Tamper-resistent ubiquitous data management

نویسندگان

  • Luc Bouganim
  • François Dang Ngoc
  • Philippe Pucharel
چکیده

Chip-Secured XML Access (C-SXA) is a versatile and tamper-resistant XML-based Access Right Controller embedded in a smart card. C-SXA can be used either to protect the privacy of onboard personal data or to control the flow of data extracted from an external source. Tamperresistance is inherited from the smart card for on-board data or achieved using cryptographic techniques for external data. C-SXA can provide different views of the same on-board or external data depending on the user or application accessing them. Moreover, access control on external data can benefit from on-board storage to enforce powerful, context dependant access control policies. These two features allow C-SXA to address a wide range of applications such as secure portable folders, data sharing among a community of users, parental control and Digital Right Management, in a more secure and accurate way than existing technologies. This work relates the C-SXA experience. We first motivate the interest of the approach and describe different usage scenarios. We then present the internals of C-SXA and show how they tackle the smart card’s hardware limitations. Finally, we demonstrate its viability showing how our smart card engine can be integrated in a distributed architecture including the smart card, the server and the user terminal, making the complete chain from the user to the data secure

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Tamper-resistant ubiquitous data management

The rapid growth of ubiquitous computing impels mobile users to store personal data on the Web in order to increase data availability and facilitate data sharing among partners. However, Database Service Providers (DSP) arouse user’s suspicion because DSP’s privacy policies have been frequently dishonored [AKS02]. In addition, no one can fully trust traditional server-based security mechanisms ...

متن کامل

A Privacy Awareness System for Ubiquitous Computing Environments

Protecting personal privacy is going to be a prime concern for the deployment of ubiquitous computing systems in the real world. With daunting Orwellian visions looming, it is easy to conclude that tamper-proof technical protection mechanisms such as strong anonymization and encryption are the only solutions to such privacy threats. However, we argue that such perfect protection for personal in...

متن کامل

Security in Ad Hoc Networks

This paper analyzes security challenges in ad hoc networks and summarizes key issues that should be solved for achieving the ad hoc security. It also gives an overview of the current state of solutions on such key issues as intrusion detection, secure routing and key management service. Based on our study, we present using external CA (Certificate Authority) and tamperresistant chip to support ...

متن کامل

Survivability of Sensors with Key and Trust Management

Weiser (1991) envisioned a ubiquitous computing world where intelligent computing and communicating devices are pervasive and woven into the fabrics of every day artifacts. His vision is being materialised: the market of large scale sensors and hand-held devices networks has been gaining momentum. However, one may question whether or not these computing and communicating entities will be able t...

متن کامل

The aegis Processor Architecture for Tamper-Evident and Tamper-Resistant Processing

We describe the architecture of the aegis processor which can be used to build computing systems secure against both physical and software attacks. aegis assumes that the operating system and all components external to it, such as memory, are untrusted. aegis provides tamper-evident, authenticated environments in which any physical or software tampering by the adversary is guaranteed to be dete...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Comput. Syst. Sci. Eng.

دوره 20  شماره 

صفحات  -

تاریخ انتشار 2005