Privecsg-15-0014-00-0000 1 Privacy Engineered Access Network Date: 2015-03-12 Authors: NameAffiliationPhone Max RiegelNokia Networks+49 173 293

Slides:



Advertisements
Similar presentations
(omniran TG) Short introduction into OmniRAN P802.1CF Date: Authors: NameAffiliationPhone Max RiegelNokia.
Advertisements

Omniran Network Detection and Selection Date: Authors: NameAffiliationPhone Max RiegelNSN
Omniran TG 1 Cooperation for OmniRAN P802.1CF Max Riegel, NSN (Chair OmniRAN TG)
Omniran GPP Trusted WLAN Access to EPC Use Case Analysis Date: Authors: NameAffiliationPhone Max RiegelNSN
Omniran IEEE 802 Scope of OmniRAN Date: Authors: NameAffiliationPhone Max RiegelNSN
OmniRAN ecsg SDN-based Control Plane and Data Plane Separation in OmniRAN Network Reference Model Date: Authors: NameAffiliationPhone .
Omniran PtP Links across IEEE 802 Bridged Infrastructure Date: Authors: NameAffiliationPhone Max
Omniran CF00 1 Privacy Engineered Access Network Date: Authors: NameAffiliationPhone Max RiegelNokia Networks
OmniRAN Specification – Structuring the effort Document Number: Omniran Date Submitted: Source: Max Riegel
Omniran CF00 1 P802.1CF NRM Discussions Date: Authors: NameAffiliationPhone Max RiegelNokia Networks
OmniRAN SDN-based OmniRAN Use Cases Summary Date: Authors: NameAffiliationPhone Antonio de la OlivaUC3M+34
Omniran CF00 1 OmniRAN R3 Considerations Date: Authors: NameAffiliationPhone Max RiegelNSN
Omniran CF00 1 P802.1CF NRM Mapping to real networks Date: Authors: NameAffiliationPhone Max RiegelNokia Networks
Omniran CF CF Network Reference Model Introduction Date: Authors: NameAffiliationPhone Max RiegelNokia Networks+49.
Omniran Thoughts about the tenets in IEEE 802.1CF Date: Authors: NameAffiliationPhone Max RiegelNSN
Omniran CF00 1 Fault Diagnosis and Maintenance Date: [ ] Authors: NameAffiliationPhone Hao WangFujitsu R&D
Omniran IEEE 802 Scope of OmniRAN Date: Authors: NameAffiliationPhone Max RiegelNSN
Omniran CF00 1 Key Concepts of Fault Diagnostics and Maintenance Date: [ ] Authors: NameAffiliationPhone Hao WangFujitsu R&D
Omniran CF00 1 VLANs in relation to P802.1CF NRM Date: Authors: NameAffiliationPhone Max RiegelNokia Networks
Omniran IEEE 802 OmniRAN EC SG Results and Outlook Date: Authors: NameAffiliationPhone Max RiegelNSN
Omniran CF00 1 CF ToC Refinements Date: Authors: NameAffiliationPhone Max RiegelNSN
Omniran CF00 1 Content and outline considerations for Annex: Applicability to non-IEEE 802 PHY layer technologies Date: Authors:
OmniRAN IEEE 802 OmniRAN Recommended Practice ToC Proposal Date: Authors: NameAffiliationPhone Yonggang
Omniran CF00 1 Key Concepts of Authentication and Trust Establishment Date: Authors: NameAffiliationPhone Max RiegelNokia Networks+49.
Omniran CF00 1 Key Concepts of Network Selection and Detection Date: Authors: NameAffiliationPhone Max RiegelNokia Networks+49.
Page 1 IEEE 802 January Meeting EEE 802 Recommended Practice for Privacy Considerations for IEEE 802 Technologies Date: Authors: NameAffiliationPhone .
Omniran CF00 1 IEEE OmniRAN TG Athens NRM Conclusions Max Riegel, Nokia Networks (OmniRAN TG Chair)
Omniran CF00 1 P802.1CF NRM Backhaul Considerations Date: Authors: NameAffiliationPhone Max RiegelNokia Networks
Omniran CF00 1 Key Concepts of Network Selection and Detection Date: Authors: NameAffiliationPhone Max RiegelNokia Networks+49.
Submission doc.: IEEE arc March 2014 Max Riegel (NSN)Slide 1 Cross-WG cooperation on OmniRAN P802.1CF E.g.: Network Discovery and Selection.
Omniran IEEE 802 Scope of OmniRAN Date: Authors: NameAffiliationPhone Max RiegelNSN
Omniran TG 1 Cooperations for OmniRAN P802.1CF Max Riegel, NSN (Chair OmniRAN TG)
Ec GSG 1 OmniRAN TG perspective on cost and benefits of 5G SC options Max Riegel OmniRAN TG chair
Omniran CF00 1 Key Concepts of Association and Disassociation Date: Authors: NameAffiliationPhone Max RiegelNokia
Omniran CF00 1 Key Concepts of Accounting and Monitoring Date: Authors: NameAffiliationPhone Hao WangFujitsu R&D
Omniran Backhaul representation in OmniRAN SDN model Date: Authors: NameAffiliationPhone Max RiegelNSN
Omniran CF00 1 P802.1CF NRM Ambiguities Date: Authors: NameAffiliationPhone Max RiegelNokia Networks
P802.1CF Information Model Structure
Network instantiation
P802.1CF Information Model Structure
P802.1CF NRM Mapping to real networks
P802.1CF User Service Information Model
P802.1CF architectural considerations for EM and NM
IEEE OmniRAN TG Status Report to IETF – IEEE 802 Coordination
P802.1CF Information Model Structure
P802.1CF NRM Refinements Abstract
P802.1CF NRM Discussions Abstract
Network reference model for access network virtualization
P802.1CF within the scope of 5G
P802.1CF within the scope of 5G
Chapter 7.1 Restructuring Proposal
Brief Introduction to IEEE P802.1CF
Date: < yyyy-mm-dd >
P802.1CF D1.0 Figure Proposals Abstract
Network instantiation
Brief Introduction to OmniRAN P802.1CF
P802.1CF architectural considerations for EM and NM
P802.1CF Information Model Structure
P802.1CF operational models
P802.1CF within the scope of 5G
Key concepts of authorization, QoS, and policy control
P802.1CF D1.0 Figure Proposals Abstract
P802.1CF NRM Refinements Abstract
IEEE 802 Scope of OmniRAN Abstract
P802.1CF NRM Refinements Abstract
802.1CF ToC Refinements Abstract
OmniRAN SDN Use Case ToC
SDN-based OmniRAN Use Cases Summary
OmniRAN SDN Use Case ToC
IEEE 802 RAN Recommended Practice ToC Proposal
Presentation transcript:

privecsg Privacy Engineered Access Network Date: Authors: NameAffiliationPhone Max RiegelNokia Networks Notice: This document does not represent the agreed view of the IEEE OmniRAN TG. It represents only the views of the participants listed in the ‘Authors:’ field above. It is offered as a basis for discussion. It is not binding on the contributor, who reserve the right to add, amend or withdraw material contained herein. Copyright policy: The contributor is familiar with the IEEE-SA Copyright Policy. Patent policy: The contributor is familiar with the IEEE-SA Patent Policy and Procedures: and. Abstract The slide set provides some very initial thoughts about how privacy aspects may be reflected in the P802.1CF specification. - Slightly amended version for presentation to experts outside OmniRAN

privecsg Privacy Engineered Access Network Max Riegel (Nokia Networks)

privecsg Prolog Privacy is a huge topic with many aspects and dimensions. This presentation intends to introduce a method and process to deal with privacy in P802.1CF on IEEE 802 access network The proposal is derived from generic approaches and concepts proposed and published roughly during the past 5 years. Please regard this presenation as a starting point for further discussions. –It is definitely not conclusive yet!

privecsg References The Privacy Engineer’s Manifesto - Getting from Policy to Code to QA to Value (Michelle Finneran Dennedy Jonathan Fox Thomas R. Finneran; ApressOpen) – Privacy Engineering Framework (MITRE Privacy Community of Practice (CoP) July 18, 2014) – engineering-frameworkhttp:// engineering-framework Engineering Privacy (Sarah Spiekermann, Lorrie Faith Cranor; IEEE Transactions on Software Engineering, Vol. 35, No. 1, Jan/Feb 2009) –

privecsg Privacy Some common definitions: Merriam-Webster’s Dictionary: –1a: the quality or state of being apart from company or observation: seclusion 1b: freedom from unauthorized intrusion one’s right to privacy –2. archaic: a place of seclusion –3a: secrecy 3b: a private matter: secret According to Yael Onn et al., Privacy in the Digital Environment. Haifa Center of Law & Technology, 2005: “The right to privacy is our right to keep a domain around us, which includes all those things that are part of us, such as our body, home, thoughts, feelings, secrets, and identity. The right to privacy gives us the ability to choose which parts in this domain can be accessed by others, and to control the extent, manner, and timing of the use of those parts we choose to disclose.”

privecsg Privacy IMHO, a more useful definition Taken from: The Privacy Engineer’s Manifesto - Getting from Policy to Code to QA to Value (Michelle Finneran Dennedy Jonathan Fox Thomas R. Finneran; ApressOpen)

privecsg PII Personally Identifiable Information Privacy: “The fair and authorized “processing” of Personally Identifiable Information (PII) Personally Identifiable Information Formally: Any data that identifies an individual or from which identity or contact information of an individual can be derived Practically: Includes otherwise non-personal information when associated or combined with personal information

privecsg Privacy by Design (PbD) Based on the assumption that privacy cannot be assured only by compliance with regulatory frameworks Privacy assurance must be included into the organization and mode of operation of a system Adequate privacy requires thoughtful integration with every layer of an organization, including: –Organization policies and governance; –Business processes; –Standard operating procedures; –System and network architectures; –IT system design and development practices; –Management of data sources.

privecsg PbD Foundational Principles 1.Proactive not Reactive; Preventative not Remedial –Anticipate issues; prevent problems before they arise 2.Privacy as the Default Setting –Personal data protected from inception; individuals need not act to protect data 3.Privacy Embedded into Design –Privacy protections are core, organic functions; not bolted on after the fact 4.Full functionality—Positive-sum, not Zero-sum –Privacy enhances, not degrades, security and functionality 5.End-to-End Security—Full Lifecycle Protection –Security applied to each data lifecycle stage, from creation to archiving or deletion 6.Visibility and Transparency—Keep it Open –Individuals understand data use; privacy practices audited 7.Respect for User Privacy—Keep it User-Centric –Organizational imperative = privacy is about personal control and free choice

privecsg Privacy Engineering A systematic, risk-driven process that operationalizes the Privacy by Design philosophical framework within IT systems by –Segmenting PbD into activities aligned with those of the systems engineering life cycle (SELC) and supported by particular methods that account for privacy’s distinctive characteristics –Defining and implementing requirements for addressing privacy risks within the SELC using architectural, technical point, and policy controls Privacy requirements must be defined in terms of implementable system functionality and properties Privacy risks are identified and adequately addressed –Supporting deployed systems by aligning system usage and enhancement with a broader privacy program –The goal is to integrate privacy into the existing system testing process; it is not meant to be a separate new process

privecsg Privacy Enabling Technologies Encryption Digital rights management Privacy rules within application programs Identity management Data anonymization …?

privecsg Now, where is the meat for OmniRAN? Three dimensions: –Fair information principles –Information processing –Personal Identificable Information OmniRAN deals with an informational model of the IEEE 802 access network –The sample chapter structure for Functional Design and Decomposition exposes sections on PII

privecsg P802.1CF Draft ToC Introduction and Scope Abbreviations, Acronyms, Definitions, and Conventions References Identifiers Network Reference Model –Overview –Reference Points –Access Network Control Architecture Multiple deployment scenarios including backhaul Functional Design and Decomposition –Dynamic Spectrum Access –Network Discovery and Selection –Association and Disassociaiton –Authentication and Trust Establishment –Datapath establishment, relocation and teardown –Authorization, QoS and policy control –Accounting and monitoring SDN Abstraction –Terminal –Access Network Annex: –Tenets (Informative)

privecsg Chapter ToC Template for Functional Design and Decomposition Introduction Terminology Roles and identifiers Use cases Functional requirements Function specific attributes Function details and message flows Mapping to IEEE 802 technologies

privecsg Medium Data Link Physical Network Transport Application DL Phy DL Phy Data Link Physical Network Transport Application Network Medium Data Link Physical Data Link Physical Access Network Terminal Core Network Information Service DL Phy DL Phy DL Phy DL Phy Medium Backhaul End-to-end network topology Subscription Service R1 Schematic NRM for the IEEE 802 access network Terminal Access Network Core Network Subscription Service R3 R4 R2 Scope of P802.1CF in the protocol layer architecture Node of Attachment Terminal Interface Core Network Interface Scope of P802.1CF Privacy issues can happen anywhere

privecsg Roles and Identifiers from omniran CF00-key-concepts-of-nds User –One or more Subscriptions Subscription Identifier {NAI} + Subscription Name {String} Terminal –Station STA {EUI-48} Access Network –One or more Points of Attachment PoA {EUI-48} –Access Network Identifier ANID {EUI-48} + AN Name {String} –Supportive Information Subscription Service Provider –‘Termination point of AAA’ SSP Identifier {FQDN} + SSP Name {String} –Supportive Information Core Network Service –‘Network side IEEE 802 Link Layer SAP’ CNS Identifier {???} + CNS Name {String} –Supportive Information

privecsg Supportive information from omniran CF00-key-concepts-of-nds Access Network –Supported Subscription Service Providers –Supported Core Network Services –AN certificate –Access Network Capabilities Link Layer capabilities –E.g. MTU, encryption, shared/ptp-link Link Layer performance –E.g. supported service classes (Throughput up/down, delay, jitter) Subscription Service Provider –List of supported Core Network Services –SP certificate Core Network Service –Network Layer Capabilities E.g. IP version, configuration, multi-protocol support, service discovery support –Network Interface performance E.g. supported service classes (throughput up/down, delay, jitter) –Offered application services E.g. Internet, Voice, Printer, File service,

privecsg Roles and Identifiers from omniran CF00-key-concepts-of-data-path Terminal –Terminal Interface TE {EUI-48} R1-Interface ID Access Network Access Network Identifier: ANID {EUI-48} + AN Name {String} –Node of Attachment NA {EUI-48} R1-Interface ID R6d-Interface ID Supportive Information –Backhaul BH-ID R6d-Interface ID R3d-Interface ID Supportive Information Core Network Service CNS ID: CNS Identifier {???} + CNS Name {String} R3d-Interface ID Supportive Information Subscription Service –‘AAA and policy control’ SS Identifier {FQDN} + SSP Name {String} Supportive Information

privecsg So, what to do in OmniRAN? OmniRAN describes information elements, which may belong to PII. At least, OmniRAN may provide some indication for the information elements, which –Definitely represents PII, –May be sensitive regards PII. Such classification may be added in an informative annex.

privecsg DISCUSSION? Thank you.