cloud computing: the ultimate centralized ict...
TRANSCRIPT
Cloud Computing:the Ultimate Centralized ICT Architecture?
Workshop on ethics and social accountability for ICT "The challenges of virtuality and the cloud: the implications of social accountability and professional ethics"
IFIP Working Group 9.2 on Social Accountability and ICT, Special Interest Group 9.2.2 on Ethics and ComputingBCS ICT Ethics Specialist Group.
London, 23 February 02015Norberto Patrignani
2 / 18
Cloud Computing as a Centralized Architecture
3 / 18
Firewall
PROVIDER's
LAN
Firewall
192.168.200.1
172.17.113.141
172.17.7.193
172.17.112.33
172.17.6.113
93.186.128.89
74.125.51.217
74.125.232.112
Cloud User
Cloud Provider
Cloud Computing Architecturer
4 / 18
Cloud Computing Architecture
USER's
LAN
System & Network Management
Firewall
PROVIDER's
LAN
Firewall
192.168.2.1
192.168.200.1
172.17.113.141
172.17.7.193
172.17.112.33
172.17.6.113
74.125.232.112(www.l.google.com)
93.186.128.89
74.125.51.217
74.125.232.112192.168.2.177
Cloud User
Cloud Provider
5 / 18
Terminals Host
Host PCs
Host-CentricComputing
Distributed, Client/ServerComputing
Cloud Computing: Back to the Future
TouchScreens
ProcessingStorage
ProcessingStorage
InputStorageProcessingOutputNetwork
Input
OutputNetwork
Input
OutputNetwork
HostCloud
Computing
6 / 18
Do artifacts have politics?Politeia vs Techne*
Supermarket Bazaar
Proprietary Software
centralized de-centralized
Nuclear Plant Solar Power
Free Software
Software as Service
PC Software
Boeing 747 Hang-Glider
Aircraft carrier Rowing Boat
Railway BicycleCarMetro
Mainframe ServerNetwork
Control CenterLAN Desktop Home PC
ShopShopping Malle-Commerce
LAN SoftwareServer Software
Submarine Ferry Boat
System Network Architecture
Internet
Glider
Ship Container
Sailors must yield to their captain's commands
Plato, Republic
Source: "The Whale and the Reactor - A search for Limits in an Age of High Technology", L.Winner, The University of Chicago Press, 1989
7 / 18
Cloud Computing as a Centralized Socio-Technical System
What Kind of Co-Shaping between ICT & Society?
8 / 18
Cloud Computing:Impact on Users and SMEs
Ethical Dilemmas for CIOs
Is there a Future for CIOs?
9 / 18
Services, NOT Devices
- Mobile access to (back-end) Applications drives the move to Cloud- Every SaaS provides Mobile access- Decrease Mobile traffic to In-House datacenter- With Bring-Your-Own-Device (BYOD) programs, IT is losing control ...
10 / 18
0
5
10
15
20
25
30
35
Int.Prop. &
DATA
Ability to
ENFORCE
Regulatory or
Contractual
Obligations
Unauthorized
use of DATA
Confidentiality of
DATA
Availability of
DATA
Integrity of
DATA
Ability to Test or
AUDIT a Cloud
Provider’s
Environment
Source: Deloitte, Enterprise at Risk: Privacy and Data Prot. Survey, 2009
Cloud Computing: Enterprise Customers Concerns
11 / 18
0
5
10
15
20
25
30
35
40
45
50
Security Integration w ith
existing
systems
Loss of control
over DATA
Availability Performance Compliance Ability to change
Provider
Cloud Computing: CIO's Concerns
Source: Adapted from CIO Research, 2009
12 / 18
Cloud Computing: Enterprise Customers Concerns
Source: dilbert.com
13 / 18
Towards the Virtual Enterprise
14 / 18
Processes
PeoplePlaces
Things
Human Capital Infrastructure
Collaboration
Rules and Roles
People, Processes, Places and ThingsVirtual Enterprise: a Collection of
Processes that (by means of the 3 domains - People, Places, Things)enable the management of Data, Information and Knowledge
15 / 18
- XXI century enterprise: a "workplace without workers"- Brains stay in their countries, minds cross the oceans- The "social" context of the traditional workers disappeared- Global job-agencies:
– teamlease.com that from India is providing well-educated workers all over the world
– odesk.com that provides all kind of "contractors"
– getacoder.com that helps in finding freelance programmers
– elance.com that "helps businesses hire and manage "in the cloud"
- Young programmers, good knowledge of English language, 300 $ / month - Towards a utopian participation of workers in the new enterprises or towards a dystopian new kind of cyber-slavery?
Working in a post-Turing scenario
16 / 18
IT Services from CAPEX to OPEX
Use ≠ OwnershipUse = Temp. Possession of a Replaceable Good (clone)
Strong Authentication
Cloud TraceabilitySecure Logs: Encrypted + Time-Stamped + Digitally Signed
Data Location,Data Encryption, Data Mining, Users' Profiling,Data Loss & Leaks,Function creep
Decreasing importance of Ownership & Uniqueness of the Owned
Data Clonable at Negligible Costs
De-Perimeterisation: disappearing of boundaries between systems and organisations (firewall ≠ drawbridge)
Cultural imperialism and dealing with diversity
Problem of many handsFour-hands Authorization
Monopoly& lock-in
Risk-management plan(s)Cybe-risk Insurance?
Cloud-brokers!The future of IT Orgs?
17 / 18
IFIP's DCCCDomain Committee on Cloud Computing
IFIP Domain Committee on Cloud Computing1st draft document for the IFIP Board, November 2014
Norberto Patrignani (chair)Dimiter Velev (vice.chair)Lucy Zhang (secretary)
18 / 18
Thank you!