Privacy Management Mechanisms - PowerPoint PPT Presentation

About This Presentation
Title:

Privacy Management Mechanisms

Description:

(MSN Messenger, MSN Hotmail, MSN Music, and other sites and services ) ... level of security, such as Microsoft's Hotmail service, use standard sign-in. ... – PowerPoint PPT presentation

Number of Views:66
Avg rating:3.0/5.0
Slides: 45
Provided by: ela6
Category:

less

Transcript and Presenter's Notes

Title: Privacy Management Mechanisms


1
  • Privacy Management Mechanisms

Course Security and Privacy on the Internet
Instructor Dr. A.K. Aggarwal
Presented By Rachita Singh Fadi Farhat Fall,
2007
2
Table of Contents
  • Introduction
  • Security and Privacy
  • Basic Security Services
  • Privacy Mechanisms
  • Proposed Techniques
  • - Centralization of Information
  • - Smart Card Technology using different
    keys
  • What people should do to help their privacy?
  • Conclusion
  • References
  • Questions

3
Introduction
  • Our paper has two major purposes
  • 1- Define some terms and concepts of basic
    cryptographic methods by using the Privacy
    Mechanisms.
  • 2 - Present two useful strategies
  • 2.1- Centralization of Information.
  • 2.2- Smart Card Technology using
  • different keys.


4
Security and Privacy
  • Security can be defined as the mechanisms and
    techniques that control who may use or modify the
    computer or the information stored in it
  • Privacy can be defined as the ability of an
    individual (or organization) to decide whether,
    when, and to whom personal (or organizational)
    information is released.

5
Elements of Cryptography
This figure explains the operation of
transferring a message from sender to receiver
The sender uses a key to cipher the message into
a cipher text and send it to the receiver who
will uses a decryption key to decipher it.
6
Basic Security Services
  • 1. Authentication
  • It provides us the assurance that the
    communicating entity is the one it claims to be
  • Two types of Authentication
  • 1.1 Peer entity authentication
  • It provides mutual confidence in the
    identities of the parties involved in a
    connection.
  • 1.2 Data origin authentication
  • It insures the assurance about the source of
    the received data.

7
Basic Security Services
  • 2. Access Control
  • The prevention of unauthorized use of a
    resource (i.e. this service controls who can have
    access to a resource, under what conditions
    access can occur, and what those accessing the
    resource are allowed to do).
  • 3. Confidentiality
  • It is the protection of information from
    unauthorized disclosure (against eavesdropping).

8
Basic Security Services
  • 4. Traffic-flow confidentiality
  • The protection of information that might be
    derived from observation of traffic flows.
  • 5. Integrity
  • Data integrity is the assurance that the data
    is consistent, correct and accessible. Assurance
    that data received are exactly as sent by an
    authorized sender i.e. no modification,
    insertion, deletion or replay.

9
Basic Security Services
  • 6. Non-repudiation
  • It is the concept of protection against
    denial by one of the parties in a communication.
  • There are two types of non-repudiation
  • 6.1. Origin non-repudiation
  • It is the proof that the message was sent by
    the specified party.
  • 6.2. Destination non-repudiation
  • It is the proof that the message was received
    by the specified party.

10
Privacy Mechanisms
  • Encryption (Encipherment)
  • It is the process of encoding information
    into a secret code by using a special key.
  • To read an encrypted file, you must have the
    key of the decoding that enables you to decrypt
    it.
  • By using an algorithm for encryption we can
    protect our personal information that we dont
    want other people to see such as
  • - Credit-card information
  • - Bank-account information
  • - Medical information

11
Encryption Mechanism
Privacy Mechanisms
12
Privacy Mechanisms
  • The two main types of Encryption are
  • Asymmetric encryption (also called public-key
    encryption)
  • Symmetric encryption

13
Privacy Mechanisms
  • Public-key cryptography
  • A user has a pair of cryptographic keys - a
    public key and a private key. The private key is
    kept secret, while the public key may be widely
    distributed.
  • A message encrypted with the public key can be
    decrypted only with the corresponding private
    key.

14
Privacy Mechanisms
Asymmetric Encryption
This figure explains while Bob is writing an
e-mail to Nancy, Bob has the public key of
Nancy, public key of Nancy is widely distributed,
he can encrypt that message and send it to Nancy,
Nancy with her private key can decrypt the
message and no intruder should be able to decrypt
the message.
15
Privacy Mechanisms
  • Private Key encryption
  • Private Key means that each computer has a secret
    key that it can use to encrypt a packet of
    information.
  • It requires that you know which computers will
    talk to each other and install the key on each
    one.
  • If "A" becomes "C" and "B" becomes "D". You have
    already told the other party that the code is
    "Shift by 2

16
Privacy Mechanisms
  • Difference between Symmetric and Asymmetric
  • In a symmetric cryptosystem, the same key is
    used for encryption and decryption while in an
    asymmetric cryptosystem the key used for
    decryption is different from the key used for
    encryption.

17
Privacy Mechanisms
  • 2. Digital Signature
  • A digital signature is basically a way to
    ensure that an electronic document is authentic.
    Authentic means that you know who created the
    document and that it has not been altered.

18
3. Hash Functions and Message Digest
Privacy Mechanisms
This figure tells us that a hash
function creates a fixed length string from a
block of data. It is also called a message digest
function.
These (fast) functions analyze a message
and produce a fixed length digest which is
practically unique. It is used to create a
signature for a message which can be used to
verify its integrity
19
Privacy Mechanisms
  • 4. Access Control
  • Access control is way of talking about
    controlling access to a web resource. Access can
    be granted or denied based on a wide variety of
    criteria, such as the network address of the
    client, the time of day, or the browser which the
    visitor is using.

20
Privacy Mechanisms
  • 5. Traffic Padding
  • It is the process of intercepting and examining
    messages in order to deduce information from
    patterns in communication.
  • The attacker might not know what A and B were
    talking but he could know that they were talking
    and how much they talked.
  • Padding messages is a way to make it harder to do
    traffic analysis. A number of random bits are
    appended to the end of the message.

21

Privacy Mechanisms
  • 6. Routing control
  • Enables selection of a particular physically
    secure route for certain data and allows routing
    changes, especially when a breach of security is
    suspected.
  • 7. Notarization
  • Its the use of a third party to assure the
    other party.

22
Proposed Techniques
  • We will present two useful Techniques.
  • 1- Centralization of Information.
  • 2- Smart Card Technology using different
  • keys.

23
Centralization of Information
  • The idea is to create a Passport account with the
    detailed information that will be saved in a
    central database and protected by several
    security levels.
  • Every user will have a unique identifier for his
    account in addition to some personal information
    like the e-mail address, phone number and the
    first and last name.

24
Centralization of Information
  • Objectives
  • Authenticate users for participating sites.
  • Secure sign-in.
  • Log in to many websites using one account.

25
Centralization of Information
  • Two of the famous groups
  • The Liberty Alliance Project
  • It was established in September 2001 for more
    than 160 companies.
  • The goal of the group was to establish an open
    standard for federated network identity.
  • .NET Passport
  • It is a unified-login service presented by
    Microsoft to allow users log in to many websites
    using one account.
  • (MSN Messenger, MSN Hotmail, MSN Music, and
    other sites and services )

26
Centralization of Information
  • Secure sign-in service
  • To access a participating site, the browser will
    send an initial HTTP request message.
  • The site will return an HTTP redirect message for
    the co-branded sign-in page on the Passport
    server.
  • The site will add its unique ID and a return URL
    to the HTTP.
  • Passport server will check the site ID and return
    URL before displaying the authentication.
  • The Passport server and the participating site
    server never communicate users authentication
    and profile information directly but over secure
    channels.

27
Centralization of Information
  • Security levels
  • Microsoft .NET Passport provides three
    security levels
  • Standard sign-in
  • Secure channel sign-in
  • Strong credential sign-in

28
Centralization of Information
  • Standard sign-in security level
  • In standard sign-in, the SSL/TLS protocols
    (Secure Sockets Layer /Transport Layer Security)
    only secure the transmission of user credentials
    between the browser and the Passport server, not
    between the browser and the participating sites.
    Sites that dont require a high level of
    security, such as Microsofts Hotmail service,
    use standard sign-in.

29
Centralization of Information
  • Secure channel sign-in security level
  • In the secure channel sign-in, all
    communication takes place over secure channels as
    HTTPS (HTTPSSL/TLS). With secure channel
    sign-in, traffic is encrypted with an SSL/TLS
    session key held only by legitimate participants
    and that will be to ensure reasonable protection
    from eavesdroppers and man in the middle attacks.

30
Centralization of Information
  • Strong credential sign-in security level
  • If a user enters a password incorrectly five
    consecutive times, .NET Passport automatically
    blocks access to the account for two minutes,
    making it difficult for an attacker to launch a
    password cracker.
  • Passports designers chose a two-stage sign-in
    process for protecting participating sites with
    more stringent security requirements. Stage one
    is identical to secure channel sign-in. Stage two
    involves a second sign-in page that requires the
    user to enter a four-digit security key, or PIN.

31
Centralization of Information
  • Key management
  • Key management is .NET Passports Achilles heel,
    as it is for all cryptographic security systems.
    The Passport server shares a Triple-DES key with
    each participating site, which it uses to encrypt
    information it transfers to the participating
    sites in HTTP redirect messages.
  • The .NET Passport service must securely generate
    the keys and assign them out of banda difficult
    task requiring careful attention. The server
    embeds each key in an installer program, so not
    even the site administrator sees the key value.

32
Centralization of Information
  • Suggestions for the centralization of
    Information
  • As most of the websites need a verification of
    our personal id, and as we have to provide them
    with it, and to prevent the disclose of that
    confidential information we suggest that, the
    .NET Passport expands its spread by increasing
    the limited number of websites that it deals with
    to authenticate us where ever needed and that
    will be by playing the role of a notarized third
    party.

33
Smart Card Technology using different keys
  • A smart card or chip card is defined as any
    pocket-sized card with embedded memory storage
    components, small processor and finger print
    sensor. It can
  • Receive information.
  • Process it.
  • Deliver outputs.
  • By using of a special driver.

34
Smart Card Technology using different keys
  • Objectives
  • The Smart Card will store different personal
    information such as Medical and Banking
    information.
  • The protection of our personal information like
    credit card information, social security number
    or bank account information can be achieved using
    encryption, which must be done using different
    keys depending on the organization for which
    information from the smart card will be released.
  • Self protection (using processor) in the case of
    a none authorized use (destroy the memory).

35
Smart Card Technology using different keys
  • Example
  • For example the encryption key of the bank
    account information for a certain person should
    be different from the encryption key of the
    medical information for the same person. This
    will impose that the user provides each party
    with the special private key to ensure that no
    one else can decrypt other information pertaining
    to other organizations.

36
Smart Card Technology using different keys
  • How to benefit from The Smart Card?
  • The Smart Card can be used for commercial
    transactions over the Internet (using a special
    driver) such that the users encrypted
    information will be read thru a Smart Card Reader
    by the merchant who in his turn, transfers these
    encrypted information to the related
    organization.

37
Smart Card Technology using different keys
  • Security Issue
  • There is a security issue concerning the use
    of this Smart Card for commercial transactions
    over the Internet a scenario could happen where
    the website can use the encrypted information to
    process banking transactions more than
    authorized.

38
Smart Card Technology using different keys
  • Proposed Solution
  • The proposed solution is to let the user add
    to his original encrypted information the number
    of times, that information, is allowed to be used
    and the amount to be paid to the merchant website
    at that specific transaction (for bank issues),
    keeping in mind that the new information will be
    encrypted by the same key of the original
    encrypted information.

39
What people should do to help their privacy?
  • Internet privacy is the ability to control
    who will access the information and what part of
    information.
  • The first and the most important advice is not to
    give the personal information unless for trusted
    parties.
  • Read the Agreements provided by the websites very
    well before accepting it because most of the
    times it grants them the right to share your
    private information with third parties and they
    are always make these agreements as long as
    possible and sometimes hard to be understood to
    push you for accepting it without well
    understanding its terms and conditions.

40
What people should do to help their privacy?
  • Avoid answering the unnecessary questions or fill
    the not required fields in the WebPages that ask
    about that.
  • Be careful about deploying your personal
    information in social networks because you have
    to put in mind that those WebPages are
    constructed to share personal information with
    everyone who wants to see them.

41
What people should do to help their privacy?
  • Keep in mind that most of the WebPages that
    provides free downloading and free services ask
    for your personal information to use it for
    business purposes and in an unauthorized way.

42
Conclusion
  • We presented the Security Services and there role
    towards protecting information over the Internet.
  • We described the Privacy Mechanisms and how they
    can protect our information from attackers.
  • We mentioned the more privacy we can benefit from
    the Centralization of Information.
  • We offered the Smart Card Technology using
    different keys that can enhance our privacy over
    the Internet.
  • And at the end we suggested some important tips
    that can help in supporting our privacy issues.

43
References
  • 1 Rolf Oppliger, Microsoft .NET Passport,
    IEEE
  • Computer Society, July 2003, pp. 2935.
  • 2 Maryam N. Razavi and Lee Iverson, A Grounded
  • Theory of Information Sharing Behavior in a
    Personal
  • Learning Space, ACM Press, 2006,
    pp.459468.  
  • 3 Irene Pollach, Whats wrong with online
    privacy
  • policies?, ACM Press, Sep 2007, pp.
    103108.  
  • 4 Jason I. Hong, Jennifer D. Ng, Scott Lederer
    and
  • James A. Landay, Privacy Risk Models for
    Designing
  • Privacy-Sensitive Ubiquitous Computing
    Systems,ACM
  • Press, 2004, pp.91-100.

44
Questions
Write a Comment
User Comments (0)
About PowerShow.com