Download presentation
Presentation is loading. Please wait.
Published byAnnice Kelley Modified over 9 years ago
1
Trustworthy and Personalized Computing Christopher Strasburg Department of Computer Science Iowa State University November 12, 2008
2
Motivating Problem People desire increasingly frequent access to personal computing environments Public kiosks offer a good trade-off between functionality, cost, and availability Public kiosks are at higher risk than other environments o General public has physical access to systems o People tend to have a low degree of trust in software on public kiosk systems
3
Related Work -- Portable Computing Environment Encrypted Virtual Machines (VMs) provide portable, encapsulated computing environments o OS, software, configurations, personal data in one package o Practical distribution of VM images has been explored: Remote deployment of VM image components (Internet Suspend/Resume) Loading a VM from a portable device (SolePad) However, even using encrypted VMs, compromised kiosk software can access data and render the system untrustworthy (BIOS, virtual machine monitor)
4
Related Work -- Building System Trust Verify the entire software stack, from BIOS to Applications o Software solutions -- The software itself is an easy target on public kiosk systems o Trusted boot sequences -- Introduces possible serious boot-time delays Minimize function of system for easier verification o Kiosks as thin clients which perform minimal processing -- Wastes much of the computational power of the system o Limit the information a user submits to the system -- User must ultimately determine sensitivity for each piece of data; difficult to predict data interaction
5
Method Overview A multi-stage process using a trusted mobile device to verify the integrity of the system prior to use
6
Method Details - Identify Workstation 1.User visually verifies kiosk identity 2.Mobile device downloads certificate and verifies authenticity 3.Mobile device retrieves supported configurations and allows user to select one Identify Kiosk (barcode ID and key hash) Select Configuration (mobile device app) Establish Trust (TPM, DRTM, Trusted 3 rd Party) Submit VM / Personal Info to Kiosk And Perform Work Clean Up Kiosk
7
Method Details - Verify Software System: 1.Reboots 2.Loads the DRTM with the hash of the secure boot loader 3.Generates Encryption Key pair (K, K') 4.Creates self-signed certificate C containing K. 5.Measures C into TPM Mobile Device: 1.Requests database signed by TTP (Trusted Third Party) 2.Requests signed (by TPM) quote and re-computes boot sequence to verify that it matches quote 3.On success, signals user that system is trustworthy Identify Kiosk (barcode ID and key hash) Select Configuration (mobile device app) Establish Trust (TPM, DRTM, Trusted 3 rd Party) Submit VM / Personal Info to Kiosk And Perform Work Clean Up Kiosk
8
Method Details - Load Personal Environment Uses key pair (K,K') to download and load user's personal environment / encrypted VM image / information Identify Kiosk (barcode ID and key hash) Select Configuration (mobile device app) Establish Trust (TPM, DRTM, Trusted 3 rd Party) Submit VM / Personal Info to Kiosk And Perform Work Clean Up Kiosk
9
Method Details -- Data Cleanup Once the user is finished with the system, the system shuts down, removes the VM image, and overwrites the memory containing the cryptographic data Identify Kiosk (barcode ID and key hash) Select Configuration (mobile device app) Establish Trust (TPM, DRTM, Trusted 3 rd Party) Submit VM / Personal Info to Kiosk And Perform Work Clean Up Kiosk
10
Assumptions and Limitations Kiosk owner is trusted: o Periodically check for and fix misbehaving Kiosks (ie. to address hardware issues, detect incorrect barcodes) System only verifies software at boot time. Post-boot modification is not detected Mobile device is trustworthy Requires kiosk owner to participate in system, ie: o Provide database of software o Tag systems with barcodes Users must wait around 2.5 minutes before system is ready to use
11
Conclusions Provides personalized computing environment Unrestricted access to computing capabilities Enables users to perform sensitive personalized computing on public hardware with a high degree of confidence S. Garriss, R. Caceres, S. Berger, R. Sailer, L. Doorn, X. Zhang. Trustworthy and Personalized Computing on Public Kiosks. In Proc. MobiSys 2008. Reference
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.