01-12-2016.
“Securing outsourced financial data
in untrusted domains”
BDVA Summit Valencia
How Big Data is transforming the Finance Sector
Elsa Prieto.
Head of Financial Services sector.
Atos Research & Innovation.
22empoWering prIvacy and securiTy in non-trusteD envirOnMents
Content
1) Problem statement
2) What is WITDOM?
3) WITDOM FS scenario
overview
4) Towards an E2E security
framework
5) WITDOM architecture
(Big Data)
6) Project facts
WITDOM Problem Statement
Storage/
Data processing
CLOUD PROVIDER
Untrusted domain
(i.e: public cloud)
Trusted domain
(i.e: private cloud)
End-users
Public Institution
Regulator
3rd parties
IT INFRASTRUCTURE
Operations
Internal users
Protected
data
Requests
External
users
What is WITDOM?
Framework for end-to-end protection of outsourced
data in untrusted ICT-based environments.
Framework
Protection Building blocks
Reference
Implementations
Guidelines
Platform
Scenarios
Metrics
General Outcomes Practical Level Implementation Level
Credit card transaction fraud
detection and prevention
Credit risk scoring
Cash flow forecasting
Per fraud type
Credit Card Transaction Fraud Scoring
Transactions
Fraud
detected
Fraud scoring
model
New
transaction
Fraud scoring
model
Fraud
assessment
New &
Previous
transactions
Fraud
assessment
Deny
Review
Approve
The pink line is “the
model”
Model Application Business Assessment
ANN
Credit risk scoring - Behavioural
Credit risk
model
Customer data
Credit risk
model
Customer’s
probability of
Default
Customer data
Customer’s
probability of
Default
Marketing
Special measures
Regulatory capital
Per customer segment
Multivariate
Linear
Regression
Defaulting
detected
Customer data
Cash flow forecasting
Transactions
Customer
model
Customer
model
Global model
Adjusted
model
Model
extraction
Payers & Payees
Adjusted
model
Model
adjustment
Customer’s
current financial
position
Forecasting
Customer’s
forecasted financial
position
Towards an E2E security framework
WITDOM scenarios
Requirements: scenario, legal, technical
Common architecture
Preliminary toolset & platform
Use-case architectures
Preliminary prototypes
Prototypes evaluation
Final prototypes and platform
Y1
(2015)
Y2
(2016)
Y3
(2017)
WITDOM Architecture
Trusted domain
KM
Untrusted domain
PO
BrokerIAM
Services Applications
Broker
Secured Services
SSP Anonym.
Masking
IntegritySC
E2EE
SSP
Masking
IntegritySC
E2EE
Core components (platform)
Protection components
Applications & services
Transformer
Storage Secured
Storage
KM
Transformer
Towards an E2E security framework
WITDOM scenarios
Requirements: scenario, legal, technical
Common architecture
Preliminary toolset & platform
Use-case architectures
Preliminary prototypes
Prototypes evaluation
Final prototypes and platform
Y1
(2015)
Y2
(2016)
Y3
(2017)
 WITDOM: “empoWering prIvacy and securiTy in non-
trusteD envirOnMents”.
 Research and Innovation Action.
 Call 1 of the H2020-ICT-2014-1
 ICT-32-2014 - topic of Cybersecurity, Trustworthy ICT
 Project No. 644371
 Started in January 2015. Duration: 36 months
 Overall project budget: 4 million euro.
 WITDOM consortium: 7 different organizations from 5
European countries
Project Facts
Thank you very much for your attention!
Partners
Contact
Elsa Prieto (Atos)
WITDOM coordinator
elsa.prieto@atos.net
@eprieper
This project has received funding from the European Union’s Horizon 2020 research and innovation programme under grant
agreement No. 64437. This work was supported in part by the Swiss State Secretariat for Education, Research and Innovation
under contract No. 15.0098. The opinions expressed and arguments employed herein do not necessarily reflect the official
views of the European Commission or the Swiss Government.
witdom.eu
https://twitter.com/W1TD0M
https://www.linkedin.com/groups/8257514

20161201 witdom bdva summit

  • 1.
    01-12-2016. “Securing outsourced financialdata in untrusted domains” BDVA Summit Valencia How Big Data is transforming the Finance Sector Elsa Prieto. Head of Financial Services sector. Atos Research & Innovation.
  • 2.
    22empoWering prIvacy andsecuriTy in non-trusteD envirOnMents Content 1) Problem statement 2) What is WITDOM? 3) WITDOM FS scenario overview 4) Towards an E2E security framework 5) WITDOM architecture (Big Data) 6) Project facts
  • 3.
    WITDOM Problem Statement Storage/ Dataprocessing CLOUD PROVIDER Untrusted domain (i.e: public cloud) Trusted domain (i.e: private cloud) End-users Public Institution Regulator 3rd parties IT INFRASTRUCTURE Operations Internal users Protected data Requests External users
  • 4.
    What is WITDOM? Frameworkfor end-to-end protection of outsourced data in untrusted ICT-based environments. Framework Protection Building blocks Reference Implementations Guidelines Platform Scenarios Metrics General Outcomes Practical Level Implementation Level Credit card transaction fraud detection and prevention Credit risk scoring Cash flow forecasting
  • 5.
    Per fraud type CreditCard Transaction Fraud Scoring Transactions Fraud detected Fraud scoring model New transaction Fraud scoring model Fraud assessment New & Previous transactions Fraud assessment Deny Review Approve The pink line is “the model” Model Application Business Assessment ANN
  • 6.
    Credit risk scoring- Behavioural Credit risk model Customer data Credit risk model Customer’s probability of Default Customer data Customer’s probability of Default Marketing Special measures Regulatory capital Per customer segment Multivariate Linear Regression Defaulting detected Customer data
  • 7.
    Cash flow forecasting Transactions Customer model Customer model Globalmodel Adjusted model Model extraction Payers & Payees Adjusted model Model adjustment Customer’s current financial position Forecasting Customer’s forecasted financial position
  • 8.
    Towards an E2Esecurity framework WITDOM scenarios Requirements: scenario, legal, technical Common architecture Preliminary toolset & platform Use-case architectures Preliminary prototypes Prototypes evaluation Final prototypes and platform Y1 (2015) Y2 (2016) Y3 (2017)
  • 9.
    WITDOM Architecture Trusted domain KM Untrusteddomain PO BrokerIAM Services Applications Broker Secured Services SSP Anonym. Masking IntegritySC E2EE SSP Masking IntegritySC E2EE Core components (platform) Protection components Applications & services Transformer Storage Secured Storage KM Transformer
  • 10.
    Towards an E2Esecurity framework WITDOM scenarios Requirements: scenario, legal, technical Common architecture Preliminary toolset & platform Use-case architectures Preliminary prototypes Prototypes evaluation Final prototypes and platform Y1 (2015) Y2 (2016) Y3 (2017)
  • 11.
     WITDOM: “empoWeringprIvacy and securiTy in non- trusteD envirOnMents”.  Research and Innovation Action.  Call 1 of the H2020-ICT-2014-1  ICT-32-2014 - topic of Cybersecurity, Trustworthy ICT  Project No. 644371  Started in January 2015. Duration: 36 months  Overall project budget: 4 million euro.  WITDOM consortium: 7 different organizations from 5 European countries Project Facts
  • 12.
    Thank you verymuch for your attention!
  • 13.
    Partners Contact Elsa Prieto (Atos) WITDOMcoordinator elsa.prieto@atos.net @eprieper This project has received funding from the European Union’s Horizon 2020 research and innovation programme under grant agreement No. 64437. This work was supported in part by the Swiss State Secretariat for Education, Research and Innovation under contract No. 15.0098. The opinions expressed and arguments employed herein do not necessarily reflect the official views of the European Commission or the Swiss Government. witdom.eu https://twitter.com/W1TD0M https://www.linkedin.com/groups/8257514