ITU Workshop on "Future Trust and Knowledge Infrastructure", Phase 1 Geneva, Switzerland, 24 April 2015 Beyond Data Security: how to build trust through.

Slides:



Advertisements
Similar presentations
Les Brown, Associate Rapporteur G.fast Lantiq, Germany
Advertisements

InformationWeek Next-Generation IT Survey Research Findings © 2014 Property of UBM Tech; All Rights Reserved.
US View on the Technological Convergence Between the Internet of Things and Cloud Computing June 1, 2010 Brussels, Belgium Presented by: Dan Caprio.
Administrative Data Research Centre for England 1.
Geneva, Switzerland, 2 June 2014 Introduction to public-key infrastructure (PKI) Erik Andersen, Q.11 Rapporteur, ITU-T Study Group 17 ITU Workshop.
ARTEMIS Industry Association Title Presentation - 1 CoDeGrass Conscious Dependable Green Actuator/Sensor Systems Johan Lukkien, Eindhoven University of.
PRODUCT FOCUS 4/14/14 – 4/25/14 INTRODUCTION Our Product Focus for the next two weeks is Microsoft Office 365. Office 365 is Microsoft’s most successful.
Enabling the Social Web Krishna P. Gummadi Networked Systems Group Max Planck Institute for Software Systems.
This paper states that one of the major problem to the adoption of cloud computing is that of security.  Existing cloud computing problem or concerns.
March 13, 2004Securing Privacy Conference1 SENSOR NETWORKS & PRIVACY Pamela Samuelson, UC Berkeley, Securing Privacy Conference, March 13, 2004.
B1051 Fundementals of Information Technology (Intro)
Geneva, Switzerland, 14 November 2014 Cloud Computing - Overview and Vocabulary (Y.3500) Eric A. Hibbard, CISSP, CISA CTO Security & Privacy Hitachi Data.
1 3 rd SG13 Regional Workshop for Africa on “ITU-T Standardization Challenges for Developing Countries Working for a Connected Africa” (Livingstone, Zambia,
Geneva, Switzerland, 14 November 2014 Data Protection for Public Cloud (International Standard ISO 27018) Stéphane Guilloteau Engineer Expert, Orange Labs.
Tracking, Privacy, You & The 21 st Century When you talk online the internet listens.
Research Directions for the Internet of Things Supervised by: Dr. Nouh Sabry Presented by: Ahmed Mohamed Sayed.
Top 10 Strategic Technology Trends for 2013 A Channel Partners Slide Show … as highlighted at.
Wireless Sensor Networks and Privacy Osman Ceylan Istanbul Technical University.
ITU Workshop on "Future Trust and Knowledge Infrastructure", Phase 1 Geneva, Switzerland, 24 April 2015 Tussles for Edge Network Caching Patrick Poullie.
Spotlightonspend is a managed service which enables public sector organizations to effortlessly publish complex financial information so that it can be.
SOCIAL MEDIA Awareness
Chapter 1- Introduction
52°North Simon Jirka – VGIrisk Workshop - April 2011.
PRIVATE / PUBLIC / HYBRID CLOUD. Differences between private, public and hybrid clouds Examples of the most popular providers of public/private/hybrid.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
SODA Archiving October 2013
Chloe Miles IMPROVING PRODUCTIVITY USING IT. Menu Using Word Advantages Disadvantages Conclusion E-Safety Social Media Dangers of Social Media Sites Staying.
ITU Workshop on "Future Trust and Knowledge Infrastructure", Phase 1 Geneva, Switzerland, 24 April 2015 The Open and Trustworthy ICT Platform Prof. Dr.
Eucalyptus: An Open-source Infrastructure for Cloud Computing Rich Wolski Eucalyptus Systems Inc.
ITU Workshop on "Future Trust and Knowledge Infrastructure", Phase 1 Geneva, Switzerland, 24 April 2015 Tussles for Edge Network Caching Patrick Poullie.
Geneva, Switzerland, April 2012 Introduction to session 7 - “Advancing e-health standards: Roles and responsibilities of stakeholders” ​ Marco Carugi.
Geneva, Switzerland, 17 October 2011 Summary of Session 4: SDP standardization status and requirements Huilan Lu, Ph.D. SG 13 Vice Chairman ITU Workshop.
New Rules of Client Engagement: What Will Drive Business? Stephanie Moore Chief marketing Officer UST Global.
Chris Reed Professor of Electronic Commerce Law. The perceived problem “If I put my information in the Cloud then I lose all my rights to it” But is this.
DOCUMENT #:GSC15-PLEN-62 FOR:Presentation SOURCE:ISACC AGENDA ITEM:Opening Plenary (6.14) CONTACT(S):Jim MacFie Cloud Computing Jim MacFie Chairman, ISACC.
Geneva, Switzerland, September 2014 X.509 in a changing world Erik Andersen, Andersen’s L-Service Denmark ITU Workshop on “ICT Security.
The risks behind Location-Based Service Julie Wang.
Private Information Protection based on User-Trusted Program Institute of Systems and Information Engineering/KYUSHU Ken ’ ichi Takahashi.
Technology for Social Justice Enhancing community sector service delivery Stefanie Kechayas – Senior Consultant 17 November 2015 SharePoint Connect and.
SAFE SOCIAL NETWORKING TIPS By: Quinton Ellison.  Here's how to protect yourself: experts say you should never list your complete birthday or your address.
IoT Primer Stephen Bates | Energy Huntsville: Tues 15 Dec
THE EMERGING GI ENVIRONMENT BRUCE McCORMACK VICE PRESIDENTEUROGI (EUROPEAN UMBRELLA ORGANISATION FOR GEOGRAPHIC INFORMATION) ESTONIA GI ASSOCIATION ANNUAL.
Andrea Ricci - ISIS Brussels, 12 April 2012 Policy conclusions and way forward.
Geneva, Switzerland, 14 November 2014 ENISA and Cloud Certification Dimitra Liveri Security and Resilience of Communication Networks Officer ENISA ITU.
© 2012 IBM Corporation IBM Security Systems 1 © 2012 IBM Corporation Cloud Security: Who do you trust? Martin Borrett Director of the IBM Institute for.
CRePE: Context-Related Policy Enforcement for Android Mauro Conti, Vu Thien Nga Nguyen and Bruno Crispo Proceedings of the 13 th International Conference.
5 th ITU Green Standards Week Nassau, The Bahamas December 2015 Taming The IoT Security & Privacy Beast Craig Spiezle, Executive Director, Online.
NCBFAA Annual Conference 2015 Orlando Converging Logistics: Realities vs. Possibilities Cyber Insurance Bernie Cissek, Chairman.
Internet of Things. Creating Our Future Together.
Šarūnas Končius Technology Strategist of Microsoft Microsoft Lithuania.
WHO’S WHO IN “CLOUD”? PHIL WORMS DIRECTOR MARKETING IOMART GROUP.
 Java Card: For small Java based applets to be executed on very small memory devices like smart cards.  Java ME: Micro Edition supports devices low.
Mobile Device Security Management Leyna Belinsky.
Vodafone Business Cloud
Microsoft Dynamics Application Management How the Top 10 Strategic Technology Trends for 2013 will Affect ERP Outsourcing
Grid Wide IoT Gateway Supports open standards and technologies, with open interfaces that provide support for proprietary gas-meter reading protocols and.
Understanding The Cloud
Cloud Data Security In theosophy and anthroposophy, the Akashic records are a compendium of all human events, thoughts, words, emotions and intent ever.
IOT Critical Impact on DC Design
MARTIN KURNADI 12 – 13 July 2016 APEC O2O Summit Taipei 2016
Intel's Public Policy Plan for the Internet of Things
How Technology Is (R)evolutionizing Communities
How Technology Is (R)evolutionizing Communities
Cyber Security 2017 Trends and Start Ups.
On the Efficacy of Anomaly Detection in Process Control Networks
Cloud & Developing Nations
Tussles for Edge Network Caching
Security and business continuity in ICT : a case study by Orange
Moderator Mohamed M. K. Elhaj
Session 26 INST 346 Technologies, Infrastructure and Architecture
Presentation transcript:

ITU Workshop on "Future Trust and Knowledge Infrastructure", Phase 1 Geneva, Switzerland, 24 April 2015 Beyond Data Security: how to build trust through transparency Mark Jeffrey Rapporteur ITU-T Q19/13 Assoc. Rapporteur ITU-T Q8/17

Data Security Today An example: Power companies can use IoT motion sensors to intelligently adjust your building temperature and lighting when your staff have gone home If they can get access to it, criminals could potentially use the exact same data to know when to break in Data Security is more critical than ever before

But Security alone does not create Trust Do you remember … A company that told all their customer’s friends that they had just bought a surprise gift? A phone that embedded the exact location and time a photo was taken, and posted this on social networks?

Trust through Transparency Cloud Service Providers have many different (valid) business models such as – Pay-for-service – Free/Advertising funded – Freemium For all of these, the key to being trusted is Transparency – Say what you do with the data – Say why you do it – Do what you say

Data Categories (from Y.3500) Cloud Service Customer Data Data that the customer uploads to the cloud service, or creates using the cloud service Cloud Service Provider Data Data needed to run the service Cloud Service Derived Data Data arising from the customer’s use of the cloud service

Where does your data go? All of this data moves between: – Devices (PCs, phones, tablets, sensors, TVs, …) – Device Platform Cloud Services – Public Cloud Services – Enterprises – Private Cloud Services – Legacy Systems

(from ISO/IEC WD with permission)

- Bruce Schnier What do cloud services do with your data?

Standards to aid Trust To be a trusted service provider, transparency comes first – Say what you do, and Do what you say Security – Be clear on what security standards you meet, or why you don’t Privacy – Be clear on what privacy standards you meet (e.g. ISO/IEC 27018) – Be clear on what you do about anonymising data Good Business practices – Be clear on what your SLAs mean, and how you will respond to problems – Be clear on what you will do with customer and derived data, and to what purpose – Be clear on how your company is run and how policy is decided Accessibility

A possible uniform syntax Aggregated telemetry readings sensors at all of our customers’ premises a third party trends analysis company predict future needs of our customers Purpose (from ISO/IEC WD 19944)

Conclusion Data today moves around – … a lot Data has many uses – some not intended or understood by the customer Many valid business models need to use customer and derived data in new ways Transparency in such use of data is essential Emerging standards will aid in transparency

Thank You