1 / 31

6 October 2011 Core 4 Secure Applications ‘Instant Knowledge’ Programme Achievements

6 October 2011 Core 4 Secure Applications ‘Instant Knowledge’ Programme Achievements Nigel Jefferies Huawei. Instant Knowledge: Secure Autonomous Business Collaboration. Capture and share tacit knowledge within and across enterprises autonomically dynamically

ringo
Download Presentation

6 October 2011 Core 4 Secure Applications ‘Instant Knowledge’ Programme Achievements

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. 6 October 2011 Core 4 Secure Applications ‘Instant Knowledge’ Programme Achievements Nigel Jefferies Huawei

  2. Instant Knowledge: Secure Autonomous Business Collaboration • Capture and share • tacit knowledge • within and across enterprises • autonomically • dynamically • guaranteeing privacy and • respecting security policies

  3. Instant Knowledge: Secure Autonomous Business Collaboration • Capture and share • tacit knowledge • within and across enterprises • autonomically • dynamically • guaranteeing privacy and • respecting security policies • In summary – “Find an Expert”

  4. Phone as a Social Sensor

  5. Pictorially…

  6. A history lesson… Doesn’t work Lethargy Ignorance Timeliness Effortless Autonomic Timely

  7. Research Areas • Establishing User Requirements and Behaviour • Autonomous Interpersonal Networking • Pro-active Distributed Recommender System • Secure Policy-Based Information Access • Privacy-Enhancing Sharing Protocols

  8. Building a toolbox • Context recording • Device, application, user • Autonomous social network creation • Who knows who • Profile generators • Analysis of user skillset based on output • Recommender • Pointers to relevant individuals based on context, relationship and task • UI recording and analysis • Privacy tools • Centralised management system • Distributed system All available as Industry Briefs

  9. Context recording • Phone: number, date/time call started, duration, incoming/outgoing/missed • SMS: number, date/time sent, length, incoming/outgoing • Proximity: device MAC, device name, Bluetooth class • WiFi: SSID, BSSID, IP address, data rate • Cell ID: cell ID, location area code • Application/sub-activity • Battery state, charger plugged in or not • Touch screen, hardware keys, virtual keys • Headphones • Orientation change (portrait or landscape) • GPS usage

  10. Generators Web Browser REST Rails Server REST Client Clue Database N810 Context Manager Context Database Context recording

  11. Autonomous social network creation • Recording and measuring ties between users • Sample implementation • IK GUI Client • OpenFire XMPP • Network Visualiser • Graphing and analysis tools

  12. Network Viewer

  13. Network Viewer

  14. Network Viewer

  15. Running IK System

  16. Running IK System

  17. Running IK System

  18. Profile extraction • Automatic skills profile generation • Text gathered from application, or from body of documents • Word documents, emails, wi-ki entries, etc • Deployed on Thales’ internal wiki

  19. Pro-Active Distributed Recommender System • The IK system is designed to automatically recommend people based on keywords • We can extract keywords from any application running on the N810 • Two versions of the demonstrator • First takes input from applications such as email running on Nokia N810, sends this to server and receives a list of recommendations • Second uses additional context information and integrated with relational analyser to provide higher quality recommendations

  20. Improving De-centralised Recommenders • Developed probabilistic recommendation algorithms to cope with very sparse data sets • Developed new low-rank approximation method which radically reduces the amount of computation to obtain a recommendation and hides private information on individual preference • Analysed clustering methods for reducing computational complexity of recommenders • Developed new multi-agent algorithm for coalition formation to improve performance of decentralised recommender

  21. UI recording and analysis • Screen capture at 5 frames per second, half resolution • Screen touched: location and pressure • Hardware keys, virtual keys • Orientation change • Can effectively recreate entire user-phone interaction experience • Minimal impact on phone responsiveness & battery life

  22. UI Recording Tool UI Events Screen State Context Clues UI Event Recorder Screen Recorder Context Recorder Events Images Context Observer Playback

  23. N810 implementation - Also available on Android (see video)

  24. Privacy & Security • New ID management systems and protocols allowing varying levels of privacy • Additions to centralised schemes to allow pseudonymity • Hierarchy of systems to provide k-anonymity in distributed systems

  25. IK privacy – centralised solution Identity management (IdM) IK managed Leverage existing enterprise IdM IK Policy Enforcement IK communications Recorded transaction pseudonyms Reversible pseudonymity Unobservability Unlinkability

  26. IK privacy – single sign on service Identity Provider 6. Obtain PDP 7. Decision 5.Evaluate Local policy Enterprise policy IK service SSO 8. Response 3. Logon 4. Query PDP IK user 1. Request access Assertion consumer service 2. SAML query PEP 8. Response IK client IK server (recommender)

  27. IK Privacy – distributed solution Improve robustness against compromise: Rather than a single IK service collecting IK user data, multiple IK services each serve a subset of enterprise IK users Hierarchical IK system, in which a parent IK service aggregates IK context data from a subset of child IK services Recommendations can be requested from both the local IK service and top level IK service Provides an upgrade path from a centralised system: Each IK service can use the same recommender algorithms The height of the hierarchy determines the strength of anonymity achieved Scalable

  28. IK Privacy – distributed solution IK service IK service IK service IK service IK service ID provider ID provider ID provider ID provider ID provider ID provider ID provider IK service IK service IK service IK service IK service IK service IK service

  29. Conclusions • Novel components in six key areas: • Context recording • Autonomous social network creation • Profile generators • Recommender • UI recording and analysis • Privacy tools • What applications can you create?

More Related