Internet DRAFT - draft-rdsx1-intarea-pstnize-internet
draft-rdsx1-intarea-pstnize-internet
Intarea Working Group R. Romansky, Ed.
Internet-Draft Tech. Univ. of Sofia.
Intended status: Informational B. Khasnabish
Expires: July 2, 2016 ZTE (TX) Inc.
December 30, 2015
PSTNization of the Internet
draft-rdsx1-intarea-pstnize-internet-02.txt
Abstract
This draft discusses the features and functions that the Internet
must support in order to be as robust and trustworthy as the public
switched telephone network (PSTN, http://en.wikipedia.org/wiki/
Public_switched_telephone_network). In general the PSTN-like
features and functions include verifiable addressing and numbering,
higher privacy and security, increased reliability (no more than
around five minutes of unplanned outage over one year time period),
survivability and resiliency, desirable level of scalability, alarms,
correlation, and diagnosis capability, and local/international level
of accountability. Incorporation of these (or similar) features are
expected to harden the Internet.
The topics related to Internet hardening were discussed during IETF88
technical plenary (http://www.ietf.org/proceedings/88/technical-
plenary.html) in Vancouver, BC, Canada in Nov. 2013. A follow-up
joint W3C/IAB workshop on strengthening the Internet against
pervasive monitoring (STRINT, https://www.w3.org/2014/strint) was
held before IETF89 meeting in London, UK. During the IETF90
Technical Plenary Session
(http://www.ietf.org/proceedings/90/minutes/minutes-90-iab-
techplenary) on Monday, 21 July 2014 in Toronto, Canada the Technical
Topic discussion focused on Network topology and geography. The
presentations revealed that for business relationship and/or policy
reasons, local traffic routinely cross national borders for so called
'efficient' routing, thereby facilitating monitoring, copying, and
surveillance of traffic from users' sessions by both authorized and
unauthorized entities. All of the technical presentations are
available at the website of IETF90
proceedings(http://www.ietf.org/proceedings/90/slides/slides-90-iab-
techplenary-9.pdf).
In this draft, we discuss the requirements for PSTNization of
Internet interfaces, protocols, services, and management and
configuration capabilities.
Romansky & Khasnabish Expires July 2, 2016 [Page 1]
Internet-Draft PSTNizing the Internet December 2015
NOTE: We are looking for additional contributors to update the
contents of Section 2 to Section 6. If you are interested, please
send an email to draft-rdsx1-intarea-pstnize-internet@tools.ietf.org
with the relevant Section Number and Section Title in the Subject
line of your email with an estimated completion time.
Status of This Memo
This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet-
Drafts is at http://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
This Internet-Draft will expire on July 2, 2016.
Copyright Notice
Copyright (c) 2015 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as
described in the Simplified BSD License.
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 3
1.1. Scope . . . . . . . . . . . . . . . . . . . . . . . . . . 4
1.2. Abbreviations . . . . . . . . . . . . . . . . . . . . . . 4
1.3. Conventions and Definitions . . . . . . . . . . . . . . . 5
2. Public Switched Telephone Network (PSTN) . . . . . . . . . . 5
2.1. Addressing and Numbering in PSTN . . . . . . . . . . . . 6
2.2. PSTN Interfaces . . . . . . . . . . . . . . . . . . . . . 6
2.3. PSTN Protocols . . . . . . . . . . . . . . . . . . . . . 6
Romansky & Khasnabish Expires July 2, 2016 [Page 2]
Internet-Draft PSTNizing the Internet December 2015
2.4. PSTN Configuration . . . . . . . . . . . . . . . . . . . 6
2.5. PSTN Management . . . . . . . . . . . . . . . . . . . . . 6
2.6. PSTN Borders and Safeguards . . . . . . . . . . . . . . . 6
2.7. PSTN Services . . . . . . . . . . . . . . . . . . . . . . 7
3. Enhancing (PSTNIzation) the Internet Services . . . . . . . . 7
3.1. Addressing and Numbering . . . . . . . . . . . . . . . . 7
3.2. Service Security and Privacy . . . . . . . . . . . . . . 7
3.3. Service Availability . . . . . . . . . . . . . . . . . . 8
3.4. Service Reliability . . . . . . . . . . . . . . . . . . . 8
3.5. Service Resiliency . . . . . . . . . . . . . . . . . . . 8
3.6. Accountability for Service . . . . . . . . . . . . . . . 8
3.7. Network Robustness . . . . . . . . . . . . . . . . . . . 8
3.8. Hardening (Local/Domestic) Internet Borders . . . . . . . 8
3.9. Traceability and Diagnosis . . . . . . . . . . . . . . . 8
4. Service Lifecycle Management . . . . . . . . . . . . . . . . 8
5. Hardening of the Internet Services APIs . . . . . . . . . . . 8
6. Network Management and Service Orchestration . . . . . . . . 9
7. Privacy and Security Considerations . . . . . . . . . . . . . 9
7.1. Privacy and Personal Data Protection (PDP) in Digital
World . . . . . . . . . . . . . . . . . . . . . . . . . . 9
7.2. Digital World and Digital Privacy . . . . . . . . . . . . 10
7.3. Mine Principles of Personal Data Protection . . . . . . . 11
7.4. Problems of Digital World for Privacy and Personal Data
Protection . . . . . . . . . . . . . . . . . . . . . . . 13
7.5. Last Regulations in Privacy and PDP . . . . . . . . . . . 15
8. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 17
9. Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . 17
10. References . . . . . . . . . . . . . . . . . . . . . . . . . 17
10.1. Normative References . . . . . . . . . . . . . . . . . . 17
10.2. Informative References . . . . . . . . . . . . . . . . . 19
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 20
1. Introduction
The Internet, as defined in [RFC2026] along with the World Wide Web
[W3C, http://www.w3.org/] can provide data, text, voice, video, etc.
services seamlessly to almost everywhere in the World. Work groups
like RTCWeb (in IETF, http://datatracker.ietf.org/wg/rtcweb/) and
WebRTC (in W3C) have been enhancing the protocols and interfaces in
order to enrich Web-based audio, video, collaboration, and gaming
services. However, a number of Entities have been utilizing privacy-
invading Internet innovations (PIIs) in the name of societal and
economic advancements. Some of these Entities (e.g., the
Internet.org) are partnering with local Communities and Non-Profit
organizations in order to improve bandwidth, connectivity, and
reachability to all of the inhabitants of the World through wired and
wireless (mobile) devices. Consequently, it is becoming increasingly
Romansky & Khasnabish Expires July 2, 2016 [Page 3]
Internet-Draft PSTNizing the Internet December 2015
important to consider bringing back PSTN-like features and functions
including privacy and security, resiliency, and accountability.
Benefits: The are many benefits of PSTNizing the Internet. The major
ones would be bringing back trust, and confidence in the Internet
along with improving user experience and satisfaction.
Threats: The sophistication and frequency of privacy invasion are
increasing rapidly. However, the legal and moral principles are
still at the infancy. Therefore, in addition to PSTNizing the
Internet, it is imperative to initiate a strategic discourse on these
topics [Monte].
1.1. Scope
The scope of this document is discussion on incorporating PSTN
features and functions in the Internet.
Ongoing discussions on supporting high-quality
[I-D.khasnabish-dispatch-qoe-management] real-time services over the
Internet can be especially found in the following IETF and IRTF
Websites: RTCWeb [http://datatracker.ietf.org/wg/rtcweb/] NEA
[http://datatracker.ietf.org/wg/nea/], DISPATCH
[http://datatracker.ietf.org/wg/dispatch/] OAUTH
[http://datatracker.ietf.org/wg/oauth/],and SDN-RG [http://irtf.org/
sdnrg].
1.2. Abbreviations
o ADR: Automated Disaster Recovery
o ALB: Automated Load Balancing
o API: Application Programming Interface
o AR: Auto Regressive
o DC: Data Center
o DLB: Dynamic Load Balancing
o I2RS: Interface to Routing System
o LB: Load Balancing
o NE: Network Element
o PSTN: Public Switched Telephone Network
Romansky & Khasnabish Expires July 2, 2016 [Page 4]
Internet-Draft PSTNizing the Internet December 2015
o PII: Privacy-Invading Internet Innovation
o SDN: Software-Defined Network/Networking
o SE: Service Element
o SFC: Service Function Chaining
o SS7: Signaling System Number 7
o VSE: Virtual SE
1.3. Conventions and Definitions
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in [RFC2119].
The following definitions and descriptions of terms are utilized
throughout this draft. When applicable, descriptions of some of the
terms are repeated here from other IETF/IRTF document for
convenience.
o AIN --
o CLASS --
o DR --
o Features --
o IN --
o LB --
o NEBS --
o VNE --
o VSE --
2. Public Switched Telephone Network (PSTN)
PSTN is hierarchically organized centrally-controlled distributed
switching network. CLASS ... PBX .. Terminal ...
PSTN offers circuit switch based communication service. An end-to-
end circuit (similar to a tunnel in packet-switched network) must be
Romansky & Khasnabish Expires July 2, 2016 [Page 5]
Internet-Draft PSTNizing the Internet December 2015
established before a session can be initiated. The circuit
establishment, maintenance, and release are achieved through a
separate network (called SS7 network). This clear separation between
signaling and transmission systems has many advantages including
flexibility, scalability, and accountability.
2.1. Addressing and Numbering in PSTN
Terminal Address: ...
PBX Address: ...
CLASS-5 and other Switch Addresses: ...
2.2. PSTN Interfaces
The line and circuit interfaces in PSTN are very well-defined (rigid)
and hence have limited flexibility for rapid adaptation and updates.
Internet interfaces offer a tremendous amount of flexibility.
Although this is good for innovation, it offers a paradise for
hackers, sniffers, and cheaters.
2.3. PSTN Protocols
TDM: ...
SS7: ...
X.25: ...
2.4. PSTN Configuration
In this section we discuss tools and methods for configuring the PSTN
switches and services.
2.5. PSTN Management
In this section we discuss management aspects of PSTN switches and
services.
2.6. PSTN Borders and Safeguards
In this section we discuss how well-defined and guarded boundaries
PSTN provides for National (domestic) protection of the services.
Romansky & Khasnabish Expires July 2, 2016 [Page 6]
Internet-Draft PSTNizing the Internet December 2015
2.7. PSTN Services
In this section we discuss traditional PSTN services. Intelligent
Networking (IN) and Advanced IN (AIN) concepts for service innovation
are also described.
3. Enhancing (PSTNIzation) the Internet Services
In this section we discuss how the PSTN-like features and functions
can be introduced/incorporated in the Internet. Of specific interest
are the logical and physical points and functions that can be
enhanced so that PSTN-grade hardening can be supported when it is
desied/required. A recent draft
[I-D.khasnabish-dispatch-qoe-management] discusses how end-point's
intelligence can be utilized for maintaining consistent quality of
Internet service experience.
3.1. Addressing and Numbering
In this section we discuss how address, name and numbers can be
hardened in the Internet. Both physical and virtual location may
need to be associated with the name, address and number of Internet-
attached points (ports and devices) of interest to make them
traceable.
3.2. Service Security and Privacy
In this section we discuss how Internet domain services can be made
as secure (or better) and private (or better) as in the PSTN.
As discussed in [ENISA-14], there is a collusion between the need to
keep the private data secure and processing in the emerging
virtualized (cloud or shared resources) network environment, be it
mobile network or the Internet. Traditional cryptographic mechanisms
are not useful for supporting privacy and processing in mobile and
cloud storage environments over the Internet.
The emerging technologies like Fully Homomorphic Encryption (FHE),
Order Preserving Encryption (OPE), and Delegated and Brokered
Encryption (DBE) appears to be promising. However, inherent
weakness, and dependency on technology and human factors may make
them equally vulnerable as many of the commonly used cryptographic
protocols. A combination of different process, procedures, policies,
and technologies may offer a better outcome in this gamble.
Romansky & Khasnabish Expires July 2, 2016 [Page 7]
Internet-Draft PSTNizing the Internet December 2015
3.3. Service Availability
In this section we discuss how Internet domain services can be made
as highly available (or better) as in the PSTN.
3.4. Service Reliability
In this section we discuss how Internet domain services can be made
as highly reliable (or better) as in the PSTN.
3.5. Service Resiliency
In this section we discuss how Internet domain services can be made
as highly resilient (or better) as in the PSTN.
3.6. Accountability for Service
In this section we discuss how the Internet service providers can be
made as accountable (or better) as in PSTN.
3.7. Network Robustness
In this section we discuss how the Internet domain can be made as
highly robust (or better) as in the PSTN.
3.8. Hardening (Local/Domestic) Internet Borders
In this section we discuss how the local/domestic borders/boundaries
of the Internet can be hardened for protecting both contents,
communications (sessions), and other relevant network information.
3.9. Traceability and Diagnosis
In this section we discuss how verifiable network and service
traceability and diagnosis can be incorporated in the Internet.
4. Service Lifecycle Management
In this section we discuss the generic lifecycle management of
Internet services including those of information and packets/flows.
5. Hardening of the Internet Services APIs
The APIs of the Internet domain services commonly use open
interfaces, protocols, profiles, etc. This offers the desired level
of flexibility that supports dynamic navigation of sessions/flows
through a variety of operations systems and physical/virtual
infrastructure network/service elements. This also helps achieve
Romansky & Khasnabish Expires July 2, 2016 [Page 8]
Internet-Draft PSTNizing the Internet December 2015
unified and seamless user experience irrespective of what the
underlying Internet infrastructure is. The emerging Cloud reference
framework [I-D.khasnabish-cloud-reference-framework] discusses these
in details.
In this section we discuss how the Internet domain services APIs can
be hardened in order to provide general PSTN-like reliability and
trustworthiness without sacrificing the flexibility and openness.
6. Network Management and Service Orchestration
In this section we discuss how PSTN-like management and Orchestration
can be inducted in multi-technology and multi-admin-domain Internet
environment.
7. Privacy and Security Considerations
In order to improve the flexibility and scalability of the Internet,
the current trend is to utilize virtualization, as discussed in
[I-D.junsheng-opsawg-virtual-resource-management], and separation of
control and transport (and forwarding), as discussed in e.g.,
[RFC3654] and [RFC3746]. It is expected that both capital and
operational expenditures will be significantly reduced because of
using virtualization of resources like CPU, memory, storage, links,
nodes, and value-added service devices like firewall, deep packet
inspector, deep stats inspector, etc.
However, the use of virtualization may also make the network
resources more vulnerable to abuse and spoofing. For example, the
security considerations for virtualized resources in data-center
environment can be found in [I-D.karavettil-vdcs-security-framework].
7.1. Privacy and Personal Data Protection (PDP) in Digital World
The initiatives for improving of the Information Society (IS) define
new requirements to the contemporary information technologies (IT) to
decide important problems of globalization including field as
distributed information servicing, remote access to distributed
environments, sharing and using different public and own resources,
cloud and mobile cloud computing, social computing, e-learning, etc.
All these opportunities of contemporary network world expect creation
of personal profiles and uploading personal information that could be
accessed by other users, not always in a correct way [Lam]. This
requires necessity for modernization of data protection rules and
digital privacy for all participants in the digital world.
It is possible to ask the question "What are the components of the
digital world built on the base of the network space?" Traditional
Romansky & Khasnabish Expires July 2, 2016 [Page 9]
Internet-Draft PSTNizing the Internet December 2015
component of course is the web-environment that proposes large
collection of contents, specific and traditional and specialized
information resources, tools for virtual reality [Garber], etc. that
could help users obtain some knowledge based on interactive
communications.
This collection of means and tools could be extended by opportunities
of cloud environments and data centres (using remote resources as a
services) [Chen], social media and Web 2.0 (tools that permit
collaboration and sharing of information and knowledge between large
set of users) [Kinast], distributed environments for online/distance
learning (using and sharing learning content and organize the
collaboration on the base of specific interests) [Yong], Massive Open
Online Courses (MOOCs) that many educational institutions apply; the
tendency is that MOOCs will change the higher education in the coming
years [Meyer].
Creation and supporting users' profiles in the network space permit
different personal information to be accessed by other users of the
global network. This could be made very undesirable problems for
users and to disturb their privacy. In this reason the Personal Data
Protection (PDP) should be important obligation of the distributed
services providers. Some problems of digital privacy in the network
world and challenges of cloud servicing for the personal data
protection are discussed in [Romansky-1] and [Romansky-2]. A brief
summary of the challenges of digital world for privacy and PDP is
presented below.
7.2. Digital World and Digital Privacy
It is well-known that privacy is an important fundamental human right
uniting personal data processing, personal communications via post
and Internet, processing personal profiles in social media, forums
and other distributed environments. The new situation in the digital
world changes the traditional understanding of the privacy as "the
right to be alone" and introduces the new vision of "the right to be
forgotten." In this reason, giving different information resources
and distributed information services by Internet requires creation of
knowledge in the society for principles, methods and technological
means and tool for adequate data processing.
The digital world permits accessing and using components as web-
sites, distributed resources, content, libraries, forums, social
media, cloud services, etc. Most people (individuals and employees)
use Internet to extend their knowledge, social contacts and
relationships. Social network, forums and blogs permits to contact
with different users. Fact is that more employers visit social
forums to select possible employees for their companies. In this
Romansky & Khasnabish Expires July 2, 2016 [Page 10]
Internet-Draft PSTNizing the Internet December 2015
case the users are not only passive participants, but they could
realize different forms of direct communications, uploading
information and make access to published information of other users.
Identical problems with data protection policy exist in the fields of
network communications, distance learning, cloud services and other
opportunities of the digital world. This requires a serious risk
analysis of activities by using web applications and network
environments. For example, the using of cloud services permits to
increase the processing and storage power without additional
investments for a company. This form of remote data processing uses
virtual machines and disks (storage) via Internet. The problem is
that the cloud collects more and more personal data of individuals
and information about institutions. All these activities in the
digital world require developing an adequate information security
policy and improving personal data protection legislation.
Extended discussion about main principles and rules for data
protection organization, securing privacy in the network world and
summarized some important challenges of cloud servicing for the
personal data protection are discussed in [Romansky-1] and
[Romansky-2].
7.3. Mine Principles of Personal Data Protection
The Data Protection Policy must be regarded in the context of IT
Security Policy as a part of Security Policy as shown in Figure-1.
o--------------------o o-----------------o
| IT Security Policy | <------ | Security Policy |
o--------+-----------o o-----------------o
|
|
|
o--------v-----------o --> Computer Layer
| Data Protection | --> Physical Layer
| Policy | --> Administrative Layer
o--------------------o --> Legislative Layer
Figure 1: Data Protection Policy in the Frame of Security Policy
Security Policy should be regarded as set of means and methodologies
for preventing incidents, detecting attacks and restoring the system
after successful attack. It includes rules, procedures and tools
used on hierarchical layers (network, software, hardware, physical
and administrative). Data Protection Policy should be discussed in
Romansky & Khasnabish Expires July 2, 2016 [Page 11]
Internet-Draft PSTNizing the Internet December 2015
the frame of IT Security Policy and harmonization of data protection
with information security rules from the security core (computer
layer) to the external layers (administrative and legislative) is
needed. The computer layer presents embedded instruments for
protection of personal data structures (hardware, software,
cryptographic, biometric). The physical layer consists of technical
instruments, means and tools for unauthorized access blocking,
separation of LAN segments, recognition of legitimate users, etc.
The next two layers unite organizational rules, instructions and
procedures for administrative control and legislative and normative
documents.
European understanding for "personal data" is the information that
permits to identify a person directly or indirectly, in particular by
reference to an identification number or to one or more factors
specific to his physical, physiological, mental, economic, cultural
or social identity. A popular definition in USA is connected to the
rights and obligations of the individuals and institutions about
collection, using, keeping and disclosing personal information. In
this reason any operation or set of operations with personal data
(using automatic or not-automatic means) is called "processing of
personal data." The main participants in this process are "data
subject" (the owner of personal data), "data controller" (determines
the purpose and the means of processing and it is responsible for all
procedures with personal data), "data processor" (real processing of
personal data on the base of agreement with the data controller),
"receiver of personal data" (the giving of personal data could be on
the base of lawful reason only).
Life cycle of personal data processing is proposed in Figure-2 and
describes the traditional processing of personal data by a sequence
of phases beginning from giving of personal data by individual and
finishing with personal data destroying (by the data controller)
after the goal realization. The purpose of the phases is listed
below.
o The COLLECTION of personal data must be made based on a legitimate
reason only and with the consent of the individual;
o The PRESERVATION of collected data should be realized in the
registers based on preliminary defined goal and criteria;
o The UTILIZATION must be made by legitimate persons on the base of
principles of information security; authentication by using
username, password, digital certificate, personal identification
number, and biometric means; authorization on the base of
developed digital right management system; accountability using
Romansky & Khasnabish Expires July 2, 2016 [Page 12]
Internet-Draft PSTNizing the Internet December 2015
personalization of the access to the data structures and
registration of user activities;
o ACTUALIZATION, that is the personal data must be correct, full and
actual; integrity and content management;
o The TRANSFER to other country and the giving to other person must
be realized on the base of strong rules only;
o ARCHIVING could be made if it is required by law but for a limited
period of time only;
o DELETION of personal data must be made after realization of the
goal.
o---------------o
+--->| Transfer to |
| | other country |
o----------------------o | o---------------o
| Authorization | |
| & Authentication | | o---------------o
| & Accountability | +--->| Giving to |
o-------------------+--o | | third person |
| | o---------------o
| |
o------------o o-v-----o | o---------------o
| Preserving |--->| Using |--+--->| Archiving |
o-----^------o o---+---o o---------------o
| | |
| | |
o-----+------o o---v-----------o |
Individual--->| Collection |--->| Actualization | o---v--------o
o------------o o---------------o | Destroying |
o------------o
Figure 2: Life Cycle of Personal Data Processing
7.4. Problems of Digital World for Privacy and Personal Data Protection
The contemporary network world causes different problems for digital
privacy. For example the privacy in social media concerns with
protection of users' information and securing the users' rights. The
media must try to prevent different incidents with users' data as
unauthorized access, viruses, illegal transfer to third party, etc.
Analogous problems could be detected and at cloud services also
because the cloud customers need to be assured that providers
Romansky & Khasnabish Expires July 2, 2016 [Page 13]
Internet-Draft PSTNizing the Internet December 2015
implement adequate security policy for data protection. Challenges
of cloud for PDP discussed in [Romansky-2] are common for all network
world. Typical problem for cloud environments is multi-tenancy that
could be risk category because it permits possible access to personal
data of network user by another unauthorized user. A short summary
of common challenges for the privacy in the digital world is
presented below.
o Clear IDENTIFICATION of the roles of the participants in PDP
processes ("Data Controller," "Data Processor" and "Data
Subject")and to determine the responsibility for data protection
procedures (rules, measures, data subject rights, etc.).
According to the definitions of Directive 95/46/EC the data
controller determines purposes and means of the processing of
personal data. The problem in network world is that the functions
of customer, vendor and provider and the relation between them
could be defined for concrete case only. The service providers
have no legal obligation to protect personal data if they are not
defined as controllers or processors. This characterization will
permit to ignore the data protection obligations at the cases of
personal data outsourced or transferred to a third party for
processing.
o Data subject's RIGHTS. This is an integrated problem because the
individuals have different rights during the personal data
processing. One of the main problems during the registration is
that there is a risk for user's privacy (more personal data could
be required for registration and identification). For example,
some social networking sites collect extended personal information
in the page known as a "profile"(names, birth date, address, phone
number, social life, gender, country, hobbies, relationships,
etc.). These pieces of data personalize the users in major level
and the individuals must know the purpose of these data and reason
for processing. Another problem with the data subject's rights is
the impossibility to revise, access, block or delete their
personal data. In other hand, the providers have a full access to
the customer's data. Data controller must guarantee that each
user could define restriction for the own profile accessing. This
will prevent unauthorized access and incorrect dissemination of
personal information. This action could be realized by making the
profile private from the user by selection of these who can visit
the page and access to be after authentication.
o International data TRANSFER - according to Directive 95/46/EC
personal data could be transferred to third countries if the level
of personal data protection is adequate to those in the EU
countries. The data transfer between different service providers
(social media) or data centers (clouds) located anywhere in the
Romansky & Khasnabish Expires July 2, 2016 [Page 14]
Internet-Draft PSTNizing the Internet December 2015
word is typical procedure. Each personal information that is
uploaded to cloud, social media, networking site, etc. must be
protected according to the Directive 95/46/EC and users (data
owners) must be informed for all transfers.
o Data DELETION. If any user wants to delete data in his/her
profile he/she must be sure that these data will be really
deleted. In some cases, data could be transferred to other
service provider and a copy of data could be stored in different
place(s). This will be a problem of privacy for the individual.
Another case is when the information that was deleted or removed
by the user is passed to third party before deletion. Data
protection legislation gives strong rules for deletion of personal
data in the traditional cases, but for the social media this is
not clearly determined.
o SHARED information - all objects in the network society (sites,
social media, clouds) could be accessible from different places of
the world and the sharing of information will cause Internet-
related security problems (loss of data, destroying the integrity,
problems with accountability, hackers' attacks, etc.). For
example, each user of social media uploads information that will
be shared between a set of users and it could be disseminated to
different locations. In this case the data subject does not know
what policy and measures are used for counteraction to eventual
attacks. This problem is very important if data are sensitive
(medical status, for example).
o TECHNICAL and ORGANIZATIONAL measures for data protection - an
important obligation for the data controllers is to implement
appropriate measures for information security. These measures
should be a counteraction to all forms of destruction or loss of
personal data, to an unauthorized access (during the personal data
processing or transmission via communication links), and to all
illegal forms of processing. The service providers should
guarantee an effective protection of data integrity and data
availability in cloud environment, but it is known that more data
security measures will reduce the performance of the information
processing. In this reason, the providers must choose the most
appropriate security measures.
7.5. Last Regulations in Privacy and PDP
Modernization of data protection rules on European level has been
made in the last years. An example is the document "Proposed
Regulation" of the European Commission in January 2012 that proposes
new rules to strengthen online data protection rights. The reason
for these draft amendments is the fact "that rapid technological
Romansky & Khasnabish Expires July 2, 2016 [Page 15]
Internet-Draft PSTNizing the Internet December 2015
development and globalization have profoundly changed the world and
brought new challenges to the protection of personal data"
[Knijpenga]. This document discuses the paradigm "right to be
forgotten" as shown in Article 17, and the data subject rights to
data portability as discussed in Article 18, transfer between
different electronic processing systems.
The European Parliament has determined on 12 March 2014 that
architecture and fundamental principles of the data protection reform
for improving user protection and security in Cyber-space [Fischer].
The conclusion is that the further development and exploitation of
Cyber-space could not be realized without an adequate and strong
protection of the rights of individual users [EC]. The following
FOUR pillars have been determined.
o Pillar-1: "One continents one law" - a requirement about the
regulation and sanctions in private and public sectors.
o Pillar-2: "Strong regulation of European digital industry" - a
requirement for the non-European companies, when offering services
to European consumers, to apply the European rules and level of
data protection.
o Pillar-3: "The right to be forgotten / The right to be erased" -
this is the right of an individual to remove own personal data
from the system if she/he no longer want to use the online
services or there is no legitimate reason for keeping it in this
online system. This regulation will permit the individuals to
control own online identify and to require the personal profile to
be removed from the system (including social media platforms).
o Pillar-4: A "One-stop-shop" for businesses and citizens - a
regulation for the personal data processing by controller or
processor established in more that one country of European
Union.The new principles of regulation must extend the PDP frame
determined by the previously directives, and to propose adequate
solutions for all problems of PDP in social environments.
The new principles of regulation must extend the PDP frame determined
by the previously directives, and to propose adequate solutions for
all problems of PDP in the digital world.
In other hand, the users should undertake personal measures to
protect own information. The best practice say "protect yourself" by
using modern Internet security solutions (anti-virus programs,
firewalls, tools for browser protection, reputation-checking tools,
etc.). These tools must be regularly updated. An important side of
the protection is using effective policy for authentication - the
Romansky & Khasnabish Expires July 2, 2016 [Page 16]
Internet-Draft PSTNizing the Internet December 2015
password should be a mix of letters and numbers, and change them
often. It is not correct to use the same password at the access to
different network resources. The visiting network resources must be
deliberated and the reputation and safety rating of websites before
using must be analyzed. Finally, the main principle of users must be
"guard your personal data." Users must publish limited personal and
financial information in the Internet, for example, social media,
Internet cafes, websites, libraries, forums, etc.
8. IANA Considerations
Depending on the grade of hardening, a number of considerations may
be generated for IANA. Further details will evolve as this draft
matures.
9. Acknowledgments
The authors would like to thank many colleagues for their discussions
and support.
10. References
10.1. Normative References
[Chen] Chen, D., H. Zhao, "Data security and privacy protection
issues in cloud computing", International Conference on
Computer Science and Electronics Engineering (ICCSEE),
vol.1, pp.647-651 , March 2012.
[EC] "Progress on EU Data Protection Reform Now Irreversible
Following European Parliament Vote", European Commission -
MEMO, Strasbourg , March 2014,
<http://europa.eu/rapid/press-release_MEMO-14-186_en.htm>.
[ENISA-14]
"Study on cryptographic protocols (ISBN
978-92-9204-103-8)", European Union Agency for Network and
Information Security (ENISA) Cat.TP-06-14-085-EN-N ,
November 2014, <https://www.enisa.europa.eu/activities/
identity-and-trust/library/deliverables/study-on-
cryptographic-protocols>.
[Fischer] Fischer, A. E., "Improving User Protection and Security in
Cyberspace", Report of Committee on Culture, Science,
Education and Media, Council of Europe , March 2014,
<http://www.statewatch.org/news/2014/mar/coe-parl- ass-
cyberspace-security.pdf>.
Romansky & Khasnabish Expires July 2, 2016 [Page 17]
Internet-Draft PSTNizing the Internet December 2015
[Garber] Garber, L., "The Challenges of Securing the Virtualized
Environment", Computer, pp.17-23 , January 2012,
<http://www.statewatch.org/news/2014/mar/
coe-parl-ass-cyberspace-security.pdf>.
[I-D.junsheng-opsawg-virtual-resource-management]
Chu, J., Khasnabish, B., Qing, Y., and Y. Meng, "Virtual
Resource Management in Cloud", draft-junsheng-opsawg-
virtual-resource-management-00 (work in progress), July
2011.
[I-D.karavettil-vdcs-security-framework]
Karavettil, S., Khasnabish, B., Ning, S., and W. Dong,
"Security Framework for Virtualized Data Center Services",
draft-karavettil-vdcs-security-framework-05 (work in
progress), December 2012.
[I-D.khasnabish-cloud-reference-framework]
Khasnabish, B., Chu, J., Ma, S., So, N., Unbehagen, P.,
Morrow, M., Hasan, M., Demchenko, Y., and M. Yu, "Cloud
Reference Framework", draft-khasnabish-cloud-reference-
framework-08 (work in progress), April 2015.
[I-D.khasnabish-dispatch-qoe-management]
Khasnabish, B., Fernando, G., and L. Ya, "End-point based
Multimedia QoE Management", draft-khasnabish-dispatch-qoe-
management-02 (work in progress), July 2013.
[Kinast] "Social Media and Data Protection", Kinast and Partner ,
2014, <http://www.kinast-partner.com/data-protection-law/
social-media-and-data-protection/>.
[Knijpenga]
Knijpenga, A., "The Modernization of European Data
Protection Rules.", Deloitte , 2012,
<http://www.deloitte.com/assets/Dcom-
Switzerland/Local%20Assets/Documents/EN/Audit/RCL/ch_en_
the_modernization_of_european_data_protection_rules.pdf>.
[Lam] Lam, S. K., J. Riedl., "Are our online "friend" really
friends?", Computer, pp.91-93 , January 2012.
[Meyer] Meyer, J.P., S. Zhu, "Fair and Equitable Measurement of
Student Learning in MOOCs", Research and Practice in
Assessment, 1 (vol. 8), pp.26-39 , 2013,
<http://www.rpajournal.com/dev/wp-content/uploads/2013/05/
SF3.pdf>.
Romansky & Khasnabish Expires July 2, 2016 [Page 18]
Internet-Draft PSTNizing the Internet December 2015
[Monte] Monte, M., "Network Attacks and Exploitation: A
Framework", John Wiley and Sons Publishing, Indiana, USA ,
2015.
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119,
DOI 10.17487/RFC2119, March 1997,
<http://www.rfc-editor.org/info/rfc2119>.
[Romansky-1]
Romansky, R., "Digital Privacy in the Network World", In
Proceedings of the International Conference on Information
Technologies (InfoTech-2014), St. St. Constantine and
Elena, Bulgaria, pp.273-284 , September 2014,
<http://infotech-bg.com/proceedings>.
[Romansky-2]
Romansky, R., "Cloud Services: Challenges for Personal
Data Protection", International Journal on Information
Technologies and Security, No 3, pp.67-80 , September
2012, <http://ijits-bg.com/ijitsarchive>.
[Yong] Yong Chen, Wu He, "Security Risks and Protection in Online
Learning: A Survey", The International Review of Research
in Open and Distance Learning, 5 (vol. 14), pp.108-127 ,
December 2013,
<http://www.irrodl.org/index.php/irrodl/article/
viewFile/1632/2750>.
10.2. Informative References
[RFC2026] Bradner, S., "The Internet Standards Process -- Revision
3", BCP 9, RFC 2026, DOI 10.17487/RFC2026, October 1996,
<http://www.rfc-editor.org/info/rfc2026>.
[RFC3654] Khosravi, H., Ed. and T. Anderson, Ed., "Requirements for
Separation of IP Control and Forwarding", RFC 3654,
DOI 10.17487/RFC3654, November 2003,
<http://www.rfc-editor.org/info/rfc3654>.
[RFC3746] Yang, L., Dantu, R., Anderson, T., and R. Gopal,
"Forwarding and Control Element Separation (ForCES)
Framework", RFC 3746, DOI 10.17487/RFC3746, April 2004,
<http://www.rfc-editor.org/info/rfc3746>.
Romansky & Khasnabish Expires July 2, 2016 [Page 19]
Internet-Draft PSTNizing the Internet December 2015
Authors' Addresses
Radi Romansky (editor)
Tech. Univ. of Sofia.
8 Kliment Ohridski BLVD
Sofia , Bulgaria 1000
Europe
Phone: +359-2-965-3295
EMail: rrom@tu-sofia.bg
Bhumip Khasnabish
ZTE (TX) Inc.
USA
Phone: +001-781-752-8003
EMail: vumip1@gmail.com, bhumip.khasnabish@ztetx.com
URI: http://tinyurl.com/bhumip/
Romansky & Khasnabish Expires July 2, 2016 [Page 20]