1 / 6

Technical Challenges of Privacy, Reliability, and Security

Technical Challenges of Privacy, Reliability, and Security. Dr. Marcus Brunner Head of Standardization, Eco-system D evelopment, and Open Source Swisscom m arcus.brunner@swisscom.com. Measurability and Provability. To achieve more secure, privacy aware networks

johnm
Télécharger la présentation

Technical Challenges of Privacy, Reliability, and Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Technical Challenges of Privacy, Reliability, and Security Dr. Marcus Brunner Head of Standardization, Eco-system Development, and Open Source Swisscom marcus.brunner@swisscom.com

  2. Measurability and Provability • To achieve more secure, privacy aware networks • Rely on competition, which requires a certain level of measurability • A key business driver is having a competitive advantage and being able to market it • Provability of security • A posteriori, I can prove that something happened • A priori, I can “prove” that the quality is on the requested level

  3. User Experience and Interface • End-user do not understand anymore what is going on • What happens with my data? • How save are they and to whom I actually have to trust about handling it correctly? • Whom to trust telco/network, end-system, server/cloud provider • Worse in case of any type of proxying • Usability • For an end-user it is very unclear who has access to what data • What usage rights everybody in the chain has • Most of the time it is unclear to the user whether he is secure or not

  4. Reliability • Today it is mainly a game in mobile coverage and per-node reliability • Is a traditional parameter in an SLA • Challenge to differentiate the reliability for different product offerings, based on the same platform • Virtualization and automated control enables networks to build reliability at another layer • Is this more cost-effective or has better properties • What is the required platform reliability?

  5. Applications to 5G and Virtualization • Non-SIM/Non-HW ? • Is software-only possible from a security perspective for network access, service access, fraud prevention, etc. • Pattern recognition on encrypted packets • What can be said about encrypted traffic • For some traffic management applications in the network it might be good enough • Several layers of virtualization and/or abstraction • Nested virtualization technologies are security-wise a challenge • Specifically, hardware oriented approaches, since virtualization is abstracting away the hardware

  6. Various • PKI • CA as single point of failure • Trust in Internet in general • Next generation crypto • Applicability of new crypto technology • Quantum-proof crypto-algorithms • Future proof of our security solutions in practice? • Block chain • Applicability to various use cases possible beyond crypto-money? • Everything encrypted by browser/application • http 2.0 and proxying • Customer associates security with telco

More Related