The infinite Security of Clouds (Madeira Networks 2014 Keynote)
39
-
Upload
peter-cochrane -
Category
Technology
-
view
558 -
download
0
description
It is estimated that the internet consumes ~3% of global energy production, which is slated to grow exponentially if we expand to >>50bn things on line. Thiis is clearly unsustainable! So, how will Clouds help? Here are a few examples beyond thinner clients: Suppose we are using a personal cloud and I send you a file or message. Why traverse distant internet nodes when completion can be entirely local? And suppose a stream of vehicles/cars need a traffic and route information updates; why use a central network when the data can hop car to car along the freeway? Of course these examples extend to seagoing containers, medical instrumentation and football crowds in a stadium et al. Spontaneous Local Clouds, or ‘Networks Without Infrastructure’ use far less energy during set-up, connection, and the transmission of data over very short distances. But, the number of static (low power) hubs and nodes also have to increase to satisfy projected bandwidth demands. Current 3 and 4G networks only carry ~3% of the total internet traffic in some countries and the projected global trend is clearly against mobile operators who can expect to be increasingly sidelined by WiFi. Things on Line will most likely embody increased degrees of intelligence and protocol capabilities that can further minimise the energy used per Byte transported. So the likelihood of more localised traffic physically restricted by the bounds of working groups connected by BlueTooth and/or WiFi bodes well for improved security. To intercept any communication an attacker will have to assume a position of physical proximity that makes them far more likely to be visible. Also, with increased mobility they also need more a-priori knowledge in order to locate to a suitable position (time and place) to facilitate interception. We should also add to this picture an increasing number of devices, chip sets, configs, operating systems, applications and operating modes. All of these features offer potential and significant improvements to the overall security scenario, whilst the move to Malware and Attack Detection at a device, card, shelf, rack and building level might just see the emergence of (an) auto-immune mechanism(s).