Cloud ID


Published on

Published in: Technology, Business
1 Comment
  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Cloud ID

  1. 1. Ian Huang 黄源源 Excel Capital Strategy Limited ( formerly named as Ascent Asset Management) Tel: (86) 14716033879 Email: [email_address]
  2. 2. Virtual Machines Physical Machines User/Broker
  3. 3. <ul><li>Technology Interpretation: </li></ul><ul><ul><ul><li>A cloud is a type of parallel & distributed computer systems, interconnected and virtualized, to dynamically provide & present as a unified computing resources on demand. </li></ul></ul></ul><ul><li>Business Interpretation: </li></ul><ul><ul><li>A cloud is an operating facility that the user/broker does not need to own and maintain. </li></ul></ul>
  4. 4. <ul><li>Outsourcing external business transaction </li></ul><ul><li>Order acceptance </li></ul><ul><li>Booking & Reservation </li></ul><ul><li>Payment & Shipment </li></ul><ul><li>Outsourcing internal proprietary operation </li></ul><ul><li>Documentation storage </li></ul><ul><li>financial & trade secret data </li></ul><ul><li>Internal communications </li></ul>
  5. 5. <ul><li>Functions & Performance </li></ul><ul><li> Cost Effective & User Friendly </li></ul><ul><li> Trusted </li></ul><ul><li> Easy Migration & Maintain </li></ul>
  6. 6. <ul><ul><li>Authentication </li></ul></ul><ul><ul><li>Confidentiality </li></ul></ul><ul><ul><li>Private </li></ul></ul><ul><ul><li>Easy to change </li></ul></ul><ul><ul><li>Impossible to replicate </li></ul></ul><ul><ul><li>Economical </li></ul></ul><ul><ul><li>Compatibility </li></ul></ul>
  7. 7. <ul><li>Today’s solutions </li></ul><ul><ul><li>IP Address </li></ul></ul><ul><ul><li>User ID </li></ul></ul><ul><ul><li>Fingerprints (Additional hardware) </li></ul></ul><ul><ul><li>Face Identification (Additional hardware) </li></ul></ul><ul><ul><li>User Password </li></ul></ul><ul><ul><li>User Address </li></ul></ul><ul><li>Security breach (ID theft) remains as the most concerned issues in Cloud Computing. </li></ul><ul><ul><li> - Source: IDC </li></ul></ul>Privacy Problem
  8. 8. More abuse More difficulty to maintain More difficulty to compile More costly More possibility for error More cloud traffic
  9. 9. <ul><li>Simple </li></ul><ul><li>Cost Effective </li></ul><ul><li>Universal </li></ul><ul><li>Privacy protection </li></ul><ul><li>Support authentications </li></ul>Cloud ID
  10. 10. <ul><li>What is it? </li></ul><ul><ul><li>Each user/broker of the Cloud has his/her/its own ID </li></ul></ul><ul><ul><li>Cross border administration (e.g., IP Address) </li></ul></ul><ul><ul><li>Different than IP Address which is focused on the machine. Cloud ID focuses on the individual (personal ID) or the organization (Company ID) </li></ul></ul>
  11. 11. <ul><li>What does it do? </li></ul><ul><li>Establish a Private Cloud </li></ul><ul><ul><li> Protect Privacy </li></ul></ul><ul><ul><li> Controlled growth </li></ul></ul><ul><ul><li> Easy tracking and management </li></ul></ul><ul><li>Secure personal and business transaction </li></ul><ul><ul><li> Encourage Cloud usuage </li></ul></ul><ul><ul><li> Open new business opportunities </li></ul></ul><ul><ul><li> Support law enforcement </li></ul></ul>
  12. 12. <ul><li>What it will NOT do ! </li></ul><ul><li>Completely eliminate Cloud fraud. </li></ul>
  13. 13. <ul><li>Must integrated with VPN </li></ul><ul><li>Must integrated with cryptography </li></ul><ul><li>Must leverage on the algorithms involving “ O ptimal  A symmetric  E ncryption P adding” and “P robabilistic  S ignature S cheme ” </li></ul><ul><li>Must comply with IEEE P1363 (Lattice-based, Password-based and ID-based public key specifications) </li></ul>
  14. 14. <ul><li>Lockstep Technology Smart 100 </li></ul><ul><li>- personal health records on mobile communications - </li></ul><ul><li>Dramatically enhance the privacy, integrity and security of transactions with highly sensitive, cutting-edge cloud-based services (especially personal health record management) performed on smart mobile devices. </li></ul><ul><li>Taking a unique virtual ID of the user (either self-selected or assigned by the transaction service), specific to the application context, encrypting it using Lockstep’s standards-based encapsulation process, and binding it into the associated app at download time. Thereafter, standard digital modules in the device automatically and indelibly ‘seal’ all data originated from the app with the relevant ID. </li></ul>
  15. 15. <ul><li>CA Technology & Novell </li></ul><ul><li>Both geared toward enterprises (typically, 1,000 seats and above). They are expensive, difficult to implement and require dedicated resources to manage. </li></ul><ul><li>Ping Identity ( </li></ul><ul><li>Probably the best solution today. Does not own the technology on algorithms (RSA). </li></ul><ul><li>Hitachi ID Systems, Symantec, Microsoft, RSA (EMC), Google and Oracle </li></ul><ul><li> They are coming. </li></ul>
  16. 16. <ul><li>Will not succeed as a stand alone business </li></ul><ul><li>Must be deployed with at least two large and important applications (e.g., e-commence, medical/health/environmental cloud) </li></ul><ul><li>US has the technology led. But China, as the largest Cloud-user country, leads the business opportunity. </li></ul>
  17. 17. <ul><li>Formerly as Ascent Asset Management Ltd. </li></ul><ul><li>EXCEL Capital Strategy Ltd </li></ul><ul><li>Tel: (86) 14716033879 </li></ul><ul><li>Email: [email_address] </li></ul>