SlideShare a Scribd company logo
1 of 13
Download to read offline
01-12-2016.
“Securing outsourced financial data
in untrusted domains”
BDVA Summit Valencia
How Big Data is transforming the Finance Sector
Elsa Prieto.
Head of Financial Services sector.
Atos Research & Innovation.
22empoWering prIvacy and securiTy in non-trusteD envirOnMents
Content
1) Problem statement
2) What is WITDOM?
3) WITDOM FS scenario
overview
4) Towards an E2E security
framework
5) WITDOM architecture
(Big Data)
6) Project facts
WITDOM Problem Statement
Storage/
Data processing
CLOUD PROVIDER
Untrusted domain
(i.e: public cloud)
Trusted domain
(i.e: private cloud)
End-users
Public Institution
Regulator
3rd parties
IT INFRASTRUCTURE
Operations
Internal users
Protected
data
Requests
External
users
What is WITDOM?
Framework for end-to-end protection of outsourced
data in untrusted ICT-based environments.
Framework
Protection Building blocks
Reference
Implementations
Guidelines
Platform
Scenarios
Metrics
General Outcomes Practical Level Implementation Level
Credit card transaction fraud
detection and prevention
Credit risk scoring
Cash flow forecasting
Per fraud type
Credit Card Transaction Fraud Scoring
Transactions
Fraud
detected
Fraud scoring
model
New
transaction
Fraud scoring
model
Fraud
assessment
New &
Previous
transactions
Fraud
assessment
Deny
Review
Approve
The pink line is “the
model”
Model Application Business Assessment
ANN
Credit risk scoring - Behavioural
Credit risk
model
Customer data
Credit risk
model
Customer’s
probability of
Default
Customer data
Customer’s
probability of
Default
Marketing
Special measures
Regulatory capital
Per customer segment
Multivariate
Linear
Regression
Defaulting
detected
Customer data
Cash flow forecasting
Transactions
Customer
model
Customer
model
Global model
Adjusted
model
Model
extraction
Payers & Payees
Adjusted
model
Model
adjustment
Customer’s
current financial
position
Forecasting
Customer’s
forecasted financial
position
Towards an E2E security framework
WITDOM scenarios
Requirements: scenario, legal, technical
Common architecture
Preliminary toolset & platform
Use-case architectures
Preliminary prototypes
Prototypes evaluation
Final prototypes and platform
Y1
(2015)
Y2
(2016)
Y3
(2017)
WITDOM Architecture
Trusted domain
KM
Untrusted domain
PO
BrokerIAM
Services Applications
Broker
Secured Services
SSP Anonym.
Masking
IntegritySC
E2EE
SSP
Masking
IntegritySC
E2EE
Core components (platform)
Protection components
Applications & services
Transformer
Storage Secured
Storage
KM
Transformer
Towards an E2E security framework
WITDOM scenarios
Requirements: scenario, legal, technical
Common architecture
Preliminary toolset & platform
Use-case architectures
Preliminary prototypes
Prototypes evaluation
Final prototypes and platform
Y1
(2015)
Y2
(2016)
Y3
(2017)
 WITDOM: “empoWering prIvacy and securiTy in non-
trusteD envirOnMents”.
 Research and Innovation Action.
 Call 1 of the H2020-ICT-2014-1
 ICT-32-2014 - topic of Cybersecurity, Trustworthy ICT
 Project No. 644371
 Started in January 2015. Duration: 36 months
 Overall project budget: 4 million euro.
 WITDOM consortium: 7 different organizations from 5
European countries
Project Facts
Thank you very much for your attention!
Partners
Contact
Elsa Prieto (Atos)
WITDOM coordinator
elsa.prieto@atos.net
@eprieper
This project has received funding from the European Union’s Horizon 2020 research and innovation programme under grant
agreement No. 64437. This work was supported in part by the Swiss State Secretariat for Education, Research and Innovation
under contract No. 15.0098. The opinions expressed and arguments employed herein do not necessarily reflect the official
views of the European Commission or the Swiss Government.
witdom.eu
https://twitter.com/W1TD0M
https://www.linkedin.com/groups/8257514

More Related Content

What's hot

CALL FOR PAPERS - 4th International Conference on Networks and Security (NSEC...
CALL FOR PAPERS - 4th International Conference on Networks and Security (NSEC...CALL FOR PAPERS - 4th International Conference on Networks and Security (NSEC...
CALL FOR PAPERS - 4th International Conference on Networks and Security (NSEC...pijans
 
13th International Conference on Network Security & Applications (CNSA 2020)
13th International Conference on Network Security &  Applications (CNSA 2020)13th International Conference on Network Security &  Applications (CNSA 2020)
13th International Conference on Network Security & Applications (CNSA 2020)IJNSA Journal
 
Call for Papers - 8th International Conference of Security, Privacy and Trust...
Call for Papers - 8th International Conference of Security, Privacy and Trust...Call for Papers - 8th International Conference of Security, Privacy and Trust...
Call for Papers - 8th International Conference of Security, Privacy and Trust...IJNSA Journal
 
6th International Conference on Cryptography and Information Security (CRIS 2...
6th International Conference on Cryptography and Information Security (CRIS 2...6th International Conference on Cryptography and Information Security (CRIS 2...
6th International Conference on Cryptography and Information Security (CRIS 2...IJNSA Journal
 
Design and implementation of a solution for remote data protection in safety-...
Design and implementation of a solution for remote data protection in safety-...Design and implementation of a solution for remote data protection in safety-...
Design and implementation of a solution for remote data protection in safety-...davidepiccardi
 
Turing Chain Pitch Deck (English)
Turing Chain Pitch Deck (English)Turing Chain Pitch Deck (English)
Turing Chain Pitch Deck (English)Yao-Chieh Hu
 
Needs of iccc conference
Needs of iccc conferenceNeeds of iccc conference
Needs of iccc conferenceVipin Tomar
 
Call for Papers - 15th International Conference on Network Security & Applica...
Call for Papers - 15th International Conference on Network Security & Applica...Call for Papers - 15th International Conference on Network Security & Applica...
Call for Papers - 15th International Conference on Network Security & Applica...IJNSA Journal
 
Ethical hacking, the way to get product & solution confidence and trust in an...
Ethical hacking, the way to get product & solution confidence and trust in an...Ethical hacking, the way to get product & solution confidence and trust in an...
Ethical hacking, the way to get product & solution confidence and trust in an...Pierre-Jean Verrando
 
FastLane - SC-900: Microsoft Security, Compliance, and Identity Fundamentals
FastLane - SC-900: Microsoft Security, Compliance, and Identity FundamentalsFastLane - SC-900: Microsoft Security, Compliance, and Identity Fundamentals
FastLane - SC-900: Microsoft Security, Compliance, and Identity FundamentalsRobert Gabos
 
Call for Papers - International Conference on Networks, Blockchain and Intern...
Call for Papers - International Conference on Networks, Blockchain and Intern...Call for Papers - International Conference on Networks, Blockchain and Intern...
Call for Papers - International Conference on Networks, Blockchain and Intern...IJNSA Journal
 
3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)
3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)
3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)ijcga
 
Call for Papers - International Conference on Big Data, Blockchain and Securi...
Call for Papers - International Conference on Big Data, Blockchain and Securi...Call for Papers - International Conference on Big Data, Blockchain and Securi...
Call for Papers - International Conference on Big Data, Blockchain and Securi...IJNSA Journal
 
3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)
3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)
3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)ijcga
 
CDE Marketplace Sept 2016: CountingLab Ltd (Autonomy & Big Data
CDE Marketplace Sept 2016: CountingLab Ltd (Autonomy & Big DataCDE Marketplace Sept 2016: CountingLab Ltd (Autonomy & Big Data
CDE Marketplace Sept 2016: CountingLab Ltd (Autonomy & Big DataDefence and Security Accelerator
 
The NIS directive: Yet another expensive legality or an opportunity to improv...
The NIS directive: Yet another expensive legality or an opportunity to improv...The NIS directive: Yet another expensive legality or an opportunity to improv...
The NIS directive: Yet another expensive legality or an opportunity to improv...Rayna Stamboliyska
 
No More Dark Clouds: A Privacy Preserving Framework for the Cloud
No More Dark Clouds: A Privacy Preserving Framework for the CloudNo More Dark Clouds: A Privacy Preserving Framework for the Cloud
No More Dark Clouds: A Privacy Preserving Framework for the CloudPaaSword EU Project
 
International Conference on Big Data, Blockchain and Security (BDBS 2020)
International Conference on Big Data, Blockchain and Security (BDBS 2020)International Conference on Big Data, Blockchain and Security (BDBS 2020)
International Conference on Big Data, Blockchain and Security (BDBS 2020)IJDKP
 
3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)
3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)
3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)ijcga
 
Call for papers - 13th International Conference on Network Security & Appli...
Call for papers -  13th International Conference on Network Security &  Appli...Call for papers -  13th International Conference on Network Security &  Appli...
Call for papers - 13th International Conference on Network Security & Appli...IJNSA Journal
 

What's hot (20)

CALL FOR PAPERS - 4th International Conference on Networks and Security (NSEC...
CALL FOR PAPERS - 4th International Conference on Networks and Security (NSEC...CALL FOR PAPERS - 4th International Conference on Networks and Security (NSEC...
CALL FOR PAPERS - 4th International Conference on Networks and Security (NSEC...
 
13th International Conference on Network Security & Applications (CNSA 2020)
13th International Conference on Network Security &  Applications (CNSA 2020)13th International Conference on Network Security &  Applications (CNSA 2020)
13th International Conference on Network Security & Applications (CNSA 2020)
 
Call for Papers - 8th International Conference of Security, Privacy and Trust...
Call for Papers - 8th International Conference of Security, Privacy and Trust...Call for Papers - 8th International Conference of Security, Privacy and Trust...
Call for Papers - 8th International Conference of Security, Privacy and Trust...
 
6th International Conference on Cryptography and Information Security (CRIS 2...
6th International Conference on Cryptography and Information Security (CRIS 2...6th International Conference on Cryptography and Information Security (CRIS 2...
6th International Conference on Cryptography and Information Security (CRIS 2...
 
Design and implementation of a solution for remote data protection in safety-...
Design and implementation of a solution for remote data protection in safety-...Design and implementation of a solution for remote data protection in safety-...
Design and implementation of a solution for remote data protection in safety-...
 
Turing Chain Pitch Deck (English)
Turing Chain Pitch Deck (English)Turing Chain Pitch Deck (English)
Turing Chain Pitch Deck (English)
 
Needs of iccc conference
Needs of iccc conferenceNeeds of iccc conference
Needs of iccc conference
 
Call for Papers - 15th International Conference on Network Security & Applica...
Call for Papers - 15th International Conference on Network Security & Applica...Call for Papers - 15th International Conference on Network Security & Applica...
Call for Papers - 15th International Conference on Network Security & Applica...
 
Ethical hacking, the way to get product & solution confidence and trust in an...
Ethical hacking, the way to get product & solution confidence and trust in an...Ethical hacking, the way to get product & solution confidence and trust in an...
Ethical hacking, the way to get product & solution confidence and trust in an...
 
FastLane - SC-900: Microsoft Security, Compliance, and Identity Fundamentals
FastLane - SC-900: Microsoft Security, Compliance, and Identity FundamentalsFastLane - SC-900: Microsoft Security, Compliance, and Identity Fundamentals
FastLane - SC-900: Microsoft Security, Compliance, and Identity Fundamentals
 
Call for Papers - International Conference on Networks, Blockchain and Intern...
Call for Papers - International Conference on Networks, Blockchain and Intern...Call for Papers - International Conference on Networks, Blockchain and Intern...
Call for Papers - International Conference on Networks, Blockchain and Intern...
 
3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)
3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)
3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)
 
Call for Papers - International Conference on Big Data, Blockchain and Securi...
Call for Papers - International Conference on Big Data, Blockchain and Securi...Call for Papers - International Conference on Big Data, Blockchain and Securi...
Call for Papers - International Conference on Big Data, Blockchain and Securi...
 
3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)
3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)
3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)
 
CDE Marketplace Sept 2016: CountingLab Ltd (Autonomy & Big Data
CDE Marketplace Sept 2016: CountingLab Ltd (Autonomy & Big DataCDE Marketplace Sept 2016: CountingLab Ltd (Autonomy & Big Data
CDE Marketplace Sept 2016: CountingLab Ltd (Autonomy & Big Data
 
The NIS directive: Yet another expensive legality or an opportunity to improv...
The NIS directive: Yet another expensive legality or an opportunity to improv...The NIS directive: Yet another expensive legality or an opportunity to improv...
The NIS directive: Yet another expensive legality or an opportunity to improv...
 
No More Dark Clouds: A Privacy Preserving Framework for the Cloud
No More Dark Clouds: A Privacy Preserving Framework for the CloudNo More Dark Clouds: A Privacy Preserving Framework for the Cloud
No More Dark Clouds: A Privacy Preserving Framework for the Cloud
 
International Conference on Big Data, Blockchain and Security (BDBS 2020)
International Conference on Big Data, Blockchain and Security (BDBS 2020)International Conference on Big Data, Blockchain and Security (BDBS 2020)
International Conference on Big Data, Blockchain and Security (BDBS 2020)
 
3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)
3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)
3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)
 
Call for papers - 13th International Conference on Network Security & Appli...
Call for papers -  13th International Conference on Network Security &  Appli...Call for papers -  13th International Conference on Network Security &  Appli...
Call for papers - 13th International Conference on Network Security & Appli...
 

Viewers also liked

Viewers also liked (16)

Моніт_Ярослав_Васильович
Моніт_Ярослав_ВасильовичМоніт_Ярослав_Васильович
Моніт_Ярослав_Васильович
 
Presentación2
Presentación2Presentación2
Presentación2
 
How To Eliminate Onclickads.net
How To Eliminate Onclickads.netHow To Eliminate Onclickads.net
How To Eliminate Onclickads.net
 
Godrej companies
Godrej companies Godrej companies
Godrej companies
 
Hoàn thiện công tác quản trị rủi ro tín dụng trong cho vay trung hạn đối với ...
Hoàn thiện công tác quản trị rủi ro tín dụng trong cho vay trung hạn đối với ...Hoàn thiện công tác quản trị rủi ro tín dụng trong cho vay trung hạn đối với ...
Hoàn thiện công tác quản trị rủi ro tín dụng trong cho vay trung hạn đối với ...
 
161202-Sarpsborg-WS
161202-Sarpsborg-WS161202-Sarpsborg-WS
161202-Sarpsborg-WS
 
Desde nuestra casa les deseamos
Desde nuestra casa les deseamosDesde nuestra casa les deseamos
Desde nuestra casa les deseamos
 
Overview
OverviewOverview
Overview
 
10 dhcp windows_asoitson
10 dhcp windows_asoitson10 dhcp windows_asoitson
10 dhcp windows_asoitson
 
Giải pháp nâng cao hiệu quả hoạt động huy động vốn tại ngân hàng thương mại c...
Giải pháp nâng cao hiệu quả hoạt động huy động vốn tại ngân hàng thương mại c...Giải pháp nâng cao hiệu quả hoạt động huy động vốn tại ngân hàng thương mại c...
Giải pháp nâng cao hiệu quả hoạt động huy động vốn tại ngân hàng thương mại c...
 
Seminario 3
Seminario 3Seminario 3
Seminario 3
 
Las plantas
Las plantasLas plantas
Las plantas
 
Promoción maestros 1969
Promoción maestros 1969Promoción maestros 1969
Promoción maestros 1969
 
21 dns linux_asoitson
21 dns linux_asoitson21 dns linux_asoitson
21 dns linux_asoitson
 
Reliability & Maintenance Dubai
Reliability & Maintenance DubaiReliability & Maintenance Dubai
Reliability & Maintenance Dubai
 
7. Semester speciale_JW [MASTER]
7. Semester speciale_JW [MASTER]7. Semester speciale_JW [MASTER]
7. Semester speciale_JW [MASTER]
 

Similar to 20161201 witdom bdva summit

Witdom overview 2016
Witdom overview 2016Witdom overview 2016
Witdom overview 2016Elsa Prieto
 
H2020 project WITDOM overview
H2020 project WITDOM overviewH2020 project WITDOM overview
H2020 project WITDOM overviewElsa Prieto
 
Cloud Services As An Enabler: the Strategic, Legal & Pragmatic Approach
Cloud Services As An Enabler: the Strategic, Legal & Pragmatic ApproachCloud Services As An Enabler: the Strategic, Legal & Pragmatic Approach
Cloud Services As An Enabler: the Strategic, Legal & Pragmatic ApproachSLA-Ready Network
 
20090620 CWID EDI-gateway (EDI) Identity Management (IDM) US
20090620 CWID EDI-gateway (EDI) Identity Management (IDM) US20090620 CWID EDI-gateway (EDI) Identity Management (IDM) US
20090620 CWID EDI-gateway (EDI) Identity Management (IDM) USKim Holm
 
Isaca atlanta ulf mattsson - do you have a roadmap for eu gdpr
Isaca atlanta   ulf mattsson - do you have a roadmap for eu gdprIsaca atlanta   ulf mattsson - do you have a roadmap for eu gdpr
Isaca atlanta ulf mattsson - do you have a roadmap for eu gdprUlf Mattsson
 
Vietnam Cyber Security Market 2018-2028 By Size, Share, Trends, Growth, Forecast
Vietnam Cyber Security Market 2018-2028 By Size, Share, Trends, Growth, ForecastVietnam Cyber Security Market 2018-2028 By Size, Share, Trends, Growth, Forecast
Vietnam Cyber Security Market 2018-2028 By Size, Share, Trends, Growth, ForecastVipin Mishra
 
Fintech Belgium_Webinar 3: Cybersecurity / Covid-19: Home Working Challenge ...
 Fintech Belgium_Webinar 3: Cybersecurity / Covid-19: Home Working Challenge ... Fintech Belgium_Webinar 3: Cybersecurity / Covid-19: Home Working Challenge ...
Fintech Belgium_Webinar 3: Cybersecurity / Covid-19: Home Working Challenge ...FinTech Belgium
 
Security Requirements in IoT Architecture
Security	Requirements	in	IoT	Architecture Security	Requirements	in	IoT	Architecture
Security Requirements in IoT Architecture Vrince Vimal
 
WITDOM Credit Risk Scoring use case at ISSE 2017
WITDOM Credit Risk Scoring use case at ISSE 2017WITDOM Credit Risk Scoring use case at ISSE 2017
WITDOM Credit Risk Scoring use case at ISSE 2017Elsa Prieto
 
Jun 15 privacy in the cloud at financial institutions at the object managemen...
Jun 15 privacy in the cloud at financial institutions at the object managemen...Jun 15 privacy in the cloud at financial institutions at the object managemen...
Jun 15 privacy in the cloud at financial institutions at the object managemen...Ulf Mattsson
 
IRJET - A Study on Smart Way for Securing IoT Devices
IRJET -  	  A Study on Smart Way for Securing IoT DevicesIRJET -  	  A Study on Smart Way for Securing IoT Devices
IRJET - A Study on Smart Way for Securing IoT DevicesIRJET Journal
 
ISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloudISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloudUlf Mattsson
 
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...Dalton Valadares
 
Internet of Things - Esper
Internet of Things - EsperInternet of Things - Esper
Internet of Things - EsperTarun Vashisth
 
Isaca atlanta - practical data security and privacy
Isaca atlanta - practical data security and privacyIsaca atlanta - practical data security and privacy
Isaca atlanta - practical data security and privacyUlf Mattsson
 
Cloud Forensics: Drawbacks in Current Methodologies and Proposed Solution
Cloud Forensics: Drawbacks in Current Methodologies and Proposed SolutionCloud Forensics: Drawbacks in Current Methodologies and Proposed Solution
Cloud Forensics: Drawbacks in Current Methodologies and Proposed SolutionIJERA Editor
 
Implications of GDPR for IoT Big Data Security and Privacy Fabric
Implications of GDPR for IoT Big Data Security and Privacy FabricImplications of GDPR for IoT Big Data Security and Privacy Fabric
Implications of GDPR for IoT Big Data Security and Privacy FabricMark Underwood
 
ITU-T Study Group 17 Introduction
ITU-T Study Group 17 IntroductionITU-T Study Group 17 Introduction
ITU-T Study Group 17 IntroductionITU
 
Data Analytics for Security Intelligence
Data Analytics for Security IntelligenceData Analytics for Security Intelligence
Data Analytics for Security IntelligenceData Driven Innovation
 

Similar to 20161201 witdom bdva summit (20)

Witdom overview 2016
Witdom overview 2016Witdom overview 2016
Witdom overview 2016
 
H2020 project WITDOM overview
H2020 project WITDOM overviewH2020 project WITDOM overview
H2020 project WITDOM overview
 
Cloud Services As An Enabler: the Strategic, Legal & Pragmatic Approach
Cloud Services As An Enabler: the Strategic, Legal & Pragmatic ApproachCloud Services As An Enabler: the Strategic, Legal & Pragmatic Approach
Cloud Services As An Enabler: the Strategic, Legal & Pragmatic Approach
 
20090620 CWID EDI-gateway (EDI) Identity Management (IDM) US
20090620 CWID EDI-gateway (EDI) Identity Management (IDM) US20090620 CWID EDI-gateway (EDI) Identity Management (IDM) US
20090620 CWID EDI-gateway (EDI) Identity Management (IDM) US
 
Isaca atlanta ulf mattsson - do you have a roadmap for eu gdpr
Isaca atlanta   ulf mattsson - do you have a roadmap for eu gdprIsaca atlanta   ulf mattsson - do you have a roadmap for eu gdpr
Isaca atlanta ulf mattsson - do you have a roadmap for eu gdpr
 
Vietnam Cyber Security Market 2018-2028 By Size, Share, Trends, Growth, Forecast
Vietnam Cyber Security Market 2018-2028 By Size, Share, Trends, Growth, ForecastVietnam Cyber Security Market 2018-2028 By Size, Share, Trends, Growth, Forecast
Vietnam Cyber Security Market 2018-2028 By Size, Share, Trends, Growth, Forecast
 
Fintech Belgium_Webinar 3: Cybersecurity / Covid-19: Home Working Challenge ...
 Fintech Belgium_Webinar 3: Cybersecurity / Covid-19: Home Working Challenge ... Fintech Belgium_Webinar 3: Cybersecurity / Covid-19: Home Working Challenge ...
Fintech Belgium_Webinar 3: Cybersecurity / Covid-19: Home Working Challenge ...
 
Security Requirements in IoT Architecture
Security	Requirements	in	IoT	Architecture Security	Requirements	in	IoT	Architecture
Security Requirements in IoT Architecture
 
WITDOM Credit Risk Scoring use case at ISSE 2017
WITDOM Credit Risk Scoring use case at ISSE 2017WITDOM Credit Risk Scoring use case at ISSE 2017
WITDOM Credit Risk Scoring use case at ISSE 2017
 
Jun 15 privacy in the cloud at financial institutions at the object managemen...
Jun 15 privacy in the cloud at financial institutions at the object managemen...Jun 15 privacy in the cloud at financial institutions at the object managemen...
Jun 15 privacy in the cloud at financial institutions at the object managemen...
 
Day 02 - EDPS Technology & Privacy unit.pdf
Day 02 - EDPS Technology & Privacy unit.pdfDay 02 - EDPS Technology & Privacy unit.pdf
Day 02 - EDPS Technology & Privacy unit.pdf
 
IRJET - A Study on Smart Way for Securing IoT Devices
IRJET -  	  A Study on Smart Way for Securing IoT DevicesIRJET -  	  A Study on Smart Way for Securing IoT Devices
IRJET - A Study on Smart Way for Securing IoT Devices
 
ISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloudISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloud
 
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...
 
Internet of Things - Esper
Internet of Things - EsperInternet of Things - Esper
Internet of Things - Esper
 
Isaca atlanta - practical data security and privacy
Isaca atlanta - practical data security and privacyIsaca atlanta - practical data security and privacy
Isaca atlanta - practical data security and privacy
 
Cloud Forensics: Drawbacks in Current Methodologies and Proposed Solution
Cloud Forensics: Drawbacks in Current Methodologies and Proposed SolutionCloud Forensics: Drawbacks in Current Methodologies and Proposed Solution
Cloud Forensics: Drawbacks in Current Methodologies and Proposed Solution
 
Implications of GDPR for IoT Big Data Security and Privacy Fabric
Implications of GDPR for IoT Big Data Security and Privacy FabricImplications of GDPR for IoT Big Data Security and Privacy Fabric
Implications of GDPR for IoT Big Data Security and Privacy Fabric
 
ITU-T Study Group 17 Introduction
ITU-T Study Group 17 IntroductionITU-T Study Group 17 Introduction
ITU-T Study Group 17 Introduction
 
Data Analytics for Security Intelligence
Data Analytics for Security IntelligenceData Analytics for Security Intelligence
Data Analytics for Security Intelligence
 

Recently uploaded

HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
High Profile Call Girls Dahisar Arpita 9907093804 Independent Escort Service ...
High Profile Call Girls Dahisar Arpita 9907093804 Independent Escort Service ...High Profile Call Girls Dahisar Arpita 9907093804 Independent Escort Service ...
High Profile Call Girls Dahisar Arpita 9907093804 Independent Escort Service ...Call girls in Ahmedabad High profile
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxhumanexperienceaaa
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 

Recently uploaded (20)

HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
High Profile Call Girls Dahisar Arpita 9907093804 Independent Escort Service ...
High Profile Call Girls Dahisar Arpita 9907093804 Independent Escort Service ...High Profile Call Girls Dahisar Arpita 9907093804 Independent Escort Service ...
High Profile Call Girls Dahisar Arpita 9907093804 Independent Escort Service ...
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 

20161201 witdom bdva summit

  • 1. 01-12-2016. “Securing outsourced financial data in untrusted domains” BDVA Summit Valencia How Big Data is transforming the Finance Sector Elsa Prieto. Head of Financial Services sector. Atos Research & Innovation.
  • 2. 22empoWering prIvacy and securiTy in non-trusteD envirOnMents Content 1) Problem statement 2) What is WITDOM? 3) WITDOM FS scenario overview 4) Towards an E2E security framework 5) WITDOM architecture (Big Data) 6) Project facts
  • 3. WITDOM Problem Statement Storage/ Data processing CLOUD PROVIDER Untrusted domain (i.e: public cloud) Trusted domain (i.e: private cloud) End-users Public Institution Regulator 3rd parties IT INFRASTRUCTURE Operations Internal users Protected data Requests External users
  • 4. What is WITDOM? Framework for end-to-end protection of outsourced data in untrusted ICT-based environments. Framework Protection Building blocks Reference Implementations Guidelines Platform Scenarios Metrics General Outcomes Practical Level Implementation Level Credit card transaction fraud detection and prevention Credit risk scoring Cash flow forecasting
  • 5. Per fraud type Credit Card Transaction Fraud Scoring Transactions Fraud detected Fraud scoring model New transaction Fraud scoring model Fraud assessment New & Previous transactions Fraud assessment Deny Review Approve The pink line is “the model” Model Application Business Assessment ANN
  • 6. Credit risk scoring - Behavioural Credit risk model Customer data Credit risk model Customer’s probability of Default Customer data Customer’s probability of Default Marketing Special measures Regulatory capital Per customer segment Multivariate Linear Regression Defaulting detected Customer data
  • 7. Cash flow forecasting Transactions Customer model Customer model Global model Adjusted model Model extraction Payers & Payees Adjusted model Model adjustment Customer’s current financial position Forecasting Customer’s forecasted financial position
  • 8. Towards an E2E security framework WITDOM scenarios Requirements: scenario, legal, technical Common architecture Preliminary toolset & platform Use-case architectures Preliminary prototypes Prototypes evaluation Final prototypes and platform Y1 (2015) Y2 (2016) Y3 (2017)
  • 9. WITDOM Architecture Trusted domain KM Untrusted domain PO BrokerIAM Services Applications Broker Secured Services SSP Anonym. Masking IntegritySC E2EE SSP Masking IntegritySC E2EE Core components (platform) Protection components Applications & services Transformer Storage Secured Storage KM Transformer
  • 10. Towards an E2E security framework WITDOM scenarios Requirements: scenario, legal, technical Common architecture Preliminary toolset & platform Use-case architectures Preliminary prototypes Prototypes evaluation Final prototypes and platform Y1 (2015) Y2 (2016) Y3 (2017)
  • 11.  WITDOM: “empoWering prIvacy and securiTy in non- trusteD envirOnMents”.  Research and Innovation Action.  Call 1 of the H2020-ICT-2014-1  ICT-32-2014 - topic of Cybersecurity, Trustworthy ICT  Project No. 644371  Started in January 2015. Duration: 36 months  Overall project budget: 4 million euro.  WITDOM consortium: 7 different organizations from 5 European countries Project Facts
  • 12. Thank you very much for your attention!
  • 13. Partners Contact Elsa Prieto (Atos) WITDOM coordinator elsa.prieto@atos.net @eprieper This project has received funding from the European Union’s Horizon 2020 research and innovation programme under grant agreement No. 64437. This work was supported in part by the Swiss State Secretariat for Education, Research and Innovation under contract No. 15.0098. The opinions expressed and arguments employed herein do not necessarily reflect the official views of the European Commission or the Swiss Government. witdom.eu https://twitter.com/W1TD0M https://www.linkedin.com/groups/8257514