SlideShare una empresa de Scribd logo
1 de 21
Challenges from the 
Identities of Things 
Kantara 
Utrecht Sep 04/05th 2014 
Ingo Friese, 
Deutsche Telekom AG, 
Berlin, Germany
A closer look at the Identities of Things. 
Agenda. 
 Exemplary IoT Scenario 
 Object Identifier and Namespace 
 Authentication and Authorization 
 Ownership and Identity Relationships 
 Governance of Data and Privacy
Exemplary IoT Scenario
Exemplary IoT Scenario: 
Fleet management in farming industry. 
*by courtesy of Claas
Exemplary IoT Scenario: 
Support of farming production processes. 
Harvesting Transport Processing
Object Identifier and Namespace
Object Identifier and Namespace 
It needs new mechanisms to find identifier and 
addresses of communication partners in the IoT. 
Example XRI 
xri://construction-community.org/(urn:yelllowMachine.serialno:#123abc) 
xri://construction-community.org/(urn:abcConst.license:#B-BC1234) 
„Yellow Machine Inc.“ 
serial no. as identifier 
e.g. #123abc 
construction-community.org 
„ABC 
Construction Inc.“ 
license plate 
as identifier 
e.g. B-BC1234 
How to address?
Authentication 
and 
Authorization
Authentication and Authorization 
Proper IdM mechanisms become paramount in the 
IoT.
Strong Authentication 1/2 
How to strengthen authentication means in the 
IoT? 
User Identities 
Something you 
know + have + are 
Identities of 
Things 
Something you 
know + have + are 
?
Strong Authentication 2/2 
Context-based authentication. 
Additional information could be taken e.g. from the network layer, from geographical 
information or from other use case specific factors.
Authorization 1/2 
OAuth – Authorization for the “classic” Internet. 
Application Authorization 
Server 
Token Request 
User Login & Consent 
Resource 
Server / 
API 
Endpoint 
Code 
Exchange Code for Token 
Token Response 
Call API / Get Resource w/ token 
User 
User has to 
be online !
Authorization 2/2 
User Managed Access - Authorization for the 
IoT(?) 
Application Authorization 
Token Request 
Server 
Resource 
Server / 
API 
Endpoint 
Code 
Exchange Code for Token 
Token Response 
Authentication & Consent 
Call API / Get Resource w/ token 
Policies 
and 
Identity 
Claims
Ownership, 
Identity Relationships 
and 
Lifecycle
Ownership and Identity Relationships 
Things or objects in the IoT often have a 
relationship to real persons. 
user 
owner 
Thing group of users 
administrator 
Identity relationships in the IoT have an impact on other identity related processes 
like e.g. authentication, authorization or governance of data.
Identity of Things Lifecycle 
Identity lifecycles in the IoT can be much 
longer or shorter than in classic user-related IdM. 
ID update 
ID creation 
provisioning 
ID update 
ID revocation 
de-provisionig 
In the Internet of Things objects have very different lifetimes ranging from years or 
decades down to days or minutes.
Governance of Data 
and 
Privacy
Governance of Data and Privacy 
The problem. 
Data produced 
in a IoT device 
…… 
Position 
Velocity 
Usage of Gas 
Oil temperatur 
Oil pressure 
Engine status 
… 
GPS 
Persons having 
different claims 
to data 
owner 
user 
Sensors 
Claims 
to data 
„I want to use the 
position data for 
statistics!“ 
„I don‘t want the 
position data to be 
used. They could be 
used to track my 
personal behavior“
Governance of Data and Privacy 
Users have their claims-to data. 
owner 
Sensor Data sink 1 
user 
Data sink 2 
Appropriate methods 
to be applied to the data 
 publish 
 anonymize 
 discard 
 encrypt end-2-end 
Persons having 
different claims 
to data
Governance of Data and Privacy 
The configurable “claims-to” approach. 
…… 
Position 
Velocity 
Usage of Gas 
Oil temperatur 
… 
 encrypt end-2-end 
 anonymize 
 discard 
 publish 
Different configurations in different domains, regions and countries.
Questions?

Más contenido relacionado

La actualidad más candente

Xanadu Based Blockchain Integration System Development
Xanadu Based Blockchain Integration System DevelopmentXanadu Based Blockchain Integration System Development
Xanadu Based Blockchain Integration System DevelopmentAlex G. Lee, Ph.D. Esq. CLP
 
Kantara - Digital Identity in 2018
Kantara - Digital Identity in 2018Kantara - Digital Identity in 2018
Kantara - Digital Identity in 2018Ubisecure
 
IoT + Big Data + AI Integration Strategy Insights from Patents
IoT + Big Data + AI Integration Strategy Insights from Patents IoT + Big Data + AI Integration Strategy Insights from Patents
IoT + Big Data + AI Integration Strategy Insights from Patents Alex G. Lee, Ph.D. Esq. CLP
 
Exploring the Possibilities of Blockchain in Healthcare
Exploring the Possibilities of Blockchain in HealthcareExploring the Possibilities of Blockchain in Healthcare
Exploring the Possibilities of Blockchain in HealthcareIonixx Technologies Inc.
 
Spellpoint - Securing Access for Microservices
Spellpoint - Securing Access for MicroservicesSpellpoint - Securing Access for Microservices
Spellpoint - Securing Access for MicroservicesUbisecure
 
Inside Security - Strong Authentication with Smartphones
Inside Security - Strong Authentication with SmartphonesInside Security - Strong Authentication with Smartphones
Inside Security - Strong Authentication with SmartphonesUbisecure
 
Rubin Way - Blockchain Disruption in the Supply Chain
Rubin Way - Blockchain Disruption in the Supply ChainRubin Way - Blockchain Disruption in the Supply Chain
Rubin Way - Blockchain Disruption in the Supply ChainRubin Way Ltd
 
CWIN17 Singapore / Kalyan madala ibm
CWIN17 Singapore / Kalyan madala ibmCWIN17 Singapore / Kalyan madala ibm
CWIN17 Singapore / Kalyan madala ibmCapgemini
 
CWIN17 Frankfurt / ibm_watson_io_t_platform_and_blockchain_v4
CWIN17 Frankfurt / ibm_watson_io_t_platform_and_blockchain_v4CWIN17 Frankfurt / ibm_watson_io_t_platform_and_blockchain_v4
CWIN17 Frankfurt / ibm_watson_io_t_platform_and_blockchain_v4Capgemini
 
Aditro - IAM as part of Cloud Business strategy
Aditro - IAM as part of Cloud Business strategyAditro - IAM as part of Cloud Business strategy
Aditro - IAM as part of Cloud Business strategyUbisecure
 
Blockit Seed Round Pitch Deck
Blockit Seed Round Pitch DeckBlockit Seed Round Pitch Deck
Blockit Seed Round Pitch DeckJake McCarley
 
Open Identity Exchange - the Global Growth of Digital Identity
Open Identity Exchange - the Global Growth of Digital IdentityOpen Identity Exchange - the Global Growth of Digital Identity
Open Identity Exchange - the Global Growth of Digital IdentityUbisecure
 
Sydney Identity Summit: Compound Eye: An Approach To A National Identity Ecos...
Sydney Identity Summit: Compound Eye: An Approach To A National Identity Ecos...Sydney Identity Summit: Compound Eye: An Approach To A National Identity Ecos...
Sydney Identity Summit: Compound Eye: An Approach To A National Identity Ecos...ForgeRock
 
Kantara Orientation for CARIN Digital ID Summit
Kantara Orientation for CARIN Digital ID SummitKantara Orientation for CARIN Digital ID Summit
Kantara Orientation for CARIN Digital ID SummitNoreen Whysel
 
2015 Identity Summit - CTO Innovation Center
2015 Identity Summit - CTO Innovation Center2015 Identity Summit - CTO Innovation Center
2015 Identity Summit - CTO Innovation CenterForgeRock
 
Nov 2 security for blockchain and analytics ulf mattsson 2020 nov 2b
Nov 2 security for blockchain and analytics   ulf mattsson 2020 nov 2bNov 2 security for blockchain and analytics   ulf mattsson 2020 nov 2b
Nov 2 security for blockchain and analytics ulf mattsson 2020 nov 2bUlf Mattsson
 

La actualidad más candente (20)

Xanadu Based Blockchain Integration System Development
Xanadu Based Blockchain Integration System DevelopmentXanadu Based Blockchain Integration System Development
Xanadu Based Blockchain Integration System Development
 
AI+Blockchain+IoT Convergence AT A Glance
AI+Blockchain+IoT Convergence AT A GlanceAI+Blockchain+IoT Convergence AT A Glance
AI+Blockchain+IoT Convergence AT A Glance
 
Kantara - Digital Identity in 2018
Kantara - Digital Identity in 2018Kantara - Digital Identity in 2018
Kantara - Digital Identity in 2018
 
IoT + Big Data + AI Integration Strategy Insights from Patents
IoT + Big Data + AI Integration Strategy Insights from Patents IoT + Big Data + AI Integration Strategy Insights from Patents
IoT + Big Data + AI Integration Strategy Insights from Patents
 
AI, Blockchain, IoT GDPR Compliance AT A Glance
AI, Blockchain, IoT GDPR Compliance AT A GlanceAI, Blockchain, IoT GDPR Compliance AT A Glance
AI, Blockchain, IoT GDPR Compliance AT A Glance
 
AI, Blockchain, IoT for Finance AT A Glance
AI, Blockchain, IoT for Finance AT A GlanceAI, Blockchain, IoT for Finance AT A Glance
AI, Blockchain, IoT for Finance AT A Glance
 
Exploring the Possibilities of Blockchain in Healthcare
Exploring the Possibilities of Blockchain in HealthcareExploring the Possibilities of Blockchain in Healthcare
Exploring the Possibilities of Blockchain in Healthcare
 
Spellpoint - Securing Access for Microservices
Spellpoint - Securing Access for MicroservicesSpellpoint - Securing Access for Microservices
Spellpoint - Securing Access for Microservices
 
Inside Security - Strong Authentication with Smartphones
Inside Security - Strong Authentication with SmartphonesInside Security - Strong Authentication with Smartphones
Inside Security - Strong Authentication with Smartphones
 
Rubin Way - Blockchain Disruption in the Supply Chain
Rubin Way - Blockchain Disruption in the Supply ChainRubin Way - Blockchain Disruption in the Supply Chain
Rubin Way - Blockchain Disruption in the Supply Chain
 
CWIN17 Singapore / Kalyan madala ibm
CWIN17 Singapore / Kalyan madala ibmCWIN17 Singapore / Kalyan madala ibm
CWIN17 Singapore / Kalyan madala ibm
 
CWIN17 Frankfurt / ibm_watson_io_t_platform_and_blockchain_v4
CWIN17 Frankfurt / ibm_watson_io_t_platform_and_blockchain_v4CWIN17 Frankfurt / ibm_watson_io_t_platform_and_blockchain_v4
CWIN17 Frankfurt / ibm_watson_io_t_platform_and_blockchain_v4
 
Aditro - IAM as part of Cloud Business strategy
Aditro - IAM as part of Cloud Business strategyAditro - IAM as part of Cloud Business strategy
Aditro - IAM as part of Cloud Business strategy
 
Blockit Seed Round Pitch Deck
Blockit Seed Round Pitch DeckBlockit Seed Round Pitch Deck
Blockit Seed Round Pitch Deck
 
PHBC Platform Technology
PHBC Platform TechnologyPHBC Platform Technology
PHBC Platform Technology
 
Open Identity Exchange - the Global Growth of Digital Identity
Open Identity Exchange - the Global Growth of Digital IdentityOpen Identity Exchange - the Global Growth of Digital Identity
Open Identity Exchange - the Global Growth of Digital Identity
 
Sydney Identity Summit: Compound Eye: An Approach To A National Identity Ecos...
Sydney Identity Summit: Compound Eye: An Approach To A National Identity Ecos...Sydney Identity Summit: Compound Eye: An Approach To A National Identity Ecos...
Sydney Identity Summit: Compound Eye: An Approach To A National Identity Ecos...
 
Kantara Orientation for CARIN Digital ID Summit
Kantara Orientation for CARIN Digital ID SummitKantara Orientation for CARIN Digital ID Summit
Kantara Orientation for CARIN Digital ID Summit
 
2015 Identity Summit - CTO Innovation Center
2015 Identity Summit - CTO Innovation Center2015 Identity Summit - CTO Innovation Center
2015 Identity Summit - CTO Innovation Center
 
Nov 2 security for blockchain and analytics ulf mattsson 2020 nov 2b
Nov 2 security for blockchain and analytics   ulf mattsson 2020 nov 2bNov 2 security for blockchain and analytics   ulf mattsson 2020 nov 2b
Nov 2 security for blockchain and analytics ulf mattsson 2020 nov 2b
 

Destacado

History of Scuting in Afghanistan (Dari and English)
History of Scuting in Afghanistan (Dari and English)History of Scuting in Afghanistan (Dari and English)
History of Scuting in Afghanistan (Dari and English)Global Go-To-Market Services
 
The Water Vole - Arvicola terrestris / amphibius?
The Water Vole - Arvicola terrestris / amphibius?The Water Vole - Arvicola terrestris / amphibius?
The Water Vole - Arvicola terrestris / amphibius?rogerhyam
 
! зонирование продающего сайта 16 erofeev-etarget2011
! зонирование продающего сайта 16 erofeev-etarget2011! зонирование продающего сайта 16 erofeev-etarget2011
! зонирование продающего сайта 16 erofeev-etarget2011Тарасов Константин
 
Presentacion Colectiva1
Presentacion Colectiva1Presentacion Colectiva1
Presentacion Colectiva1sanaaay
 
员工健康指南
员工健康指南员工健康指南
员工健康指南odmproducts
 
Webinar Presentation of H.R.1402
Webinar Presentation of H.R.1402Webinar Presentation of H.R.1402
Webinar Presentation of H.R.1402Murphqueen
 
50 Indikasi Destruktif Demokrasi, Pemilu Dan Partai
50 Indikasi Destruktif Demokrasi, Pemilu Dan Partai50 Indikasi Destruktif Demokrasi, Pemilu Dan Partai
50 Indikasi Destruktif Demokrasi, Pemilu Dan Partairafiq_jauhary
 
Lifesong Overview
Lifesong  OverviewLifesong  Overview
Lifesong OverviewAndy Lehman
 
Powerpoint for Bob Meyer
Powerpoint for Bob MeyerPowerpoint for Bob Meyer
Powerpoint for Bob MeyerAndy Lehman
 
35 bark-optimization2010 стратегия развития сайта и seo
35 bark-optimization2010 стратегия развития сайта и seo35 bark-optimization2010 стратегия развития сайта и seo
35 bark-optimization2010 стратегия развития сайта и seoТарасов Константин
 
! управление репутацией компании и взаимодействие с аудиторией в New media28 ...
! управление репутацией компании и взаимодействие с аудиторией в New media28 ...! управление репутацией компании и взаимодействие с аудиторией в New media28 ...
! управление репутацией компании и взаимодействие с аудиторией в New media28 ...Тарасов Константин
 
D.g. 06 09-2011-__grnland
D.g. 06 09-2011-__grnlandD.g. 06 09-2011-__grnland
D.g. 06 09-2011-__grnlandKostas Tampakis
 

Destacado (20)

History of Scuting in Afghanistan (Dari and English)
History of Scuting in Afghanistan (Dari and English)History of Scuting in Afghanistan (Dari and English)
History of Scuting in Afghanistan (Dari and English)
 
The Water Vole - Arvicola terrestris / amphibius?
The Water Vole - Arvicola terrestris / amphibius?The Water Vole - Arvicola terrestris / amphibius?
The Water Vole - Arvicola terrestris / amphibius?
 
Heart Disease Factsheet
Heart Disease FactsheetHeart Disease Factsheet
Heart Disease Factsheet
 
Spivakminskeffectiveness200902print 110207061639-phpapp01
Spivakminskeffectiveness200902print 110207061639-phpapp01Spivakminskeffectiveness200902print 110207061639-phpapp01
Spivakminskeffectiveness200902print 110207061639-phpapp01
 
! зонирование продающего сайта 16 erofeev-etarget2011
! зонирование продающего сайта 16 erofeev-etarget2011! зонирование продающего сайта 16 erofeev-etarget2011
! зонирование продающего сайта 16 erofeev-etarget2011
 
Astonishing beauty
Astonishing beautyAstonishing beauty
Astonishing beauty
 
Resume Powerpoint
Resume PowerpointResume Powerpoint
Resume Powerpoint
 
Presentacion Colectiva1
Presentacion Colectiva1Presentacion Colectiva1
Presentacion Colectiva1
 
Ready2
Ready2Ready2
Ready2
 
员工健康指南
员工健康指南员工健康指南
员工健康指南
 
Webinar Presentation of H.R.1402
Webinar Presentation of H.R.1402Webinar Presentation of H.R.1402
Webinar Presentation of H.R.1402
 
50 Indikasi Destruktif Demokrasi, Pemilu Dan Partai
50 Indikasi Destruktif Demokrasi, Pemilu Dan Partai50 Indikasi Destruktif Demokrasi, Pemilu Dan Partai
50 Indikasi Destruktif Demokrasi, Pemilu Dan Partai
 
Robyn
RobynRobyn
Robyn
 
Promociones
PromocionesPromociones
Promociones
 
Lifesong Overview
Lifesong  OverviewLifesong  Overview
Lifesong Overview
 
2009 To My Friends
2009 To My Friends2009 To My Friends
2009 To My Friends
 
Powerpoint for Bob Meyer
Powerpoint for Bob MeyerPowerpoint for Bob Meyer
Powerpoint for Bob Meyer
 
35 bark-optimization2010 стратегия развития сайта и seo
35 bark-optimization2010 стратегия развития сайта и seo35 bark-optimization2010 стратегия развития сайта и seo
35 bark-optimization2010 стратегия развития сайта и seo
 
! управление репутацией компании и взаимодействие с аудиторией в New media28 ...
! управление репутацией компании и взаимодействие с аудиторией в New media28 ...! управление репутацией компании и взаимодействие с аудиторией в New media28 ...
! управление репутацией компании и взаимодействие с аудиторией в New media28 ...
 
D.g. 06 09-2011-__grnland
D.g. 06 09-2011-__grnlandD.g. 06 09-2011-__grnland
D.g. 06 09-2011-__grnland
 

Similar a IDoT: Challenges from the IDentities of Things Landscape

The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...ForgeRock
 
All you need to know about SSI for Corporates and IoT – Heather Vescent
All you need to know about SSI for Corporates and IoT – Heather VescentAll you need to know about SSI for Corporates and IoT – Heather Vescent
All you need to know about SSI for Corporates and IoT – Heather VescentBlockchain España
 
CIS14: Securing the Internet of Things with Open Standards
CIS14: Securing the Internet of Things with Open StandardsCIS14: Securing the Internet of Things with Open Standards
CIS14: Securing the Internet of Things with Open StandardsCloudIDSummit
 
Internet of Things: Identity & Security with Open Standards
Internet of Things: Identity & Security with Open StandardsInternet of Things: Identity & Security with Open Standards
Internet of Things: Identity & Security with Open StandardsGeorge Fletcher
 
IRJET- Authentic and Anonymous Data Sharing with Enhanced Key Security
IRJET-  	  Authentic and Anonymous Data Sharing with Enhanced Key SecurityIRJET-  	  Authentic and Anonymous Data Sharing with Enhanced Key Security
IRJET- Authentic and Anonymous Data Sharing with Enhanced Key SecurityIRJET Journal
 
Digital ID Protocol - Presentation 2015-12-04
Digital ID Protocol - Presentation 2015-12-04Digital ID Protocol - Presentation 2015-12-04
Digital ID Protocol - Presentation 2015-12-04Synacts
 
Self-Sovereign Identity: Lightening Talk at RightsCon
Self-Sovereign Identity: Lightening Talk at RightsCon Self-Sovereign Identity: Lightening Talk at RightsCon
Self-Sovereign Identity: Lightening Talk at RightsCon Kaliya "Identity Woman" Young
 
AN IDENTITY MANAGEMENT SYSTEM USING BLOCKCHAIN
AN IDENTITY MANAGEMENT SYSTEM USING BLOCKCHAINAN IDENTITY MANAGEMENT SYSTEM USING BLOCKCHAIN
AN IDENTITY MANAGEMENT SYSTEM USING BLOCKCHAINIRJET Journal
 
Blockchain Decentralized Identifier (DID) Innovation Insights from Patents
Blockchain Decentralized Identifier (DID) Innovation Insights from PatentsBlockchain Decentralized Identifier (DID) Innovation Insights from Patents
Blockchain Decentralized Identifier (DID) Innovation Insights from PatentsAlex G. Lee, Ph.D. Esq. CLP
 
Personal Object Technology
Personal Object TechnologyPersonal Object Technology
Personal Object TechnologyRobert Berger
 
[WSO2Con EU 2018] Identity APIs is the New Black
[WSO2Con EU 2018] Identity APIs is the New Black[WSO2Con EU 2018] Identity APIs is the New Black
[WSO2Con EU 2018] Identity APIs is the New BlackWSO2
 
The 5 Crazy Mistakes IoT Administrators Make with System Credentials
The 5 Crazy Mistakes IoT Administrators Make with System CredentialsThe 5 Crazy Mistakes IoT Administrators Make with System Credentials
The 5 Crazy Mistakes IoT Administrators Make with System CredentialsBeyondTrust
 
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITYCOST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITYShakas Technologies
 
A Survey on Secure Data Sharing with Forward Security in Cloud Computing
A Survey on Secure Data Sharing with Forward Security in Cloud ComputingA Survey on Secure Data Sharing with Forward Security in Cloud Computing
A Survey on Secure Data Sharing with Forward Security in Cloud ComputingIRJET Journal
 
GDPR BigDataRevealed Readiness Requirements and Evaluation
GDPR BigDataRevealed Readiness Requirements and EvaluationGDPR BigDataRevealed Readiness Requirements and Evaluation
GDPR BigDataRevealed Readiness Requirements and EvaluationSteven Meister
 
IRJET- Blockchain Technology in Cloud Computing : A Systematic Review
IRJET-  	  Blockchain Technology in Cloud Computing : A Systematic ReviewIRJET-  	  Blockchain Technology in Cloud Computing : A Systematic Review
IRJET- Blockchain Technology in Cloud Computing : A Systematic ReviewIRJET Journal
 
Increasing Security Level in Data Sharing Using Ring Signature in Cloud Envir...
Increasing Security Level in Data Sharing Using Ring Signature in Cloud Envir...Increasing Security Level in Data Sharing Using Ring Signature in Cloud Envir...
Increasing Security Level in Data Sharing Using Ring Signature in Cloud Envir...IJERA Editor
 
Re-using existing PKIs for online Identity Management
Re-using existing PKIs for online Identity ManagementRe-using existing PKIs for online Identity Management
Re-using existing PKIs for online Identity ManagementMartijn Oostdijk
 
Anomali Detect 19 - Nickels & Pennington - Turning Intelligence into Action w...
Anomali Detect 19 - Nickels & Pennington - Turning Intelligence into Action w...Anomali Detect 19 - Nickels & Pennington - Turning Intelligence into Action w...
Anomali Detect 19 - Nickels & Pennington - Turning Intelligence into Action w...Adam Pennington
 
Identity 2.0 and User-Centric Identity
Identity 2.0 and User-Centric IdentityIdentity 2.0 and User-Centric Identity
Identity 2.0 and User-Centric IdentityOliver Pfaff
 

Similar a IDoT: Challenges from the IDentities of Things Landscape (20)

The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...
 
All you need to know about SSI for Corporates and IoT – Heather Vescent
All you need to know about SSI for Corporates and IoT – Heather VescentAll you need to know about SSI for Corporates and IoT – Heather Vescent
All you need to know about SSI for Corporates and IoT – Heather Vescent
 
CIS14: Securing the Internet of Things with Open Standards
CIS14: Securing the Internet of Things with Open StandardsCIS14: Securing the Internet of Things with Open Standards
CIS14: Securing the Internet of Things with Open Standards
 
Internet of Things: Identity & Security with Open Standards
Internet of Things: Identity & Security with Open StandardsInternet of Things: Identity & Security with Open Standards
Internet of Things: Identity & Security with Open Standards
 
IRJET- Authentic and Anonymous Data Sharing with Enhanced Key Security
IRJET-  	  Authentic and Anonymous Data Sharing with Enhanced Key SecurityIRJET-  	  Authentic and Anonymous Data Sharing with Enhanced Key Security
IRJET- Authentic and Anonymous Data Sharing with Enhanced Key Security
 
Digital ID Protocol - Presentation 2015-12-04
Digital ID Protocol - Presentation 2015-12-04Digital ID Protocol - Presentation 2015-12-04
Digital ID Protocol - Presentation 2015-12-04
 
Self-Sovereign Identity: Lightening Talk at RightsCon
Self-Sovereign Identity: Lightening Talk at RightsCon Self-Sovereign Identity: Lightening Talk at RightsCon
Self-Sovereign Identity: Lightening Talk at RightsCon
 
AN IDENTITY MANAGEMENT SYSTEM USING BLOCKCHAIN
AN IDENTITY MANAGEMENT SYSTEM USING BLOCKCHAINAN IDENTITY MANAGEMENT SYSTEM USING BLOCKCHAIN
AN IDENTITY MANAGEMENT SYSTEM USING BLOCKCHAIN
 
Blockchain Decentralized Identifier (DID) Innovation Insights from Patents
Blockchain Decentralized Identifier (DID) Innovation Insights from PatentsBlockchain Decentralized Identifier (DID) Innovation Insights from Patents
Blockchain Decentralized Identifier (DID) Innovation Insights from Patents
 
Personal Object Technology
Personal Object TechnologyPersonal Object Technology
Personal Object Technology
 
[WSO2Con EU 2018] Identity APIs is the New Black
[WSO2Con EU 2018] Identity APIs is the New Black[WSO2Con EU 2018] Identity APIs is the New Black
[WSO2Con EU 2018] Identity APIs is the New Black
 
The 5 Crazy Mistakes IoT Administrators Make with System Credentials
The 5 Crazy Mistakes IoT Administrators Make with System CredentialsThe 5 Crazy Mistakes IoT Administrators Make with System Credentials
The 5 Crazy Mistakes IoT Administrators Make with System Credentials
 
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITYCOST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
 
A Survey on Secure Data Sharing with Forward Security in Cloud Computing
A Survey on Secure Data Sharing with Forward Security in Cloud ComputingA Survey on Secure Data Sharing with Forward Security in Cloud Computing
A Survey on Secure Data Sharing with Forward Security in Cloud Computing
 
GDPR BigDataRevealed Readiness Requirements and Evaluation
GDPR BigDataRevealed Readiness Requirements and EvaluationGDPR BigDataRevealed Readiness Requirements and Evaluation
GDPR BigDataRevealed Readiness Requirements and Evaluation
 
IRJET- Blockchain Technology in Cloud Computing : A Systematic Review
IRJET-  	  Blockchain Technology in Cloud Computing : A Systematic ReviewIRJET-  	  Blockchain Technology in Cloud Computing : A Systematic Review
IRJET- Blockchain Technology in Cloud Computing : A Systematic Review
 
Increasing Security Level in Data Sharing Using Ring Signature in Cloud Envir...
Increasing Security Level in Data Sharing Using Ring Signature in Cloud Envir...Increasing Security Level in Data Sharing Using Ring Signature in Cloud Envir...
Increasing Security Level in Data Sharing Using Ring Signature in Cloud Envir...
 
Re-using existing PKIs for online Identity Management
Re-using existing PKIs for online Identity ManagementRe-using existing PKIs for online Identity Management
Re-using existing PKIs for online Identity Management
 
Anomali Detect 19 - Nickels & Pennington - Turning Intelligence into Action w...
Anomali Detect 19 - Nickels & Pennington - Turning Intelligence into Action w...Anomali Detect 19 - Nickels & Pennington - Turning Intelligence into Action w...
Anomali Detect 19 - Nickels & Pennington - Turning Intelligence into Action w...
 
Identity 2.0 and User-Centric Identity
Identity 2.0 and User-Centric IdentityIdentity 2.0 and User-Centric Identity
Identity 2.0 and User-Centric Identity
 

Más de kantarainitiative

Kantara initiative - AGM 2022
Kantara initiative - AGM 2022Kantara initiative - AGM 2022
Kantara initiative - AGM 2022kantarainitiative
 
2020 Annual General Meeting Executive Summary
2020 Annual General Meeting Executive Summary2020 Annual General Meeting Executive Summary
2020 Annual General Meeting Executive Summarykantarainitiative
 
AARC Assurance Profiles for Kantara Initiative
AARC Assurance Profiles for Kantara InitiativeAARC Assurance Profiles for Kantara Initiative
AARC Assurance Profiles for Kantara Initiativekantarainitiative
 
Kantara uma webinar july 2020
Kantara uma webinar   july 2020Kantara uma webinar   july 2020
Kantara uma webinar july 2020kantarainitiative
 
Kantara webinar 800 63-3 approval 2020-07-15
Kantara webinar 800 63-3 approval 2020-07-15Kantara webinar 800 63-3 approval 2020-07-15
Kantara webinar 800 63-3 approval 2020-07-15kantarainitiative
 
Kantara webinar 800 63-3 approval 2020-07-15
Kantara webinar 800 63-3 approval 2020-07-15Kantara webinar 800 63-3 approval 2020-07-15
Kantara webinar 800 63-3 approval 2020-07-15kantarainitiative
 
Kantara orientation april 2020
Kantara orientation april 2020Kantara orientation april 2020
Kantara orientation april 2020kantarainitiative
 
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)kantarainitiative
 
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)kantarainitiative
 
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)kantarainitiative
 
Mobile Device and Attribute Validation (MDAV)
Mobile Device and Attribute Validation (MDAV)Mobile Device and Attribute Validation (MDAV)
Mobile Device and Attribute Validation (MDAV)kantarainitiative
 
Kantara Initiative, Inc in 2016
Kantara Initiative, Inc in 2016 Kantara Initiative, Inc in 2016
Kantara Initiative, Inc in 2016 kantarainitiative
 
Kantara - Consent & Information Sharing WG Update
Kantara - Consent & Information Sharing WG UpdateKantara - Consent & Information Sharing WG Update
Kantara - Consent & Information Sharing WG Updatekantarainitiative
 

Más de kantarainitiative (20)

Kantara initiative - AGM 2022
Kantara initiative - AGM 2022Kantara initiative - AGM 2022
Kantara initiative - AGM 2022
 
2021 Annual General Meeting
2021 Annual General Meeting2021 Annual General Meeting
2021 Annual General Meeting
 
2020 Annual General Meeting Executive Summary
2020 Annual General Meeting Executive Summary2020 Annual General Meeting Executive Summary
2020 Annual General Meeting Executive Summary
 
2020 Annual General Meeting
2020 Annual General Meeting2020 Annual General Meeting
2020 Annual General Meeting
 
AARC Assurance Profiles for Kantara Initiative
AARC Assurance Profiles for Kantara InitiativeAARC Assurance Profiles for Kantara Initiative
AARC Assurance Profiles for Kantara Initiative
 
Kantara uma webinar july 2020
Kantara uma webinar   july 2020Kantara uma webinar   july 2020
Kantara uma webinar july 2020
 
Kantara webinar 800 63-3 approval 2020-07-15
Kantara webinar 800 63-3 approval 2020-07-15Kantara webinar 800 63-3 approval 2020-07-15
Kantara webinar 800 63-3 approval 2020-07-15
 
Kantara webinar 800 63-3 approval 2020-07-15
Kantara webinar 800 63-3 approval 2020-07-15Kantara webinar 800 63-3 approval 2020-07-15
Kantara webinar 800 63-3 approval 2020-07-15
 
Kantara orientation april 2020
Kantara orientation april 2020Kantara orientation april 2020
Kantara orientation april 2020
 
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
 
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
 
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
 
Kantara orientation 2018
Kantara orientation 2018Kantara orientation 2018
Kantara orientation 2018
 
Kantara Overview 2017
Kantara Overview 2017Kantara Overview 2017
Kantara Overview 2017
 
Kantara Workshop at CIS
Kantara Workshop at CISKantara Workshop at CIS
Kantara Workshop at CIS
 
Cloud Identity Summit
Cloud Identity SummitCloud Identity Summit
Cloud Identity Summit
 
Trust Frameworks Explained
Trust Frameworks ExplainedTrust Frameworks Explained
Trust Frameworks Explained
 
Mobile Device and Attribute Validation (MDAV)
Mobile Device and Attribute Validation (MDAV)Mobile Device and Attribute Validation (MDAV)
Mobile Device and Attribute Validation (MDAV)
 
Kantara Initiative, Inc in 2016
Kantara Initiative, Inc in 2016 Kantara Initiative, Inc in 2016
Kantara Initiative, Inc in 2016
 
Kantara - Consent & Information Sharing WG Update
Kantara - Consent & Information Sharing WG UpdateKantara - Consent & Information Sharing WG Update
Kantara - Consent & Information Sharing WG Update
 

Último

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 

Último (20)

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 

IDoT: Challenges from the IDentities of Things Landscape

  • 1. Challenges from the Identities of Things Kantara Utrecht Sep 04/05th 2014 Ingo Friese, Deutsche Telekom AG, Berlin, Germany
  • 2. A closer look at the Identities of Things. Agenda.  Exemplary IoT Scenario  Object Identifier and Namespace  Authentication and Authorization  Ownership and Identity Relationships  Governance of Data and Privacy
  • 4. Exemplary IoT Scenario: Fleet management in farming industry. *by courtesy of Claas
  • 5. Exemplary IoT Scenario: Support of farming production processes. Harvesting Transport Processing
  • 7. Object Identifier and Namespace It needs new mechanisms to find identifier and addresses of communication partners in the IoT. Example XRI xri://construction-community.org/(urn:yelllowMachine.serialno:#123abc) xri://construction-community.org/(urn:abcConst.license:#B-BC1234) „Yellow Machine Inc.“ serial no. as identifier e.g. #123abc construction-community.org „ABC Construction Inc.“ license plate as identifier e.g. B-BC1234 How to address?
  • 9. Authentication and Authorization Proper IdM mechanisms become paramount in the IoT.
  • 10. Strong Authentication 1/2 How to strengthen authentication means in the IoT? User Identities Something you know + have + are Identities of Things Something you know + have + are ?
  • 11. Strong Authentication 2/2 Context-based authentication. Additional information could be taken e.g. from the network layer, from geographical information or from other use case specific factors.
  • 12. Authorization 1/2 OAuth – Authorization for the “classic” Internet. Application Authorization Server Token Request User Login & Consent Resource Server / API Endpoint Code Exchange Code for Token Token Response Call API / Get Resource w/ token User User has to be online !
  • 13. Authorization 2/2 User Managed Access - Authorization for the IoT(?) Application Authorization Token Request Server Resource Server / API Endpoint Code Exchange Code for Token Token Response Authentication & Consent Call API / Get Resource w/ token Policies and Identity Claims
  • 15. Ownership and Identity Relationships Things or objects in the IoT often have a relationship to real persons. user owner Thing group of users administrator Identity relationships in the IoT have an impact on other identity related processes like e.g. authentication, authorization or governance of data.
  • 16. Identity of Things Lifecycle Identity lifecycles in the IoT can be much longer or shorter than in classic user-related IdM. ID update ID creation provisioning ID update ID revocation de-provisionig In the Internet of Things objects have very different lifetimes ranging from years or decades down to days or minutes.
  • 17. Governance of Data and Privacy
  • 18. Governance of Data and Privacy The problem. Data produced in a IoT device …… Position Velocity Usage of Gas Oil temperatur Oil pressure Engine status … GPS Persons having different claims to data owner user Sensors Claims to data „I want to use the position data for statistics!“ „I don‘t want the position data to be used. They could be used to track my personal behavior“
  • 19. Governance of Data and Privacy Users have their claims-to data. owner Sensor Data sink 1 user Data sink 2 Appropriate methods to be applied to the data  publish  anonymize  discard  encrypt end-2-end Persons having different claims to data
  • 20. Governance of Data and Privacy The configurable “claims-to” approach. …… Position Velocity Usage of Gas Oil temperatur …  encrypt end-2-end  anonymize  discard  publish Different configurations in different domains, regions and countries.