What could possibly go wrong IoT meets The Law Data Insights talk May 5, 2016, Cambridge Ian Walden Jon Crowcroft

Slides:



Advertisements
Similar presentations
Secure, Scalable, Synchronizable, and Social Business oriented Rich Internet Applications to reduce costs and add value to clients Authors: Avenir Cokaj,
Advertisements

Wei Lu 1, Kate Keahey 2, Tim Freeman 2, Frank Siebenlist 2 1 Indiana University, 2 Argonne National Lab
© 2012 Open Grid Forum Simplifying Inter-Clouds October 10, 2012 Hyatt Regency Hotel Chicago, Illinois, USA.
Pros and Cons of Cloud Computing Professor Kam-Fai Wong Faculty of Engineering The Chinese University of Hong Kong.
Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Mobile Content Strategies and Deployment Best Practices.
Trust Management of Services in Cloud Environments:
Security Vulnerabilities and Conflicts of Interest in the Provider-Clearinghouse*-Payer Model Andy Podgurski and Bret Kiraly EECS Department & Sharona.
Institutional Controls Pamela Elkow and Richard Fil.
FIPS 201 Personal Identity Verification For Federal Employees and Contractors National Institute of Standards and Technology Information Technology Laboratory.
Clouds C. Vuerli Contributed by Zsolt Nemeth. As it started.
Security Controls – What Works
Insights on the Legal Landscape for Data Privacy in Higher Education Rodney Petersen, J.D. Government Relations Officer and Security Task Force Coordinator.
FI-WARE – Future Internet Core Platform FI-WARE Security July 2011 High-level Description.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
Cloud Computing Stuart Dillon-Roberts. “In the simplest terms, cloud computing means storing & accessing data & programs over the Internet instead of.
Securing and Auditing Cloud Computing Jason Alexander Chief Information Security Officer.
Electronic Banking BY Bahaa Abas Noor abo han. Definition * e-banking is defined as: …the automated delivery of new and traditional banking products and.
© 2012 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual.
Discussion on LI for Mobile Clouds
D ATABASE S ECURITY Proposed by Abdulrahman Aldekhelallah University of Scranton – CS521 Spring2015.
© 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker.
Information Security Technological Security Implementation and Privacy Protection.
SEC835 Database and Web application security Information Security Architecture.
Teresa Macklin Information Security Officer 27 May, 2009 Campus-wide Information Security Activities.
Eric J. Pritchard One Liberty Place, 46 th Floor 1650 Market Street Philadelphia, Pennsylvania (215)
Copyright © 2006 CyberRAVE LLC. All rights reserved. 1 Virtual Private Network Service Grid A Fixed-to-Mobile Secure Communications Framework Managed Security.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
Deploying Trust Policies on the Semantic Web Brian Matthews and Theo Dimitrakos.
Risk Management & Legal Issues in Cloud Practice Christopher Dodorico Director, PricewaterhouseCoopers Wednesday, October 10, 2012.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
State Alliance for e-Health Conference Meeting January 26, 2007.
© Synergetics Portfolio Security Aspecten.
Overview Privacy Management Reference Model and Methodology (PMRM) John Sabo Co-Chair, PMRM TC.
LeToia Crozier, Esq., CHC Vice President, Compliance & Regulatory Affairs Corey Wilson Director of Technical Services & Security Officer Interactive Think.
Cloud Computing Security Keep Your Head and Other Data Secure in the Cloud Lynne Pizzini, CISSP, CISM, CIPP Information Systems Security Officer Information.
Higher Education PKI Summit Meeting August 8, 2001 The ABA PAG Rodney J. Petersen, J.D. Director, Policy and Planning Office of Information Technology.
SOA-39: Securing Your SOA Francois Martel Principal Solution Engineer Mitigating Security Risks of a De-coupled Infrastructure.
The Impact of Evolving IT Security Concerns On Cornell Information Technology Policy.
Features Governmental organization Critically important ICT objects Distributed infrastructure Three levels of confidentiality Dozens of subsidiary organizations.
HIT Policy Committee NHIN Workgroup HIE Trust Framework: HIE Trust Framework: Essential Components for Trust April 21, 2010 David Lansky, Chair Farzad.
Fred Carter Senior Policy & Technology Advisor Information and Privacy Commissioner Ontario, Canada MISA Ontario Cloud Computing Transformation Workshop.
© 2012 IBM Corporation IBM Security Systems 1 © 2012 IBM Corporation Cloud Security: Who do you trust? Martin Borrett Director of the IBM Institute for.
GRID ANATOMY Advanced Computing Concepts – Dr. Emmanuel Pilli.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Protecting your Managed Services Practice: Are you at Risk?
DG CONNECT NIPS Study – CONSULTATION CONFERENCE 13 November 2013
© 2012 Eucalyptus Systems, Inc. Cloud Computing Introduction Eucalyptus Education Services 2.
© 2016 Catalyze, Inc. Go-To-Market Services HIPAA Compliance in the Cloud: Catalyze Provides Microsoft Azure Customers with a HITRUST Certified Platform-as-a-Service.
Protection of Personal Information Act An Analysis on the impact.
Devices 10 billion Internet- connected devices by 2016 People 1 billion+ people use social media services today Cloud 30 % of data will live in or pass.
Three topics – 1. Data Centers, 2. IoT, 3. Networks for Dev/Disasters Jon Crowcroft,
Clouding with Microsoft Azure
Accountability & Structured Privacy Management
VIRTUALIZATION & CLOUD COMPUTING
Deployment Planning Services
INTERCONNECTION GUIDELINES
Paul Woods Chair, MITIGATION: Ensuring we procure cloud services taking into account of the risks involved Paul Woods Chair, ISNorthEast.
Cloud Testing Shilpi Chugh.
Interlake Hybrid Cloud Management Suite
SECURITY MECHANISM & E-COMMERCE
CONFIDENTIALITY, INTEGRITY, LEGAL INTERCEPTION
Clouds: What’s new is old is new…
Blockchain-as-a-Service (BaaS) :: providers & trust
NIST Cloud Computing Reference Architecture
PLANNING A SECURE BASELINE INSTALLATION
Dr. Panayiotis Agisilaou Trojan Economics & Open University of Cyprus
Cloud Computing for Wireless Networks
Presentation transcript:

What could possibly go wrong IoT meets The Law Data Insights talk May 5, 2016, Cambridge Ian Walden Jon Crowcroft Christopher Millard

IoT Technical Considerations – Big Picture

Every time I give this talk, I look For a story about IoT #fail Yesterday…..without looking…. hackers-unlock-doors-set-off-fire-alarms/

Interactions twixt IoT & Cloud

Clouds of Things: Technical Considerations (Confidentiality, Integrity, Availability) 1.Secure communications (C, I): Work is advanced and existing techniques can be leveraged. IoT could benefit from lighter-weight schemes, particularly where cryptography is involved. 2.Access controls for IoT-Cloud (C): Standard mechanisms can be used. IoT adds complexity due to the scale and dynamism of ‘thing’ access. 3.Identifying sensitive data (C): Largely a non-technical concern, but has an impact on how policies are defined. 4.Public, private or hybrid? (C, A): Currently blunt partitioning is supported, but emerging research will allow for more flexible deployments that facilitate data sharing. 5.In-cloud data protection (C): There are strong isolation techniques available and providers employ general access controls. More flexible approaches are needed for inter-application sharing to be possible (see 6, below). 6.In-cloud data sharing (C, A): Inter-application sharing is needed for IoT but currently is not part of the cloud philosophy. 7.Encryption by ‘things’ (C, I): Encryption techniques are mature, but this approach precludes most computations on protected data and involves complex key management. Ongoing work into homomorphic encryption will assist. Lightweight encryption mechanisms are being developed and will require robust testing and analysis.

Clouds of Things: Technical Considerations (Confidentiality, Integrity, Availability) 8.Data combination (C): Some techniques exist to prevent user re-identification, but much more work is needed. 9.Identifying ‘things’ (C): Existing work on identity management can be leveraged for IoT, but more experience at a larger scale is needed to determine suitability and/or limitations. 10.Identifying the provider (C): The basic issues are mostly architectural or configuration concerns. Some outstanding issues remain when resources are shared or where decisions need to be made at runtime. 11.Increase in interactions and data load (A): Cloud services manage elasticity well, but resource expansion is not unlimited. Peak IoT loads are unknown, but possibly controlled by economics (payment/ownership). 12.Logging at large scale (C, I, A): Currently logging is low-level and system-centered. More work is needed on logging and processing tools for applications and users. 13.Malicious ‘things’—protection of provider (C, I, A): Existing techniques can be deployed. 14.Malicious ‘things’—protection of others (C, I, A): There are potentially techniques that can assist. Experience is needed of cloud services operating across IoT subsystems.

15.Certification of cloud service providers (C, I, A): This is currently manual and static, leading to delays when updates are required. Research is needed on automatic certification processes, possibly including hardware-based solutions. 16.Trustworthiness of cloud services (C, I, A ): An emerging field with ongoing research. Experience of practical implementation is needed. 17.Demonstrating compliance using audit (C, I, A): Currently, the compliance of cloud providers to their contractual obligations is not demonstrated convincingly. Research is needed, and IoT will add additional complexity. 18.Responsibility for composite services (C, I, A): The legal implications of the use of third- party and other services are unresolved. Such usage is not as yet transparent to tenants and/clients. More work is needed concerning user and application-level policy aspects. 19.Compliance with data location regulations (C, I, A): Currently not enforceable except at coarse granularity. There is research in IFC that can assist, but the concepts are not yet commercially deployed. 20.Impact of cloud decentralisation (C, I, A): This is an emerging field, where the current focus is on functionality. More attention is needed regarding security. Clouds of Things: Technical Considerations (Confidentiality, Integrity, Availability)

Clouds of Things: Relationships + Responsibilities Relevant parties, their roles, and the contract ecosystem Establishing contractual relationships using things Who owns what? Potential non-contractual sources of liability Cyber-risk and insurance Developing a taxonomy for the purposes of legal analysis

Personal Data in Clouds of Things What is regulated as personal data? Who is responsible? Which laws apply? What rights to individuals have? How do rules on data location and data transfer work?

Governance of Clouds of Things Surveillance issues Identity and authentication Standards Demonstrating compliance with legal obligations Consumer protection Market and competition issues Use of radio spectrum

Clouds of Things: ‘Looking into the Nest’ Contracting and Regulating for IoT –Case study Not survey –Supply chain Transparency –Actors & ecosystem Owners, tenants, users

Clouds of Things: Layered ‘legals’ Terms of Service (sites, web apps, mobile apps) EULA (embedded software) Sales terms (hardware) Privacy statement (for the devices) Website privacy policy (for monitoring data & accessing accounts) Open-source compliance IP and related notices Community Forum Agreement (user sharing) EU Declarations (type approval) Installation ToS Developer ToS

Clouds of Things: Private ordering & public control ‘Product’ as an inseparable mix of hardware and software and services and…. –Liability standard: Boston Scientific Medizintechnik GmbH v AOK Sachsen-Anhalt (2015) –The ‘disconnected’ Thing? Modifications, interoperability & portability –User interactions Security & sharing –‘the products will share information with each other’

End Note As someone notable said of IoT: “Take all the moving parts in the world, and now make them as easy to use and reliable as your printer”