Skip to main content

Data Security and Privacy in 2025?

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 8425))

Abstract

Security research aims at reducing the risk and consequences of attacks on information technology. Based on the projection of current trends, this vision paper makes an attempt at identifying potential security research challenges for the next 10 years. Examples of identified challenges are the trend to have pervasive computing in tiny devices, to collect and analyze data from these devices and other sources, and to increase the connection between IT and physical systems.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Notes

  1. 1.

    E.g. [11] describes surveillance cameras where persons are replaced by anonymised shapes at the source.

  2. 2.

    Assume that each device requires 1 s of human intervention, then 1B of devices require 32 person-years.

  3. 3.

    For instance, in case of a fault (e.g., caused by an attack) in an automotive control system, the breaks may still slow down and stop the car while there is no fail-safe mode for the steering.

References

  1. Bessani, A.; Correia, M.; Quaresma, B.; André, F., Sousa, P.: DepSky: dependable and secure storage in a cloud-of-clouds. In: 6th ACM SIGOPS/EuroSys European Systems Conference (EuroSys’11). ACM (2011)

    Google Scholar 

  2. Bleikertz, S., Kurmus, A., Nagy, Z.A., Schunter, M.: Secure cloud maintenance: protecting workloads against insider attacks. In: Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security (ASIACCS ‘12), pp. 83−84. ACM, New York (2012). doi:10.1145/2414456.2414505

  3. Buchmann, J., May, A., Vollmer, U.: Perspectives for cryptographic long-term security. Commun. ACM 49(9), 50–55 (2006)

    Article  Google Scholar 

  4. Brandon, J.: Top 5 Tech Predictions for 2023. http://www.inc.com/john-brandon/top-5-tech-predictions-for-2025.html (2013). Accessed 31 May 2013

  5. Danev, B., Zanetti, D., Capkun, S.: On physical-layer identification of wireless devices. ACM Comput. Surv. 45(1), 1–29 (2012). doi:10.1145/2379776.2379782. Article 6

    Article  Google Scholar 

  6. Gentry, C.: Fully homomorphic encryption using ideal lattices. In: The 41st ACM Symposium on Theory of Computing (STOC) (2009)

    Google Scholar 

  7. Goldreich, O., Micali, S., Wigderson, A.: How to play ANY mental game. In: Proceedings of the Nineteenth Annual ACM Conference on Theory of Computing, pp. 218−229. ACM Press (1987)

    Google Scholar 

  8. Krings, A.: Design for survivability: a tradeoff space. In: Proceedings of the 4th Annual Workshop on Cyber Security and Information Intelligence Research: Developing Strategies to Meet the Cyber Security and Information Intelligence Challenges Ahead (CSIIRW ‘08). ACM, New York (2008). doi:10.1145/1413140.1413154

  9. Roman, R., Najera, P., Lopez, J.: Securing the internet of things. IEEE Computer 44(9), 51–58 (2011). doi:10.1109/MC.2011.291

    Article  Google Scholar 

  10. Schetting, R.: In your ear with intelligent super computers - by 2025. http://futuretimes.net (2013). Accessed 31 May 2013

  11. Senior, A., Pankanti, S., Hampapur, A., Brown, L., Ying-Li, T., Ekin, A., Connell, J., Chiao-Fe, S., Max, L.: Enabling video privacy through computer vision. IEEE Secur. Priv. 3(3), 50–57 (2005). doi:10.1109/MSP.2005.65

    Article  Google Scholar 

Download references

Acknowledgements

This position paper solely reflects a subjective opinion of the author. Nevertheless, it was formed based on valuable input by my team at the Intel Collaborative Research Center for Secure Computing and at Intel Labs. In particular Christian Wachsmann of TU Darmstadt provided feedback on drafts of this position paper.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Matthias Schunter .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Schunter, M. (2014). Data Security and Privacy in 2025?. In: Jonker, W., Petković, M. (eds) Secure Data Management. SDM 2013. Lecture Notes in Computer Science(), vol 8425. Springer, Cham. https://doi.org/10.1007/978-3-319-06811-4_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-06811-4_8

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-06810-7

  • Online ISBN: 978-3-319-06811-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics