Contact Us For Advertising & Marketing Services Find out More

Microsoft Outlines Plans for Cloud and Big Data

Scott Charney, corporate vice president of Microsoft Trustworthy Computing, has shared his vision for the road ahead as society and computing intersect in an increasingly interconnected world.

In a new paper, “Trustworthy Computing (TwC) Next,” announced Tuesday, Feb. 28, Charney encouraged industry and governments to develop more effective privacy principles focused on use and accountability, improve end-to-end reliability of cloud services through increased fault modeling and standards efforts, and adopt more holistic security strategies including improved hygiene and greater attention to detection and containment.

[ Also Read: How Asian Companies Address Security Threats ]

Ten years ago, the computing ecosystem was at a crossroads when Bill Gates introduced TwC and called for industry collaboration. Today, technology and society are more interconnected than ever.

Big data’s strain on privacy protection, the shifting relationship between government and the Internet, and the evolving threat model all raise new challenges for industry and governments globally.

[ Also Read: EMC to Open Cloud and Big Data R&D Center in Russia ]

“We are at another inflection point, with expectations for better security, privacy and reliability growing at an exponential rate,” Charney said. “Now is the time for industry and governments to develop and adopt strategies and policies that balance business and societal needs with individuals’ choices.”

The proliferation of devices and cloud services has resulted in a massive aggregation of global data, also known as big data.

While offering many potential societal benefits, this collection of data poses unique challenges. From a security perspective, big data represents a valuable target for attackers. As the cloud and devices become more integrated with society, people also become increasingly dependent on the reliability and availability of data and services to function.

[ Also Read: How Microsoft Plans to Sell Cloud to Companies ]

Finally, the massive increase in the amount and types of data available for collection, analysis and dissemination has strained traditional rules to protect privacy.

Companies must improve their basic hygiene approach to counter the opportunistic threats and make even persistent and determined adversaries work harder. This can be accomplished by designing systems not just to prevent attacks and recover from them, but also to detect successful attackers quickly and contain them so that their unauthorized access or disruption is limited.

[ Also Read: Ali Shadman Reveals the Secrets of Cloud Computing ]

This new paradigm of protect, detect, contain and recover can serve as a practical foundation for managing risk in the age of persistent and determined adversaries.

The advent of big data has also been challenging for governments. Any transformative technological change that recasts the way people live will engender deeper government engagement.

This is because governments’ relationship with the Internet is a complex one. In the TwC Next white paper, Charney said governments globally are simultaneously users of the Internet, protectors of individual users as well as the Internet itself, and exploiters that capitalize on the power of technology for a variety of purposes.

[ Also Read: How to Use E-Governance to Deal with Corruption ]

In times of need, governments may use online services to keep citizens informed, and first responders can react more effectively than those not using cloud-based services because they have GPS devices, mapping capabilities, street views, videoconferencing and other cloud-based services. Such benefits only materialize, however, if these systems meet reasonable expectations of overall service reliability.

Recognizing this fact, governments may play an increasingly active role in many aspects of the Internet. Some nations are looking at legislatively mandating the adoption of information risk-management plans for those managing information and computing systems.

Photo courtesy: Microsoft

Leave a Reply

Your email address will not be published. Required fields are marked *



HTML tags are not allowed.