1 MB

Towards European Digital Sovereignty:
Beyond physical borders & locations
Claudia Eckert,
Fraunhofer-Institute AISEC, TU Munich, Chair for IT Security
Agenda
1. Internet of Things and Services
2. Towards European Digital Sovereignty
3. Take Home Message
Digitization:
Internet
of Things
not really new, but …
 Connected: from Sensors into the Cloud
 Cross-Enterprise, cross-Domain Boundaries
 Merging private and business Life (and Data)
New Services, new business opportunities
BigData:
Data-driven Innovations
COPYRIGHT beachten!
Bilder und Grafiken nur für internen Gebrauch!
1. Connected Industrial Processes
tailored, efficient, sustainable, high quality
It‘s all about
Data!
1. Connected Mobility:
Assisted driving, traffic planning, safety
It‘s all about
Data!
1. Connected Health:
Personalized medicine, quantified self
It‘s all about
Data!
Data-driven Innovations
Business assets:
 Design (IP), Production processes,
 Logistics, Maintenance, Customer
Privacy issues:
 Profiling, preferences, social life
 Quantified self (health)
Data Ownership and Data Control
are essential! But ….
Risks
Main Vulnerabilities:
• Hardware: millions of Sensors:
Manipulated Data
• Software: open, connected:
Information Leakages
• Human in the Loop: overstrained,
Unauthorized Access
Appropriate Technologies,
Methods, Tools are still missing!
Agenda
1. Internet of Things and Services
2. Towards European Digital Sovereignty
3. Take Home Message
Digital Sovereignty:
Requires Ability to
• Judge:
Requires increased Knowledge: Assess
• Control:
Requires enhanced Monitoring: Prevent
• Decide:
Requires trustworthy Alternatives: Built
Judge
Educate: Training
 Usability Labs, Simulation
Application
Server
App
Controller
Java VM
Modell
e
Event Bus
Assess: Analysis/Tools
 Spanning whole Life-Cycle
 design, implementation,
 deployment, operation,
 maintenance, patching
 elimination, ….
Application
Vorlag
en
DSL Interpreter
Complex Event
Processing
MONITORING FRAMEWORK
Control
Prevent : Anomaly-Detection
 Real-time, resource saving
 Sensor fusing (spatial, time, …)
Monitor: Self-Protection
 New Introspection Techniques
VMI, Isolation
 Plug & Trust Security Modules
Smart Meter
with
HSM
Decide
Built: New Hardware-Architecture
 Attack resistant, trustworthy
Built: New Software Architectures
 personalized contexts: BYOC:
Built: Identities for „everything“
 Smart materials for security
Driver for international Standardization!
3. Take home Message
Privacy and Digital Sovereignty requires
 Trustworthy & usable Technology
 Education
European Research Agenda
• Strengthen Core-Competences to
• Judge: Assess: detect vulnerabilities
• Control: Prevent: mitigate risks
• Decide: Built: trustworthy technology
Thank You for Your Attention
Claudia Eckert
TU München, Chair for IT Security
Fraunhofer-Institut e AISEC, Munich
E-Mail:
[email protected]
Internet: http://www.sec.in.tum.de
http://www.aisec.fraunhofer.de
Twitter:
@FraunhoferAISEC