Block Chain Record Management

Please download to get full document.

View again

of 15
62 views
All materials on our website are shared by users. If you have any questions about copyright issues, please report us to resolve them. We are always happy to assist you.

Download

Document Related
Document Description
1. Block Chain Records Management The Secure Records management Service 4/10/2016 ALL RIGHTS RESERVED, VILLAGEMALL PTY LTD. 2. Records management? ã Records management…
Document Share
Document Transcript
  • 1. Block Chain Records Management The Secure Records management Service 4/10/2016 ALL RIGHTS RESERVED, VILLAGEMALL PTY LTD.
  • 2. Records management? • Records management (RM), also known as records and information management or RIM, is the professional practice of managing the records of an organization throughout their life cycle, from the time they are created to their eventual disposal. This includes identifying, classifying, storing, securing, retrieving, tracking and destroying or permanently preserving records. 4/10/2016 ALL RIGHTS RESERVED, VILLAGEMALL PTY LTD.
  • 3. The Digital World • Creating and capturing digital records, and associated metadata, into recordkeeping systems • Storing and securing digital records, including planning for disasters • Preserving digital records for as long as they are required; • Providing and restriction of access to digital records • Disposing of digital records in an approved manner • Protecting digital records from ransomware and other threats • Protecting digital records from unauthorized disclosure, theft, alteration or destruction 4/10/2016 ALL RIGHTS RESERVED, VILLAGEMALL PTY LTD.
  • 4. Why do we need secure Records Management • The medical/health care sector now leads all sectors in the number of records compromised to date in 2016. The sector has posted 36.1% (217) of all data breaches so far this year. The number of records exposed in these breaches totaled more than 12 million, or about 59.2% of the total so far in 2016. • The business sector accounts for nearly 2.5 million exposed records in 264 incidents. That represents 43.9% of the incidents, and 11.8% of the exposed records. • The government/military sector has suffered 38 data breaches so far this year, representing about 27.1% of the total number of records exposed and 6.3% of the incidents. More than 5.7 million records have been compromised in the government/military sector to date in 2016. 4/10/2016 ALL RIGHTS RESERVED, VILLAGEMALL PTY LTD.
  • 5. Characteristics • known level of assurance and hence risk • sits publicly on the internet (secrecy is not required to underpin security) • does not rely on any network security, VPN or firewalls • all data access is based upon well known and operational tested KMS • all access follows the well known compartmented security mode of operation • assume a BYOD as default environment, does not rely on controlled end points • supports industry standard CMS • support for custom meta data • support storage of arbitrary sized and content types within each record • all access to be enforced via Hardware based Security modules • mandatory security policy requiring all data is encrypted in transit and at rest • system will fail safe • support for industry standard records management dictionaries. • No centralized access control • Immune to Ransomware 4/10/2016 ALL RIGHTS RESERVED, VILLAGEMALL PTY LTD.
  • 6. Meta Data • Metadata is generally categorized into four or five groupings based on the information the metadata captures, as described below: • Descriptive Metadata: Metadata that describes the intellectual content of a resource and used for the indexing, discovery and identification of a digital resource. • Administrative Metadata: Metadata that includes management information about the digital resource, such as ownership and rights management. • Structural Metadata: Metadata that is used to display and navigate digital resources and describes relationships between multiple digital files, such as page order in a digitized book. • Technical Metadata: Metadata that describes the features of the digital file, such as resolution, pixel dimension and hardware. The information is critical for migration and long- term sustainability of the digital resource. • Preservation Metadata: Metadata that specifically captures information that helps facilitate management and access to digital files over time. This inherently includes descriptive, administrative, structural, and technical metadata elements that focus on the provenance, authenticity, preservation activity, technical environment, and rights management of an object. 4/10/2016 ALL RIGHTS RESERVED, VILLAGEMALL PTY LTD.
  • 7. ACID Properties of a Record • A- Atomicity: requires that each transaction be "all or nothing": if one part of the transaction fails, then the entire transaction fails, and the store state is left unchanged. An atomic system must guarantee atomicity in each and every situation, including power failures, errors, and crashes. To the outside world, a committed record appears (by its effects on the contained records) to be indivisible ("atomic"), and an aborted record does not happen.; • C- Consistency: property ensures that any transaction will bring the record from one valid state to another. Any data written must be valid according to all defined rules. This does not guarantee correctness of the transaction, merely that any programming errors cannot result in the violation of any defined rules. The RMS is effectively a "write once" data store, and hence only has a single state. Data destruction is achieved via destruction of the record key, the RMS will always remain immutable set of records under all operational use cases. • I- Isolation: property ensures that the concurrent execution of transactions results in a system state that would be obtained if transactions were executed serially, i.e., one after the other. Providing isolation is the main goal of concurrency control. as the effects of an incomplete transaction might not even be visible to another transaction. A block chain by definition enforces serial ability of all records, combined with immutability ensures isolation between records. • D- Durability: property ensures that once a transaction has been committed, it will remain so, even in the event of power loss, crashes, or errors. Persistence of data across physically dispersed locations enhances durability, of the immutable RMS. 4/10/2016 ALL RIGHTS RESERVED, VILLAGEMALL PTY LTD.
  • 8. Ransom-ware Defeated 4/10/2016 ALL RIGHTS RESERVED, VILLAGEMALL PTY LTD. Finally a solution which protects against ransom ware ( its an immutable record), with zero additional costs or change to data workflows.
  • 9. Enterprise Solution • Distributed denial-of-service (DDOS) • All solutions include protection from distributed denial-of-service as part of the service fabric. • Resiliency • All solutions include the ability to manage traffic with throttling to withstand the operational traffic spikes. • Hardware Secured 4/10/2016 ALL RIGHTS RESERVED, VILLAGEMALL PTY LTD.
  • 10. De-centralised Access Control • Based on a decentralized Key Management system, there is no centralized keys ever. • Support for wide range of record recovery use cases, including mobile platform recovery. • In the health records use case, the individuals personal RMS is completely under the exclusive control of the individual, there is no "big brother" control and no unauthorized access possible • Records Management System, and all operators have zero access to any record encryption keys, there is no single point of records compromise 4/10/2016 ALL RIGHTS RESERVED, VILLAGEMALL PTY LTD.
  • 11. The Global secure, messaging and record distribution system, has been designed to provide a universal rail for Government, Military, Corporate and Individuals. 4/10/2016 ALL RIGHTS RESERVED, VILLAGEMALL PTY LTD.
  • 12. The Block Chain Records Management • Block Chain Technology + • Network Stack + • HSM protected Keys + • Cryptographic Protocols 4/10/2016 ALL RIGHTS RESERVED, VILLAGEMALL PTY LTD.
  • 13. Records Privacy • All parties Identified via Secure Identities (SIN) • Supports P2P, P2MP EC P384-AES256 encryption • Need to know, enforced by distributed Key Management System, not centralized access control lists • All records encrypted at rest • Fail safe design 4/10/2016 ALL RIGHTS RESERVED, VILLAGEMALL PTY LTD.
  • 14. Application Datagram Protocol (ADP) • Runs on top of any type of network • Short Packets of data called datagrams • Operates in a “self contained independent entity of data carrying sufficient information to be delivered to the destination without reliance on previous exchanges between this source and destination” • Connectionless, no session management, or Schannel/VPN required. • Supports stateless, datagram encryption via Content Messaging Syntax (CMS), Suite B and EC Public keys 4/10/2016 ALL RIGHTS RESERVED, VILLAGEMALL PTY LTD.
  • 15. Availability • Available as a licensed private cloud solution • Private cloud owned and operated by organization • Optional Managed Private Cloud • SDK for client end application integration • Suitable for PC and mobile platforms 4/10/2016 ALL RIGHTS RESERVED, VILLAGEMALL PTY LTD.
  • Search Related
    Previous Slide

    F4 tugas puskesmas

    Next Slide

    Vol 5632007165

    We Need Your Support
    Thank you for visiting our website and your interest in our free products and services. We are nonprofit website to share and download documents. To the running of this website, we need your help to support us.

    Thanks to everyone for your continued support.

    No, Thanks