Can We Secure the Internet? Prof. Eric A. Brewer UC Berkeley Berkeley in Silicon Valley March 1,...

22
Can We Secure the Internet? Prof. Eric A. Brewer UC Berkeley Berkeley in Silicon Valley March 1, 2003

Transcript of Can We Secure the Internet? Prof. Eric A. Brewer UC Berkeley Berkeley in Silicon Valley March 1,...

Page 1: Can We Secure the Internet? Prof. Eric A. Brewer UC Berkeley Berkeley in Silicon Valley March 1, 2003.

Can We Secure the Internet?

Prof. Eric A. BrewerUC Berkeley

Berkeley in Silicon ValleyMarch 1, 2003

Page 2: Can We Secure the Internet? Prof. Eric A. Brewer UC Berkeley Berkeley in Silicon Valley March 1, 2003.

Can we reduce the motivation for attack?

Prof. Eric A. BrewerUC Berkeley

Berkeley in Silicon ValleyMarch 1, 2003

Page 3: Can We Secure the Internet? Prof. Eric A. Brewer UC Berkeley Berkeley in Silicon Valley March 1, 2003.

Adlai Stevenson, July 1965

We travel together, passengers on a little space ship … all committed for our safety to its security and peace;

We cannot maintain it half fortunate, half miserable, half confident, half despairing, half slave … half free in a liberation of resources undreamed of until this day. No craft, no crew can travel with such vast contradictions. On their resolution depends the survival of us all.

Page 4: Can We Secure the Internet? Prof. Eric A. Brewer UC Berkeley Berkeley in Silicon Valley March 1, 2003.

Hypothesis 1Current IT projects “trickle down” first-

world technology: Too expensive Assumes infrastructure, power Assumes IT knowledge and support Assumes literacy

We can directly attack these issues

Page 5: Can We Secure the Internet? Prof. Eric A. Brewer UC Berkeley Berkeley in Silicon Valley March 1, 2003.

Hypothesis 2Thousands of IT projects, but

Focus on devices not infrastructure No single project can afford to build

infrastructure, but all of them would benefit.We can enable low-cost infrastructure

Enhance all of the existing projects Enable new projects that were previously

intractable

Page 6: Can We Secure the Internet? Prof. Eric A. Brewer UC Berkeley Berkeley in Silicon Valley March 1, 2003.

Population (in millions)

>$20,000

$2,000–20,000

<$2,000

Purchasing power parity (in U.S. dollars)

There is a market, too…

100

4,000

emerging‘mass’ markets

adjacentmarkets

2,000

source: Harvard Business Review © 2002

Page 7: Can We Secure the Internet? Prof. Eric A. Brewer UC Berkeley Berkeley in Silicon Valley March 1, 2003.

ICT4B

Information and Communication Technology for Billions

Page 8: Can We Secure the Internet? Prof. Eric A. Brewer UC Berkeley Berkeley in Silicon Valley March 1, 2003.

Big PictureEnhance and enable IT projects:

Novel technology (direct attack) Novel deployment/support Support for semi- and illiterate users

Two real-world deployments (validate)Great partners

Page 9: Can We Secure the Internet? Prof. Eric A. Brewer UC Berkeley Berkeley in Silicon Valley March 1, 2003.

Novel TechnologyDevice cost: 10-100 times reduction Infrastructure cost: 10-100 times

reductionDevice power: 10-100 times lowerSpeech recognition for obscure

languages and dialects

Page 10: Can We Secure the Internet? Prof. Eric A. Brewer UC Berkeley Berkeley in Silicon Valley March 1, 2003.

Three Layer Architecture Devices

1-70 users each, $1-10 Short range wireless

Proxies (basestations) 100-1000 users, $200 , < $1/user Mixed wired, wireless, satellite Transient storage

Data Centers >1M users, < $0.10 / user Full power, networking, persistent storage

Page 11: Can We Secure the Internet? Prof. Eric A. Brewer UC Berkeley Berkeley in Silicon Valley March 1, 2003.

Devices Co-Design Devices/Infrastructure

=> 20-40x lower cost Enables more functionality Storage, processing, human analysis Longer battery life

Novel low-cost flexible displays 10-50x cheaper, more robust Printed using an inkjet process

System on a chip => $1-5 per device Looking at 1mW per device (with radio!)

Page 12: Can We Secure the Internet? Prof. Eric A. Brewer UC Berkeley Berkeley in Silicon Valley March 1, 2003.

Data is in the InfrastructureManage persistent state in the

infrastructureCan lose/rent the deviceEnables social science research (with

privacy)Enables group state

group calendars and news

Page 13: Can We Secure the Internet? Prof. Eric A. Brewer UC Berkeley Berkeley in Silicon Valley March 1, 2003.

Decouple Apps & Devices

Remote reprogramming over the network (authenticated)

Can upgrade/add services without changing the device!

Devices last longerDevices increase in usefulnessEnables flexibility and research

Page 14: Can We Secure the Internet? Prof. Eric A. Brewer UC Berkeley Berkeley in Silicon Valley March 1, 2003.

Low-cost InfrastructureGoal: 10-100 lower costKey idea: intermittent networking

Most apps do not need real-time continuous communication

Asynchronous is 10-100 times cheaperFeel: some spots are interactive, most

are more like e-mailNovel protocols, app support

Page 15: Can We Secure the Internet? Prof. Eric A. Brewer UC Berkeley Berkeley in Silicon Valley March 1, 2003.

Novel Deployment & SupportMicro-franchise model for long term

Grameen PhoneRemote management for most thingsSelf-contained wireless proxies with ad

hoc networkingNo keyboard, monitor, etc. on proxies.Data Centers are widely shared

Page 16: Can We Secure the Internet? Prof. Eric A. Brewer UC Berkeley Berkeley in Silicon Valley March 1, 2003.

Grameen Phone Lady Micro-franchisee Usually with a micro-

loan ($200) Buy and manages the

cell phone Rents it out to her

village (10-70 users) Income goes up 2-3x

Pays back loan (98% !)

Page 17: Can We Secure the Internet? Prof. Eric A. Brewer UC Berkeley Berkeley in Silicon Valley March 1, 2003.

Grameen Phone Lady Micro-franchisee Usually with a micro-

loan ($200) Buy and manages the

cell phone Rents it out to her

village (10-70 users) Income goes up 2-3x

Pays back loan (98% !)Uganda

Page 18: Can We Secure the Internet? Prof. Eric A. Brewer UC Berkeley Berkeley in Silicon Valley March 1, 2003.

Literacy Novel speech recognition:

Easy to train Speaker independent Any language or dialect Small vocabulary (order 100 words)

A non-IT person can train the speech for her dialect

Also speech output (canned) May do recognition on the device, or on proxy

Page 19: Can We Secure the Internet? Prof. Eric A. Brewer UC Berkeley Berkeley in Silicon Valley March 1, 2003.

Real DeploymentsFirst one is in India (2005-6)

IIT Delhi, HP Labs India

Second outside of Asia (2006-7) Probably Africa, Mexico or US

Page 20: Can We Secure the Internet? Prof. Eric A. Brewer UC Berkeley Berkeley in Silicon Valley March 1, 2003.

Five Application Areas Commerce Health Education Government Location-based services

Team includes social scientists: Stephen Weber, Isha Ray

Page 21: Can We Secure the Internet? Prof. Eric A. Brewer UC Berkeley Berkeley in Silicon Valley March 1, 2003.

Great Partners HP Intel Grameen Bank UNDP Markle IIT Delhi

More welcome!!!

Page 22: Can We Secure the Internet? Prof. Eric A. Brewer UC Berkeley Berkeley in Silicon Valley March 1, 2003.

SummaryNew approach for IT in developing

regionsNovel technology, infrastructure “direct attack” on the key challengesReal deploymentsEnable and enhance 1000s of projects

worldwideLong term: development over defense