Welcome!

@CloudExpo Authors: Jason Bloomberg, Elizabeth White, Roger Strukhoff, Liz McMillan, Pat Romanski

Related Topics: @CloudExpo, Agile Computing, Government Cloud

@CloudExpo: Blog Feed Post

Building Canada’s Cloud Identity Ecosystem

These various developments will enable all kinds of opportunities for service providers

With the government promising delivery of the long-awaited Digital Economy strategy by the year end, this prompts a review of what role the Cloud industry can play in this strategy.

This then further encourages us to identify what particular segments of the Cloud Computing industry we might specialize in, with a view to concentrating in areas where Canada has strength so that start-up ventures can be better focused towards niche opportunities.

Best practices – Cloud Privacy By Design

At the top of my list is the best practice known as ‘Cloud Privacy-By-Design‘, developed by the Privacy Commissioner of Ontario.

This is such a hot topic. As Andrea talks about in this earlier blog the mention of Cloud Computing is usually quickly followed by concerns about the USA`s Patriot Act. Fears are that as soon as you upload your data to the Cloud the American Government will be free to access and spy on it.

Therefore as the name suggests Cloud Privacy-By-Design offers a best practice framework to enable private as well as public sector organizations to safely use Cloud services with these concerns in mind.

Given how few have yet to actually make this move it`s therefore going to be a huge global growth area for new consulting skills, and it demonstrates how the Government can play a role in creating these best practice assets as a means of stimulating and supporting economic growth this way.

The team at the OPC office kindly sent me a number of new updates to these best practice materials:

  • International Working Group on Data Protection in Telecommunications (IWGDPT) April 2012: Working Paper on Cloud Computing – PDF file
  • EC Article 29 Working Party July 2012: Opinion of the European Commission Article 29 WP on cloud computing – attached – PDF file
  • Office of the Information and Privacy Commissioner of British Columbia: Cloud Computing Guidelines for Public Bodies – PDF file


The Cloud Identity Ecosystem – Framework for ‘Personal Clouds’

The sheer mammoth scale of this market opportunity is expanded even further when we consider the broader development of what the USA Government has defined as the ‘Identity Ecosystem‘.

This could also be thought of as the ‘Privacy Web’, as this ecosystem is fundamentally a set of controls to be distributed throughout the many different systems where Identity related data about you is stored.

So far we have mainly approached the Cloud in terms of it being an environment to host and run virtualized applications, but as the above concerns highlight we also think of it as a universal data network too.

This ecosystem is explained in this report from the World Economic Forum – Personal Data : The Emergence of a New Asset Class (40-page PDF), and where this overlaps with Cloud Computing it’s called ‘Personal Clouds’.

This refers to the ‘Personal Data Stores’ of information we store about ourselves with different online providers, from email through to social networks and photo stores. As well as the Cloud storing the files and data, there will also be protocols and standards for linking these ‘fragments’ together into one holistic digital persona.

Venture Acceleration

This expertise and focus helps us to more effectively fast-track new start-ups. These requirements and best practices set the context for the new technology that is needed.

For example vendors like Perspecsys provide on-premise devices that encrypts information before uploading it to Cloud services like Salesforce.com. The Ontario Privacy Commissioner describes:

PerspecSys’ cloud solution advances the essential principles of Privacy by Design -privacy by default, end-to-end security, and strong accountability- by enabling enterprises to automatically encrypt (decrypt) data locally and on-the-fly when using third-party cloud service applications, with no loss of functionality. Maintaining control over encryption and decryption processes is an excellent approach to safeguarding personal data, regardless of where the data resides. – Ann Cavoukian, Ph.D. Information and Privacy Commissioner of Ontario, Canada

The value of this technology is immediately apparent to the industry giants like Salesforce.com, who have already bought up a similar vendor to enable their Data Residency Option service.

Open standards are also key to this acceleration. This ecosystem will take many years to fully evolve and includes core building blocks such as OAuth which enables “Social Sign-on”, a means of joining up web sites via usernames and passwords, that vendors like Janrain cater for.

It then extends from here right through to a sophisticated ‘dataweb’ where these foundations facilitiate sharing of all kinds of personal data. Frameworks for enabling and managing this data flow include the Kantara Initiative UMA program, and the OASIS XDI protocol, which provide the mechanisms for sharing the Privacy controls.

As explained in this research, and this Open Identity Exchange presentation, Kantara and UMA builds on core Identity building blocks like OpenID Connect to facilitate Identity-enabled secure data sharing between remote systems, facilitating the Personal Identity Ecosystem.

This presentation explains these core mechanics, and this one maps it to Government Privacy policies.

We’re continuing the process of developing a new Kantara Initiative working group, which will build a program called ‘Kantara Cloud Identity and Security best practices’.

Conclusion

These various developments will enable all kinds of opportunities for service providers, ranging from simply managing the authentication process as a service, like Verizon, through to “data as a service”, where banks, utilities and other key organizations provide data for online real-time web services.

As well as general purpose file sharing this Personal Cloud ecosystem will evolve to cater for various industry-specific functions, like a ‘Personal Cloud EMR’ – Electronic Medical Record.

This is what players like ZenVault can offer. ZenVault is a downloadable app that allows you to personally hold and control your own EMR, and provide it to doctors as and when needed. Personal Cloud services, in combination with dataweb control mechanisms, will make the ideal combination possible – Very easy sharing of information between patients, GPs and other key process stakeholders, but in an entirely secure and controlled manner.

In combination these provide the foundations for a plethora of new ventures, and we will help entrepreneurs launch and fast-track these businesses.

More Stories By Cloud Best Practices Network

The Cloud Best Practices Network is an expert community of leading Cloud pioneers. Follow our best practice blogs at http://CloudBestPractices.net

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.


@CloudExpo Stories
Internet-of-Things discussions can end up either going down the consumer gadget rabbit hole or focused on the sort of data logging that industrial manufacturers have been doing forever. However, in fact, companies today are already using IoT data both to optimize their operational technology and to improve the experience of customer interactions in novel ways. In his session at @ThingsExpo, Gordon Haff, Red Hat Technology Evangelist, will share examples from a wide range of industries – includin...
Organizations planning enterprise data center consolidation and modernization projects are faced with a challenging, costly reality. Requirements to deploy modern, cloud-native applications simultaneously with traditional client/server applications are almost impossible to achieve with hardware-centric enterprise infrastructure. Compute and network infrastructure are fast moving down a software-defined path, but storage has been a laggard. Until now.
We're entering the post-smartphone era, where wearable gadgets from watches and fitness bands to glasses and health aids will power the next technological revolution. With mass adoption of wearable devices comes a new data ecosystem that must be protected. Wearables open new pathways that facilitate the tracking, sharing and storing of consumers’ personal health, location and daily activity data. Consumers have some idea of the data these devices capture, but most don’t realize how revealing and...
Unless your company can spend a lot of money on new technology, re-engineering your environment and hiring a comprehensive cybersecurity team, you will most likely move to the cloud or seek external service partnerships. In his session at 18th Cloud Expo, Darren Guccione, CEO of Keeper Security, revealed what you need to know when it comes to encryption in the cloud.
"We build IoT infrastructure products - when you have to integrate different devices, different systems and cloud you have to build an application to do that but we eliminate the need to build an application. Our products can integrate any device, any system, any cloud regardless of protocol," explained Peter Jung, Chief Product Officer at Pulzze Systems, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
"We are an all-flash array storage provider but our focus has been on VM-aware storage specifically for virtualized applications," stated Dhiraj Sehgal of Tintri in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
It's easy to assume that your app will run on a fast and reliable network. The reality for your app's users, though, is often a slow, unreliable network with spotty coverage. What happens when the network doesn't work, or when the device is in airplane mode? You get unhappy, frustrated users. An offline-first app is an app that works, without error, when there is no network connection. In his session at 18th Cloud Expo, Bradley Holt, a Developer Advocate with IBM Cloud Data Services, discussed...
Data is the fuel that drives the machine learning algorithmic engines and ultimately provides the business value. In his session at 20th Cloud Expo, Ed Featherston, director/senior enterprise architect at Collaborative Consulting, will discuss the key considerations around quality, volume, timeliness, and pedigree that must be dealt with in order to properly fuel that engine.
Between 2005 and 2020, data volumes will grow by a factor of 300 – enough data to stack CDs from the earth to the moon 162 times. This has come to be known as the ‘big data’ phenomenon. Unfortunately, traditional approaches to handling, storing and analyzing data aren’t adequate at this scale: they’re too costly, slow and physically cumbersome to keep up. Fortunately, in response a new breed of technology has emerged that is cheaper, faster and more scalable. Yet, in meeting these new needs they...
In addition to all the benefits, IoT is also bringing new kind of customer experience challenges - cars that unlock themselves, thermostats turning houses into saunas and baby video monitors broadcasting over the internet. This list can only increase because while IoT services should be intuitive and simple to use, the delivery ecosystem is a myriad of potential problems as IoT explodes complexity. So finding a performance issue is like finding the proverbial needle in the haystack.
When it comes to cloud computing, the ability to turn massive amounts of compute cores on and off on demand sounds attractive to IT staff, who need to manage peaks and valleys in user activity. With cloud bursting, the majority of the data can stay on premises while tapping into compute from public cloud providers, reducing risk and minimizing need to move large files. In his session at 18th Cloud Expo, Scott Jeschonek, Director of Product Management at Avere Systems, discussed the IT and busin...
According to Forrester Research, every business will become either a digital predator or digital prey by 2020. To avoid demise, organizations must rapidly create new sources of value in their end-to-end customer experiences. True digital predators also must break down information and process silos and extend digital transformation initiatives to empower employees with the digital resources needed to win, serve, and retain customers.
"We are the public cloud providers. We are currently providing 50% of the resources they need for doing e-commerce business in China and we are hosting about 60% of mobile gaming in China," explained Yi Zheng, CPO and VP of Engineering at CDS Global Cloud, in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
"Once customers get a year into their IoT deployments, they start to realize that they may have been shortsighted in the ways they built out their deployment and the key thing I see a lot of people looking at is - how can I take equipment data, pull it back in an IoT solution and show it in a dashboard," stated Dave McCarthy, Director of Products at Bsquare Corporation, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
@DevOpsSummit taking place June 6-8, 2017 at Javits Center, New York City, is co-located with the 20th International Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. @DevOpsSummit at Cloud Expo New York Call for Papers is now open.
Predictive analytics tools monitor, report, and troubleshoot in order to make proactive decisions about the health, performance, and utilization of storage. Most enterprises combine cloud and on-premise storage, resulting in blended environments of physical, virtual, cloud, and other platforms, which justifies more sophisticated storage analytics. In his session at 18th Cloud Expo, Peter McCallum, Vice President of Datacenter Solutions at FalconStor, discussed using predictive analytics to mon...
Today we can collect lots and lots of performance data. We build beautiful dashboards and even have fancy query languages to access and transform the data. Still performance data is a secret language only a couple of people understand. The more business becomes digital the more stakeholders are interested in this data including how it relates to business. Some of these people have never used a monitoring tool before. They have a question on their mind like “How is my application doing” but no id...
@GonzalezCarmen has been ranked the Number One Influencer and @ThingsExpo has been named the Number One Brand in the “M2M 2016: Top 100 Influencers and Brands” by Onalytica. Onalytica analyzed tweets over the last 6 months mentioning the keywords M2M OR “Machine to Machine.” They then identified the top 100 most influential brands and individuals leading the discussion on Twitter.
As data explodes in quantity, importance and from new sources, the need for managing and protecting data residing across physical, virtual, and cloud environments grow with it. Managing data includes protecting it, indexing and classifying it for true, long-term management, compliance and E-Discovery. Commvault can ensure this with a single pane of glass solution – whether in a private cloud, a Service Provider delivered public cloud or a hybrid cloud environment – across the heterogeneous enter...
In IT, we sometimes coin terms for things before we know exactly what they are and how they’ll be used. The resulting terms may capture a common set of aspirations and goals – as “cloud” did broadly for on-demand, self-service, and flexible computing. But such a term can also lump together diverse and even competing practices, technologies, and priorities to the point where important distinctions are glossed over and lost.