The blockchain emerges as an innovative tool which proves to be useful in a number of application scenarios. A number of large industrial players, such as IBM, Microsoft, Intel, and NEC, are currently investing in exploiting the blockchain in order to enrich their portfolio of products. A number of researchers and practitioners speculate that the blockchain technology can change the way we see a number of online applications today. Although it is still early to tell for sure, it is expected that the blockchain will stimulate considerable changes to a large number of products and will positively impact the digital experience of many individuals around the globe. In this talk, Dr. Karame will recap the basic security provisions of existing permissionless blockchain technologies and will overview state of the art consensus technologies, such as Proof of Stake and Byzantine Fault Tolerant algorithms, for next-generation blockchains.
Join this session to see Self-Sovereign Identity (SSI) resolving the troubles of classic Identity & Access Management (IAM) in a business context. With Sovrin (https://sovrin.org) being the applied foundational framework, DIDs and Verifiable Credentials are leveraged to enable user access to company resources. Users can come from the company itself, affiliated organisations, external service providers or even be customers. This solution works for "native" SSI-enabled applications as well as the "legacy" world using directories (e.g. LDAP, AD). Active contribution is sought from the audience – please review critically and comment. Obtaining further use cases for applied SSI is also much appreciated.
A truly smart city provides solutions that benefit multiple groups, and is not just implemented as a show. The pieces required to have a truly smart City are, smart energy, smart transportation, smart data sharing, smart infrastructure, smart houses and gardens. All of these needs to be able to be configured to work in private, commercial or corporate environments, the configurations, data and policies for each service must be locked and secured at a new level of security.
Smart Cities contain large amounts of Internet of Things (IoT) devices that generate, process, and exchange vast amounts of critical data as well as privacy-sensitive information, and hence are appealing targets of various cyber-attacks.
Many new networkable devices, which constitute the IoT, are low energy and lightweight. These devices must devote most of their available energy and computation to executing core application functionality, making the task of affordably supporting security and privacy quite challenging. Traditional security methods tend to be expensive for IoT in terms of energy consumption and processing overhead.
Moreover, many of the state-of-the-art security frameworks are highly centralized and are thus not necessarily well-suited for Smart cities due to the difficulty of scale, many-to-one nature of the traffic, and single point of failure. To protect user privacy, existing methods often either reveal noisy data or incomplete data, which may potentially hinder some Smart cities applications from offering personalized services. Consequently, Smart Cities demands a lightweight, scalable, and distributed security and privacy safeguard.
Key takeaways:
-- Scalability potential of decentralized networks
-- Data management on Blockchain
-- challenges with decentralize Service control
-- Security ”on the wire” and ”off the wire”
-- Quantum Computer enhanced hacking protection