Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

ISOC Panel at IETF 90 - Internet Security and Privacy: Ten years later

572 views

Published on

How have Internet security and privacy landscapes changed since the Internet’s inception? What challenges do we still need to address, and will we still be using the same building blocks (TLS, DNSSEC, etc.) ten years from now? If not, what’s next?

Andrei Robachevsky moderated the panel, as four distinguished experts discussed the nature of Internet security and its evolution. The speakers were:

• Lucy Lynch
• Danny McPherson
• Dave Oran
• Wendy Seltzer

Published in: Technology
  • Be the first to comment

  • Be the first to like this

ISOC Panel at IETF 90 - Internet Security and Privacy: Ten years later

  1. 1. www.internetsociety.org Internet Security and Privacy: Ten years later Andrei Robachevsky, moderator. The Internet Society 1
  2. 2. The Internet Society We are… 2 Not at the IETF  Taking discussion up a level  Taking any identified work items to the appropriate IETF WGs “On the air”  Streaming  Recording Stopping at 12:45pm so you can all get back to the IETF…
  3. 3. The Internet Society Agenda outline 3 Introduction Framing discussion Open mic
  4. 4. The Internet Society The Panel Andrei Robachevsky (Moderator) Lucy Lynch (Internet Society) Danny McPherson (Verisign) Dave Oran (Cisco) Wendy Seltzer (W3C)
  5. 5. The Internet Society Today’s discussion Ten years later – a random point in the future  No magic – just extrapolation  A checkpoint – are we in a good shape? The Internet is changing And Security and Privacy are changing with it How are our approaches change? Main threats and critical elements  Our focus today is tomorrow’s security and privacy 5
  6. 6. The Internet Society Facets of Evolution: the edge 6
  7. 7. The Internet Society Facets of Evolution: the edge 7
  8. 8. The Internet Society Facets of Evolution: the edge 8
  9. 9. The Internet Society Facets of Evolution: the edge 9
  10. 10. The Internet Society Facets of Evolution: locality 10
  11. 11. The Internet Society Facets of Evolution: threats and attacks 11
  12. 12. The Internet Society Security of elements – Security of the ecosystem 12 ? Techno logy Coffee People Money
  13. 13. The Internet Society Trade-offs, cooperation and dependencies 13 Security Privacy Ops Regula tion Anony mity Authen ticity Integrity Avail ability Cooper ation
  14. 14. The Internet Society Ten years from now – what do we want to know? 14 What are the critical elements that will shape the state of security and privacy in ten years?
  15. 15. The Internet Society What are the critical elements that will shape the state of security and privacy in ten years? Ten years from now – what do we want to know? 15
  16. 16. The Internet Society Seeds of future security and privacy What unconventional or new approaches we see that have potential for solution of future problems? Ten years from now – what do we want to know? 16
  17. 17. The Internet Society ICN – Internet Security Savior? Content security replaces channel security Cryptographic Integrity built in a fundamental level  Provenance and origin authentication too  Encryption layered on top (application function) Source anonymity (no source addresses)  But content names are visible (since they are used for routing) Most attack vectors in IP mapped to a small set of DoS vectors (all flooding related) No magic  Trust management unsolved  Business models still often depend on abandoning privacy
  18. 18. The Internet Society New Crypto – Internet Security Saviour? Functional Encryption and its family of Homomorphic transforms allows computation on encrypted data  General functions are about 14 orders of magnitude too slow  Restricted functions (like boolean expressions) about 7 orders of magnitude too slow  Some useful things (equality, range testing) actually practical now but very expensive- e.g. CryptDB Privacy-preserving query systems  Can perform queries against databases without leaking information
  19. 19. The Internet Society Security and Privacy - a tussle or a cooperation? As the Internet evolves will they become more antagonistic, leading to harder trade-offs, or mutually supportive, allowing more comprehensive solutions? Ten years from now – what do we want to know? 19

×