Download presentation
Presentation is loading. Please wait.
Published byGarry Anderson Modified over 9 years ago
1
University of British Columbia Towards Web 2.0 Content Sharing Beyond Walled Gardens San-Tsai Sun Supervisor: Kosta Beznosov Laboratory for Education and Research in Secure Systems Engineering (LERSSE) University of British Columbia
2
practical problem 2 lack of usable mechanisms for secure Web 2.0 user content sharing across content and service providers (CSPs)
3
content sharing scenario 3 CCA scouts only Colonial Coast Adventures (CCA) Girl Scouts Alice Jenny Picasa Web Alice’s CCA scout friends in Picasa Web
4
question 4 how to enable useful sharing of Web 2.0 content across CSPs? can existing technologies enable this type of sharing?
5
secret-link approach 5 Alice Picasa Web jenny@aol.com Jenny http://picasaweb.google.com/Alice?authkey=Gv1sRgCOzuv usable for Web users easy to implement by CSPs Alice does not have control over Jenny’s sharing of secret link with others Alice has to know Jenny’s email secret-link
6
design goals content sharing useful for average users user-centric, i.e., access policy and identity follow the user only use browser, no special software or crypto on the user computer CSPs – separation of content hosting and content sharing – not required to change their existing access- control mechanism 6
7
approach OpenID email extension [1] to enable OpenID IdPs to use email as an alternative identifier – www.alo.com/santsai vs. santsas@alo.com policy hosting service – role-based trust-management policy language (RT) for credentials and policies [2] – distributed membership and containment queries 7 [1] B. Adida, “EmID: Web authentication by email address,” in The Proceedings of Web 2.0 Security and Privacy Workshop 2008, Oakland, California, USA, 2008. [2] N. Li, J. C. Mitchell, and W. H. Winsborough, “Design of a role-based trust-management framework,” in SP ’02 Proceedings of the 2002 IEEE Symposium on Security and Privacy, 2002
8
sharing scenario 8 CCA Alice Picasa Web policy service Gmail Alice @gmail.com.scout CCA.@yahoo.scout CCA.scout Alice @gmail.com CCA.scout Jenny @aol.com CCA.scout Betty @hotmail.com policy service Yahoo Alice @gmail.com.scout secret-link, Alice @gmail.com.scout memberships secret-link
9
access scenario 9 Picasa Web policy service Gmail Alice @gmail.com.scout CCA.@yahoo.scout CCA CCA.scout Alice @gmail.com CCA.scout Jenny @aol.com CCA.scout Betty @hotmail.com policy service Yahoo Alice @gmail.com.scout Jenny @aol.com, Alice @gmail.com.scout containment Jenny secret-link OpenID email AOL Jenny @aol.com yes/no
10
content sharing scenario 2 10 CCA scouts and their parents only Colonial Coast Adventures (CCA) Girl Scouts Mary Alice Jenny Picasa Web Alice’s scout friends in Picasa Web
11
sharing scenario 2 11 CCA Alice Picasa policy service Gmail Alice @gamil.com.scout CCA.@yahoo.scout Alice @gamil.com.scout_parent Alice @gamil.com.scout.parent CCA.scout Alice @gamil.com CCA.scout Jenny @aol.com CCA.scout Betty @hotmail.com policy service Yahoo Alice @gamil.com.scout_parent Alice @gamil.com.scout Alice @gamil.com.scout_parent Jenny policy service AOL Jenny @aol.com.parent Mary @hotmail.com
12
Alice @gamil.com.scout CCA.@yahoo.scout Alice @gamil.com.scout_parent Alice @gamil.com.scout.parent access scenario 2 12 Picasa CCA CCA.scout Alice @gamil.com CCA.scout Jenny @aol.com CCA.scout Betty @hotmail.com policy service Yahoo Alice @gamil.com.scout_parent,Mary @hotmail.com memberships secret-link yes/no policy service AOL Jenny @aol.com.parent Mary @hotmail.com Alice @gamil.com.scout Alice @gamil.com.scout_parent containment Jenny secret-link Mary policy service Gmail
13
progress up-to-date protocols/algorithms for distributed memberships and containment queries preliminary prototype initial performance evaluation 13
14
open questions what is the expressiveness of sharing control that users need? how to design useable interface for controlled sharing? how to limit transitive trust? – A trusts B B trusts C A trusts C how to preserve the confidentiality of credentials and policies? – CCA does not want everybody to know email addresses of its scouts 14
15
future work investigate user needs in controlled sharing design user interface evaluate usability investigate an approach for limiting transitive trust preserve the confidentiality of credentials and policies investigate phishing/spam prevention improve performance 15
16
San-Tsai Sun 16 San-Tsai Sun and Konstantin Beznosov. Open problems in Web 2.0 user content sharing. Presented at iNetSec Workshop, April 23th 2009. San-Tsai Sun, Kirstie Hawkey, and Konstantin Beznosov. Towards enabling web 2.0 content sharing beyond walled gardens. To be presented at the Workshop on Security and Privacy in Online Social Networking, August 29th 2009
17
literature review user content sharing practices federated identity management attribute-based access control systems distributed authorization systems current sharing solutions provided by CSPs 17
18
literature review results (1) email is the most commonly used sharing mechanism [Voida 2006, Miller 2007, Whalen 2008] Open ID is an open and user-centric identity solution without pre-trust between CSPs and IdPs 18 S. Voida, W. K. Edwards, M. W. Newman, R. E. Grinter, and N. Ducheneaut, “Share and share alike: exploring the user interface affordances of file sharing,” in Proceedings of the SIGCHI conference on Human Factors in computing systems CHI ’06:. New York, NY, USA: ACM, 2006, pp. 221–230. A. D. Miller and W. K. Edwards, “Give and take: A study of consumer photo-sharing culture and practice,” in Proceedings of the CHI 2007, San Jose, California, USA, April 28 –May 3 2007, pp. 347–356. T. Whalen, “Supporting file sharing through improved awareness,” Ph.D. Dissertation, Dalhousie University, Canada, 2008. D. Recordon and B. Fitzpatrick, “OpenID authentication 2.0 - final,” http://openid.net/specs/openid- authentication-2 0.html, December 2007.
19
literature review results (2) characteristics of attribute-based access control [Li 2002] distributed authority attribute inference attribute-based delegation attribute with fields RT [Li 2002] policy language supports attribute-based credential and policy concise ( 4 types of policy statements) 19 N. Li, J. C. Mitchell, and W. H. Winsborough, “Design of a role-based trust-management framework,” in SP :’02 Proceedings of the 2002 IEEE Symposium on Security and Privacy, 2002c
20
secret-link approach supported by Google, Yahoo, Facebook, … a hard-to-guess URL that identifies a shared content usable for Web users Alice does not have control over Jenny’s sharing secret link with others no support for attribute-based sharing TBD: Show flicker secret link … 20
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.