Meng Yan. Introduction In fact, your online actions may be monitored by unauthorized parties logged and preserved for future access years later.

Slides:



Advertisements
Similar presentations
Section 10.1 Identify how Web sites are structured Explain the role of URLs Describe the function of HTTP Section 10.2 Explain how the Web has affected.
Advertisements

0 Web Service Security JongSu Bae. 1  Introduction 2. Web Service Security 3. Web Service Security Mechanism 4. Tool Support 5. Q&A  Contents.
Identity Management Based on P3P Authors: Oliver Berthold and Marit Kohntopp P3P = Platform for Privacy Preferences Project.
Environmental Council of States Network Authentication and Authorization Services The Shared Security Component February 28, 2005.
Network Security Topologies Chapter 11. Learning Objectives Explain network perimeter’s importance to an organization’s security policies Identify place.
Privacy Protection In Grid Computing System Presented by Jiaying Shi.
 Controls that provide security against internal and external threats  2 Types of access controls: › Physical controls › Logical controls.
Chapter 12 USING TECHNOLOGY TO ENHANCE BUSINESS PROCESSES.
Using Internet Information Server And Microsoft ® Internet Explorer To Implement Security On The Intranet HTTP.
OpenID And the Future of Digital Identity Alicia Bozyk April 1, 2008.
Introduction To Windows NT ® Server And Internet Information Server.
Web Privacy Topics Andy Zeigler Senior Program Manager, Internet Explorer Microsoft.
ASP.NET 2.0 Chapter 6 Securing the ASP.NET Application.
Anonymity Cs5090: Advanced Computer Networks, fall 2004 Department of Computer Science Michigan Tech University Byung Choi.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
Alumni Authentication… Explained Robert Scaysbrook – OpenAthens UK Account Manager.
Anonymizing Network Technologies Some slides modified from Dingledine, Mathewson, Syverson, Xinwen Fu, and Yinglin Sun Presenter: Chris Zachor 03/23/2011.
Tor (Anonymity Network) Scott Pardue. Tor Network  Nodes with routers within the network (entry, middle, exit)  Directory servers  Socket Secure (SOCKS)
November 2009 Secure Data Transmission May 2014 What are Secure Methods of Transmission? Encrypted Services Encrypted Memory Sticks Fax Secure.
Prof. Vishnuprasad Nagadevara Indian Institute of Management Bangalore
The Study of Security and Privacy in Mobile Applications Name: Liang Wei
1 3 Web Proxies Web Protocols and Practice. 2 Topics Web Protocols and Practice WEB PROXIES  Web Proxy Definition  Three of the Most Common Intermediaries.
 Introduction  VoIP  P2P Systems  Skype  SIP  Skype - SIP Similarities and Differences  Conclusion.
P3P A New Standard in Online Privacy Overview and Demos from Summer 2000.
What is FORENSICS? Why do we need Network Forensics?
LIGHT WEIGHT DIRECTORY ACCESS PROTOCOL Presented by Chaithra H.T.
World Wide Web Hypertext model Use of hypertext in World Wide Web (WWW) WWW client-server model Use of TCP/IP protocols in WWW.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Ethical and Social...J.M.Kizza1 Module 4: Anonymity, Security and Privacy  Introduction  Anonymity  Security  Privacy  Ethical and Social Issues.
Sunilkumar S. Manvi and P. Venkataram Protocol Engineering and Technology Unit, ECE Dept. Indian Institute of Science Bangalore, , INDIA
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
Identity Management: A Technical Perspective Richard Cissée DAI-Labor; Technische Universität Berlin
Privacy Engineering for Digital Rights Management Systems By XiaoYu Chen.
Customer Interface for wuw.com 1.Context. Customer Interface for wuw.com 2. Content Our web-site can be classified as an service-dominant website. 3.
Access Control and Markup Languages Pages 183 – 187 in the CISSP 1.
Content Protection Platform Shih-Kun Huang Chung-Po Lin Wei-Nan Hung Institute of Information Science Academia Sinica.
Anonymity on Web Transaction Department of Computer Science Ball State University Research Methods - CS 689 Uday Adhikari 7 th Dec
3 Copyright © 2004, Oracle. All rights reserved. Controlling Access to the Oracle Listener.
Infrastructure Service Approach to Handling Security in Service-Oriented Architecture Business Applications Doina Iepuras.
Personal Information Management in a Ubiquitous Computing Environment Institute of Systems & Information Technologies/KYUSHU Kenichi Takahashi.
The Tor Network BY: CONOR DOHERTY AND KENNETH CABRERA.
Security Distributed Systems Lecture # 14. Why care about security? Authentication Use another person’s ID for sending Non-repudiation E-commerce.
Connect. Communicate. Collaborate Deploying Authorization Mechanisms for Federated Services in the eduroam architecture (DAMe)* Antonio F. Gómez-Skarmeta.
Authentication and Authorisation in eduroam Klaas Wierenga, AA Workshop TNC Lyngby, 20th May 2007.
Supplemental Information on TOR (The Onion Router) CEH ed 8, Rev 4 CS3695 – Network Vulnerability Assessment & Risk Mitigation–
Module 6: Administering Reporting Services. Overview Server Administration Performance and Reliability Monitoring Database Administration Security Administration.
Introduction Web analysis includes the study of users’ behavior on the web Traffic analysis – Usage analysis Behavior at particular website or across.
Csci5233 Computer Security1 Bishop: Chapter 14 Representing Identity.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
Presented by: Sonali Pagade Nibha Dhagat paper1.pdf.
CMPE 494 Service-Oriented Architectures and Web Services Platform for Privacy Preferences Project (P3P) İDRİS YILDIZ
17- 1 Last time ● Internet Application Security and Privacy ● Link-layer security: WEP, WPA, WPA2 ● Network-layer security: VPN, IPSec.
WSO2 Identity Server. Small company (called company A) had few services deployed on one app server.
Information Security, Theory and Practice.
Hotspot Shield Protect Your Online Identity
Hypertext Transfer Protocol
NETWORK SECURITY Cryptography By: Abdulmalik Kohaji.
Introduction to Networking
CompTIA Security+ Study Guide (SY0-401)
HTTP Enabled Location Delivery (HELD)
The University of Adelaide, School of Computer Science
File Transfer Protocol
Privacy Through Anonymous Connection and Browsing
Security in ebXML Messaging
THREE TIER MOBILE COMPUTING ARCHITECTURE
InfiNET Solutions 5/21/
Designing IIS Security (IIS – Internet Information Service)
Session 1 – Introduction to Information Security
Presentation transcript:

Meng Yan

Introduction In fact, your online actions may be monitored by unauthorized parties logged and preserved for future access years later

Principles Controlling Over Data Collection Limitation Inform Data Security Access Right

Principles Protecting Anonymity Anonymity Pseudonymity Unobservability Unlinkablity Deniability

Principles Separating User from Unwanted Data

Classification Based on Application Area: Privacy Policy Language Anonymity Technology Authentication Management

Classification Privacy Policy Language Application Area Formalize privacy policies Help surfers understand privacy policies Help websites express privacy policies Representative PPL P3P EPAL XACML

Classification Privacy Policy Language P3P Give a standard format of privacy policy User agent of P3P interprets privacy policy to users User need not to read privacy policy at every website they visit

Classification Privacy Policy Language EPAL The first language that allows websites to express privacy policies of rule-based complexity directly in a standards-based markup language

Classification Privacy Policy Language eXtensible Access Control Markup Language (XACML) Describe privacy policy Describe request/response

Classification Anonymity Technology Application Area Anonymous browsing and publishing Classification (based on implementation_method) Remove user’s information Anonymous HTTP proxy server Mark-up user’s information Mix-based System Crowd

Classification Anonymity Technology Anonymous HTTP proxy server HTTP Request Modified HTTP Request HTTP Server User HTTP Proxy Server N HTTP Proxy Server 1

Classification Anonymity Technology Mix-based System Server User Onion Router Onion Proxy Entry Exit

Classification Authentication Management Application Area Protect Identity Authenticating Information (AI) What user knows (password) What user has (fingerprints, credit card number) What user does (signature) Classification Two-factor authentication (relies on two AI) Multi-factor authentication (relies on more than two AI)

Comparison P3P, EPAL, XACML P3PEPALXACML Purpose For user preference For enterprise- internal privacy policies& control access Flexibility Bad (Pre-defined policies) Fair (flexible policies but not scalable) Good (flexible policies &allow reference )

Comparison Crowd vs. mix-based system Common Mix-based Systems message delivery paths are fixed and messages are encrypted. Crowd paths are dynamically configured as a message traverses the network and each crowd member encrypts the message for the next member of the path.

Conclusion PET Anonymity Technology Privacy Policy Language (PPL) Authentication Management P3P EPAL & XACML HTTP proxy server Mix-based system &(Crowd) Two-factor Multi-factor

Thank you!