Mobile Cloud Computing and Regulatory Issues



Similar documents
Why Encryption is Essential to the Safety of Your Business

The Internet of Things (IoT) Opportunities and Risks

10 Hidden IT Risks That Might Threaten Your Law Firm

BRING YOUR OWN DEVICE

SMALL BUSINESS. the basics. in telecommunications solutions

BYOD THE SMALL BUSINESS GUIDE TO BRING YOUR OWN DEVICE

BYOD BEST PRACTICES GUIDE

About Me" List of Lectures" In This Course" Mobile and Sensor Systems. Lecture 1: Introduction to Wireless Systems" " Dr. Cecilia Mascolo" "

Montgomery College Course Designator/Course Number: CS 110 Course Title: Computer Literacy

Building a BYOD Strategy For Education

Is it Time to Trust the Cloud? Unpacking the Notorious Nine

Beyond passwords: Protect the mobile enterprise with smarter security solutions

Guiding principles for security in a networked society

Advanced Transportation Management Systems

HIPAA Security Alert

Vision on Mobile Security and BYOD BYOD Seminar

Module 1: Facilitated e-learning

Securing end-user mobile devices in the enterprise

Mobile Communication An overview Lesson 07 Introduction to Mobile Computing

The Evolution of Traditional Telecoms to IP Communications

The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency

HIPAA Compliance and the Protection of Patient Health Information

Seamless Mobile Security for Network Operators. Build a secure foundation for winning new wireless services revenue.

10788/15 AD/FC/vm DGE 2

Introducing Graves IT Solutions Online Backup System

Europe s Video Game Industry and the Telecom Single Market

Authorization for Electronic Network Access AUP and BYOD Policies DEFINITIONS. BYOD Bring Your Own Device. AUP Authorized Use Policy

Security Considerations for Public Mobile Cloud Computing

'Namgis Information Technology Policies

Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab

Enabling Secure, Diverse Communications for B2B and B2C Organizations

Information Technology Branch Access Control Technical Standard

Compliance, audit, risk, security what s the difference and why do we need it?

Consumerization. Managing the BYOD trend successfully. Harish Krishnan, General Manager, Wipro Mobility Solutions

IoT Security & Privacy

Data Protection Act Bring your own device (BYOD)

Privacy Policy Version 1.0, 1 st of May 2016

Preparing for the HIPAA Security Rule

Cloud Computing Security Considerations

Guidelines for smart phones, tablets and other mobile devices

Information Security Incident Protocol

Access Control BUSINESS REQUIREMENTS FOR ACCESS CONTROL

Security and Compliance challenges in Mobile environment

Top Ten Technology Risks Facing Colleges and Universities

Best Practices for Secure Mobile Access

All can damage or destroy your company s computers along with the data and applications you rely on to run your business.

Hands on, field experiences with BYOD. BYOD Seminar

Wireless LANs vs. Wireless WANs

BRING YOUR OWN DEVICE (BYOD) AND MOBILE DEVICE MANAGEMENT

In the pursuit of becoming smart

m Commerce Working Group

Cloud Backup and Recovery for Endpoint Devices

Client Update NFA Adopts Interpretive Notice Regarding Information Systems Security Programs

Cloud Computing. Chapter 10 Disaster Recovery and Business Continuity and the Cloud

Readiness Assessments: Vital to Secure Mobility

White Paper January The difference between an ASP and LCS EMR and what solution is right for you.

FACT SHEET: Ransomware and HIPAA

Response of the German Medical Association

workforceiq Job Despatch and Workforce Management software for Smartphones

Odessa College Use of Computer Resources Policy Policy Date: November 2010

Top Ten Security and Privacy Challenges for Big Data and Smartgrids. Arnab Roy Fujitsu Laboratories of America

One platform for all your print, scan and device management

NSW Government. Telecommunications: SIP (Session Initiation Protocol) Standard

NetSapiens n-share. High Availability to the n th Degree. Brought to you by:

Mobile Cloud Computing Security Considerations

Wi-Fi calling for business: ROGERS WHITE PAPER. An Executive Overview

ICT Development Trends (2014): Embracing the Era of Mobile-ICT

ISO/IEC 27002:2013 WHITEPAPER. When Recognition Matters

BYOD Strategy - Advantages and Disadvantages

Lecture Embedded System Security A. R. Darmstadt, Introduction Mobile Security

Taking Charge with Apps, Policy, Security and More. October 16, 2012 Sheraton Denver Downtown Hotel Denver, CO

Transcription:

Mobile Cloud Computing and Regulatory Issues 1

Have you ever used Mobile Cloud Computing? 2

Mobile Processor Storage Network Power Sensors/gadgets Personal Small Small Constant Change! Limited Battery Lots! Very Interdroid: a platform for distributed smartphone applications, H. Bal @el, VU University Amsterdam

Cloud Processor Storage Network Power Sensors/gadgets Personal Almost Unlimited Almost Unlimited Constant Almost Unlimited None Not At All Interdroid: a platform for distributed smartphone applications, H. Bal @el, VU University Amsterdam

Made for each other? Mobile Cloud Processor Small Almost Unlimited Storage Small Almost Unlimited Network Constant Change! Constant Power Limited Battery Almost Unlimited Sensors/gadgets Lots! None Personal Very Not At All Interdroid: a platform for distributed smartphone applications, H. Bal @el, VU University Amsterdam 5

6

Mobile Computing Mobile Cloud Computing Mobile Computing is to describe technologies that enable people to access network services anyplace, anytime, and anywhere. Mobile is a significant component of the evolution of computing Source: IBM 7

Challenges of Mobile Computing Mobility means changes Hardware Lighter, smaller, energy management, user interface Low bandwidth, high bandwidth variability Kbit/s to Mbit/s, bandwidth fluctuation Security risk Devices more vulnerable, endpoint authentication harder Heterogeneous network Different devices, interfaces and protocols Location awareness Locality adaptation Higher loss-rates, higher delays, more jitter Connection setup time, hand-off/handover Restrictive regulations of frequencies Frequencies have to be coordinated 8

Evolution of Wireless Connectivity Source: http://www.pinterest.com/ 9

Overview of Mobile Devices Sensors, embedded controllers Smart phone voice, data simple graphical displays Laptop fully functional standard applications Wearable device human wearable non standard I/O PDA graphical displays character recognition Source: University of Colorado 10

Applications of Mobile Computing Vehicles transmission of news, road condition, weather, music via DAB personal communication using GSM position via GPS local ad-hoc network with vehicles close-by to prevent accidents, guidance system, redundancy vehicle data (e.g., from busses, high-speed trains) can be transmitted in advance for maintenance Medical Nurses/Doctors in Medical offices are now using Wireless Tablet PCs/WLAN to collect and share patient information. Sales Sales representatives are using Tablet PCs with Smart phones for presentation, transmitting/access information among office, hotel, and customer location. Emergencies Early transmission of patient data to the hospital, current status & diagnosis Provide mobile infrastructure in dealing with Natural Disaster (earthquake, hurricane, fire, terrorist attacks, war etc) 11

Computing everywhere Gartner predicts an increased emphasis on serving the needs of the mobile user in diverse contexts and environments, as opposed to focusing on devices alone Phones and wearable devices are now part of an expanded computing environment that includes such things as consumer electronics and connected screens in the workplace and public space."increasingly, it's the overall environment that will need to adapt to the requirements of the mobile user. This will continue to raise significant management challenges for IT organizations as they lose control of user endpoint devices. It will also require increased attention to user experience design." Source: www.gartner.com 12

MCC Security Issues Protecting user privacy and data/application secrecy from adversaries is key to establish and maintain consumers trust in the mobile platform, especially in MCC MCC security issues have two main categories: Security for mobile users Securing data on clouds 13

Security for Mobile Users Mobile devices are exposed to numerous security threats like malicious codes and their vulnerability GPS can cause privacy issues for subscribers Security for mobile applications: Installing and running security software are the simplest ways to detect security threats. Mobile devices are resource constrained, protecting them from the threats is more difficult than that for resourceful devices 14

Privacy Issues in MCC Location based services (LBS) faces a privacy issue on mobile users provide private information such as their current location This problem becomes even worse if an adversary knows user s important information LBS or any other service using data can also be expensive while roaming 15

Regulatory Perspectives / Challenges 16

Regulatory Perspectives / Challenges Consumer Data and Privacy Protection The expansion of digital technologies has enabled services such as cloud that dramatically changed the way in which services are delivered to and accessed by consumers. Today we face urgency in deciding how to use ICT markets, self-regulation, and regulatory enforcement to protect personal data Protecting the privacy of consumers data and ensuring consumers data is used for the purposes intended are essential safeguards in todays converged environment 17

Regulatory Perspectives / Challenges Consumer Data and Privacy Protection Contd Cloud Computing Service providers shall have specific obligations to protect the privacy and confidentiality of consumer data, including ensuring systems and networks are sufficiently secure to prevent unauthorized access. Similarly, enterprise / business data over cloud should not allowed to be exchanged with other companies without the consumer s permission Regulations are needed to protect consumer s expectation of privacy, protection of personal data; privacy; confidentiality of information and the right to complain for local services delivered / accessed over the Internet 18

Regulatory Perspectives / Challenges Quality of Service and Experience (QoSE) Globally, a number of regulators do enforce minimum QoSE requirements to ensure that providers have reliable and uninterrupted services, including access to information in the cloud. 19

Environmental concerns Regulatory Perspectives / Challenges Cloud services empower large data centers that consume vast amounts of energy, raising environmental concerns. Steps may be taken to encourage the cloud service provides to minimize energy use, following International standards for reducing energy consumptions and enabling green cloud technologies 20

Regulatory Perspectives / Challenges Market Competition Regulators need to ensure that cloud service providers / ISPs do not engage in conduct that constrains the provision of cloud services for reasons that are not transparent, objective, non-discriminatory and proportionate 21

Regulatory Perspectives / Challenges Data Security and Standardization Regulators are required to keep intact regulations that stipulate tight controls on the processing of personal data and its transfer over communication networks. There exist data storage uncertainties over how and where in the cloud computing / services world. Therefore, much of the regulation touching cloud computing is associated with data security. We need to ensure that cloud computing / service occurs in a secure environment (which is a big concern for users), to facilitate the take-up of cloud. Cloud service providers should to comply with security standards, used widely around the world. There are various cloud-specific standardization initiatives underway, for example, the Cloud Security Alliance (CSA) is working on the Cloud Trust protocol for best practice in the industry. Likewise, ITU s Telecommunication Standardization Sector, Study Group 17 is also working on cloud security. 22

Regulatory Perspectives / Challenges Set out clear policy guidelines for foreign investors that may be interested in investing in the cloud market Provide clear investment and operational guidelines Develop local policy and provide tax rebates as cloud computing saves immense power resources by centralizing and maximizing usage. Encourage investment in local cloud infrastructure setups saves valuable forex, creates jobs, develops localized expertise and solutions that are useful to the public and private sector. 23

Regulatory Perspectives / Challenges Regulator needs to define the relationship between the cloud operator and the user Set out data security, confidentiality and service levels expectations Ensure risk mitigation on part of the operators 24

Regulatory Perspectives / Challenges Final Words Should regulators intervene? Much of the cloud computing market may fall outside traditional telecommunication law, but governments and regulators could facilitate its uptake by removing the perceived barriers. The major concern remains the security of the Meta data generated by use of cloud services. Equally crucial are questions of privacy, data retention or deletion, standards, due diligence and compliance. 25

Thank you 26