Nist special Publication XXX-XXX draft nist big Data Interoperability Framework: Volume 4, Security and Privacy


Education: Common Core Student Performance Reporting



Yüklə 317,65 Kb.
səhifə17/19
tarix02.08.2018
ölçüsü317,65 Kb.
#66313
1   ...   11   12   13   14   15   16   17   18   19

7.9Education: Common Core Student Performance Reporting


Cradle-to-grave student performance metrics for every student are now possible—at least within the K-12 community, and probably beyond. This could include every test result ever administered.

Table 10: Mapping Common Core K–12 Student Reporting to the Reference Architecture



NBDRA Component and Interfaces

Security and Privacy Topic

Use Case Mapping

Data Provider → Application Provider

End-point input validation

Application-dependent. Spoofing is possible.

Real-time security monitoring

Vendor-specific monitoring of tests, test-takers, administrators, and data.

Data discovery and classification

Unknown

Secure data aggregation

Typical: Classroom-level.

Application Provider → Data Consumer

Privacy-preserving data analytics

Various: For example, teacher-level analytics across all same-grade classrooms.

Compliance with regulations

Parent, student, and taxpayer disclosure and privacy rules apply.

Government access to data and freedom of expression concerns

Yes. May be required for grants, funding, performance metrics for teachers, administrators, and districts.

Data Provider ↔

Framework Provider



Data-centric security such as identity/policy-based encryption

Support both individual access (student) and partitioned aggregate.

Policy management for access control

Vendor (e.g., Pearson) controls, state-level policies, federal-level policies; probably 20-50 different roles are spelled out at present

Computing on the encrypted data: searching/filtering/deduplicate/fully homomorphic encryption

Proposed 36

Audits

Support both internal and third-party audits by unions, state agencies, responses to subpoenas.

Framework Provider

Securing data storage and transaction logs

Large enterprise security, transaction level controls—classroom to the federal government.

Key management

CSOs from the classroom level to the national level.

Security best practices for non-relational data stores

---

Security against DDoS attacks

Standard.

Data provenance

Traceability to measurement event requires capturing tests at a point in time,which may itself require a Big Data platform

Fabric

Analytics for security intelligence

Various commercial security applications

Event detection

Various commercial security applications

Forensics

Various commercial security applications

7.10Sensor Data Storage and Analytics


Mapping is under development.

Table 11: Mapping Sensor Data Storage and Analytics to the Reference Architecture

NBDRA Component and Interfaces

Security and Privacy Topic

Use Case Mapping

Data Provider → Application Provider

End-point input validation




Real-time security monitoring




Data discovery and classification




Secure data aggregation




Application Provider → Data Consumer

Privacy-preserving data analytics




Compliance with regulations




Government access to data and freedom of expression concerns




Data Provider ↔

Framework Provider



Data-centric security such as identity/policy-based encryption




Policy management for access control




Computing on the encrypted data: searching/filtering/deduplicate/fully homomorphic encryption




Audits




Framework Provider

Securing data storage and transaction logs




Key management




Security best practices for non-relational data stores




Security against DoS attacks




Data provenance




Fabric

Analytics for security intelligence




Event detection




Forensics






Yüklə 317,65 Kb.

Dostları ilə paylaş:
1   ...   11   12   13   14   15   16   17   18   19




Verilənlər bazası müəlliflik hüququ ilə müdafiə olunur ©muhaz.org 2024
rəhbərliyinə müraciət

gir | qeydiyyatdan keç
    Ana səhifə


yükləyin