Privacy and Identity Authentication © Copyright 2004, Credentica Inc. All Rights Reserved. Dr. Stefan Brands Credentica & McGill School of Computer Science.

Slides:



Advertisements
Similar presentations
Security by Design A Prequel for COMPSCI 702. Perspective “Any fool can know. The point is to understand.” - Albert Einstein “Sometimes it's not enough.
Advertisements

1 Privacy Prof. Ravi Sandhu Executive Director and Endowed Chair March 8, © Ravi Sandhu World-Leading Research.
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
Understanding Networked Applications: A First Course Chapter 14 by David G. Messerschmitt.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
E-Commerce Security Issues. General E-Business Security Issues Any E-Business needs to be concerned about network security. The Internet is a “ public.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Chief Information Officer Branch Gestion du dirigeant principal de l’information “We will have a world class public key infrastructure in place” Prime.
PKI versus Private Credentials1 Stefan Brands Zero-Knowledge Systems Inc. Montreal.
Mar 12, 2002Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities SSL/TLS.
EUropean Best Information through Regional Outcomes in Diabetes Privacy and Disease Registries Technical Aspects Peter Beck JOANNEUM RESEARCH, Austria.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
Government Online – White Paper Companion – Copyright © 2007 Credentica Inc. All Rights Reserved. This presentation is animated. Press the “space bar”
6/4/2015National Digital Certification Agency1 Security Engineering and PKI Applications in Modern Enterprises Mohamed HAMDI National.
 Key exchange o Kerberos o Digital certificates  Certificate authority structure o PGP, hierarchical model  Recovery from exposed keys o Revocation.
Using Digital Credentials On The World-Wide Web M. Winslett.
CMSC 414 Computer and Network Security Lecture 19 Jonathan Katz.
CSE 4482, 2009 Session 21 Personal Information Protection and Electronic Documents Act Payment Card Industry standard Web Trust Sys Trust.
Access Management in Critical Information Infrastructures May 15, 2003 Presented to: 15th annual Canadian Information Technology Security Symposium May.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
D ATABASE S ECURITY Proposed by Abdulrahman Aldekhelallah University of Scranton – CS521 Spring2015.
National Smartcard Project Work Package 8 – Security Issues Report.
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
Cryptology Digital Signatures and Digital Certificates Prof. David Singer Dept. of Mathematics Case Western Reserve University.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
Cloud Computing Cloud Security– an overview Keke Chen.
RSA Security Validating Users and Devices to Protect Network Assets Endpoint Solutions for Cisco Environments.
IDENTITY MANAGEMENT: PROTECTING FROM THE INSIDE OUT MICHAEL FORNAL, SECURITY ANALYST PROVIDENCE HEALTH & SERVICES SOURCE SEATTLE CONFERENCE
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
(2011) Security Breach Compromises 75,000 Staff/Student Social Security Numbers Image from this Site Presenters: Aron Eisold, Matt Mickelson, Bryce Nelson,
BUSINESS B1 Information Security.
Sanzi-1 CSE5 810 CSE5810: Intro to Biomedical Informatics Dynamically Generated Adaptive Credentials for Health Information Exchange Eugene Sanzi.
Trusted Systems Laboratory Hewlett-Packard Laboratories Bristol, UK InfraSec 2002 InfraSec 2002 Bristol, October 2002 Marco Casassa Mont Richard.
September 20 th, 2006 U-Prove crypto overview Copyright © 2006, Quebec Inc. Proprietary and Confidential.
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Business Plug-In B6 Information Security.
A DESCRIPTION OF CONCEPTS AND PLANS MAY 14, 2014 A. HUGHES FOR TFTM The Identity Ecosystem DISCUSSION DRAFT 1.
1 Using EMV cards for Single Sign-On 26 th June st European PKI Workshop Andreas Pashalidis and Chris J. Mitchell.
Center of Excellence for IT at Bellevue College. Cyber security and information assurance refer to measures for protecting computer systems, networks,
Network Security Lecture 26 Presented by: Dr. Munam Ali Shah.
An Investigation into E-Commerce Frauds and their Security Implications By Kevin Boardman Supervisor: John Ebden 29 July 2004.
The Evolution of Identity Management February 18, 2005 © Copyright 2004, Credentica – all rights reserved Dr. Stefan Brands.
CHAPTER 7: PRIVACY, CRIME, AND SECURITY. Privacy in Cyberspace  Privacy: an individual’s ability to restrict or eliminate the collection, use and sale.
ECE Lecture 1 Security Services.
Government Online Copyright © 2007 Credentica Inc. All Rights Reserved. February 15th - 16th, 2007 Mobile Showcase.
Lecture 7 Page 1 CS 236, Spring 2008 Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know.
SOA-39: Securing Your SOA Francois Martel Principal Solution Engineer Mitigating Security Risks of a De-coupled Infrastructure.
© 2003 The MITRE Corporation. All rights reserved For Internal MITRE Use Addressing ISO-RTO e-MARC Concerns: Clarifications and Ramifications Response.
DB Security, Nov 11, Database Security S. Sudarshan Computer Science and Engg. Dept I.I.T. Bombay.
DIGITAL SIGNATURE.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
1 X.509-style PKI Revolves around the distribution and management of digital identity certificates Invented in 1978 to facilitate message encryption In.
Web Services Security Patterns Alex Mackman CM Group Ltd
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Computer threats, Attacks and Assets upasana pandit T.E comp.
(2011) Security Breach Compromises 75,000 Staff/Student Social Security Numbers Image from this Site Presenters: Aron Eisold, Matt Mickelson, Bryce Nelson,
Fall 2006CS 395: Computer Security1 Key Management.
ASHRAY PATEL Protection Mechanisms. Roadmap Access Control Four access control processes Managing access control Firewalls Scanning and Analysis tools.
Information Management System Ali Saeed Khan 29 th April, 2016.
A l a d d I n. c o m Strong Authentication and Beyond Budai László, IT Biztonságtechnikai tanácsadó.
Unlinking Private Data
Add video notes to lecture
Cloud Security– an overview Keke Chen
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
Security in Networking
Overview of Zero-Knowledge Systems Inc
INFORMATION SYSTEMS SECURITY and CONTROL
Appropriate Access InCommon Identity Assurance Profiles
Presentation transcript:

Privacy and Identity Authentication © Copyright 2004, Credentica Inc. All Rights Reserved. Dr. Stefan Brands Credentica & McGill School of Computer Science June 8, 2004 Presented to: EA Open House 2004, Ontario

2 © Copyright 2004, Credentica Inc. All Rights Reserved Content Part I Introduction Part II Case study: Liberty Alliance Part III Digital Credentials

3 © Copyright 2004, Credentica Inc. All Rights Reserved Part I Introduction

4 © Copyright 2004, Credentica Inc. All Rights Reserved Digital identity management (1) Network identity (also: digital identity) Collection of information relating to an individual Created and managed as single unit in a network Stored in electronic form Situation today: Individuals have fragmented network identities in “silos” Aggregating network identities is increasingly easy But: which network identities pertain to same individual? – If linkage is wrong, aggregate has less value (data pollution) Causes of pollution Unintentional (different name spellings, …) Intentional (avoidance, theft, lending, copying, forgery, insider help, …)

5 © Copyright 2004, Credentica Inc. All Rights Reserved A simple approach to linking identities “Strong identity” approach: Capture (authenticated) identifier when collecting data – Employee ID, static IP address, SSN, credit card number, passport ID, electronic ID (biometric, X.509 certificate, …) Aggregate on basis of this cross-domain identifier Implications radically differ depending on setting! – OK for intra-organizational (“enterprise”) identity management Possibly: Extended Enterprise (e.g., supply chain management) – NOT OK for cross-organizational identity management: E-health, E-government, Critical Information Infrastructures, … Consequences of electronic identifiers are much more severe than showing your SSN everywhere Everything is electronically recorded, not only by your transaction partner but also by central parties, in real time!

6 © Copyright 2004, Credentica Inc. All Rights Reserved Where does the simple approach work? Single-domain intra-organizational Employees have low/no privacy expectations/rights No conflicts with privacy legislation Trust dynamics very simple No scalability issues Can use traditional security tools (“silo protection”) – Door guards, intrusion detection, firewalls, anti-virus, … Multi-domain intra-organizational (branches, …) Trust dynamics minimally complicated Minimal conflicts with privacy legislation Low privacy expectations Possibly some scalability issues Traditional security tools still work Extended enterprise (?)

7 © Copyright 2004, Credentica Inc. All Rights Reserved Where does it break down? “Balanced” business-to-business (B2B) Collaborative enterprise applications Government-to-business (G2B) Government-to-government (G2G) Back-office sharing of personal data Government-to-citizen (G2C) Implications for stability of democracy Business-to-consumer (B2C) Consumer-to-consumer applications Online gaming, instant messaging, … Peer-to-peer transactions

8 © Copyright 2004, Credentica Inc. All Rights Reserved Why the simple approach fails in general Serious security & scalability problems See case study (exemplary application) Fear for loss of “information autonomy” Different manifestations for: – Individuals: identity theft, discrimination, errors, access denial, … – Companies: competitive intelligence, liability issues, goodwill issues – Critical Information Infrastructures: monitoring by criminals/terrorists Possible violations of data protection legislation Privacy: “The right of individuals, groups, and organizations to determine for themselves when, how, and to what extent information about them is communicated to others” Personal information: “information about a data subject whose identity can reasonably be ascertained from the information” – Network identity = personal information!! (unless “untraceable”)

9 © Copyright 2004, Credentica Inc. All Rights Reserved 1.Collection Limitation 2.Data Quality 3.Purpose Specification 4.Use Limitation 6.Openness 7.Individual Participation 8.Accountability 5. Security safeguards (incl. confidentiality) OECD FIPs: Fair Information Principles (FIPs) Security safeguards deal with outsiders, but in cross-domain identity management the main privacy threats come from insiders The straightforward use of “secure” electronic identifiers in cross-domain identity management addresses FIP 5, but is in conflict with FIPs 1 & 4

10 © Copyright 2004, Credentica Inc. All Rights Reserved Part II Case study: Liberty Alliance

11 © Copyright 2004, Credentica Inc. All Rights Reserved Liberty Alliance Industry consortium, formed September 2001 Over 160 technology and consumer-facing organizations – American Express, Novell, Vodafone, Sun Microsystems, Ericsson, Nokia, GM, HP, America Online, Sony, VeriSign, … Started as counter-movement to Microsoft’s Passport Goal: open standard for “federating” identities “Federated identity allows users to link elements of their identity between accounts without centrally storing all of their personal information.” Basic approach: One “Identity Provider” (IdP) satisfies the authentication (identity linking!) needs of all the Service Providers (SPs) in its “circle of trust” Authorization decisions stay with the SPs themselves IdP uses traditional single-domain authentication methods – Password-only, Kerberos, PKI, biometrics, … Many circles of trust can exist (and can overlap arbitrarily)

12 © Copyright 2004, Credentica Inc. All Rights Reserved Federation introduction (animation) User Identity Provider SP 1) (Strong) identification Identification 2) Federation invitation 3) Introduction cookie SP Invitation Yes Cookie Design assumption: SPs and IdP already know the Users Legacy account setup & legacy program identifiers (SIN, passport, user-name, …)

13 © Copyright 2004, Credentica Inc. All Rights Reserved Account linking (animation) User SP Identity Provider 1) Login as usual 2) Linking “consent” 3) User-handle generation Username Password (Cookie) Account linking? Yes User-handle (“contextual” ID …) UserId = User-handle Username = User-handle 4) User-handle storing

14 © Copyright 2004, Credentica Inc. All Rights Reserved Single sign-on (animation) User SP Identity Provider 1) (Strong) identification 2) Single sign-on Identification 3) Service access Authentication assertion Authentication request & SP id UserId = User-handle Username = User-handle

15 © Copyright 2004, Credentica Inc. All Rights Reserved Security problems IdP abuse (rogue insiders, controlling parties) Impersonate any targeted User across entire circle of trust – Even parallel to User’s own activities without User ever knowing it (Falsely) deny access to targeted Users across entire circle – This IdP power may also be problematic for SPs IdP is target for Denial Of Service attacks Shut down access across entire circle of trust Unsuitable for SP-sided security No access-rights lending (& cloning) prevention – Users can “lend/copy” rights (user/password, cookies, etc.) Tamper-resistant User tokens do not work here – Storage limitations, time consuming, DPA analysis, … – Ineffective: security still depends only on getting to cookie! “Low” security (cookie & password, browser)

16 © Copyright 2004, Credentica Inc. All Rights Reserved Privacy problems “Security safeguards” not achieved Very hard to give Users ability to review and correct their own information (it is “federated”) IdP can trace all User–SP interactions in real time (real-time error-free cross-profiling power!) IdP knows which SP-handles belong to each User Not desirable for Users and SPs alike – For much the same reason as those who hope to become IdPs did not like Microsoft Passport v1 – Loss of “information autonomy” (goes beyond privacy) IdP is like a Mastercard “on steroids” Here, all communications are fully electronic Unlike with credit cards, we deal with personal information (“network identities”), not just with payments amounts

17 © Copyright 2004, Credentica Inc. All Rights Reserved Roadmap problems IdP assertions cannot replace “legal” signatures SPs cannot share “attribute” data unless through their IdP (again, loss of information autonomy) Even if User would want automated sharing to happen What if IdP or SP do NOT already know a User? “Introductions” between SPs create cross-profiling power Each circle of trust is still a silo! Linking circles of trust is done by (cross-)linking their IdPs! – Much like PKI hierarchies of CAs Essentially means a new “super-IdP” has to be formed Security and privacy problems go up: – They now pertain to all Users & SPs in the joined-up circles of trust – The damage can now flow across circles of trust

18 © Copyright 2004, Credentica Inc. All Rights Reserved The crux of these problems Old-school authentication primitives were designed for intra-organizational requirements: Security against unauthorized outsiders No privacy provisions other than wire-tapping prevention But cross-domain access brings NEW requirements Complicated trust dynamics Vulnerabilities due to (real-time) reliance on central parties – Denial of service, hackers, insiders Security against dishonest insiders – Not necessarily in your own organization, but in someone else’s! Perimeter security techniques of little use – All security must be tied to the information itself ! Privacy: Control over who can learn what information – Related to broader concerns over loss of information autonomy

19 © Copyright 2004, Credentica Inc. All Rights Reserved Part III Digital Credentials

20 © Copyright 2004, Credentica Inc. All Rights Reserved Digital Credentials Based on 20 years of academic research Much more powerful than X.509-style PKI: Privacy “slider” (independent from security “slider”) – All parties in the certified-data path have fine-grained control over attribute disclosure: RA → CA → User → Verifier → Validator Sophisticated selective disclosure techniques – Unlinkable certificate issuing and showing Identified, pseudonymous, anonymous, and anything “in between” Unique security features – Limited-show certificates – Privacy-friendly cross-platform blacklisting – Embedded lending disincentives – Efficient smartcard implementation (incl. multi-application) Non-intrusive managed security services

21 © Copyright 2004, Credentica Inc. All Rights Reserved Digital Credentials in action (animation) User can “blind” (randomize) the certificate’s public key… … and also the signature of the CA … … but cannot modify the attributes the CA certifies for him. User can disclose only the minimal attribute property the Verifier needs to know … … but needs to know all the attributes in the certificate to make his own signature with the certificate’s secret key

22 © Copyright 2004, Credentica Inc. All Rights Reserved Cross-organizational SSO with Credentials User Digital Credential issuer Program 2 2) Use Digital Credentials 1) Get Digital Credentials 1 Program Untraceable Unlinkable Plus: privacy-preserving (!) techniques for cross-domain data sharing, cross-platform blacklisting, and fraud tracing

23 © Copyright 2004, Credentica Inc. All Rights Reserved Properties of Digital Credentials (1) Fully adaptable levels of privacy: Anonymous, pseudonymous, role-based access, and anything “in- between” Principle of least authority; selective/minimal disclosure Reverse authentication: data does not meet conditions Recertification and updating: present Digital Credential without revealing current attribute values Dossier-resistance: leave no or partial non-repudiable transaction evidence to verifier Credential verifier can selectively hide data before passing on digital evidence 3 rd party Credential Authorities can be prevented from learning the attributes that they certify Smartcard cannot leak sensitive data to outside world

24 © Copyright 2004, Credentica Inc. All Rights Reserved Properties of Digital Credentials (2) Security protections: No pooling of privileges (multiple Digital Credentials can be shown to contain same identifier without disclosing it) Lending protection: Embed client-confidential data into Digital Credential (legitimate owner need never disclose it) Discarding protection: Lump negative data in base Digital Credential (e.g., drunk driving mark into driver’s license) Limited-show credentials: Embedded identifier (or value) exposed if and only if Credential shown too many times Audit capability: – Digital audit trails & receipts facilitate dispute resolution – Non-identified audit trail cannot be disavowed by originator – Self-signed fraud confessions for lending and reuse

25 © Copyright 2004, Credentica Inc. All Rights Reserved Properties of Digital Credentials (3) Smartcard Implementations: Manage billions of Credentials using 8-bit smart-card chip (off- load storage and computational burden to user device) Application provider can arbitrarily minimize level of trust placed in smartcard (through application software) Secure multi-application smartcards: – Different application providers can share same secret key – Digital Credentials have uncorrelated secret keys (unknown even to card supplier) and can be revoked separately – Different applications using same smartcard are fire-walled through user software (not card software!) – Leakage of a card’s key does not allow fraud beyond the security functionality the card was supposed to add

26 © Copyright 2004, Credentica Inc. All Rights Reserved Properties of Digital Credentials (4) Managed services: Credential Authorities certify sensitive information without being able to learn the data Revocation Authorities can validate certificates without being able to identify the clients of organizations Role of tamper-resistant smartcard can be outsourced Peer-to-peer support: Individuals can store and manage their own credentials Unauthorized users cannot modify, discard, lend, pool, or prevent the updating of information they hold Distribute all back-end database entries to data subjects Multi-purpose and multi-application certificates