06.11.2014 Views

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

9.2 Backup and Migration Framework<br />

9.3. Finally, we conclude the chapter with a discussion on the decommissioning process in<br />

section 9.4.<br />

9.2 Backup and Migration Framework<br />

In this section, we describe two mechanisms: backup and migration. In the contents backup<br />

process, a user archives her smart card's contents to a backup server and then restores it<br />

to the destination smart card. In the migration process, there is no backup server and the<br />

smart card contents are transferred between a source and a destination smart card.<br />

9.2.1 Backup Mechanism<br />

In this proposal, instead of backing up the applications (i.e. data and source code) as we<br />

traditionally do in desktop computing environments. We only backup the authorisation<br />

tokens issued by SPs. The backup package that consists of authorisation tokens should be<br />

stored at a secure location, preferably accessible ubiquitously on demand. When a user<br />

wants to restore the contents of her old smart card, she has to import the backup package;<br />

then the individual applications will be requested from their respective SPs automatically<br />

by the smart card using the authorisation tokens.<br />

In our proposal, a secure o-site backup facility is provided by a secure third party referred<br />

to as a backup server. We do not consider that a backup server has to be an SP and the<br />

only requirement is that users trust the backup server. A backup framework overview is<br />

illustrated in the gure 9.1 and described below.<br />

Service Provider<br />

(SP)<br />

2) Request Application Download Token<br />

Verify the Request and<br />

Generate the Token<br />

3) Response Application Download Token<br />

SP’s App<br />

Smart Card<br />

Backup & Restoration Manager<br />

3b) Response Token<br />

1) Request Registration<br />

1a) BRM Registration<br />

4) Backup Package<br />

Secure Backup<br />

Server (SBS)<br />

Figure 9.1: Overview of the credential backup mechanism<br />

1. A smart card user registers herself to a backup server using the Secure and Trusted<br />

Channel Protocols (STCPs) proposed in chapter 6. After the registration, the backup<br />

& restoration manager (gure 4.1) has the user's credentials and details of how to<br />

connect with the respective backup server. The backup & restoration manager and<br />

backup server will generate a shared secret that they will use in future sessions.<br />

213

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!