Tamper-resistant ubiquitous data management
نویسندگان
چکیده
The rapid growth of ubiquitous computing impels mobile users to store personal data on the Web in order to increase data availability and facilitate data sharing among partners. However, Database Service Providers (DSP) arouse user’s suspicion because DSP’s privacy policies have been frequently dishonored [AKS02]. In addition, no one can fully trust traditional server-based security mechanisms against more and more frequent and malicious attacks [FBI03]. While clientbased security policies have been historically disregarded considering the vulnerability of client environments [Rus01], the emergence of hardware elements of trust in client devices drastically changes the situation [BoP02]. Secure tokens and smart cards plugged or embedded into different client devices are exploited today in a growing variety of applications (e.g., authentication, healthcare folders, digital right management). Chip-Secured XML Access (C-SXA) belongs to this new category of PETs (Privacy Enhancing Technologies) taking their security from tamper-resistant hardware devices. CSXA is a versatile XML-based Storage Manager and Access Right Controller embedded in a smart card. It evaluates the user’s privileges on on-board or external encrypted XML data and delivers the authorized subset of these data. Combining storage and access control in the same secured architecture allows tackling accurately two important issues:
منابع مشابه
Tamper-resistent ubiquitous data management
Chip-Secured XML Access (C-SXA) is a versatile and tamper-resistant XML-based Access Right Controller embedded in a smart card. C-SXA can be used either to protect the privacy of onboard personal data or to control the flow of data extracted from an external source. Tamperresistance is inherited from the smart card for on-board data or achieved using cryptographic techniques for external data. ...
متن کاملSelf authentication path insertion in FPGA-based design flow for tamper-resistant purpose
FPGA platforms have been widely used in many modern digital applications due to their low prototyping cost, short time-to-market and flexibility. Field-programmability of FPGA bitstream has made it as a flexible and easy-to-use platform. However, access to bitstream degraded the security of FPGA IPs because there is no efficient method to authenticate the originality of bitstream by the FPGA pr...
متن کاملSecurity in Ad Hoc Networks
This paper analyzes security challenges in ad hoc networks and summarizes key issues that should be solved for achieving the ad hoc security. It also gives an overview of the current state of solutions on such key issues as intrusion detection, secure routing and key management service. Based on our study, we present using external CA (Certificate Authority) and tamperresistant chip to support ...
متن کاملThe aegis Processor Architecture for Tamper-Evident and Tamper-Resistant Processing
We describe the architecture of the aegis processor which can be used to build computing systems secure against both physical and software attacks. aegis assumes that the operating system and all components external to it, such as memory, are untrusted. aegis provides tamper-evident, authenticated environments in which any physical or software tampering by the adversary is guaranteed to be dete...
متن کاملComputationally Sound Proofs of Security for a Key Management API extended abstract
Security solutions for information systems are increasingly making use of tamper-resistant cryptographic devices, whether they are smartcards carried by commuters on a mass transit system, or high-throughput Hardware Security Modules in a bank ATM transaction processing processing facility. Over the last few years we have been analysing the key management APIs of such tamper-resistant devices. ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2005