The infinite Security of Clouds (Madeira Networks 2014 Keynote)

39

description

It is estimated that the internet consumes ~3% of global energy production, which is slated to grow exponentially if we expand to >>50bn things on line. Thiis is clearly unsustainable! So, how will Clouds help? Here are a few examples beyond thinner clients: Suppose we are using a personal cloud and I send you a file or message. Why traverse distant internet nodes when completion can be entirely local? And suppose a stream of vehicles/cars need a traffic and route information updates; why use a central network when the data can hop car to car along the freeway? Of course these examples extend to seagoing containers, medical instrumentation and football crowds in a stadium et al. Spontaneous Local Clouds, or ‘Networks Without Infrastructure’ use far less energy during set-up, connection, and the transmission of data over very short distances. But, the number of static (low power) hubs and nodes also have to increase to satisfy projected bandwidth demands. Current 3 and 4G networks only carry ~3% of the total internet traffic in some countries and the projected global trend is clearly against mobile operators who can expect to be increasingly sidelined by WiFi. Things on Line will most likely embody increased degrees of intelligence and protocol capabilities that can further minimise the energy used per Byte transported. So the likelihood of more localised traffic physically restricted by the bounds of working groups connected by BlueTooth and/or WiFi bodes well for improved security. To intercept any communication an attacker will have to assume a position of physical proximity that makes them far more likely to be visible. Also, with increased mobility they also need more a-priori knowledge in order to locate to a suitable position (time and place) to facilitate interception. We should also add to this picture an increasing number of devices, chip sets, configs, operating systems, applications and operating modes. All of these features offer potential and significant improvements to the overall security scenario, whilst the move to Malware and Attack Detection at a device, card, shelf, rack and building level might just see the emergence of (an) auto-immune mechanism(s).

Transcript of The infinite Security of Clouds (Madeira Networks 2014 Keynote)

Page 1: The infinite Security of Clouds (Madeira Networks 2014 Keynote)
Page 2: The infinite Security of Clouds (Madeira Networks 2014 Keynote)
Page 3: The infinite Security of Clouds (Madeira Networks 2014 Keynote)
Page 4: The infinite Security of Clouds (Madeira Networks 2014 Keynote)
Page 5: The infinite Security of Clouds (Madeira Networks 2014 Keynote)
Page 6: The infinite Security of Clouds (Madeira Networks 2014 Keynote)
Page 7: The infinite Security of Clouds (Madeira Networks 2014 Keynote)
Page 8: The infinite Security of Clouds (Madeira Networks 2014 Keynote)
Page 9: The infinite Security of Clouds (Madeira Networks 2014 Keynote)
Page 10: The infinite Security of Clouds (Madeira Networks 2014 Keynote)
Page 11: The infinite Security of Clouds (Madeira Networks 2014 Keynote)
Page 12: The infinite Security of Clouds (Madeira Networks 2014 Keynote)
Page 13: The infinite Security of Clouds (Madeira Networks 2014 Keynote)
Page 14: The infinite Security of Clouds (Madeira Networks 2014 Keynote)
Page 15: The infinite Security of Clouds (Madeira Networks 2014 Keynote)
Page 16: The infinite Security of Clouds (Madeira Networks 2014 Keynote)
Page 17: The infinite Security of Clouds (Madeira Networks 2014 Keynote)
Page 18: The infinite Security of Clouds (Madeira Networks 2014 Keynote)
Page 19: The infinite Security of Clouds (Madeira Networks 2014 Keynote)
Page 20: The infinite Security of Clouds (Madeira Networks 2014 Keynote)
Page 21: The infinite Security of Clouds (Madeira Networks 2014 Keynote)
Page 22: The infinite Security of Clouds (Madeira Networks 2014 Keynote)
Page 23: The infinite Security of Clouds (Madeira Networks 2014 Keynote)
Page 24: The infinite Security of Clouds (Madeira Networks 2014 Keynote)
Page 25: The infinite Security of Clouds (Madeira Networks 2014 Keynote)
Page 26: The infinite Security of Clouds (Madeira Networks 2014 Keynote)
Page 27: The infinite Security of Clouds (Madeira Networks 2014 Keynote)
Page 28: The infinite Security of Clouds (Madeira Networks 2014 Keynote)
Page 29: The infinite Security of Clouds (Madeira Networks 2014 Keynote)
Page 30: The infinite Security of Clouds (Madeira Networks 2014 Keynote)
Page 31: The infinite Security of Clouds (Madeira Networks 2014 Keynote)
Page 32: The infinite Security of Clouds (Madeira Networks 2014 Keynote)
Page 33: The infinite Security of Clouds (Madeira Networks 2014 Keynote)
Page 34: The infinite Security of Clouds (Madeira Networks 2014 Keynote)
Page 35: The infinite Security of Clouds (Madeira Networks 2014 Keynote)
Page 36: The infinite Security of Clouds (Madeira Networks 2014 Keynote)
Page 37: The infinite Security of Clouds (Madeira Networks 2014 Keynote)
Page 38: The infinite Security of Clouds (Madeira Networks 2014 Keynote)
Page 39: The infinite Security of Clouds (Madeira Networks 2014 Keynote)