Digital Identity for the Internet of Things: Security, Privacy and Consent Challenges
- TYPE: Keynote DATE: Wednesday, May 10, 2017 TIME: 18:30-18:50 LOCATION: AUDITORIUM
IoT is a new digital channel to provide more products and services. However Security, Privacy and Consent in such environment are a major concern. To provide a secure interaction we need a “Holistic Identity” strategy, where identities represent humans, devices, things and their relationships; and privacy and consent management are also part of the strategy. Without Identity there are no security nor privacy, and this goes for all kind of entities!
To implement a Digital Transformation strategy, it is necessary to provide more channels to face customers and citizens. The IoT is the perfect channel to interact with the end user and its environment, however this needs to be done in a secure way.
As an example, we see products transformed from a fixed functionality device to a smart connected product, able to repair itself with software updates, capable of optimizing itself and even implement new functionality on the fly. The traditional manufacturing industry needs to get prepared for this, otherwise new contenders will eat their lunch.
The traditional M2M and Industrial networks can now also feed with data collected from the products themselves, while they are in use, and analyze them to enhance the functionality of the next versions, but to do this, it is necessary to know the identity of the product, the contextual data and a way to correlate it.
The new smart products can now collect contextual and telemetry data, and send it to applications residing in the cloud. This “little-data” when aggregated becomes “big-data” that can be analyzed to provide ad-hoc services, and trigger actions in response to conditions if necessary. But, with big-data comes big responsibilities, since it can be used to profile end users. Security, Identity, Privacy and Consent Management play a key role to provide these new kinds of services and products in a way that makes the end-user feel confident.
The questions that arise are: How do we control the access and account for the data generated by the IoT, who is the owner of such data, how are all the entities and identities involved related, how do we implement systems that react in a fast and secure way transmitting at the same time a sense of privacy and confidentiality?
- IoT as part of the Digital Transformation
- Security, identity, privacy and consent challenges for an IoT solution
- The Identity of Things, and how it can be used as a business enabler
- Continuous security as a way to react to a dynamic environment in the IoT
- Identities for all kind of entities: user, devices, things and services.
- Authentication for user, devices, things and services
- Relationships between user, devices, things and services and how this information can convey authorisation information
- Registration fee:
- Contact person:
Mr. Levent Kara
+49 211 23707710
- May 09 - 12, 2017 Munich, Germany