Presentation is loading. Please wait.

Presentation is loading. Please wait.

A Capability-based Privacy- preserving Scheme for Pervasive Computing Environments Dyvyan M. Konidala Dang N. Duc Dongman Lee Kwangjo Kim Proceedings of.

Similar presentations


Presentation on theme: "A Capability-based Privacy- preserving Scheme for Pervasive Computing Environments Dyvyan M. Konidala Dang N. Duc Dongman Lee Kwangjo Kim Proceedings of."— Presentation transcript:

1 A Capability-based Privacy- preserving Scheme for Pervasive Computing Environments Dyvyan M. Konidala Dang N. Duc Dongman Lee Kwangjo Kim Proceedings of the 3 rd Int’l Conf. on Pervasive Computing and Communications Workshops (Percom 2005 Workshops)

2  Introduction  Background  Proposed scheme  Security analysis  Complexity analysis  Comparison with related work  Conclusion Outline

3  Introduction  Background  Proposed scheme  Security analysis  Complexity analysis  Conclusion Outline

4  This paper focuses on user authentication, authorization, service access control,and privacy protection. Introduction

5  Introduction  Background  Proposed scheme  Security analysis  Complexity analysis  Conclusion Outline

6  Capability-based User Authentication and Authorization.  Partially Blind Signature. Background

7  Introduction  Background  Proposed scheme  Security analysis  Complexity analysis  Conclusion Outline

8 Proposed scheme

9  Capability Request Phase  A1: Alice generates secret key(SK U ) and public key(PK U ) pair, and store in the memory.  A2: Alice 登入 AS 的 PCE ,用他的帳密登入,若是正確 無誤,藉由帳號識別 Alice 的帳號類型之後,判定 Alice 昰學生, AS 回給 Alice Cap1 的 PK cap1 , Alice 利用 PK cap1 及 partially blind signature scheme 將 PK U blind 為 blind(PK U ) ,之後將其傳送給 AS 。 Proposed scheme

10  A3:AS 用 SKcap1 對 blind(PK U ) 簽章後, Alice 即可使用 服務 {S 1 , S 3 , S 6 , S 12 } ,當 AS 簽完章之後, AS 利用 partially blind signature scheme 來嵌入某些訊息,像 是 Capability 的發佈時間 IssDt 與結束時間 ExpDt ,嵌 在簽章訊息中。  A4:Alice 接收 SigSK cap1 (Blind( PKu|| IssDt||ExpDt )) 後, 用 PK AS 驗證簽章。因為 PK U 被 user blind 了,所以 AS 不 知道 PK U 的值, user unblind 訊息後得到 capability 。 Cap U = SigSKcap1( PKu|| IssDt||ExpDt )  當 capability 的時限到了之後, Alice 必須重來一次才 可取得服務。 Proposed scheme

11  Service Access Phase  B1: Alice 向 SP 要 service S1 , SP 產生一個亂數 R1 給 Alice  B2: Alice 用 SK U 對 (R 1 + 1) 簽章之後,將 S1 , SigSK U (R 1 +1) , PK U , Cap u 傳給 SP ,其中, S1 是 Alice 的 service ID  B3:SP 收到訊息後,先從資料庫取得 PK cap1 ,再用 PK cap1 來 對 Cap U 做 verify ,接著檢查 PK U 與 Cap U 中的 PK U 是否相同, 若相同,則繼續 verify ExpDt  B4: SP 繼續使用 PK U 來 verify SigSK U (R 1 +1) 。  B5: SP 告知 user 是 accept or reject Proposed scheme

12  Introduction  Background  Proposed scheme  Security analysis  Complexity analysis  Conclusion Outline

13  保護使用者隱私  認證,授權,存取控制  replay attack detection  capability non-transferability Security analysis

14  保護使用者隱私  A4 中不包含 userID  PK U 算是一種匿名,在一個 capability 時限結束後, PK U 是可以改變的。  就算 AS 與 SP 串通,在 CRP 中的 PK U 是被 blind 過的。 Security analysis

15  認證,授權,存取控制  B3~B5 中,就算 user 不使用真實的 ID ,也能做到認證, 授權,存取控制  即使攻擊者抓了 B2 ,因為沒有 SK U ,所以無法假裝成 Alice  攻擊者抓了 B1 無法做任何事,因為那只是一個亂數。 Security analysis

16  replay attack detection  攻擊者抓到 B2 無法 replay attack ,因為 B2 裡不包含 R ?? Security analysis

17  capability non-transferability  B2 的步驟只有 Alice 可以生成 SigSK U (R 1 +1) ,所以若是 Alice 想要把 capability 轉移給 Bob ,他必須把 SK U 告訴 Bob ,但是一般人不會這麼做,也許 Alice 還將 SK U 用 在其他重要的地方,比如說財產。為了不讓 Alice request 同一個 capability 兩個,我們會設計成同一個 capability 每天只能生成一份。 Security analysis

18  Introduction  Background  Proposed scheme  Security analysis  Complexity analysis  Conclusion Outline

19 Complexity analysis

20  PK U || IssDt||ExpDt 共 7byte*3=21*8 = 163bits Complexity analysis

21  Introduction  Background  Proposed scheme  Security analysis  Complexity analysis  Conclusion Outline

22  Our scheme can be easily ported on airports, train stations, streets, highways, etc.  blablabla… Conclusion


Download ppt "A Capability-based Privacy- preserving Scheme for Pervasive Computing Environments Dyvyan M. Konidala Dang N. Duc Dongman Lee Kwangjo Kim Proceedings of."

Similar presentations


Ads by Google