Uploaded on

 

More in: Technology , Business
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
  • Nice Presentation, have a look at my Presentation too and if you like it VOTE for it.

    http://www.slideshare.net/leozalki/green-it-5536455
    Are you sure you want to
    Your message goes here
    Be the first to like this
No Downloads

Views

Total Views
1,461
On Slideshare
0
From Embeds
0
Number of Embeds
0

Actions

Shares
Downloads
23
Comments
1
Likes
0

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. Ian Huang 黄源源 Excel Capital Strategy Limited ( formerly named as Ascent Asset Management) Tel: (86) 14716033879 Email: [email_address]
  • 2. Virtual Machines Physical Machines User/Broker
  • 3.
    • Technology Interpretation:
        • A cloud is a type of parallel & distributed computer systems, interconnected and virtualized, to dynamically provide & present as a unified computing resources on demand.
    • Business Interpretation:
      • A cloud is an operating facility that the user/broker does not need to own and maintain.
  • 4.
    • Outsourcing external business transaction
    • Order acceptance
    • Booking & Reservation
    • Payment & Shipment
    • Outsourcing internal proprietary operation
    • Documentation storage
    • financial & trade secret data
    • Internal communications
  • 5.
    • Functions & Performance
    •  Cost Effective & User Friendly
    •  Trusted
    •  Easy Migration & Maintain
  • 6.
      • Authentication
      • Confidentiality
      • Private
      • Easy to change
      • Impossible to replicate
      • Economical
      • Compatibility
  • 7.
    • Today’s solutions
      • IP Address
      • User ID
      • Fingerprints (Additional hardware)
      • Face Identification (Additional hardware)
      • User Password
      • User Address
    • Security breach (ID theft) remains as the most concerned issues in Cloud Computing.
      • - Source: IDC
    Privacy Problem
  • 8. More abuse More difficulty to maintain More difficulty to compile More costly More possibility for error More cloud traffic
  • 9.
    • Simple
    • Cost Effective
    • Universal
    • Privacy protection
    • Support authentications
    Cloud ID
  • 10.
    • What is it?
      • Each user/broker of the Cloud has his/her/its own ID
      • Cross border administration (e.g., IP Address)
      • Different than IP Address which is focused on the machine. Cloud ID focuses on the individual (personal ID) or the organization (Company ID)
  • 11.
    • What does it do?
    • Establish a Private Cloud
      •  Protect Privacy
      •  Controlled growth
      •  Easy tracking and management
    • Secure personal and business transaction
      •  Encourage Cloud usuage
      •  Open new business opportunities
      •  Support law enforcement
  • 12.
    • What it will NOT do !
    • Completely eliminate Cloud fraud.
  • 13.
    • Must integrated with VPN
    • Must integrated with cryptography
    • Must leverage on the algorithms involving “ O ptimal  A symmetric  E ncryption P adding” and “P robabilistic  S ignature S cheme ”
    • Must comply with IEEE P1363 (Lattice-based, Password-based and ID-based public key specifications)
  • 14.
    • Lockstep Technology Smart 100
    • - personal health records on mobile communications -
    • Dramatically enhance the privacy, integrity and security of transactions with highly sensitive, cutting-edge cloud-based services (especially personal health record management) performed on smart mobile devices.
    • Taking a unique virtual ID of the user (either self-selected or assigned by the transaction service), specific to the application context, encrypting it using Lockstep’s standards-based encapsulation process, and binding it into the associated app at download time. Thereafter, standard digital modules in the device automatically and indelibly ‘seal’ all data originated from the app with the relevant ID.
  • 15.
    • CA Technology & Novell
    • Both geared toward enterprises (typically, 1,000 seats and above). They are expensive, difficult to implement and require dedicated resources to manage.
    • Ping Identity (www.pingidentity.com)
    • Probably the best solution today. Does not own the technology on algorithms (RSA).
    • Hitachi ID Systems, Symantec, Microsoft, RSA (EMC), Google and Oracle
    • They are coming.
  • 16.
    • Will not succeed as a stand alone business
    • Must be deployed with at least two large and important applications (e.g., e-commence, medical/health/environmental cloud)
    • US has the technology led. But China, as the largest Cloud-user country, leads the business opportunity.
  • 17.
    • Formerly as Ascent Asset Management Ltd.
    • EXCEL Capital Strategy Ltd
    • Tel: (86) 14716033879
    • Email: [email_address]