SlideShare a Scribd company logo
1 of 15
Identity-Based Privacy
(IBP)
07/2013
Privacy
• associated with Western culture, English and North
American in particular
• strong ties with freedom and liberty
• unknown in some cultures
• the word Privacy is missing in some languages

My attempt to define Privacy
Ability of an individual or group to govern level
of information disclosure about themselves.
Types of Privacy
• Individual privacy: Individuals
• Organizational privacy: Corp, Government, Family, …
• Shared privacy: Among all of the above-mentioned
Cloud Computing, Data Security and
Information Privacy
• Cloud Computing & Security – meet very well
• Cloud Computing & Privacy – contradictory

Privacy is the issue!
• Business information
• Personal information
Privacy preserving
Encryption is one of the most effective
information protection techniques.
• Security - Data at Rest Encryption, Data in
Transit Encryption
• Privacy - Data in Use Encryption
Privacy preserving - existing solutions
• PKI – Public-Key Infrastructure
• PGP – Pretty Good Privacy
• IBE – Identity-Based Encryption
• PKI, PGI – it’s more about key management
then encryption
• IBE – heavy mathematics
Privacy preserving - existing solutions
(cont.)
Drawbacks:
• PKI – very expensive, usability
• PGP – usability
• IBE – strong patents
Identity-Based Privacy (IBP)
A lightweight alternative to PKI/PGP/IBE systems
• Internet of Things – a Personal Key Ring
separated from cloud application and data
storage
• User Agent – only there meet your encryption
key, application and data
• Identity Management – the gateway to your
privacy
IBP - Technical background
• Identity Provider – email address as identifier
• Authentication – OpenID Connect/OAuth2
• One-Time Identity-Based Key Generator
• Identity encryption key generated from identity
• Identity-Based Encryption[1]
• Data encryption key encrypted by identity encryption
key
1. a simple HMAC-SHA/AES(GCM) symmetric encryption, not the
type of public-key encryption as stated on Wikipedia
IBP - Technical background (cont.)
Client-side zero-knowledge encryption:
• All users' data are encrypted on the client side
and never touch servers in a plain form.
• Cloud data storage provider has zero
knowledge of the encryption keys.
• Key generator server has zero knowledge of
users' data.
Business model
Customer
User Agent
(Browser)

Data/App Provider

Google, Microsoft, Oracle, AWS

Identity Provider +
Encryption Key Generator
home or corp.
computer, tablet, smartph
one
IBP - Pros
• usability (no passwords, no certificates)
• no certificates management
(creation, storage, distribution, revocation)
• lost key prevention
• IBE like features, key escrow/fair
encryption, no need for receiver’s public key
before encryption
• no IBE revocation problem (online service)
IBP - Cons
• online solution
• master key security
Business Opportunities
•
•
•
•
•
•
•
•
•
•
•

Data Storage / Sharing
Health Records / Medical Data Sharing
Big Data
Data Boxes
Databases
Reporting / Business Intelligence
Management Information System
e-mail
eForms / Workflow
Document Management / Workflow
Internet of Things
Featured links
• www.leadict.com
• igi64.github.io

More Related Content

What's hot

Edge pereira oss304 tech ed australia regulatory compliance and microsoft off...
Edge pereira oss304 tech ed australia regulatory compliance and microsoft off...Edge pereira oss304 tech ed australia regulatory compliance and microsoft off...
Edge pereira oss304 tech ed australia regulatory compliance and microsoft off...Edge Pereira
 
Basic principles to information privacy in data mining & data warehouse
Basic principles to information privacy in data mining & data warehouseBasic principles to information privacy in data mining & data warehouse
Basic principles to information privacy in data mining & data warehousePuja Dhakal
 
Tax Preparers Presentation
Tax Preparers PresentationTax Preparers Presentation
Tax Preparers PresentationDoug Landoll
 
Product Portfolio Cybersecurity Cloud Voice Data
Product Portfolio Cybersecurity Cloud Voice DataProduct Portfolio Cybersecurity Cloud Voice Data
Product Portfolio Cybersecurity Cloud Voice DataCloudMetrix
 
Product Portfolio Brochure
Product Portfolio BrochureProduct Portfolio Brochure
Product Portfolio BrochureMatt Wilson
 
The Loss of Intellectual Property in the Digital Age: What Companies can d…
The Loss of Intellectual Property in the Digital Age: What Companies can d…The Loss of Intellectual Property in the Digital Age: What Companies can d…
The Loss of Intellectual Property in the Digital Age: What Companies can d…Christopher Kranich
 
IBM Secret Key management protoco
IBM Secret Key management protocoIBM Secret Key management protoco
IBM Secret Key management protocogori4
 
xsecutive infosec 2015 final Eng
xsecutive infosec 2015 final Engxsecutive infosec 2015 final Eng
xsecutive infosec 2015 final EngRob Christ
 
Plain talk about security public - ms1
Plain talk about security   public - ms1Plain talk about security   public - ms1
Plain talk about security public - ms1Mike Stone
 
Basic of Information Security
Basic of Information SecurityBasic of Information Security
Basic of Information SecurityPotato
 
Kubernetes Secrets Management - Securing Your Production Environment
Kubernetes Secrets Management - Securing Your Production EnvironmentKubernetes Secrets Management - Securing Your Production Environment
Kubernetes Secrets Management - Securing Your Production EnvironmentAkeyless
 
IPzen - Cloud based solution for Case Management, Invoicing, Domain name port...
IPzen - Cloud based solution for Case Management, Invoicing, Domain name port...IPzen - Cloud based solution for Case Management, Invoicing, Domain name port...
IPzen - Cloud based solution for Case Management, Invoicing, Domain name port...Nathalie DREYFUS
 
Sharing Session - PLATFORM 2015 Teknik Informatika Universitas Bakrie
Sharing Session - PLATFORM 2015 Teknik Informatika Universitas BakrieSharing Session - PLATFORM 2015 Teknik Informatika Universitas Bakrie
Sharing Session - PLATFORM 2015 Teknik Informatika Universitas BakrieEryk Budi Pratama
 
MISA Cloud workshop_ Security and risk mgmt
MISA Cloud workshop_ Security and risk mgmtMISA Cloud workshop_ Security and risk mgmt
MISA Cloud workshop_ Security and risk mgmtMISA Ontario Cloud SIG
 
IoT Domain Naming and Pain Points
IoT Domain Naming and Pain PointsIoT Domain Naming and Pain Points
IoT Domain Naming and Pain PointsDavid Fowler
 
Mobile Convention Brussels 2014 - Paul Skeldon
Mobile Convention Brussels 2014 - Paul SkeldonMobile Convention Brussels 2014 - Paul Skeldon
Mobile Convention Brussels 2014 - Paul SkeldonMobile Convention
 
Securing the Mobile Enterprise
Securing the Mobile EnterpriseSecuring the Mobile Enterprise
Securing the Mobile EnterpriseIBM Danmark
 

What's hot (20)

Edge pereira oss304 tech ed australia regulatory compliance and microsoft off...
Edge pereira oss304 tech ed australia regulatory compliance and microsoft off...Edge pereira oss304 tech ed australia regulatory compliance and microsoft off...
Edge pereira oss304 tech ed australia regulatory compliance and microsoft off...
 
Basic principles to information privacy in data mining & data warehouse
Basic principles to information privacy in data mining & data warehouseBasic principles to information privacy in data mining & data warehouse
Basic principles to information privacy in data mining & data warehouse
 
Tax Preparers Presentation
Tax Preparers PresentationTax Preparers Presentation
Tax Preparers Presentation
 
Product Portfolio Cybersecurity Cloud Voice Data
Product Portfolio Cybersecurity Cloud Voice DataProduct Portfolio Cybersecurity Cloud Voice Data
Product Portfolio Cybersecurity Cloud Voice Data
 
Product Portfolio Brochure
Product Portfolio BrochureProduct Portfolio Brochure
Product Portfolio Brochure
 
The Loss of Intellectual Property in the Digital Age: What Companies can d…
The Loss of Intellectual Property in the Digital Age: What Companies can d…The Loss of Intellectual Property in the Digital Age: What Companies can d…
The Loss of Intellectual Property in the Digital Age: What Companies can d…
 
IBM Secret Key management protoco
IBM Secret Key management protocoIBM Secret Key management protoco
IBM Secret Key management protoco
 
ThingStudio_persys17
ThingStudio_persys17ThingStudio_persys17
ThingStudio_persys17
 
xsecutive infosec 2015 final Eng
xsecutive infosec 2015 final Engxsecutive infosec 2015 final Eng
xsecutive infosec 2015 final Eng
 
Plain talk about security public - ms1
Plain talk about security   public - ms1Plain talk about security   public - ms1
Plain talk about security public - ms1
 
Secure Objects
Secure ObjectsSecure Objects
Secure Objects
 
Basic of Information Security
Basic of Information SecurityBasic of Information Security
Basic of Information Security
 
Kubernetes Secrets Management - Securing Your Production Environment
Kubernetes Secrets Management - Securing Your Production EnvironmentKubernetes Secrets Management - Securing Your Production Environment
Kubernetes Secrets Management - Securing Your Production Environment
 
IPzen - Cloud based solution for Case Management, Invoicing, Domain name port...
IPzen - Cloud based solution for Case Management, Invoicing, Domain name port...IPzen - Cloud based solution for Case Management, Invoicing, Domain name port...
IPzen - Cloud based solution for Case Management, Invoicing, Domain name port...
 
Tips memulai karir di cybersecurity
Tips memulai karir di cybersecurityTips memulai karir di cybersecurity
Tips memulai karir di cybersecurity
 
Sharing Session - PLATFORM 2015 Teknik Informatika Universitas Bakrie
Sharing Session - PLATFORM 2015 Teknik Informatika Universitas BakrieSharing Session - PLATFORM 2015 Teknik Informatika Universitas Bakrie
Sharing Session - PLATFORM 2015 Teknik Informatika Universitas Bakrie
 
MISA Cloud workshop_ Security and risk mgmt
MISA Cloud workshop_ Security and risk mgmtMISA Cloud workshop_ Security and risk mgmt
MISA Cloud workshop_ Security and risk mgmt
 
IoT Domain Naming and Pain Points
IoT Domain Naming and Pain PointsIoT Domain Naming and Pain Points
IoT Domain Naming and Pain Points
 
Mobile Convention Brussels 2014 - Paul Skeldon
Mobile Convention Brussels 2014 - Paul SkeldonMobile Convention Brussels 2014 - Paul Skeldon
Mobile Convention Brussels 2014 - Paul Skeldon
 
Securing the Mobile Enterprise
Securing the Mobile EnterpriseSecuring the Mobile Enterprise
Securing the Mobile Enterprise
 

Similar to Identity-Based Privacy (IBP)

Learning about Security and Compliance in Office 365
Learning about Security and Compliance in Office 365Learning about Security and Compliance in Office 365
Learning about Security and Compliance in Office 365Aptera Inc
 
Privacy for tech startups
Privacy for tech startups Privacy for tech startups
Privacy for tech startups Marc Gallardo
 
Securing and governing a multi-tenant data lake within the financial industry
Securing and governing a multi-tenant data lake within the financial industrySecuring and governing a multi-tenant data lake within the financial industry
Securing and governing a multi-tenant data lake within the financial industryDataWorks Summit
 
Encryption in the enterprise
Encryption in the enterpriseEncryption in the enterprise
Encryption in the enterpriseBozhidar Bozhanov
 
Office 365 Data Leakage Protection, DLP, Data Loss Prevention, Privacy, Comp...
Office 365  Data Leakage Protection, DLP, Data Loss Prevention, Privacy, Comp...Office 365  Data Leakage Protection, DLP, Data Loss Prevention, Privacy, Comp...
Office 365 Data Leakage Protection, DLP, Data Loss Prevention, Privacy, Comp...Edge Pereira
 
C01 office 365, DLP data loss preventions, privacy, compliance, regulations
C01 office 365, DLP data loss preventions, privacy, compliance, regulationsC01 office 365, DLP data loss preventions, privacy, compliance, regulations
C01 office 365, DLP data loss preventions, privacy, compliance, regulationsEdge Pereira
 
What Does a Full Featured Security Strategy Look Like?
What Does a Full Featured Security Strategy Look Like?What Does a Full Featured Security Strategy Look Like?
What Does a Full Featured Security Strategy Look Like?Precisely
 
Lecture Data Classification And Data Loss Prevention
Lecture Data Classification And Data Loss PreventionLecture Data Classification And Data Loss Prevention
Lecture Data Classification And Data Loss PreventionNicholas Davis
 
Data Classification And Loss Prevention
Data Classification And Loss PreventionData Classification And Loss Prevention
Data Classification And Loss PreventionNicholas Davis
 
Lecture data classification_and_data_loss_prevention
Lecture data classification_and_data_loss_preventionLecture data classification_and_data_loss_prevention
Lecture data classification_and_data_loss_preventionNicholas Davis
 
Protect Sensitive Data on Your IBM i (Social Distance Your IBM i/AS400)
Protect Sensitive Data on Your IBM i (Social Distance Your IBM i/AS400)Protect Sensitive Data on Your IBM i (Social Distance Your IBM i/AS400)
Protect Sensitive Data on Your IBM i (Social Distance Your IBM i/AS400)Precisely
 
Internet Security Threat Report (ISTR) Vol. 16
Internet Security Threat Report (ISTR) Vol. 16Internet Security Threat Report (ISTR) Vol. 16
Internet Security Threat Report (ISTR) Vol. 16Symantec APJ
 
Authentication Technologies
Authentication TechnologiesAuthentication Technologies
Authentication TechnologiesNicholas Davis
 
Authentication technologies
Authentication technologiesAuthentication technologies
Authentication technologiesNicholas Davis
 
Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Information and Identity Protection - Data Loss Prevention, Encryption, User ...Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Information and Identity Protection - Data Loss Prevention, Encryption, User ...Symantec APJ
 
INFORMATION AND CYBER SECURITY
INFORMATION AND CYBER SECURITYINFORMATION AND CYBER SECURITY
INFORMATION AND CYBER SECURITYNishant Pawar
 
Writing An Effective Security Procedure in 2 pages or less and make it stick
Writing An Effective Security Procedure in 2 pages or less and make it stickWriting An Effective Security Procedure in 2 pages or less and make it stick
Writing An Effective Security Procedure in 2 pages or less and make it stickFlaskdata.io
 
MongoDB .local London 2019: New Encryption Capabilities in MongoDB 4.2: A Dee...
MongoDB .local London 2019: New Encryption Capabilities in MongoDB 4.2: A Dee...MongoDB .local London 2019: New Encryption Capabilities in MongoDB 4.2: A Dee...
MongoDB .local London 2019: New Encryption Capabilities in MongoDB 4.2: A Dee...MongoDB
 
Web-of-Things and Services Security
Web-of-Things and Services SecurityWeb-of-Things and Services Security
Web-of-Things and Services SecurityOliver Pfaff
 

Similar to Identity-Based Privacy (IBP) (20)

Learning about Security and Compliance in Office 365
Learning about Security and Compliance in Office 365Learning about Security and Compliance in Office 365
Learning about Security and Compliance in Office 365
 
itsMERocks Pitch Deck
itsMERocks Pitch DeckitsMERocks Pitch Deck
itsMERocks Pitch Deck
 
Privacy for tech startups
Privacy for tech startups Privacy for tech startups
Privacy for tech startups
 
Securing and governing a multi-tenant data lake within the financial industry
Securing and governing a multi-tenant data lake within the financial industrySecuring and governing a multi-tenant data lake within the financial industry
Securing and governing a multi-tenant data lake within the financial industry
 
Encryption in the enterprise
Encryption in the enterpriseEncryption in the enterprise
Encryption in the enterprise
 
Office 365 Data Leakage Protection, DLP, Data Loss Prevention, Privacy, Comp...
Office 365  Data Leakage Protection, DLP, Data Loss Prevention, Privacy, Comp...Office 365  Data Leakage Protection, DLP, Data Loss Prevention, Privacy, Comp...
Office 365 Data Leakage Protection, DLP, Data Loss Prevention, Privacy, Comp...
 
C01 office 365, DLP data loss preventions, privacy, compliance, regulations
C01 office 365, DLP data loss preventions, privacy, compliance, regulationsC01 office 365, DLP data loss preventions, privacy, compliance, regulations
C01 office 365, DLP data loss preventions, privacy, compliance, regulations
 
What Does a Full Featured Security Strategy Look Like?
What Does a Full Featured Security Strategy Look Like?What Does a Full Featured Security Strategy Look Like?
What Does a Full Featured Security Strategy Look Like?
 
Lecture Data Classification And Data Loss Prevention
Lecture Data Classification And Data Loss PreventionLecture Data Classification And Data Loss Prevention
Lecture Data Classification And Data Loss Prevention
 
Data Classification And Loss Prevention
Data Classification And Loss PreventionData Classification And Loss Prevention
Data Classification And Loss Prevention
 
Lecture data classification_and_data_loss_prevention
Lecture data classification_and_data_loss_preventionLecture data classification_and_data_loss_prevention
Lecture data classification_and_data_loss_prevention
 
Protect Sensitive Data on Your IBM i (Social Distance Your IBM i/AS400)
Protect Sensitive Data on Your IBM i (Social Distance Your IBM i/AS400)Protect Sensitive Data on Your IBM i (Social Distance Your IBM i/AS400)
Protect Sensitive Data on Your IBM i (Social Distance Your IBM i/AS400)
 
Internet Security Threat Report (ISTR) Vol. 16
Internet Security Threat Report (ISTR) Vol. 16Internet Security Threat Report (ISTR) Vol. 16
Internet Security Threat Report (ISTR) Vol. 16
 
Authentication Technologies
Authentication TechnologiesAuthentication Technologies
Authentication Technologies
 
Authentication technologies
Authentication technologiesAuthentication technologies
Authentication technologies
 
Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Information and Identity Protection - Data Loss Prevention, Encryption, User ...Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Information and Identity Protection - Data Loss Prevention, Encryption, User ...
 
INFORMATION AND CYBER SECURITY
INFORMATION AND CYBER SECURITYINFORMATION AND CYBER SECURITY
INFORMATION AND CYBER SECURITY
 
Writing An Effective Security Procedure in 2 pages or less and make it stick
Writing An Effective Security Procedure in 2 pages or less and make it stickWriting An Effective Security Procedure in 2 pages or less and make it stick
Writing An Effective Security Procedure in 2 pages or less and make it stick
 
MongoDB .local London 2019: New Encryption Capabilities in MongoDB 4.2: A Dee...
MongoDB .local London 2019: New Encryption Capabilities in MongoDB 4.2: A Dee...MongoDB .local London 2019: New Encryption Capabilities in MongoDB 4.2: A Dee...
MongoDB .local London 2019: New Encryption Capabilities in MongoDB 4.2: A Dee...
 
Web-of-Things and Services Security
Web-of-Things and Services SecurityWeb-of-Things and Services Security
Web-of-Things and Services Security
 

Recently uploaded

SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 

Identity-Based Privacy (IBP)

  • 2. Privacy • associated with Western culture, English and North American in particular • strong ties with freedom and liberty • unknown in some cultures • the word Privacy is missing in some languages My attempt to define Privacy Ability of an individual or group to govern level of information disclosure about themselves.
  • 3. Types of Privacy • Individual privacy: Individuals • Organizational privacy: Corp, Government, Family, … • Shared privacy: Among all of the above-mentioned
  • 4. Cloud Computing, Data Security and Information Privacy • Cloud Computing & Security – meet very well • Cloud Computing & Privacy – contradictory Privacy is the issue! • Business information • Personal information
  • 5. Privacy preserving Encryption is one of the most effective information protection techniques. • Security - Data at Rest Encryption, Data in Transit Encryption • Privacy - Data in Use Encryption
  • 6. Privacy preserving - existing solutions • PKI – Public-Key Infrastructure • PGP – Pretty Good Privacy • IBE – Identity-Based Encryption • PKI, PGI – it’s more about key management then encryption • IBE – heavy mathematics
  • 7. Privacy preserving - existing solutions (cont.) Drawbacks: • PKI – very expensive, usability • PGP – usability • IBE – strong patents
  • 8. Identity-Based Privacy (IBP) A lightweight alternative to PKI/PGP/IBE systems • Internet of Things – a Personal Key Ring separated from cloud application and data storage • User Agent – only there meet your encryption key, application and data • Identity Management – the gateway to your privacy
  • 9. IBP - Technical background • Identity Provider – email address as identifier • Authentication – OpenID Connect/OAuth2 • One-Time Identity-Based Key Generator • Identity encryption key generated from identity • Identity-Based Encryption[1] • Data encryption key encrypted by identity encryption key 1. a simple HMAC-SHA/AES(GCM) symmetric encryption, not the type of public-key encryption as stated on Wikipedia
  • 10. IBP - Technical background (cont.) Client-side zero-knowledge encryption: • All users' data are encrypted on the client side and never touch servers in a plain form. • Cloud data storage provider has zero knowledge of the encryption keys. • Key generator server has zero knowledge of users' data.
  • 11. Business model Customer User Agent (Browser) Data/App Provider Google, Microsoft, Oracle, AWS Identity Provider + Encryption Key Generator home or corp. computer, tablet, smartph one
  • 12. IBP - Pros • usability (no passwords, no certificates) • no certificates management (creation, storage, distribution, revocation) • lost key prevention • IBE like features, key escrow/fair encryption, no need for receiver’s public key before encryption • no IBE revocation problem (online service)
  • 13. IBP - Cons • online solution • master key security
  • 14. Business Opportunities • • • • • • • • • • • Data Storage / Sharing Health Records / Medical Data Sharing Big Data Data Boxes Databases Reporting / Business Intelligence Management Information System e-mail eForms / Workflow Document Management / Workflow Internet of Things