06.11.2014 Views

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

9.2 Backup and Migration Framework<br />

change her password or passphrase. The simplest way to generate the package-sealing<br />

key is to base it on the user's input. The size of the key and password length is based<br />

on the backup server choice; however, we consider that an adequate selection should<br />

be made by the backup server to provide a secure service.<br />

At the time of restoration, the user will provide the backup & restoration manager of the<br />

new smart card with the credentials <strong>for</strong> the backup server. The backup & restoration<br />

manager and backup server will establish a secure relationship using the proposed STCPs.<br />

Subsequently, the backup & restoration manager will download the authorisation tokens<br />

from the backup server. These authorisation tokens are sealed by an encryption key based<br />

on the user's input. The backup & restoration manager will request the user <strong>for</strong> the<br />

relevant input and decrypt the backup package. After decryption of the package, the<br />

backup & restoration manager will retrieve one authorisation token at a time and use its<br />

public section to connect with the SP. To establish a secure channel and authenticate the<br />

user to the given SP, we modify the STCP SP (discussed in section 6.3). In the fourth<br />

message of the STCP SP , we replace the U Cre with the authorisation token issued by the<br />

SP.<br />

Be<strong>for</strong>e an SP issues a new lease to the user, it terminates the existing lease. This means<br />

that although the lost smart card is still usable, a user cannot utilise the downloaded<br />

application to access sanctioned services because of the Personal Identication Number<br />

(PIN) verication (if implemented) and the SP's back oce systems. If an application<br />

requires PIN verication be<strong>for</strong>e it executes, the usual protection mechanism that disables<br />

a smart card (or application) if the user enters the wrong PIN multiple times will suce.<br />

Furthermore, the SP can simply blacklist the application, eectively prohibiting it from<br />

accessing the sanctioned services. If the application tries to access these services, the SP<br />

can instruct the application to block itself and if possible delete all data related to the<br />

particular lease and user. One point to note is that in the UCOM, an SP can only block<br />

its application, not the whole of the smart card. Nevertheless, an adversary can still use<br />

an application only if it does not require a PIN verication and connection with its SP<br />

when it executes.<br />

9.2.2 Migration Mechanism<br />

In the previous section, we discussed the structure of an authorisation token and framework<br />

<strong>for</strong> backup to a remote server (e.g. backup server). In this section, we use the same<br />

authorisation tokens but this time <strong>for</strong> migrating contents from one smart card to another.<br />

Similar to the key migration in the TPM specication [18], two smart cards establish a<br />

secure connection with each other and then transfer authorisation tokens. When a user<br />

215

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!