Future Safe Havens. Jon Crowcroft,

Similar documents
What are Information Systems?

Data Protection: Your Choice Is Simple PARTNER LOGO

1 Enterprise Modeler

Learning to Shoot a Goal Lecture 8: Learning Models and Skills

Implementing Consistency -- Paxos. Some slides from Michael Freedman

n Explore virtualization concepts n Become familiar with cloud concepts

Guide to Applying Online

JavaFX. JavaFX 2.2 Installation Guide Release 2.2 E August 2012 Installation instructions by operating system for JavaFX 2.

n Learn how resiliency strategies reduce risk n Discover automation strategies to reduce risk

prerequisites: 6.046, 6.041/2, ability to do proofs Randomized algorithms: make random choices during run. Main benefits:

Air Force Data Reference Architecture and Platform

Strengthening Privacy Protection with the European General Data Protection Regulation

Service Oriented Enterprise Architecture and Service Oriented Enterprise

Τεχνολογία Λογισμικού

Administrative UNSUPERVISED LEARNING. Unsupervised learning. Supervised learning 11/25/13. Final project. No office hours today

CS 683: Advanced Design and Analysis of Algorithms

Politecnico di Milano Advanced Network Technologies Laboratory. Internet of Things. Projects

CA Top Secret r14 for z/os

CMSC Computer Architecture Lecture 10: Caches. Prof. Yanjing Li University of Chicago

Data Warehousing. Paper

Announcements. Reading. Project #4 is on the web. Homework #1. Midterm #2. Chapter 4 ( ) Note policy about project #3 missing components

Weston Anniversary Fund

9.1. Sequences and Series. Sequences. What you should learn. Why you should learn it. Definition of Sequence

Review: The ACID properties

An Improved Shuffled Frog-Leaping Algorithm for Knapsack Problem

Goals of the Lecture UML Implementation Diagrams

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe

Numerical Methods Lecture 6 - Curve Fitting Techniques

Instruction and Data Streams

Ch 9.3 Geometric Sequences and Series Lessons

DCMIX: Generating Mixed Workloads for the Cloud Data Center

Morgan Kaufmann Publishers 26 February, COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 5

Global Support Guide. Verizon WIreless. For the BlackBerry 8830 World Edition Smartphone and the Motorola Z6c

Message Integrity and Hash Functions. TELE3119: Week4

Master Informatics Eng. 2017/18. A.J.Proença. Memory Hierarchy. (most slides are borrowed) AJProença, Advanced Architectures, MiEI, UMinho, 2017/18 1

Operating System Concepts. Operating System Concepts

Architectural styles for software systems The client-server style

Assignment 5; Due Friday, February 10

Bike MS: 2013 Participant Center guide

Bike MS: 2014 Participant Center guide

Basic allocator mechanisms The course that gives CMU its Zip! Memory Management II: Dynamic Storage Allocation Mar 6, 2000.

SCAN INSPECT TRACK SOLVE

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe

CA InterTest for CICS r8.5

HAFOD MAKING A COMPLAINT [NEW]_Layout 1 21/03/ :06 Page 1 MAKING A COMPLAINT

Sharing Collections. Share a Collection via . Share a Collection via Google Classroom. Quick Reference Guide

Quality of Service. Spring 2018 CS 438 Staff - University of Illinois 1

CS 111: Program Design I Lecture 16: Module Review, Encodings, Lists

Ones Assignment Method for Solving Traveling Salesman Problem

Chapter 11. Friends, Overloaded Operators, and Arrays in Classes. Copyright 2014 Pearson Addison-Wesley. All rights reserved.

EM375 STATISTICS AND MEASUREMENT UNCERTAINTY LEAST SQUARES LINEAR REGRESSION ANALYSIS

Workflow model GM AR. Gumpy. Dynagump. At a very high level, this is what gump does. We ll be looking at each of the items described here seperately.

Intelligent Systems in Retail. Powered by Windows Embedded

Private Key Cryptography. TELE3119: Week2

OnApp Cloud. The complete platform for cloud service providers. 114 Cores. 286 Cores / 400 Cores

Cluster Analysis. Andrew Kusiak Intelligent Systems Laboratory

Harris Corner Detection Algorithm at Sub-pixel Level and Its Application Yuanfeng Han a, Peijiang Chen b * and Tian Meng c

Multi-Threading. Hyper-, Multi-, and Simultaneous Thread Execution

Perhaps the method will give that for every e > U f() > p - 3/+e There is o o-trivial upper boud for f() ad ot eve f() < Z - e. seems to be kow, where

Design and Implementation of Integrated Testing Tool based on Metrics and Quality Assurance

SECURITY PROOF FOR SHENGBAO WANG S IDENTITY-BASED ENCRYPTION SCHEME

Landscape in the Making

Security of Bluetooth: An overview of Bluetooth Security

Recursion. Recursion. Mathematical induction: example. Recursion. The sum of the first n odd numbers is n 2 : Informal proof: Principle:

Data Structures and Algorithms Part 1.4

Transitioning to BGP

Chapter 4 Threads. Operating Systems: Internals and Design Principles. Ninth Edition By William Stallings

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe

CORD Test Project in Okinawa Open Laboratory

BIKE MS: 2015 PARTICIPANT CENTER GUIDE

The Value of Peering

CMSC Computer Architecture Lecture 11: More Caches. Prof. Yanjing Li University of Chicago

USER GUIDE FOR VENDOR LISTING DATASHEET

MOTIF XF Extension Owner s Manual

Major CSL Write your name and entry no on every sheet of the answer script. Time 2 Hrs Max Marks 70

Pattern Recognition Systems Lab 1 Least Mean Squares

Security Solutions SALES GUIDE. for Connectivity Data Center Applications & Content. Your JUNIPER NETWORKS dedicated Sales Team

The Closest Line to a Data Set in the Plane. David Gurney Southeastern Louisiana University Hammond, Louisiana

Morgan Kaufmann Publishers 26 February, COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 5.

1. SWITCHING FUNDAMENTALS

Threads and Concurrency in Java: Part 1

OnApp Cloud. The complete cloud management platform

Using the Keyboard. Using the Wireless Keyboard. > Using the Keyboard

Threads and Concurrency in Java: Part 1

1&1 Next Level Hosting

Bezier curves. Figure 2 shows cubic Bezier curves for various control points. In a Bezier curve, only

Evaluation of Distributed and Replicated HLR for Location Management in PCS Network

One advantage that SONAR has over any other music-sequencing product I ve worked

WYSE Academic Challenge Sectional Computer Science 2005 SOLUTION SET

BECU, 5 th largest credit union, achieve success with HP-UX 11i v2 and HP Integrity Servers

Python Programming: An Introduction to Computer Science

Descriptive Statistics Summary Lists

GE FUNDAMENTALS OF COMPUTING AND PROGRAMMING UNIT III

Parabolic Path to a Best Best-Fit Line:

Minimum Spanning Trees

Lazy Type Changes in Object-oriented Database. Shan Ming Woo and Barbara Liskov MIT Lab. for Computer Science December 1999

2016 LEARNING SYSTEM FOR CSCP CERTIFICATION EXAM PREPARATION. learncscp.com

Demystifying IaaS Adoption for Enterprise Applications

CSC 220: Computer Organization Unit 11 Basic Computer Organization and Design

Outline. Applications of FFT in Communications. Fundamental FFT Algorithms. FFT Circuit Design Architectures. Conclusions

Transcription:

Future Safe Haves Jo Crowcroft, http://www.cl.cam.ac.uk/~jac22

Private Data Ceter->Public Cloud ATI parters e.g. Farr/NHS Scotlad HSBC Motives for public cloud Scale out/cost save Higher Throughput aalytics Share access with more researchers <Yours goes here>

Ifrastructure Locatio Keep frieds&eemies ear: Legal/Regulatory Stuff (icl GDPR) Latecy/Availability etc Cotrol (physical access etc) Need to virtualise these (better) Crypt Data at rest Crypt data durig processig key maagemet etc Eclave SGX,Trust Zoe, AMD, CHERI

GDPR 2018 right to a explaaio

SGX opportuity Not the oly piece, of course Static/dyamic aalysis etc Uikerels & s/w verificatio Ca use SGX o Cotaier (SCONE) Platform basis, Hadoop, Flik, Spark https://www.microsoft.com/e-us/research/publicatio/vc3-trustworthy-data-aalytics-i-the-cloud Or applicatio basis

MARU.@ turig.ac.uk ATI w/ Itel, Dstl, Docker, Microsoft Hirig:- https://www.turig.ac.uk/jobs/research-associate-maru-project/ Compare what is i SGX Eter/leave cost, crypt memory o/h etc Hypervisor? Compare w/ cotaier o trustzoe, cheri, AMD etc Commo APIs for keys etc Virtualize? Pe test may side chael pb What if weak homomorphic crypto & diff priv?

Public Cloud->Databox (or HAT) Databox (ad hat) take opposite view Re-decetralize Keep aalytics/ml as a service Mix of distributed, priv pres ML+ Hierachy of 3 rd party aggregators, MPC http://www.databoxproject.uk/ HAT reverses directio of value Audit (distributed ledger) Get paid (moey (real or vurt) https://www.hatdex.org/

Cotaier migratio&replica Replicate (to cloud eclave) for recovery (from fail,theft,loss) Migrate (to other persoal cloud) for low latecy Most ew data is apped oly so use distributed ledger (tamper proof logs see datakit i docker) Cosistecy of replicas e.g. use fpaxos

Distributed Aalytics Motives e.g. Move code to data Keep data close to ower/primary user Guaratee ca audit trail access Add yours here Challeges Depeds o ML techology of choice & goal PCA/Clusterig, radom forests Curve fittig (regressio etc) Model Iferecig e.g. Bayesia iferece Distrubuted differetial privacy tricky Hierarchical versus P2P?

Distributed Aalytics Hierarchy easiest Aggregatio poits/servers broker model leared so far Have to be trusted by subset of leaves Leaf ca choose to chage aggregator P2P just extesio of this to dyamic, faster choice Distributed/Parallel ML From data ceters Clusterig o tuples easy If idepedet

Future Proof for GDPR Privacy by Desig ad by Default HAT address all GDPR privacy requiremet from its desig priciple to its security solutio. HAT ecosystem data exchage is based o fully specified privacy terms - time specific, recipiet specific, miimum data poits specific with full itetio disclosed. Violatio agaist ay of such terms may result a ba from the Ecosystem. Coset by desig ad by default - the PCST PoC madates a specific, iformed ad freely give ad uambiguous itesio disclosure of data usage, for every sigle persoal data access istaces. HAT techology esures that a exchage is oly authorised ad kept valid by idividual s case specific coset Rights for Idividuals by desig ad by default ecapsulated persoal data cotaiers isolated for each idividual, allows a idividual is i full cotrol of its HAT, hece iheretly ows all of the followig: Right to Access Right to be iformed Right to rectificatio Right to restrict processig Right to object to market Right of data portability Right to be forgotte Right to object to automated decisio makig ad profilig Accoutability ad goverace - PCST CoP madates every ecosystem member to higher level of accoutability ad goverace practice. Record keepig HAT ecosystem automatically tracks data exchage, eve at a much more graular level tha http://hatdex.org GDPR requires / http:// it documets the exchage parties, time of access, detailed hatcommuity.org data poits, itesio ad T&C, for every sigle11 trasactio.

Thigs we re ot coverig today Database (Farr/ATI work ow) Query plaig w/ privacy K-aoimity Weak homomorphic crypto etc Threat modelig Assumig implicitj Suffice it to say hypervisor vulerabilities exist So eed trusted stuff o utrusted platform o ew trusted stuff

Who Am I?