Protecting User Data in Ubiquitous Computing: Towards Trustworthy Environments Yitao Duan and John Canny UC Berkeley.

Slides:



Advertisements
Similar presentations
Trusted Data Sharing over Untrusted Cloud Storage Provider Gansen Zhao, Chunming Rong, Jin Li, Feng Zhang, and Yong Tang Cloud Computing Technology and.
Advertisements

Experiences with Massive PKI Deployment and Usage Daniel Kouřil, Michal Procházka Masaryk University & CESNET Security and Protection of Information 2009.
Operating System Security
Secure Multiparty Computations on Bitcoin
1 SECURE-PARTIAL RECONFIGURATION OF FPGAs MSc.Fisnik KRAJA Computer Engineering Department, Faculty Of Information Technology, Polytechnic University of.
Cloakware Corporation, 260 Hearst Way, Suite 311, Kanata, Ontario, Canada K2L 3H1 Spencer Cheng Trusting DRM Software Presentation.
Hardware Cryptographic Coprocessor Peter R. Wihl Security in Software.
Lecture 19 Page 1 CS 111 Online Protecting Operating Systems Resources How do we use these various tools to protect actual OS resources? Memory? Files?
ICS 417: The ethics of ICT 4.2 The Ethics of Information and Communication Technologies (ICT) in Business by Simon Rogerson IMIS Journal May 1998.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
19.1 Silberschatz, Galvin and Gagne ©2003 Operating System Concepts with Java Chapter 19: Security The Security Problem Authentication Program Threats.
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
FIT3105 Smart card based authentication and identity management Lecture 4.
CSE331: Introduction to Networks and Security Lecture 28 Fall 2002.
1 Dynamic Key-Updating: Privacy- Preserving Authentication for RFID Systems Li Lu, Lei Hu State Key Laboratory of Information Security, Graduate School.
An Application-led Approach for Security-related Research in Ubicomp Philip Robinson TecO, Karlsruhe University 11 May 2005.
Gaia Context and Location-Aware Encryption for Pervasive Computing Environments Jalal Al-MuhtadiRaquel Hill Roy Campbell Dennis Mickunas University of.
Proactive Secure Mobile Digital Signatures Work in progress. Ivan Damgård and Gert Læssøe Mikkelsen University of Aarhus.
November 1, 2006Sarah Wahl / Graduate Student UCCS1 Public Key Infrastructure By Sarah Wahl.
Certificate Management Using Distributed Trusted Third Parties Alexander W. Dent Joint work with Geraint Price.
March 13, 2004Securing Privacy Conference1 SENSOR NETWORKS & PRIVACY Pamela Samuelson, UC Berkeley, Securing Privacy Conference, March 13, 2004.
1 The Sybil Attack John R. Douceur Microsoft Research Presented for Cs294-4 by Benjamin Poon.
Information Security of Embedded Systems : Algorithms and Measures Prof. Dr. Holger Schlingloff Institut für Informatik und Fraunhofer FIRST.
August 6, 2003 Security Systems for Distributed Models in Ptolemy II Rakesh Reddy Carnegie Mellon University Motivation.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
Practical Private Computation of Vector Addition-Based Functions Yitao Duan and John Canny Computer Science Division University of California, Berkeley.
Practical Private Computation and Zero- Knowledge Tools for Privacy-Preserving Distributed Data Mining Yitao Duan and John Canny
Hippocratic Databases Paper by Rakesh Agrawal, Jerry Kiernan, Ramakrishnan Srikant, Yirong Xu CS 681 Presented by Xi Hua March 1st,Spring05.
Android Security Enforcement and Refinement. Android Applications --- Example Example of location-sensitive social networking application for mobile phones.
Public Key Infrastructure Ammar Hasayen ….
Basics of Operating Systems March 4, 2001 Adapted from Operating Systems Lecture Notes, Copyright 1997 Martin C. Rinard.
Project supported by YESS 2009 Young Engineering Scientist Symposium « Identity Management » Cryptography for the Security of Embedded Systems Ambient.
D ATABASE S ECURITY Proposed by Abdulrahman Aldekhelallah University of Scranton – CS521 Spring2015.
Understanding Android Security Yinshu Wu William Enck, Machigar Ongtang, and PatrickMcDaniel Pennsylvania State University.
Computer Security Tran, Van Hoai Department of Systems & Networking Faculty of Computer Science & Engineering HCMC University of Technology.
Looking to Build a Secure Enterprise Mobile Application? Here’s How! Mush Hakhinian Chief Security Architect Intralinks Mush Hakhinian Chief Security Architect.
Lecture 18 Page 1 CS 111 Online Design Principles for Secure Systems Economy Complete mediation Open design Separation of privileges Least privilege Least.
Week #7 Objectives: Secure Windows 7 Desktop
Csci5233 Computer Security1 Bishop: Chapter 10 (Cont.) Key Management: Storage & Revoking.
Marketing Ethics and Social Responsibility
General Key Management Guidance. Key Management Policy  Governs the lifecycle for the keying material  Hope to minimize additional required documentation.
University of Central Florida TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones Written by Enck, Gilbert,
New Cryptographic Techniques for Active Networks Sandra Murphy Trusted Information Systems March 16, 1999.
Maintaining Network Health. Active Directory Certificate Services Public Key Infrastructure (PKI) Provides assurance that you are communicating with the.
Privacy Engineering for Digital Rights Management Systems By XiaoYu Chen.
出處 :2010 2nd International Conference on Signal Processing Systems (ICSPS) 作者 :Zhidong Shen 、 Qiang Tong 演講者 : 碩研資管一甲 吳俊逸.
G53SEC 1 Reference Monitors Enforcement of Access Control.
The Impact of Evolving IT Security Concerns On Cornell Information Technology Policy.
SECURITY Professor Mona Mursi. ENVIRONMENT IT infrastructures are made up of many components, abstractly: IT infrastructures are made up of many components,
M. Alexander Helen J. Wang Yunxin Liu Microsoft Research 1 Presented by Zhaoliang Duan.
Private Information Protection based on User-Trusted Program Institute of Systems and Information Engineering/KYUSHU Ken ’ ichi Takahashi.
Security March 9, Security What is security?  Techniques that control access to use a shared resource  Uses of shared resource must be authorized.
Wireless and Mobile Security
Exploiting Instruction Streams To Prevent Intrusion Milena Milenkovic.
Computer Science and Engineering 1 Mobile Computing and Security.
1 Diffie-Hellman (Key Exchange) Protocol Rocky K. C. Chang 9 February 2007.
Doc.: IEEE /0098r0 Submission July 2010 Alex Reznik, et. al. (InterDigital)Slide Security Procedures Notice: This document has been.
Fast Transmission to Remote Cooperative Groups: A New Key Management Paradigm.
Security of the Internet of Things: perspectives and challenges
Overview of Environmental Management Systems Using ISO John Rupe Forest Service Rocky Mountain Region.
Key management issues in PGP
Hardware-rooted Trust for Secure Key Management & Transient Trust
Understanding Android Security
Security Issues.
Yitao Duan and John Canny UC Berkeley
Shielding applications from an untrusted cloud with Haven
Understanding Android Security
PLANNING A SECURE BASELINE INSTALLATION
Presentation transcript:

Protecting User Data in Ubiquitous Computing: Towards Trustworthy Environments Yitao Duan and John Canny UC Berkeley

Outline Background and motivation Existing solutions Our approach –Design principles –Enforcing scheme –Evaluation Conclusion and future work

Ubiquitous Computing One consequence of Ubicomp –Way more data about us can be gathered (and used). –This is potentially a great thing for collaborative algorithms But, it’s potentially a great problem because...

Issues Addressed Protection of the user data generated and maintained by the environment Privacy of individuals who use the env. Ability of legitimate users to make use of data recorded in the environment Dealing with high-speed streams of data Trustworthiness of the environments (in progress)

Challenges Unfamiliar environments Dynamic and ad hoc and shared –difficult to determine access rights No central control High data rate –must be processed in real-time Collaborative applications

Existing Solutions Focus on access control Based on authentication/authorization model (e.g. RBAC) Require a piece of running code to actively check permissions Inadequate for ubicomp –Dynamic, distributed, environment –Protecting agent can be bypassed –Completely ignored the untrusted env issue

Our Approach Not rely on access control Make data secure by themselves In line with philosophy in cryptography: –Obscurity is not security –Assume the adversary has access to the communication

Our Principle – Data Discretion Data discretion: Users should always have access to, and control of (recorded or live) information that would be available to them in “real-world” situations. They should not have direct access in other situations. Matches “real-world” privacy norms Consistent with emerging legal principles Users are involved in decisions regarding data about them – users are in control of their data!

Smart room Testbed Good example of ubicomp environment RFID tag reader to establish who’s in the room 4 cameras to record images Smartborad to log electronic activity

Enforcing Scheme Assume all data are stored in files that represent short time intervals Data file is encrypted with a unique secret key

Enforcing Scheme The secret keys are encrypted with public keys of the people in the room (determined by the tag reader):

Enforcing Scheme User who were in the room can recover the keys and access the data while they were in the room

Key Embedding Conceal who and how many users have access Key set: fixed-length data structure with slots > max number of users in the room K 1 K 2 K 3 K 4 h j1 (F i, K 1 ) h j2 (F i, K 2 ) … h jn (F i, K m )

Master Key Escrow Every encryption key is also encrypted with a master public key. The master private key is shared by say, 3 people. Any 2 of the 3 can unlock any of the images, but they have to cooperate.

General Access Structure Equal access may not be appropriate in some applications Can realize general access structure –Secret-share the secret key among users –Embed the shares in the key set An example: AND access –r 1, r 2, … r m-1  {0, 1} l, r m = r 1  r 2  …  r m-1  k s

Execution Time includes: Encryption (Triple-DES) + Disk I/O Platform: PIII 900MHz + Linux Kernel Performance Evaluation

What We Have Achieved? A principle that mimics real-world norms A scheme to enforce it –“Zero-knowledge”: cancels even the number of users who have access –Efficient to deal with real-time data –Economical to be implemented using commodity hardware Data sharing made safe –The encryption does not hinder collaboration [Canny 02]

Not Enough The scheme works if the environment is honest Unfamiliar environments  untrusted environments How can we be sure the system performs the encryption and does not leak data?

Dealing With Untrusted Env – Data Transparency Data Transparency: Encrypted data recorded or transmitted by a ubicomp system should be easily observable.Where possible, the data itself should demonstrate compliance with stated principles.

Dealing With Untrusted Env – Data Transparency Data observable, not comprehensible –Obscurity is not security! Security and privacy based on cryptography, not access control Makes it easy to verify systems’ compliance with any stated privacy policy

Towards Trustworthy Environments (In Progress) Trusted computing framework –Assume most components untrusted –Some devices (from 3 rd party) more trusted –Exploit the mutual distrust between them to build trusted system Verification –ZKP to guarantee access right The demo that the system does what it is supposed to is a ZKP itself –Bit commitment to minimize leakage