Download presentation
Presentation is loading. Please wait.
Published byLee Sullivan Modified over 9 years ago
1
1 Welcome Hans Andersson Der Yao Leong Yee Jiun Song Wendy Tobagus Yang Bei Sherif Yousef
2
2 iSecurity Project Team
3
3 Overview Background Background Vision and Goals Accomplishments Future Work Summary
4
4 Background iSecurity Project – Joint project between KTH and Stanford University – Security in an interactive environment iSpace project – To create an international network of usable augmented environments for collaborative, project-driven learning and working iRoom & iLoungeiLounge
5
5 Motivation The iSpace project was conceived in an academic environment Security issues have not been a high priority However, security is essential for widespread deployment
6
6 Video
7
7 Security Requirements Security is a very important issue in Interactive Workspaces Our security system ensures privacy and integrity Convenience, customizability, accessibility and accountability are also ensured by our security system
8
8 Overview Background Vision and Goals Vision and Goals Accomplishments Future Work Summary
9
9 Vision and Goals Our vision is to deliver a non-intrusive and robust security system for interactive environments Social model Technically feasible system design Implementation Auditing tools Testing and evaluation
10
10 Overview Background Vision and Goals Accomplishments Accomplishments Future Work Summary
11
11 Accomplishments Social Model Technical Design Implementation Auditing and Logging Tools Evaluation
12
12 Social Model Specify the nature of security in Interactive workspaces Enumerate the objectives of the model Define the mechanisms by which these objectives are accomplished.
13
13 Ubicomp Security Transparent, open and dynamic environment – Users and devices interacting spontaneously and in an ad hoc fashion Different security concerns compared to traditional computer environment
14
14 Social Model Objectives Integrity Privacy Availability Accountability Customizability Convenience
15
15 Security Mechanisms Gatekeeper Trust Groups – Implicit Trust Groups – Explicit Trust Groups Security Policy Definition – Permissions – Owners – Delegation Authentication Privacy Guarantee Enforcement
16
16 Technical Design Map the ideas of the social model into a technical design that can be implemented Specify the parts of the system and how they interact with each other Specify authentication and security mechanisms Clear system and interface specifications, to allow application design to proceed concurrently
17
17 Secure Event Heap A new secure Event Heap, built on top of the existing event heap server Users are required to log into the system All events are checked by the security module before they are sent or received All events can be traced back to a particular user Programmatic support for the development of secure applications
18
18 System Architecture Event Heap
19
19 Implementation Implemented our design using Java SSL and crypto packages, and added security checking elements into Event Heap Achieved: – Backwards compatibility – Secure communication – Permission management iRoom now uses the secure version of Event Heap – all original applications run fine No major problem
20
20 Auditing and Logging Tools Administrator should have the option of logging all activity Provides traceability of security breaches Adapted a logging tool originally written by Andy Szybalski Allows recording as well as browsing of logs, also provides filtering capabilities
21
21 Logging Tool
22
22 Sample Applications iPaint – Allows the sharing of a virtual whiteboard – All authenticated users can draw on it Secure File Share – Allows the sharing of files – Three kinds of permissions (list, download, upload)
23
23 iPaint
24
24 Secure File Share
25
25 Permission Manager
26
26 Evaluation No detailed evaluation with real users Internal evaluation Useful security system that is easy to use More studies will be needed to determine if our system fully meet users’ needs
27
27 Overview Background Vision and Goals Accomplishments Future Work Future Work Summary
28
28 Future Work Performance improvement Flow Control Graphical User Interface Automatic monitoring and log-analysis tools
29
29 Overview Background Vision and Goals Accomplishments Future Work Summary Summary
30
30 Summary iSpace infrastructure lacks security Ubicomp security issues are unique Our iSecurity system provides a non- intrusive, robust security system for users System provides strong privacy and integrity guarantees for users Rich area for future research work
31
31 Questions For further information about this project please visit our homepage: http://csd.ssvl.kth.se/~csd2003-team16/index.htm
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.