How to return control over user data back to the user The rethink framework

Similar documents
rethink: A DISRUPTIVE COMMUNICATION INFRASTRUCTURE FOR SMART CITIES Fuseco Forum ; Berlin ; Joachim Schonowski T-Labs

WebRTC Gateway. Real-time communications in all browsers

rethink framework evaluation through application development

IMS, NFV and Cloud-based Services BUILDING INTEGRATED CLOUD COMMUNICATION SERVICES

Pasquale Vitale Engineering Ingegneria Informatica. FIWARE Technology

Competing with OTT Services: RCS e without IMS. November 15, 2011

Introducing COI: Chat over IMAP Modern Messaging over

Richard Curran :Security Officer EMEA. Mario Romao : Senior Manager Policy, Intel

Security Enhancements

Cross-Operator Identity Services. 13. January 2012, Telekom Innovation Laboratories

GÉANT Community Programme

Deliverable D3.5 Harmonised e-authentication architecture in collaboration with STORK platform (M40) ATTPS. Achieving The Trust Paradigm Shift

Future X Network. Sanjay Kamat Managing Partner, Bell Labs Consulting Nokia

WIT WebRTC Gateway. Real-time communications in all browsers. webrtc.wit-software.com

5 OAuth EssEntiAls for APi AccEss control layer7.com

Huawei CaaS Monetize Your Network Capabilities

Hello everyone. My name is Kundan Singh and today I will describe a project we did at Avaya Labs.

NFV Infrastructure for Media Data Center Applications

API s in a hybrid world. Date 28 September 2017

Launch Smart Products With End-to-End Solutions You & Your Customers Can Trust

Alepo, an expert in carrier-class WiFi, offers solutions to bring WiFi calling to the market, regardless of existing network type or business model.

Syed Ismail Shah, PhD Chairman, PTA,

Session 3 - OTT and its multi faceted impacts

Digital transformation in the Networked Society. Milena Matic Strategy, Marketing & Communications June 2016

Viber Service Messaging

IP Video better than broadcast

Ido Sarig, General Manager, IOT Solutions Group DELIVERING END-TO-END INTELLIGENCE FOR THE INTERNET OF THINGS

Five9 Plus Adapter for Agent Desktop Toolkit

Standards for V2X Communication and Implications for OEMs and ITS

5G NextGen Network InterDigital, Inc. All rights Reserved.

Transforming the way people watch TV

Vortex Whitepaper. Simplifying Real-time Information Integration in Industrial Internet of Things (IIoT) Control Systems

Orange Smart Cities. Smart Metering and Smart Grid : how can a telecom operator contribute? November

2.- Adapt SIP protocol to Internet of the future

Helix Nebula The Science Cloud

Creating a Single Messaging Cloud

A SMART PORT CITY IN THE INTERNET OF EVERYTHING (IOE) ERA VERNON THAVER, CTO, CISCO SYSTEMS SOUTH AFRICA

Dr Chris Ettmayr. ICT & Renewable Energy Specialist: ELIDZ. Name and surname. Title of presentation

IoT privacy risk management in ANASTACIA project

Distributing LIXI Data as a Newscast"

A Universal Micro-Server Ecosystem Exceeding the Energy and Performance Scaling Boundaries

Carrier APIs do they offer more or less than 3rd parties?

Overview. Premium Data Sheet. DigitalPersona. DigitalPersona s Composite Authentication transforms the way IT

Security Guide Zoom Video Communications Inc.

Web & Automotive. Paris, April Dave Raggett

Cyber-Physical Chain (CPChain) Light Paper

RCS THE GLOBAL PERSPECTIVE DAVID O BYRNE, PROGRAMME DIRECTOR - GSMA

Liferay Security Features Overview. How Liferay Approaches Security

The Digital Operator How do operators transform to a full Service Strategy

Mobilink-Network Partial List of Partners

Global Identity and Reachability Framework for Interoperable P2P Communication Services

Cloud Computing Private Cloud

API, DEVOPS & MICROSERVICES

RCS OVERVIEW. Fábio Moraes GSMA October 2018 Future Networks Programme

Delivering on Cloud Transformation Infinite Solutions update. Presenter: Adam Davies, January 20 th, 2016

USING DEVICE LIFECYCLE MANAGEMENT TO FUTURE PROOF YOUR IOT DEPLOYMENT

A guide to social messaging for mobile operators

Internet and Next-Generation Networks: shaping new models. Umberto de Julio Italtel

ENTERPRISE MOBILITY TRENDS

OATH : An Initiative for Open AuTHentication

November 2017 WebRTC for Live Media and Broadcast Second screen and CDN traffic optimization. Author: Jesús Oliva Founder & Media Lead Architect

Network Functions Virtualization - Everything Old Is New Again

Data Security: Public Contracts and the Cloud

Toyokazu Akiyama Kyoto Sangyo University

Version 11

Media Service - Is This Where the Money Is? Dean Bubley Disruptive Analysis

FlexLogIC Manufacturing innovation by PragmatIC

5 OAuth Essentials for API Access Control

SmartSantander. Dr srđan KrČo

Government IT Modernization and the Adoption of Hybrid Cloud

HOW TO ENABLE AFFORDABLE ENTERPRISE VIDEO FOR EVERYONE

AWS IoT Overview. July 2016 Thomas Jones, Partner Solutions Architect

N a t i o n a l I C T R & D a n d I n n o v a t i o n R o a d m a p

ITU/BDT Regional Economic and Financial Forum of Telecommun ications/i CTs for Asia and Pacific. Impact of Internet and OTT on Services

The challenges of (non-)openness:

Making hybrid IT simple with Capgemini and Microsoft Azure Stack

Research Infrastructures and Horizon 2020

Authentication in the Cloud. Stefan Seelmann

Docker CaaS. Sandor Klein VP EMEA

The Evolution from 4G to 5G. Smart steps for a successful network migration.

Thinking cities. Khalil Laaboudi. Smart & Sustainable Cities. Global Marketing

Case Study- Real Time Response How Video Is Changing EMS. Eyal Elyashiv Chief Operating Officer Carbyne Homeland Security Ltd.

User-Managed Access (UMA)

New Digital Business Models Driving the Softwarization of the Network

BEYOND AUTHENTICATION IDENTITY AND ACCESS MANAGEMENT FOR THE MODERN ENTERPRISE

Legacy Voice vs. OTT Voice

February 21, pm ET

CHARTING THE FUTURE OF SOFTWARE DEFINED NETWORKING

Leveraging mobile operators asset with enriched services. Philippe Lucas Orange SVP Standards & Ecosystems Development 9 th September 2010

Cloud Going Mainstream All Are Trying, Some Are Benefiting; Few Are Maximizing Value

We are innovating in security

Cloud28+ Compliance in Cross Border Business

Open Digital: The Digital Services Opportunity Explored

Mavenir Keynote. Think Smarter Secure communication Innovate Services. By Mohamed Issa Regional Head of Africa Sales

Dell One Identity Cloud Access Manager 8.0. Overview

ASTRONOMY & PARTICLE PHYSICS CLUSTER

Cloud Going Mainstream All Are Trying, Some Are Benefiting; Few Are Maximizing Value

NKN is a new kind of network connectivity protocol & ecosystem powered by blockchain for an open, decentralized, and shared Internet.

Webinar on 5G funding opportunities for EU-US collaboration in Horizon 2020

OUTPERFORMING THE COMPETITION

Transcription:

How to return control over user data back to the user The rethink framework Anastasius Gavras Eurescom GmbH Online Webinar 21. June 2017 This project has received funding from the European Union s Horizon 2020 research and innovation program under grant agreement No. 645342, project rethink

Motivation Social messaging exceeded traditional SMS traffic in 2012. * SM to cannibalize ~ $54bn of SMS revenues by 2016.** Billions 80,000 70,000 60,000 50,000 40,000 30,000 20,000 10,000 0 2011 2012 2013 2014 SMS Traffic Social Messaging Traffic SMS/sub/ day 2011:3 2016:3 2011 2012 2013 Subscribers 241 million 773 million 1.2 billion Messages per subscriber per day 34 26 63 Operators need to return to future proof direct revenue models for own Communication services, which also hold in case WIFI access is used. ** OTT players as highly disruptive forces, intent to transform into rich media platforms.** Carriers are still demonstrating appealing tardiness at offering any compelling bundle of text, voice and video messaging alternatives.* WhatsApp new daily record (02 April 14): 20B messages sent and 44B messages received in just 24 hours! *Ovum: Counteracting the Social Messaging Threat, July 2012,, Informa: OTT messaging: Traffic will be twice the size of P2P SMS by end-2013, April 2013 **Current Analysis: OTT Messaging Apps Gain a Monetization Foothold And It Goes Way Beyond Chat Dec. 2013

General objective: Cross domain interaction Telcos versus OTT Leverage the Best of Both Worlds Telcos OTT identity identity identity identity comm service platform identity comm service platform service identity service comm service rethink comm service infrastructure infrastructure service infrastructure infrastructure Federated Distribution Model Walled Garden Distribution Model Trusted cooperative service delivery model Unlock current OTT communication silos.

Principle I: From Silos to Hyperties Facebook Hyperty Catalogue(s) Amazon Google Hyperties Device Amazon app Google app Facebook app Amazon Hyperty Device Application Google Hyperty Hyperty Runtime Facebook Hyperty New-stuff Hyperty Silos in the cloud and in the device apps are bound to proprietary clouds not able to mix features from different clouds new features require updates! Cooperative clouds in the device new features installable automatically on-the-fly according to the context

Principle II: Different identities in one service? No problem. This is a core feature! DT Services BITKOM Services Hyperty Catalogue(s) Dropbox Services Munich Services Identity Provider(s) My Browser Hyperties DT Google Facebook Amazon Any... My Workplace - Service loads several Hyperties Identities Hyperties DT-Service Dropbox City of Munich BITKOM Identities Private Hyperty Runtime Work

Principle III: Bring & Manage Your Own Identity Contexts: Private, Business, Hobby, Sports She wants to communicate and switch between roles and identities She chooses her Identity and logs in Applications Services and she can be reached on her active application in the current context

Just call me, you can find my ID Discovery Service Global registry trusted circle Enabled by the hyperty framework Protofly is the universal plug

The Hyperty concept Hyperty in a nutshell Hyperties are Micro-services that can be deployed just in time Forming complex services or applications Reusable building blocks

Data model agreements lead to interoperability Hyperty and Hyperty runtime Hyperties are protocol agnostic incorporating an agreed data model running in an execution environment inherently interoperable Common data models are the only agreement needed for inherent interoperability

Disruptive communication model The technical side

Basic Procedures Alice Service Provider Catalogue Hyperty Instances Registry H1 P1 Msg Node Runtime UA Alice Device Msg BUS P1 Protostub Sandbox Runtime Registry H1 Hyperty Sandbox WebRTC Engine

Basic Procedures Bob Service Provider H2 Catalog P2 Alice Service Provider Msg Node Msg Node Runtime UA P2 Protostub Sandbox Alice Device Msg BUS P1 Protostub Sandbox H1 Hyperty Sandbox WebRTC Engine

Basic Procedures Bob Service Provider Msg Node Alice Service Provider Msg Node Bob Device P2 Protostub Sandbox P2 Protostub Sandbox Alice Device P1 Protostub Sandbox Msg BUS Msg BUS H2 Hyperty Sandbox WebRTC Engine H1 Hyperty Sandbox WebRTC Engine Media Stream

Protocol on-the-fly Protofly Protocol on-the-fly leverages the code on-demand support by Web runtimes (e.g. Javascript) The most appropriate protocol stack is dynamically selected loaded and instantiate during run-time Protostub Protostub

Trust Model Identity tokens are generated, inserted in intercepted Messages sent by Hyperties, and validated by recipient Hyperty Runtimes before delivered to the target Identity. Identity management procedures are performed according to applicable policies managed by the end-user. 1-Intercept Outgoing Message 3-Msg with Assertion 2-Generate Assertion 5-Validate Assertion 4-Intercept Incoming Message 6-Message with Assertion Validated

Identity support services: big picture Catalogue CSP Identity Provider Global Registry Domain Registry Policy Engine Trust Engine Id Module Runtime Registry Hyp instance 1 Policy Engine Discovery Service Graph Connector Hyp instance 2 Runtime

Alice calls Bob Alice s CSP Call Offer + IdAssertion Bob s CSP IdModule IdAssertion Auth Alice s IdP Alice s CSP Call Answer + IdAssertion Bob s CSP evaluate trustworthiness IdModule Trust Engine Alice s IdP check IdAssertion

Endpoint Discovery

Example in smart city context Core elements and homepage of Smarter Together Contextual social communication & participation Enable cross domain interaction in decentralized networks via the new Hyperty concept Bring & Manage Your Own Identity Trust & privacy mechanisms by design Use of social graphs for implied trust Discovery mechanism of humans and objects Facilitate human and IoT to form hybrid communication Non private data related business models to avoid the naked user Smart City as contextual domain

rethink Partners rethink project contributes to the sub call ICT-05-2014 of H2020-ICT-2014 Smart Networks and novel Internet Architectures started in 2015 June 2017 This project has received funding from the European Union s Horizon 2020 research and innovation program under grant agreement No. 645342, project rethink

More information https://rethink-project.eu https://www.youtube.com/channel/uc4xtkj2zvhuyjosa_fleahg Demonstrations https://hysmart.rethink.ptinovacao.pt/) Available Hyperties (https://github.com/rethink-project/dev-hyperty) Quick start to develop Hyperties (https://github.com/rethink-project/dev-hyperty-toolkit) Quick start to develop Applications with Hyperties (https://github.com/rethink-project/dev-app) Tutorials (https://github.com/rethink-project/specs/blob/master/tutorials/readme.md) Complete Specifications (https://github.com/rethink-project/specs)