Sie sind auf Seite 1von 44

Privacy Management Mechanisms

Course: Security and Privacy on the Internet

Instructor: Dr. A.K. Aggarwal

Presented By:
Rachita Singh
Fadi Farhat
Fall, 2007

1 564 Fall 2007 Security and Privacy on the Internet - Dr. A.K. Aggarwal
Table of Contents

 Introduction
 Security and Privacy
 Basic Security Services
 Privacy Mechanisms
 Proposed Techniques
- Centralization of Information
- Smart Card Technology using different keys
 What people should do to help their privacy?
 Conclusion
 References
 Questions

2 564 Fall 2007 Security and Privacy on the Internet - Dr. A.K. Aggarwal
Introduction
Our paper has two major purposes:
1- Define some terms and concepts of basic
cryptographic methods by using the Privacy
Mechanisms.

2 - Present two useful strategies:

2.1- Centralization of Information.

2.2- Smart Card Technology using


different keys.

3 564 Fall 2007 Security and Privacy on the Internet - Dr. A.K. Aggarwal
Security and Privacy

 Security can be defined as the “mechanisms


and techniques that control who may use or
modify the computer or the information stored
in it”

 Privacy can be defined as “the ability of an


individual (or organization) to decide whether,
when, and to whom personal (or
organizational) information is released.”

4 564 Fall 2007 Security and Privacy on the Internet - Dr. A.K. Aggarwal
Elements of Cryptography

This figure The sender uses a key to


explains the cipher the message
operation of into a cipher text and
transferring a send it to the receiver
message who will uses a
from sender decryption key to
to receiver decipher it.

5 564 Fall 2007 Security and Privacy on the Internet - Dr. A.K. Aggarwal
Basic Security Services
1. Authentication
It provides us the assurance that the communicating
entity is the one it claims to be

Two types of Authentication:

1.1 Peer entity authentication


It provides mutual confidence in the identities of the
parties involved in a connection.

1.2 Data origin authentication


It insures the assurance about the source of the
received data.

6 564 Fall 2007 Security and Privacy on the Internet - Dr. A.K. Aggarwal
Basic Security Services

2. Access Control
The prevention of unauthorized use of a resource
(i.e. this service controls who can have access to a
resource, under what conditions access can occur,
and what those accessing the resource are allowed
to do).

3. Confidentiality
It is the protection of information from unauthorized
disclosure (against eavesdropping).

7 564 Fall 2007 Security and Privacy on the Internet - Dr. A.K. Aggarwal
Basic Security Services

4. Traffic-flow confidentiality
The protection of information that might be derived
from observation of traffic flows.

5. Integrity
Data integrity is the assurance that the data is
consistent, correct and accessible. Assurance that
data received are exactly as sent by an authorized
sender i.e. no modification, insertion, deletion or
replay.

8 564 Fall 2007 Security and Privacy on the Internet - Dr. A.K. Aggarwal
Basic Security Services
6. Non-repudiation
It is the concept of protection against denial by one
of the parties in a communication.

There are two types of non-repudiation:

6.1.Origin non-repudiation
It is the proof that the message was sent by the
specified party.

6.2. Destination non-repudiation


It is the proof that the message was received by the
specified party.

9 564 Fall 2007 Security and Privacy on the Internet - Dr. A.K. Aggarwal
Privacy Mechanisms
1. Encryption (Encipherment)

It is the process of encoding information into a


secret code by using a special key.
To read an encrypted file, you must have the key of
the decoding that enables you to decrypt it.

By using an algorithm for encryption we can


protect our personal information that we don’t
want other people to see such as:

- Credit-card information
- Bank-account information
- Medical information

10 564 Fall 2007 Security and Privacy on the Internet - Dr. A.K. Aggarwal
Privacy Mechanisms
Encryption
Mechanism

11 564 Fall 2007 Security and Privacy on the Internet - Dr. A.K. Aggarwal
Privacy Mechanisms

The two main types of Encryption are:

 Asymmetric encryption (also called public-key


encryption)

 Symmetric encryption

12 564 Fall 2007 Security and Privacy on the Internet - Dr. A.K. Aggarwal
Privacy Mechanisms

Public-key cryptography

 A user has a pair of cryptographic keys - a public


key and a private key. The private key is kept
secret, while the public key may be widely
distributed.

 A message encrypted with the public key


can be decrypted only with the
corresponding private key.

13 564 Fall 2007 Security and Privacy on the Internet - Dr. A.K. Aggarwal
Privacy Mechanisms
Asymmetric
Encryption
This figure explains
while Bob is writing an
e-mail to Nancy, Bob
has the public key of
Nancy, public key of
Nancy is widely
distributed, he can
encrypt that message
and send it to Nancy,
Nancy with her private
key can decrypt the
message and no
intruder should be able
to decrypt the message.
14 564 Fall 2007 Security and Privacy on the Internet - Dr. A.K. Aggarwal
Privacy Mechanisms
Private Key encryption
 Private Key means that each computer has a secret
key that it can use to encrypt a packet of information.

 It requires that you know which computers will talk to


each other and install the key on each one.

 If "A" becomes "C" and "B" becomes "D". You have


already told the other party that the code is "Shift by
2“

15 564 Fall 2007 Security and Privacy on the Internet - Dr. A.K. Aggarwal
Privacy Mechanisms

Difference between Symmetric and Asymmetric

In a symmetric cryptosystem, the same key is


used for encryption and decryption while in an
asymmetric cryptosystem the key used for
decryption is different from the key used for
encryption.

16 564 Fall 2007 Security and Privacy on the Internet - Dr. A.K. Aggarwal
Privacy Mechanisms

2. Digital Signature
A digital signature is basically a way to
ensure that an electronic document is
authentic. Authentic means that you know
who created the document and that it has
not been altered.

17 564 Fall 2007 Security and Privacy on the Internet - Dr. A.K. Aggarwal
Privacy Mechanisms
This figure tells us 3. Hash Functions and
that a hash function Message Digest
creates a fixed
length string from
a block of data. It is
also called a
message digest
function.

These (fast)
functions analyze a
message and
produce a fixed
length digest which
is practically
unique. It is used to
create a signature
for a message
which can be used
to verify its integrity

18 564 Fall 2007 Security and Privacy on the Internet - Dr. A.K. Aggarwal
Privacy Mechanisms

4. Access Control

Access control is way of talking about


controlling access to a web resource. Access
can be granted or denied based on a wide
variety of criteria, such as the network
address of the client, the time of day, or the
browser which the visitor is using.

19 564 Fall 2007 Security and Privacy on the Internet - Dr. A.K. Aggarwal
Privacy Mechanisms
5. Traffic Padding
 It is the process of intercepting and examining
messages in order to deduce information from
patterns in communication.

 The attacker might not know what A and B were


talking but he could know that they were talking and
how much they talked.

 Padding messages is a way to make it harder to do


traffic analysis. A number of random bits are
appended to the end of the message.

20 564 Fall 2007 Security and Privacy on the Internet - Dr. A.K. Aggarwal
Privacy Mechanisms
6. Routing control

Enables selection of a particular physically


secure route for certain data and allows
routing changes, especially when a breach of
security is suspected.
7. Notarization

It’s the use of a third party to assure the other


party.

21 564 Fall 2007 Security and Privacy on the Internet - Dr. A.K. Aggarwal
Proposed Techniques

We will present two useful Techniques.

1- Centralization of Information.

2- Smart Card Technology using different


keys.

22 564 Fall 2007 Security and Privacy on the Internet - Dr. A.K. Aggarwal
Centralization of Information
 The idea is to create a Passport account
with the detailed information that will be
saved in a central database and
protected by several security levels.

 Every user will have a unique identifier


for his account in addition to some
personal information like the e-mail
address, phone number and the first and
last name.

23 564 Fall 2007 Security and Privacy on the Internet - Dr. A.K. Aggarwal
Centralization of Information

Objectives

 Authenticate users for participating sites.

 Secure sign-in.

 Log in to many websites using one account.

24 564 Fall 2007 Security and Privacy on the Internet - Dr. A.K. Aggarwal
Centralization of Information
Two of the famous groups
 The Liberty Alliance Project:
It was established in September 2001 for more than 160 companies.
The goal of the group was to establish an open standard for federated
network identity.

 .NET Passport:
It is a unified-login service presented by Microsoft to allow users log in
to many websites using one account.
(MSN Messenger, MSN Hotmail, MSN Music, and other sites and
services )

25 564 Fall 2007 Security and Privacy on the Internet - Dr. A.K. Aggarwal
Centralization of Information
Secure sign-in service
 To access a participating site, the browser will send an initial
HTTP request message.

 The site will return an HTTP redirect message for the co-
branded sign-in page on the Passport server.

 The site will add its unique ID and a return URL to the HTTP.

 Passport server will check the site ID and return URL before
displaying the authentication.

 The Passport server and the participating site server never


communicate users’ authentication and profile information
directly but over secure channels.

26 564 Fall 2007 Security and Privacy on the Internet - Dr. A.K. Aggarwal
Centralization of Information

Security levels

Microsoft .NET Passport provides three


security levels:

 Standard sign-in
 Secure channel sign-in
 Strong credential sign-in

27 564 Fall 2007 Security and Privacy on the Internet - Dr. A.K. Aggarwal
Centralization of Information

Standard sign-in security level


In standard sign-in, the SSL/TLS protocols
(Secure Sockets Layer /Transport Layer
Security) only secure the transmission of user
credentials between the browser and the
Passport server, not between the browser and
the participating sites. Sites that don’t require
a high level of security, such as Microsoft’s
Hotmail service, use standard sign-in.

28 564 Fall 2007 Security and Privacy on the Internet - Dr. A.K. Aggarwal
Centralization of Information

Secure channel sign-in security level


In the secure channel sign-in, all communication
takes place over secure channels as HTTPS
(HTTP&SSL/TLS). With secure channel sign-in,
traffic is encrypted with an SSL/TLS session key
held only by legitimate participants and that will
be to ensure reasonable protection from
eavesdroppers and man in the middle attacks.

29 564 Fall 2007 Security and Privacy on the Internet - Dr. A.K. Aggarwal
Centralization of Information
Strong credential sign-in security level
 If a user enters a password incorrectly five
consecutive times, .NET Passport automatically
blocks access to the account for two minutes,
making it difficult for an attacker to launch a
password cracker.

 Passport’s designers chose a two-stage sign-in


process for protecting participating sites with more
stringent security requirements. Stage one is
identical to secure channel sign-in. Stage two
involves a second sign-in page that requires the
user to enter a four-digit security key, or PIN.

30 564 Fall 2007 Security and Privacy on the Internet - Dr. A.K. Aggarwal
Centralization of Information

Key management
 Key management is .NET Passport’s Achilles’ heel, as it is
for all cryptographic security systems. The Passport server
shares a Triple-DES key with each participating site, which it
uses to encrypt information it transfers to the participating
sites in HTTP redirect messages.

 The .NET Passport service must securely generate the keys


and assign them out of band—a difficult task requiring careful
attention. The server embeds each key in an installer
program, so not even the site administrator sees the key
value.

31 564 Fall 2007 Security and Privacy on the Internet - Dr. A.K. Aggarwal
Centralization of Information
Suggestions for the centralization of Information

As most of the websites need a verification of our


personal id, and as we have to provide them with
it, and to prevent the disclose of that confidential
information we suggest that, the .NET Passport
expands its spread by increasing the limited
number of websites that it deals with to
authenticate us where ever needed and that will
be by playing the role of a notarized third party.

32 564 Fall 2007 Security and Privacy on the Internet - Dr. A.K. Aggarwal
Smart Card Technology using different keys

 A smart card or chip card is defined as any


pocket-sized card with embedded memory
storage components, small processor and finger
print sensor. It can:

 Receive information.
 Process it.
 Deliver outputs.

By using of a special driver.

33 564 Fall 2007 Security and Privacy on the Internet - Dr. A.K. Aggarwal
Smart Card Technology using different keys
Objectives
 The Smart Card will store different personal information
such as Medical and Banking information.

 The protection of our personal information like credit


card information, social security number or bank
account information can be achieved using encryption,
which must be done using different keys depending on
the organization for which information from the smart
card will be released.

 Self protection (using processor) in the case of a none


authorized use (destroy the memory).

34 564 Fall 2007 Security and Privacy on the Internet - Dr. A.K. Aggarwal
Smart Card Technology using different keys

Example

For example the encryption key of the bank


account information for a certain person should be
different from the encryption key of the medical
information for the same person. This will impose
that the user provides each party with the special
private key to ensure that no one else can decrypt
other information pertaining to other organizations.

35 564 Fall 2007 Security and Privacy on the Internet - Dr. A.K. Aggarwal
Smart Card Technology using different keys

How to benefit from The Smart Card?

The Smart Card can be used for commercial


transactions over the Internet (using a special
driver) such that the user’s encrypted
information will be read thru a Smart Card
Reader by the merchant who in his turn,
transfers these encrypted information to the
related organization.

36 564 Fall 2007 Security and Privacy on the Internet - Dr. A.K. Aggarwal
Smart Card Technology using different keys

Security Issue

There is a security issue concerning the use of this


Smart Card for commercial transactions over the
Internet; a scenario could happen where the website
can use the encrypted information to process banking
transactions more than authorized.

37 564 Fall 2007 Security and Privacy on the Internet - Dr. A.K. Aggarwal
Smart Card Technology using different keys

Proposed Solution

The proposed solution is to let the user add to his


original encrypted information the number of times, that
information, is allowed to be used and the amount to
be paid to the merchant website at that specific
transaction (for bank issues), keeping in mind that the
new information will be encrypted by the same key of
the original encrypted information.

38 564 Fall 2007 Security and Privacy on the Internet - Dr. A.K. Aggarwal
What people should do to help their privacy?
Internet privacy is the ability to control who will
access the information and what part of
information.

 The first and the most important advice is not to


give the personal information unless for trusted
parties.

 Read the Agreements provided by the websites


very well before accepting it because most of the
times it grants them the right to share your private
information with third parties and they are always
make these agreements as long as possible and
sometimes hard to be understood to push you for
accepting it without well understanding its terms
and conditions.

39 564 Fall 2007 Security and Privacy on the Internet - Dr. A.K. Aggarwal
What people should do to help their privacy?

 Avoid answering the unnecessary questions


or fill the not required fields in the WebPages
that ask about that.

 Be careful about deploying your personal


information in social networks because you
have to put in mind that those WebPages are
constructed to share personal information
with everyone who wants to see them.

40 564 Fall 2007 Security and Privacy on the Internet - Dr. A.K. Aggarwal
What people should do to help their privacy?

 Keep in mind that most of the WebPages that


provides free downloading and free services
ask for your personal information to use it for
business purposes and in an unauthorized
way.

41 564 Fall 2007 Security and Privacy on the Internet - Dr. A.K. Aggarwal
Conclusion
 We presented the Security Services and there role
towards protecting information over the Internet.

 We described the Privacy Mechanisms and how they


can protect our information from attackers.

 We mentioned the more privacy we can benefit from


the Centralization of Information.

 We offered the Smart Card Technology using


different keys that can enhance our privacy over the
Internet.

 And at the end we suggested some important tips that


can help in supporting our privacy issues.

42 564 Fall 2007 Security and Privacy on the Internet - Dr. A.K. Aggarwal
References
[1] Rolf Oppliger, “Microsoft .NET Passport”, IEEE
Computer Society, July 2003, pp. 29–35.

[2] Maryam N. Razavi and Lee Iverson, “A Grounded


Theory of Information Sharing Behavior in a Personal
Learning Space”, ACM Press, 2006, pp.459–468.

[3] Irene Pollach, “What’s wrong with online privacy


policies?”, ACM Press, Sep 2007, pp. 103–108.

[4] Jason I. Hong, Jennifer D. Ng, Scott Lederer and


James A. Landay, “Privacy Risk Models for Designing
Privacy-Sensitive Ubiquitous Computing Systems”,ACM
Press, 2004, pp.91-100.

43 564 Fall 2007 Security and Privacy on the Internet - Dr. A.K. Aggarwal
Questions

44 564 Fall 2007 Security and Privacy on the Internet - Dr. A.K. Aggarwal

Das könnte Ihnen auch gefallen