Blockchain & Security
Facebook Twitter LinkedIn

Blockchain & Security

Combined Session
Thursday, September 19, 2019 14:00—15:00
Location: Empore

Towards Secure & Scalable Blockchains

The blockchain emerges as an innovative tool which proves to be useful in a number of application scenarios. A number of large industrial players, such as IBM, Microsoft, Intel, and NEC, are currently investing in exploiting the blockchain in order to enrich their portfolio of products. A number of researchers and practitioners speculate that the blockchain technology can change the way we see a number of online applications today. Although it is still early to tell for sure, it is expected that the blockchain will stimulate considerable changes to a large number of products and will positively impact the digital experience of many individuals around the globe. In this talk, Dr. Karame will recap the basic security provisions of existing permissionless blockchain technologies and will overview state of the art consensus technologies, such as Proof of Stake and Byzantine Fault Tolerant algorithms, for next-generation blockchains.

Dr. Ghassan Karame
Dr. Ghassan Karame
NEC Labs
Dr. Karame is the Manager and Chief researcher of the Security Group of NEC Labs in Germany. He joined NEC Labs in April 2012. Before then, he was working as a postdoctoral researcher in the...

Applied SSI – Identity & Access Renewed with Self-Sovereign Identity Tech

Join this session to see Self-Sovereign Identity (SSI) resolving the troubles of classic Identity & Access Management (IAM) in a business context. With Sovrin (https://sovrin.org) being the applied foundational framework, DIDs and Verifiable Credentials are leveraged to enable user access to company resources. Users can come from the company itself, affiliated organisations, external service providers or even be customers. This solution works for "native" SSI-enabled applications as well as the "legacy" world using directories (e.g. LDAP, AD). Active contribution is sought from the audience – please review critically and comment. Obtaining further use cases for applied SSI is also much appreciated.

Applied SSI – Identity & Access Renewed with Self-Sovereign Identity Tech
Presentation deck
Applied SSI – Identity & Access Renewed with Self-Sovereign Identity Tech
Click here to download the slide deck. Please note that downloads are only available for event participants and subscribers. You'll need to log in to download it.
Dr. Andre Kudra
Dr. Andre Kudra
IT Security Association Germany (TeleTrusT)
On a mission for decentralized identity & bit-heat confidential cloud. Decentralization visionary. Passion for information security since turn of millennium. Business-driven yet tech-savvy...

Blockchain, Decentralization & Smart Cities

A truly smart city provides solutions that benefit multiple groups, and is not just implemented as a show. The pieces required to have a truly smart City are, smart energy, smart transportation, smart data sharing, smart infrastructure, smart houses and gardens. All of these needs to be able to be configured to work in private, commercial or corporate environments, the configurations, data and policies for each service must be locked and secured at a new level of security.

Smart Cities contain large amounts of Internet of Things (IoT) devices that generate, process, and exchange vast amounts of critical data as well as privacy-sensitive information, and hence are appealing targets of various cyber-attacks.

Many new networkable devices, which constitute the IoT, are low energy and lightweight. These devices must devote most of their available energy and computation to executing core application functionality, making the task of affordably supporting security and privacy quite challenging. Traditional security methods tend to be expensive for IoT in terms of energy consumption and processing overhead.

Moreover, many of the state-of-the-art security frameworks are highly centralized and are thus not necessarily well-suited for Smart cities due to the difficulty of scale, many-to-one nature of the traffic, and single point of failure. To protect user privacy, existing methods often either reveal noisy data or incomplete data, which may potentially hinder some Smart cities applications from offering personalized services. Consequently, Smart Cities demands a lightweight, scalable, and distributed security and privacy safeguard.

Key takeaways:
-- Scalability potential of decentralized networks

-- Data management on Blockchain

-- challenges with decentralize Service control

-- Security ”on the wire” and ”off the wire”

-- Quantum Computer enhanced hacking protection

Mattias Bergstrom
Mattias Bergstrom
Quantum1Net
Successful Innovator and entrepreneur with a focus on business and technical strategies of distributed and decentralized network solutions. Interested in UBI and Flat Organisations. Holds over 60...
Subscribe for updates
Please provide your email address