Presentation is loading. Please wait.

Presentation is loading. Please wait.

Trust Security Privacy Dependability (TSPD)

Similar presentations


Presentation on theme: "Trust Security Privacy Dependability (TSPD)"— Presentation transcript:

1 Trust Security Privacy Dependability (TSPD)
Presented on behalf of the TSD WG by Pascal BISSON Thales April 2008 Brussels Belgium

2 A cross-cutting concern
Some evidence At ETP level: by design each and every of our ETPs is addressing the topic to some extent (by design e.g. NESSI TSD WG) At FIA Assembly: by design see FI BLED event preparation see session on TSD at BLED (also emphasize put on Privacy) Issue paper on “Security, Privacy and Trust in the Future Internet” prepared for BLED as a structuring starting point. April 2008 Brussels Belgium

3 TSD WG Cluster of Projects
Integrated Projects MASTER PRIME, PRIMELIFE TAS3 TECOM Specific Targeted Research Projects AVANTSSAR AWISSENET INTERSECTION PICOS PRISM SWIFT WOMBAT Networks of Excellence eCRYPT II Co-ordination Actions FORWARD ThinkTrust April 2008 Brussels Belgium

4 (2) Overarching challenges
creation of a trustworthy and resilient Future Internet as a conglomerate of networks and systems, with built-in security, dependability, privacy and trust Enabling users to understand security, privacy and trust in the Future Internet by providing usable and credible support protecting their data and privacy. Thus enabling them to make informed decisions on the trustworthiness of information, services, social contacts and services Finland SHOK Germany G-lab France April 2008 Brussels Belgium

5 Securing the Future Internet Research Challenges
Managing and protecting the "identity" of billions of networked persons, devices, "things", services and virtual entities connected in the Future Internet; Securing the interactions and interfaces between heterogeneous ICT systems and engineering scalable security policies across the Future Internet; Securing critical infrastructures that are interdependent and controlled through vulnerable networks; Designing scalable, dependable and resilient open systems and composite services; Assessing expected security, dependability and resilience properties at design stage or during dynamic evolution at runtime; Predicting, monitoring and managing dependable behavior, evolution and adaptation to hanging contexts, operating conditions, regulations or practices of use, while guaranteeing service level provision or best trade-off between conflicting factors based on business oriented risk analysis; Security of highly distributed virtual entities and trusted infrastructures based on virtualized communication, computing and storage resources; New crypto schemes both in the core networks, to cope with ever increasing data transfer rates, and at network edges (crypto for tiny networked devices with scarce resources like tiny WSNs, PANs, or other networked "things"); cryptography in the quantum era. Finland SHOK Germany G-lab France April 2008 Brussels Belgium

6 Securing the Future Internet Cross-domain challenges
At the Network level we must address i.e.: new network architectures and communication protocols that incorporate security, user accountability and privacy-protection and that protect identities of "things", services, virtual entities; network security, supervision, management and control; virtualization and secure management of resources. At the software and service level we must work on secure and auditable service platforms and middleware; trustworthy end-to-end services; virtualization and secure management of resources; taking account of application and domain specific needs. Concerning networked media attention must be given to trustworthy content, security in mash-ups, or authentication and secure web browsing. Finland SHOK Germany G-lab France April 2008 Brussels Belgium

7 Protection against emerging threats and vulnerabilities Research Challenges
Continuous and real time assessing and managing the security level of systems, content and services; Early detecting, monitoring and countering attacks, intrusions, new forms of malicious code distribution or any other type of malicious behaviour; understanding and predicting the threat models and their evolutions and proactively developing new protection schemes; Protecting interconnected key infrastructures of modern life; against intrusions, attacks and cascading effects (domino effects) Cross-border, cross-organisational, scalable distributed collaborative security mechanisms, including bio- inspired mechanisms (collective as well as self-organising), self-healing and self-learning protection mechanisms. Finland SHOK Germany G-lab France April 2008 Brussels Belgium

8 Protection against emerging threats and vulnerabilities Cross-domain challenges
At the network level, architectures enabling resilience and self-healing properties, together with network management and control tools for assessing such properties. At the service level, architectures and frameworks enabling event-driven management and service system resilience. At the Internet of Things level, autonomously adapting networked "objects" to vulnerabilities and threats. Finland SHOK Germany G-lab France April 2008 Brussels Belgium

9 Sustaining Privacy and Trust in the Future Internet Society Research Challenges
Understanding and developing privacy-friendly identity management schemes; Rethinking privacy and trust in future ambient environments (incl. networked sensor environments and the Internet of Things): new privacy models and information control paradigms; privacy enhancing technologies; New frameworks and reference architectures integrating fragmented approaches for managing personal information and for data sharing and exchange under users' control; Understanding how trust emerges and evolves, and the related notions of reputation formation, monitoring, evolution and management; Developing novel trustworthy and usable means, including trust services, that take account of the situation and context and help users make informed decisions about which information, services and systems they can trust; Finland SHOK Germany G-lab France April 2008 Brussels Belgium

10 Sustaining Privacy and Trust in the Future Internet Society Cross-domain challenges
Creation of trusted Software and Service infrastructures and trust in dynamic service coalitions. Personal data and privacy protection in Networked Media such as virtual worlds and the 3D Internet. Protection of the personal sphere and privacy in future Internet of Things and ambient environments. Finland SHOK Germany G-lab France April 2008 Brussels Belgium

11 As a complement There are still some key remaining problems (e.g. accountability) FI at the frontier between Digital convergence and Science convergence We need to fully rethink TSPD TSPD should be built in at both architecture and protocol level April 2008 Brussels Belgium

12 TSPD Testing experimental facilities should:
effectively support the research cycle in TSPD area effectively involve additional disciplines in the research conducted help to find out what would be of benefit for the area of TSPD support collection of (legal) requirements and restrictions which may apply (e.g. around Privacy) help to benchmark innovative concepts serve assessment and validation of solutions (e.g. usability aspects of privacy solutions and or independent evaluation/certification & audit) April 2008 Brussels Belgium

13 Proposed Action Plan Shape the JTI accordingly
Use cross-domain challenges as starting points Also define glossary of shared terms Review & extend through cross-collaboration and cross-fertilization using TSPD instruments of each and every ETP E.g. cope with existing standards/regulatory compliance and promote new ones Get agreement on the ones we want to jointly address Shape the JTI accordingly defragmenting research speed-up development and wide-adoption (take-up) of FI April 2008 Brussels Belgium

14 Other Cross Domain Challenges (from IoS)
Scalability enterprise processes, composition, brokering, aggregation, quality openness and semantics Trust Builtin safeguards, visibility of the underyling machine, languages Interoperability data, service, network layer, application layer Pervasive Usability Consistent interfaces across devices, maintenance of state and history Mobility On-the-fly service creation, service discovery, across volatile platforms Alignment of Spheres IT, Telco and Media To be put back into perspectives of other Cross-domain challenges coming from other Sessions .... April 2008 Brussels Belgium


Download ppt "Trust Security Privacy Dependability (TSPD)"

Similar presentations


Ads by Google