Personal Information Management in a Ubiquitous Computing Environment Institute of Systems & Information Technologies/KYUSHU Kenichi Takahashi.

Slides:



Advertisements
Similar presentations
Operating Systems Components of OS
Advertisements

Mobile Code Security Yurii Kuzmin. What is Mobile Code? Term used to describe general-purpose executables that run in remote locations. Web browsers come.
Operating System Security
Secure Multiparty Computations on Bitcoin
The Mobile Code Paradigm and Its Security Issues Anthony Chan and Michael Lyu September 27, 1999.
Mobile Code Security Aviel D. Rubin, Daniel E. Geer, Jr. MOBILE CODE SECURITY, IEEE Internet Computing, 1998 Minkyu Lee
Secure Communication Architectures.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
Identity Management Based on P3P Authors: Oliver Berthold and Marit Kohntopp P3P = Platform for Privacy Preferences Project.
Grid Security. Typical Grid Scenario Users Resources.
Component-Based Software Engineering Oxygen Paul Krause.
Dorian Grid Identity Management and Federation Dialogue Workshop II Edinburgh, Scotland February 9-10, 2006 Stephen Langella Department.
Interactive Systems Technical Design Seminar work: Web Services Janne Ojanaho.
Java Security Model Lab#1 I. Omaima Al-Matrafi. Safety features built into the JVM Type-safe reference casting Structured memory access (no pointer arithmetic)
Enterprise Privacy Promises and Enforcement Adam Barth John C. Mitchell.
Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.
CSE331: Introduction to Networks and Security Lecture 28 Fall 2002.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
WIRELESS SECURITY DEFENSE T-BONE & TONIC: ALY BOGHANI JOAN OLIVER MIKE PATRICK AMOL POTDAR May 30, /30/2009.
Professor Michael J. Losacco CIS 1150 – Introduction to Computer Information Systems Communications and Networks Chapter 8.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Tcl Agent : A flexible and secure mobile-agent system Paper by Robert S. Gray Dartmouth College Presented by Vipul Sawhney University of Pennsylvania.
ICAICT202A - Work and communicate effectively in an IT environment
1 An overview Always Best Connected Networks Dênio Mariz Igor Chaves Thiago Souto Aug, 2004.
Lecture 1 Overview: roadmap 1.1 What is computer network? the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  network.
What Is TCP/IP? The large collection of networking protocols and services called TCP/IP denotes far more than the combination of the two key protocols.
Personal Views on the Test Plan Jan. 29, 2013 Masahiro Wada.
Understanding Android Security Yinshu Wu William Enck, Machigar Ongtang, and PatrickMcDaniel Pennsylvania State University.
Programming Satan’s Computer
1st MODINIS workshop Identity management in eGovernment Frank Robben General manager Crossroads Bank for Social Security Strategic advisor Federal Public.
Software-Defined Networks Jennifer Rexford Princeton University.
Enhancing the Security of Corporate Wi-Fi Networks using DAIR PRESENTED BY SRAVANI KAMBAM 1.
Software Architecture Framework for Ubiquitous Computing Divya ChanneGowda Athrey Joshi.
1 22 August 2001 The Security Architecture of the M&M Mobile Agent Framework P. Marques, N. Santos, L. Silva, J. Silva CISUC, University of Coimbra, Portugal.
1 WS-Privacy Paul Bui Ryan Dickey. 2 Agenda  WS-Privacy  Introduction to P3P  How P3P Works  P3P Details  A P3P Scenario  Conclusion  References.
Seung-Hoon Lee, Sewook Jung, Alexander Chang, Dea-Ki Cho, and Mario Gerla Network Research Lab Department of Computer Science University of California,
Working Connection Computer and Network Security - Introduction - Dr. Hwajung Lee Radford University.
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
1 MAIN TABLE OF CONTENTS Definition: SOFTWARE AGENT HOW MANY TYPES OF AGENT? DEFINITION OF MOBILE AGENT: SOFTWARE AGENTS PROPERTIES, WORKING OF MOBILE.
Survey on Privacy-Related Technologies Presented by Richard Lin Zhou.
Wireless Hotspots: Current Challenges and Future Directions CNLAB at KAIST Presented by An Dong-hyeok Mobile Networks and Applications 2005.
1. Outlines Introduction What is Wi-Fi ? Wi-Fi Standards Hotspots Wi-Fi Network Elements How a Wi-Fi Network Works Advantages and Limitations of Wi-Fi.
Identity Management: A Technical Perspective Richard Cissée DAI-Labor; Technische Universität Berlin
Meng Yan. Introduction In fact, your online actions may be monitored by unauthorized parties logged and preserved for future access years later.
Chapter 7 Connecting to the Internet. 2Practical PC 5 th Edition Chapter 7 Getting Started In this Chapter, you will learn: − What is the Internet − Options.
CE Operating Systems Lecture 21 Operating Systems Protection with examples from Linux & Windows.
G53SEC 1 Reference Monitors Enforcement of Access Control.
Csci5233 computer security & integrity 1 Cryptography: an overview.
By Jared.  Under the terms of the alliance, epals this fall will add Microsoft’s
Private Information Protection based on User-Trusted Program Institute of Systems and Information Engineering/KYUSHU Ken ’ ichi Takahashi.
Security Patterns for Web Services 02/03/05 Nelly A. Delessy.
Unix Security Assessing vulnerabilities. Classifying vulnerability types Several models have been proposed to classify vulnerabilities in UNIX-type Oses.
Security Mechanisms for Delivering Ubiquitous Services in Next Generation Mobile Networks Haitham Cruickshank University of Surrey workshop on Ubiquitous.
D’Agents 1 Presented by Haiying Tan May, 2002 D’Agents: Security in a multiple-language, mobile-agent system Robert S. Gary, David Kotz, George Cybenko,
Secure middleware patterns E.B.Fernandez. Middleware security Architectures have been studied and several patterns exist Security aspects have not been.
Csci5233 Computer Security1 Bishop: Chapter 14 Representing Identity.
Mobile Analyzer A Distributed Computing Platform Juho Karppinen Helsinki Institute of Physics Technology Program May 23th, 2002 Mobile.
多媒體網路安全實驗室 A Secure Privacy-Preserving Roaming Protocol Based on Hierarchical Identity-Based Encryption for mobile Networks 作者 :Zhiguo Wan,Kui Ren,Bart.
Introduction to Programming 1 1 2Introduction to Java.
Cisco Router Technology. Overview Topics :- Overview of cisco Overview of cisco Introduction of Router Introduction of Router How Router Works How Router.
MOBILE IP & IP MICRO-MOBILITY SUPPORT Presented by Maheshwarnath Behary Assisted by Vishwanee Raghoonundun Koti Choudary MSc Computer Networks Middlesex.
1.4 wired and wireless networks lesson 1
Presented by Edith Ngai MPhil Term 3 Presentation
High Performance Computing Lab.
Enforcing Privacy Policies for RFID Data Collection and Processing
Effect combined IMPACT on achieving outcomes Organizational OUTPUTS
Research Challenges in Enterprise Privacy Authorization Language
Authors:Debiao He, Sherali Zeadally, Neeraj Kumar and Wei Wu
Presentation transcript:

Personal Information Management in a Ubiquitous Computing Environment Institute of Systems & Information Technologies/KYUSHU Kenichi Takahashi

Introduction Popularization of mobile technologies e.g. cellular phone, wireless LAN HotSpot services Airport, food shop, etc... Ubiquitous Computing System

Ubiquitous Computing Environment Anywhere, Anytime and Anyone TV Radio PC Tel

To realize ubiquitous computing environment Service-use mechanism Each service has a protocol for it use Protection of private information Necessary to protect private information while keeping usability

How to deal with private information in the yahoo

Private Policy in the yahoo

P3P and EPAL P3P ( The Platform for Privacy Preference ), EPAL ( The Enterprise Privacy Authorization Language ) What purpose does a collector collect it for? How does a collector operate it? Machines are able to interpret private policies automatically Private Information Collector Privacy Policy Private Information Preference compare

But... Users must still believe privacy policies indicated from a collector Necessary to protect private information by user ’ s self Users must be able to control a way that collectors use user ’ s private information Necessary to correspond to various services

Our Proposal Model Each User and service provider are defined as a agent Each agent has the Public Zone and Private Zone Public Zone provides a mechanism for corresponding to various services Private Zone provides a mechanism for protecting private information by myself

Basic idea on the Public Zone For corresponding to various services The service = Client Program + Service Program Client Program is executed by users Service Program is executed by service providers User Public Zone Service Provider Service Program Client Program Client Program pair get communicate Private Resources Private Zone Security Barrier Check the access What information? What purpose? How operate? :

What information? What purpose? How operate? : Basic idea on the Private Zone Check the access from the Public Zone Monitor the communication with other agents Push a program for dealing with private information User Public Zone Private Zone Security Barrier Client Program Private Resources Check by Permission Accessed Table regist Service Provider Check by Partner and Method Service Program Private Policy regist Client Program push communicate

The Private Policy Permission What information access does agent allow a program to access to What purpose does agent allow to access for Partner Who does agent allow a program to communicate with Method What operations using it are allowed

Conclusion The Public and Private Zone model Proposed basic ideas Public Zone: correspond to various services Private Zone: manage information by user ’ s self A lot of future work are remained!

Future Works How to create a pushed program → by combination of some components Protection of a program from illegal rewriting → mobile cryptography, program obfuscation Verification of whether a program returns a correct result or not → verify a program after result returned Refusal of malicious programs

The Overview of our Model Public Zone Private Zone Protect private information Manage services for providing to other agent Services Private information forbid Agent Access to the service Agent Security Barrier