Secure Collaboration in a Low-Trust Environment: Immutable Chain of Custody

Marc Zorn, Drew Orsinger, Charles Porter

Protecting against spoilers and theft of intellectual property isn't just the job of Security. For file-based workflows, the normal assumption (by outsiders) is that digital assets are just data, and handling is like traditional corporate IT, and Security mostly guarding infrastructure. The biggest challenge has been trying to regulate changes in every environment. Clearly, that effort is not sustainable or perhaps even achievable. Collaboration happens now in real-time, often with players in unknown locations. In the “content creation” world, it's about establishing tailored collaboration, and protecting the conditions of access. — What if data could protect itself, regardless of storage environment? Why can't we create and protect content using a zero-trust model? This paper reviews how the industry can create a content package of value with encryption and access security, transfer package to a collaboration space, track every access and contribution externally, maintain accountability through wide publication of activity and then transfer enhanced value back to content owner. — Learn how this low-trust model can free us from perpetual facility audits.

Published
2022-10
Content type
Original Research
Keywords
Immutable, Immutability, Forensics, Telemetry, Compliance, Accountability, Ledger, Tractiv, Traxion, Encryption, Permissioning, Data Usage, Data Control, Data Security, Data Transaction, Data Event, Data Integrity, Data Tracking, Data Tracing, Data Distribution, Security, Custody, Blockchain, Entitlement, Cloud, Cloud-Based, Zero-Trust, Tracking, Tracing, Audit, Facility Audit, Content Creation, Infrastructure, Collaboration, Validation, Chain of Custody, API, NIST, IP, Intellectual Property, Proprietary, Workflow, Provision, Control, Hashing, Trust, Event, Transaction, Access, Protect
DOI
10.5594/M001986
ISBN
978-1-61482-963-8