approaches for ensuring security and privacy in unplanned ubiquitous computing environments v....

17
Approaches for Ensuring Security and Privacy in Unplanned Ubiquitous Computing Environments V. Ramakrishna, Kevin Eustice, Matthew Schnaider Laboratory for Advanced Systems Research Computer Science Department, UCLA

Upload: johnathan-york

Post on 18-Jan-2016

215 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Approaches for Ensuring Security and Privacy in Unplanned Ubiquitous Computing Environments V. Ramakrishna, Kevin Eustice, Matthew Schnaider Laboratory

Approaches for Ensuring Security and Privacy in Unplanned Ubiquitous

Computing Environments

V. Ramakrishna, Kevin Eustice, Matthew Schnaider

Laboratory for Advanced Systems ResearchComputer Science Department, UCLA

Page 2: Approaches for Ensuring Security and Privacy in Unplanned Ubiquitous Computing Environments V. Ramakrishna, Kevin Eustice, Matthew Schnaider Laboratory

In a Nutshell

Ubiquitous computing poses new security and privacy challenges,

… and exacerbates existing ones Usability goals necessitate security and

privacy tradeoffs Threat mitigation is a more realistic goal than

threat elimination 3-layer classification of the solution space

helps in better analysis and understanding

Page 3: Approaches for Ensuring Security and Privacy in Unplanned Ubiquitous Computing Environments V. Ramakrishna, Kevin Eustice, Matthew Schnaider Laboratory

Ubiquitous Computing

Internet

Home Network

Coffee ShopPHYSICAL INTEGRATION

SPONTANEOUS INTEROPERATION

No Milk !

Characteristics

Decentralized controlHeterogeneityAd hoc interactionsOpen environmentsCommunication with strangers

Personal Network

Location (GPS)

Video

Change route!

My location?

Page 4: Approaches for Ensuring Security and Privacy in Unplanned Ubiquitous Computing Environments V. Ramakrishna, Kevin Eustice, Matthew Schnaider Laboratory

Trading off Security and Privacy with Usability Usability for naïve users

• Ease of handling and interfacing with devices• Minimal required interaction• Primary goal of ubicomp

Characteristics of ubiquitous computing environments forces three-way tradeoff

Examination of tradeoffs enable better understanding of system security limits

We need to seriously think about security before it is too late … again

Page 5: Approaches for Ensuring Security and Privacy in Unplanned Ubiquitous Computing Environments V. Ramakrishna, Kevin Eustice, Matthew Schnaider Laboratory

Security and Privacy Challenges

GPS

N/W Infrastructure

N/W Infrastructure

Coffee Shop

Home Network

Small devices areprime targets for

theft.

Who is my serviceprovider?

Is he authentic?

More devices becomevectors for

spread of malware.

Mobile code posessignificant threats.

Privacy concerns:Eavesdropping on

Conversations;Location inference.

Install Plug-in

Page 6: Approaches for Ensuring Security and Privacy in Unplanned Ubiquitous Computing Environments V. Ramakrishna, Kevin Eustice, Matthew Schnaider Laboratory

Mitigating Failure

Problem areas• Theft of devices and content

• Applications releasing more data than necessary

Applicable paradigms• Least privilege

• Abdication of privilege

• Segregation of functionality

• Multiple fidelity levels for contextual info

Page 7: Approaches for Ensuring Security and Privacy in Unplanned Ubiquitous Computing Environments V. Ramakrishna, Kevin Eustice, Matthew Schnaider Laboratory

Establishing Identity

Leverage physical presence Enrollment: secure sideband interaction

• E.g., USB drives and PKI

• Physical contact creates logical connection

• Reduces dangers of anonymity

Sensory mechanisms for authentication• Infrared, RFID tags

• Embedded cameras, barcodes

• Audio cues

Page 8: Approaches for Ensuring Security and Privacy in Unplanned Ubiquitous Computing Environments V. Ramakrishna, Kevin Eustice, Matthew Schnaider Laboratory

Protecting Devices: A 3-Layered View

DEVICE / NETWORK

RESOURCES DATA

CONTROLLING / OWNINGENTITY

Resource and ContentProtection Mechanisms

Secure Interaction Protocols

Trust Frameworks and Mechanisms

DEVICE / NETWORK

RESOURCES DATA

CONTROLLING / OWNINGENTITY

Resource and ContentProtection Mechanisms

Page 9: Approaches for Ensuring Security and Privacy in Unplanned Ubiquitous Computing Environments V. Ramakrishna, Kevin Eustice, Matthew Schnaider Laboratory

Benefits of this Classification

Analyze vulnerable ubicomp interactions in a top-down manner

Demarcates scope of each solution

Complementary, yet interdependent systems of defenseResource and Content

Protection Mechanisms

Secure InteractionProtocols

Trust Frameworksand Mechanisms

DEVICE / NETWORK

RESOURCES

DATA

CONTROLLINGENTITY

Page 10: Approaches for Ensuring Security and Privacy in Unplanned Ubiquitous Computing Environments V. Ramakrishna, Kevin Eustice, Matthew Schnaider Laboratory

Resource / Content Protection

Examples• Access control lists

and capabilities

• Secure file systems

• Zero-interaction authentication

• Firewalls

• Proof-carrying codeResource and ContentProtection Mechanisms

Secure InteractionProtocols

Trust Frameworksand Mechanisms

DEVICE / NETWORK

RESOURCES

DATA

CONTROLLINGENTITY

Page 11: Approaches for Ensuring Security and Privacy in Unplanned Ubiquitous Computing Environments V. Ramakrishna, Kevin Eustice, Matthew Schnaider Laboratory

Secure Resource Discovery and Access

Enforcing security policies through communication protocols

Examples• Protecting networks from

vulnerable nomads

• Automated negotiation among peersResource and Content

Protection Mechanisms

Secure InteractionProtocols

Trust Frameworksand Mechanisms

DEVICE / NETWORK

RESOURCES

DATA

CONTROLLINGENTITY

Page 12: Approaches for Ensuring Security and Privacy in Unplanned Ubiquitous Computing Environments V. Ramakrishna, Kevin Eustice, Matthew Schnaider Laboratory

Safeguarding Nomadic Behavior

Network firewalls are inadequate

Some solutions• Quarantine, Examination

and Decontamination

• Cisco Network Admission Control

These solutions only scratch the surface

Open issues:• Running foreign code

• Verifying veracity of returned results

• Leveraging trusted hardware

MOBILITY:Vulnerable Devices

+

OPEN NETWORKS:Offering Ubiquitous

Services

EPIDEMIC:Spread of malware

+

CONTACT withSTRANGERS

Page 13: Approaches for Ensuring Security and Privacy in Unplanned Ubiquitous Computing Environments V. Ramakrishna, Kevin Eustice, Matthew Schnaider Laboratory

Automated Peer Negotiation

Facilitate interactions among strangers Decentralized policy resolution Compromise on resource sharing Use trust model and utility model to

determine risk/benefit tradeoff of action

Page 14: Approaches for Ensuring Security and Privacy in Unplanned Ubiquitous Computing Environments V. Ramakrishna, Kevin Eustice, Matthew Schnaider Laboratory

Evaluating and Using Trust

Cross-domain frameworks: trust as a basis for interaction among entities

Possible approaches• Globally centralized?

• Certificate hierarchies

• Webs and chains of trust, delegation

• Quantitative trust models

Resource and ContentProtection Mechanisms

Secure InteractionProtocols

Trust Frameworksand Mechanisms

DEVICE / NETWORK

RESOURCES

DATA

CONTROLLINGENTITY

Page 15: Approaches for Ensuring Security and Privacy in Unplanned Ubiquitous Computing Environments V. Ramakrishna, Kevin Eustice, Matthew Schnaider Laboratory

Future Targets and Promising Approaches Problems inherent in infrastructure?

→Work around it (e.g., enrollment) Mobility increases number of threats?

→Flexible guards and enforce compliance (e.g., QED) Unplanned interactions may violate security

policy?→Automated negotiation among peers→Least privilege paradigm

Must communicate with strangers?→Leverage trust as far as possible→Develop better models for trust inference and use

Page 16: Approaches for Ensuring Security and Privacy in Unplanned Ubiquitous Computing Environments V. Ramakrishna, Kevin Eustice, Matthew Schnaider Laboratory

Conclusion

Ubicomp poses new security and privacy challenges, and exacerbates existing ones

Usability goals necessitate security and privacy tradeoffs

We should direct our efforts toward threat mitigation rather than threat elimination

A 3-layer classification of the solution space helps in better analysis and understanding

In practice, a hybrid solution will yield best results

Page 17: Approaches for Ensuring Security and Privacy in Unplanned Ubiquitous Computing Environments V. Ramakrishna, Kevin Eustice, Matthew Schnaider Laboratory

References

For more info, contact•[email protected]

Panoply project web page•http://lasr.cs.ucla.edu/panoply