SlideShare a Scribd company logo
1 of 25
Download to read offline
@JOTB19
{“ON”:”THE BEACH”}
MARBELLA, SPAIN / 15TH - 17TH MAY 2019
Bringing developers and DevOps together around Big Data
4th Edition
1
@JOTB19
The TIPPSS Imperative for IoT-
Ensuring Trust, Identity, Privacy,
Protection, Safety and Security
- Florence D. Hudson
- Founder & CEO, FDHint
IEEE-Standards Association, Clinical IoT & TIPPSS
2
@JOTB19
“Our increasingly connected world
leveraging the Internet of Things (IoT)
creates great value, and great risk.
We must work to ensure TIPPSS:
Trust, Identity, Privacy, Protection, Safety, Security,
for devices, systems, solutions, people.”
- Florence D. Hudson, Founder & CEO, FDHint
3
@JOTB19
An aspirational view of connected healthcare
http://bit.ly/asperationalhealthcare
4
@JOTB19@JOTB19
Advanced technology and data
integration will portend the future
Source: https://www.goodfirms.co/blog/iot-connection-with-trending-technologies 5
@JOTB19@JOTB19
IoT will generate huge volumes of
data from explosive device growth
Sources: What’s The Big Data 2015; Datafloq 2016; GlobalSources 2016 6
@JOTB19
Health data sharing &
Medical IoT usage is increasing
Sources: FDHint, Frost & Sullivan, CIO Magazine, Healthcare IT News 7
“We've killed more people because we
didn't share data than because we did.”
- CIO Magazine, Paddy Padmanabhan
“87% of health organizations plan to adopt
IoT technology by 2019.”
- Healthcare IT News, Jessica Davis
NCI Cancer Moonshot Blue Ribbon Panel
• Enhanced data sharing working group
• Build a national cancer data ecosystem
Computational Approaches for Cancer
annual SuperComputing workshop
@JOTB19@JOTB19
Precision Medicine will leverage
large volumes and varieties of data
Data to
Support
Precision
Medicine
Clinical and
fundamental
research
data
Many data sources and types to improve
context, insights and healthcare outcomes
• Genomic data
• Clinical and fundamental research
• Clinical care data and observations – image, text,
numerical, video, audio, etc.
• IoT Wearables: patient health and lifestyle data
• Real World Evidence (RWE) leveraging Unique
Device Identifiers (UDI)
• Life sciences, environment data
Genomic
data
Life
sciences,
environment
data
Clinical
care
data
IoT
Wearables:
Connected
health and
patient
lifestyle data
Source: FDHint; “Wearables and Medical Interoperability: The Evolving Frontier“, IEEE Computer Magazine, Authors Florence Hudson and Chris Clark, September 2018,
Copyright © 2018, IEEE; NIH 2015; *The New England Journal of Medicine, Vol. 378, No. 7, February 15, 2018 “Medical Devices in the Real World” , 8
@JOTB19@JOTB19
To improve efficiency, safety, quality of life, energy use, & environment.
Smart Cities will be an interconnected
IoT-enabled “system of systems”
What can we enable if we think across the system of systems?
9Source: Florence D. Hudson
@JOTB19
Smart Cities will be built on Internet of
Things technologies needing TIPPSS.
Sources: FDHint; MetroLab 2017; NSF 2016; Frost & Sullivan 2016
TRUST
IDENTITY
PRIVACY PROTECTION
SAFETY
SECURITY
10
@JOTB19@JOTB19
TIPPSS: an imperative for
Smart Cities & Connected Healthcare
• Trust: Allow only designated people/services
to have device or data access
• Identity: Validate the identity of people,
services, and “things”
• Privacy: Ensure device, personal, sensitive
data kept private
• Protection: Protect devices and users from
harm – physical, financial, reputational
• Safety: Provide safety for devices,
infrastructure and people
• Security: Maintain security of data, devices,
systems, people
11Sources: Florence D. Hudson, FDHint
@JOTB19@JOTB19
Security and privacy risk
and concerns are increasing
http://bit.ly/neutronstarscollide
http://bit.ly/smartlockshack
http://bit.ly/jeephackwired
http://bit.ly/jnjinsulinpump
http://bit.ly/medtronicinsulinpump
http://bit.ly/fdarecallspacemakers
US Department of Homeland Security (DHS)
announces healthcare device hacking risk
• Exploitable with adjacent access, low skill level.
• Attacker can listen to communications,
including transmission of sensitive data.
12Sources: Florence D. Hudson, FDHint
@JOTB19@JOTB19
What could possibly go wrong?
We need to protect the humans.
Top concerns:
• Connected healthcare devices
• Connected vehicles
Protection needed regarding:
• Device, hardware, software, service
hacks - physical health and safety risk
• Financial risk, reputational harm
• Data theft, data integrity, loss of privacy
• Defense in depth needed – Hardware,
firmware, software, service
Need to evolve policy and culture.
Sources: FDHint; Florence D. Hudson; KPMG - Security and the IOT Ecosystem, 2015 13
@JOTB19@JOTB19
IEEE Enabling Focus on TIPPSS
for IoT devices and data
Source: ”Enabling Trust and Security: TIPPSS for IoT”, IEEE IT Professional 2018; “Wearables and Medical Interoperability: The Evolving Frontier”, IEEE Computer 2018, © 2018, IEEE 14
@JOTB19
Blockchain – the Big Picture
Blockchain is digital Distributed Ledger Technology (DLT) which enables
data sharing without a central authority.
• A “basically immutable” record of transactions (basically is NOT = immutable)
• Tracks metadata about physical, financial, virtual transactions
• Keeps track of data provenance, additions to the blockchain, who, what, when
15
@JOTB19@JOTB19
Blockchain value, issues, challenges
The value of blockchain
• A distributed multi-party ledger with an “append only” structure
• Data provenance – tracks data, knows if it’s been changed, adds to the ledger
• A “basically immutable” record of transactions – maybe - see 51% rule
• Enables use of smart contracts and incentives for data sharing and transactions
• Might add Trust, Identity, Privacy, Protection, Safety and Security…if deployed correctly
Issues and challenges to be addressed regarding blockchain use cases
• Data can be hacked before it gets on the blockchain
• The blockchain can be hacked - need true “immutability” – 51% rule - “collusion”
• Need defense in depth to ensure end-to-end data security and privacy, on and off chain
16Sources: Florence D. Hudson, FDHint
@JOTB19
Application Collusion Research -
There is more to be done for TIPPSS
17
Colluded applications – are
collaborating applications that can
bypass permissions through
communicating with each other.
Researchers: Leon Reznik, Igor Khokhlov, Department of Computer Science
Rochester Institute of Technology, email: lr@cs.rit.edu, ixk8996@rit.edu
Data Qulity
Data Veracity User’s Privacy
Physical Data
Veracity
Logical Data
Veracity
Noise
Influence
Colluded
Applications
17Sources: Florence D. Hudson, FDHint
@JOTB19@JOTB19
Blockchain may be part of the solution
for TIPPSS … but could also add risk
18Sources: Florence D. Hudson, FDHint
@JOTB19@JOTB19
Health IT leaders are
experimenting with blockchain
Synaptic Health Alliance includes:
• Aetna
• Ascension
• Cognizant
• Humana
• MultiPlan
• Optum
• Quest Diagnostics
• UnitedHealthcare
19Sources: Florence D. Hudson, FDHint, https://www.synaptichealthalliance.com/project
@JOTB19@JOTB19
Blockchain in Healthcare Today
Open access peer-review journal
20
• On-line journal
• Original manuscripts, use cases, research
• Published on a continuous basis
• 20,000 downloads in 65 countries
• Available on Alexa!
• https://blockchainhealthcaretoday.com/
Sources: Florence D. Hudson, FDHint
@JOTB19
IEEE - Standards Association (IEEE-SA) :
Clinical IoT Data and Device Interoperability with TIPPSS
Goal: Develop a viable framework for a standard or set of standards that would enable device and data
interoperability with clinical-grade IoT with Trust, Identity, Privacy, Protection, Safety and Security, which
may include interoperability with blockchain or Digital Distributed Ledger Technology ( DLT ).
Pre-standards workstream participants included industry, academia, govt representatives from
Ascension, Bayer, Cognizant, ERT, FDHint, IBM, IEEE, Indiana University Health, Intel, Medtronic,
Oracle, Spiritus, Synopsys, University at Buffalo, US FDA, Wireless Research Center of North Carolina
Email flo1980@alumni.princeton.edu to connect to the IEEE-SA Clinical IoT and TIPPSS effort led
by FDHint, Indiana University Health, United Healthcare, Medtronic
IEEE Pre-Standards Activity Completed – Sign Up for Formal Standards Effort in IEEE-SA Project P2733
21Sources: Florence D. Hudson, FDHint
@JOTB19
IEEE-SA Pre-Standards Workstream Clinical IoT Data Validation & Interoperability with Blockchain - 2018/2019 – Draft Updated 24.Jan.2019
DRAFT - TIPPSS Architectural Framework for
Clinical IoT Data & Device Interoperability
Data Sources & Targets –
on chain and off chain
Clinical IoT – includes wearables, implantables, external and environmental sensors, actuators,
devices that create data used in clinical decisions, by humans, M2M, H2M, M2H
EMR/
EDW
Health
apps
Clinical
Labs
Claims Pharma
Data Ingest &
Management
Batch
Local
Gateway
Streaming
API
(FHIR)
Distributed
Ledger Technology
Security,Encryption,FederatedIdentityManagement,Key
Management,UserManagement,Authentication,Privacy,Compliance,
Governanceforhardware,firmware,software,applications,services
ConsentData Model
UX/UI Patients Providers Payers Regulators Pharma
API, SDKs
Social determinates
of health (Structured
+ Unstructured)
Genomics
Life
Style
Clinical
Research
Contract
Access
control
Applications
Devices
Advanced
Analytics
Artificial
Intelligence /
Machine Learning
Research
Device
Mgmt
Enroll
Transaction
History
Contract
Mgmt
Rules
engine
Device Connect
& Handshake
Data
Lineage
Data
Validation
Data
Validation
Data
Transformation
Precision
Medicine
Edge
Computing
Consensus
Algorithms
Health
apps
Trusted
Commands
Real time medical
device actuation
XR
Integration FHIR HL7 CDA CCD GELLO SNOMED LOINC
ISO
11073
CPT ICD-10 RDF
Connection
Layer
22
Sources:FlorenceD.Hudson,FDHint
@JOTB19
Read “Women Securing the Future with
TIPPSS for IoT” by 17 women authors
23
https://www.springer.com/gp/book/9783030157043#aboutBook
Authors include:
• CERN
• CISCO
• City of San Francisco
• GÉANT
• GlaxoSmithKline
• IBM
• Indiana University
• Judge
• REN-ISAC
• Start-ups
• UC Berkeley
• UC Santa Cruz
• University of Kentucky
• Venture Capitalists
• Virginia Tech
Sources: Florence D. Hudson, FDHint
@JOTB19@JOTB19
24
The Book Chapters: Women Securing
the Future with TIPPSS for IoT
1. IoT: Is It a Digital Highway to Security Attacks? - Cisco
2. IoT: Privacy, Security, and Your Civil Rights – Colorado Judge
3. Privacy in the New Age of IoT - GSK
4. A Business Framework for Evaluating Trust in IoT Technology – Alpha Edison - VC
5. Ahead of the Curve: IoT Security, Privacy, and Policy in Higher Ed – REN-ISAC, VTC
6. Trust, Identity, Privacy, and Security for a Smart Campus – Virginia Tech
7. Security for Science: How One Thing Leads to Another - CERN
8. The Dark Side of Things - GÉANT
9. Public Safety and Protection by Design: IoT and Data Science – UC Berkeley, SF
10. Privacy Management in the Internet of Things (IoT) – University of Kentucky
11. Securing IoT Data with Pervasive Encryption - IBM
12. Secure Distributed Storage for the Internet of Things – UC Santa Cruz
13. Profiles of Women Securing the Future with TIPPSS for IoT – FDHint
@JOTB19
@Flo4Princeton
flo1980@alumni.Princeton.edu
25

More Related Content

What's hot

Blockchain Technology and COVID19
Blockchain Technology and COVID19Blockchain Technology and COVID19
Blockchain Technology and COVID19Ahmed Banafa
 
Compiler design presentaion
Compiler design presentaionCompiler design presentaion
Compiler design presentaionMdShahinAlam25
 
2019: Regulating disinformation with artificial intelligence (AI)
2019: Regulating disinformation with artificial intelligence (AI)2019: Regulating disinformation with artificial intelligence (AI)
2019: Regulating disinformation with artificial intelligence (AI)Chris Marsden
 
Internet of Things and Security challenges
Internet of Things and Security challengesInternet of Things and Security challenges
Internet of Things and Security challengesAnastasios Economides
 
New trends of IoT in 2018 and beyond (SJSU Conference )
New trends of IoT in 2018 and beyond (SJSU Conference ) New trends of IoT in 2018 and beyond (SJSU Conference )
New trends of IoT in 2018 and beyond (SJSU Conference ) Ahmed Banafa
 
8 trends of IoT in 2018
8 trends of IoT in 20188 trends of IoT in 2018
8 trends of IoT in 2018Ahmed Banafa
 
Oxford Internet Institute 19 Sept 2019: Disinformation – Platform, publisher ...
Oxford Internet Institute 19 Sept 2019: Disinformation – Platform, publisher ...Oxford Internet Institute 19 Sept 2019: Disinformation – Platform, publisher ...
Oxford Internet Institute 19 Sept 2019: Disinformation – Platform, publisher ...Chris Marsden
 
Comparative Study of Security Issue and Challenges in IoT
Comparative Study of Security Issue and Challenges in IoTComparative Study of Security Issue and Challenges in IoT
Comparative Study of Security Issue and Challenges in IoTijtsrd
 
SMART HEALTH AND Internet of Things (IoT) - RESEARCH Opportunities
SMART HEALTH AND Internet of Things (IoT) 	-  RESEARCH  OpportunitiesSMART HEALTH AND Internet of Things (IoT) 	-  RESEARCH  Opportunities
SMART HEALTH AND Internet of Things (IoT) - RESEARCH Opportunities Tauseef Naquishbandi
 
"Towards Value-Centric Big Data" e-SIDES Workshop - Slide-deck
"Towards Value-Centric Big Data" e-SIDES Workshop - Slide-deck"Towards Value-Centric Big Data" e-SIDES Workshop - Slide-deck
"Towards Value-Centric Big Data" e-SIDES Workshop - Slide-decke-SIDES.eu
 
IRJET -Securing Data in Distributed System using Blockchain and AI
IRJET -Securing Data in Distributed System using Blockchain and AIIRJET -Securing Data in Distributed System using Blockchain and AI
IRJET -Securing Data in Distributed System using Blockchain and AIIRJET Journal
 
Offdata: a prosumer law agency to govern big data in the public interest
Offdata:  a prosumer law agency to govern big data in the public interestOffdata:  a prosumer law agency to govern big data in the public interest
Offdata: a prosumer law agency to govern big data in the public interestChris Marsden
 
9 IoT predictions for 2019
9 IoT predictions for 20199 IoT predictions for 2019
9 IoT predictions for 2019Ahmed Banafa
 
Security and Privacy Issues in IoT Environment
Security and Privacy Issues in IoT EnvironmentSecurity and Privacy Issues in IoT Environment
Security and Privacy Issues in IoT EnvironmentDr. Amarjeet Singh
 
A Wake-Up Call for IoT
A Wake-Up Call for IoT A Wake-Up Call for IoT
A Wake-Up Call for IoT Ahmed Banafa
 
Hardware/Software Interoperability and Single Point Vulnerability Problems of...
Hardware/Software Interoperability and Single Point Vulnerability Problems of...Hardware/Software Interoperability and Single Point Vulnerability Problems of...
Hardware/Software Interoperability and Single Point Vulnerability Problems of...BRNSS Publication Hub
 
Hot technologies of 2019
Hot technologies of 2019Hot technologies of 2019
Hot technologies of 2019Ahmed Banafa
 

What's hot (20)

Internet of Things(IOT)
Internet of Things(IOT)Internet of Things(IOT)
Internet of Things(IOT)
 
Internet of Things TCLG Oct 23 2014
Internet of Things TCLG Oct 23 2014Internet of Things TCLG Oct 23 2014
Internet of Things TCLG Oct 23 2014
 
Blockchain Technology and COVID19
Blockchain Technology and COVID19Blockchain Technology and COVID19
Blockchain Technology and COVID19
 
Compiler design presentaion
Compiler design presentaionCompiler design presentaion
Compiler design presentaion
 
2019: Regulating disinformation with artificial intelligence (AI)
2019: Regulating disinformation with artificial intelligence (AI)2019: Regulating disinformation with artificial intelligence (AI)
2019: Regulating disinformation with artificial intelligence (AI)
 
Internet of Things and Security challenges
Internet of Things and Security challengesInternet of Things and Security challenges
Internet of Things and Security challenges
 
New trends of IoT in 2018 and beyond (SJSU Conference )
New trends of IoT in 2018 and beyond (SJSU Conference ) New trends of IoT in 2018 and beyond (SJSU Conference )
New trends of IoT in 2018 and beyond (SJSU Conference )
 
8 trends of IoT in 2018
8 trends of IoT in 20188 trends of IoT in 2018
8 trends of IoT in 2018
 
Oxford Internet Institute 19 Sept 2019: Disinformation – Platform, publisher ...
Oxford Internet Institute 19 Sept 2019: Disinformation – Platform, publisher ...Oxford Internet Institute 19 Sept 2019: Disinformation – Platform, publisher ...
Oxford Internet Institute 19 Sept 2019: Disinformation – Platform, publisher ...
 
Comparative Study of Security Issue and Challenges in IoT
Comparative Study of Security Issue and Challenges in IoTComparative Study of Security Issue and Challenges in IoT
Comparative Study of Security Issue and Challenges in IoT
 
SMART HEALTH AND Internet of Things (IoT) - RESEARCH Opportunities
SMART HEALTH AND Internet of Things (IoT) 	-  RESEARCH  OpportunitiesSMART HEALTH AND Internet of Things (IoT) 	-  RESEARCH  Opportunities
SMART HEALTH AND Internet of Things (IoT) - RESEARCH Opportunities
 
"Towards Value-Centric Big Data" e-SIDES Workshop - Slide-deck
"Towards Value-Centric Big Data" e-SIDES Workshop - Slide-deck"Towards Value-Centric Big Data" e-SIDES Workshop - Slide-deck
"Towards Value-Centric Big Data" e-SIDES Workshop - Slide-deck
 
IRJET -Securing Data in Distributed System using Blockchain and AI
IRJET -Securing Data in Distributed System using Blockchain and AIIRJET -Securing Data in Distributed System using Blockchain and AI
IRJET -Securing Data in Distributed System using Blockchain and AI
 
Offdata: a prosumer law agency to govern big data in the public interest
Offdata:  a prosumer law agency to govern big data in the public interestOffdata:  a prosumer law agency to govern big data in the public interest
Offdata: a prosumer law agency to govern big data in the public interest
 
9 IoT predictions for 2019
9 IoT predictions for 20199 IoT predictions for 2019
9 IoT predictions for 2019
 
Security and Privacy Issues in IoT Environment
Security and Privacy Issues in IoT EnvironmentSecurity and Privacy Issues in IoT Environment
Security and Privacy Issues in IoT Environment
 
A Wake-Up Call for IoT
A Wake-Up Call for IoT A Wake-Up Call for IoT
A Wake-Up Call for IoT
 
IoT.ppt
IoT.pptIoT.ppt
IoT.ppt
 
Hardware/Software Interoperability and Single Point Vulnerability Problems of...
Hardware/Software Interoperability and Single Point Vulnerability Problems of...Hardware/Software Interoperability and Single Point Vulnerability Problems of...
Hardware/Software Interoperability and Single Point Vulnerability Problems of...
 
Hot technologies of 2019
Hot technologies of 2019Hot technologies of 2019
Hot technologies of 2019
 

Similar to The TIPPSS Imperative for IoT - Ensuring Trust, Identity, Privacy, Protection, Safety and Security

TIPPSS for Enabling & Securing our Increasingly Connected World – Trust, Iden...
TIPPSS for Enabling & Securing our Increasingly Connected World – Trust, Iden...TIPPSS for Enabling & Securing our Increasingly Connected World – Trust, Iden...
TIPPSS for Enabling & Securing our Increasingly Connected World – Trust, Iden...PacificResearchPlatform
 
IoT tietoturva terveydenhuollossa, 2017-03-21, gko
IoT tietoturva terveydenhuollossa, 2017-03-21, gkoIoT tietoturva terveydenhuollossa, 2017-03-21, gko
IoT tietoturva terveydenhuollossa, 2017-03-21, gkoGlen Koskela
 
[SLIDES] Internet of Things presentation at AEI (Sept 2014)
[SLIDES] Internet of Things presentation at AEI (Sept 2014)[SLIDES] Internet of Things presentation at AEI (Sept 2014)
[SLIDES] Internet of Things presentation at AEI (Sept 2014)Adam Thierer
 
How Can Policymakers and Regulators Better Engage the Internet of Things?
How Can Policymakers and Regulators Better Engage the Internet of Things? How Can Policymakers and Regulators Better Engage the Internet of Things?
How Can Policymakers and Regulators Better Engage the Internet of Things? Mercatus Center
 
Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Dri...
Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Dri...Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Dri...
Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Dri...Adam Thierer
 
IoT and Big Data.pptx
IoT and Big Data.pptxIoT and Big Data.pptx
IoT and Big Data.pptxcetabac
 
IoT and Big Data.pptx
IoT and Big Data.pptxIoT and Big Data.pptx
IoT and Big Data.pptxSampath737246
 
IoT and Big Data.pptx
IoT and Big Data.pptxIoT and Big Data.pptx
IoT and Big Data.pptxssuser2cc0d4
 
The social aspect of Smart Wearable Systems in the era of Internet-of-Things
The social aspect of Smart Wearable Systems in the era of Internet-of-ThingsThe social aspect of Smart Wearable Systems in the era of Internet-of-Things
The social aspect of Smart Wearable Systems in the era of Internet-of-ThingsAnax Fotopoulos
 
Internet of Things for healthcare: data integration and security/privacy issu...
Internet of Things for healthcare: data integration and security/privacy issu...Internet of Things for healthcare: data integration and security/privacy issu...
Internet of Things for healthcare: data integration and security/privacy issu...PayamBarnaghi
 
Internet of things
Internet of thingsInternet of things
Internet of thingsNaiyer Khan
 
Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks
Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks
Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks Chuck Brooks
 
Iot tunisia forum 2017 internet of things trends_directions and opportunit...
Iot tunisia forum 2017    internet of things trends_directions and opportunit...Iot tunisia forum 2017    internet of things trends_directions and opportunit...
Iot tunisia forum 2017 internet of things trends_directions and opportunit...IoT Tunisia
 
Internet of Things (IoT) - Hafedh Alyahmadi - May 29, 2015.pdf
Internet of Things (IoT) - Hafedh Alyahmadi - May 29, 2015.pdfInternet of Things (IoT) - Hafedh Alyahmadi - May 29, 2015.pdf
Internet of Things (IoT) - Hafedh Alyahmadi - May 29, 2015.pdfImXaib
 
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-gInternet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-gMohan Kumar G
 
Дорожная карта промышленного интернета
Дорожная карта промышленного интернетаДорожная карта промышленного интернета
Дорожная карта промышленного интернетаSergey Zhdanov
 
Application OF IoT in Military Service
Application OF IoT in Military ServiceApplication OF IoT in Military Service
Application OF IoT in Military Serviceijtsrd
 

Similar to The TIPPSS Imperative for IoT - Ensuring Trust, Identity, Privacy, Protection, Safety and Security (20)

TIPPSS for Enabling & Securing our Increasingly Connected World – Trust, Iden...
TIPPSS for Enabling & Securing our Increasingly Connected World – Trust, Iden...TIPPSS for Enabling & Securing our Increasingly Connected World – Trust, Iden...
TIPPSS for Enabling & Securing our Increasingly Connected World – Trust, Iden...
 
IoT tietoturva terveydenhuollossa, 2017-03-21, gko
IoT tietoturva terveydenhuollossa, 2017-03-21, gkoIoT tietoturva terveydenhuollossa, 2017-03-21, gko
IoT tietoturva terveydenhuollossa, 2017-03-21, gko
 
[SLIDES] Internet of Things presentation at AEI (Sept 2014)
[SLIDES] Internet of Things presentation at AEI (Sept 2014)[SLIDES] Internet of Things presentation at AEI (Sept 2014)
[SLIDES] Internet of Things presentation at AEI (Sept 2014)
 
How Can Policymakers and Regulators Better Engage the Internet of Things?
How Can Policymakers and Regulators Better Engage the Internet of Things? How Can Policymakers and Regulators Better Engage the Internet of Things?
How Can Policymakers and Regulators Better Engage the Internet of Things?
 
Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Dri...
Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Dri...Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Dri...
Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Dri...
 
IoT and Big Data.pptx
IoT and Big Data.pptxIoT and Big Data.pptx
IoT and Big Data.pptx
 
IoT and Big Data.pptx
IoT and Big Data.pptxIoT and Big Data.pptx
IoT and Big Data.pptx
 
IoT and Big Data.pptx
IoT and Big Data.pptxIoT and Big Data.pptx
IoT and Big Data.pptx
 
The social aspect of Smart Wearable Systems in the era of Internet-of-Things
The social aspect of Smart Wearable Systems in the era of Internet-of-ThingsThe social aspect of Smart Wearable Systems in the era of Internet-of-Things
The social aspect of Smart Wearable Systems in the era of Internet-of-Things
 
Internet of Things for healthcare: data integration and security/privacy issu...
Internet of Things for healthcare: data integration and security/privacy issu...Internet of Things for healthcare: data integration and security/privacy issu...
Internet of Things for healthcare: data integration and security/privacy issu...
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks
Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks
Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks
 
IoT
IoT  IoT
IoT
 
Iot tunisia forum 2017 internet of things trends_directions and opportunit...
Iot tunisia forum 2017    internet of things trends_directions and opportunit...Iot tunisia forum 2017    internet of things trends_directions and opportunit...
Iot tunisia forum 2017 internet of things trends_directions and opportunit...
 
IoT Intro.pptx
IoT Intro.pptxIoT Intro.pptx
IoT Intro.pptx
 
Internet of Things (IoT) - Hafedh Alyahmadi - May 29, 2015.pdf
Internet of Things (IoT) - Hafedh Alyahmadi - May 29, 2015.pdfInternet of Things (IoT) - Hafedh Alyahmadi - May 29, 2015.pdf
Internet of Things (IoT) - Hafedh Alyahmadi - May 29, 2015.pdf
 
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-gInternet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
 
Дорожная карта промышленного интернета
Дорожная карта промышленного интернетаДорожная карта промышленного интернета
Дорожная карта промышленного интернета
 
Io t whitepaper_5_15_17
Io t whitepaper_5_15_17Io t whitepaper_5_15_17
Io t whitepaper_5_15_17
 
Application OF IoT in Military Service
Application OF IoT in Military ServiceApplication OF IoT in Military Service
Application OF IoT in Military Service
 

More from J On The Beach

Massively scalable ETL in real world applications: the hard way
Massively scalable ETL in real world applications: the hard wayMassively scalable ETL in real world applications: the hard way
Massively scalable ETL in real world applications: the hard wayJ On The Beach
 
Big Data On Data You Don’t Have
Big Data On Data You Don’t HaveBig Data On Data You Don’t Have
Big Data On Data You Don’t HaveJ On The Beach
 
Acoustic Time Series in Industry 4.0: Improved Reliability and Cyber-Security...
Acoustic Time Series in Industry 4.0: Improved Reliability and Cyber-Security...Acoustic Time Series in Industry 4.0: Improved Reliability and Cyber-Security...
Acoustic Time Series in Industry 4.0: Improved Reliability and Cyber-Security...J On The Beach
 
Pushing it to the edge in IoT
Pushing it to the edge in IoTPushing it to the edge in IoT
Pushing it to the edge in IoTJ On The Beach
 
Drinking from the firehose, with virtual streams and virtual actors
Drinking from the firehose, with virtual streams and virtual actorsDrinking from the firehose, with virtual streams and virtual actors
Drinking from the firehose, with virtual streams and virtual actorsJ On The Beach
 
How do we deploy? From Punched cards to Immutable server pattern
How do we deploy? From Punched cards to Immutable server patternHow do we deploy? From Punched cards to Immutable server pattern
How do we deploy? From Punched cards to Immutable server patternJ On The Beach
 
When Cloud Native meets the Financial Sector
When Cloud Native meets the Financial SectorWhen Cloud Native meets the Financial Sector
When Cloud Native meets the Financial SectorJ On The Beach
 
The big data Universe. Literally.
The big data Universe. Literally.The big data Universe. Literally.
The big data Universe. Literally.J On The Beach
 
Streaming to a New Jakarta EE
Streaming to a New Jakarta EEStreaming to a New Jakarta EE
Streaming to a New Jakarta EEJ On The Beach
 
Pushing AI to the Client with WebAssembly and Blazor
Pushing AI to the Client with WebAssembly and BlazorPushing AI to the Client with WebAssembly and Blazor
Pushing AI to the Client with WebAssembly and BlazorJ On The Beach
 
Axon Server went RAFTing
Axon Server went RAFTingAxon Server went RAFTing
Axon Server went RAFTingJ On The Beach
 
The Six Pitfalls of building a Microservices Architecture (and how to avoid t...
The Six Pitfalls of building a Microservices Architecture (and how to avoid t...The Six Pitfalls of building a Microservices Architecture (and how to avoid t...
The Six Pitfalls of building a Microservices Architecture (and how to avoid t...J On The Beach
 
Madaari : Ordering For The Monkeys
Madaari : Ordering For The MonkeysMadaari : Ordering For The Monkeys
Madaari : Ordering For The MonkeysJ On The Beach
 
Servers are doomed to fail
Servers are doomed to failServers are doomed to fail
Servers are doomed to failJ On The Beach
 
Interaction Protocols: It's all about good manners
Interaction Protocols: It's all about good mannersInteraction Protocols: It's all about good manners
Interaction Protocols: It's all about good mannersJ On The Beach
 
A race of two compilers: GraalVM JIT versus HotSpot JIT C2. Which one offers ...
A race of two compilers: GraalVM JIT versus HotSpot JIT C2. Which one offers ...A race of two compilers: GraalVM JIT versus HotSpot JIT C2. Which one offers ...
A race of two compilers: GraalVM JIT versus HotSpot JIT C2. Which one offers ...J On The Beach
 
Leadership at every level
Leadership at every levelLeadership at every level
Leadership at every levelJ On The Beach
 
Machine Learning: The Bare Math Behind Libraries
Machine Learning: The Bare Math Behind LibrariesMachine Learning: The Bare Math Behind Libraries
Machine Learning: The Bare Math Behind LibrariesJ On The Beach
 
Getting started with Deep Reinforcement Learning
Getting started with Deep Reinforcement LearningGetting started with Deep Reinforcement Learning
Getting started with Deep Reinforcement LearningJ On The Beach
 

More from J On The Beach (20)

Massively scalable ETL in real world applications: the hard way
Massively scalable ETL in real world applications: the hard wayMassively scalable ETL in real world applications: the hard way
Massively scalable ETL in real world applications: the hard way
 
Big Data On Data You Don’t Have
Big Data On Data You Don’t HaveBig Data On Data You Don’t Have
Big Data On Data You Don’t Have
 
Acoustic Time Series in Industry 4.0: Improved Reliability and Cyber-Security...
Acoustic Time Series in Industry 4.0: Improved Reliability and Cyber-Security...Acoustic Time Series in Industry 4.0: Improved Reliability and Cyber-Security...
Acoustic Time Series in Industry 4.0: Improved Reliability and Cyber-Security...
 
Pushing it to the edge in IoT
Pushing it to the edge in IoTPushing it to the edge in IoT
Pushing it to the edge in IoT
 
Drinking from the firehose, with virtual streams and virtual actors
Drinking from the firehose, with virtual streams and virtual actorsDrinking from the firehose, with virtual streams and virtual actors
Drinking from the firehose, with virtual streams and virtual actors
 
How do we deploy? From Punched cards to Immutable server pattern
How do we deploy? From Punched cards to Immutable server patternHow do we deploy? From Punched cards to Immutable server pattern
How do we deploy? From Punched cards to Immutable server pattern
 
Java, Turbocharged
Java, TurbochargedJava, Turbocharged
Java, Turbocharged
 
When Cloud Native meets the Financial Sector
When Cloud Native meets the Financial SectorWhen Cloud Native meets the Financial Sector
When Cloud Native meets the Financial Sector
 
The big data Universe. Literally.
The big data Universe. Literally.The big data Universe. Literally.
The big data Universe. Literally.
 
Streaming to a New Jakarta EE
Streaming to a New Jakarta EEStreaming to a New Jakarta EE
Streaming to a New Jakarta EE
 
Pushing AI to the Client with WebAssembly and Blazor
Pushing AI to the Client with WebAssembly and BlazorPushing AI to the Client with WebAssembly and Blazor
Pushing AI to the Client with WebAssembly and Blazor
 
Axon Server went RAFTing
Axon Server went RAFTingAxon Server went RAFTing
Axon Server went RAFTing
 
The Six Pitfalls of building a Microservices Architecture (and how to avoid t...
The Six Pitfalls of building a Microservices Architecture (and how to avoid t...The Six Pitfalls of building a Microservices Architecture (and how to avoid t...
The Six Pitfalls of building a Microservices Architecture (and how to avoid t...
 
Madaari : Ordering For The Monkeys
Madaari : Ordering For The MonkeysMadaari : Ordering For The Monkeys
Madaari : Ordering For The Monkeys
 
Servers are doomed to fail
Servers are doomed to failServers are doomed to fail
Servers are doomed to fail
 
Interaction Protocols: It's all about good manners
Interaction Protocols: It's all about good mannersInteraction Protocols: It's all about good manners
Interaction Protocols: It's all about good manners
 
A race of two compilers: GraalVM JIT versus HotSpot JIT C2. Which one offers ...
A race of two compilers: GraalVM JIT versus HotSpot JIT C2. Which one offers ...A race of two compilers: GraalVM JIT versus HotSpot JIT C2. Which one offers ...
A race of two compilers: GraalVM JIT versus HotSpot JIT C2. Which one offers ...
 
Leadership at every level
Leadership at every levelLeadership at every level
Leadership at every level
 
Machine Learning: The Bare Math Behind Libraries
Machine Learning: The Bare Math Behind LibrariesMachine Learning: The Bare Math Behind Libraries
Machine Learning: The Bare Math Behind Libraries
 
Getting started with Deep Reinforcement Learning
Getting started with Deep Reinforcement LearningGetting started with Deep Reinforcement Learning
Getting started with Deep Reinforcement Learning
 

Recently uploaded

EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityNeo4j
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...stazi3110
 
What are the features of Vehicle Tracking System?
What are the features of Vehicle Tracking System?What are the features of Vehicle Tracking System?
What are the features of Vehicle Tracking System?Watsoo Telematics
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...gurkirankumar98700
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
 
cybersecurity notes for mca students for learning
cybersecurity notes for mca students for learningcybersecurity notes for mca students for learning
cybersecurity notes for mca students for learningVitsRangannavar
 
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number SystemsJheuzeDellosa
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...aditisharan08
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataBradBedford3
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio, Inc.
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfkalichargn70th171
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样umasea
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 
XpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software SolutionsXpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software SolutionsMehedi Hasan Shohan
 

Recently uploaded (20)

EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered Sustainability
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
 
What are the features of Vehicle Tracking System?
What are the features of Vehicle Tracking System?What are the features of Vehicle Tracking System?
What are the features of Vehicle Tracking System?
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
 
cybersecurity notes for mca students for learning
cybersecurity notes for mca students for learningcybersecurity notes for mca students for learning
cybersecurity notes for mca students for learning
 
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number Systems
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 
XpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software SolutionsXpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software Solutions
 

The TIPPSS Imperative for IoT - Ensuring Trust, Identity, Privacy, Protection, Safety and Security

  • 1. @JOTB19 {“ON”:”THE BEACH”} MARBELLA, SPAIN / 15TH - 17TH MAY 2019 Bringing developers and DevOps together around Big Data 4th Edition 1
  • 2. @JOTB19 The TIPPSS Imperative for IoT- Ensuring Trust, Identity, Privacy, Protection, Safety and Security - Florence D. Hudson - Founder & CEO, FDHint IEEE-Standards Association, Clinical IoT & TIPPSS 2
  • 3. @JOTB19 “Our increasingly connected world leveraging the Internet of Things (IoT) creates great value, and great risk. We must work to ensure TIPPSS: Trust, Identity, Privacy, Protection, Safety, Security, for devices, systems, solutions, people.” - Florence D. Hudson, Founder & CEO, FDHint 3
  • 4. @JOTB19 An aspirational view of connected healthcare http://bit.ly/asperationalhealthcare 4
  • 5. @JOTB19@JOTB19 Advanced technology and data integration will portend the future Source: https://www.goodfirms.co/blog/iot-connection-with-trending-technologies 5
  • 6. @JOTB19@JOTB19 IoT will generate huge volumes of data from explosive device growth Sources: What’s The Big Data 2015; Datafloq 2016; GlobalSources 2016 6
  • 7. @JOTB19 Health data sharing & Medical IoT usage is increasing Sources: FDHint, Frost & Sullivan, CIO Magazine, Healthcare IT News 7 “We've killed more people because we didn't share data than because we did.” - CIO Magazine, Paddy Padmanabhan “87% of health organizations plan to adopt IoT technology by 2019.” - Healthcare IT News, Jessica Davis NCI Cancer Moonshot Blue Ribbon Panel • Enhanced data sharing working group • Build a national cancer data ecosystem Computational Approaches for Cancer annual SuperComputing workshop
  • 8. @JOTB19@JOTB19 Precision Medicine will leverage large volumes and varieties of data Data to Support Precision Medicine Clinical and fundamental research data Many data sources and types to improve context, insights and healthcare outcomes • Genomic data • Clinical and fundamental research • Clinical care data and observations – image, text, numerical, video, audio, etc. • IoT Wearables: patient health and lifestyle data • Real World Evidence (RWE) leveraging Unique Device Identifiers (UDI) • Life sciences, environment data Genomic data Life sciences, environment data Clinical care data IoT Wearables: Connected health and patient lifestyle data Source: FDHint; “Wearables and Medical Interoperability: The Evolving Frontier“, IEEE Computer Magazine, Authors Florence Hudson and Chris Clark, September 2018, Copyright © 2018, IEEE; NIH 2015; *The New England Journal of Medicine, Vol. 378, No. 7, February 15, 2018 “Medical Devices in the Real World” , 8
  • 9. @JOTB19@JOTB19 To improve efficiency, safety, quality of life, energy use, & environment. Smart Cities will be an interconnected IoT-enabled “system of systems” What can we enable if we think across the system of systems? 9Source: Florence D. Hudson
  • 10. @JOTB19 Smart Cities will be built on Internet of Things technologies needing TIPPSS. Sources: FDHint; MetroLab 2017; NSF 2016; Frost & Sullivan 2016 TRUST IDENTITY PRIVACY PROTECTION SAFETY SECURITY 10
  • 11. @JOTB19@JOTB19 TIPPSS: an imperative for Smart Cities & Connected Healthcare • Trust: Allow only designated people/services to have device or data access • Identity: Validate the identity of people, services, and “things” • Privacy: Ensure device, personal, sensitive data kept private • Protection: Protect devices and users from harm – physical, financial, reputational • Safety: Provide safety for devices, infrastructure and people • Security: Maintain security of data, devices, systems, people 11Sources: Florence D. Hudson, FDHint
  • 12. @JOTB19@JOTB19 Security and privacy risk and concerns are increasing http://bit.ly/neutronstarscollide http://bit.ly/smartlockshack http://bit.ly/jeephackwired http://bit.ly/jnjinsulinpump http://bit.ly/medtronicinsulinpump http://bit.ly/fdarecallspacemakers US Department of Homeland Security (DHS) announces healthcare device hacking risk • Exploitable with adjacent access, low skill level. • Attacker can listen to communications, including transmission of sensitive data. 12Sources: Florence D. Hudson, FDHint
  • 13. @JOTB19@JOTB19 What could possibly go wrong? We need to protect the humans. Top concerns: • Connected healthcare devices • Connected vehicles Protection needed regarding: • Device, hardware, software, service hacks - physical health and safety risk • Financial risk, reputational harm • Data theft, data integrity, loss of privacy • Defense in depth needed – Hardware, firmware, software, service Need to evolve policy and culture. Sources: FDHint; Florence D. Hudson; KPMG - Security and the IOT Ecosystem, 2015 13
  • 14. @JOTB19@JOTB19 IEEE Enabling Focus on TIPPSS for IoT devices and data Source: ”Enabling Trust and Security: TIPPSS for IoT”, IEEE IT Professional 2018; “Wearables and Medical Interoperability: The Evolving Frontier”, IEEE Computer 2018, © 2018, IEEE 14
  • 15. @JOTB19 Blockchain – the Big Picture Blockchain is digital Distributed Ledger Technology (DLT) which enables data sharing without a central authority. • A “basically immutable” record of transactions (basically is NOT = immutable) • Tracks metadata about physical, financial, virtual transactions • Keeps track of data provenance, additions to the blockchain, who, what, when 15
  • 16. @JOTB19@JOTB19 Blockchain value, issues, challenges The value of blockchain • A distributed multi-party ledger with an “append only” structure • Data provenance – tracks data, knows if it’s been changed, adds to the ledger • A “basically immutable” record of transactions – maybe - see 51% rule • Enables use of smart contracts and incentives for data sharing and transactions • Might add Trust, Identity, Privacy, Protection, Safety and Security…if deployed correctly Issues and challenges to be addressed regarding blockchain use cases • Data can be hacked before it gets on the blockchain • The blockchain can be hacked - need true “immutability” – 51% rule - “collusion” • Need defense in depth to ensure end-to-end data security and privacy, on and off chain 16Sources: Florence D. Hudson, FDHint
  • 17. @JOTB19 Application Collusion Research - There is more to be done for TIPPSS 17 Colluded applications – are collaborating applications that can bypass permissions through communicating with each other. Researchers: Leon Reznik, Igor Khokhlov, Department of Computer Science Rochester Institute of Technology, email: lr@cs.rit.edu, ixk8996@rit.edu Data Qulity Data Veracity User’s Privacy Physical Data Veracity Logical Data Veracity Noise Influence Colluded Applications 17Sources: Florence D. Hudson, FDHint
  • 18. @JOTB19@JOTB19 Blockchain may be part of the solution for TIPPSS … but could also add risk 18Sources: Florence D. Hudson, FDHint
  • 19. @JOTB19@JOTB19 Health IT leaders are experimenting with blockchain Synaptic Health Alliance includes: • Aetna • Ascension • Cognizant • Humana • MultiPlan • Optum • Quest Diagnostics • UnitedHealthcare 19Sources: Florence D. Hudson, FDHint, https://www.synaptichealthalliance.com/project
  • 20. @JOTB19@JOTB19 Blockchain in Healthcare Today Open access peer-review journal 20 • On-line journal • Original manuscripts, use cases, research • Published on a continuous basis • 20,000 downloads in 65 countries • Available on Alexa! • https://blockchainhealthcaretoday.com/ Sources: Florence D. Hudson, FDHint
  • 21. @JOTB19 IEEE - Standards Association (IEEE-SA) : Clinical IoT Data and Device Interoperability with TIPPSS Goal: Develop a viable framework for a standard or set of standards that would enable device and data interoperability with clinical-grade IoT with Trust, Identity, Privacy, Protection, Safety and Security, which may include interoperability with blockchain or Digital Distributed Ledger Technology ( DLT ). Pre-standards workstream participants included industry, academia, govt representatives from Ascension, Bayer, Cognizant, ERT, FDHint, IBM, IEEE, Indiana University Health, Intel, Medtronic, Oracle, Spiritus, Synopsys, University at Buffalo, US FDA, Wireless Research Center of North Carolina Email flo1980@alumni.princeton.edu to connect to the IEEE-SA Clinical IoT and TIPPSS effort led by FDHint, Indiana University Health, United Healthcare, Medtronic IEEE Pre-Standards Activity Completed – Sign Up for Formal Standards Effort in IEEE-SA Project P2733 21Sources: Florence D. Hudson, FDHint
  • 22. @JOTB19 IEEE-SA Pre-Standards Workstream Clinical IoT Data Validation & Interoperability with Blockchain - 2018/2019 – Draft Updated 24.Jan.2019 DRAFT - TIPPSS Architectural Framework for Clinical IoT Data & Device Interoperability Data Sources & Targets – on chain and off chain Clinical IoT – includes wearables, implantables, external and environmental sensors, actuators, devices that create data used in clinical decisions, by humans, M2M, H2M, M2H EMR/ EDW Health apps Clinical Labs Claims Pharma Data Ingest & Management Batch Local Gateway Streaming API (FHIR) Distributed Ledger Technology Security,Encryption,FederatedIdentityManagement,Key Management,UserManagement,Authentication,Privacy,Compliance, Governanceforhardware,firmware,software,applications,services ConsentData Model UX/UI Patients Providers Payers Regulators Pharma API, SDKs Social determinates of health (Structured + Unstructured) Genomics Life Style Clinical Research Contract Access control Applications Devices Advanced Analytics Artificial Intelligence / Machine Learning Research Device Mgmt Enroll Transaction History Contract Mgmt Rules engine Device Connect & Handshake Data Lineage Data Validation Data Validation Data Transformation Precision Medicine Edge Computing Consensus Algorithms Health apps Trusted Commands Real time medical device actuation XR Integration FHIR HL7 CDA CCD GELLO SNOMED LOINC ISO 11073 CPT ICD-10 RDF Connection Layer 22 Sources:FlorenceD.Hudson,FDHint
  • 23. @JOTB19 Read “Women Securing the Future with TIPPSS for IoT” by 17 women authors 23 https://www.springer.com/gp/book/9783030157043#aboutBook Authors include: • CERN • CISCO • City of San Francisco • GÉANT • GlaxoSmithKline • IBM • Indiana University • Judge • REN-ISAC • Start-ups • UC Berkeley • UC Santa Cruz • University of Kentucky • Venture Capitalists • Virginia Tech Sources: Florence D. Hudson, FDHint
  • 24. @JOTB19@JOTB19 24 The Book Chapters: Women Securing the Future with TIPPSS for IoT 1. IoT: Is It a Digital Highway to Security Attacks? - Cisco 2. IoT: Privacy, Security, and Your Civil Rights – Colorado Judge 3. Privacy in the New Age of IoT - GSK 4. A Business Framework for Evaluating Trust in IoT Technology – Alpha Edison - VC 5. Ahead of the Curve: IoT Security, Privacy, and Policy in Higher Ed – REN-ISAC, VTC 6. Trust, Identity, Privacy, and Security for a Smart Campus – Virginia Tech 7. Security for Science: How One Thing Leads to Another - CERN 8. The Dark Side of Things - GÉANT 9. Public Safety and Protection by Design: IoT and Data Science – UC Berkeley, SF 10. Privacy Management in the Internet of Things (IoT) – University of Kentucky 11. Securing IoT Data with Pervasive Encryption - IBM 12. Secure Distributed Storage for the Internet of Things – UC Santa Cruz 13. Profiles of Women Securing the Future with TIPPSS for IoT – FDHint