Private Information Protection based on User-Trusted Program Institute of Systems and Information Engineering/KYUSHU Ken ’ ichi Takahashi.

Slides:



Advertisements
Similar presentations
Innovation Towards a next generation secure internet Private Application Ecosystems Sanjay Deshpande CEO and Chief Innovation Officer Center.
Advertisements

Thomas S. Messerges, Ezzat A. Dabbish Motorola Labs Shin Seung Uk.
SSL : An Overview Bruhadeshwar Bezawada International Institute of Information Technology, Hyderabad.
1 fairCASH: Concepts and Framework Yen Choon Ching Institute of Computer Science, University of Kiel, Germany Ver Sept 2008.
Secure Communication Architectures.
Gefördert durch das Kompetenzzentrenprogramm DI Alfred Wertner 19. September 2014 Ubiquitous Personal Computing © Know-Center Security.
Identity Management Based on P3P Authors: Oliver Berthold and Marit Kohntopp P3P = Platform for Privacy Preferences Project.
Chapter 14 From Cryptography and Network Security Fourth Edition written by William Stallings, and Lecture slides by Lawrie Brown, the Australian Defence.
Lecture 23 Internet Authentication Applications
Protecting User Data in Ubiquitous Computing: Towards Trustworthy Environments Yitao Duan and John Canny UC Berkeley.
6/1/20151 Digital Signature and Public Key Infrastructure Course:COSC Instructor:Professor Anvari Student ID: Name:Xin Wen Date:11/25/00.
15-1 Last time Internet Application Security and Privacy Public-key encryption Integrity.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
Department of Information Engineering1 Major Concerns in Electronic Commerce Authentication –there must be proof of identity of the parties in an electronic.
Copyright© Trusted Computing Group - Other names and brands are properties of their respective owners. Slide #1 Tightening the Network: Network.
LAB#2 JAVA SECURITY OVERVIEW Prepared by: I.Raniah Alghamdi.
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
FIT3105 Smart card based authentication and identity management Lecture 4.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Using Digital Credentials On The World-Wide Web M. Winslett.
CSE 4482, 2009 Session 21 Personal Information Protection and Electronic Documents Act Payment Card Industry standard Web Trust Sys Trust.
FI-WARE – Future Internet Core Platform FI-WARE Security July 2011 High-level Description.
Information Security of Embedded Systems : Algorithms and Measures Prof. Dr. Holger Schlingloff Institut für Informatik und Fraunhofer FIRST.
Security on the Internet Jan Damsgaard Dept. of Informatics Copenhagen Business School
Cloud Usability Framework
CSE 597E Fall 2001 PennState University1 Digital Signature Schemes Presented By: Munaiza Matin.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
Lecture 9: Security via PGP CS 436/636/736 Spring 2012 Nitesh Saxena.
Understanding Android Security Yinshu Wu William Enck, Machigar Ongtang, and PatrickMcDaniel Pennsylvania State University.
Computer Security Tran, Van Hoai Department of Systems & Networking Faculty of Computer Science & Engineering HCMC University of Technology.
Chapter 10: Authentication Guide to Computer Network Security.
Information Security for Managers (Master MIS)
ECE453 – Introduction to Computer Networks Lecture 18 – Network Security (I)
LEVERAGING UICC WITH OPEN MOBILE API FOR SECURE APPLICATIONS AND SERVICES Ran Zhou 1 9/3/2015.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
Patterns for Secure Boot and Secure Storage in Computer Systems By: Hans L¨ohr, Ahmad-Reza Sadeghi, Marcel Winandy Horst G¨ortz Institute for IT Security,
Lecture 23 Internet Authentication Applications modified from slides of Lawrie Brown.
CS CS 5150 Software Engineering Lecture 18 Security.
Information Security Fundamentals Major Information Security Problems and Solutions Department of Computer Science Southern Illinois University Edwardsville.
Network Security Lecture 26 Presented by: Dr. Munam Ali Shah.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
A bridge between standardisation and End-Users DMP workshop on "Development of and Access to Standards" Martin Springer 2004/07/12.
Chapter 16 Security Introduction to CS 1 st Semester, 2012 Sanghyun Park.
1 Vigil : Enforcing Security in Ubiquitous Environments Authors : Lalana Kagal, Jeffrey Undercoffer, Anupam Joshi, Tim Finin Presented by : Amit Choudhri.
Survey on Privacy-Related Technologies Presented by Richard Lin Zhou.
A security framework combining access control and trust management for mobile e-commerce applications Gregor v.Bochmann, Zhen Zhang, Carlisle Adams School.
IP Security IP sec IPsec is short for Internet Protocol Security. It was originally created as a part of IPv6, but has been retrofitted into IPv4. It.
Public Key Encryption.
Secure Communication between Set-top Box and Smart Card in DTV Broadcasting Authors: T. Jiang, Y. Hou and S. Zheng Source: IEEE Transactions on Consumer.
Network Security & Accounting
Personal Information Management in a Ubiquitous Computing Environment Institute of Systems & Information Technologies/KYUSHU Kenichi Takahashi.
By Bernard Ikoli.  Introduction  What is Internet?  Impact of the Internet in the society  What is Ethic ?  Applying Ethic to the internet  Conclusion.
Lecture 11 Overview. Digital Signature Properties CS 450/650 Lecture 11: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
IT 221: Introduction to Information Security Principles Lecture 5: Message Authentications, Hash Functions and Hash/Mac Algorithms For Educational Purposes.
多媒體網路安全實驗室 A Secure Privacy-Preserving Roaming Protocol Based on Hierarchical Identity-Based Encryption for mobile Networks 作者 :Zhiguo Wan,Kui Ren,Bart.
Electronic Banking & Security Electronic Banking & Security.
Wifi Based Menu Ordering By Samiksha Patil Shalini Yethendran Anitta Eaphen.
ESign Aashutosh.
Understanding Android Security
NETWORK SECURITY Cryptography By: Abdulmalik Kohaji.
Pooja programmer,cse department
THREE TIER MOBILE COMPUTING ARCHITECTURE
Smart Learning concepts to enhance SMART Universities in Africa
Understanding Android Security
Presentation transcript:

Private Information Protection based on User-Trusted Program Institute of Systems and Information Engineering/KYUSHU Ken ’ ichi Takahashi

Introduction Wide spread of network environments e.g. cellular phone, wireless communication devices, refrigerator, television, etc... Hot Sport services at airports, shops Ubiquitous computing environment

What can we do ? photo print book sales tourism info creditcard for the payment How is it used ? situations

Related works Symmetric-key, public-key, zero-knowledge algorithms, etc Digital signature, public-key infrastructure, etc The Platform for Private Preference defines a standard format to express privacy policy User agent can automate decision-making based on it Enterprise Privacy Authorization Language compels employees within the organization to keep privacy policy To provide rights of information access based on trustworthiness How do we compute trustworthiness? Does not make sure to prevent illegal information use

A way of information check user private information service provider result input check program

Ways of information check user check prg private information service provider (c) check by a user input user check prg private information service provider (a) check by a service provider release user check prg private information service provider (b) prepare trusted third parties release trusted third party user check prg private information service provider (d) check by a trusted program trusted prg check prg convert trusted prg release

Public, private zone model We proposed public and private zone model which aims to realize user can protect own information by himself User and service providers are defined as agent Public zone: is a space for dynamic service use and for executing trusted program Private zone: is a space for protecting private information Security barrier: is defined between public and private zone

The overview of our model public policies privacy policies security barrier To other agents get public policy From other agents public zone register private zone client program interaction access check Private Services Private Services service program Private Services Private Services privacy information client program + attributes Agent

public policy Public zone realizes dynamic service use Service = client program + service program Client program: is executed by users Service program: is executed by the service provider Public policy = client program + attributes user public zone service provider service program client program pair 1. get 3. communicate security barrier client program + attributes 2. execute

Private zone Privacy policy permission: purpose the user allows to use it trusted_prg: methods the user allows to use it user client program security barrier private zone private information privacy policy send private info usage: purpose of use process: methods to use permission ? trusted_prg ? trusted program created from process and trusted_prg public zone service provider trusted program send use through trusted program

Issues How to create trusted programs ? How to protect trusted programs ? How to confirm the behaviour of trusted program ? How to protect service providers from trusted programs ?

A way to create a trusted program Our model protects private information by the trusted program which we prepare How to create trusted programs ? To prepare the pattern which private information uses Service provider shows a process of private information use User extracts places where uses private information from the process User replace the place to his prepared pattern payment (id, password){ String p = getPass (id); if (password == p){ assign the right of service use } payment (id, hashed-password){ String p = getPass (id); if (hashed-password == hash (p)){ give the right of service use }

Protection of the trusted program A trusted program are executed by service provider The service provider can rewrite it easy Necessary to prevent illegal program rewriting Anti-tampering devices Software obfuscation, mobile cryptography anti-tampering device ks trusted-prg encrypted-prg kp encrypted-prg trusted-prg kp service provider user execute result

Confirmation of trusted program The service provider checks private information by a trusted program The trusted program actually checks it? Protection of service provider There is some possibility of acting as malware Necessary to restrict trusted program behaviours

Conclusion We proposed the basic model for private information protection Our model protects private information by user ’ s trusted program User can protect private information by own responsibility But some issues are remained Difficult to solve these issues But, these are interesting challenges

Thank you for your attention