Welcome!

@CloudExpo Authors: Zakia Bouachraoui, Elizabeth White, Yeshim Deniz, Pat Romanski, Liz McMillan

Related Topics: @CloudExpo, Mobile IoT, Microservices Expo, Containers Expo Blog, Agile Computing, Wearables

@CloudExpo: Blog Feed Post

Mobile Cloud Identity

Cloud Identity standards are defined by organizations like the Kantara Initiative

A key point that Microsoft makes in their Virtual Desktop Infrastructure materials is that IT architecture is evolving from device-centric to user-centric approaches.

Fundamentally this means increased portability and mobility of your apps and data across multiple devices, and it’s an effect that will be accelerated through parallel innovations from the world of Cloud Identity.

Cloud Identity
Cloud Identity standards are defined by organizations like the Kantara Initiative, who have a telco working group who specialise in this field.

For example this 18-page presentation Telco Massively Scalable Identity Architecture explains how it can be operated across a telco’s landscape of networks, mobile devices and digital TVs. On slide 9 they describe the critical technical feature: “User identities must be decoupled from network, device and customer identities.” ‘

Decoupling’ refers to the funamental virtualization that Cloud represents – It seperates applications and their data from the hardware that runs them, and as this effect becomes universal it will offer powerful feature benefits for users.

For example consider how your address book is ‘locked’ into your cell phone. You have to re-key in all the contact details if you change phones or providers. Data that is logically virtualized, ie. seperated from this hard-coded device to data relationship, will therefore  be portable and interoperable across any and all devices that you use.

This new level of capability will make possible a new generation of services too – ‘My Universal Cloud Address Book’ kinda thing, ultimately evolving into the Personal Data Store approach.

The technical architecture for achieving this is described in TAS3 – Personal Data Stores. Trusted Architecture for Secure Shared Services (with Privacy) and Personal Data Store.

Read the original blog entry...

More Stories By Cloud Best Practices Network

The Cloud Best Practices Network is an expert community of leading Cloud pioneers. Follow our best practice blogs at http://CloudBestPractices.net

CloudEXPO Stories
Transformation Abstract Encryption and privacy in the cloud is a daunting yet essential task for both security practitioners and application developers, especially as applications continue moving to the cloud at an exponential rate. What are some best practices and processes for enterprises to follow that balance both security and ease of use requirements? What technologies are available to empower enterprises with code, data and key protection from cloud providers, system administrators, insiders, government compulsion, and network hackers? Join Ambuj Kumar (CEO, Fortanix) to discuss best practices and technologies for enterprises to securely transition to a multi-cloud hybrid world.
"Calligo is a cloud service provider with data privacy at the heart of what we do. We are a typical Infrastructure as a Service cloud provider but it's been designed around data privacy," explained Julian Box, CEO and co-founder of Calligo, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
We are seeing a major migration of enterprises applications to the cloud. As cloud and business use of real time applications accelerate, legacy networks are no longer able to architecturally support cloud adoption and deliver the performance and security required by highly distributed enterprises. These outdated solutions have become more costly and complicated to implement, install, manage, and maintain.SD-WAN offers unlimited capabilities for accessing the benefits of the cloud and Internet. SD-WAN helps enterprises to take advantage of the exploding landscape of cloud applications and services, due to its unique capability to support all things cloud related.
Discussions of cloud computing have evolved in recent years from a focus on specific types of cloud, to a world of hybrid cloud, and to a world dominated by the APIs that make today's multi-cloud environments and hybrid clouds possible. In this Power Panel at 17th Cloud Expo, moderated by Conference Chair Roger Strukhoff, panelists addressed the importance of customers being able to use the specific technologies they need, through environments and ecosystems that expose their APIs to make true change and transformation possible.
Containers and Kubernetes allow for code portability across on-premise VMs, bare metal, or multiple cloud provider environments. Yet, despite this portability promise, developers may include configuration and application definitions that constrain or even eliminate application portability. In this session we'll describe best practices for "configuration as code" in a Kubernetes environment. We will demonstrate how a properly constructed containerized app can be deployed to both Amazon and Azure using the Kublr platform, and how Kubernetes objects, such as persistent volumes, ingress rules, and services, can be used to abstract from the infrastructure.