Can We Secure the Internet? Prof. Eric A. Brewer UC Berkeley Berkeley in Silicon Valley March 1,...
-
Upload
norah-dennis -
Category
Documents
-
view
223 -
download
0
Transcript of Can We Secure the Internet? Prof. Eric A. Brewer UC Berkeley Berkeley in Silicon Valley March 1,...
Can We Secure the Internet?
Prof. Eric A. BrewerUC Berkeley
Berkeley in Silicon ValleyMarch 1, 2003
Can we reduce the motivation for attack?
Prof. Eric A. BrewerUC Berkeley
Berkeley in Silicon ValleyMarch 1, 2003
Adlai Stevenson, July 1965
We travel together, passengers on a little space ship … all committed for our safety to its security and peace;
We cannot maintain it half fortunate, half miserable, half confident, half despairing, half slave … half free in a liberation of resources undreamed of until this day. No craft, no crew can travel with such vast contradictions. On their resolution depends the survival of us all.
Hypothesis 1Current IT projects “trickle down” first-
world technology: Too expensive Assumes infrastructure, power Assumes IT knowledge and support Assumes literacy
We can directly attack these issues
Hypothesis 2Thousands of IT projects, but
Focus on devices not infrastructure No single project can afford to build
infrastructure, but all of them would benefit.We can enable low-cost infrastructure
Enhance all of the existing projects Enable new projects that were previously
intractable
Population (in millions)
>$20,000
$2,000–20,000
<$2,000
Purchasing power parity (in U.S. dollars)
There is a market, too…
100
4,000
emerging‘mass’ markets
adjacentmarkets
2,000
source: Harvard Business Review © 2002
ICT4B
Information and Communication Technology for Billions
Big PictureEnhance and enable IT projects:
Novel technology (direct attack) Novel deployment/support Support for semi- and illiterate users
Two real-world deployments (validate)Great partners
Novel TechnologyDevice cost: 10-100 times reduction Infrastructure cost: 10-100 times
reductionDevice power: 10-100 times lowerSpeech recognition for obscure
languages and dialects
Three Layer Architecture Devices
1-70 users each, $1-10 Short range wireless
Proxies (basestations) 100-1000 users, $200 , < $1/user Mixed wired, wireless, satellite Transient storage
Data Centers >1M users, < $0.10 / user Full power, networking, persistent storage
Devices Co-Design Devices/Infrastructure
=> 20-40x lower cost Enables more functionality Storage, processing, human analysis Longer battery life
Novel low-cost flexible displays 10-50x cheaper, more robust Printed using an inkjet process
System on a chip => $1-5 per device Looking at 1mW per device (with radio!)
Data is in the InfrastructureManage persistent state in the
infrastructureCan lose/rent the deviceEnables social science research (with
privacy)Enables group state
group calendars and news
Decouple Apps & Devices
Remote reprogramming over the network (authenticated)
Can upgrade/add services without changing the device!
Devices last longerDevices increase in usefulnessEnables flexibility and research
Low-cost InfrastructureGoal: 10-100 lower costKey idea: intermittent networking
Most apps do not need real-time continuous communication
Asynchronous is 10-100 times cheaperFeel: some spots are interactive, most
are more like e-mailNovel protocols, app support
Novel Deployment & SupportMicro-franchise model for long term
Grameen PhoneRemote management for most thingsSelf-contained wireless proxies with ad
hoc networkingNo keyboard, monitor, etc. on proxies.Data Centers are widely shared
Grameen Phone Lady Micro-franchisee Usually with a micro-
loan ($200) Buy and manages the
cell phone Rents it out to her
village (10-70 users) Income goes up 2-3x
Pays back loan (98% !)
Grameen Phone Lady Micro-franchisee Usually with a micro-
loan ($200) Buy and manages the
cell phone Rents it out to her
village (10-70 users) Income goes up 2-3x
Pays back loan (98% !)Uganda
Literacy Novel speech recognition:
Easy to train Speaker independent Any language or dialect Small vocabulary (order 100 words)
A non-IT person can train the speech for her dialect
Also speech output (canned) May do recognition on the device, or on proxy
Real DeploymentsFirst one is in India (2005-6)
IIT Delhi, HP Labs India
Second outside of Asia (2006-7) Probably Africa, Mexico or US
Five Application Areas Commerce Health Education Government Location-based services
Team includes social scientists: Stephen Weber, Isha Ray
Great Partners HP Intel Grameen Bank UNDP Markle IIT Delhi
More welcome!!!
SummaryNew approach for IT in developing
regionsNovel technology, infrastructure “direct attack” on the key challengesReal deploymentsEnable and enhance 1000s of projects
worldwideLong term: development over defense