20
© Hitachi, Ltd. 2009. All rights reserved. 30 September, 2009 Akira Maeda Systems Development Laboratory, Hitachi, Ltd. Knowledge Emergence Infrastructure by Convergence of Real World and IT 1. Social Innovation Induced by IT 2. KaaS: Knowledge as a Services 3. Information Security for KaaS 4. Conclusions Contents

Knowledge Emergence Infrastructure by Convergence of Real … · 2017. 4. 24. · Data processing/structuring technology based on the real business data characteristics Continuous

  • Upload
    others

  • View
    4

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Knowledge Emergence Infrastructure by Convergence of Real … · 2017. 4. 24. · Data processing/structuring technology based on the real business data characteristics Continuous

© Hitachi, Ltd. 2009. All rights reserved.© Hitachi, Ltd. 2009. All rights reserved.

30 September, 2009

Akira MaedaSystems Development Laboratory, Hitachi, Ltd.

Knowledge Emergence Infrastructure by Convergence of Real World and IT

1. Social Innovation Induced by IT

2. KaaS: Knowledge as a Services

3. Information Security for KaaS

4. Conclusions

Contents

Page 2: Knowledge Emergence Infrastructure by Convergence of Real … · 2017. 4. 24. · Data processing/structuring technology based on the real business data characteristics Continuous

1© Hitachi, Ltd. 2009. All rights reserved.

Global Issues

Ageing

Environment

Food

Agriculture

Climate ChangeAfrica

Woman

21 global issues grappled by the United Nations

AIDSAtomic Energy

Children

Decolonization

Development Cooperation

Disarmament

Governance

Human Rights

Humanitarian and Disaster Relief

Assistance

International Raw

Peace and Security

Person with Disability Refugees

Demining

http://www.un.org/en/globalissues/

1-1.

Page 3: Knowledge Emergence Infrastructure by Convergence of Real … · 2017. 4. 24. · Data processing/structuring technology based on the real business data characteristics Continuous

2© Hitachi, Ltd. 2009. All rights reserved.

•It is important to improve efficiency of activity in daily life to harmonize issues.•Social Infrastructures that support daily life should be “globally” optimized.•IT plays a roll for a infrastructure of infrastructures.

Reasonable Approach to Tackle Global Issues1-2.

Page 4: Knowledge Emergence Infrastructure by Convergence of Real … · 2017. 4. 24. · Data processing/structuring technology based on the real business data characteristics Continuous

3© Hitachi, Ltd. 2009. All rights reserved.

•It is important to improve efficiency of activity in daily life to harmonize issues.•Social Infrastructures that support daily life should be “globally” optimized.•IT plays a roll for a infrastructure of infrastructures.

Reasonable Approach to Tackle Global Issues1-2.

Page 5: Knowledge Emergence Infrastructure by Convergence of Real … · 2017. 4. 24. · Data processing/structuring technology based on the real business data characteristics Continuous

4© Hitachi, Ltd. 2009. All rights reserved.

Upcoming Information-Explosion Era

1.8 Billion(in FY 2012)

Newly evolutional services will be available by storing and using massive amount of real world data

2.8 Billion

in FY 2007-2012

Reference:Yano Research, Parks Associates

1.6 million(FY1999)

32 million(FY2006)

Shipped GPS cell phones (W/W)Shipped GPS cell phones (W/W)Produced RFID (Japan)Produced RFID (Japan)

Behavior become observableBehavior become observableItems become traceableItems become traceable

1-3.

Page 6: Knowledge Emergence Infrastructure by Convergence of Real … · 2017. 4. 24. · Data processing/structuring technology based on the real business data characteristics Continuous

5© Hitachi, Ltd. 2009. All rights reserved.

End User

The Cloud yet to Come

Cloud computing enables service providers to acquirevaluable information and store them in the black box

Cloud computing enables service providers to acquireCloud computing enables service providers to acquirevaluable information and store them in the black boxvaluable information and store them in the black box

Cloud ComputingCloud Computing

InnovativeService

Virtualization Virtualization Development Development Grid Grid Computing Computing Management Management

DB DB AP AP Certification Certification

Server Server Network Network Storage Storage

Ubiquitous Information

Expenditure for Datacenter

0

3

6[B$]

'03 '07

G

MYEA

Cloud absorbing huge amount of ubiquitous data will gain abilityto generate even more evolutional services. The cycle will go on.

1-4.

Page 7: Knowledge Emergence Infrastructure by Convergence of Real … · 2017. 4. 24. · Data processing/structuring technology based on the real business data characteristics Continuous

© Hitachi, Ltd. 2009. All rights reserved. 6

Social Infrastructures on Cloud

Ecological Data Center

Real World data

KnowledgeProduction Production KaaS

Social Infrastructure

Layer

Electric Power

ServiceLayer

Road Service Banking

ServiceRailroad Service

ATM N/W

Observe Observe

ControlControl

Power Grid

Observe Observe

ControlControl

Observe Observe

ControlControl

IdM, Rail N/W

ObserveObserve

ControlControl

Traffic

Knowledge PlantLayer

Highly Reliable Cloud Platform

KaaS (Knowledge as a Service) is the trademark of Hitachi, Ltd.

Social Infrastructures on cloud computers enable to observe, optimize and control real world

ComputingResource

LayerSocial Infrastructures on Cloud

1-5.

Today’s Topic

Page 8: Knowledge Emergence Infrastructure by Convergence of Real … · 2017. 4. 24. · Data processing/structuring technology based on the real business data characteristics Continuous

7© Hitachi, Ltd. 2009. All rights reserved.

Toward Innovation: A New Business Growth Model

“KaaS(Knowledge as a Service)business model”is one of the keys for IT service business to grow““KaaSKaaS((Knowledge as a ServiceKnowledge as a Service))business modelbusiness model””is one of the keys for IT service business to growis one of the keys for IT service business to grow

Raw Data Raw Data Value Added Data (Knowledge)

Value Added Data (Knowledge)

Big Account End User End User End User End User SMB SMB SMB SMB Big

Account

Knowledge Platform Knowledge Platform

Customer

Knowledge Plant

Traditional Service Traditional Service

Computing platform Computing platform

Traditional business service Value added business service

Knowledge Based ServiceKnowledge Based Service

2-1.

Page 9: Knowledge Emergence Infrastructure by Convergence of Real … · 2017. 4. 24. · Data processing/structuring technology based on the real business data characteristics Continuous

8© Hitachi, Ltd. 2009. All rights reserved.

Existing business Value added business

Raw Data Raw Data Value Added Data (Knowledge)

Value Added Data (Knowledge)

Big Account 個人個人 個人個人SMB SMB SMB SMB Big

Account

Computing platformComputing platform

Knowledge Based ServiceKnowledge Based Service

Approach to Bring KaaS to Reality

KaaS business model characteristics

Accumulating dataAccumulating datagained from existing businessgained from existing business

Having IT platformHaving IT platformoptimized for the serviceoptimized for the service

Customer

Knowledge Plant

Traditional Service Traditional Service

Knowledge Platform Knowledge Platform Knowledge creation Knowledge creation from large data setsfrom large data sets

2-2.

Page 10: Knowledge Emergence Infrastructure by Convergence of Real … · 2017. 4. 24. · Data processing/structuring technology based on the real business data characteristics Continuous

9© Hitachi, Ltd. 2009. All rights reserved.

What to Do

Data processing/structuring technology based on the real business data characteristics

Continuous business/future trend prediction methodology and simulation technology

Provide a service business platform by enabling new technological components to be plugged in

Essentially new datacenter architecture for the real business data to be processed in a highly effective manner

Adoption of emerging electronics technologies to enable ultra-low electricity consumption per operation

A datacenter to be regarded and controlled as if it were a single computer

Knowledge PlatformKnowledge Platform

Computing PlatformComputing Platform

2-3.

Page 11: Knowledge Emergence Infrastructure by Convergence of Real … · 2017. 4. 24. · Data processing/structuring technology based on the real business data characteristics Continuous

10© Hitachi, Ltd. 2009. All rights reserved.

Parallel distributed processing platform (MapReduce enhancement)Parallel distributed processing platform (MapReduce enhancement)

Security management and data protection platformSecurity management and data protection platform

KaaS Overview and Research Approach

(1) R&D drive by Vehicle deal modeling

Model generation phase Model use phase

(2) Development of platform and tools processing a widely varying amounts of data

High reliable cloud platformHigh reliable cloud platform

Structured Data

Semi-Structured

Data

Behavior model

Domain engineer

Demand &Supply model

Modelcreation

Modelcreation

Pattern extraction Pattern extraction

Relationshipanalysis

Relationshipanalysis

Extraction processing Extraction processing

Supply Chainlog

Supply Chainlog

Behaviorhistory

Behaviorhistory

Indexing Indexing

CleansingCleansing

Knowledge workbench

Knowledge engineer

Purchasehistory

Purchasehistory

TestTest Verification Verification

Pre processingPre processing

Individual

Service platform

S

ervice platform

SimulationSimulation

PredictionPrediction

Abnormality detection

Abnormality detection

Customer

SMB

Fact stream Fact

stream

Real time processing Real time processing

Big user

2-4.

Page 12: Knowledge Emergence Infrastructure by Convergence of Real … · 2017. 4. 24. · Data processing/structuring technology based on the real business data characteristics Continuous

11© Hitachi, Ltd. 2009. All rights reserved.

Risk Management Strategy for Cloud Security

EERR

R: Risk of in-house dataE: Risk of out-sourced data

possibility=vulnerability × threat

impact

EERisk=impact×possibility

????

3-1.

(*1) Ministry of Internal Affairs and Communications(*2) Ministry of Economy, Trade and Industry(*3) ISO/IEC 27001

Clarify and keep service level agreement of securityClarify and keep service level agreement of security•Guidelines for ASP/SaaS information security measures of MIC(*1)•SLA Guideline for SaaS of METI (*2)•Information Security Management System(*3)

Risk Threshold

Transform outsourced data to secure by Technology

Transform outsourced data to secure by Technology

(1) Hide all of secret information Private Information Processing •Server-aided Computation•Cancerable Biometrics(2) Hide only identifiable information to personAnonymization •ID management and field isolation•K-aonymization

Page 13: Knowledge Emergence Infrastructure by Convergence of Real … · 2017. 4. 24. · Data processing/structuring technology based on the real business data characteristics Continuous

12© Hitachi, Ltd. 2009. All rights reserved.

Traditional Information Processing

Private Information Processing

Encrypted Data

Input Data Output Data

Input Data

Encrypted Data

Encryption & Decryption

Input Data

processingdata

outsourcing

Input Data

Encrypted Data

Encryption

Encrypted DataEncrypted Output Data

process without decrypting encrypted

data

Encrypted Output Data

Output Data

Decryption

Impossible to hide secret

Information processing without revealing secret

information

Impossible to process

Output Data

Private Information Processing3-2.

Private Information processing (PIP) is a computing paradigm, which can process without decrypting encrypted data

Output Data (not secret)

Page 14: Knowledge Emergence Infrastructure by Convergence of Real … · 2017. 4. 24. · Data processing/structuring technology based on the real business data characteristics Continuous

13© Hitachi, Ltd. 2009. All rights reserved.

Expectation for remote biometricsExpansion of the network societyNeeds for rigorous and convenient user authentication over networksMaturity of biometric technologies (e.g. fingerprint, vein, iris, face, etc...)

Issues of remote biometricsBiometric features are

- Unchangeable / Irrevocable- Personal / sensitive information

Centralized control of templates- Risk of mass leakage- Internal fraud

Privacy issues- User’s anxiety about giving his/her biometric information to the remote server

Service ProviderUser

Match

OK/NG

Authentication Server

Sensor /Feature

extraction

Client TemplateDB

Practical Example: Cancelable Biometrics

Necessity of strict protection of biometric templates

Remote biometric authentication systemRemote biometric authentication system

3-3.

Page 15: Knowledge Emergence Infrastructure by Convergence of Real … · 2017. 4. 24. · Data processing/structuring technology based on the real business data characteristics Continuous

14© Hitachi, Ltd. 2009. All rights reserved.

Cancelable Biometrics: Overview

Cancelable biometricsThe biometric authentication scheme with template protection- in which biometric features are encrypted, and matched without decryption

Features(1) Privacy protection:

The server can perform the authentication process without knowing the biometric features(2) High security:

It is impossible to reuse leaked templates for impersonation.(3) Cancelable:

Even if the biometric templates are leaked, they can be canceled by re-encryption.

MatchMatch

OK/NG

CancelableTemplate

Authentication ServerClient

Sensor/Feature

Extraction

Sensor/Feature

Extraction

Encryption(CancelableTransform)

Encryption(CancelableTransform)

Parameter

Authentication

Enroll

Matchingwithout decryption

BiometricFeature

3-3.

Page 16: Knowledge Emergence Infrastructure by Convergence of Real … · 2017. 4. 24. · Data processing/structuring technology based on the real business data characteristics Continuous

© Hitachi, Ltd. 2009. All rights reserved. 15

General Approach: Server-aided Computation

A PIP model using “homomorphic encryption”

Disclose keywords closely related to secret to service provider

【Example: patent search】

Patent DB

Admin

Integrated hexacene !?

P2009-123456

【organic TFT】【hexacene 】

Is there any patent that infringe our new product?

Keywords

Patent DBfor PIP

Admin

Gibberish …

5c7d12789b11b8bd

P2009-123456

【91c870f5】【79adbca5】

Encrypted keywords

?decryption

Search database of clear text with encrypted keywords. Server administrator can not know any information from search process.

Traditional

Server-aided Computation

15

homomorphic encryption

f(x+y)=f(x)+f(y)

3-4.

Page 17: Knowledge Emergence Infrastructure by Convergence of Real … · 2017. 4. 24. · Data processing/structuring technology based on the real business data characteristics Continuous

16© Hitachi, Ltd. 2009. All rights reserved.

AnonymizationPlatform

Anonymization for Personal Data

small

large Impact of leakage=

Identifiability

×sensitivity

Hiding ONLY leakage between person and information enable go together safety and usability of personal data

Shipment

Stock Management

Accounting

Customer Analysis

nameaddr

itemjobarea

addr

item

ID Management &Field Isolation

K-anonymizaiton

RID: Real ID, PID: Pseudonymous ID

name

addr

job

sex

ageitem

e-mailpurchase date

Customer DB

RIDname

itemApplications

Control disclosed ID and DB fields

Control detail of field value

Control personal ID, DB field, detail of field value according to identification risk of personal data and property of applications

PID1

PID2

PID3

Basic fieldsSensitive fields

3-5.

Page 18: Knowledge Emergence Infrastructure by Convergence of Real … · 2017. 4. 24. · Data processing/structuring technology based on the real business data characteristics Continuous

17© Hitachi, Ltd. 2009. All rights reserved.

Anonymization: K-anonymization

Exclude identification risk in personal data with minimum information loss

Satisfy k-anonymity

Not satisfy k-anonymity if it is used with safe cells

Safety

Un-Safety

Personal Data

Identification RiskEvaluation

Anonymization

NoOsakaF25Chiba

Tokyo

Akita

HOME TOWN

No

Yes

MARRIAGE

M30Saitama

M30Tokyo

SEXAGEADDR

•Safety cells•Un-safety cells

NoOsakaF25Chiba

Tokyo

Akita

HOME TOWN

No

Yes

MARRIAGE

M30Saitama

M30Tokyo

SEXAGEADDR

Outsourcing of customer

analysis

Generalize un-safety field

values

Generalize un-safety field

values

3-5.

Page 19: Knowledge Emergence Infrastructure by Convergence of Real … · 2017. 4. 24. · Data processing/structuring technology based on the real business data characteristics Continuous

18© Hitachi, Ltd. 2009. All rights reserved.

Directions of Future Works

Research for common technology for any applicationsFully homomorphic encryption settles arbitrary transactionTremendously slow; 1012+ timesChallenge: boost its performance to the practical level

ciphertext

Research for application specific technologyAuthentication services: cancellable biometricsPatent search: PIR based on traditional homomorphic encryptionCustomer analysis: k-anonymization

ciphertextdecryption plaintext

plaintextdecryption ciphertext=

usualdecryption

“encrypted”decryption

Fully homomorphic encryption is based on “encrypted” decryption

3-6.

Page 20: Knowledge Emergence Infrastructure by Convergence of Real … · 2017. 4. 24. · Data processing/structuring technology based on the real business data characteristics Continuous

19© Hitachi, Ltd. 2009. All rights reserved.

Conclusions

Real World DataIntelligent Information Processing ×

KaaS: Knowledge as a Service

Social Innovation for Sustainable Society

CommunicationFinance

IT

Energy TrafficEnvironment

4.