60 likes | 72 Views
Technical Challenges of Privacy, Reliability, and Security. Dr. Marcus Brunner Head of Standardization, Eco-system D evelopment, and Open Source Swisscom m arcus.brunner@swisscom.com. Measurability and Provability. To achieve more secure, privacy aware networks
E N D
Technical Challenges of Privacy, Reliability, and Security Dr. Marcus Brunner Head of Standardization, Eco-system Development, and Open Source Swisscom marcus.brunner@swisscom.com
Measurability and Provability • To achieve more secure, privacy aware networks • Rely on competition, which requires a certain level of measurability • A key business driver is having a competitive advantage and being able to market it • Provability of security • A posteriori, I can prove that something happened • A priori, I can “prove” that the quality is on the requested level
User Experience and Interface • End-user do not understand anymore what is going on • What happens with my data? • How save are they and to whom I actually have to trust about handling it correctly? • Whom to trust telco/network, end-system, server/cloud provider • Worse in case of any type of proxying • Usability • For an end-user it is very unclear who has access to what data • What usage rights everybody in the chain has • Most of the time it is unclear to the user whether he is secure or not
Reliability • Today it is mainly a game in mobile coverage and per-node reliability • Is a traditional parameter in an SLA • Challenge to differentiate the reliability for different product offerings, based on the same platform • Virtualization and automated control enables networks to build reliability at another layer • Is this more cost-effective or has better properties • What is the required platform reliability?
Applications to 5G and Virtualization • Non-SIM/Non-HW ? • Is software-only possible from a security perspective for network access, service access, fraud prevention, etc. • Pattern recognition on encrypted packets • What can be said about encrypted traffic • For some traffic management applications in the network it might be good enough • Several layers of virtualization and/or abstraction • Nested virtualization technologies are security-wise a challenge • Specifically, hardware oriented approaches, since virtualization is abstracting away the hardware
Various • PKI • CA as single point of failure • Trust in Internet in general • Next generation crypto • Applicability of new crypto technology • Quantum-proof crypto-algorithms • Future proof of our security solutions in practice? • Block chain • Applicability to various use cases possible beyond crypto-money? • Everything encrypted by browser/application • http 2.0 and proxying • Customer associates security with telco