SlideShare a Scribd company logo
Università degli Studi di
            Trento




      Privacy, Identity and Trust
      Challenges for the Future
           Internet Citizen
                         Fabio Massacci
                       University of Trento


9/27/2010                       Fabio Massacci - ICT 2010   1
Whose Future Internet?
• When we think of the Future Internet we
  always think it is for “us”
     – Sophie, Fabio, Reihnard, Ksheerabdhi,
       Mireille etc.
• It is not for “us”. That’s wrong picture
• Three generations tell three stories
     – Nonno Paolo – Born 1939
     – Papà Fabio – Born 1967
     – Paolo – Born 2000
9/27/2010           Fabio Massacci - ICT 2010   2
Privacy




9/27/2010   Fabio Massacci - ICT 2010   3
Nonno Paolo – Jun. 1996
• First Picture on the internet – Age 58
• Business Related




9/27/2010         Fabio Massacci - ICT 2010   4
Papà Fabio – Feb. 1999
• First Picture on the Internet – Age 31
• Again only professional pictures




9/27/2010          Fabio Massacci - ICT 2010   5
Paolo – Feb. 2007
• First picture on the internet – Age       7




9/27/2010       Fabio Massacci - ICT 2010       6
If you don’t put, you don’t get
        pictures, do you?
• Come on, a father should not post stuff
  on the internet and then complain that
  his boss, insurance company, wife, eu
  project partner, saw it…
• Er… not really




9/27/2010      Fabio Massacci - ICT 2010    7
Where is the problem of Privacy?
• Nobody in the family posted that picture!
     – Somebody from Sportivi Ghiaccio Trento put it
     – I didn’t even know the picture was on the net before Feb. 2010
• Paolo’s life will be entirely on the Future Internet
     – Can he separate his lives (note the plural) in different zones?
• In physical life we are pretty good at zoning
     –   Separate relations (eg friends, work, neighbors) by “distance”.
     –   (legal or curious) searches difficult by people outside the zone
     –   Law enforcement can break zones but have hurdles
     –   Individual and government can build zones
• Technical solution alone ain’t enough
     – He can’t put a sticky policy as the photo will be about him, not his
     – Regulatory action also needed
9/27/2010                    Fabio Massacci - ICT 2010                      8
Identity




9/27/2010   Fabio Massacci - ICT 2010   9
How to tell Identity?
• Nonno Paolo – 1° use C.C. on Internet:Age 59
• Papà Fabio – 1° use C.C. on Internet: Age 29
• Paolo – 1° attempt: Age 9
     – Papi, can you give me your credit card?
     – Er… What do you need it for?
     – There is this Star Wars LEGO robot that you can buy
       on the LEGO web site you find with Google
     – Er… Let me see a second… Paolo, this is not LEGO
       web site!!! It is just a … site … selling stuff…
     – [Follow long -- and for a child boring -- explanation on
       how to find the identity of providers]
9/27/2010               Fabio Massacci - ICT 2010             10
Commercial Identity?
• Identity tech so far conceived for “client/servers”
     – What about “identity” of “partners” ?
     – You want to know who is the other!
• In the physical realm
     – Identity of partners is regulated (you cannot just open a
       supermarket, a dentist’s practice or a bank)
     – Commercial identity is distinct but always linked to identity of
       human individuals (legal responsible)
     – strictly linked to specific attributes and taxable
• How to link the identity of end point to the
  accountable identity for humans behind it?
     – Of course scams always possible (eg Maddoff) but you’ won’t
       get away so easily with it

9/27/2010                   Fabio Massacci - ICT 2010                     11
Trust




9/27/2010   Fabio Massacci - ICT 2010   12
Download and Run Internet
      Connected Software
•   Nonno Paolo: always stuff from a box
•   Papà Fabio: Age 28 – SSH Client/Server
•   Paolo: Age 10 – REVOLT
•   What’s that?
     – Running cars. Can connect over IP to a peer
     – Got from a friend on a usb stick
     – I found months later when he wanted to play
       multiplayer and Windows Firewall complained
9/27/2010           Fabio Massacci - ICT 2010    13
How do you trust REVOLT?
• Russian Roulette • PhD in Security
     – For 24 other fathers             – 3hours for father of
       (actually the children)            only child without
                                          admin password




9/27/2010             Fabio Massacci - ICT 2010                  14
After REVOLT, GERICO…
• Come on, that’s obvious, after all that’s
  children downloading shady software
• Er… not really
     – Gerico is not for the faint hearted…
     – Really for grown-up, corporate users…




9/27/2010           Fabio Massacci - ICT 2010   15
So, what’s GERICO?




• What’s the problem of running software
  connecting automatically to your Tax
  Agency?
     – You just don’t know what exactly it does…
9/27/2010              Fabio Massacci - ICT 2010   16
Corporate Environment is
               alike…
• Put everything on a very secure cloud is new trend
     – Good step but not enough
• The problem is that “everything”
     – in-house developed LDAP system hiding roles from the ERP sys
       as you pay O#### by the role
     – open source PDF report generator so you won’t have to pay
       licensing fees to A####
     – The wrapper of old legacy application controlled remotely by a
       university spin-off of ex-CTO turned prof.
     – The new S## GRC application monitoring the whole virtual
       network controlled by your auditors to lower your audit bill
• No machine readable/checkable claim what they do
9/27/2010                 Fabio Massacci - ICT 2010                17
The Wild West Ecosystem
• Citizens’ Laptops and Corporate Clouds are quickly
  evolving (worsening?) alike
     – Lots of frequently changing interconnected software
     – With [some] natural language description
     – With [some] digital identity
• But we don’t know what this software is doing
     – Compare with entering an EU Consortium Agreement…
     – For uploading a software you just check a signature…
• Where’s the contractual, machine readable, version
  of security claims, rights and obligations?
     – Security-by-Contract?
     – Software should declare its claims and we should check them..

9/27/2010                 Fabio Massacci - ICT 2010                    18
Challenges Ahead




9/27/2010       Fabio Massacci - ICT 2010   19
Sum-Up of Challenges
• Frame of mind:
     – Privacy, Identity and Trust solutions must be solutions
       for people whose lives/data/actions have been on the
       Future Internet since they can read or write (age 6)
• Questions
     – Do (regulatory & technical) solutions allow individuals
       to zone identities?
     – How to link the identity of a partner service to the
       accountable identity of humans behind it?
     – Can we provide/check a “contractual” description of
       the security behavior of our parners’ code?
9/27/2010               Fabio Massacci - ICT 2010            20

More Related Content

What's hot

Open Data in and from schools
Open Data in and from schoolsOpen Data in and from schools
Open Data in and from schools
Marco Fioretti
 
L19 Network Platforms
L19 Network PlatformsL19 Network Platforms
L19 Network Platforms
Ólafur Andri Ragnarsson
 
Certificate of Completion IoE
Certificate of Completion IoECertificate of Completion IoE
Certificate of Completion IoE
Daniel Brooks
 
Bmi workshop - Ronnie Hash
Bmi workshop - Ronnie HashBmi workshop - Ronnie Hash
Bmi workshop - Ronnie Hash
blacksintechnology
 
The Wi-Fi Boom - The New York Times - by Adam Baer
The Wi-Fi Boom - The New York Times - by Adam BaerThe Wi-Fi Boom - The New York Times - by Adam Baer
The Wi-Fi Boom - The New York Times - by Adam Baer
Adam Baer
 
Linked Data: Building Standards and Communities
Linked Data: Building Standards and CommunitiesLinked Data: Building Standards and Communities
Linked Data: Building Standards and Communities
Robert Sanderson
 
David Recordon's Presentation at eComm 2008
David Recordon's Presentation at eComm 2008David Recordon's Presentation at eComm 2008
David Recordon's Presentation at eComm 2008
eComm2008
 
"If I Don't Like Your Online Profile, I Will Not Hire You!"
"If I Don't Like Your Online Profile, I Will Not Hire You!""If I Don't Like Your Online Profile, I Will Not Hire You!"
"If I Don't Like Your Online Profile, I Will Not Hire You!"
Kaido Kikkas
 
„The four most-used passwords are love, sex, secret, and God“: password secur...
„The four most-used passwords are love, sex, secret, and God“: password secur...„The four most-used passwords are love, sex, secret, and God“: password secur...
„The four most-used passwords are love, sex, secret, and God“: password secur...
Kaido Kikkas
 

What's hot (9)

Open Data in and from schools
Open Data in and from schoolsOpen Data in and from schools
Open Data in and from schools
 
L19 Network Platforms
L19 Network PlatformsL19 Network Platforms
L19 Network Platforms
 
Certificate of Completion IoE
Certificate of Completion IoECertificate of Completion IoE
Certificate of Completion IoE
 
Bmi workshop - Ronnie Hash
Bmi workshop - Ronnie HashBmi workshop - Ronnie Hash
Bmi workshop - Ronnie Hash
 
The Wi-Fi Boom - The New York Times - by Adam Baer
The Wi-Fi Boom - The New York Times - by Adam BaerThe Wi-Fi Boom - The New York Times - by Adam Baer
The Wi-Fi Boom - The New York Times - by Adam Baer
 
Linked Data: Building Standards and Communities
Linked Data: Building Standards and CommunitiesLinked Data: Building Standards and Communities
Linked Data: Building Standards and Communities
 
David Recordon's Presentation at eComm 2008
David Recordon's Presentation at eComm 2008David Recordon's Presentation at eComm 2008
David Recordon's Presentation at eComm 2008
 
"If I Don't Like Your Online Profile, I Will Not Hire You!"
"If I Don't Like Your Online Profile, I Will Not Hire You!""If I Don't Like Your Online Profile, I Will Not Hire You!"
"If I Don't Like Your Online Profile, I Will Not Hire You!"
 
„The four most-used passwords are love, sex, secret, and God“: password secur...
„The four most-used passwords are love, sex, secret, and God“: password secur...„The four most-used passwords are love, sex, secret, and God“: password secur...
„The four most-used passwords are love, sex, secret, and God“: password secur...
 

Similar to Privacy identity and trust challenges for the future internet citizen fabio massacci (unitn)

100 paper cuts
100 paper cuts100 paper cuts
100 paper cuts
Alexander Limi
 
Monetizing social games globally
Monetizing social games globallyMonetizing social games globally
Monetizing social games globally
Benjamin Joffe
 
6-10-2010-PEMCI 2010
6-10-2010-PEMCI 20106-10-2010-PEMCI 2010
6-10-2010-PEMCI 2010
Mathieu Plourde
 
Hunter Public Relations ( Jason Winocour )
Hunter  Public  Relations (  Jason  Winocour )Hunter  Public  Relations (  Jason  Winocour )
Hunter Public Relations ( Jason Winocour )
용직 이
 
Ownership of web content
Ownership of web contentOwnership of web content
Ownership of web content
Imran Ali
 
S cambie scarlett_abbott_final
S cambie scarlett_abbott_finalS cambie scarlett_abbott_final
S cambie scarlett_abbott_final
Silvia Cambie
 
UX for Multi Device applications
UX for Multi Device applicationsUX for Multi Device applications
UX for Multi Device applications
Joe Johnston
 
Presentation Cendoo tech eng
Presentation Cendoo tech engPresentation Cendoo tech eng
Presentation Cendoo tech eng
CENDOO AG
 
Users becoming-designers-begona pino
Users becoming-designers-begona pinoUsers becoming-designers-begona pino
Users becoming-designers-begona pino
Begoña Pino
 
GI2010 symposium-longhorn (longhorn keynote-presentation_14_may)
GI2010 symposium-longhorn (longhorn keynote-presentation_14_may)GI2010 symposium-longhorn (longhorn keynote-presentation_14_may)
GI2010 symposium-longhorn (longhorn keynote-presentation_14_may)
IGN Vorstand
 
Social media services in Tieto
Social media services in TietoSocial media services in Tieto
Social media services in Tieto
Tieto Corporation
 
Web 4.0 and beyond
Web 4.0 and beyondWeb 4.0 and beyond
Web 4.0 and beyond
Johan Koren
 
IoT: A glance into the future
IoT: A glance into the futureIoT: A glance into the future
IoT: A glance into the future
JWORKS powered by Ordina
 
Dfinity Vietnam presentation -Final-1701.pptx
Dfinity Vietnam presentation -Final-1701.pptxDfinity Vietnam presentation -Final-1701.pptx
Dfinity Vietnam presentation -Final-1701.pptx
TamHoan1
 
Future Of Internet IV | AAAS
Future Of Internet IV | AAASFuture Of Internet IV | AAAS
Cv marco dibiase_eng
Cv marco dibiase_engCv marco dibiase_eng
Cv marco dibiase_eng
Marco Di Biase
 
Future Internet Arch - Open Workshop
Future Internet Arch - Open WorkshopFuture Internet Arch - Open Workshop
Future Internet Arch - Open Workshop
SOFIProject
 
Web 4.0 and beyond
Web 4.0 and beyondWeb 4.0 and beyond
Web 4.0 and beyond
Johan Koren
 
FUTURE INTERNET AND THE “THINGS”, NANOTHINGS!
FUTURE INTERNET AND THE “THINGS”, NANOTHINGS!FUTURE INTERNET AND THE “THINGS”, NANOTHINGS!
FUTURE INTERNET AND THE “THINGS”, NANOTHINGS!
Antonio Marcos Alberti
 
Internet Science
Internet ScienceInternet Science
Internet Science
i_scienceEU
 

Similar to Privacy identity and trust challenges for the future internet citizen fabio massacci (unitn) (20)

100 paper cuts
100 paper cuts100 paper cuts
100 paper cuts
 
Monetizing social games globally
Monetizing social games globallyMonetizing social games globally
Monetizing social games globally
 
6-10-2010-PEMCI 2010
6-10-2010-PEMCI 20106-10-2010-PEMCI 2010
6-10-2010-PEMCI 2010
 
Hunter Public Relations ( Jason Winocour )
Hunter  Public  Relations (  Jason  Winocour )Hunter  Public  Relations (  Jason  Winocour )
Hunter Public Relations ( Jason Winocour )
 
Ownership of web content
Ownership of web contentOwnership of web content
Ownership of web content
 
S cambie scarlett_abbott_final
S cambie scarlett_abbott_finalS cambie scarlett_abbott_final
S cambie scarlett_abbott_final
 
UX for Multi Device applications
UX for Multi Device applicationsUX for Multi Device applications
UX for Multi Device applications
 
Presentation Cendoo tech eng
Presentation Cendoo tech engPresentation Cendoo tech eng
Presentation Cendoo tech eng
 
Users becoming-designers-begona pino
Users becoming-designers-begona pinoUsers becoming-designers-begona pino
Users becoming-designers-begona pino
 
GI2010 symposium-longhorn (longhorn keynote-presentation_14_may)
GI2010 symposium-longhorn (longhorn keynote-presentation_14_may)GI2010 symposium-longhorn (longhorn keynote-presentation_14_may)
GI2010 symposium-longhorn (longhorn keynote-presentation_14_may)
 
Social media services in Tieto
Social media services in TietoSocial media services in Tieto
Social media services in Tieto
 
Web 4.0 and beyond
Web 4.0 and beyondWeb 4.0 and beyond
Web 4.0 and beyond
 
IoT: A glance into the future
IoT: A glance into the futureIoT: A glance into the future
IoT: A glance into the future
 
Dfinity Vietnam presentation -Final-1701.pptx
Dfinity Vietnam presentation -Final-1701.pptxDfinity Vietnam presentation -Final-1701.pptx
Dfinity Vietnam presentation -Final-1701.pptx
 
Future Of Internet IV | AAAS
Future Of Internet IV | AAASFuture Of Internet IV | AAAS
Future Of Internet IV | AAAS
 
Cv marco dibiase_eng
Cv marco dibiase_engCv marco dibiase_eng
Cv marco dibiase_eng
 
Future Internet Arch - Open Workshop
Future Internet Arch - Open WorkshopFuture Internet Arch - Open Workshop
Future Internet Arch - Open Workshop
 
Web 4.0 and beyond
Web 4.0 and beyondWeb 4.0 and beyond
Web 4.0 and beyond
 
FUTURE INTERNET AND THE “THINGS”, NANOTHINGS!
FUTURE INTERNET AND THE “THINGS”, NANOTHINGS!FUTURE INTERNET AND THE “THINGS”, NANOTHINGS!
FUTURE INTERNET AND THE “THINGS”, NANOTHINGS!
 
Internet Science
Internet ScienceInternet Science
Internet Science
 

More from Aniketos EU FP7 Project

20120709 cyber patterns2012
20120709 cyber patterns201220120709 cyber patterns2012
20120709 cyber patterns2012
Aniketos EU FP7 Project
 
A heuristic approach for secure service composition adaptation final
A heuristic approach for secure service composition adaptation finalA heuristic approach for secure service composition adaptation final
A heuristic approach for secure service composition adaptation final
Aniketos EU FP7 Project
 
Dynamic monitoring of composed services
Dynamic monitoring of composed servicesDynamic monitoring of composed services
Dynamic monitoring of composed services
Aniketos EU FP7 Project
 
Aniketos effects plus_6sep_2012-v04
Aniketos effects plus_6sep_2012-v04Aniketos effects plus_6sep_2012-v04
Aniketos effects plus_6sep_2012-v04
Aniketos EU FP7 Project
 
Aniketos trust bus_sept_2012
Aniketos trust bus_sept_2012Aniketos trust bus_sept_2012
Aniketos trust bus_sept_2012
Aniketos EU FP7 Project
 
Soc july-2012-dmitri-botvich
Soc july-2012-dmitri-botvichSoc july-2012-dmitri-botvich
Soc july-2012-dmitri-botvich
Aniketos EU FP7 Project
 
Demo summer soc-28062012
Demo summer soc-28062012Demo summer soc-28062012
Demo summer soc-28062012
Aniketos EU FP7 Project
 
Aniketos summary
Aniketos summaryAniketos summary
Aniketos summary
Aniketos EU FP7 Project
 
TSSG paper for International Symposium on Integrated Network Management (IM)
TSSG paper for International Symposium on Integrated Network Management (IM) TSSG paper for International Symposium on Integrated Network Management (IM)
TSSG paper for International Symposium on Integrated Network Management (IM)
Aniketos EU FP7 Project
 
Wewst11 trustworthiness monitoring of dynamic service compositions v2
Wewst11 trustworthiness monitoring of dynamic service compositions v2Wewst11 trustworthiness monitoring of dynamic service compositions v2
Wewst11 trustworthiness monitoring of dynamic service compositions v2
Aniketos EU FP7 Project
 

More from Aniketos EU FP7 Project (10)

20120709 cyber patterns2012
20120709 cyber patterns201220120709 cyber patterns2012
20120709 cyber patterns2012
 
A heuristic approach for secure service composition adaptation final
A heuristic approach for secure service composition adaptation finalA heuristic approach for secure service composition adaptation final
A heuristic approach for secure service composition adaptation final
 
Dynamic monitoring of composed services
Dynamic monitoring of composed servicesDynamic monitoring of composed services
Dynamic monitoring of composed services
 
Aniketos effects plus_6sep_2012-v04
Aniketos effects plus_6sep_2012-v04Aniketos effects plus_6sep_2012-v04
Aniketos effects plus_6sep_2012-v04
 
Aniketos trust bus_sept_2012
Aniketos trust bus_sept_2012Aniketos trust bus_sept_2012
Aniketos trust bus_sept_2012
 
Soc july-2012-dmitri-botvich
Soc july-2012-dmitri-botvichSoc july-2012-dmitri-botvich
Soc july-2012-dmitri-botvich
 
Demo summer soc-28062012
Demo summer soc-28062012Demo summer soc-28062012
Demo summer soc-28062012
 
Aniketos summary
Aniketos summaryAniketos summary
Aniketos summary
 
TSSG paper for International Symposium on Integrated Network Management (IM)
TSSG paper for International Symposium on Integrated Network Management (IM) TSSG paper for International Symposium on Integrated Network Management (IM)
TSSG paper for International Symposium on Integrated Network Management (IM)
 
Wewst11 trustworthiness monitoring of dynamic service compositions v2
Wewst11 trustworthiness monitoring of dynamic service compositions v2Wewst11 trustworthiness monitoring of dynamic service compositions v2
Wewst11 trustworthiness monitoring of dynamic service compositions v2
 

Recently uploaded

Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 

Recently uploaded (20)

Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 

Privacy identity and trust challenges for the future internet citizen fabio massacci (unitn)

  • 1. Università degli Studi di Trento Privacy, Identity and Trust Challenges for the Future Internet Citizen Fabio Massacci University of Trento 9/27/2010 Fabio Massacci - ICT 2010 1
  • 2. Whose Future Internet? • When we think of the Future Internet we always think it is for “us” – Sophie, Fabio, Reihnard, Ksheerabdhi, Mireille etc. • It is not for “us”. That’s wrong picture • Three generations tell three stories – Nonno Paolo – Born 1939 – Papà Fabio – Born 1967 – Paolo – Born 2000 9/27/2010 Fabio Massacci - ICT 2010 2
  • 3. Privacy 9/27/2010 Fabio Massacci - ICT 2010 3
  • 4. Nonno Paolo – Jun. 1996 • First Picture on the internet – Age 58 • Business Related 9/27/2010 Fabio Massacci - ICT 2010 4
  • 5. Papà Fabio – Feb. 1999 • First Picture on the Internet – Age 31 • Again only professional pictures 9/27/2010 Fabio Massacci - ICT 2010 5
  • 6. Paolo – Feb. 2007 • First picture on the internet – Age 7 9/27/2010 Fabio Massacci - ICT 2010 6
  • 7. If you don’t put, you don’t get pictures, do you? • Come on, a father should not post stuff on the internet and then complain that his boss, insurance company, wife, eu project partner, saw it… • Er… not really 9/27/2010 Fabio Massacci - ICT 2010 7
  • 8. Where is the problem of Privacy? • Nobody in the family posted that picture! – Somebody from Sportivi Ghiaccio Trento put it – I didn’t even know the picture was on the net before Feb. 2010 • Paolo’s life will be entirely on the Future Internet – Can he separate his lives (note the plural) in different zones? • In physical life we are pretty good at zoning – Separate relations (eg friends, work, neighbors) by “distance”. – (legal or curious) searches difficult by people outside the zone – Law enforcement can break zones but have hurdles – Individual and government can build zones • Technical solution alone ain’t enough – He can’t put a sticky policy as the photo will be about him, not his – Regulatory action also needed 9/27/2010 Fabio Massacci - ICT 2010 8
  • 9. Identity 9/27/2010 Fabio Massacci - ICT 2010 9
  • 10. How to tell Identity? • Nonno Paolo – 1° use C.C. on Internet:Age 59 • Papà Fabio – 1° use C.C. on Internet: Age 29 • Paolo – 1° attempt: Age 9 – Papi, can you give me your credit card? – Er… What do you need it for? – There is this Star Wars LEGO robot that you can buy on the LEGO web site you find with Google – Er… Let me see a second… Paolo, this is not LEGO web site!!! It is just a … site … selling stuff… – [Follow long -- and for a child boring -- explanation on how to find the identity of providers] 9/27/2010 Fabio Massacci - ICT 2010 10
  • 11. Commercial Identity? • Identity tech so far conceived for “client/servers” – What about “identity” of “partners” ? – You want to know who is the other! • In the physical realm – Identity of partners is regulated (you cannot just open a supermarket, a dentist’s practice or a bank) – Commercial identity is distinct but always linked to identity of human individuals (legal responsible) – strictly linked to specific attributes and taxable • How to link the identity of end point to the accountable identity for humans behind it? – Of course scams always possible (eg Maddoff) but you’ won’t get away so easily with it 9/27/2010 Fabio Massacci - ICT 2010 11
  • 12. Trust 9/27/2010 Fabio Massacci - ICT 2010 12
  • 13. Download and Run Internet Connected Software • Nonno Paolo: always stuff from a box • Papà Fabio: Age 28 – SSH Client/Server • Paolo: Age 10 – REVOLT • What’s that? – Running cars. Can connect over IP to a peer – Got from a friend on a usb stick – I found months later when he wanted to play multiplayer and Windows Firewall complained 9/27/2010 Fabio Massacci - ICT 2010 13
  • 14. How do you trust REVOLT? • Russian Roulette • PhD in Security – For 24 other fathers – 3hours for father of (actually the children) only child without admin password 9/27/2010 Fabio Massacci - ICT 2010 14
  • 15. After REVOLT, GERICO… • Come on, that’s obvious, after all that’s children downloading shady software • Er… not really – Gerico is not for the faint hearted… – Really for grown-up, corporate users… 9/27/2010 Fabio Massacci - ICT 2010 15
  • 16. So, what’s GERICO? • What’s the problem of running software connecting automatically to your Tax Agency? – You just don’t know what exactly it does… 9/27/2010 Fabio Massacci - ICT 2010 16
  • 17. Corporate Environment is alike… • Put everything on a very secure cloud is new trend – Good step but not enough • The problem is that “everything” – in-house developed LDAP system hiding roles from the ERP sys as you pay O#### by the role – open source PDF report generator so you won’t have to pay licensing fees to A#### – The wrapper of old legacy application controlled remotely by a university spin-off of ex-CTO turned prof. – The new S## GRC application monitoring the whole virtual network controlled by your auditors to lower your audit bill • No machine readable/checkable claim what they do 9/27/2010 Fabio Massacci - ICT 2010 17
  • 18. The Wild West Ecosystem • Citizens’ Laptops and Corporate Clouds are quickly evolving (worsening?) alike – Lots of frequently changing interconnected software – With [some] natural language description – With [some] digital identity • But we don’t know what this software is doing – Compare with entering an EU Consortium Agreement… – For uploading a software you just check a signature… • Where’s the contractual, machine readable, version of security claims, rights and obligations? – Security-by-Contract? – Software should declare its claims and we should check them.. 9/27/2010 Fabio Massacci - ICT 2010 18
  • 19. Challenges Ahead 9/27/2010 Fabio Massacci - ICT 2010 19
  • 20. Sum-Up of Challenges • Frame of mind: – Privacy, Identity and Trust solutions must be solutions for people whose lives/data/actions have been on the Future Internet since they can read or write (age 6) • Questions – Do (regulatory & technical) solutions allow individuals to zone identities? – How to link the identity of a partner service to the accountable identity of humans behind it? – Can we provide/check a “contractual” description of the security behavior of our parners’ code? 9/27/2010 Fabio Massacci - ICT 2010 20