Upload
elsa-prieto
View
66
Download
0
Embed Size (px)
Citation preview
01-12-2016.
“Securing outsourced financial data in untrusted domains”
BDVA Summit Valencia
How Big Data is transforming the Finance Sector
Elsa Prieto.
Head of Financial Services sector.
Atos Research & Innovation.
2 2 empoWering prIvacy and securiTy in non-trusteD envirOnMents
Content 1) Problem statement
2) What is WITDOM?
3) WITDOM FS scenario
overview
4) Towards an E2E security
framework
5) WITDOM architecture
(Big Data)
6) Project facts
WITDOM Problem Statement
Storage/ Data processing
CLOUD PROVIDER
Untrusted domain (i.e: public cloud)
Trusted domain (i.e: private cloud)
End-users
Public Institution Regulator
3rd parties
IT INFRASTRUCTURE
Operations
Internal users
Protected data
Requests
External users
What is WITDOM?
Framework for end-to-end protection of outsourced data in untrusted ICT-based environments.
Framework
Protection Building blocks
Reference Implementations
Guidelines
Platform
Scenarios
Metrics
General Outcomes Practical Level Implementation Level
Credit card transaction fraud detection and prevention
Credit risk scoring
Cash flow forecasting
Per fraud type
Credit Card Transaction Fraud Scoring
Transactions Fraud
detected
Fraud scoring model
New transaction
Fraud scoring model
Fraud assessment
New & Previous
transactions
Fraud assessment
Deny Review Approve
The pink line is “the
model”
Model Application Business Assessment
ANN
Credit risk scoring - Behavioural
Credit risk model
Customer data Credit risk
model
Customer’s probability of
Default
Customer data Customer’s
probability of Default
Marketing Special measures Regulatory capital
Per customer segment
Multivariate Linear
Regression
Defaulting detected
Customer data
Cash flow forecasting
Transactions
Customer model
Customer model
Global model
Adjusted model
Model extraction
Payers & Payees Adjusted
model
Model adjustment
Customer’s current financial
position
Forecasting
Customer’s forecasted financial
position
Towards an E2E security framework
WITDOM scenarios
Requirements: scenario, legal, technical
Common architecture
Preliminary toolset & platform
Use-case architectures
Preliminary prototypes
Prototypes evaluation
Final prototypes and platform
Y1 (2015)
Y2 (2016)
Y3 (2017)
WITDOM Architecture
Trusted domain
KM
Untrusted domain
PO
Broker IAM
Services Applications
Broker
Secured Services
SSP Anonym.
Masking
Integrity SC
E2EE
SSP
Masking
Integrity SC
E2EE
Core components (platform)
Protection components
Applications & services
Transformer
Storage Secured Storage
KM
Transformer
Towards an E2E security framework
WITDOM scenarios
Requirements: scenario, legal, technical
Common architecture
Preliminary toolset & platform
Use-case architectures
Preliminary prototypes
Prototypes evaluation
Final prototypes and platform
Y1 (2015)
Y2 (2016)
Y3 (2017)
WITDOM: “empoWering prIvacy and securiTy in non-trusteD envirOnMents”.
Research and Innovation Action.
Call 1 of the H2020-ICT-2014-1
ICT-32-2014 - topic of Cybersecurity, Trustworthy ICT
Project No. 644371
Started in January 2015. Duration: 36 months
Overall project budget: 4 million euro.
WITDOM consortium: 7 different organizations from 5 European countries
Project Facts
Thank you very much for your attention!
Partners
Contact
Elsa Prieto (Atos)
WITDOM coordinator
@eprieper
This project has received funding from the European Union’s Horizon 2020 research and innovation programme under grant agreement No. 64437. This work was supported in part by the Swiss State Secretariat for Education, Research and Innovation under contract No. 15.0098. The opinions expressed and arguments employed herein do not necessarily reflect the official views of the European Commission or the Swiss Government.
witdom.eu
https://twitter.com/W1TD0M
https://www.linkedin.com/groups/8257514