06.11.2014 Views

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

7.3 UCTD Firewall<br />

7.3.6 Cross-Device Application Sharing<br />

In the Cross-Device Application Sharing (CDAS) architecture, a smart card acts like a<br />

node that is registered with a centralised system. The centralised system in our proposal<br />

is software running on a computer, mobile phone, or tablet, which is referred as Card<br />

Application Management Software (CAMS) [32]. For a simplistic illustration, gure 7.5<br />

shows two possibilities <strong>for</strong> the CDAS network.<br />

In gure 7.5a, a mobile phone has three UCTDs and all of them are connected to a CAMS<br />

hosted on the mobile phone. The CAMS can be hosted on an insecure plat<strong>for</strong>m and<br />

it provides discoverability and interconnectivity to an individual UCTD connected to the<br />

CAMS. By discoverability, we mean that a plat<strong>for</strong>m registers itself with the CAMS and thus<br />

it becomes discoverable to all other plat<strong>for</strong>ms in the network. The interconnectivity deals<br />

with the communication channel established between two (or more) UCTDs. There<strong>for</strong>e,<br />

gure 7.5a depicts a scenario in which multiple UCTDs are connected to a mobile phone,<br />

and their interconnectivity and discoverability is handled by the CAMS installed on it.<br />

Computer<br />

CAMS<br />

UCTDs<br />

Cell Phone<br />

CAMS<br />

Cell Phone<br />

Tablet<br />

(a) Cell Phone with Multiple UCTDs<br />

(b) UCTDs attached to different Plat<strong>for</strong>ms<br />

Figure 7.5: Cross-Device Application Sharing network<br />

On the other hand, gure 7.5b shows a situation in which dierent computing devices<br />

(e.g. computers, mobile phones, and tablets) are connected with each other through their<br />

CAMS. Each individual device may have multiple UCTDs that are registered to their<br />

respective CAMS. Although gure 7.5b depicts the situation as if there is a single centralised<br />

CAMS, this is incorrect, as each host device has its own CAMS and there are no<br />

centralised CAMS. There<strong>for</strong>e, if a particular device is not available, other devices can still<br />

communicate with each other. In this scenario, a host device will discover and register<br />

other computing devices. There are two possible situations. In the rst, each individual<br />

host device advertises the connected smart cards to the entire network. In second case,<br />

each host device only provides the details of its CAMS and not the smart cards registered<br />

with it. For our proposed CDAM, we prefer the second arrangement as it provides better<br />

privacy <strong>for</strong> individual smart cards.<br />

169

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!