06.11.2014 Views

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

2.4 The <strong>User</strong> <strong>Centric</strong> <strong>Tamper</strong>-<strong>Resistant</strong> Device<br />

recently a substantial number of trials [41] have been made of the ownership model that<br />

includes a certication authority (similar to the model proposed by Deville et al. above),<br />

which is in fact an extension of the ICOM. The certication authority in these trials is<br />

termed the TSM (section 2.2.1). The second proposed model (i.e. open card) was always<br />

considered highly insecure, unreliable, problematic, and not feasible from a commercial<br />

standpoint [11, 14, 45, 46, 70]. Nevertheless, the open card proposal was the rst concrete<br />

eort to introduce user centricity in the smart card industry, later on which we based the<br />

UCOM architecture.<br />

2.4.2 <strong>User</strong> <strong>Centric</strong>ity in the Smart Card Industry<br />

In this section, we discuss the open card and virtual smart card initiative that (to some<br />

extent) gave control of the smart card to its user.<br />

2.4.2.1 Open Card Initiative<br />

It is dicult to give an exact denition of open cards. In general, however, the term<br />

open card is used to refer to blank smart cards that a user can purchase from a supplier.<br />

After purchasing the smart card, the user can per<strong>for</strong>m the role previously per<strong>for</strong>med by<br />

the card issuer and either accept or buy applications from dierent application providers.<br />

These applications can be installed onto the user's card and used to access any associated<br />

services. The whole card is under the user's control similar to the card issuer in the ICOM.<br />

There<strong>for</strong>e, we can say that the open card initiative is an ICOM framework with the user<br />

replacing the card issuer.<br />

Traditional smart card frameworks like Java Card, Multos, and GlobalPlat<strong>for</strong>m were considered<br />

suitable <strong>for</strong> such a usage scenario. Most of these frameworks were built to support<br />

the ICOM, and by making the user an issuer, they did not require any substantial changes.<br />

However, as implied by Pierre Girard [46], such a mechanism would require an application<br />

provider to issue their application to users to install on their smart card. This would require<br />

the application provider to trust user not to reverse engineer or corrupt the application.<br />

Such a scenario does not ensure the security, protection of intellectual property, and reliability<br />

of an application, as an application provider does not have any control on the<br />

destination smart card that hosts its application. The main reason <strong>for</strong> this lack of control<br />

on the part of the application provider was the unavailability of any guarantees regarding<br />

the security and operational behaviour of the smart cards. Similar security issues are raised<br />

by Chaumette and Sauveron in [70] and they make the open card initiative in its current<br />

<strong>for</strong>m unsuitable <strong>for</strong> the user centric framework.<br />

45

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!