trust frameworks for mobile sentient...
TRANSCRIPT
Trust Frameworks for MobileSentient Devices
October 7, 2013
Dr. John H ClippingerMIT Media Lab - [email protected]
[email protected]©John Henry Clippinger
1Monday, October 7, 13
strange new data ecology is in the making
2Monday, October 7, 13
internet device immersion
• sensors
• controllers
• new infrastructure
• new data commons
• bots
3Monday, October 7, 13
Data define a new sphere of life
Data are not about but for:
• seeing - recognizing - doing
• influencing - learning - improving
• controlling - feedback -correction
We are inside looking out - not outside looking in
Data are like water - essential nutrient of Digital Ecosystem
Observers and actors are now digital devices
4Monday, October 7, 13
PEOPLE TAKING CONTROL OVER PERSONAL DATA
• QUANTIFIED SELF : Wanting to control one’s personal data for health, financial, educational, recreational, social, and purchasing
• MARKETING : Consumer is point for aggregation to deliver 360O services
• GOVERNMENT SERVICES: Open Data and My Data services for education, health, and energy,
5
5Monday, October 7, 13
A. DIGITIZATION PERSONAL - CHEAP - NETWORKED - AWARE - UBIQUITOUS
• OPEN MOBILE PLATFORM - 2009 $300 for unlocked Android - Touch Screen - WiFi- GPS - 2013 Same Phone <$35.00 -
• INTERNET OF THINGS - sensors - actuators - seeing - hearing - sensing with attached analytics - Smart - networked homes and cities - driverless cars - autonomous drones - NFC - RFID - Smart Dust - Billions and Billions
• PERSONAL DATA STORES- Cloud Services to give people control over the sharing of their data - 30 startups
• MOBILE PHONE - as personal sensor collector
INFINITE AND SPONTANEOUS SUPPY OF DATA AS THE MEDIUM OF THE NEW ECOSYSTEM
6
6Monday, October 7, 13
BIG DATA ANALYTICS
• NO SAMPLING - real time calculation of actual distributions - no “average customers” - only real behaving customers
• ACCURATE PERSONAL PREDICTION Identify on actual identities (biological) and attributes - income, gender, preferences
• 5-10 X CONVERSION RATES of offers to purchases- no longer push advertising or lead generation - but pull market making
• MACHINE LEARNING- gets better and better - smarter & smarter - “lives off of and grows in predictive powers with data
EASIER TO KNOW YOUR CUSTOMER WITH ACCESSIBLE HIGHLY PREDICTIVE - ROBUST DATA - REDUCE RISK INCREASE TRUST
7
7Monday, October 7, 13
ENGAGE 3.48 BILLION CONSUMERS IN EMERGING MARKETS
Using mobile airt ime incentives, Jana enables brands to connect directly with consumers in emerging markets via their mobile phones.
8Monday, October 7, 13
traditional solutions to identity, authority and control over access privileges
Hindu Caste System
Medieval Chain of Being
Patriarchal Lineages
9Monday, October 7, 13
artifacts of identities - access -
Text
10Monday, October 7, 13
Ooops what we thinking - we forgot the authentication layer!
11Monday, October 7, 13
Devices like PeopleNeed to be:
• authenticated
• verified,
• permitted
• governed
Some devices will become autonomous bots - that learn, explore, access, control, create
12Monday, October 7, 13
GLOBAL REGULATORY CHANGES
• user control over personal data
• consumer data bill of rights
• mobility of data
• privacy by design
• transparency and accountability
• self-determination
Personal Data:The Emergence of a New Asset Class
13Monday, October 7, 13
Regulatory Problem with Data as Third Party Observations
•Do not collect = do not see
•Opt out = digital pariah
•Notification and consent = denial of service attack
•Do not track = do not know-learn
•Do not share = digital ghetto
Harms and Duties come with the use of the specific use of the data and chain of custody
14Monday, October 7, 13
the next generation of “phones”
sentient devices - “spy phone” vs. “my phone”
55
It sees you and your “friends”, listens to you, monitors your
health, movements, interactions, activities, and
tirelesslylearns to know you better -
for yourself and others:
Google NowGoogle Glasses
Moto XPrimeSense
Qualcomm Chips
15Monday, October 7, 13
data + Machine Learning define the new device interface
• predictive & adaptive
• learns and adjusts interface
• Personal Data Cloud and Machine Learning
16Monday, October 7, 13
login-password- authentication - certificates - permissions =
digital red tape hellMickeyMinniePlutoHueyLouieDeweyDonaldGoofySacramento”
17Monday, October 7, 13
Social Stack
16#
2.#Distributed#Id#Management#–#Defining#&#Gran9ng##&#Managing#Access##
1.#Secure#Core#Iden9ty#–#Personas#–#Personal#Data#Stores#&#PlaBorms#
3.#OptFin#Trusted#VPN#–#Permissions#Engines#–#APIs#–#Trust#Wrappers#–Trusted#Compute#Frameworks##
4.#“Baked#In”#Open#Services:#Payment#–#Currency#–#Reputa9on#F#
#5.#User#Driven#Trusted#Apps:#(“Among#Friends”#–#Shared#QS#DataF#Social#Commerce#–#Data#Banking#
18Monday, October 7, 13
(OMS)
The OMS Trustworthy Compute Framework (TCF) implements a social stack for an individual - group - device -
•Federated, single-sign on for a user's devices and clients via OpenID Connect
•Enables Personal Data Store ( Cloud) and APIs for collecting and sharing data
•User, persona, group, and identity management
•Data access control and sharing
•On-demand compute resources for data analysis and real-time feedback
•Infrastructure deployment at scale
19Monday, October 7, 13
Trusted Compute Cell
Each TCC cell is composed of several virtual resource applications
•OpenID Connect Server
•(sub)Network of compute resources
•Deployment of Web Application(s) and hosting environments
•Personal Data Store
20Monday, October 7, 13
Trusted Application Bundle Enables Formation of Interoperable Trusted Application
Networks
TAB for GroupC2C - B2C
TAB for Portals (Private Trusted Network of Trusted
Networks)B2B
P-TCC
OIDC
PDS
APP(UICOMPUTE REGISTRY
21Monday, October 7, 13
Trusted Compute Framework
22
22Monday, October 7, 13
This%work%is%licensed%under%a%Crea2ve%Commons%A6ribu2on8ShareAlike%3.0%%Unported%License:%h6p://crea2vecommons.org/licenses/by8sa/3.0/deed.en_US%
Rule%of%Law%Engine%Access%Policy%Reasoning%Pa6erns%
Fire%All%Matching%Policy%Rules%
Request%for%%Personal%Data%Access%
Allow/Deny%Request%Responses%(One%response%per%matching%rule%within%the%policy)%
Mul2ple%%Allow/Deny%%Request%Responses% Retract%Lower%Priority%Response%
More%than%one%response?%
Yes$
No$
Determine%Policy%
Priori2es%
Release%the%lone%surviving%Allow/Deny%Response%for%the%policy,%triggering%data%access%and%audit%logging%
External%Input/Output%
Within%Rule%of%Law%Engine%
Determine%Jurisdic2on%
Loca2on%Update%Ac2ve%Jurisdic2on%
Retract%Prior%Jurisdic2on%Assert%Ac2ve%Jurisdic2on%
Jurisdic2on%Change?%
Yes$
No$
5%
23Monday, October 7, 13
This%work%is%licensed%under%a%Crea2ve%Commons%A6ribu2on8ShareAlike%3.0%%Unported%License:%h6p://crea2vecommons.org/licenses/by8sa/3.0/deed.en_US%
COPPA%8%Parental%Consent%Example%
“Our%Club”%–%safe%social%networking%for%children%online%and%at%theme%parks%
Approve% Un8enroll%End%permissions%on:% 4/30/2014%
12%
Your%consent%for%Lisa,%age%11,%to%be%enrolled%in%“Our%Club”%%and%for%Disney%Corp.%to%access%Lisa’s%personal%data:%
Cancel%
First&NameLast&Name
Home&AddressEmail&Address
Phone&NumberGeolocation
PhotosVideosAudio
ServicesServices
ServicesServices
ServicesServices
ServicesServices
ServicesServices
ServicesServices
ServicesServices
ServicesServices
ServicesServices
ServicesServices
ServicesServices
ServicesServices
24Monday, October 7, 13
This%work%is%licensed%under%a%Crea2ve%Commons%A6ribu2on8ShareAlike%3.0%%Unported%License:%h6p://crea2vecommons.org/licenses/by8sa/3.0/deed.en_US%
Rule%of%Law%Engine%8%Key%Results%
• Can%express%complex%data%protec2on8sharing%policies%and%permissions%as%executable,%enforceable,%and%auditable%computer%code%
• Can%readily%express%data%protec2on8sharing%%facts,%rules,%and%priori2es%for%different%par2es,%condi2ons%and%jurisdic2ons%
• Enable%deployment%of%Trust%Wrappers/Manifests%to%encapsulate%arbitrary%levels%of%complexity%simply%and%completely%
• Provide%provable%methods%for%“interoperability”%of%data%protec2on8sharing%across%jurisdic2ons%and%dynamic%contexts%
• COPPA%policy%can%be%seamlessly%triggered%and%integrated%with%OMS%Trust%Framework%personal%data%access%management%
16%
25Monday, October 7, 13
Governance & Regulation By API
6 areas for API regulatory definition for Personal Data
APIs for governance - download from Regulatory Body Portal Trusted Compute Cells (TCCs) express and enforces “meta-regulatory principles” - “Safe Harbor Principles
Automated Reporting to RB Portal to Independent Auditor through periodic monitoring, log analysis, and failure/performance detection
Correct Failures/Upgrade Performance through design
Predetermined Dispute Resolution - reduce litigation expense and delays and uncertainty
USE CASE: LOCATION - TIME - PEOPLE DATA
Data Group
collectioncriteria
1
FailureLoggings
correction5
Sanctionsdispute
resolutioncriteria
6
Permitteduse and
computationcriteria
2
AccessControl
permissions3
Logging auditing criteria &metrics
4
Downloadable Regulatory Module for Personal Data (RMPD)
26Monday, October 7, 13
Mobile & Sensor Based Identity Authentication
• Reduce enrollment - authentication coordination costs by containing authentication within device
• Individual movement - interaction “digital signatures” combined with behavior-metrics, biometrics and social data provide rigorous and real time authentication for global transactions
• User & independent algorithm as “identity provider”
27Monday, October 7, 13
Digital Asset Exchanges
• Move towards digital - crypto-currencies - BitCoin - Ripple - Ven - Mobile Minutes - Rewards
• Personal Data Accounts as stores of value - digital assets - backing exchanges in “personal data assets” of high value personal data for digital currencies
• Dynamic digital asset exchanges for aggregating, valuing, and trading digital assets - to make markets
• New digital technologies for Know Your Customer (KYC) and Anti-Money Laundering (AML)
• Global Mobile Platforms of exchange
28Monday, October 7, 13
Keep It Simple
29
29Monday, October 7, 13
thank youquestions ?
www.idcubed.org
30Monday, October 7, 13
Flexible - Organic AuthorizationTOFU ( Trust On First Use)
©2012 The MITRE Corporation
Whitelist Trusted partners, business contracts,
customer organizations, trust frameworks
Graylist User-based trust decisions
Follow TOFU model, keep logs
Blacklist Very bad sites we don’t want to deal with, ever
Org
aniz
atio
ns
deci
de th
ese End-users
decide these
60
31Monday, October 7, 13
32Monday, October 7, 13
Mobile'Territorial'Lab'
• Understand)the)needs)and)the)behavior)of)users.)
• Star3ng)community:)young)families)with)newborns))
• Short)term)outcomes:)1. Developing) and) tes3ng) a' new'
model'of'DATA'OWNERSHIP)
2. Understanding) the) dynamics' of'people’s'needs'
)3. U n d e r s t a n d i n g) p e o p l e ’ s'
interacBons' in) the) generated)social)networks)
)
)
A)joint)project)between:))
33Monday, October 7, 13
Field Trials Mobile Territorial Lab:
34
34Monday, October 7, 13
Prospective Use Case: MIT as Trusted Compute Framework
• Provide Personal Data Store and platforms to all MIT alumni, faculty and students for MIT curated services.
• MIT acts as trusted party for setting up and protecting personal-MIT data. Enable MIT VPNs for MIT students - faculty-alumni for sharing academic data and setting up trusted networks.
• Enables MIT to delivery state of art learning services and analytics, simplify sharing career and educational data, leverage MIT experiences and networks.
• Enable MIT to be innovator in Social Stack technologies, services, and practices.
35Monday, October 7, 13
3
Reality Analysis Mobile Health Prototype
On app startup, a Mobile Health Triangle summary graph is shown. Tapping an axis shows recent values for that dimension – let’s look at Activity.
Detailed view of Activity shows activity levels by hour for the last week. Swipe all the way to the right to reach the audit log.
Select start/end dates, then enter script & requester values to filter out the entries that are shown.
36Monday, October 7, 13
ACCELERATED SOFTWARE DEVELOPMENTTHROUGH OPEN PLATFORMS
• OPEN SOURCE PLATFORMS: - Hadoop - Open Stack - Salt - Fabric - Django -Puppet - All leverage one another - Model Based Development - DRY (Do Not Repeat Yourself)
• OPENID CONNECT OAuth2 - open source platform for federating identity and permissions through access control rules
• TOFU (Trust on First Use) - Dynamic Registration - Gray lists - organic authentication - based upon growing data and metrics - many flavors of trust
• BETTER EXPERIENCE - no passwords - permission based sharing with member websites and apps
37
37Monday, October 7, 13
Data Ecology
• Immersed in data - new “sphere”
•Data are like water not oil - it sustains life and needs to circulate and to be pure
•Data are the essential nutrients to the life of any digital ecosystem
•Cut off the data - contaminate the data and the data ecosystem dies.
38Monday, October 7, 13
39Monday, October 7, 13
39Monday, October 7, 13
39Monday, October 7, 13
39Monday, October 7, 13
39Monday, October 7, 13
39Monday, October 7, 13
39Monday, October 7, 13
39Monday, October 7, 13
39Monday, October 7, 13
39Monday, October 7, 13
39Monday, October 7, 13
becomes invisible to the user
39Monday, October 7, 13
39Monday, October 7, 13
39Monday, October 7, 13
Trusted Compute Cell
39Monday, October 7, 13
39Monday, October 7, 13
40
40Monday, October 7, 13
41
41Monday, October 7, 13