a c apability-based p rivacy-preserving scheme for pervasive computing environments

22
A Capability-based Privacy- preserving Scheme for Pervasive Computing Environments Dyvyan M. Konidala Dang N. Duc Dongman Lee Kwangjo Kim Proceedings of the 3 rd Int’l Conf. on Pervasive Computing and Communications Workshops (Percom 2005 Workshops)

Upload: layne

Post on 09-Feb-2016

40 views

Category:

Documents


0 download

DESCRIPTION

A C apability-based P rivacy-preserving Scheme for Pervasive Computing Environments. Dyvyan M. Konidala Dang N. Duc Dongman Lee Kwangjo Kim Proceedings of the 3 rd Int’l Conf. on Pervasive Computing and Communications Workshops ( Percom 2005 Workshops). O utline. Introduction - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: A  C apability-based  P rivacy-preserving Scheme for Pervasive Computing Environments

A Capability-based Privacy-preserving Scheme for Pervasive

Computing Environments Dyvyan M. KonidalaDang N. DucDongman LeeKwangjo KimProceedings of the 3rd Int’l Conf. on Pervasive Computing and Communications Workshops (Percom 2005 Workshops)

Page 2: A  C apability-based  P rivacy-preserving Scheme for Pervasive Computing Environments

Introduction Background Proposed scheme Security analysis Complexity analysis Comparison with related work Conclusion

Outline

Page 3: A  C apability-based  P rivacy-preserving Scheme for Pervasive Computing Environments

Introduction Background Proposed scheme Security analysis Complexity analysis Conclusion

Outline

Page 4: A  C apability-based  P rivacy-preserving Scheme for Pervasive Computing Environments

This paper focuses on user authentication , authorization , service access control ,and privacy protection.

Introduction

Page 5: A  C apability-based  P rivacy-preserving Scheme for Pervasive Computing Environments

Introduction Background Proposed scheme Security analysis Complexity analysis Conclusion

Outline

Page 6: A  C apability-based  P rivacy-preserving Scheme for Pervasive Computing Environments

Capability-based User Authentication and Authorization.

Partially Blind Signature.

Background

Page 7: A  C apability-based  P rivacy-preserving Scheme for Pervasive Computing Environments

Introduction Background Proposed scheme Security analysis Complexity analysis Conclusion

Outline

Page 8: A  C apability-based  P rivacy-preserving Scheme for Pervasive Computing Environments

Proposed scheme

Page 9: A  C apability-based  P rivacy-preserving Scheme for Pervasive Computing Environments

Capability Request Phase A1: Alice generates secret key(SKU) and

public key(PKU) pair , and store in the memory.

A2: Alice 登入 AS 的 PCE ,用他的帳密登入,若是正確無誤,藉由帳號識別 Alice 的帳號類型之後,判定 Alice 昰學生, AS 回給 Alice Cap1 的 PKcap1 , Alice 利用 PKcap1 及 partially blind signature scheme 將 PKU blind 為 blind(PKU) ,之後將其傳送給 AS 。

Proposed scheme

Page 10: A  C apability-based  P rivacy-preserving Scheme for Pervasive Computing Environments

A3:AS 用 SKcap1 對 blind(PKU) 簽章後, Alice即可使用服務 {S1 , S3 , S6 , S12} ,當 AS 簽完章之後, AS 利用 partially blind signature scheme 來嵌入某些訊息,像是 Capability 的發佈時間 IssDt 與結束時間 ExpDt ,嵌在簽章訊息中。

A4:Alice 接收 SigSKcap1(Blind( PKu|| IssDt||ExpDt )) 後,用 PKAS 驗證簽章。因為 PKU 被 user blind 了,所以 AS 不知道 PKU 的值, user unblind 訊息後得到 capability 。 CapU = SigSKcap1( PKu|| IssDt||ExpDt )

當 capability 的時限到了之後, Alice 必須重來一次才可取得服務。

Proposed scheme

Page 11: A  C apability-based  P rivacy-preserving Scheme for Pervasive Computing Environments

Service Access Phase B1: Alice 向 SP 要 service S1 , SP 產生一個亂數 R1 給 Alice B2: Alice 用 SKU 對 (R1 + 1) 簽章之後,將

S1 , SigSKU(R1+1) , PKU , Capu 傳給 SP ,其中, S1 是 Alice的 service ID B3:SP 收到訊息後,先從資料庫取得 PKcap1 ,再用 PKcap1 來對

CapU 做 verify ,接著檢查 PKU 與 CapU 中的 PKU 是否相同,若相同,則繼續 verify ExpDt B4: SP 繼續使用 PKU 來 verify SigSKU(R1+1) 。 B5: SP 告知 user 是 accept or reject

Proposed scheme

Page 12: A  C apability-based  P rivacy-preserving Scheme for Pervasive Computing Environments

Introduction Background Proposed scheme Security analysis Complexity analysis Conclusion

Outline

Page 13: A  C apability-based  P rivacy-preserving Scheme for Pervasive Computing Environments

保護使用者隱私 認證,授權,存取控制 replay attack detection capability non-transferability

Security analysis

Page 14: A  C apability-based  P rivacy-preserving Scheme for Pervasive Computing Environments

保護使用者隱私 A4 中不包含 userID PKU 算是一種匿名,在一個 capability 時限結束後,

PKU 是可以改變的。 就算 AS 與 SP 串通,在 CRP 中的 PKU 是被 blind過的。

Security analysis

Page 15: A  C apability-based  P rivacy-preserving Scheme for Pervasive Computing Environments

認證,授權,存取控制 B3~B5 中,就算 user 不使用真實的 ID ,也能做到認證,授權,存取控制 即使攻擊者抓了 B2 ,因為沒有 SKU ,所以無法假裝成 Alice 攻擊者抓了 B1 無法做任何事,因為那只是一個亂數。

Security analysis

Page 16: A  C apability-based  P rivacy-preserving Scheme for Pervasive Computing Environments

replay attack detection 攻擊者抓到 B2 無法 replay attack ,因為 B2 裡不包含 R ??

Security analysis

Page 17: A  C apability-based  P rivacy-preserving Scheme for Pervasive Computing Environments

capability non-transferability B2 的步驟只有 Alice 可以生成 SigSKU(R1+1) ,所以若是 Alice 想要把 capability 轉移給 Bob ,他必須把 SKU 告訴 Bob ,但是一般人不會這麼做,也許

Alice 還將 SKU 用在其他重要的地方,比如說財產。為了不讓 Alice request 同一個 capability 兩個,我們會設計成同一個 capability 每天只能生成一份。

Security analysis

Page 18: A  C apability-based  P rivacy-preserving Scheme for Pervasive Computing Environments

Introduction Background Proposed scheme Security analysis Complexity analysis Conclusion

Outline

Page 19: A  C apability-based  P rivacy-preserving Scheme for Pervasive Computing Environments

Complexity analysis

Page 20: A  C apability-based  P rivacy-preserving Scheme for Pervasive Computing Environments

PKU|| IssDt||ExpDt 共 7byte*3=21*8 = 163bits

Complexity analysis

Page 21: A  C apability-based  P rivacy-preserving Scheme for Pervasive Computing Environments

Introduction Background Proposed scheme Security analysis Complexity analysis Conclusion

Outline

Page 22: A  C apability-based  P rivacy-preserving Scheme for Pervasive Computing Environments

Our scheme can be easily ported on airports, train stations , streets, highways, etc.

blablabla…

Conclusion