ubiquitous computing security - eth z · sap agsap ag 20012001, title of , corporate...

8
Ubiquitous Computing Security [email protected] SAP Corporate Research, CEC Karlsruhe

Upload: donhi

Post on 15-Jul-2019

216 views

Category:

Documents


0 download

TRANSCRIPT

Ubiquitous ComputingSecurity

[email protected]

SAP Corporate Research,CEC Karlsruhe

SAP AG 2001, Title of Presentation, Speaker Name 2 SAP AG 2001, Corporate Research, Joachim Posegga 2

n Privacy (confidentiality)

n Authentication

n Integrity

n Non-repudiation

Why Security ?

Security is PAIN...

(No Pain, no Gain…)

Security is Needed for...

Privacy Reasons:n People want to hide certain (culturally specific) things

Economic Reasons:n People (and enterprises) want to protect their property

SAP AG 2001, Title of Presentation, Speaker Name 3 SAP AG 2001, Corporate Research, Joachim Posegga 3

3

Pervasive e-commerce

Business to Business(e.g. machine-to-machine transactions)The next wave…

2Business to EmployeeB2E Transactions are low in volume, but transaction cost is less of an issue.

1Business to ConsumerB2C Transactions are high in volume, but very cost sensitive.

EnablingTechnology

SAP AG 2001, Title of Presentation, Speaker Name 4 SAP AG 2001, Corporate Research, Joachim Posegga 4

Mobile Security

Mobile Security Specifics:n Dynamic connections over multiple access

networks (partly untrusted)n Restrictions in communication protocols

(bandwidth, latency,…)n Restrictions in devices (power, performance)

...

Flexibility

State of affairs:n Client-side technology is still very immature

n Security management of wirless networksand devices is inherantly complicated

n But: Enterprise borders dissapear, protection against intruders, espionage,... is a must

SAP AG 2001, Title of Presentation, Speaker Name 5 SAP AG 2001, Corporate Research, Joachim Posegga 5

Grown System Landscape

Manage Sustainability - Reduce Complexity

Portal

Exchange

ExecutionSystems

SAP AG 2001, Title of Presentation, Speaker Name 6 SAP AG 2001, Corporate Research, Joachim Posegga 6

Manage Sustainability - Reduce Complexity

Grown System Landscape

Portal

Exchange

ExecutionSystems

Security?

SAP AG 2001, Title of Presentation, Speaker Name 7 SAP AG 2001, Corporate Research, Joachim Posegga 7

Ubiquitous Computing Security

There is no such thing as Ubiquitous ComputingSecurity per se.

Since...n digital artefacts

n tags/labels/sensors

n “Things that Think”, etc.

…do not have any security requirements.

Security comes in iff something is carried out on behalf of a someone

Thesis: Ubiquitous Computing Security is a StoryAbout Applications and Users of Applications

SAP AG 2001, Title of Presentation, Speaker Name 8 SAP AG 2001, Corporate Research, Joachim Posegga 8

Security for Ubiquitous Computing...

Security is today largely centered around networks and devices

Ubiquitous computing needs application-oriented security: it matters what you do, not how or where you do it

Resarch Questions:

Security primitives matching the specifics of UbiComp

Security Management at large

Transfer of Credentials/Policies/... to UbiComp devices

„Spontaneous Security Federations“: minimizing the burden for users (e.g. expressing and reasoning about policies)

„Macro-security“ vs. Micro-insecurity

How does a „UbiComp Identity Module“ and a Security Infrastructure look like?

UbiComp simply won‘t happen without security....