SlideShare a Scribd company logo
1 of 8
Download to read offline
In the IoT, no T is an Island
Rob Gingell
Resilient Network Systems
Today: Island Phase of networking Things
2
 Sensors (actuators) attached to network
 More “network reachable” than full network citizens
 Technology limits / function partitioning
 Customer capture: business model and experience management
 Usually homogenous / insulated / isolated
 Registered to manufacturer services
 Generally capable / trusted process between user / manufacturer
 Each registration instance weakens privacy: more targets / points of compromise
 Data often pre-digested: images vs. data sources
 More suitable for viewing than for use by other automata
 “Policies” implied / embedded in services presenting data
 An “Internet” of Things is inhibited by boundaries that isolate
Internet of Things: Composition / Orchestration
3
 Heterogeneous: device, manufacturer, operating organization
 Dynamic (e.g., on proximities: geographic, topical, functional)
 Trust relationship formed quickly and ad hoc: requires low overhead
 “Provisioning” too cumbersome
 Composition: what interconnection is for
 Involves computation / manipulation of data, not presentation
 Will drive layers into data / Thing presentation to network
 Combination of implied / embedded policies chaotic / weak
 A useful IoT needs tools architected of and for the network
What’s Required?
4
 Preserve privacy: minimize instances of PII
 Use the network to make better use of existing stores through trust relationships
 “Store” might be degenerate: a datum or single certificate
 Partition & Distribute: PEP, PDP, PAP, policy stores
 Store → “authority”, trust relationships govern acceptability
 → structure for having, building, maintaining trust relationships
 Connect: explicit policies structure connections between authorities
 Make policies explicit, separate from things they govern
 Enable policy writers to operate directly rather than indirectly
 → platform exists for cross-domain policy execution
 Anticipate / embrace heterogeneity
 In organization, representation of data / policies / identity
 Enable innovation: technology evolving rapidly: biometrics, behavior recognition
 “Future-proof” things to gain from refinements in policy / authority technology
 Resist search for “one to rule them all”
Resilient’s Trust Network (TN)
5
RULES
ENGINES
POLICY
AUTHORITIES
ID ATTRIBUTES
(DIRECTORIES)
AUTHN /
BIOMETRICS
AN UNKNOWN
USER/Thing
A KNOWN
USER/Thing
A PARTIALLY
KNOWN USER/Thing
A
A
A
A
A
A
PEP
(RP/Auth)
PDP Policy Stores/PAP/PIP/PRP
PAP
PAP
PAP
AUTHZ /
CREDENTIALS
Other Relevant Characteristics
6
 Simplified provisioning – mostly “don’t”
 Today: deployed as IAM tool for cross-organizational sharing
 Can be useful tool even in today’s “island phase” relationship building
 Workflow engine: programmed by policies
 “Policies” in TN compile to workflows– machine language for DS policy languages
 Other “composing” operations besides trust/identity can be expressed
 “Common-carrier” like – “meaning” comes from usage / directories
 Not an authority – each subscribed entity is (RP can be authority for selves)
 Provides meta-authorities instanced / operated by subscribers / groups
 Subscriber-set policies govern access – no super-user, no data retained
 Real: functions in real-world environments, threats
 Viruses, compromises, administrative lapses will continue to happen
 Compromising a component need not compromise policy – expect failures
 Usable: (policy protected access to be) auditable, debuggable, meterable (commerce)
 Scale: simple components, narrow protocols, predictable interactions / aggregation
 Services supporting “policy-protected datum” – privacy applications
 Evolving: certificates, use of block chain technology
Conclusion: systematic trust maximizes IoT utility
7
 “Islands of Things” should not be the limit of our aspirations
 IoT interactions can’t tolerate traditional provisioning
 Invitation to lax security, privacy, identity and thus trust
 Counter with system designed to operate ad hoc and internet scale
 Gain leverage from existing mechanisms through workflow integration
 Utilize network characteristics for protection – can’t compromise whole
 Make policy a first-order mechanism for policy writers
 Requires a platform to execute them across boundaries
 Avoid “lost in translation” problems in implementation / composition
The End
8

More Related Content

What's hot

4 Pillars of IT - a Baltimore Techies for Good webinar
4 Pillars of IT - a Baltimore Techies for Good webinar4 Pillars of IT - a Baltimore Techies for Good webinar
4 Pillars of IT - a Baltimore Techies for Good webinarNetSquared
 
Information Leakage & DLP
Information Leakage & DLPInformation Leakage & DLP
Information Leakage & DLPYun Lu
 
Externally Hosted Web 2.0 Services
Externally Hosted Web 2.0 ServicesExternally Hosted Web 2.0 Services
Externally Hosted Web 2.0 Servicesmarkvanharmelen
 
Data Leakage Presentation
Data Leakage PresentationData Leakage Presentation
Data Leakage PresentationMike Spaulding
 
Cloud computing - Assessing the Security Risks - Jared Carstensen
Cloud computing - Assessing the Security Risks - Jared CarstensenCloud computing - Assessing the Security Risks - Jared Carstensen
Cloud computing - Assessing the Security Risks - Jared Carstensenjaredcarst
 
The Weakest Point of Security in IoT
The Weakest Point of Security in IoTThe Weakest Point of Security in IoT
The Weakest Point of Security in IoTnsangary
 
Data Loss Prevention from Symantec
Data Loss Prevention from SymantecData Loss Prevention from Symantec
Data Loss Prevention from SymantecArrow ECS UK
 

What's hot (11)

7
77
7
 
4 Pillars of IT - a Baltimore Techies for Good webinar
4 Pillars of IT - a Baltimore Techies for Good webinar4 Pillars of IT - a Baltimore Techies for Good webinar
4 Pillars of IT - a Baltimore Techies for Good webinar
 
Information Leakage & DLP
Information Leakage & DLPInformation Leakage & DLP
Information Leakage & DLP
 
Externally Hosted Web 2.0 Services
Externally Hosted Web 2.0 ServicesExternally Hosted Web 2.0 Services
Externally Hosted Web 2.0 Services
 
Data Leakage Presentation
Data Leakage PresentationData Leakage Presentation
Data Leakage Presentation
 
Cloud computing - Assessing the Security Risks - Jared Carstensen
Cloud computing - Assessing the Security Risks - Jared CarstensenCloud computing - Assessing the Security Risks - Jared Carstensen
Cloud computing - Assessing the Security Risks - Jared Carstensen
 
The Weakest Point of Security in IoT
The Weakest Point of Security in IoTThe Weakest Point of Security in IoT
The Weakest Point of Security in IoT
 
Data Loss Prevention from Symantec
Data Loss Prevention from SymantecData Loss Prevention from Symantec
Data Loss Prevention from Symantec
 
LLoyd - Web proxy vs. Federated SSO: A Practical Guide
LLoyd - Web proxy vs. Federated SSO: A Practical GuideLLoyd - Web proxy vs. Federated SSO: A Practical Guide
LLoyd - Web proxy vs. Federated SSO: A Practical Guide
 
Informed consent and cloud computing
Informed consent and cloud computingInformed consent and cloud computing
Informed consent and cloud computing
 
Pawlowski and Beadles: Authentication and Access of Licensed Content in Ohio
Pawlowski and Beadles: Authentication and Access of Licensed Content in OhioPawlowski and Beadles: Authentication and Access of Licensed Content in Ohio
Pawlowski and Beadles: Authentication and Access of Licensed Content in Ohio
 

Similar to 2016 02-04-gingell-iot

Physical/Network Access Control
Physical/Network Access ControlPhysical/Network Access Control
Physical/Network Access Controljwpiccininni
 
Hirsch Identive | White Paper | Securing the Enterprise in a Networked World
Hirsch Identive | White Paper | Securing the Enterprise in a Networked WorldHirsch Identive | White Paper | Securing the Enterprise in a Networked World
Hirsch Identive | White Paper | Securing the Enterprise in a Networked WorldIdentive
 
Enterprise Blockchain
Enterprise BlockchainEnterprise Blockchain
Enterprise Blockchainsnewell4
 
Data Loss Prevention (DLP) - Fundamental Concept - Eryk
Data Loss Prevention (DLP) - Fundamental Concept - ErykData Loss Prevention (DLP) - Fundamental Concept - Eryk
Data Loss Prevention (DLP) - Fundamental Concept - ErykEryk Budi Pratama
 
Data-Centric Security for the Extended Enterprise
Data-Centric Security for the Extended EnterpriseData-Centric Security for the Extended Enterprise
Data-Centric Security for the Extended EnterpriseNextLabs, Inc.
 
Lessons in privacy engineering from a nation scale identity system - connect id
Lessons in privacy engineering from a nation scale identity system - connect idLessons in privacy engineering from a nation scale identity system - connect id
Lessons in privacy engineering from a nation scale identity system - connect idDavid Kelts, CIPT
 
Shibboleth Guided Tour Webinar
Shibboleth Guided Tour WebinarShibboleth Guided Tour Webinar
Shibboleth Guided Tour WebinarJohn Lewis
 
Security Framework for Multitenant Architecture
Security Framework for Multitenant ArchitectureSecurity Framework for Multitenant Architecture
Security Framework for Multitenant ArchitectureDataWorks Summit
 
TECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFE
TECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFETECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFE
TECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFEJames Wier
 
eBook: 5 Steps to Secure Cloud Data Governance
eBook: 5 Steps to Secure Cloud Data GovernanceeBook: 5 Steps to Secure Cloud Data Governance
eBook: 5 Steps to Secure Cloud Data GovernanceKim Cook
 
dlp-sales-play-sales-customer-deck-2022.pptx
dlp-sales-play-sales-customer-deck-2022.pptxdlp-sales-play-sales-customer-deck-2022.pptx
dlp-sales-play-sales-customer-deck-2022.pptxalex hincapie
 
10 security problems unique to it
10 security problems unique to it10 security problems unique to it
10 security problems unique to itIT-Toolkits.org
 
10 security problems unique to it
10 security problems unique to it10 security problems unique to it
10 security problems unique to itIT-Toolkits.org
 
Centrifuge Systems Overview
Centrifuge Systems OverviewCentrifuge Systems Overview
Centrifuge Systems OverviewRuss Holmes
 
CIS13: NSTIC Update and Reports from Pilots
CIS13: NSTIC Update and Reports from PilotsCIS13: NSTIC Update and Reports from Pilots
CIS13: NSTIC Update and Reports from PilotsCloudIDSummit
 
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORKZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORKMaganathin Veeraragaloo
 
ECS19 - Nicki Borell - Microsoft Cybersecurity Reference Architecture
ECS19 - Nicki Borell - Microsoft Cybersecurity Reference ArchitectureECS19 - Nicki Borell - Microsoft Cybersecurity Reference Architecture
ECS19 - Nicki Borell - Microsoft Cybersecurity Reference ArchitectureEuropean Collaboration Summit
 
B2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam LevithanB2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam LevithanSPS Paris
 

Similar to 2016 02-04-gingell-iot (20)

Physical/Network Access Control
Physical/Network Access ControlPhysical/Network Access Control
Physical/Network Access Control
 
Hirsch Identive | White Paper | Securing the Enterprise in a Networked World
Hirsch Identive | White Paper | Securing the Enterprise in a Networked WorldHirsch Identive | White Paper | Securing the Enterprise in a Networked World
Hirsch Identive | White Paper | Securing the Enterprise in a Networked World
 
Enterprise Blockchain
Enterprise BlockchainEnterprise Blockchain
Enterprise Blockchain
 
Data Loss Prevention (DLP) - Fundamental Concept - Eryk
Data Loss Prevention (DLP) - Fundamental Concept - ErykData Loss Prevention (DLP) - Fundamental Concept - Eryk
Data Loss Prevention (DLP) - Fundamental Concept - Eryk
 
Data-Centric Security for the Extended Enterprise
Data-Centric Security for the Extended EnterpriseData-Centric Security for the Extended Enterprise
Data-Centric Security for the Extended Enterprise
 
Lessons in privacy engineering from a nation scale identity system - connect id
Lessons in privacy engineering from a nation scale identity system - connect idLessons in privacy engineering from a nation scale identity system - connect id
Lessons in privacy engineering from a nation scale identity system - connect id
 
Shibboleth Guided Tour Webinar
Shibboleth Guided Tour WebinarShibboleth Guided Tour Webinar
Shibboleth Guided Tour Webinar
 
Security Framework for Multitenant Architecture
Security Framework for Multitenant ArchitectureSecurity Framework for Multitenant Architecture
Security Framework for Multitenant Architecture
 
IT Policy
IT PolicyIT Policy
IT Policy
 
TECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFE
TECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFETECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFE
TECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFE
 
eBook: 5 Steps to Secure Cloud Data Governance
eBook: 5 Steps to Secure Cloud Data GovernanceeBook: 5 Steps to Secure Cloud Data Governance
eBook: 5 Steps to Secure Cloud Data Governance
 
dlp-sales-play-sales-customer-deck-2022.pptx
dlp-sales-play-sales-customer-deck-2022.pptxdlp-sales-play-sales-customer-deck-2022.pptx
dlp-sales-play-sales-customer-deck-2022.pptx
 
10 security problems unique to it
10 security problems unique to it10 security problems unique to it
10 security problems unique to it
 
10 security problems unique to it
10 security problems unique to it10 security problems unique to it
10 security problems unique to it
 
Centrifuge Systems Overview
Centrifuge Systems OverviewCentrifuge Systems Overview
Centrifuge Systems Overview
 
Information Leakage - A knowledge Based Approach
Information Leakage - A knowledge Based ApproachInformation Leakage - A knowledge Based Approach
Information Leakage - A knowledge Based Approach
 
CIS13: NSTIC Update and Reports from Pilots
CIS13: NSTIC Update and Reports from PilotsCIS13: NSTIC Update and Reports from Pilots
CIS13: NSTIC Update and Reports from Pilots
 
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORKZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
 
ECS19 - Nicki Borell - Microsoft Cybersecurity Reference Architecture
ECS19 - Nicki Borell - Microsoft Cybersecurity Reference ArchitectureECS19 - Nicki Borell - Microsoft Cybersecurity Reference Architecture
ECS19 - Nicki Borell - Microsoft Cybersecurity Reference Architecture
 
B2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam LevithanB2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam Levithan
 

Recently uploaded

Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 

Recently uploaded (20)

Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 

2016 02-04-gingell-iot

  • 1. In the IoT, no T is an Island Rob Gingell Resilient Network Systems
  • 2. Today: Island Phase of networking Things 2  Sensors (actuators) attached to network  More “network reachable” than full network citizens  Technology limits / function partitioning  Customer capture: business model and experience management  Usually homogenous / insulated / isolated  Registered to manufacturer services  Generally capable / trusted process between user / manufacturer  Each registration instance weakens privacy: more targets / points of compromise  Data often pre-digested: images vs. data sources  More suitable for viewing than for use by other automata  “Policies” implied / embedded in services presenting data  An “Internet” of Things is inhibited by boundaries that isolate
  • 3. Internet of Things: Composition / Orchestration 3  Heterogeneous: device, manufacturer, operating organization  Dynamic (e.g., on proximities: geographic, topical, functional)  Trust relationship formed quickly and ad hoc: requires low overhead  “Provisioning” too cumbersome  Composition: what interconnection is for  Involves computation / manipulation of data, not presentation  Will drive layers into data / Thing presentation to network  Combination of implied / embedded policies chaotic / weak  A useful IoT needs tools architected of and for the network
  • 4. What’s Required? 4  Preserve privacy: minimize instances of PII  Use the network to make better use of existing stores through trust relationships  “Store” might be degenerate: a datum or single certificate  Partition & Distribute: PEP, PDP, PAP, policy stores  Store → “authority”, trust relationships govern acceptability  → structure for having, building, maintaining trust relationships  Connect: explicit policies structure connections between authorities  Make policies explicit, separate from things they govern  Enable policy writers to operate directly rather than indirectly  → platform exists for cross-domain policy execution  Anticipate / embrace heterogeneity  In organization, representation of data / policies / identity  Enable innovation: technology evolving rapidly: biometrics, behavior recognition  “Future-proof” things to gain from refinements in policy / authority technology  Resist search for “one to rule them all”
  • 5. Resilient’s Trust Network (TN) 5 RULES ENGINES POLICY AUTHORITIES ID ATTRIBUTES (DIRECTORIES) AUTHN / BIOMETRICS AN UNKNOWN USER/Thing A KNOWN USER/Thing A PARTIALLY KNOWN USER/Thing A A A A A A PEP (RP/Auth) PDP Policy Stores/PAP/PIP/PRP PAP PAP PAP AUTHZ / CREDENTIALS
  • 6. Other Relevant Characteristics 6  Simplified provisioning – mostly “don’t”  Today: deployed as IAM tool for cross-organizational sharing  Can be useful tool even in today’s “island phase” relationship building  Workflow engine: programmed by policies  “Policies” in TN compile to workflows– machine language for DS policy languages  Other “composing” operations besides trust/identity can be expressed  “Common-carrier” like – “meaning” comes from usage / directories  Not an authority – each subscribed entity is (RP can be authority for selves)  Provides meta-authorities instanced / operated by subscribers / groups  Subscriber-set policies govern access – no super-user, no data retained  Real: functions in real-world environments, threats  Viruses, compromises, administrative lapses will continue to happen  Compromising a component need not compromise policy – expect failures  Usable: (policy protected access to be) auditable, debuggable, meterable (commerce)  Scale: simple components, narrow protocols, predictable interactions / aggregation  Services supporting “policy-protected datum” – privacy applications  Evolving: certificates, use of block chain technology
  • 7. Conclusion: systematic trust maximizes IoT utility 7  “Islands of Things” should not be the limit of our aspirations  IoT interactions can’t tolerate traditional provisioning  Invitation to lax security, privacy, identity and thus trust  Counter with system designed to operate ad hoc and internet scale  Gain leverage from existing mechanisms through workflow integration  Utilize network characteristics for protection – can’t compromise whole  Make policy a first-order mechanism for policy writers  Requires a platform to execute them across boundaries  Avoid “lost in translation” problems in implementation / composition