annual workshop february 5th, 2014
DESCRIPTION
Annual Workshop February 5th, 2014. COSIC. inShopnito. A privacy -preserving mobile shopping assistant. Customer Loyalty Programs (CLP). Goal : to retain existing customers and attract new ones. Customers receive benefits - PowerPoint PPT PresentationTRANSCRIPT
![Page 1: Annual Workshop February 5th, 2014](https://reader031.vdocuments.us/reader031/viewer/2022020308/56815b64550346895dc95223/html5/thumbnails/1.jpg)
Annual WorkshopFebruary 5th, 2014
COSIC
![Page 2: Annual Workshop February 5th, 2014](https://reader031.vdocuments.us/reader031/viewer/2022020308/56815b64550346895dc95223/html5/thumbnails/2.jpg)
inShopnito
A privacy-preserving mobile shopping assistant
![Page 3: Annual Workshop February 5th, 2014](https://reader031.vdocuments.us/reader031/viewer/2022020308/56815b64550346895dc95223/html5/thumbnails/3.jpg)
3
Customer Loyalty Programs (CLP)
• Goal: to retain existing customers and attract new ones.
• Customers receive benefits• Very popular, adopted by many different
providers: retailers, airlines, restaurants, gas stations, etc.
![Page 4: Annual Workshop February 5th, 2014](https://reader031.vdocuments.us/reader031/viewer/2022020308/56815b64550346895dc95223/html5/thumbnails/4.jpg)
4
CLPs’ Shortcomings
• Customers’ privacy concerns– CLPs collect too much personal information
• Physical loyalty cards are not scalable– Too may cards, easily lost or stolen
• Physical loyalty cards are not extensible– No support for more
advanced services
![Page 5: Annual Workshop February 5th, 2014](https://reader031.vdocuments.us/reader031/viewer/2022020308/56815b64550346895dc95223/html5/thumbnails/5.jpg)
5
CLPs and Smartphones
• Smartphones are an attractive platform for CLPs– Very popular, multiple capabilities and
extensibility
• Several Smartphone-based solutions are already available– Loyalty card managers, mobile
wallets, shopping assistants
• Still, privacy concerns are no being addressed
![Page 6: Annual Workshop February 5th, 2014](https://reader031.vdocuments.us/reader031/viewer/2022020308/56815b64550346895dc95223/html5/thumbnails/6.jpg)
6
inShopnito
• More advanced AND privacy-friendly CLP based on smartphones
• Loyalty points and voucher transactions can be anonymous and unlinkable
• Customer controlled data• Secure storage• Advanced services
– Shopping assistant – Product recommendations
![Page 7: Annual Workshop February 5th, 2014](https://reader031.vdocuments.us/reader031/viewer/2022020308/56815b64550346895dc95223/html5/thumbnails/7.jpg)
7
inShopnito Benefits
To Providers:• Competitive advantage:
privacy• Competitive advantage:
advanced services• Lower infrastructure costs• Better quality, less
sensitive data• Improved resilience
against attacks
To Customers:• Better privacy guarantees• Customer-controlled
information• Monetization of privacy• Loyalty card
dematerialization• Enhanced shopping
experience• Better protection of loyalty
information
![Page 8: Annual Workshop February 5th, 2014](https://reader031.vdocuments.us/reader031/viewer/2022020308/56815b64550346895dc95223/html5/thumbnails/8.jpg)
8
Architecture
Credential mgt
Loyalty points mgt
CUSTOMER RETAILER
DB DB
Credential Issuance and Verification
Loyalty points and Vouchers issuance
and verificationinShopnito appInShopnito server
Profile mgt
Secure StorageVoucher mgt
Recommendation system
PriMan
![Page 9: Annual Workshop February 5th, 2014](https://reader031.vdocuments.us/reader031/viewer/2022020308/56815b64550346895dc95223/html5/thumbnails/9.jpg)
Privacy PreservingRecommendations
UGent - WiCa
Kris Vanhecke, Toon De Pessemier and Luc MartensUgent-WiCa
![Page 10: Annual Workshop February 5th, 2014](https://reader031.vdocuments.us/reader031/viewer/2022020308/56815b64550346895dc95223/html5/thumbnails/10.jpg)
10
Privacy Preserving Recommendations
• Recommender systems overview
– Right suggestion at the right time to the right person to improve the user experience, to boost sales,...
– Learn customer preferences by collecting and linking
• Customer behavior data (shopping basket contents)
• Product metadata (category, ingredients)
• Customer metadata (age, gender, family situation)
• Contextual information (seasonal)
– Computationally demanding, typically performed on a powerful backend with permanent access to all user data
![Page 11: Annual Workshop February 5th, 2014](https://reader031.vdocuments.us/reader031/viewer/2022020308/56815b64550346895dc95223/html5/thumbnails/11.jpg)
11
Privacy Preserving Recommendations
• Recommender challenges in MobCom
– Useful suggestions in transparent, privacy-friendly way
– Shopping sessions are unlinkable
• Full shopping history is only available on the mobile device
• Always a cold start problem, some algorithms are not suitable
• Recommendations based on the current shopping basket contents
– Learn customer preferences on mobile device
• Shopping history across multiple retailers
• Limited computational power, battery
• Optionally disclose preferences to retailer at the start of the shopping session to kickstart recommender system
![Page 12: Annual Workshop February 5th, 2014](https://reader031.vdocuments.us/reader031/viewer/2022020308/56815b64550346895dc95223/html5/thumbnails/12.jpg)
12
Privacy Preserving Recommendations
• Implementation details
– Basic use cases:
• Products you may like based on your basket and/or preferences
• Products similar to the product you just scanned
– Higher value use cases not limited to products:
• Vouchers or coupons for products that may interest you
• Draw attention to current promotions for products you may like
• Suggest recipes and the products required to prepare them
– Insight: customer can see and modify their preferences
– Promise better recommendations if the customerdiscloses their preferences
![Page 13: Annual Workshop February 5th, 2014](https://reader031.vdocuments.us/reader031/viewer/2022020308/56815b64550346895dc95223/html5/thumbnails/13.jpg)
Secure Storage Module
MSEC
13
Faysal Boukayoua – KU Leuven
![Page 14: Annual Workshop February 5th, 2014](https://reader031.vdocuments.us/reader031/viewer/2022020308/56815b64550346895dc95223/html5/thumbnails/14.jpg)
14
Motivation: threats
Theft Malware
![Page 15: Annual Workshop February 5th, 2014](https://reader031.vdocuments.us/reader031/viewer/2022020308/56815b64550346895dc95223/html5/thumbnails/15.jpg)
15
Motivation: Android shortcomings
• Filesystem encryption: not by default
• No application-level secure storage
• Heterogeneity across:– API access: libraries,
middleware, Android versions– secure storage mediums:
• software-based• device-backed• tamperproof hardware
![Page 16: Annual Workshop February 5th, 2014](https://reader031.vdocuments.us/reader031/viewer/2022020308/56815b64550346895dc95223/html5/thumbnails/16.jpg)
16
Implementation
• App-level access to sensitive data
• Pluralism of secure storage technologies
• API uniformity– Android KeyChain– Tamperproof module
• User authentication
![Page 17: Annual Workshop February 5th, 2014](https://reader031.vdocuments.us/reader031/viewer/2022020308/56815b64550346895dc95223/html5/thumbnails/17.jpg)
17
Discussion: alternatives
• Less complex setup• Application support required• Typically in-house corporate app
• Centralised policy administration• No changes to client apps• Suitable for 3rd party apps
App 1 App 2 Dedicated app
Client app 1
Client app 2
![Page 18: Annual Workshop February 5th, 2014](https://reader031.vdocuments.us/reader031/viewer/2022020308/56815b64550346895dc95223/html5/thumbnails/18.jpg)
Privacy-friendly loyalty scheme
SecAnon-DistriNet
Milica Milutinovic – KU Leuven
![Page 19: Annual Workshop February 5th, 2014](https://reader031.vdocuments.us/reader031/viewer/2022020308/56815b64550346895dc95223/html5/thumbnails/19.jpg)
19
inShopnito loyalty points
• Held by the user
• Signed structure
– Link with credential
– Value
– Expiration information
• Unlinkable gathering and spending
- Commitment- Value- Expiration
![Page 20: Annual Workshop February 5th, 2014](https://reader031.vdocuments.us/reader031/viewer/2022020308/56815b64550346895dc95223/html5/thumbnails/20.jpg)
20
Obtaining points
- Commitment- Value- Expiration
![Page 21: Annual Workshop February 5th, 2014](https://reader031.vdocuments.us/reader031/viewer/2022020308/56815b64550346895dc95223/html5/thumbnails/21.jpg)
21
- Commitment- Value- Expiration
Obtaining points
![Page 22: Annual Workshop February 5th, 2014](https://reader031.vdocuments.us/reader031/viewer/2022020308/56815b64550346895dc95223/html5/thumbnails/22.jpg)
22
Obtaining points: Underlying Operations
![Page 23: Annual Workshop February 5th, 2014](https://reader031.vdocuments.us/reader031/viewer/2022020308/56815b64550346895dc95223/html5/thumbnails/23.jpg)
23
- Commitment- Value- Expiration
Redeeming points
Proof
![Page 24: Annual Workshop February 5th, 2014](https://reader031.vdocuments.us/reader031/viewer/2022020308/56815b64550346895dc95223/html5/thumbnails/24.jpg)
24
Benefits
• Chosen level of anonymity
• Privacy-friendly points use
• Assurance for the provider
– Linked with the user
– No double spending
– Controlled sharing
![Page 25: Annual Workshop February 5th, 2014](https://reader031.vdocuments.us/reader031/viewer/2022020308/56815b64550346895dc95223/html5/thumbnails/25.jpg)
Anonymous eVouchers
ESAT-COSIC
Stefaan Seys – KU Leuven COSIC
![Page 26: Annual Workshop February 5th, 2014](https://reader031.vdocuments.us/reader031/viewer/2022020308/56815b64550346895dc95223/html5/thumbnails/26.jpg)
User 1User 2Retailer
Issuer1
2
3
4
eVoucher life cycle
X
![Page 27: Annual Workshop February 5th, 2014](https://reader031.vdocuments.us/reader031/viewer/2022020308/56815b64550346895dc95223/html5/thumbnails/27.jpg)
Specific Voucher Threats
• Changing monetary value• Duplicating or cloning• Counterfeiting (fake vouchers)• Double-spending• Privacy leaks
![Page 28: Annual Workshop February 5th, 2014](https://reader031.vdocuments.us/reader031/viewer/2022020308/56815b64550346895dc95223/html5/thumbnails/28.jpg)
Initialisation
• Issuer has 2 keys, for:– Secure communications with the
SE– Signing vouchers
• User’s SE has:– Issuer cert for communications– Secret key and cert. to proof
• That the issuer is talking to an SE• The identity of the user
Issuer
UserRetailer
![Page 29: Annual Workshop February 5th, 2014](https://reader031.vdocuments.us/reader031/viewer/2022020308/56815b64550346895dc95223/html5/thumbnails/29.jpg)
Voucher Issuing
Verify ID userand presence of SE
Generate and Sign Vouchers
Issuer
User
Vouchers
Verify vouchers
TCP
Serial Nr Expiration date
Value Status RSA signature (128 bytes)Voucher:
Establish secure tunnel to the SE
![Page 30: Annual Workshop February 5th, 2014](https://reader031.vdocuments.us/reader031/viewer/2022020308/56815b64550346895dc95223/html5/thumbnails/30.jpg)
User-to-user payment
User selects vouchers Mark them as “dirty”
Mark as “spent”(delete them)
User
NFC
User
vouchers
Establish secure tunnel between SEs
Verify vouchers
Send ACK
TCP
![Page 31: Annual Workshop February 5th, 2014](https://reader031.vdocuments.us/reader031/viewer/2022020308/56815b64550346895dc95223/html5/thumbnails/31.jpg)
Merchant redeems money
User selects vouchers Mark them as “dirty”
Mark as “spent”(delete them)
vouchers
Establish secure tunnel between SE and Issuer
Verify vouchers
Send ACK
TCP
IssuerRetailer
![Page 32: Annual Workshop February 5th, 2014](https://reader031.vdocuments.us/reader031/viewer/2022020308/56815b64550346895dc95223/html5/thumbnails/32.jpg)
32
Privacy
• The user is identified during issuing (the user needs to proof he is entitled to a voucher)
• The Issuer signs the voucher
• The Issuer verifies this voucher when it is redeemed by the merchant
• So why can he not link the Serial Nrs and track the user?
Serial Nr Expiration date
Value Status RSA signature (128 bytes)
![Page 33: Annual Workshop February 5th, 2014](https://reader031.vdocuments.us/reader031/viewer/2022020308/56815b64550346895dc95223/html5/thumbnails/33.jpg)
33
Privacy
• The answer: fancy crypto (partially blinded signatures)
• During the voucher issuing, the user generates and ‘hides’ or blinds the serial number and sends it to the issuer
• The issuer generates the other values and signs everything
• Finally, the user unblinds the serial number to obtain a valid voucher
Serial Nr Expiration date
Value Status RSA signature (128 bytes)
![Page 34: Annual Workshop February 5th, 2014](https://reader031.vdocuments.us/reader031/viewer/2022020308/56815b64550346895dc95223/html5/thumbnails/34.jpg)
inShopnito Demonstrator
![Page 35: Annual Workshop February 5th, 2014](https://reader031.vdocuments.us/reader031/viewer/2022020308/56815b64550346895dc95223/html5/thumbnails/35.jpg)
35
Starting a Shopping Session
inShopnito serverinShopnito app
Server auth.
Shopping profile
DB
User auth. + revealed data
1
2
3
3Customized offers, info.4
DB
Customer Retailer
![Page 36: Annual Workshop February 5th, 2014](https://reader031.vdocuments.us/reader031/viewer/2022020308/56815b64550346895dc95223/html5/thumbnails/36.jpg)
36
Shopping with inShopnito
inShopnito serverinShopnito app
Update profile
Shopping profile
DB
3
3
3New customized offers, info.4
DB
Customer Retailer
Context info.1
Scan items2
![Page 37: Annual Workshop February 5th, 2014](https://reader031.vdocuments.us/reader031/viewer/2022020308/56815b64550346895dc95223/html5/thumbnails/37.jpg)
37
Checking Out
inShopnito serverinShopnito app
Shopping profile
DB
3
DB
Customer Retailer
1
(Anonymous) payment +Loyalty Points + Vouchers2
Compute amount due
Issue loyalty points3
4 Update DB
5 Delete shopping profile
![Page 38: Annual Workshop February 5th, 2014](https://reader031.vdocuments.us/reader031/viewer/2022020308/56815b64550346895dc95223/html5/thumbnails/38.jpg)
Questions?
38