Consent , crypto and information infrastructure systems

Consent,
Crypto and
Information
Infrastructures
What this talk is about?
Introduction to Digital
Infrastructure. (5 Minutes)
Use of Crypto in Digital
Infrastructures (20 Minutes).
Relationship between Crypto and
Consent. (15 Minutes)
Introduction to
Digital
Infrastructure
Physical
Infrastructure
Financial Infrastructure
Digital Infrastructure
 Infrastructure as a Service (IaaS)
 Software as a Service (SaaS)
 Platform as a Service (PaaS)
“
”
Digital Infrastructures are
Information processing
Infrastructures.
Atomic Operations in Data-Verse
Store
AnalyseCreate
Use of Crypto
in Digital
Infrastructures
First came the Data Storage
Then came the Processing
And then you bring your data
Atomic Operations in Data-Verse
Store
AnalyseCreate
S3EBS
EC2 Compute
AWS Revenues
Year Revenue Loss
2006 $20M $13M
2008 $60M $8M
Bring Your Own Keys
*5 Years later after S3
EBS Encryption
*6 Years later after EBS Announcement
Full Fledged Key Management
Bring your own Keys
Atomic Operations in Data-Verse
Crypto
Analyse
StoreCreate
Why is Crypto important?
Whoever controls the data is
the owner of the data.
1
Where data is stored is
irrelevant if control is yours.
2
Unlike “physical things, in
information infrastructures,
control, storage and
ownership are “different
things”
3
Dis-trust is an Emergent Property
Distrust
Control
StorageOwnership
Crypto Can mediate Trust
CRYPTO
Control
StorageOwnership
Crypto Key
management
used to be hard
problem
But not anymore
Everyone manages their own Keys
And 100s of
them every
single day
OSS and Information Infra-Stacks
 Crypto Protocols are OSS.
 Storage Protocols are OSS. (S3, Block Storage, NFS, Ceph, Gluster FS, ZFS, LVM)
 Storage Services (DynamoDB, Cassandra etc.)
 So how do Digital infrastructures make money? – Efficiency, Optionality and Trust
(provided by Crypto)
Public Locker
But I want to
”Share
Information”
Sharing Information means you “lose control” of it
technically.
The fiction of consent is then created by Legal
principles and through policy.
Multiple schemes exist that allow Limited sharing
but with Bring your own Cryptography algorithms
and Bring your own keys approach.
Property Preserving
Encryption
 If Plain Text (A) < Plain Text (B), then
 Encrypted (A) < Encrypted (B).
 If Plain Text(A) OPERATOR Plain Text (B)
 Encrypted (A) OPERATOR Encrypted (B)
 Leaks some information and is vulnerable to
repeated queries.
 Combined with transformation to apply
anonymization offers better protection
PPE Applicability
 A Document (X) can be thought of to have “N” Fields
 Secret ID
 Name
 Date of Birth
 Address
 Different PPE algorithms can be applied to different fields based on what the “Sharer”
wants to.
 Secret ID (Full encryption)
 Name (No Encryption)
 Date of Birth (PPE that transforms into Age number and then applies algorithm that preserves
< and > operations)
 Address (Encrypt everything)
What PPE
offers
Informational self-
determination.
I share not just
fields but can also
determine the PPE
on some fields.
Composable with
Other
Anonymization
functions –
PPE(T(X))
Allows T(X) to be
built for fields
which can be
normalized to PPE
fields
Extraction attacks on PPE
Extraction attacks on PPE
Differential Privacy
 Strong Mathematical foundation that allows balancing
utility and privacy and guarantees
 No access to raw data.
 Resilience to post-processing.
 Resilience to de-anonymization techniques via constant
querying.
 Allows aggregation but evades statistical inference.
ε-differential privacy
 An inference is released from a statistical database and it
should not compromise the individual’s privacy.
 A perfect privacy score would only be possible when the
individual’s data is not in the DB.
 Goal of Differential Privacy = Roughly same privacy to
individual as if their data is not in the DB.
Multiple
successful
real-world
cases
Windows Telemetry
Linked-in Advertiser queries
US Census for commuting
patterns.
Case Study: US Census Bureau
Consent , crypto and information infrastructure systems
Privacy Pie
Crypto Key
Management
Storage
Management
Privacy Services
Utility Layers
Why is
Consent
broken?
How not to
break
Consent?
1 of 42

Recommended

FIWARE Global Summit - IoT Virtualization for Platform Interoperability by
FIWARE Global Summit - IoT Virtualization for Platform InteroperabilityFIWARE Global Summit - IoT Virtualization for Platform Interoperability
FIWARE Global Summit - IoT Virtualization for Platform InteroperabilityFIWARE
148 views16 slides
Secure And Green by
Secure And GreenSecure And Green
Secure And Greenbudi rahardjo
437 views10 slides
Hot tech 20160922-ep0015-dell statistica - edge analytics - the io_t economy ... by
Hot tech 20160922-ep0015-dell statistica - edge analytics - the io_t economy ...Hot tech 20160922-ep0015-dell statistica - edge analytics - the io_t economy ...
Hot tech 20160922-ep0015-dell statistica - edge analytics - the io_t economy ...Dez Blanchfield
174 views7 slides
SecureCloud - Concertation Meeting EUBrasilCloudFORUM by
SecureCloud  - Concertation Meeting EUBrasilCloudFORUMSecureCloud  - Concertation Meeting EUBrasilCloudFORUM
SecureCloud - Concertation Meeting EUBrasilCloudFORUMEUBrasilCloudFORUM .
160 views9 slides
FIWARE Global Summit - A Multi-database Plugin for the Orion FIWARE Context B... by
FIWARE Global Summit - A Multi-database Plugin for the Orion FIWARE Context B...FIWARE Global Summit - A Multi-database Plugin for the Orion FIWARE Context B...
FIWARE Global Summit - A Multi-database Plugin for the Orion FIWARE Context B...FIWARE
286 views18 slides
HNSciCloud Overview by
HNSciCloud OverviewHNSciCloud Overview
HNSciCloud OverviewHelix Nebula The Science Cloud
515 views11 slides

More Related Content

What's hot

Encriptacion by
EncriptacionEncriptacion
Encriptacionnaniix21_3
534 views7 slides
Encriptacion by
EncriptacionEncriptacion
Encriptacionnaniix21_3
238 views7 slides
Smart-m3 Security Demo (k. yudenok) by
Smart-m3 Security Demo (k. yudenok)Smart-m3 Security Demo (k. yudenok)
Smart-m3 Security Demo (k. yudenok)OSLL
269 views10 slides
IBM Cloud & Helix Nebula by
IBM Cloud & Helix NebulaIBM Cloud & Helix Nebula
IBM Cloud & Helix NebulaHelix Nebula The Science Cloud
649 views10 slides
Hybrid cloud for science by
Hybrid cloud for science Hybrid cloud for science
Hybrid cloud for science Helix Nebula The Science Cloud
668 views11 slides
FIWARE Global Summit - Edge/Fog Computing in “Powered by FIWARE” Architectures by
FIWARE Global Summit - Edge/Fog Computing in “Powered by FIWARE” ArchitecturesFIWARE Global Summit - Edge/Fog Computing in “Powered by FIWARE” Architectures
FIWARE Global Summit - Edge/Fog Computing in “Powered by FIWARE” ArchitecturesFIWARE
95 views14 slides

What's hot(20)

Encriptacion by naniix21_3
EncriptacionEncriptacion
Encriptacion
naniix21_3534 views
Encriptacion by naniix21_3
EncriptacionEncriptacion
Encriptacion
naniix21_3238 views
Smart-m3 Security Demo (k. yudenok) by OSLL
Smart-m3 Security Demo (k. yudenok)Smart-m3 Security Demo (k. yudenok)
Smart-m3 Security Demo (k. yudenok)
OSLL269 views
FIWARE Global Summit - Edge/Fog Computing in “Powered by FIWARE” Architectures by FIWARE
FIWARE Global Summit - Edge/Fog Computing in “Powered by FIWARE” ArchitecturesFIWARE Global Summit - Edge/Fog Computing in “Powered by FIWARE” Architectures
FIWARE Global Summit - Edge/Fog Computing in “Powered by FIWARE” Architectures
FIWARE95 views
Google's Infrastructure and Specific IoT Services by Intel® Software
Google's Infrastructure and Specific IoT ServicesGoogle's Infrastructure and Specific IoT Services
Google's Infrastructure and Specific IoT Services
Intel® Software1.6K views
Isse 2014 homomorphic encryption and porticor post event by ICT Economic Impact
Isse 2014 homomorphic encryption and porticor   post eventIsse 2014 homomorphic encryption and porticor   post event
Isse 2014 homomorphic encryption and porticor post event
2017 Hackathon Scality & 42 School by Scality
2017 Hackathon Scality & 42 School2017 Hackathon Scality & 42 School
2017 Hackathon Scality & 42 School
Scality251 views
Steve Litras [Cribl] | The Power of Infinite Choice | InfluxDays Virtual Expe... by InfluxData
Steve Litras [Cribl] | The Power of Infinite Choice | InfluxDays Virtual Expe...Steve Litras [Cribl] | The Power of Infinite Choice | InfluxDays Virtual Expe...
Steve Litras [Cribl] | The Power of Infinite Choice | InfluxDays Virtual Expe...
InfluxData165 views
Zenko: Enabling Data Control in a Multi-cloud World by Scality
Zenko: Enabling Data Control in a Multi-cloud WorldZenko: Enabling Data Control in a Multi-cloud World
Zenko: Enabling Data Control in a Multi-cloud World
Scality829 views
IoT with Google ecosystem by Umair Vatao
IoT with Google ecosystemIoT with Google ecosystem
IoT with Google ecosystem
Umair Vatao195 views
Elastic South Africa Meetup July 2020 by Anna Ossowski
Elastic South Africa Meetup July 2020Elastic South Africa Meetup July 2020
Elastic South Africa Meetup July 2020
Anna Ossowski22 views
Google cloud Study Essentials by GDSCKYAMBOGO
Google cloud Study EssentialsGoogle cloud Study Essentials
Google cloud Study Essentials
GDSCKYAMBOGO94 views

Similar to Consent , crypto and information infrastructure systems

What Is Openstack And Its Importance by
What Is Openstack And Its ImportanceWhat Is Openstack And Its Importance
What Is Openstack And Its ImportanceLorie Harris
5 views78 slides
Glue con2011 future_of_net_systems by
Glue con2011 future_of_net_systemsGlue con2011 future_of_net_systems
Glue con2011 future_of_net_systemsJames Urquhart
862 views82 slides
Integrate the AWS Cloud with Responsive Xilinx Machine Learning at the Edge (... by
Integrate the AWS Cloud with Responsive Xilinx Machine Learning at the Edge (...Integrate the AWS Cloud with Responsive Xilinx Machine Learning at the Edge (...
Integrate the AWS Cloud with Responsive Xilinx Machine Learning at the Edge (...Amazon Web Services
1.2K views25 slides
AWS IoT & ML Recap - 20180423 by
AWS IoT & ML Recap - 20180423AWS IoT & ML Recap - 20180423
AWS IoT & ML Recap - 20180423Taka Wang
3 views65 slides
Automating your AWS Security Operations by
Automating your AWS Security OperationsAutomating your AWS Security Operations
Automating your AWS Security OperationsAmazon Web Services
4.9K views51 slides
Automating your AWS Security Operations by
Automating your AWS Security OperationsAutomating your AWS Security Operations
Automating your AWS Security OperationsEvident.io
1.5K views51 slides

Similar to Consent , crypto and information infrastructure systems(20)

What Is Openstack And Its Importance by Lorie Harris
What Is Openstack And Its ImportanceWhat Is Openstack And Its Importance
What Is Openstack And Its Importance
Lorie Harris5 views
Glue con2011 future_of_net_systems by James Urquhart
Glue con2011 future_of_net_systemsGlue con2011 future_of_net_systems
Glue con2011 future_of_net_systems
James Urquhart862 views
Integrate the AWS Cloud with Responsive Xilinx Machine Learning at the Edge (... by Amazon Web Services
Integrate the AWS Cloud with Responsive Xilinx Machine Learning at the Edge (...Integrate the AWS Cloud with Responsive Xilinx Machine Learning at the Edge (...
Integrate the AWS Cloud with Responsive Xilinx Machine Learning at the Edge (...
Amazon Web Services1.2K views
AWS IoT & ML Recap - 20180423 by Taka Wang
AWS IoT & ML Recap - 20180423AWS IoT & ML Recap - 20180423
AWS IoT & ML Recap - 20180423
Taka Wang3 views
Automating your AWS Security Operations by Evident.io
Automating your AWS Security OperationsAutomating your AWS Security Operations
Automating your AWS Security Operations
Evident.io1.5K views
Securing Sensitive Data in Your Hybrid Cloud by RightScale
Securing Sensitive Data in Your Hybrid CloudSecuring Sensitive Data in Your Hybrid Cloud
Securing Sensitive Data in Your Hybrid Cloud
RightScale1.2K views
Data Protection Jurisdiction and International Transfers in Cloud Computing by Cloud Legal Project
Data Protection Jurisdiction and International Transfers in Cloud ComputingData Protection Jurisdiction and International Transfers in Cloud Computing
Data Protection Jurisdiction and International Transfers in Cloud Computing
Cloud Legal Project1.2K views
Teradata and Cisco integrated journey to IoT and Smart city by Artur Borycki
Teradata and Cisco integrated journey to IoT and Smart cityTeradata and Cisco integrated journey to IoT and Smart city
Teradata and Cisco integrated journey to IoT and Smart city
Artur Borycki745 views
IoT Building Blocks: From Edge Devices to Analytics in the Cloud - SRV204 - T... by Amazon Web Services
IoT Building Blocks: From Edge Devices to Analytics in the Cloud - SRV204 - T...IoT Building Blocks: From Edge Devices to Analytics in the Cloud - SRV204 - T...
IoT Building Blocks: From Edge Devices to Analytics in the Cloud - SRV204 - T...
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ... by IJSRD
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
IJSRD 246 views
Enancing Threat Detection with Big Data and AI by Databricks
Enancing Threat Detection with Big Data and AIEnancing Threat Detection with Big Data and AI
Enancing Threat Detection with Big Data and AI
Databricks501 views
Industrial IoT Applications: Making the Connection and Extracting Value (IOT3... by Amazon Web Services
Industrial IoT Applications: Making the Connection and Extracting Value (IOT3...Industrial IoT Applications: Making the Connection and Extracting Value (IOT3...
Industrial IoT Applications: Making the Connection and Extracting Value (IOT3...
IRJET- Data Security in Cloud Computing through AES under Drivehq by IRJET Journal
IRJET- Data Security in Cloud Computing through AES under DrivehqIRJET- Data Security in Cloud Computing through AES under Drivehq
IRJET- Data Security in Cloud Computing through AES under Drivehq
IRJET Journal18 views
[Cisco Connect 2018 - Vietnam] Anh duc le building a secure data center by Nur Shiqim Chok
[Cisco Connect 2018 - Vietnam] Anh duc le   building a secure data center[Cisco Connect 2018 - Vietnam] Anh duc le   building a secure data center
[Cisco Connect 2018 - Vietnam] Anh duc le building a secure data center
Nur Shiqim Chok40 views
Cisco Connect 2018 Vietnam - building a secure data center by NetworkCollaborators
Cisco Connect 2018 Vietnam - building a secure data centerCisco Connect 2018 Vietnam - building a secure data center
Cisco Connect 2018 Vietnam - building a secure data center
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham by IRJET Journal
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET Journal3 views
Cisco Connect 2018 Indonesia - Building a secure data center by NetworkCollaborators
Cisco Connect 2018 Indonesia - Building a secure data center Cisco Connect 2018 Indonesia - Building a secure data center
Cisco Connect 2018 Indonesia - Building a secure data center
Internet of Things (IoT) - in the cloud or rather on-premises? by Guido Schmutz
Internet of Things (IoT) - in the cloud or rather on-premises?Internet of Things (IoT) - in the cloud or rather on-premises?
Internet of Things (IoT) - in the cloud or rather on-premises?
Guido Schmutz650 views

Recently uploaded

Five Things You SHOULD Know About Postman by
Five Things You SHOULD Know About PostmanFive Things You SHOULD Know About Postman
Five Things You SHOULD Know About PostmanPostman
30 views43 slides
Special_edition_innovator_2023.pdf by
Special_edition_innovator_2023.pdfSpecial_edition_innovator_2023.pdf
Special_edition_innovator_2023.pdfWillDavies22
17 views6 slides
Vertical User Stories by
Vertical User StoriesVertical User Stories
Vertical User StoriesMoisés Armani Ramírez
12 views16 slides
SAP Automation Using Bar Code and FIORI.pdf by
SAP Automation Using Bar Code and FIORI.pdfSAP Automation Using Bar Code and FIORI.pdf
SAP Automation Using Bar Code and FIORI.pdfVirendra Rai, PMP
22 views38 slides
Business Analyst Series 2023 - Week 3 Session 5 by
Business Analyst Series 2023 -  Week 3 Session 5Business Analyst Series 2023 -  Week 3 Session 5
Business Analyst Series 2023 - Week 3 Session 5DianaGray10
237 views20 slides
The Research Portal of Catalonia: Growing more (information) & more (services) by
The Research Portal of Catalonia: Growing more (information) & more (services)The Research Portal of Catalonia: Growing more (information) & more (services)
The Research Portal of Catalonia: Growing more (information) & more (services)CSUC - Consorci de Serveis Universitaris de Catalunya
79 views25 slides

Recently uploaded(20)

Five Things You SHOULD Know About Postman by Postman
Five Things You SHOULD Know About PostmanFive Things You SHOULD Know About Postman
Five Things You SHOULD Know About Postman
Postman30 views
Special_edition_innovator_2023.pdf by WillDavies22
Special_edition_innovator_2023.pdfSpecial_edition_innovator_2023.pdf
Special_edition_innovator_2023.pdf
WillDavies2217 views
SAP Automation Using Bar Code and FIORI.pdf by Virendra Rai, PMP
SAP Automation Using Bar Code and FIORI.pdfSAP Automation Using Bar Code and FIORI.pdf
SAP Automation Using Bar Code and FIORI.pdf
Business Analyst Series 2023 - Week 3 Session 5 by DianaGray10
Business Analyst Series 2023 -  Week 3 Session 5Business Analyst Series 2023 -  Week 3 Session 5
Business Analyst Series 2023 - Week 3 Session 5
DianaGray10237 views
TouchLog: Finger Micro Gesture Recognition Using Photo-Reflective Sensors by sugiuralab
TouchLog: Finger Micro Gesture Recognition  Using Photo-Reflective SensorsTouchLog: Finger Micro Gesture Recognition  Using Photo-Reflective Sensors
TouchLog: Finger Micro Gesture Recognition Using Photo-Reflective Sensors
sugiuralab19 views
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院 by IttrainingIttraining
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院
PharoJS - Zürich Smalltalk Group Meetup November 2023 by Noury Bouraqadi
PharoJS - Zürich Smalltalk Group Meetup November 2023PharoJS - Zürich Smalltalk Group Meetup November 2023
PharoJS - Zürich Smalltalk Group Meetup November 2023
Noury Bouraqadi126 views
Lilypad @ Labweek, Istanbul, 2023.pdf by Ally339821
Lilypad @ Labweek, Istanbul, 2023.pdfLilypad @ Labweek, Istanbul, 2023.pdf
Lilypad @ Labweek, Istanbul, 2023.pdf
Ally3398219 views
Web Dev - 1 PPT.pdf by gdsczhcet
Web Dev - 1 PPT.pdfWeb Dev - 1 PPT.pdf
Web Dev - 1 PPT.pdf
gdsczhcet60 views
Attacking IoT Devices from a Web Perspective - Linux Day by Simone Onofri
Attacking IoT Devices from a Web Perspective - Linux Day Attacking IoT Devices from a Web Perspective - Linux Day
Attacking IoT Devices from a Web Perspective - Linux Day
Simone Onofri15 views
STPI OctaNE CoE Brochure.pdf by madhurjyapb
STPI OctaNE CoE Brochure.pdfSTPI OctaNE CoE Brochure.pdf
STPI OctaNE CoE Brochure.pdf
madhurjyapb13 views

Consent , crypto and information infrastructure systems