SlideShare ist ein Scribd-Unternehmen logo
1 von 28
Tsvi Lev,
Corporate VP & Head of NEC Labs Israel
tsvi.lev@necam.com
Private Computing
for IOT
2 © NEC Corporation 2015 NEC Group Internal Use Only2 © NEC Corporation 2019
NEC celebrates 120
3 © NEC Corporation 2015 NEC Group Internal Use Only3 © NEC Corporation 2019
NEC Stats
▌Business In >160 Countries
▌9 Global Research Labs, 1,000 researchers
▌>0.5% of Revenue=>Research: ¼ Billion$
North America
Europe, Middel East
and Africa
Greater China Japan
Asia-Pacific
1
1
1
4 © NEC Corporation 2015 NEC Group Internal Use Only4 © NEC Corporation 2019
Continued emphasis on Research Innovation
5 © NEC Corporation 2015 NEC Group Internal Use Only5 © NEC Corporation 2019
NEC’s Israeli Center – Open Research Innovation
▌ Established to promote external technologies into NEC
▌Centered around AI applications to Vision, Cyber, Medical
▌Research collaborations with MIT,TAU, BGU, BIU.
▌30+ H/C and growing – 7 PhD, 10 MSc.
ACM CCS Best Paper Edge AI for Vision Cyber Research AI for Healthcare
6 © NEC Corporation 2015 NEC Group Internal Use Only6 © NEC Corporation 2019
1st Generation Cloud Use
▌SaaS – Office 365, Salesforce etc.
▌Lift and Shift - Offload on-premise servers: cost, reliability, security
▌PaaS – use Cloud DB, Web applications.
▌The Edge is a computer – on premise PC, user’s browser, smartphone.
▌Clear division of data ownership, governance, liability.
▌Privacy is ensured by ‘traditional’ cyber, encryption and regulation.
▌Ensured… Well..
7 © NEC Corporation 2015 NEC Group Internal Use Only7 © NEC Corporation 2019
As predicted already in 1992..
8 © NEC Corporation 2015 NEC Group Internal Use Only8 © NEC Corporation 2019
And now IOT..
9 © NEC Corporation 2015 NEC Group Internal Use Only9 © NEC Corporation 2019
IoT - Cloud use
▌IOT sensors – upload data to cloud for processing, storage.
▌Cameras – heavy upload, some edge processing (alerts, detection).
▌A Jungle of protocols, O/S, data types, security models.
▌Mobile Apps to cloud are a mixed case..
10 © NEC Corporation 2015 NEC Group Internal Use Only10 © NEC Corporation 2019
Privacy Liability and Regulation – who is responsible
Edge Device Edge Platform Cloud Data on
Edge
Data in
Motion
Data on
Cloud
PC PC owner Service
Provider
PC owner Nobody Service
Provider
Mobile Apps Unclear Service
Provider
Not Clear Nobody Service
Provider
IOT Service
Provider
Service
Provider
Service
Provider
Service
Provider
Service
Provider
11 © NEC Corporation 2015 NEC Group Internal Use Only11 © NEC Corporation 2019
IoT Data Breaches create friction for everyone
▌Regulation: private (consumer) data storage and protection laws
▌GDPR – restricts permissions to use, borders, retention
▌Collateral damage – your IoT equipment/data can harm 3rd parties
▌Even ‘established encryption’ is not future proof – since 2015 it
takes <4 hours to break a 512bit RSA key, which was 25% of servers in
2000, and 4% even today…
8% of Dyn’s customer base stopped using them
12 © NEC Corporation 2015 NEC Group Internal Use Only12 © NEC Corporation 2019
The data of today can be stolen tomorrow
Should we care? Financial
Records, Location, medical
records, documents have
value 10-20 years after
creation
For example – location & time
=> where you live, where
you work, health status,
occupation, martial status
etc.
13 © NEC Corporation 2015 NEC Group Internal Use Only13 © NEC Corporation 2019
Private Computing:
Data Use is actively limited to pre-defined, monitored
objectives.
▌Privacy solutions emerge– forums, open source projects, corporate
support – Microsoft, Intel, IBM, SAP, startups.
▌“High End Implementations” – partnerships of BFSI etc. Fast compute
and network, high complexity implementation.
Trends in Private Computing
14 © NEC Corporation 2015 NEC Group Internal Use Only14 © NEC Corporation 2019
Secure, Private Computing for IoT – the IoTopia Initiative
15 © NEC Corporation 2015 NEC Group Internal Use Only15 © NEC Corporation 2019
Privacy Concerns in IOT – Gartner Reccomendations
▌ IoT strategy MUST involve legal advisors.
▌ Privacy is not just PID – it is any information about users that does not serve
the ‘stated purpose’ of the application.
▌ Recommend ‘privacy preserving’ tech like MPC, Blockchain etc.
▌ Estimate 1B$ in 2021 spent just on IoT Regulatory Compliance.
▌ Best to purge data asap – not hold it.
Sample IoT application,
which generates private
data even if not PID
16 © NEC Corporation 2015 NEC Group Internal Use Only16 © NEC Corporation 2019
▌ We want answers to questions based on private date (eat)
▌ We don’t want to actually ‘hold’ the data (keep)
▌ Three approaches exist:
 TEE - Trusted Executed Environments/Secure Enclaves – e.g. Intel SGX, Arm TrustZone, RISC-V Keystone
 FHE - Fully Homomorphic Encryption – processing on encrypted (PKI) data.
 MPC - Multiparty Computation – collaborative computation, where no party has the information
SO – HOW CAN WE EAT THE CAKE AND KEEP IT TOO ?
17 © NEC Corporation 2015 NEC Group Internal Use Only17 © NEC Corporation 2019
A comparison of the methods
Framework H/W Speed Quantum
Resilient
Information-
Theoretic
Safe
Compute/power
load on IOT side
Shared
Liability
TEE Yes Fast No No Medium No
FHE No Slow Yes No High No
MPC No Medium Yes Yes Low Yes
18 © NEC Corporation 2015 NEC Group Internal Use Only18 © NEC Corporation 2019
How it works
19 © NEC Corporation 2015 NEC Group Internal Use Only19 © NEC Corporation 2019
Why now ?
▌Speed: MPC can now do ML, speech recognition, simple image
recognition in real-time. In 1-2 years – complex image recognition.
▌GDPR and Privacy Activism – a lot of friction for setting up services.
▌Public Cloud is strong enough to carry MPC/FHE/TEE at scale.
▌5G – bringing multi-connectivity (used by MPC) and SDR – meaning
MPC-share and encryption can be done at eNodeB.
▌Adoption of ML and DL provides ‘standard frameworks’ for analytics.
20 © NEC Corporation 2015 NEC Group Internal Use Only20 © NEC Corporation 2019
Examples of private computing for IOT
▌Location based – safe driving, co-location, deviation from route, Person in need
tracking, retail analytics.
▌Personal electronics (smartphones/wearables) falling down, sleeping, eating, sitting,
exercise.
▌Biometrics – without disclosing user’s data!
▌Utility sensors (electricity, water, gas, dumpsters, doors) – smart billing, disaster
detection, occupancy stats.
▌Camera – License Plate Recognition, people counter, event detection (fire, jam,
crowding, violence, loitering).
▌Audio – event detection (cars, emergency services, gunshot, crowd, wind, rain).
Speech Recognition.
▌Automotive and Mobility infra – using car sensors, road sensors
21 © NEC Corporation 2015 NEC Group Internal Use Only21 © NEC Corporation 2019
Makes Cloud Solutions more secure than edge
▌Cyber protection at the edge requires engineering effort.
▌Alternatively, the IoT service provider can send the data to a CSP-provided ‘MPC Proxy’
▌The proxy creates the MPC shares, routes them through the 5G backbone
▌Public Cloud managed servers run the DL/ML model with MPC support
IoT Device eNodeB
MPC GW
MPC Server A
MPC Server CMPC Server B
CSP Network
Public Cloud
IoT Protocol
22 © NEC Corporation 2015 NEC Group Internal Use Only22 © NEC Corporation 2019
How it works
▌ IoT service provider supplies IoT device IP protocol, and Analytics Algorithm using
the IoT data fields.
▌ IoT devices are provisioned to use the MPC service at the CSP
▌ CSP provided MPC proxy proxies the as IoT server, running the IoT device
protocol, while masking the data fields.
▌ The MPC proxy used the IoT data to create 3 or MPC shares
▌ Those shares are sent to 3 MPC servers along pre-defined IP routes.
▌ The Public Cloud hosted MPC servers run the MPC calculation and send results.
▌ MPC shares can be stored on separately managed S3 instances for future use.
23 © NEC Corporation 2015 NEC Group Internal Use Only23 © NEC Corporation 2019
Why we need TEE/FHE/MPC support in IOT standards
▌Reference open source implementations for IOT side
▌Base Station/SDN open source implementations
▌Routing Model for device=>cloud, avoiding SPT (single point of tamper)
▌Public Cloud Based support
▌Reference implementations for key services.
24 © NEC Corporation 2015 NEC Group Internal Use Only24 © NEC Corporation 2019
Architecture of the solution
MPC shares to 3
switches in 5G NR
BS, using open
source S.W and
H?W design
5G core network
Need to preserver
no contact between MPC shares
Public Cloud
(same region or
multi-region)
MPC server A
MPC server B
MPC server C
IOT edge
devices
5G NR BS
with MPC share
Option in it
25 © NEC Corporation 2015 NEC Group Internal Use Only25 © NEC Corporation 2019
The pilot we are offering
▌MPC gateways-any IOT device can bind using IP with no S/W changes
▌Guaranteed ‘separate routing’ from GW to MPC servers
▌MPC servers in the public cloud, any entity can manage
▌Tools and Support for converting Keras/TF based DNN model into MPC
IOT provider needs to:
▌Provide ML model
▌IOT data format and protocol
26 © NEC Corporation 2015 NEC Group Internal Use Only26 © NEC Corporation 2019
IOT Edge Use cases
27 © NEC Corporation 2015 NEC Group Internal Use Only27 © NEC Corporation 2019
Cloud and Edge: price, performance and privacy considerations in IOT, by Tsvi Lev

Weitere ähnliche Inhalte

Was ist angesagt?

20210805 以5 g與邊緣運算技術佈署物聯網
20210805 以5 g與邊緣運算技術佈署物聯網20210805 以5 g與邊緣運算技術佈署物聯網
20210805 以5 g與邊緣運算技術佈署物聯網Dr. Chang Jung Lee
 
EDGE COMPUTING: VISION AND CHALLENGES
EDGE COMPUTING: VISION AND CHALLENGESEDGE COMPUTING: VISION AND CHALLENGES
EDGE COMPUTING: VISION AND CHALLENGESsuthi
 
Inria | White paper Internet of Things (November 2021)
Inria | White paper Internet of Things (November 2021)Inria | White paper Internet of Things (November 2021)
Inria | White paper Internet of Things (November 2021)Inria
 
Edge Computing Standardisation and Initiatives
Edge Computing Standardisation and InitiativesEdge Computing Standardisation and Initiatives
Edge Computing Standardisation and InitiativesAxel Rennoch
 
The role of edge computing
The role of edge computingThe role of edge computing
The role of edge computingSyam Madanapalli
 
The Platform for the Industrial Internet of Things (IIoT)
The Platform for the Industrial Internet of Things (IIoT)The Platform for the Industrial Internet of Things (IIoT)
The Platform for the Industrial Internet of Things (IIoT)Gerardo Pardo-Castellote
 
Edge Computing : future of IoT ?
Edge Computing : future of IoT ? Edge Computing : future of IoT ?
Edge Computing : future of IoT ? Samir Bounab
 
Internet of everything
Internet of everything Internet of everything
Internet of everything Jayesh Pai
 
IoT Security Assessment - IEEE PAR Proposal
IoT Security Assessment - IEEE PAR ProposalIoT Security Assessment - IEEE PAR Proposal
IoT Security Assessment - IEEE PAR ProposalSyam Madanapalli
 
ADLINK And InfluxDB Deliver Operational Efficiency For Defense Industry With ...
ADLINK And InfluxDB Deliver Operational Efficiency For Defense Industry With ...ADLINK And InfluxDB Deliver Operational Efficiency For Defense Industry With ...
ADLINK And InfluxDB Deliver Operational Efficiency For Defense Industry With ...DevOps.com
 
Cisco-Security & Survelliance Ürünleri
Cisco-Security & Survelliance ÜrünleriCisco-Security & Survelliance Ürünleri
Cisco-Security & Survelliance Ürünlericem lale
 
THE ROLE OF EDGE COMPUTING IN INTERNET OF THINGS
THE ROLE OF EDGE COMPUTING IN INTERNET OF THINGSTHE ROLE OF EDGE COMPUTING IN INTERNET OF THINGS
THE ROLE OF EDGE COMPUTING IN INTERNET OF THINGSsuthi
 
IoT with 5G-Network
IoT with 5G-NetworkIoT with 5G-Network
IoT with 5G-NetworkBelal Ashraf
 
Soldatos io t-academy-cosmote-231117-v-final
Soldatos io t-academy-cosmote-231117-v-finalSoldatos io t-academy-cosmote-231117-v-final
Soldatos io t-academy-cosmote-231117-v-finalJohn Soldatos
 
Edge Computing and 5G - SDN/NFV London meetup
Edge Computing and 5G - SDN/NFV London meetupEdge Computing and 5G - SDN/NFV London meetup
Edge Computing and 5G - SDN/NFV London meetupHaidee McMahon
 
Horizon 2020 IoT Project Sofie Secure Open Federation of Internet Everywhere ...
Horizon 2020 IoT Project Sofie Secure Open Federation of Internet Everywhere ...Horizon 2020 IoT Project Sofie Secure Open Federation of Internet Everywhere ...
Horizon 2020 IoT Project Sofie Secure Open Federation of Internet Everywhere ...hubraum IoT Academy
 

Was ist angesagt? (20)

20210805 以5 g與邊緣運算技術佈署物聯網
20210805 以5 g與邊緣運算技術佈署物聯網20210805 以5 g與邊緣運算技術佈署物聯網
20210805 以5 g與邊緣運算技術佈署物聯網
 
EDGE COMPUTING: VISION AND CHALLENGES
EDGE COMPUTING: VISION AND CHALLENGESEDGE COMPUTING: VISION AND CHALLENGES
EDGE COMPUTING: VISION AND CHALLENGES
 
Inria | White paper Internet of Things (November 2021)
Inria | White paper Internet of Things (November 2021)Inria | White paper Internet of Things (November 2021)
Inria | White paper Internet of Things (November 2021)
 
Edge Computing Standardisation and Initiatives
Edge Computing Standardisation and InitiativesEdge Computing Standardisation and Initiatives
Edge Computing Standardisation and Initiatives
 
The role of edge computing
The role of edge computingThe role of edge computing
The role of edge computing
 
The Platform for the Industrial Internet of Things (IIoT)
The Platform for the Industrial Internet of Things (IIoT)The Platform for the Industrial Internet of Things (IIoT)
The Platform for the Industrial Internet of Things (IIoT)
 
Edge Computing : future of IoT ?
Edge Computing : future of IoT ? Edge Computing : future of IoT ?
Edge Computing : future of IoT ?
 
Internet Of EveryThing
Internet Of EveryThingInternet Of EveryThing
Internet Of EveryThing
 
Internet of everything
Internet of everything Internet of everything
Internet of everything
 
IoT Security Assessment - IEEE PAR Proposal
IoT Security Assessment - IEEE PAR ProposalIoT Security Assessment - IEEE PAR Proposal
IoT Security Assessment - IEEE PAR Proposal
 
Internet of energy
Internet of energyInternet of energy
Internet of energy
 
ADLINK And InfluxDB Deliver Operational Efficiency For Defense Industry With ...
ADLINK And InfluxDB Deliver Operational Efficiency For Defense Industry With ...ADLINK And InfluxDB Deliver Operational Efficiency For Defense Industry With ...
ADLINK And InfluxDB Deliver Operational Efficiency For Defense Industry With ...
 
Cisco-Security & Survelliance Ürünleri
Cisco-Security & Survelliance ÜrünleriCisco-Security & Survelliance Ürünleri
Cisco-Security & Survelliance Ürünleri
 
Mobile Edge Computing
Mobile Edge ComputingMobile Edge Computing
Mobile Edge Computing
 
EENA2019: Track2 session4 _Study of use cases and communications involving Io...
EENA2019: Track2 session4 _Study of use cases and communications involving Io...EENA2019: Track2 session4 _Study of use cases and communications involving Io...
EENA2019: Track2 session4 _Study of use cases and communications involving Io...
 
THE ROLE OF EDGE COMPUTING IN INTERNET OF THINGS
THE ROLE OF EDGE COMPUTING IN INTERNET OF THINGSTHE ROLE OF EDGE COMPUTING IN INTERNET OF THINGS
THE ROLE OF EDGE COMPUTING IN INTERNET OF THINGS
 
IoT with 5G-Network
IoT with 5G-NetworkIoT with 5G-Network
IoT with 5G-Network
 
Soldatos io t-academy-cosmote-231117-v-final
Soldatos io t-academy-cosmote-231117-v-finalSoldatos io t-academy-cosmote-231117-v-final
Soldatos io t-academy-cosmote-231117-v-final
 
Edge Computing and 5G - SDN/NFV London meetup
Edge Computing and 5G - SDN/NFV London meetupEdge Computing and 5G - SDN/NFV London meetup
Edge Computing and 5G - SDN/NFV London meetup
 
Horizon 2020 IoT Project Sofie Secure Open Federation of Internet Everywhere ...
Horizon 2020 IoT Project Sofie Secure Open Federation of Internet Everywhere ...Horizon 2020 IoT Project Sofie Secure Open Federation of Internet Everywhere ...
Horizon 2020 IoT Project Sofie Secure Open Federation of Internet Everywhere ...
 

Ähnlich wie Cloud and Edge: price, performance and privacy considerations in IOT, by Tsvi Lev

Dynamic Software Defined Network Infrastructure Test Bed at Marist College
Dynamic Software Defined Network Infrastructure Test Bed at Marist CollegeDynamic Software Defined Network Infrastructure Test Bed at Marist College
Dynamic Software Defined Network Infrastructure Test Bed at Marist CollegeADVA
 
El IoT y la gestión de las empresas del futuro, IGNASI ERRANDO, CISCO
El IoT y la gestión de las empresas del futuro, IGNASI ERRANDO, CISCOEl IoT y la gestión de las empresas del futuro, IGNASI ERRANDO, CISCO
El IoT y la gestión de las empresas del futuro, IGNASI ERRANDO, CISCODomotys
 
Effective IoT System on Openstack
Effective IoT System on OpenstackEffective IoT System on Openstack
Effective IoT System on OpenstackTakashi Kajinami
 
Introduction IOT/M2M
Introduction IOT/M2MIntroduction IOT/M2M
Introduction IOT/M2MLeKhanhAnh
 
Report the whole IoT r0.0.pptx
Report   the whole IoT r0.0.pptxReport   the whole IoT r0.0.pptx
Report the whole IoT r0.0.pptxoldmanegan
 
Ramin elahi fog_computing_ecosystem_final_dec22_updated
Ramin elahi fog_computing_ecosystem_final_dec22_updatedRamin elahi fog_computing_ecosystem_final_dec22_updated
Ramin elahi fog_computing_ecosystem_final_dec22_updatedHarshitParkar6677
 
Open Source for Industry 4.0 – Open IoT Summit NA 2018
Open Source for Industry 4.0 – Open IoT Summit NA 2018Open Source for Industry 4.0 – Open IoT Summit NA 2018
Open Source for Industry 4.0 – Open IoT Summit NA 2018Benjamin Cabé
 
The IoT Food Chain – Picking the Right Dining Partner is Important with Dean ...
The IoT Food Chain – Picking the Right Dining Partner is Important with Dean ...The IoT Food Chain – Picking the Right Dining Partner is Important with Dean ...
The IoT Food Chain – Picking the Right Dining Partner is Important with Dean ...gogo6
 
ieeecompsoc-180814120838.pptx
ieeecompsoc-180814120838.pptxieeecompsoc-180814120838.pptx
ieeecompsoc-180814120838.pptxWalidMG1
 
Transforming to Enable 5G
Transforming to Enable 5GTransforming to Enable 5G
Transforming to Enable 5GLumina Networks
 
IoT World Forum Press Conference - 10.14.2014
IoT World Forum Press Conference - 10.14.2014IoT World Forum Press Conference - 10.14.2014
IoT World Forum Press Conference - 10.14.2014Bessie Wang
 
ieeecompsoc-180814120838 (1).pptx
ieeecompsoc-180814120838 (1).pptxieeecompsoc-180814120838 (1).pptx
ieeecompsoc-180814120838 (1).pptxWalidMG1
 
Standardized Service Layering for IoT in oneM2M
Standardized Service Layering for IoT in oneM2MStandardized Service Layering for IoT in oneM2M
Standardized Service Layering for IoT in oneM2MNicolas Damour
 
120": Internet of Drones
120": Internet of Drones 120": Internet of Drones
120": Internet of Drones JIC
 

Ähnlich wie Cloud and Edge: price, performance and privacy considerations in IOT, by Tsvi Lev (20)

Dynamic Software Defined Network Infrastructure Test Bed at Marist College
Dynamic Software Defined Network Infrastructure Test Bed at Marist CollegeDynamic Software Defined Network Infrastructure Test Bed at Marist College
Dynamic Software Defined Network Infrastructure Test Bed at Marist College
 
CLOUD-NATIVE NETWORKS FOR THE ADVANCEMENT OF AI/IoT
CLOUD-NATIVE NETWORKS FOR THE ADVANCEMENT OF AI/IoTCLOUD-NATIVE NETWORKS FOR THE ADVANCEMENT OF AI/IoT
CLOUD-NATIVE NETWORKS FOR THE ADVANCEMENT OF AI/IoT
 
Cloud Computing and Edge Computing(CTO Kieun Park) - Edge Computing Seminar
Cloud Computing and Edge Computing(CTO Kieun Park) - Edge Computing SeminarCloud Computing and Edge Computing(CTO Kieun Park) - Edge Computing Seminar
Cloud Computing and Edge Computing(CTO Kieun Park) - Edge Computing Seminar
 
Ibm iot overview
Ibm   iot overviewIbm   iot overview
Ibm iot overview
 
NEC-IBM_Event_093015
NEC-IBM_Event_093015NEC-IBM_Event_093015
NEC-IBM_Event_093015
 
El IoT y la gestión de las empresas del futuro, IGNASI ERRANDO, CISCO
El IoT y la gestión de las empresas del futuro, IGNASI ERRANDO, CISCOEl IoT y la gestión de las empresas del futuro, IGNASI ERRANDO, CISCO
El IoT y la gestión de las empresas del futuro, IGNASI ERRANDO, CISCO
 
Effective IoT System on Openstack
Effective IoT System on OpenstackEffective IoT System on Openstack
Effective IoT System on Openstack
 
Introduction IOT/M2M
Introduction IOT/M2MIntroduction IOT/M2M
Introduction IOT/M2M
 
Smart & Safer Cities by Richard Knight
Smart & Safer Cities by Richard KnightSmart & Safer Cities by Richard Knight
Smart & Safer Cities by Richard Knight
 
Report the whole IoT r0.0.pptx
Report   the whole IoT r0.0.pptxReport   the whole IoT r0.0.pptx
Report the whole IoT r0.0.pptx
 
Ramin elahi fog_computing_ecosystem_final_dec22_updated
Ramin elahi fog_computing_ecosystem_final_dec22_updatedRamin elahi fog_computing_ecosystem_final_dec22_updated
Ramin elahi fog_computing_ecosystem_final_dec22_updated
 
Open Source for Industry 4.0 – Open IoT Summit NA 2018
Open Source for Industry 4.0 – Open IoT Summit NA 2018Open Source for Industry 4.0 – Open IoT Summit NA 2018
Open Source for Industry 4.0 – Open IoT Summit NA 2018
 
The IoT Food Chain – Picking the Right Dining Partner is Important with Dean ...
The IoT Food Chain – Picking the Right Dining Partner is Important with Dean ...The IoT Food Chain – Picking the Right Dining Partner is Important with Dean ...
The IoT Food Chain – Picking the Right Dining Partner is Important with Dean ...
 
ieeecompsoc-180814120838.pptx
ieeecompsoc-180814120838.pptxieeecompsoc-180814120838.pptx
ieeecompsoc-180814120838.pptx
 
Edge Computing
Edge ComputingEdge Computing
Edge Computing
 
Transforming to Enable 5G
Transforming to Enable 5GTransforming to Enable 5G
Transforming to Enable 5G
 
IoT World Forum Press Conference - 10.14.2014
IoT World Forum Press Conference - 10.14.2014IoT World Forum Press Conference - 10.14.2014
IoT World Forum Press Conference - 10.14.2014
 
ieeecompsoc-180814120838 (1).pptx
ieeecompsoc-180814120838 (1).pptxieeecompsoc-180814120838 (1).pptx
ieeecompsoc-180814120838 (1).pptx
 
Standardized Service Layering for IoT in oneM2M
Standardized Service Layering for IoT in oneM2MStandardized Service Layering for IoT in oneM2M
Standardized Service Layering for IoT in oneM2M
 
120": Internet of Drones
120": Internet of Drones 120": Internet of Drones
120": Internet of Drones
 

Mehr von Cloud Native Day Tel Aviv

Cloud Native is a Cultural Decision. By Reshef Mann
Cloud Native is a Cultural Decision. By Reshef MannCloud Native is a Cultural Decision. By Reshef Mann
Cloud Native is a Cultural Decision. By Reshef MannCloud Native Day Tel Aviv
 
Container Runtime Security with Falco, by Néstor Salceda
Container Runtime Security with Falco, by Néstor SalcedaContainer Runtime Security with Falco, by Néstor Salceda
Container Runtime Security with Falco, by Néstor SalcedaCloud Native Day Tel Aviv
 
Kafka Mirror Tester: Go and Kubernetes Powered Test Suite for Kafka Replicati...
Kafka Mirror Tester: Go and Kubernetes Powered Test Suite for Kafka Replicati...Kafka Mirror Tester: Go and Kubernetes Powered Test Suite for Kafka Replicati...
Kafka Mirror Tester: Go and Kubernetes Powered Test Suite for Kafka Replicati...Cloud Native Day Tel Aviv
 
Running I/O intensive workloads on Kubernetes, by Nati Shalom
Running I/O intensive workloads on Kubernetes, by Nati ShalomRunning I/O intensive workloads on Kubernetes, by Nati Shalom
Running I/O intensive workloads on Kubernetes, by Nati ShalomCloud Native Day Tel Aviv
 
WTF Do We Need a Service Mesh? By Anton Weiss.
WTF Do We Need a Service Mesh? By Anton Weiss.WTF Do We Need a Service Mesh? By Anton Weiss.
WTF Do We Need a Service Mesh? By Anton Weiss.Cloud Native Day Tel Aviv
 
Update Strategies for the Edge, by Kat Cosgrove
Update Strategies for the Edge, by Kat CosgroveUpdate Strategies for the Edge, by Kat Cosgrove
Update Strategies for the Edge, by Kat CosgroveCloud Native Day Tel Aviv
 
Building a Cloud-Native SaaS Product The Hard Way. By Arthur Berezin
Building a Cloud-Native SaaS Product The Hard Way. By Arthur BerezinBuilding a Cloud-Native SaaS Product The Hard Way. By Arthur Berezin
Building a Cloud-Native SaaS Product The Hard Way. By Arthur BerezinCloud Native Day Tel Aviv
 
The Four Questions (Every Monitoring Engineer gets asked), by Leon Adato
The Four Questions (Every Monitoring Engineer gets asked), by Leon AdatoThe Four Questions (Every Monitoring Engineer gets asked), by Leon Adato
The Four Questions (Every Monitoring Engineer gets asked), by Leon AdatoCloud Native Day Tel Aviv
 
K8s Pod Scheduling - Deep Dive. By Tsahi Duek.
K8s Pod Scheduling - Deep Dive. By Tsahi Duek.K8s Pod Scheduling - Deep Dive. By Tsahi Duek.
K8s Pod Scheduling - Deep Dive. By Tsahi Duek.Cloud Native Day Tel Aviv
 
Cloud Native: The Cattle, the Pets, and the Germs, by Avishai Ish-Shalom
Cloud Native: The Cattle, the Pets, and the Germs, by Avishai Ish-ShalomCloud Native: The Cattle, the Pets, and the Germs, by Avishai Ish-Shalom
Cloud Native: The Cattle, the Pets, and the Germs, by Avishai Ish-ShalomCloud Native Day Tel Aviv
 
MySQL Shell: the daily tool for devs and admins. By Vittorio Cioe.
MySQL Shell: the daily tool for devs and admins. By Vittorio Cioe.MySQL Shell: the daily tool for devs and admins. By Vittorio Cioe.
MySQL Shell: the daily tool for devs and admins. By Vittorio Cioe.Cloud Native Day Tel Aviv
 
Cloud native transformation patterns, by Pini Reznik
Cloud native transformation patterns, by Pini ReznikCloud native transformation patterns, by Pini Reznik
Cloud native transformation patterns, by Pini ReznikCloud Native Day Tel Aviv
 
Two Years, Zero servers: Lessons learned from running a startup 100% on Serve...
Two Years, Zero servers: Lessons learned from running a startup 100% on Serve...Two Years, Zero servers: Lessons learned from running a startup 100% on Serve...
Two Years, Zero servers: Lessons learned from running a startup 100% on Serve...Cloud Native Day Tel Aviv
 
12 Factor Serverless Applications - Mike Morain, AWS - Cloud Native Day Tel A...
12 Factor Serverless Applications - Mike Morain, AWS - Cloud Native Day Tel A...12 Factor Serverless Applications - Mike Morain, AWS - Cloud Native Day Tel A...
12 Factor Serverless Applications - Mike Morain, AWS - Cloud Native Day Tel A...Cloud Native Day Tel Aviv
 
Not my problem! Delegating responsibilities to the infrastructure - Yshay Yaa...
Not my problem! Delegating responsibilities to the infrastructure - Yshay Yaa...Not my problem! Delegating responsibilities to the infrastructure - Yshay Yaa...
Not my problem! Delegating responsibilities to the infrastructure - Yshay Yaa...Cloud Native Day Tel Aviv
 
Brain in the Cloud: Machine Learning on OpenStack & Kubernetes Done Right - E...
Brain in the Cloud: Machine Learning on OpenStack & Kubernetes Done Right - E...Brain in the Cloud: Machine Learning on OpenStack & Kubernetes Done Right - E...
Brain in the Cloud: Machine Learning on OpenStack & Kubernetes Done Right - E...Cloud Native Day Tel Aviv
 
A stateful application walks into a Kubernetes bar - Arthur Berezin, JovianX ...
A stateful application walks into a Kubernetes bar - Arthur Berezin, JovianX ...A stateful application walks into a Kubernetes bar - Arthur Berezin, JovianX ...
A stateful application walks into a Kubernetes bar - Arthur Berezin, JovianX ...Cloud Native Day Tel Aviv
 
The story of how KubeMQ was born - Oz Golan, KubeMQ - Cloud Native Day Tel Av...
The story of how KubeMQ was born - Oz Golan, KubeMQ - Cloud Native Day Tel Av...The story of how KubeMQ was born - Oz Golan, KubeMQ - Cloud Native Day Tel Av...
The story of how KubeMQ was born - Oz Golan, KubeMQ - Cloud Native Day Tel Av...Cloud Native Day Tel Aviv
 
I want it all: go hybrid - Orit Yaron, Outbrain - Cloud Native Day Tel Aviv 2018
I want it all: go hybrid - Orit Yaron, Outbrain - Cloud Native Day Tel Aviv 2018I want it all: go hybrid - Orit Yaron, Outbrain - Cloud Native Day Tel Aviv 2018
I want it all: go hybrid - Orit Yaron, Outbrain - Cloud Native Day Tel Aviv 2018Cloud Native Day Tel Aviv
 
Keeping I.T. Real - Aaron Wolf, Mathematics and computer programming teacher,...
Keeping I.T. Real - Aaron Wolf, Mathematics and computer programming teacher,...Keeping I.T. Real - Aaron Wolf, Mathematics and computer programming teacher,...
Keeping I.T. Real - Aaron Wolf, Mathematics and computer programming teacher,...Cloud Native Day Tel Aviv
 

Mehr von Cloud Native Day Tel Aviv (20)

Cloud Native is a Cultural Decision. By Reshef Mann
Cloud Native is a Cultural Decision. By Reshef MannCloud Native is a Cultural Decision. By Reshef Mann
Cloud Native is a Cultural Decision. By Reshef Mann
 
Container Runtime Security with Falco, by Néstor Salceda
Container Runtime Security with Falco, by Néstor SalcedaContainer Runtime Security with Falco, by Néstor Salceda
Container Runtime Security with Falco, by Néstor Salceda
 
Kafka Mirror Tester: Go and Kubernetes Powered Test Suite for Kafka Replicati...
Kafka Mirror Tester: Go and Kubernetes Powered Test Suite for Kafka Replicati...Kafka Mirror Tester: Go and Kubernetes Powered Test Suite for Kafka Replicati...
Kafka Mirror Tester: Go and Kubernetes Powered Test Suite for Kafka Replicati...
 
Running I/O intensive workloads on Kubernetes, by Nati Shalom
Running I/O intensive workloads on Kubernetes, by Nati ShalomRunning I/O intensive workloads on Kubernetes, by Nati Shalom
Running I/O intensive workloads on Kubernetes, by Nati Shalom
 
WTF Do We Need a Service Mesh? By Anton Weiss.
WTF Do We Need a Service Mesh? By Anton Weiss.WTF Do We Need a Service Mesh? By Anton Weiss.
WTF Do We Need a Service Mesh? By Anton Weiss.
 
Update Strategies for the Edge, by Kat Cosgrove
Update Strategies for the Edge, by Kat CosgroveUpdate Strategies for the Edge, by Kat Cosgrove
Update Strategies for the Edge, by Kat Cosgrove
 
Building a Cloud-Native SaaS Product The Hard Way. By Arthur Berezin
Building a Cloud-Native SaaS Product The Hard Way. By Arthur BerezinBuilding a Cloud-Native SaaS Product The Hard Way. By Arthur Berezin
Building a Cloud-Native SaaS Product The Hard Way. By Arthur Berezin
 
The Four Questions (Every Monitoring Engineer gets asked), by Leon Adato
The Four Questions (Every Monitoring Engineer gets asked), by Leon AdatoThe Four Questions (Every Monitoring Engineer gets asked), by Leon Adato
The Four Questions (Every Monitoring Engineer gets asked), by Leon Adato
 
K8s Pod Scheduling - Deep Dive. By Tsahi Duek.
K8s Pod Scheduling - Deep Dive. By Tsahi Duek.K8s Pod Scheduling - Deep Dive. By Tsahi Duek.
K8s Pod Scheduling - Deep Dive. By Tsahi Duek.
 
Cloud Native: The Cattle, the Pets, and the Germs, by Avishai Ish-Shalom
Cloud Native: The Cattle, the Pets, and the Germs, by Avishai Ish-ShalomCloud Native: The Cattle, the Pets, and the Germs, by Avishai Ish-Shalom
Cloud Native: The Cattle, the Pets, and the Germs, by Avishai Ish-Shalom
 
MySQL Shell: the daily tool for devs and admins. By Vittorio Cioe.
MySQL Shell: the daily tool for devs and admins. By Vittorio Cioe.MySQL Shell: the daily tool for devs and admins. By Vittorio Cioe.
MySQL Shell: the daily tool for devs and admins. By Vittorio Cioe.
 
Cloud native transformation patterns, by Pini Reznik
Cloud native transformation patterns, by Pini ReznikCloud native transformation patterns, by Pini Reznik
Cloud native transformation patterns, by Pini Reznik
 
Two Years, Zero servers: Lessons learned from running a startup 100% on Serve...
Two Years, Zero servers: Lessons learned from running a startup 100% on Serve...Two Years, Zero servers: Lessons learned from running a startup 100% on Serve...
Two Years, Zero servers: Lessons learned from running a startup 100% on Serve...
 
12 Factor Serverless Applications - Mike Morain, AWS - Cloud Native Day Tel A...
12 Factor Serverless Applications - Mike Morain, AWS - Cloud Native Day Tel A...12 Factor Serverless Applications - Mike Morain, AWS - Cloud Native Day Tel A...
12 Factor Serverless Applications - Mike Morain, AWS - Cloud Native Day Tel A...
 
Not my problem! Delegating responsibilities to the infrastructure - Yshay Yaa...
Not my problem! Delegating responsibilities to the infrastructure - Yshay Yaa...Not my problem! Delegating responsibilities to the infrastructure - Yshay Yaa...
Not my problem! Delegating responsibilities to the infrastructure - Yshay Yaa...
 
Brain in the Cloud: Machine Learning on OpenStack & Kubernetes Done Right - E...
Brain in the Cloud: Machine Learning on OpenStack & Kubernetes Done Right - E...Brain in the Cloud: Machine Learning on OpenStack & Kubernetes Done Right - E...
Brain in the Cloud: Machine Learning on OpenStack & Kubernetes Done Right - E...
 
A stateful application walks into a Kubernetes bar - Arthur Berezin, JovianX ...
A stateful application walks into a Kubernetes bar - Arthur Berezin, JovianX ...A stateful application walks into a Kubernetes bar - Arthur Berezin, JovianX ...
A stateful application walks into a Kubernetes bar - Arthur Berezin, JovianX ...
 
The story of how KubeMQ was born - Oz Golan, KubeMQ - Cloud Native Day Tel Av...
The story of how KubeMQ was born - Oz Golan, KubeMQ - Cloud Native Day Tel Av...The story of how KubeMQ was born - Oz Golan, KubeMQ - Cloud Native Day Tel Av...
The story of how KubeMQ was born - Oz Golan, KubeMQ - Cloud Native Day Tel Av...
 
I want it all: go hybrid - Orit Yaron, Outbrain - Cloud Native Day Tel Aviv 2018
I want it all: go hybrid - Orit Yaron, Outbrain - Cloud Native Day Tel Aviv 2018I want it all: go hybrid - Orit Yaron, Outbrain - Cloud Native Day Tel Aviv 2018
I want it all: go hybrid - Orit Yaron, Outbrain - Cloud Native Day Tel Aviv 2018
 
Keeping I.T. Real - Aaron Wolf, Mathematics and computer programming teacher,...
Keeping I.T. Real - Aaron Wolf, Mathematics and computer programming teacher,...Keeping I.T. Real - Aaron Wolf, Mathematics and computer programming teacher,...
Keeping I.T. Real - Aaron Wolf, Mathematics and computer programming teacher,...
 

Kürzlich hochgeladen

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 

Kürzlich hochgeladen (20)

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 

Cloud and Edge: price, performance and privacy considerations in IOT, by Tsvi Lev

  • 1. Tsvi Lev, Corporate VP & Head of NEC Labs Israel tsvi.lev@necam.com Private Computing for IOT
  • 2. 2 © NEC Corporation 2015 NEC Group Internal Use Only2 © NEC Corporation 2019 NEC celebrates 120
  • 3. 3 © NEC Corporation 2015 NEC Group Internal Use Only3 © NEC Corporation 2019 NEC Stats ▌Business In >160 Countries ▌9 Global Research Labs, 1,000 researchers ▌>0.5% of Revenue=>Research: ¼ Billion$ North America Europe, Middel East and Africa Greater China Japan Asia-Pacific 1 1 1
  • 4. 4 © NEC Corporation 2015 NEC Group Internal Use Only4 © NEC Corporation 2019 Continued emphasis on Research Innovation
  • 5. 5 © NEC Corporation 2015 NEC Group Internal Use Only5 © NEC Corporation 2019 NEC’s Israeli Center – Open Research Innovation ▌ Established to promote external technologies into NEC ▌Centered around AI applications to Vision, Cyber, Medical ▌Research collaborations with MIT,TAU, BGU, BIU. ▌30+ H/C and growing – 7 PhD, 10 MSc. ACM CCS Best Paper Edge AI for Vision Cyber Research AI for Healthcare
  • 6. 6 © NEC Corporation 2015 NEC Group Internal Use Only6 © NEC Corporation 2019 1st Generation Cloud Use ▌SaaS – Office 365, Salesforce etc. ▌Lift and Shift - Offload on-premise servers: cost, reliability, security ▌PaaS – use Cloud DB, Web applications. ▌The Edge is a computer – on premise PC, user’s browser, smartphone. ▌Clear division of data ownership, governance, liability. ▌Privacy is ensured by ‘traditional’ cyber, encryption and regulation. ▌Ensured… Well..
  • 7. 7 © NEC Corporation 2015 NEC Group Internal Use Only7 © NEC Corporation 2019 As predicted already in 1992..
  • 8. 8 © NEC Corporation 2015 NEC Group Internal Use Only8 © NEC Corporation 2019 And now IOT..
  • 9. 9 © NEC Corporation 2015 NEC Group Internal Use Only9 © NEC Corporation 2019 IoT - Cloud use ▌IOT sensors – upload data to cloud for processing, storage. ▌Cameras – heavy upload, some edge processing (alerts, detection). ▌A Jungle of protocols, O/S, data types, security models. ▌Mobile Apps to cloud are a mixed case..
  • 10. 10 © NEC Corporation 2015 NEC Group Internal Use Only10 © NEC Corporation 2019 Privacy Liability and Regulation – who is responsible Edge Device Edge Platform Cloud Data on Edge Data in Motion Data on Cloud PC PC owner Service Provider PC owner Nobody Service Provider Mobile Apps Unclear Service Provider Not Clear Nobody Service Provider IOT Service Provider Service Provider Service Provider Service Provider Service Provider
  • 11. 11 © NEC Corporation 2015 NEC Group Internal Use Only11 © NEC Corporation 2019 IoT Data Breaches create friction for everyone ▌Regulation: private (consumer) data storage and protection laws ▌GDPR – restricts permissions to use, borders, retention ▌Collateral damage – your IoT equipment/data can harm 3rd parties ▌Even ‘established encryption’ is not future proof – since 2015 it takes <4 hours to break a 512bit RSA key, which was 25% of servers in 2000, and 4% even today… 8% of Dyn’s customer base stopped using them
  • 12. 12 © NEC Corporation 2015 NEC Group Internal Use Only12 © NEC Corporation 2019 The data of today can be stolen tomorrow Should we care? Financial Records, Location, medical records, documents have value 10-20 years after creation For example – location & time => where you live, where you work, health status, occupation, martial status etc.
  • 13. 13 © NEC Corporation 2015 NEC Group Internal Use Only13 © NEC Corporation 2019 Private Computing: Data Use is actively limited to pre-defined, monitored objectives. ▌Privacy solutions emerge– forums, open source projects, corporate support – Microsoft, Intel, IBM, SAP, startups. ▌“High End Implementations” – partnerships of BFSI etc. Fast compute and network, high complexity implementation. Trends in Private Computing
  • 14. 14 © NEC Corporation 2015 NEC Group Internal Use Only14 © NEC Corporation 2019 Secure, Private Computing for IoT – the IoTopia Initiative
  • 15. 15 © NEC Corporation 2015 NEC Group Internal Use Only15 © NEC Corporation 2019 Privacy Concerns in IOT – Gartner Reccomendations ▌ IoT strategy MUST involve legal advisors. ▌ Privacy is not just PID – it is any information about users that does not serve the ‘stated purpose’ of the application. ▌ Recommend ‘privacy preserving’ tech like MPC, Blockchain etc. ▌ Estimate 1B$ in 2021 spent just on IoT Regulatory Compliance. ▌ Best to purge data asap – not hold it. Sample IoT application, which generates private data even if not PID
  • 16. 16 © NEC Corporation 2015 NEC Group Internal Use Only16 © NEC Corporation 2019 ▌ We want answers to questions based on private date (eat) ▌ We don’t want to actually ‘hold’ the data (keep) ▌ Three approaches exist:  TEE - Trusted Executed Environments/Secure Enclaves – e.g. Intel SGX, Arm TrustZone, RISC-V Keystone  FHE - Fully Homomorphic Encryption – processing on encrypted (PKI) data.  MPC - Multiparty Computation – collaborative computation, where no party has the information SO – HOW CAN WE EAT THE CAKE AND KEEP IT TOO ?
  • 17. 17 © NEC Corporation 2015 NEC Group Internal Use Only17 © NEC Corporation 2019 A comparison of the methods Framework H/W Speed Quantum Resilient Information- Theoretic Safe Compute/power load on IOT side Shared Liability TEE Yes Fast No No Medium No FHE No Slow Yes No High No MPC No Medium Yes Yes Low Yes
  • 18. 18 © NEC Corporation 2015 NEC Group Internal Use Only18 © NEC Corporation 2019 How it works
  • 19. 19 © NEC Corporation 2015 NEC Group Internal Use Only19 © NEC Corporation 2019 Why now ? ▌Speed: MPC can now do ML, speech recognition, simple image recognition in real-time. In 1-2 years – complex image recognition. ▌GDPR and Privacy Activism – a lot of friction for setting up services. ▌Public Cloud is strong enough to carry MPC/FHE/TEE at scale. ▌5G – bringing multi-connectivity (used by MPC) and SDR – meaning MPC-share and encryption can be done at eNodeB. ▌Adoption of ML and DL provides ‘standard frameworks’ for analytics.
  • 20. 20 © NEC Corporation 2015 NEC Group Internal Use Only20 © NEC Corporation 2019 Examples of private computing for IOT ▌Location based – safe driving, co-location, deviation from route, Person in need tracking, retail analytics. ▌Personal electronics (smartphones/wearables) falling down, sleeping, eating, sitting, exercise. ▌Biometrics – without disclosing user’s data! ▌Utility sensors (electricity, water, gas, dumpsters, doors) – smart billing, disaster detection, occupancy stats. ▌Camera – License Plate Recognition, people counter, event detection (fire, jam, crowding, violence, loitering). ▌Audio – event detection (cars, emergency services, gunshot, crowd, wind, rain). Speech Recognition. ▌Automotive and Mobility infra – using car sensors, road sensors
  • 21. 21 © NEC Corporation 2015 NEC Group Internal Use Only21 © NEC Corporation 2019 Makes Cloud Solutions more secure than edge ▌Cyber protection at the edge requires engineering effort. ▌Alternatively, the IoT service provider can send the data to a CSP-provided ‘MPC Proxy’ ▌The proxy creates the MPC shares, routes them through the 5G backbone ▌Public Cloud managed servers run the DL/ML model with MPC support IoT Device eNodeB MPC GW MPC Server A MPC Server CMPC Server B CSP Network Public Cloud IoT Protocol
  • 22. 22 © NEC Corporation 2015 NEC Group Internal Use Only22 © NEC Corporation 2019 How it works ▌ IoT service provider supplies IoT device IP protocol, and Analytics Algorithm using the IoT data fields. ▌ IoT devices are provisioned to use the MPC service at the CSP ▌ CSP provided MPC proxy proxies the as IoT server, running the IoT device protocol, while masking the data fields. ▌ The MPC proxy used the IoT data to create 3 or MPC shares ▌ Those shares are sent to 3 MPC servers along pre-defined IP routes. ▌ The Public Cloud hosted MPC servers run the MPC calculation and send results. ▌ MPC shares can be stored on separately managed S3 instances for future use.
  • 23. 23 © NEC Corporation 2015 NEC Group Internal Use Only23 © NEC Corporation 2019 Why we need TEE/FHE/MPC support in IOT standards ▌Reference open source implementations for IOT side ▌Base Station/SDN open source implementations ▌Routing Model for device=>cloud, avoiding SPT (single point of tamper) ▌Public Cloud Based support ▌Reference implementations for key services.
  • 24. 24 © NEC Corporation 2015 NEC Group Internal Use Only24 © NEC Corporation 2019 Architecture of the solution MPC shares to 3 switches in 5G NR BS, using open source S.W and H?W design 5G core network Need to preserver no contact between MPC shares Public Cloud (same region or multi-region) MPC server A MPC server B MPC server C IOT edge devices 5G NR BS with MPC share Option in it
  • 25. 25 © NEC Corporation 2015 NEC Group Internal Use Only25 © NEC Corporation 2019 The pilot we are offering ▌MPC gateways-any IOT device can bind using IP with no S/W changes ▌Guaranteed ‘separate routing’ from GW to MPC servers ▌MPC servers in the public cloud, any entity can manage ▌Tools and Support for converting Keras/TF based DNN model into MPC IOT provider needs to: ▌Provide ML model ▌IOT data format and protocol
  • 26. 26 © NEC Corporation 2015 NEC Group Internal Use Only26 © NEC Corporation 2019 IOT Edge Use cases
  • 27. 27 © NEC Corporation 2015 NEC Group Internal Use Only27 © NEC Corporation 2019

Hinweis der Redaktion

  1. NEC conducts business globally in over 160 countries with our Global HQ in Japan. Our network of 9 global research labs employ over 1,000 research professionals allocating over 1.2 Billion or more than 5% of NEC annual revenue to innovation and developing solutions that contribite to society.
  2. We looked on Medical startups in Israel, as SW solution that not evolves additional devices, We thought that CAD system is a good candidate for us, as it SW based solution that stand alone and not need specific device or system, the data itself is pixel base And It not tied to hospital Moreover most of the CAD solution base on DL/ML that become a majority field in NEC, and as NEC has already one of the best EMR system in Japan, we thought CAD project can be a good match for us
  3. We looked on Medical startups in Israel, as SW solution that not evolves additional devices, We thought that CAD system is a good candidate for us, as it SW based solution that stand alone and not need specific device or system, the data itself is pixel base And It not tied to hospital Moreover most of the CAD solution base on DL/ML that become a majority field in NEC, and as NEC has already one of the best EMR system in Japan, we thought CAD project can be a good match for us
  4. We looked on Medical startups in Israel, as SW solution that not evolves additional devices, We thought that CAD system is a good candidate for us, as it SW based solution that stand alone and not need specific device or system, the data itself is pixel base And It not tied to hospital Moreover most of the CAD solution base on DL/ML that become a majority field in NEC, and as NEC has already one of the best EMR system in Japan, we thought CAD project can be a good match for us
  5. We looked on Medical startups in Israel, as SW solution that not evolves additional devices, We thought that CAD system is a good candidate for us, as it SW based solution that stand alone and not need specific device or system, the data itself is pixel base And It not tied to hospital Moreover most of the CAD solution base on DL/ML that become a majority field in NEC, and as NEC has already one of the best EMR system in Japan, we thought CAD project can be a good match for us
  6. We looked on Medical startups in Israel, as SW solution that not evolves additional devices, We thought that CAD system is a good candidate for us, as it SW based solution that stand alone and not need specific device or system, the data itself is pixel base And It not tied to hospital Moreover most of the CAD solution base on DL/ML that become a majority field in NEC, and as NEC has already one of the best EMR system in Japan, we thought CAD project can be a good match for us
  7. We looked on Medical startups in Israel, as SW solution that not evolves additional devices, We thought that CAD system is a good candidate for us, as it SW based solution that stand alone and not need specific device or system, the data itself is pixel base And It not tied to hospital Moreover most of the CAD solution base on DL/ML that become a majority field in NEC, and as NEC has already one of the best EMR system in Japan, we thought CAD project can be a good match for us
  8. We looked on Medical startups in Israel, as SW solution that not evolves additional devices, We thought that CAD system is a good candidate for us, as it SW based solution that stand alone and not need specific device or system, the data itself is pixel base And It not tied to hospital Moreover most of the CAD solution base on DL/ML that become a majority field in NEC, and as NEC has already one of the best EMR system in Japan, we thought CAD project can be a good match for us
  9. We looked on Medical startups in Israel, as SW solution that not evolves additional devices, We thought that CAD system is a good candidate for us, as it SW based solution that stand alone and not need specific device or system, the data itself is pixel base And It not tied to hospital Moreover most of the CAD solution base on DL/ML that become a majority field in NEC, and as NEC has already one of the best EMR system in Japan, we thought CAD project can be a good match for us
  10. We looked on Medical startups in Israel, as SW solution that not evolves additional devices, We thought that CAD system is a good candidate for us, as it SW based solution that stand alone and not need specific device or system, the data itself is pixel base And It not tied to hospital Moreover most of the CAD solution base on DL/ML that become a majority field in NEC, and as NEC has already one of the best EMR system in Japan, we thought CAD project can be a good match for us
  11. We looked on Medical startups in Israel, as SW solution that not evolves additional devices, We thought that CAD system is a good candidate for us, as it SW based solution that stand alone and not need specific device or system, the data itself is pixel base And It not tied to hospital Moreover most of the CAD solution base on DL/ML that become a majority field in NEC, and as NEC has already one of the best EMR system in Japan, we thought CAD project can be a good match for us
  12. We looked on Medical startups in Israel, as SW solution that not evolves additional devices, We thought that CAD system is a good candidate for us, as it SW based solution that stand alone and not need specific device or system, the data itself is pixel base And It not tied to hospital Moreover most of the CAD solution base on DL/ML that become a majority field in NEC, and as NEC has already one of the best EMR system in Japan, we thought CAD project can be a good match for us
  13. We looked on Medical startups in Israel, as SW solution that not evolves additional devices, We thought that CAD system is a good candidate for us, as it SW based solution that stand alone and not need specific device or system, the data itself is pixel base And It not tied to hospital Moreover most of the CAD solution base on DL/ML that become a majority field in NEC, and as NEC has already one of the best EMR system in Japan, we thought CAD project can be a good match for us
  14. We looked on Medical startups in Israel, as SW solution that not evolves additional devices, We thought that CAD system is a good candidate for us, as it SW based solution that stand alone and not need specific device or system, the data itself is pixel base And It not tied to hospital Moreover most of the CAD solution base on DL/ML that become a majority field in NEC, and as NEC has already one of the best EMR system in Japan, we thought CAD project can be a good match for us
  15. We looked on Medical startups in Israel, as SW solution that not evolves additional devices, We thought that CAD system is a good candidate for us, as it SW based solution that stand alone and not need specific device or system, the data itself is pixel base And It not tied to hospital Moreover most of the CAD solution base on DL/ML that become a majority field in NEC, and as NEC has already one of the best EMR system in Japan, we thought CAD project can be a good match for us
  16. We looked on Medical startups in Israel, as SW solution that not evolves additional devices, We thought that CAD system is a good candidate for us, as it SW based solution that stand alone and not need specific device or system, the data itself is pixel base And It not tied to hospital Moreover most of the CAD solution base on DL/ML that become a majority field in NEC, and as NEC has already one of the best EMR system in Japan, we thought CAD project can be a good match for us
  17. We looked on Medical startups in Israel, as SW solution that not evolves additional devices, We thought that CAD system is a good candidate for us, as it SW based solution that stand alone and not need specific device or system, the data itself is pixel base And It not tied to hospital Moreover most of the CAD solution base on DL/ML that become a majority field in NEC, and as NEC has already one of the best EMR system in Japan, we thought CAD project can be a good match for us