Ian Huang 黄源源 Excel Capital Strategy Limited ( formerly named as Ascent Asset Management) Tel: (86) 14716033879 Email: [email_address]
Virtual Machines Physical Machines User/Broker
A cloud is a type of parallel & distributed computer systems, interconnected and virtualized, to dynamically provide & present as a unified computing resources on demand.
A cloud is an operating facility that the user/broker does not need to own and maintain.
Outsourcing external business transaction
Booking & Reservation
Payment & Shipment
Outsourcing internal proprietary operation
financial & trade secret data
Functions & Performance
Cost Effective & User Friendly
Easy Migration & Maintain
Easy to change
Impossible to replicate
Fingerprints (Additional hardware)
Face Identification (Additional hardware)
Security breach (ID theft) remains as the most concerned issues in Cloud Computing.
- Source: IDC
More abuse More difficulty to maintain More difficulty to compile More costly More possibility for error More cloud traffic
What is it?
Each user/broker of the Cloud has his/her/its own ID
Cross border administration (e.g., IP Address)
Different than IP Address which is focused on the machine. Cloud ID focuses on the individual (personal ID) or the organization (Company ID)
What does it do?
Establish a Private Cloud
Easy tracking and management
Secure personal and business transaction
Encourage Cloud usuage
Open new business opportunities
Support law enforcement
What it will NOT do !
Completely eliminate Cloud fraud.
Must integrated with VPN
Must integrated with cryptography
Must leverage on the algorithms involving “ O ptimal A symmetric E ncryption P adding” and “P robabilistic S ignature S cheme ”
Must comply with IEEE P1363 (Lattice-based, Password-based and ID-based public key specifications)
Lockstep Technology Smart 100
- personal health records on mobile communications -
Dramatically enhance the privacy, integrity and security of transactions with highly sensitive, cutting-edge cloud-based services (especially personal health record management) performed on smart mobile devices.
Taking a unique virtual ID of the user (either self-selected or assigned by the transaction service), specific to the application context, encrypting it using Lockstep’s standards-based encapsulation process, and binding it into the associated app at download time. Thereafter, standard digital modules in the device automatically and indelibly ‘seal’ all data originated from the app with the relevant ID.
CA Technology & Novell
Both geared toward enterprises (typically, 1,000 seats and above). They are expensive, difficult to implement and require dedicated resources to manage.
Ping Identity (www.pingidentity.com)
Probably the best solution today. Does not own the technology on algorithms (RSA).
Hitachi ID Systems, Symantec, Microsoft, RSA (EMC), Google and Oracle
They are coming.
Will not succeed as a stand alone business
Must be deployed with at least two large and important applications (e.g., e-commence, medical/health/environmental cloud)
US has the technology led. But China, as the largest Cloud-user country, leads the business opportunity.