their inherent lack of security. A typical NoSQL data store lacks a number of key security features that are available in traditional databases or provided by a third-party security vendors. This is going to be a big issue and potential barrier to entry for big data moving forward.

Consider this case of an urban health care facility just outside of Washington D.C., where the emergency room was experiencing an alarmingly high rate of returning patients.  To determine the root cause of the situation, researchers sifted through data collected from more than 300,000 ER visits. By correlating seemingly unrelated information, they were able to surmise that the length of stay of a patient was a key factor in determining whether they would make a return trip to the ER. Now doctors can determine the likelihood that a patient will need to be readmitted to the ER and tailor their follow-ups accordingly.

Just imagine if this data had been skewed either by a rogue insider with access to the data or by a malicious actor outside the hospital. Researchers would have come back with an entirely different view of the problem and perhaps a less effective solution.

This underscores the importance of securing big data through a layered approach that employs firewalls, authentication, patch and configuration management, antivirus and event monitoring tools.

Ultimately, the safest thing a health care provider can do to maintain data integrity, limit access to sensitive material and enable HIPAA-HITECH compliance is to encrypt all data at rest. By encrypting data, storing the keys in a separate, secure environment and enforcing tight controls governing who (or what) can access the encryption keys, organizations can create a hardened barrier around their sensitive data.

In the event of a device theft - currently the most common type of data breach in health care due to the high number of mobile devices storing unprotected health records - encryption ensures data cannot be read by unauthorized parties, while access controls restrict data from third-party vendors like cloud or SaaS providers.

To secure regulated HIPAA data stored in popular big data stores such as Hadoop, it's important to use a Linux encryption tool that offers the aforementioned features and does not impact the performance of the rapid-fire MapReduce queries that make big data technology so valuable in the first place.

The bottom line is, there needs to be some middle ground where patients feel their protected health information is secure, while hospitals and research organizations have the access and ability to conduct big data analyses that improve the quality of the care they're providing.

After all, as my friend the Once-ler once might have said, good health care is what everyone, everyone, EVERYONE needs.

More Stories By David Tishgart

After spending years at large corporations including Dell, AMD and BMC, David Tishgart joined the startup ranks leading product marketing for Gazzang. Focused on security for big data, he helps communicate the benefits and challenges that big data can present, offering practical solutions. When not ranting about encryption and key management, you can find David clamoring for a big data application that can fine tune his fantasy football team.

Latest Stories
Docker is hot. However, as Docker container use spreads into more mature production pipelines, there can be issues about control of Docker images to ensure they are production-ready. Is a promotion-based model appropriate to control and track the flow of Docker images from development to production? In his session at DevOps Summit, Fred Simon, Co-founder and Chief Architect of JFrog, will demonstrate how to implement a promotion model for Docker images using a binary repository, and then show h...
The enterprise is being consumerized, and the consumer is being enterprised. Moore's Law does not matter anymore, the future belongs to business virtualization powered by invisible service architecture, powered by hyperscale and hyperconvergence, and facilitated by vertical streaming and horizontal scaling and consolidation. Both buyers and sellers want instant results, and from paperwork to paperless to mindless is the ultimate goal for any seamless transaction. The sweetest sweet spot in innov...
Containers have changed the mind of IT in DevOps. They enable developers to work with dev, test, stage and production environments identically. Containers provide the right abstraction for microservices and many cloud platforms have integrated them into deployment pipelines. DevOps and Containers together help companies to achieve their business goals faster and more effectively.
The buzz continues for cloud, data analytics and the Internet of Things (IoT) and their collective impact across all industries. But a new conversation is emerging - how do companies use industry disruption and technology enablers to lead in markets undergoing change, uncertainty and ambiguity? Organizations of all sizes need to evolve and transform, often under massive pressure, as industry lines blur and merge and traditional business models are assaulted and turned upside down. In this new da...
Containers have changed the mind of IT in DevOps. They enable developers to work with dev, test, stage and production environments identically. Containers provide the right abstraction for microservices and many cloud platforms have integrated them into deployment pipelines. DevOps and containers together help companies achieve their business goals faster and more effectively. In his session at DevOps Summit, Ruslan Synytsky, CEO and Co-founder of Jelastic, will review the current landscape of...
The Internet of Things (IoT) is growing rapidly by extending current technologies, products and networks. By 2020, Cisco estimates there will be 50 billion connected devices. Gartner has forecast revenues of over $300 billion, just to IoT suppliers. Now is the time to figure out how you’ll make money – not just create innovative products. With hundreds of new products and companies jumping into the IoT fray every month, there’s no shortage of innovation. Despite this, McKinsey/VisionMobile data...
Today’s connected world is moving from devices towards things, what this means is that by using increasingly low cost sensors embedded in devices we can create many new use cases. These span across use cases in cities, vehicles, home, offices, factories, retail environments, worksites, health, logistics, and health. These use cases rely on ubiquitous connectivity and generate massive amounts of data at scale. These technologies enable new business opportunities, ways to optimize and automate, al...
Too often with compelling new technologies market participants become overly enamored with that attractiveness of the technology and neglect underlying business drivers. This tendency, what some call the “newest shiny object syndrome,” is understandable given that virtually all of us are heavily engaged in technology. But it is also mistaken. Without concrete business cases driving its deployment, IoT, like many other technologies before it, will fade into obscurity.
The IoT is upon us, but today’s databases, built on 30-year-old math, require multiple platforms to create a single solution. Data demands of the IoT require Big Data systems that can handle ingest, transactions and analytics concurrently adapting to varied situations as they occur, with speed at scale. In his session at @ThingsExpo, Chad Jones, chief strategy officer at Deep Information Sciences, will look differently at IoT data so enterprises can fully leverage their IoT potential. He’ll sha...
Today air travel is a minefield of delays, hassles and customer disappointment. Airlines struggle to revitalize the experience. GE and M2Mi will demonstrate practical examples of how IoT solutions are helping airlines bring back personalization, reduce trip time and improve reliability. In their session at @ThingsExpo, Shyam Varan Nath, Principal Architect with GE, and Dr. Sarah Cooper, M2Mi's VP Business Development and Engineering, will explore the IoT cloud-based platform technologies driv...
DevOps has often been described in terms of CAMS: Culture, Automation, Measuring, Sharing. While we’ve seen a lot of focus on the “A” and even on the “M”, there are very few examples of why the “C" is equally important in the DevOps equation. In her session at @DevOps Summit, Lori MacVittie, of F5 Networks, will explore HTTP/1 and HTTP/2 along with Microservices to illustrate why a collaborative culture between Dev, Ops, and the Network is critical to ensuring success.
There are many considerations when moving applications from on-premise to cloud. It is critical to understand the benefits and also challenges of this migration. A successful migration will result in lower Total Cost of Ownership, yet offer the same or higher level of robustness. Migration to cloud shifts computing resources from your data center, which can yield significant advantages provided that the cloud vendor an offer enterprise-grade quality for your application.
Overgrown applications have given way to modular applications, driven by the need to break larger problems into smaller problems. Similarly large monolithic development processes have been forced to be broken into smaller agile development cycles. Looking at trends in software development, microservices architectures meet the same demands. Additional benefits of microservices architectures are compartmentalization and a limited impact of service failure versus a complete software malfunction....
There will be 20 billion IoT devices connected to the Internet soon. What if we could control these devices with our voice, mind, or gestures? What if we could teach these devices how to talk to each other? What if these devices could learn how to interact with us (and each other) to make our lives better? What if Jarvis was real? How can I gain these super powers? In his session at 17th Cloud Expo, Chris Matthieu, co-founder and CTO of Octoblu, will show you!
As a CIO, are your direct reports IT managers or are they IT leaders? The hard truth is that many IT managers have risen through the ranks based on their technical skills, not their leadership ability. Many are unable to effectively engage and inspire, creating forward momentum in the direction of desired change. Renowned for its approach to leadership and emphasis on their people, organizations increasingly look to our military for insight into these challenges.