11.07.2015 Views

syssec_red_book

syssec_red_book

syssec_red_book

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

18. EffectsPlus18.1 Roadmap Structure and RealizationThe proposed roadmap 1 is structu<strong>red</strong> in four sections/chapters (Changes,Vision, Challenges, Solutions and Research Needs).The roadmap was put together through a brainstorming session in twoseparate focus groups (one on Systems and Networks, and another on Servicesand Cloud Computing). Brainstorming results were translated into a mindmap,and then into a full writeup.In the following subsections, we will separately analyze each section of theroadmap.18.2 ChangesThe changes foreseen can be grouped into:• Changes in the impact of the Internet usage on end users (citizens)• Changes in the way business is conducted (in different sectors)• Changes in the broader socio-economic landscape18.2.1 Changes for End Users/CitizensEnd users will find the Internet more and more integral to their lives. This willalso increase their awareness of the danger of loss of control over their privateinformation. These conflicting agendas will raise interesting questions aboutthe role of privacy-enhancing technologies and privacy-related research in thefuture.There will be increasing interaction between physical and digital life, alsothanks to always-on, always-connected, interoperable and smart devices.18.2.2 Changes in the Business WorldThe business world is moving towards a scenario where everything happens“as a service,” with personalized, heterogeneous services being offe<strong>red</strong> throughthe cloud (including critical and sensitive infrastructure such as e-Health). Thecomposition and orchestration of services will create issues with misbehaving/maliciouscomponents. Virtualized and outsourced infrastructures willbecome dominant.This, and the consumer perspectives outlined above, will move the scale ofthe Internet to billions of nodes and above, increasing traffic and complexity.Critical Infrastructures will become increasingly Internet-connected, andsubject to sophisticated attacks.1 Which is unfortunately only available as a 2-year-old draft at the time of writing118

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!