györgy kálmán, josef noll ieee symposium on wireless pervasive computing, santorini, greece...

13
György Kálmán, Josef Noll IEEE Symposium on Wireless Pervasive Computing, Santorini, Greece Speaker: 黃黃黃 User Controlled Content Access

Upload: lorena-shaw

Post on 14-Dec-2015

228 views

Category:

Documents


4 download

TRANSCRIPT

Page 1: György Kálmán, Josef Noll IEEE Symposium on Wireless Pervasive Computing, Santorini, Greece Speaker: 黃韋綸 User Controlled Content Access

György Kálmán, Josef NollIEEE Symposium on Wireless Pervasive Computing, Santorini, Greece

Speaker:黃韋綸

User Controlled Content Access

Page 2: György Kálmán, Josef Noll IEEE Symposium on Wireless Pervasive Computing, Santorini, Greece Speaker: 黃韋綸 User Controlled Content Access

Outline

2

IntroductionProposed ArchitectureThreatsConclusion

Page 3: György Kálmán, Josef Noll IEEE Symposium on Wireless Pervasive Computing, Santorini, Greece Speaker: 黃韋綸 User Controlled Content Access

Introduction

Users are willing to share their own content (pictures, videos etc.),but lack the capability and the knowledge to protect themselves against theft.

The user has to buy a new hardware device.

3

Page 4: György Kálmán, Josef Noll IEEE Symposium on Wireless Pervasive Computing, Santorini, Greece Speaker: 黃韋綸 User Controlled Content Access

Proposed Architecture - Content sharing with identity management and trusted component

4

Page 5: György Kálmán, Josef Noll IEEE Symposium on Wireless Pervasive Computing, Santorini, Greece Speaker: 黃韋綸 User Controlled Content Access

Proposed Architecture – Direct key exchange

while in physical proximity, the user and the recipient are putting their phones close, and the public keys are exchanged automatically.

5

Page 6: György Kálmán, Josef Noll IEEE Symposium on Wireless Pervasive Computing, Santorini, Greece Speaker: 黃韋綸 User Controlled Content Access

Proposed Architecture – Access rights update

The user made changes on the rights associated to his content and wants to update the server.

6

Page 7: György Kálmán, Josef Noll IEEE Symposium on Wireless Pervasive Computing, Santorini, Greece Speaker: 黃韋綸 User Controlled Content Access

Proposed Architecture – Service discovery

User can put his phone close to a server, and the capabilities and the directory of the offered services is automatically downloaded to his phone, is possible also between two phones.

7

Page 8: György Kálmán, Josef Noll IEEE Symposium on Wireless Pervasive Computing, Santorini, Greece Speaker: 黃韋綸 User Controlled Content Access

Compar

WiFi Bluetooth

Infrared NFC

Range 0 ~ 100 m

0 ~ 10 m

0 ~ 1 m < 50 cm

Transfer rate

High54 Mbps

Medium1 Mbps

Medium4 Mbps

Low54 Mbps

Security Low High Low Very High

Cost High Medium Medium Very Low

8

Page 9: György Kálmán, Josef Noll IEEE Symposium on Wireless Pervasive Computing, Santorini, Greece Speaker: 黃韋綸 User Controlled Content Access

Threats - Problem areas in the user content sharing scenario

9

Page 10: György Kálmán, Josef Noll IEEE Symposium on Wireless Pervasive Computing, Santorini, Greece Speaker: 黃韋綸 User Controlled Content Access

Threats - Eavesdroppers

WLANs broadcast information in a considerable range.

Countermeasures:symmetric encryption

10

Page 11: György Kálmán, Josef Noll IEEE Symposium on Wireless Pervasive Computing, Santorini, Greece Speaker: 黃韋綸 User Controlled Content Access

Threats - Man in the Middle

Countermeasures:Identity checks.

The highest level of assurance may be reached with a trusted third party(CA).

11

Page 12: György Kálmán, Josef Noll IEEE Symposium on Wireless Pervasive Computing, Santorini, Greece Speaker: 黃韋綸 User Controlled Content Access

Threats - Tampered software

Attackers may change the original code, install a trojan or hide other malicious program with the help of a rootkit.

Countermeasures:A possible solution is to use a SIM included in every mobile phone.

12

Page 13: György Kálmán, Josef Noll IEEE Symposium on Wireless Pervasive Computing, Santorini, Greece Speaker: 黃韋綸 User Controlled Content Access

ConclusionMobile providers usually do not allow access to the SIM in order to ensure correct functionality of the network.

SIM has the potential to provide strong encryption services.

This paper propose a smartcard based right management solution, which is using the SIM of a mobile phone as trusted entity.

13