23
Ambient Intelligence: Ambient Intelligence: Promise, Price, Social Promise, Price, Social Disruption Disruption A Review of Security and Privacy Strategies in Leading A Review of Security and Privacy Strategies in Leading Economies Economies D. Gritzalis, M. Theoharidou, S. Dritsas, G. Marias D. Gritzalis, M. Theoharidou, S. Dritsas, G. Marias Information Security and Critical Infrastructure Protection Research Group Dept. of Informatics, Athens University of Economics and Business, Greece Safeguards in a World of Ambient Intelligence (SWAMI) Conference European Commission, JRC/IPTS, Brussels, March 2006

Ambient Intelligence: Promise, Price, Social Disruption A Review of Security and Privacy Strategies in Leading Economies D. Gritzalis, M. Theoharidou,

Embed Size (px)

Citation preview

Page 1: Ambient Intelligence: Promise, Price, Social Disruption A Review of Security and Privacy Strategies in Leading Economies D. Gritzalis, M. Theoharidou,

Ambient Intelligence:Ambient Intelligence:Promise, Price, Social DisruptionPromise, Price, Social DisruptionA Review of Security and Privacy Strategies in Leading EconomiesA Review of Security and Privacy Strategies in Leading Economies

D. Gritzalis, M. Theoharidou, S. Dritsas, G. Marias D. Gritzalis, M. Theoharidou, S. Dritsas, G. Marias Information Security and Critical Infrastructure Protection Research GroupDept. of Informatics, Athens University of Economics and Business, Greece

Safeguards in a World of Ambient Intelligence (SWAMI) ConferenceEuropean Commission, JRC/IPTS, Brussels, March 2006

Page 2: Ambient Intelligence: Promise, Price, Social Disruption A Review of Security and Privacy Strategies in Leading Economies D. Gritzalis, M. Theoharidou,

D. Gritzalis, M. Theoharidou, S. Dritsas, G. MariasD. Gritzalis, M. Theoharidou, S. Dritsas, G. MariasSecurity and Privacy in AmI: Promise, PriceSecurity and Privacy in AmI: Promise, Price, , Social DisruptionSocial Disruption 22

Lea

ding

Eco

nom

ies

Structure of the presentation

Agonies and trends

Envisioning the emerging ICT paradigm

Cornerstones and strategic planning

Security and privacy strategies

Plans, conflicts, social disruption and …gudgetry

Page 3: Ambient Intelligence: Promise, Price, Social Disruption A Review of Security and Privacy Strategies in Leading Economies D. Gritzalis, M. Theoharidou,

D. Gritzalis, M. Theoharidou, S. Dritsas, G. MariasD. Gritzalis, M. Theoharidou, S. Dritsas, G. MariasSecurity and Privacy in AmI: Promise, PriceSecurity and Privacy in AmI: Promise, Price, , Social DisruptionSocial Disruption 33

Agonies and trends

“EU should adopt a holistic view of AmI, considering not just the tech-nology, but the whole of of the innovation supply-chain from scien-ce to end-user, and also the various features of the academic, industrial and administrative environment that facilitate or hinder realisation of the AmI vision” (EU).

“AmI does not associate with a spe-cific technology, but focuses on the use of technology” (EU).

Source: ISTAG (2004)

Page 4: Ambient Intelligence: Promise, Price, Social Disruption A Review of Security and Privacy Strategies in Leading Economies D. Gritzalis, M. Theoharidou,

D. Gritzalis, M. Theoharidou, S. Dritsas, G. MariasD. Gritzalis, M. Theoharidou, S. Dritsas, G. MariasSecurity and Privacy in AmI: Promise, PriceSecurity and Privacy in AmI: Promise, Price, , Social DisruptionSocial Disruption 44

Agonies and trends

“Industry turned to focus at develop-ing strategic superiority in terms of being different, rather than being fast” (J).

“Make the country’s own paradigm different that that of any other coun-try” (J).

“The focus is on ensuring Japan’s industrial lead through the establish-ment of the world’s first, only, and best ICT environment” (J).

Source: ITU (2006)

Page 5: Ambient Intelligence: Promise, Price, Social Disruption A Review of Security and Privacy Strategies in Leading Economies D. Gritzalis, M. Theoharidou,

D. Gritzalis, M. Theoharidou, S. Dritsas, G. MariasD. Gritzalis, M. Theoharidou, S. Dritsas, G. MariasSecurity and Privacy in AmI: Promise, PriceSecurity and Privacy in AmI: Promise, Price, , Social DisruptionSocial Disruption 55

Agonies and trends

Mobile Market Broadband Market Economy Subscr’s

(M) Penetration

(%) As % Internet subscr’s (M)

Subscr’s (M)

Penetration (%)

3G 1 mobile

subscr’s (M)

China 333344..88 25.5 8.71 2 1.51 2 21.30 2 60.3

Japan 91.5 71.6 25.70 19.10 14.90 56.4

Korea (Rep.) 36.6 76.1 27.51 11.92 2244..9900 9999..11

Russia 74.4 51.6 0.18 1.24 0.87 *

United States 181.1 61.0 4499..5500 3377..8899 12.80 59.5

France 44.6 73.7 0.04 6.75 11.20 56.6

Germany 71.3 86.4 0.25 6.90 8.40 * European

Union UK 61.1 110022..88 2.83 6.26 10.50 39.6

1 3G mobile refers to services using CDMA 2000 1x, CDMA 1x EV-DO and W-CDMA standards. 2 Data refer to Hong Kong (China). * Not referred to in the reviewed ITU and OECD reports.

“Progress in shifting towards modern network technologies may establish Japan as the le-ading broadband nation, but it will not necessarily make it the leading ICT nation” (J).

“The ubiquitous network is an ICT paradigm that was redis-covered in Japan and not im-ported by the US” (J).

Source: ITU (2006)

Page 6: Ambient Intelligence: Promise, Price, Social Disruption A Review of Security and Privacy Strategies in Leading Economies D. Gritzalis, M. Theoharidou,

D. Gritzalis, M. Theoharidou, S. Dritsas, G. MariasD. Gritzalis, M. Theoharidou, S. Dritsas, G. MariasSecurity and Privacy in AmI: Promise, PriceSecurity and Privacy in AmI: Promise, Price, , Social DisruptionSocial Disruption 66

Agonies and trends

Source: PITAC (2005)

“US should have a technological boost ana-logous to the the boost given by the first sa-tellite being into orbit by Soviets” (US).

“US have not yet awakened to the central role played by computational science and high-end computing in advanced scientific, social science, biomedical, and engineering research, defense and national security, and industry innovation” (US).

“The challenge for US of preserving their technological competitiveness is far more diffuse, complex and long-term than in was 15-20 years ago” (US).

Page 7: Ambient Intelligence: Promise, Price, Social Disruption A Review of Security and Privacy Strategies in Leading Economies D. Gritzalis, M. Theoharidou,

D. Gritzalis, M. Theoharidou, S. Dritsas, G. MariasD. Gritzalis, M. Theoharidou, S. Dritsas, G. MariasSecurity and Privacy in AmI: Promise, PriceSecurity and Privacy in AmI: Promise, Price, , Social DisruptionSocial Disruption 77

Envisioning the emerging ICT paradigm (1/4)

“The highest ideal of the dramatic machine is to make a computer so exciting, so wonderful, so interesting, that we never want to be without it. The highest ideal of the invisible machine is to

make a computer so imbedded, so fitting, so natural, that we use it without even thinking about it. Wieser called this notion ubiquitous computing and placed its origins in post-modernism”.

Source: NRI (2000)

Page 8: Ambient Intelligence: Promise, Price, Social Disruption A Review of Security and Privacy Strategies in Leading Economies D. Gritzalis, M. Theoharidou,

D. Gritzalis, M. Theoharidou, S. Dritsas, G. MariasD. Gritzalis, M. Theoharidou, S. Dritsas, G. MariasSecurity and Privacy in AmI: Promise, PriceSecurity and Privacy in AmI: Promise, Price, , Social DisruptionSocial Disruption 88

Envisioning the emerging ICT paradigm (2/4)

AmI imlies a seamless environment of com-puting, advanced networking technology and specific interfaces, which is aware of the spe-cific characteristics of humans presence and personalities, takes care of needs, is capable of responding intelligently to spoken or gestu-red indications of desire, and can even engage in intelligent dialogue [EU/ISTAG, 2001].

Pervasive Computing denotes the trend to-wards numerous, casually accessible often in-visible, computing devices, frequently mobile or embedded in the environment, connected to an increasingly ubiquitous networkinfrastructure composed of a wired core and wireless edges [USA/NIST, 2001].

Source: ITU (2006)

Ubiquitous Computing ensures connectivity at any time and any place, with anyone or any object [ITU, 2006].

Page 9: Ambient Intelligence: Promise, Price, Social Disruption A Review of Security and Privacy Strategies in Leading Economies D. Gritzalis, M. Theoharidou,

D. Gritzalis, M. Theoharidou, S. Dritsas, G. MariasD. Gritzalis, M. Theoharidou, S. Dritsas, G. MariasSecurity and Privacy in AmI: Promise, PriceSecurity and Privacy in AmI: Promise, Price, , Social DisruptionSocial Disruption 99

Envisioning the emerging ICT paradigm (3/4)

Source: NRI (2004)

Network ParadigmNetwork Paradigm Network ParadigmNetwork Paradigm

Page 10: Ambient Intelligence: Promise, Price, Social Disruption A Review of Security and Privacy Strategies in Leading Economies D. Gritzalis, M. Theoharidou,

1010

Envisioning the emerging ICT paradigm (4/4)

Source: NRI (2004)

UbiComp ParadigmUbiComp Paradigm UbiComp ParadigmUbiComp Paradigm

Page 11: Ambient Intelligence: Promise, Price, Social Disruption A Review of Security and Privacy Strategies in Leading Economies D. Gritzalis, M. Theoharidou,

D. Gritzalis, M. Theoharidou, S. Dritsas, G. MariasD. Gritzalis, M. Theoharidou, S. Dritsas, G. MariasSecurity and Privacy in AmI: Promise, PriceSecurity and Privacy in AmI: Promise, Price, , Social DisruptionSocial Disruption 1111

Cornerstones and strategic planning: EU

Opportunities: Improve civil security; New leisure, learning and work opportunities; Facilitate community building and social groupings; New forms of healthcare and social support;

Tackle environmental threats; Support democratic process and delivery of public services.

Requirements: Seamless mobile and fixed communications infrastructure; Dynamic and massively distributed device networks; Very unobtrusive hardware; Natural feeling human interfaces;

Dependability and security.

Source: ISTAG (2002)

Page 12: Ambient Intelligence: Promise, Price, Social Disruption A Review of Security and Privacy Strategies in Leading Economies D. Gritzalis, M. Theoharidou,

D. Gritzalis, M. Theoharidou, S. Dritsas, G. MariasD. Gritzalis, M. Theoharidou, S. Dritsas, G. MariasSecurity and Privacy in AmI: Promise, PriceSecurity and Privacy in AmI: Promise, Price, , Social DisruptionSocial Disruption 1212

Cornerstones and strategic planning: USA

National priorities are: (a) Leader-ship in Science and Technology, (b) National/Homeland Security, (c) Health and Environment, (d) Economic Prosperity, (e) Well-Educated Populace, and (f) Vib-rant Civil Society.

UbiCom R&D challenges include: Predictability and manageability, adaptive self-configuration, moni-toring and system health, computa-tional models, network geometry, interoperability, enabling technolo-gies, integration of technical, soci-al, ethical, and public policy issues.

Source: NITRD (2004)

Page 13: Ambient Intelligence: Promise, Price, Social Disruption A Review of Security and Privacy Strategies in Leading Economies D. Gritzalis, M. Theoharidou,

D. Gritzalis, M. Theoharidou, S. Dritsas, G. MariasD. Gritzalis, M. Theoharidou, S. Dritsas, G. MariasSecurity and Privacy in AmI: Promise, PriceSecurity and Privacy in AmI: Promise, Price, , Social DisruptionSocial Disruption 1313

Cornerstones and strategic planning: Japan

National ICT Policy (e-Japan II) is bas-ed on five strategies: (a) Development of the world’s most advanced ICT infra-structure, (b) construction of an Asian-wide platform for electronic bulletin board systems and content distribution, (c) concentrated investment on security and privacy protection, (d) establish-ment of business platdorm that connects ICT and services as new players, (e) realization of specific types of solutions (every-day life, business, government, social systems).

Source: NRI (2005)

Page 14: Ambient Intelligence: Promise, Price, Social Disruption A Review of Security and Privacy Strategies in Leading Economies D. Gritzalis, M. Theoharidou,

D. Gritzalis, M. Theoharidou, S. Dritsas, G. MariasD. Gritzalis, M. Theoharidou, S. Dritsas, G. MariasSecurity and Privacy in AmI: Promise, PriceSecurity and Privacy in AmI: Promise, Price, , Social DisruptionSocial Disruption 1414

Cornerstones and strategic planning: ee uu

Source: NRI (2005)

Page 15: Ambient Intelligence: Promise, Price, Social Disruption A Review of Security and Privacy Strategies in Leading Economies D. Gritzalis, M. Theoharidou,

D. Gritzalis, M. Theoharidou, S. Dritsas, G. MariasD. Gritzalis, M. Theoharidou, S. Dritsas, G. MariasSecurity and Privacy in AmI: Promise, PriceSecurity and Privacy in AmI: Promise, Price, , Social DisruptionSocial Disruption 1515

Security and privacy strategies (1/5)

Source: ISTAG (2004)

7th FP: Security is a major pylon for the Cooperation priority. The main objective of this pylon is: (a) to develop the technologies and knowledge for building ca-pabilities needed to ensure the security of citizens, while respe-cting fundamental human rights, (b) to ensure optimal and conce-rted use of available technologi-es to the benefit of European se-curity, and (c) to stimulate the cooperation of providers and us-ers for security solutions”.

Page 16: Ambient Intelligence: Promise, Price, Social Disruption A Review of Security and Privacy Strategies in Leading Economies D. Gritzalis, M. Theoharidou,

D. Gritzalis, M. Theoharidou, S. Dritsas, G. MariasD. Gritzalis, M. Theoharidou, S. Dritsas, G. MariasSecurity and Privacy in AmI: Promise, PriceSecurity and Privacy in AmI: Promise, Price, , Social DisruptionSocial Disruption 1616

Coordinated approach to

Homeland Security

Security and privacy strategies (2/5)

US ICT infrastructure is highly vulner-able to deliberate attacks with potential disastrous effects. The goal is cyberse-curity. Its most important facets inclu-de: (a) Domestic and international law enforcement, (b) Education, (c) Infor-mation security, (d) Sociological issu-es. Basic security and privacy prin-ciples should focus on: (a) privacy and civil liberties, (b) regulation and mar-ket forces, (c) accountability and res-ponsibility, (d) ensure flexibility, and (e) multi-year planning.

Source: DHS (2006)

Page 17: Ambient Intelligence: Promise, Price, Social Disruption A Review of Security and Privacy Strategies in Leading Economies D. Gritzalis, M. Theoharidou,

D. Gritzalis, M. Theoharidou, S. Dritsas, G. MariasD. Gritzalis, M. Theoharidou, S. Dritsas, G. MariasSecurity and Privacy in AmI: Promise, PriceSecurity and Privacy in AmI: Promise, Price, , Social DisruptionSocial Disruption 1717

Security and privacy strategies (3/5)

Source: NRI (2005)

Page 18: Ambient Intelligence: Promise, Price, Social Disruption A Review of Security and Privacy Strategies in Leading Economies D. Gritzalis, M. Theoharidou,

D. Gritzalis, M. Theoharidou, S. Dritsas, G. MariasD. Gritzalis, M. Theoharidou, S. Dritsas, G. MariasSecurity and Privacy in AmI: Promise, PriceSecurity and Privacy in AmI: Promise, Price, , Social DisruptionSocial Disruption 1818

Security and privacy strategies (4/5)

Source: NRI (2005)

Page 19: Ambient Intelligence: Promise, Price, Social Disruption A Review of Security and Privacy Strategies in Leading Economies D. Gritzalis, M. Theoharidou,

D. Gritzalis, M. Theoharidou, S. Dritsas, G. MariasD. Gritzalis, M. Theoharidou, S. Dritsas, G. MariasSecurity and Privacy in AmI: Promise, PriceSecurity and Privacy in AmI: Promise, Price, , Social DisruptionSocial Disruption 1919

Security and privacy strategies (5/5)

Source: NRI (2005)

Page 20: Ambient Intelligence: Promise, Price, Social Disruption A Review of Security and Privacy Strategies in Leading Economies D. Gritzalis, M. Theoharidou,

D. Gritzalis, M. Theoharidou, S. Dritsas, G. MariasD. Gritzalis, M. Theoharidou, S. Dritsas, G. MariasSecurity and Privacy in AmI: Promise, PriceSecurity and Privacy in AmI: Promise, Price, , Social DisruptionSocial Disruption 2020

Plans, conflicts, social disruption and …gudgetry

European Union

…is optimistic of AmI, but does not disregard that people will participate in a multiplicity of parallel, overlapping, inter-leaved and evolving one-to-one, one-to-many and many-to-many relationships, some short-lived, and some established temporarily and instantaneously.

…is oriented towards addressing different security aspects, such as security related to the in-dividual, to communities and social groups, to the industry or to critical infrastructures.

…builds citizens’ confidence in AmI spaces, by facing privacy issues, unfair or illegal com-mercial practices, unsolicited communications, and harmful content distribution.

…has adopted AmI as its emerging ICT paradigm and aims to exploit its considered leading position in wireless and mobile technology.

…wishes to adopt a holistic view of AmI, considering “not just the technology, but the who-le of the innovation supply-chain from science to end-user, and also the various features of the academic, industrial, abd administrative environment that facilitate or hinder realisation of the AmI vision”.

Page 21: Ambient Intelligence: Promise, Price, Social Disruption A Review of Security and Privacy Strategies in Leading Economies D. Gritzalis, M. Theoharidou,

D. Gritzalis, M. Theoharidou, S. Dritsas, G. MariasD. Gritzalis, M. Theoharidou, S. Dritsas, G. MariasSecurity and Privacy in AmI: Promise, PriceSecurity and Privacy in AmI: Promise, Price, , Social DisruptionSocial Disruption 2121

Plans, conflicts, social disruption and …gudgetry

United States

…consider that it is important to analyze not only technological issues, but social, as well as ethical issues.

…aims at promoting interdisciplinary approaches to research on UbiComp, which tie computer science with other sciences and disciplines.

…consider that UbiComp introduces a new security paradigm, regarding how we can deal with novel and sophisticated security and privacy requirements, recognizing that technical approaches will be insufficient for the protection of privacy and security in UbiComp.

…, from the national security perspective, are probably the most organized nation in the world, in terms of strategies adopted and actions taken.

…aim at keeping their leadership in the ICT sector, while preserving the national security, through concepts such as cybersecurity and critical infrastructure protection.

…initiatives often address issues, such as patient safety and health, quality, prediction of health effects of pollutants, and participation to the digital society, but with no high priority.

Page 22: Ambient Intelligence: Promise, Price, Social Disruption A Review of Security and Privacy Strategies in Leading Economies D. Gritzalis, M. Theoharidou,

D. Gritzalis, M. Theoharidou, S. Dritsas, G. MariasD. Gritzalis, M. Theoharidou, S. Dritsas, G. MariasSecurity and Privacy in AmI: Promise, PriceSecurity and Privacy in AmI: Promise, Price, , Social DisruptionSocial Disruption 2222

Plans, conflicts, social disruption and …gudgetry

Japan

…aims at “being different” with UbiNet, while it envisions a new “Oscar” award for digital content/animation production, a local “Hollywood” city, as well as it expects to “lean from the advanced and comprehensive” security-related approaches taken in the US.

…adopted UbiNet not only as its emerging ICT paradigm, but also as a main means for making the country the “leading ICT nation in the world”.

…aims at being the “most safe and secure” nation in the world in the next decade or so, and to take fine care of - inter alia - the elderly, the disabled and the working women.

…does not focus on pressing victims to take appropriate preventive measures but on punish-ing perpetrators of attacks. Thus the focus should be on the prosecution of offenders.

…follows the tradition of the “three sacred treasures of the digital home appliances”, envisioning ubiquitous home appliances, ubiquitous offices, and ubiquitous cars.

… currently utillizes Chinese resources, as bases for outsourcing and system development, responds to consolidations and company break-ups, and ensures business continuity in an emergency.

Page 23: Ambient Intelligence: Promise, Price, Social Disruption A Review of Security and Privacy Strategies in Leading Economies D. Gritzalis, M. Theoharidou,

D. Gritzalis, M. Theoharidou, S. Dritsas, G. MariasD. Gritzalis, M. Theoharidou, S. Dritsas, G. MariasSecurity and Privacy in AmI: Promise, PriceSecurity and Privacy in AmI: Promise, Price, , Social DisruptionSocial Disruption 2323

Contact us:

Prof. Dr. Dimitris Gritzalis ([email protected])

Information Security and Critical Infrastructure Protection Research GroupDepartment of Informatics

Athens University of Economics and Business (Greece)

website: www.cis.aueb.gr