Privacy for Public Transportation

Slides:



Advertisements
Similar presentations
Potential Smart Grid standardisation work in ETSI Security and privacy aspects Carmine Rizzo on behalf of Scott CADZOW, C3L © ETSI All rights reserved.
Advertisements

CONFIDENTIAL DIGITAL WATERMARKING ALLIANCE. CONFIDENTIAL DIGITAL WATERMARKING ALLIANCE 2 Digital Watermarking Alliance Charter The Digital Watermarking.
1 fairCASH: Concepts and Framework Yen Choon Ching Institute of Computer Science, University of Kiel, Germany Ver Sept 2008.
Recoverable and Untraceable E-Cash Dr. Joseph K. Liu The Chinese University of HongKong.
VIS-À-VIS CRYPTOGRAPHY : PRIVATE AND TRUSTWORTHY IN-PERSON CERTIFICATIONS IAN MIERS*, MATTHEW GREEN* CHRISTOPH U. LEHMANN †, AVIEL D. RUBIN* *Johns Hopkins.
Authentication in Mobile Ad-hoc Network (MANET) Student Ståle Jonny Berget Superviser Chik How Tan.
Mar 12, 2002Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities SSL/TLS.
 Guarantee that EK is safe  Yes because it is stored in and used by hw only  No because it can be obtained if someone has physical access but this can.
 Key exchange o Kerberos o Digital certificates  Certificate authority structure o PGP, hierarchical model  Recovery from exposed keys o Revocation.
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
FIT3105 Smart card based authentication and identity management Lecture 4.
1 Dynamic Key-Updating: Privacy- Preserving Authentication for RFID Systems Li Lu, Lei Hu State Key Laboratory of Information Security, Graduate School.
Mar 4, 2003Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities.
#1 Privacy in pervasive computing What can technologists do? David Wagner U.C. Berkeley In collaboration with David Molnar, Andrea Soppera, Ari Juels.
CMSC 414 Computer and Network Security Lecture 14 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 11 Jonathan Katz.
 A device that has the ability to read or identify a product or an object  Mainly tracks and identifies objects  Used for security and identification,
The Study of Security and Privacy in Mobile Applications Name: Liang Wei
Digital Cash By Gaurav Shetty. Agenda Introduction. Introduction. Working. Working. Desired Properties. Desired Properties. Protocols for Digital Cash.
Csci5233 Computer Security1 Bishop: Chapter 10 (Cont.) Key Management: Storage & Revoking.
Florida Information Protection Act of 2014 (FIPA).
Practices in Security Bruhadeshwar Bezawada. Key Management Set of techniques and procedures supporting the establishment and maintenance of keying relationships.
RFID Privacy: An Overview of Problems and Proposed Solutions Maxim Kharlamov (mkha130, #13) S. Garfinkel, A. Juels, R. Pappu, “RFID Privacy: An Overview.
Security in Near Field Communication Strengths and Weaknesses
COEN 350: Network Security Authentication. Between human and machine Between machine and machine.
1 X.509-style PKI Revolves around the distribution and management of digital identity certificates Invented in 1978 to facilitate message encryption In.
Privacy Preserving Payments in Credit Networks By: Moreno-Sanchez et al from Saarland University Presented By: Cody Watson Some Slides Borrowed From NDSS’15.
1 Privacy Aware Incentive Mechanism to Collect Mobile Data While Preventing Duplication Junggab Son*, Donghyun Kim*, Rasheed Hussain**, Sung-Sik Kwon*,
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Fall 2006CS 395: Computer Security1 Key Management.
April 20023CSG11 Electronic Commerce Authentication John Wordsworth Department of Computer Science The University of Reading Room.
External Threats Internal Threats Nation States Cyber Terrorists Hacktivists Organised criminal networks Independent insider Insider planted by external.
The Fallacy Behind “There’s Nothing to Hide” Why End-to-End Encryption Is a Must in Today’s World.
Regulation models addressing data protection issues in the EU concerning RFID technology Ioannis Iglezakis Assistant Professor in Computers & Law Faculty.
Technische Universität München WISTP 2007 Mobile Phones as Secure Gateways for Message-Based Ubiquitous Communication 10 th May 2007 W. Bamberger, O. Welter.
Security Issues in Information Technology
Towards 5G AKE: The security and privacy of 3G/4G AKA
Information Security, Theory and Practice.
Grid Computing Security Mechanisms: the state-of-the-art
VANET.
Side-Channel Attack on Encrypted Traffic
Software Security Testing
網路環境中通訊安全技術之研究 Secure Communication Schemes in Network Environments
Protocol Analysis.
Florida Information Protection Act of 2014 (FIPA)
Cryptography and Network Security
Security Issues.
Radius, LDAP, Radius used in Authenticating Users
Merging Security and Convenience with Seos® Credential Technology
Towards an optimized BlockChain for IoT
Group theory exercise.
Florida Information Protection Act of 2014 (FIPA)
{ BLOCKCHAIN Technology. BSEtecBSEtec is a digital solution provider company which offers the best service with the implement of the latest technologies.
Trezor Support Phone Number For You!! Round The Clock
Who Uses Encryption? Module 7 Section 3.
Proximity-based Access Control for Implantable Medical Devices
Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity and Identity Management – A Consolidated Proposal for Terminology Authors: Andreas.
CONFIDENTIALITY, INTEGRITY, LEGAL INTERCEPTION
Overview of Zero-Knowledge Systems Inc
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
Anonymity - Background
Kerberos Kerberos is an authentication protocol for trusted hosts on untrusted networks.
Cryptography and Network Security
NEW PRODUCT INTRODUCTION CONEKT™ Mobile Smartphone Access Control Identification Solution June 2018.
ELECTRONIC PAYMENT SYSTEM.
The Italian Academic Community’s Electronic Voting System
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
Anonymous Communication
PRABHU JAGATBANDHU COLLEGE
Presentation transcript:

Privacy for Public Transportation Thomas S. Heydt-Benjamin with Hee-Jin Chae, Benessa Defend, Kevin Fu University of Massachusetts at Amherst Department of Computer Science

Who knows your travel information?

Who knows your travel information? Transit Authority

Who knows your travel information? Law Enforcement

Who knows your travel information? That weird guy sitting across from you!?

What data are vulnerable?

What data are vulnerable? Unique card ID (not shown) Current Balance Entrance and exit date and station Details of merchandise purchase Beginning Balance

Why protect travel data? Sensative records are published in anonymized form Medical data for epidemiology and early detection of bioterrorism [Mandl 06] US law requires reporting of domestic abuse shelters [Sweeney 06]

Re-Identification

Exposure to data is a liability for the TA Data gets stolen 40 million records exposed due to improper data retention at CardSystems Solutions according to NY Times. Privacy preserving transit ticketing: Protects transit passenger Protects transit authority

Models and assumptions Who are our adversaries? What does privacy mean?

Adversaries TA (Transit Authority) Malicious third party: Mallory Global active adversary with respect to privacy Malicious third party: Mallory Active man in the middle adversary Wants to steal Alice's ticket Wants to identify and track Alice The passenger: Alice Wants to steal service from TA

What is privacy? Some transactions will be identifying passenger may provide credit card at purchase time Degree of privacy defined as: Degree of difficulty with which adversary can link identifying transactions with past and future transactions

Challenges

Challenge #1: Migration to RF technologies RF: Different threat model With magstripe, personal data unencrypted

Challenge #2: Systems Constraints Resource constraints Maintain compatibility with passive RFID transponders Communications: Support for offline operation

Challenge #3: State without privacy degradation Transfer between transit system segments but: transfers imply some degree of linkability Variable rate fare structure Many transit systems charge based on distance travelled Information necessary for fare calculation implies limit to anonymity

Approaches

Some popular approaches No secure channel Fails Challenge #1 (RF vulnerabilities) Per card symmetric key looked up by card id Fails Challenges #2 (offline) and #3 (privacy preservation) E (transaction) Sorry! I'm offline at the moment!

Approach to Challenge #1 (RF) Secure channel Protect against eavesdropping adversary Verifiable authorisation of reader Protect against middleman attack Protect against third party adversarial readers Good key management properties Graceful revocation Offline private key

Re-Encryption Authorisation Re-Cryptography E (nonce) E (nonce) Only works if reader has unexpired authorization key

Secure channel meets Challenge #1(RF) ??? E ($3000) nonce $3000

Meets constraints of legacy system (Challenge #2) Ticket stores only a single key Ticket performs only a single asymmetric crypto operation confidence of reader authorisation and session key Limits scope of damage when reader compromised Revocation: no computation, communication, or storage Suitable for offline authorisation

Ticket Types Passive RFID transponder Active mobile device Already has widespread deployment Has no user interface In order to communicate with user, must broadcast state! Active mobile device Has user interface Secure mobile devices for payment [Chaum 85] Active proxy for RFID privacy [Juels 05]

Ticket Types and State (Challenge #3) We observe that active transponders can provide privacy enhancements for many passengers, not just their owners $3000 ??? $3000 $3000 $200 $1.50

Current Approach to State (Challenge #3)

Current Approach to State (Challenge #3) TA Stores: Card #1234 = Alice Card #1234

Current Approach to State (Challenge #3) TA Stores: Alice entered at 17:30 Grand Central

This state is linkable to identity! Fails Challenge #3 TA Stores: Alice exited at 17:50 Hospital Station TA Computes: Trip fare = $3.50

This state is linkable to identity! Fails Challenge #3 TA Computes: Card #1234 (Alice) exited system 30 minutes ago Card #1234 (Alice) exited from adjacent station Therefore Transfer is valid

Our Approach to state is privacy preserving Parameterized single-show anonymous credential Proof of parameter validity in zero knowledge without revealing exact values For example: proof of non-expiry without revealing exit time Who are you? From subway, Unexpired

Summary of our approach

Future Work Cloning detection for online anonymous credentials systems exists [Damgård 05] Similar systems needed for offline environment Indistinguishability of active transponder and commercial passive transponder must be studied in greater depth Our preliminary measurements show our active transponder design to be indistinguishable.

Conclusions Existing systems offer insufficient protection both for passengers and for transit authorities Preservation of passenger privacy is possible without relinquishing features needed by TA Fraud Protection Transfers Variable rate fare structure