Workshop on Information Security Applications (WISA 2004) Jeju Island, Korea 23 Aug – 25 Aug 2004 1 License Protection with a Tamper-Resistant Token C.N.

Slides:



Advertisements
Similar presentations
Towards Remote Policy Enforcement for Runtime Protection of Mobile Code Using Trusted Computing Xinwen Zhang Francesco Parisi-Presicce Ravi Sandhu
Advertisements

IEEE MEDIA INDEPENDENT HANDOVER DCN: xx-00-sec Title: Initiate An Exercise for Generating a 21a Document Date Submitted: September 21, 2009.
Wei Lu 1, Kate Keahey 2, Tim Freeman 2, Frank Siebenlist 2 1 Indiana University, 2 Argonne National Lab
Secure Naming structure and p2p application interaction IETF - PPSP WG July 2010 Christian Dannewitz, Teemu Rautio and Ove Strandberg.
Secure Mobile IP Communication
Thomas S. Messerges, Ezzat A. Dabbish Motorola Labs Shin Seung Uk.
Using Multi-Encryption to Provide Secure and Controlled Access to XML Documents Tomasz Müldner, Jodrey School of Computer Science, Acadia University, Wolfville,
© 2004 Mobile VCE 3G © 2004 Mobile VCE 3G th October 2004 Regional Blackouts: Protection of Broadcast.
Gemplus and OSGI Benjamin Maury Gemplus Introduction  World Leader for Smart Card Solutions  Smart Solutions in Telecommunications  Beyond.
Environmental Council of States Network Authentication and Authorization Services The Shared Security Component February 28, 2005.
International Workshop for Technology, Economy, Social and Legal Aspects of Virtual Goods 2004, May Ilmenau, Germany Licensing Structured Data.
Trusted Electronic Transactions.  Why conduct transactions electronically?  Three Characteristics that ensure trust in electronic transactions  How.
Using Cryptographic ICs For Security and Product Management Misconceptions about security Network and system security Key Management The Business of Security.
Polytechnic University of Tirana Faculty of Information Technology Computer Engineering Department Identification of on-line users and Digital Signature.
Cyber Security and Key Management Models Smart Grid Networks The Network System Key Management and Utilization Why Hardware Security Christopher Gorog,
Adaptive Security for Wireless Sensor Networks Master Thesis – June 2006.
International Workshop for Technology, Economy, Social and Legal Aspects of Virtual Goods 2004, May Ilmenau, Germany 1 How to Pay in License.
Securing Data Storage Protecting Data at Rest Advanced Systems Group Dell Computer Asia Ltd.
Applied Cryptography for Network Security
A Heterogeneous Network Access Service based on PERMIS and SAML Gabriel López Millán University of Murcia EuroPKI Workshop 2005.
SPINS: Security Protocols for Sensor Networks Adrian Perrig Robert Szewczyk Victor Wen David Culler Doug TygarUC Berkeley.
Tcl Agent : A flexible and secure mobile-agent system Paper by Robert S. Gray Dartmouth College Presented by Vipul Sawhney University of Pennsylvania.
Key Management Guidelines. 1. Introduction 2. Glossary of Terms and Acronyms 3. Cryptographic Algorithms, Keys and Other Keying Material 4. Key Management.
Cloud Computing & Security Issues Prepared by: Hamoud Al-Shammari CS 6910 Summer, 2011 University of Colorado at Colorado Springs Engineering & Applied.
Patterns for Secure Boot and Secure Storage in Computer Systems By: Hans L¨ohr, Ahmad-Reza Sadeghi, Marcel Winandy Horst G¨ortz Institute for IT Security,
1 Secure Distributed Objects for Grid Applications Laurent Baduel, Arnaud Contes, Denis Caromel OASIS team ProActive
STORING ORGANIZATIONAL INFORMATION— DATABASES CIS 429—Chapter 7.
Architecture for Protecting Critical Secrets in Microprocessors Ruby Lee Peter Kwan Patrick McGregor Jeffrey Dwoskin Zhenghong Wang Princeton Architecture.
Practices in Security Bruhadeshwar Bezawada. Key Management Set of techniques and procedures supporting the establishment and maintenance of keying relationships.
Trusted Computing Or How I Learned to Stop Worrying and Love the MPAA.
SWIM-SUIT Information Models & Services
End-to-End security definition Group Name: SEC WG4 Source: Phil Hawkes, Qualcomm, Meeting Date:
Advanced Windows 8 Apps Using JavaScript Jump Start Exam Prep M5: Data, Files, and Encryption Michael Palermo Microsoft Technical Evangelist Jeremy.
DSKPP And PSKC: IETF Standard Protocol And Payload For Symmetric Key Provisioning Philip Hoyer Senior Architect – CTO Office.
DSKPP And PSKC: IETF Standard Protocol And Payload For Symmetric Key Provisioning Philip Hoyer Senior Architect – CTO Office.
Web Services Standards. Introduction A web service is a type of component that is available on the web and can be incorporated in applications or used.
sec1 IEEE MEDIA INDEPENDENT HANDOVER DCN: sec Title: TGa_Proposal_Antonio_Izquierdo (Protecting the Information Service.
Control in ATLAS TDAQ Dietrich Liko on behalf of the ATLAS TDAQ Group.
出處 :2010 2nd International Conference on Signal Processing Systems (ICSPS) 作者 :Zhidong Shen 、 Qiang Tong 演講者 : 碩研資管一甲 吳俊逸.
1 Integrating security in a quality aware multimedia delivery platform Paul Koster 21 november 2001.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #22 Secure Web Information.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Living in a Network Centric World Network Fundamentals – Chapter 1.
A Trusted Key Management Scheme for Digital Rights Management ETRI Journal, Volume 27, Number 1,February 2005 Yeonjeong Jeong, Kisiong Yoon, and Jaecheol.
DIGITAL SIGNATURE.
Digital Rights Management and Trusted Computing Kari Kostiainen T Special Course in Operating System Security April 13 th 2007.
Towards a Software Architecture for DRM Joint work with Kristof Verslype, Wouter Joosen, and Bart De Decker DistriNet research.
SASI Enforcement of Security Policies : A Retrospective* PSLab 오민경.
Prof. Hany H. Ammar, CSEE, WVU, and
Institute for Visualization and Perception Research 1 © Copyright 1999 Haim Levkowitz Java-based mobile agents.
Task Force CoRD Meeting / XML Security for Statistical Data Exchange Gregory Farmakis Agilis SA.
LOGO Cloud Storage Oriented Cipher-text Search Protocol.
HardSSH Cryptographic Hardware Key Team May07-20: Steven Schulteis (Cpr E) Joseph Sloan (EE, Cpr E, Com S) Michael Ekstrand (Cpr E) Taylor Schreck (Cpr.
Authentication has three means of authentication Verifies user has permission to access network 1.Open authentication : Each WLAN client can be.
A digital rights management system for digital broadcasting based on home servers IEEE TRANACTIONS ON BROADCASTING, VOL.52, NO.2, JUNE 2006 Yusei Nishimoto,
Security Profiles: AMS, CFDP Scott Burleigh NASA JPL 13 June 2006.
Csci5233 Computer Security1 Bishop: Chapter 14 Representing Identity.
Presented by: Sonali Pagade Nibha Dhagat paper1.pdf.
Database Laboratory Regular Seminar TaeHoon Kim Article.
Fragile Watermarking Scheme for Relational Database Fragile Watermarking Scheme for Relational Database.
BY S.S.SUDHEER VARMA (13NT1D5816)
SOFTWARE TESTING Date: 29-Dec-2016 By: Ram Karthick.
Applying Trusted Computing to a Workflow System
System Design.
PHP / MySQL Introduction
Web Service Security: A Formal Solution to XML Rewriting Attack
IEEE MEDIA INDEPENDENT HANDOVER DCN: xx-00-sec
Presentation transcript:

Workshop on Information Security Applications (WISA 2004) Jeju Island, Korea 23 Aug – 25 Aug License Protection with a Tamper-Resistant Token C.N. Chong (Jordan), B. Ren, J. Doumen, S. Etalle, P. H. Hartel and R. Corin Faculty of EEMCS University of Twente The Netherlands

Workshop on Information Security Applications (WISA 2004) Jeju Island, Korea 23 Aug – 25 Aug Overview Introduction Objectives Security Requirements License Script License Protection Scheme Prototype Evaluation Conclusions and Future Work

Workshop on Information Security Applications (WISA 2004) Jeju Island, Korea 23 Aug – 25 Aug Introduction Content protection is intended to enforce usage rights, which are specified by a license. A license often carries content key, metadata of the content, and some other sensitive information of the user. Therefore, it requires adequate protection.

Workshop on Information Security Applications (WISA 2004) Jeju Island, Korea 23 Aug – 25 Aug Objectives To ensure confidentiality and integrity of a license or parts thereof, so that usage rights, keys, metadata can be protected. To enforce different usage rights on different parts of the content and license. To share and control the access on the content or license (or parts thereof) with other users, with flexibility.

Workshop on Information Security Applications (WISA 2004) Jeju Island, Korea 23 Aug – 25 Aug Security Requirements We assume some of the system components can be trusted. We define some requirements for our license protection scheme: 1. License integrity 2. Frequent token interaction 3. Key confidentiality

Workshop on Information Security Applications (WISA 2004) Jeju Island, Korea 23 Aug – 25 Aug License Script Language License Script is based on multiset rewriting and logic programming. Multiset rewriting can capture dynamic license evolution. Logic programming can capture the static terms and conditions on the licenses.

Workshop on Information Security Applications (WISA 2004) Jeju Island, Korea 23 Aug – 25 Aug License Script License license(stock_price, [(canreset(S,B1,B2) :- S==provider, set_value(B1,viewed,0,B2)), (canupdate(S,B1,B2) :- S==provider, get_curr_time(T), set_value(B1,updated,T,B2)), (canview(S,B1,B2) :- get_value(B1,subject,Ss), is_member(S,Ss), get_value(B1,viewed,X), get_value(B1,maxviews,Y), X<=Y, X=X+1, set_value(B1,viewed,X,B2))], [maxviews=10, viewed=0, updated= , subjects=[broker]]) Content Identifier Clauses (Prolog) Bindings Prolog Programs Primitive

Workshop on Information Security Applications (WISA 2004) Jeju Island, Korea 23 Aug – 25 Aug License Protection Scheme We use a key tree and a hardware token. 4 components: application, reference monitor, token and provider. 2 protocols: Protocol A and Protocol B. Application Reference Monitor Token Provider Protocol B Protocol A

Workshop on Information Security Applications (WISA 2004) Jeju Island, Korea 23 Aug – 25 Aug Protected Storage Mechanism Protected storage is a service to the host platform in which the trusted platform module (TPM) helps storing confidential data on unprotected storage media. We use protected storage in a form of a key tree.

Workshop on Information Security Applications (WISA 2004) Jeju Island, Korea 23 Aug – 25 Aug Key Tree A child node is encrypted using the parent node. The root key is the “master key” for the whole tree. Keys are not exposed when the license is in use. We can selectively deploy the information of the license with other entities by using a key tree. rootkey skey1skey2 skey3skey4 data1 data2data3 data4

Workshop on Information Security Applications (WISA 2004) Jeju Island, Korea 23 Aug – 25 Aug Protected License rootkey skey1skey2 skey3skey4 data1 data2data3 data4 license(stock_price, [(canreset(S,B1,B2) :- S==provider, set_value(B1,viewed,0,B2)), (canupdate(S,B1,B2) :- S==provider, get_curr_time(T), set_value(B1,updated,T,B2)), (canview(S,B1,B2) :- get_value(B1,subject,Ss), is_member(S,Ss), get_value(B1,viewed,X), get_value(B1,maxviews,Y), X<=Y, X=X+1, set_value(B1,viewed,X,B2))], [maxviews=10, viewed=0, updated= , subjects=[broker]])

Workshop on Information Security Applications (WISA 2004) Jeju Island, Korea 23 Aug – 25 Aug Protected License license(stock_price, [(canreset(S,B1,B2) :- cipher(“CJ…”,skey1)), (canupdate(S,B1,B2) :- cipher(“XY…”,skey3)), (canview(S,B1,B2) :- cipher(“AB…”,skey4))], [maxviews=cipher(“12…”,skey4), viewed=cipher(“AC…”,skey4), updated= , skey1=cipher(“89…”,rootkey), skey2=cipher(“aC…”,rootkey), skey3=cipher(“CC…”,skey1), skey4=cipher(“XA…”,skey2), mac=cipher(“JK…”,rootkey), subjects=[(provider,rootkey), (broker,skey2), (alice,skey4)]]) Predicate that stores the encrypted value with the key Storage keys Message Authentication Code

Workshop on Information Security Applications (WISA 2004) Jeju Island, Korea 23 Aug – 25 Aug Protocol A To send a protected license to the application. To send the public key of the application to the token. 1. A->T : {A,P,“name”} 2. T->A : {N,MAC(N,K (P,T) ),A,P,T,“name”}_K + eP 3. A->P : {A,{N,MAC(N,K (P,T) ),A,P,T,“name”}_K + eP } 4. P->A : {Lic,{N+1,A, K + eA }_K + eT } 5. A->T : {N+1,A, K + eA }_K + eT

Workshop on Information Security Applications (WISA 2004) Jeju Island, Korea 23 Aug – 25 Aug Protocols: Protocol B To use the protected license. 1. A->T : {A,Lic,MAC(Lic,K (P,T) )} 2. T->A : {K ss1 }_K + eA 3. A->T : {Key,{D}_K st,“param”}_K ss1 } 4. T->R : {{D,SIG(D,K - sT )}_K ss2,{K ss1, K ss2 }_K + eR } 5. R->A : {D}_K ss1 6. A->T : {D’}_K ss1 7. T->A : {{D’}_ K st }_K ss1 8. A->T : {Lic’}_K ss1 9. T->A : {MAC(Lic’,K (P,T) )}_K ss1

Workshop on Information Security Applications (WISA 2004) Jeju Island, Korea 23 Aug – 25 Aug Security Analysis CoProVe verification. Security requirements are fulfilled: License integrity: using MAC. Frequent token interaction: different parts of the content/license are encrypted using different keys. Key confidentiality: keys stored on the license are encrypted.

Workshop on Information Security Applications (WISA 2004) Jeju Island, Korea 23 Aug – 25 Aug Prototype License Interpreter acts as a reference monitor. ECLiPSe. Meta-Interpreter. Rewrite Rules. Token (Java iButton) Application (Java) Reference Monitor (License Interpreter) Provider (Java) Serial Socket

Workshop on Information Security Applications (WISA 2004) Jeju Island, Korea 23 Aug – 25 Aug Performance Evaluation Test 1: Level of the key tree It takes approximately 1.22 seconds to decrypt data of ≤128 bytes at level 10 of the key tree. Test 2: License Reconstruction It takes approximately 2.25 seconds to reconstruct the license for an arbitrary updated level in the key tree. Conclusion: suitable for shallow key trees and small licenses.

Workshop on Information Security Applications (WISA 2004) Jeju Island, Korea 23 Aug – 25 Aug Conclusions A license is an important element of digital rights management (DRM). We propose a license protection scheme based on a tamper-resistant token and a key tree. We apply it to the License Script licenses. A prototype is built by using the Java iButton. Performance assessment and formal verification. It is secure (w.r.t. assumptions) and practical (for shallow key trees and small licenses).

Workshop on Information Security Applications (WISA 2004) Jeju Island, Korea 23 Aug – 25 Aug Future Work To extend our business model of one token per provider to one token and many providers. To use a USB connection for performance improvement. To extend the protection scheme for protecting fancy media.

Workshop on Information Security Applications (WISA 2004) Jeju Island, Korea 23 Aug – 25 Aug Thank you for your attention! Questions? Answers?…