IEEE International Conference on Cloud Networking
7–10 November 2022 // Paris, France

Keynotes

Keynote I:
Tackling “the identity problem”


Radia Perlman

Dell, USA

 

 

Abstract:

People mostly assume that “the identity problem” is well-understood, and that, given how long Internet authentication has been deployed, the world must have solved how to do that securely. This talk describes various facets of “the identity problem”; for instance, how does a website get a name, how does a website get a certificate, how does a browser know what to trust to sign certificates, how a human finds a website, how a user acquires a unique name, and how users prove they own their names. Surprisingly, there are unsolved issues with all of these aspects. As with most security problems, some people propose “blockchain” as being able to solve everything.

This talk will describe what aspects of identity and authentication blockchain might address, and compare a blockchain approach with what is deployed today. (Hint: I will argue that blockchain will not be an improvement). If the talk spurs spirited debate throughout the conference, all the better.

Biography:

Radia Perlman is a Fellow at Dell Technologies.  She is known for inventing much of the routing and bridging technology deployed in today’s networks.  She has also made contributions in network security and cryptography. She is the author of the textbook “Interconnections” (about network layers 2 and 3) and coauthor of “Network Security: Private Communication in a Public world”.

The 3rd edition of “Network Security” will hopefully be available before the conference, and will include topics such as quantum computing, post-quantum algorithms, blockchain, homomorphic encryption, and secure multiparty computation, in addition to the original material covering cryptography, user authentication, and other network security issues. She has been recognized with many industry honors including induction into the National Academy of Engineering, the Inventor Hall of Fame, The Internet Hall of Fame, Washington State Academy of Science, and lifetime achievement awards from Usenix and SIGCOMM.

She has a PhD in computer science from MIT.


Charlie Kaufman - IEEE CloudNet 2022
Keynote II:
Issues in Cloud Security


Charlie Kaufman

Dell, USA

 

 

Abstract:

What does it mean for a public cloud to be secure? There’s the traditional concern of protecting services from bad actors on the Internet, but there is also protecting customers from other customers, protecting the cloud infrastructure from malicious customers, and even protecting the Internet from malicious customers. There is also protecting customers from the operator of the cloud infrastructure.

Historically, network security was treated differently on the Internet, where you had to assume there were lots of hostile actors, and on an Intranet, where people (sometimes foolishly) assumed there were none. In recent years, the trend has been to treat all networks as hostile and to design for the worst case. But a cloud network truly is different. By a cloud network, I mean one where all routing components – including the hypervisors hosting untrusted guest software – are under the control of a single administration. In a cloud, the network can filter both what comes into endnodes and what goes out of them. Public clouds, where both other customers and the Internet at large have to be protected from bad actors on the inside, present some unique challenges. This talk looks at some of the challenges and the opportunities in this rapidly evolving space.

Biography:

Charlie Kaufman, security architect at Dell/EMC and currently in the midrange storage group, has long been involved with computer networking and security issues. Prior to Dell, at Microsoft he was the security architect for Microsoft Azure – Microsoft’s Public Cloud offering – where he was involved with all aspects of cloud security from design through responding to ongoing attacks. Prior to Microsoft, at Lotus he was chief security architect for Lotus Notes and Domino and later the entire Lotus product suite. Prior to Lotus, at Digital he was the Security Architect for their networking group and later for Digital’s UNIX offering.

He has contributed to a number of IETF standards efforts including IPsec, S/MIME, and DNSsec and served as a member of the Internet Architecture Board. He served on the National Academy of Sciences expert panel that wrote the book “Trust In Cyberspace” and holds 70 patents in the areas of networking and security. He is co-author of the textbook “Network Security: Private Communication in a Public World”, the third edition of which should be out by the time of this conference.


Keynote III:
Building the Responsible Internet


Paola Grosso
University of Amsterdam,

The Netherlands

 

 

Abstract:

In the last years, we are witnessing growing concerns from private citizens as well as governments regarding the trustworthiness of the Internet.  One way to address these questions is to look at the current Internet architecture, and the protocols that govern the data transmission, and change them so that we can have additional transparency, accountability, and controllability.

These three aspects are what we call the TAC triad of a Responsible Internet, an extension of the current Internet that we are currently investigating.

In my presentation I will cover the current research effort in this direction,  and show how moving towards more trustable infrastructures enables data sharing applications and services that comply with the desired security levels of the data owners.

Biography:

Paola Grosso (Member, IEEE)   is an Associate  Professor at the  University of   Amsterdam where she leads the Multiscale Networked Systems research group (mns-research.nl). Her work focuses on the creation of sustainable and secure e-infrastructures, which rely on the provisioning and design of programmable networks. She has an extensive list of publications on the topic and currently contributes to several national and international projects such as the EU-funded projects Fed4FIRE+ (https://www.fed4fire.eu/), SLICES-RI (https://slices-ri.eu/), as well as international initiatives like FABRIC (https://fabric-testbed.net/about/fab/).


Nicola di Pietro - CloudNet2022
Keynote IV:
Cloud deployments of 5G core networks: unleashing the power of private 5G


Nicola di Pietro
Athonet, Italy

 

 

Abstract:

5G networks have been conceived to address the needs and requirements of very heterogeneous verticals, proposing mobile networks as a controllable and tunable infrastructural asset for companies, industries, and governmental entities, even when they do not have a telecommunication-oriented vocation or deep expertise. To fully realize such an ambition, private 5G networks should be easily instantiated, operated, managed, and scaled. Cloud environments are a perfect domain to deploy virtualized network functions that support such goals.

This presentation focuses on mobile core network virtualized solutions that allow users to deploy the most advanced and sophisticated 5G networks with Wi-Fi-like simplicity while using any 5G-radio from any vendor. We will present a core network solution that can be deployed on private or public cloud environments and resources to serve the needs of different verticals, lighten and facilitate the network deployment and management, and increase the network’s robustness. On-cloud 5G core network deployments make private 5G affordable, practical, and accessible to all kinds of users, without sacrificing latency, resilience, or control, and with reduced management complexity.

In this keynote speech, we will discuss:

  • The network architecture and the cloud networking technologies that underlie on-cloud solutions.
  • From cloud to edge: distributed 5G core network solutions and cloud-supported “edge connectivity bubbles.”
  • The use cases addressed by these solutions: are take-away lessons and experiences from real-life deployments.
Biography:
Nicola di Pietro received a B.S. degree in mathematics from the University of Padova, Italy, in 2008. In 2010, he received his M.S. degree in mathematics jointly from the University of Padova, Italy, and the University of Bordeaux, France, within the framework of the international ALGANT program. He received his Ph.D. degree in mathematics from the University of Bordeaux, France, in 2014.
During the years of his doctoral studies, he was a Research Engineer with the European R&D Center of Mitsubishi Electric in Rennes, France. From 2014 to 2016, he was an Associate Post-Doctoral Fellow at Texas A&M University in Qatar. From 2017 to 2021, he was a Research Engineer with CEA LETI in Grenoble, France. He is now a System Engineer at Athonet, Italy.
He has co-authored several research papers, published within IEEE journals, and presented at international conferences. His main interests are 5G and beyond-5G network architectures and core functionalities, network function virtualization, management and orchestration, information theory, and lattice error-correcting codes.