annual workshop february 5th, 2014

30
Annual Workshop February 5th, 2014

Upload: agatha

Post on 23-Feb-2016

33 views

Category:

Documents


0 download

DESCRIPTION

Annual Workshop February 5th, 2014. The PriMan framework. SecAnon-DistriNet. Outline. Introduction PriMan PriMan app development Abstractions Next steps. Security problem? Here is the solution:. Public Key Cryptography. Mix Networks. Anonymous Credentials. Onion Routing. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Annual  Workshop February 5th, 2014

Annual WorkshopFebruary 5th, 2014

Page 2: Annual  Workshop February 5th, 2014

[name – KU Leuven]

The PriMan framework

SecAnon-DistriNet

Page 3: Annual  Workshop February 5th, 2014

Outline

• Introduction• PriMan• PriMan app development• Abstractions• Next steps

Andreas put
abstractions a
Page 4: Annual  Workshop February 5th, 2014

Security problem? Here is the solution:

Mix Networks

One Time Password

Public Key Cryptography

Anonymous Credentials

Blind Signatures

Secure Channels

Tamper Proof Modules

Searchable Encryption

Group Signatures

Zero-Knowledge Proofs

Onion Routing

Page 5: Annual  Workshop February 5th, 2014

The Problems

• Processor intensive

• Complex to use (user)

• Complex to use (Developer)

Page 6: Annual  Workshop February 5th, 2014

The Problems

• Processor intensive

• Complex to use (user)

• Complex to use (Developer)

Page 7: Annual  Workshop February 5th, 2014

Outline

• Introduction• PriMan• PriMan app development• Abstractions• Next steps

Page 8: Annual  Workshop February 5th, 2014

PriMan

• Policy driven development framework• Flexible and secure access control• Security of data in storage and transit

• Goal: facilitating the development of secure and privacy friendly applications

Page 9: Annual  Workshop February 5th, 2014

PriMan

• High level technology agnostic API

• Thin SW Layer

• Modular design

• Rapid prototyping

Page 10: Annual  Workshop February 5th, 2014

Technology agnostic abstractions

• Technology agnostic– Dev does not need to be aware of techn.

specific configuration details • Techn. specific configuration

policies

• High level, easy to understand operations

Page 11: Annual  Workshop February 5th, 2014

PriMan

• Thin software layer– Connects API with technologies

underneath– Very low overhead (<1ms)

• Modular design– Extensible

Page 12: Annual  Workshop February 5th, 2014

PriMan

• Non-Functional requirements– Usability–Modularity– Privacy/Security– Performance

• Functional requirements– Secure communication channels– Secure data storage– Secure authentication

Page 13: Annual  Workshop February 5th, 2014

Outline

• Introduction• PriMan• PriMan app development• Abstractions• Next steps

Page 14: Annual  Workshop February 5th, 2014

App development

Page 15: Annual  Workshop February 5th, 2014

PriMan app development

Page 16: Annual  Workshop February 5th, 2014

PriMan app development

Security experts create and configure reusable (secure) FW components

Page 17: Annual  Workshop February 5th, 2014

Outline

• Introduction• PriMan• PriMan app development• Abstractions• Next steps

Page 18: Annual  Workshop February 5th, 2014

Abstractions - Connection

• Create connection– ConnectionParameters

• Listen for connection (server)• Send data (Object)• Receive data (Object)• Close connection

Page 19: Annual  Workshop February 5th, 2014

Configuration Parameters - Connections

• Address• Port• Protocol• Keystore (+password)• Truststore (+password)• …

Page 20: Annual  Workshop February 5th, 2014

Connection - Example• Code

• Configuration

Page 21: Annual  Workshop February 5th, 2014

Abstractions - Credential• Credential

– Represents identity– Attributes + secret

• Issuer• Authentication

– Prove a Claim – Claim can be determined by auth. policy– Example:

Policy: “Prove ownership of valid ePoll cred”Claim: “I own this ePoll cred”Proof: Cryptographic proof using secret and nonce

Page 22: Annual  Workshop February 5th, 2014

Credential - Example

– Create a Claim using a Policy

– Create a Credential using Claim, secret and nonce

Page 23: Annual  Workshop February 5th, 2014

Abstractions - Storage

• Store• Load• Remove

• Using Identifiers• Optional: Storage secret

Page 24: Annual  Workshop February 5th, 2014

Outline

• Introduction• PriMan• PriMan app development• Abstractions• Next steps

Page 25: Annual  Workshop February 5th, 2014

Next steps

• Move control to Service provider–Which technology is selected– Under which circumstances

(context aware)

• Give some control to the user

Page 26: Annual  Workshop February 5th, 2014

Policies• Security policy

– Context aware– Determines which action needs to be performed– Determines which technology will be selected

• Sticky policy– Attached to an object

(e.g., a credential, a data object)– Defines how the app can use that object

• Context aware• User policy

– ~ Security policy, but defined by the user– Service provider limits user policy capabilities

Page 27: Annual  Workshop February 5th, 2014

PriMan app development

Page 28: Annual  Workshop February 5th, 2014

PriMan app development

Page 29: Annual  Workshop February 5th, 2014

Questions?

Page 30: Annual  Workshop February 5th, 2014