A Capability-based Privacy- preserving Scheme for Pervasive Computing Environments Dyvyan M....

22
A Capability-based Privacy- preserving Scheme for Pervasive Computing Environments Dyvyan M. Konidala Dang N. Duc Dongman Lee Kwangjo Kim Proceedings of the 3 rd Int’l Conf. on Pervasive Computing and Communications Workshops (Percom 2005 Workshops)
  • date post

    19-Dec-2015
  • Category

    Documents

  • view

    217
  • download

    1

Transcript of A Capability-based Privacy- preserving Scheme for Pervasive Computing Environments Dyvyan M....

Page 1: A Capability-based Privacy- preserving Scheme for Pervasive Computing Environments Dyvyan M. Konidala Dang N. Duc Dongman Lee Kwangjo Kim Proceedings of.

A Capability-based Privacy-preserving Scheme for Pervasive

Computing Environments Dyvyan M. KonidalaDang N. DucDongman LeeKwangjo KimProceedings of the 3rd Int’l Conf. on Pervasive Computing and Communications Workshops (Percom 2005 Workshops)

Page 2: A Capability-based Privacy- preserving Scheme for Pervasive Computing Environments Dyvyan M. Konidala Dang N. Duc Dongman Lee Kwangjo Kim Proceedings of.

Introduction Background Proposed scheme Security analysis Complexity analysis Comparison with related work Conclusion

Outline

Page 3: A Capability-based Privacy- preserving Scheme for Pervasive Computing Environments Dyvyan M. Konidala Dang N. Duc Dongman Lee Kwangjo Kim Proceedings of.

Introduction Background Proposed scheme Security analysis Complexity analysis Conclusion

Outline

Page 4: A Capability-based Privacy- preserving Scheme for Pervasive Computing Environments Dyvyan M. Konidala Dang N. Duc Dongman Lee Kwangjo Kim Proceedings of.

This paper focuses on user authentication , authorization , service access control ,and privacy protection.

Introduction

Page 5: A Capability-based Privacy- preserving Scheme for Pervasive Computing Environments Dyvyan M. Konidala Dang N. Duc Dongman Lee Kwangjo Kim Proceedings of.

Introduction Background Proposed scheme Security analysis Complexity analysis Conclusion

Outline

Page 6: A Capability-based Privacy- preserving Scheme for Pervasive Computing Environments Dyvyan M. Konidala Dang N. Duc Dongman Lee Kwangjo Kim Proceedings of.

Capability-based User Authentication and Authorization.

Partially Blind Signature.

Background

Page 7: A Capability-based Privacy- preserving Scheme for Pervasive Computing Environments Dyvyan M. Konidala Dang N. Duc Dongman Lee Kwangjo Kim Proceedings of.

Introduction Background Proposed scheme Security analysis Complexity analysis Conclusion

Outline

Page 8: A Capability-based Privacy- preserving Scheme for Pervasive Computing Environments Dyvyan M. Konidala Dang N. Duc Dongman Lee Kwangjo Kim Proceedings of.

Proposed scheme

Page 9: A Capability-based Privacy- preserving Scheme for Pervasive Computing Environments Dyvyan M. Konidala Dang N. Duc Dongman Lee Kwangjo Kim Proceedings of.

Capability Request Phase A1: Alice generates secret key(SKU) and

public key(PKU) pair , and store in the memory.

A2: Alice 登入 AS 的 PCE ,用他的帳密登入,若是正確無誤,藉由帳號識別 Alice 的帳號類型之後,判定 Alice 昰學生, AS 回給 Alice Cap1 的 PKcap1 , Alice 利用 PKcap1 及 partially blind signature scheme 將 PKU blind 為 blind(PKU) ,之後將其傳送給 AS 。

Proposed scheme

Page 10: A Capability-based Privacy- preserving Scheme for Pervasive Computing Environments Dyvyan M. Konidala Dang N. Duc Dongman Lee Kwangjo Kim Proceedings of.

A3:AS 用 SKcap1 對 blind(PKU) 簽章後, Alice即可使用服務 {S1 , S3 , S6 , S12} ,當 AS 簽完章之後, AS 利用 partially blind signature scheme 來嵌入某些訊息,像是 Capability 的發佈時間 IssDt 與結束時間 ExpDt ,嵌在簽章訊息中。

A4:Alice 接收 SigSKcap1(Blind( PKu|| IssDt||ExpDt )) 後,用 PKAS 驗證簽章。因為 PKU 被 user blind 了,所以 AS 不知道 PKU 的值, user unblind 訊息後得到 capability 。 CapU = SigSKcap1( PKu|| IssDt||ExpDt )

當 capability 的時限到了之後, Alice 必須重來一次才可取得服務。

Proposed scheme

Page 11: A Capability-based Privacy- preserving Scheme for Pervasive Computing Environments Dyvyan M. Konidala Dang N. Duc Dongman Lee Kwangjo Kim Proceedings of.

Service Access Phase B1: Alice 向 SP 要 service S1 , SP 產生一個亂數 R1 給 Alice B2: Alice 用 SKU 對 (R1 + 1) 簽章之後,將

S1 , SigSKU(R1+1) , PKU , Capu 傳給 SP ,其中, S1 是Alice 的 service ID

B3:SP 收到訊息後,先從資料庫取得 PKcap1 ,再用 PKcap1 來對CapU 做 verify ,接著檢查 PKU 與 CapU 中的 PKU 是否相同,若相同,則繼續 verify ExpDt

B4: SP 繼續使用 PKU 來 verify SigSKU(R1+1) 。 B5: SP 告知 user 是 accept or reject

Proposed scheme

Page 12: A Capability-based Privacy- preserving Scheme for Pervasive Computing Environments Dyvyan M. Konidala Dang N. Duc Dongman Lee Kwangjo Kim Proceedings of.

Introduction Background Proposed scheme Security analysis Complexity analysis Conclusion

Outline

Page 13: A Capability-based Privacy- preserving Scheme for Pervasive Computing Environments Dyvyan M. Konidala Dang N. Duc Dongman Lee Kwangjo Kim Proceedings of.

保護使用者隱私 認證,授權,存取控制 replay attack detection capability non-transferability

Security analysis

Page 14: A Capability-based Privacy- preserving Scheme for Pervasive Computing Environments Dyvyan M. Konidala Dang N. Duc Dongman Lee Kwangjo Kim Proceedings of.

保護使用者隱私 A4 中不包含 userID PKU 算是一種匿名,在一個 capability 時限結束後,

PKU 是可以改變的。 就算 AS 與 SP 串通,在 CRP 中的 PKU 是被 blind

過的。

Security analysis

Page 15: A Capability-based Privacy- preserving Scheme for Pervasive Computing Environments Dyvyan M. Konidala Dang N. Duc Dongman Lee Kwangjo Kim Proceedings of.

認證,授權,存取控制 B3~B5 中,就算 user 不使用真實的 ID ,也能做

到認證,授權,存取控制 即使攻擊者抓了 B2 ,因為沒有 SKU ,所以無法假

裝成 Alice 攻擊者抓了 B1 無法做任何事,因為那只是一個亂數。

Security analysis

Page 16: A Capability-based Privacy- preserving Scheme for Pervasive Computing Environments Dyvyan M. Konidala Dang N. Duc Dongman Lee Kwangjo Kim Proceedings of.

replay attack detection 攻擊者抓到 B2 無法 replay attack ,因為 B2 裡不

包含 R ??

Security analysis

Page 17: A Capability-based Privacy- preserving Scheme for Pervasive Computing Environments Dyvyan M. Konidala Dang N. Duc Dongman Lee Kwangjo Kim Proceedings of.

capability non-transferability B2 的步驟只有 Alice 可以生成 SigSKU(R1+1) ,所

以若是 Alice 想要把 capability 轉移給 Bob ,他必須把 SKU 告訴 Bob ,但是一般人不會這麼做,也許Alice 還將 SKU 用在其他重要的地方,比如說財產。為了不讓 Alice request 同一個 capability 兩個,我們會設計成同一個 capability 每天只能生成一份。

Security analysis

Page 18: A Capability-based Privacy- preserving Scheme for Pervasive Computing Environments Dyvyan M. Konidala Dang N. Duc Dongman Lee Kwangjo Kim Proceedings of.

Introduction Background Proposed scheme Security analysis Complexity analysis Conclusion

Outline

Page 19: A Capability-based Privacy- preserving Scheme for Pervasive Computing Environments Dyvyan M. Konidala Dang N. Duc Dongman Lee Kwangjo Kim Proceedings of.

Complexity analysis

Page 20: A Capability-based Privacy- preserving Scheme for Pervasive Computing Environments Dyvyan M. Konidala Dang N. Duc Dongman Lee Kwangjo Kim Proceedings of.

PKU|| IssDt||ExpDt 共 7byte*3=21*8 = 163bits

Complexity analysis

Page 21: A Capability-based Privacy- preserving Scheme for Pervasive Computing Environments Dyvyan M. Konidala Dang N. Duc Dongman Lee Kwangjo Kim Proceedings of.

Introduction Background Proposed scheme Security analysis Complexity analysis Conclusion

Outline

Page 22: A Capability-based Privacy- preserving Scheme for Pervasive Computing Environments Dyvyan M. Konidala Dang N. Duc Dongman Lee Kwangjo Kim Proceedings of.

Our scheme can be easily ported on airports, train stations , streets, highways, etc.

blablabla…

Conclusion