Upload
nicholas-mason
View
213
Download
1
Embed Size (px)
Citation preview
Technical Challenges of Privacy, Reliability, and Security
Dr. Marcus Brunner
Head of Standardization, Eco-system Development, and Open Source
Swisscom
Measurability and Provability
• To achieve more secure, privacy aware networks– Rely on competition, which requires a certain level of
measurability– A key business driver is having a competitive advantage
and being able to market it
• Provability of security– A posteriori, I can prove that something happened– A priori, I can “prove” that the quality is on the requested
level
User Experience and Interface
• End-user do not understand anymore what is going on– What happens with my data?– How save are they and to whom I actually have to trust
about handling it correctly?– Whom to trust telco/network, end-system, server/cloud
provider– Worse in case of any type of proxying
• Usability– For an end-user it is very unclear who has access to what
data – What usage rights everybody in the chain has– Most of the time it is unclear to the user whether he is
secure or not
Reliability
• Today it is mainly a game in mobile coverage and per-node reliability
• Is a traditional parameter in an SLA – Challenge to differentiate the reliability for different
product offerings, based on the same platform
• Virtualization and automated control enables networks to build reliability at another layer
– Is this more cost-effective or has better properties– What is the required platform reliability?
Applications to 5G and Virtualization
• Non-SIM/Non-HW ?– Is software-only possible from a security perspective for
network access, service access, fraud prevention, etc.
• Pattern recognition on encrypted packets– What can be said about encrypted traffic
– For some traffic management applications in the network it might be good enough
• Several layers of virtualization and/or abstraction– Nested virtualization technologies are security-wise a
challenge– Specifically, hardware oriented approaches, since
virtualization is abstracting away the hardware
Various
• PKI– CA as single point of failure– Trust in Internet in general
• Next generation crypto– Applicability of new crypto technology– Quantum-proof crypto-algorithms
– Future proof of our security solutions in practice?• Block chain
– Applicability to various use cases possible beyond crypto-money?
• Everything encrypted by browser/application– http 2.0 and proxying– Customer associates security with telco