06.11.2014 Views

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

2.5 Case Studies<br />

issued the application). The bank can opt <strong>for</strong> certain user credentials (e.g. PIN, password,<br />

or biometric) that the bank's application on the UCTD can ask the user to authenticate<br />

herself. There<strong>for</strong>e, authentication details do not need to be communicated over the internet.<br />

The UCTD then provides dynamic authentication and if required can provide a transaction<br />

certicate to the merchant as is done in POS transactions [9], eectively avoiding poor<br />

technical-security and security-usability along with privacy issues discussed in [76][78].<br />

2.5.4 Online Gaming<br />

In April 2011, the security breach of the Sony PlayStation Network and Qriocity services<br />

that revealed private in<strong>for</strong>mation regarding an estimated 70 million users [79] was in the<br />

news. This breach has shown that big networks that store user's private data are the<br />

prime targets <strong>for</strong> malicious users. In this section, we are not going to provide a solution to<br />

the problems faced by Sony in this security breach but look at how a UCTD can reduce<br />

the clustering of large data at one point (i.e. on SP's servers) which provides a potential<br />

motivation <strong>for</strong> attack (i.e. economics of attack 2 ) [80].<br />

There<strong>for</strong>e, <strong>for</strong> this case study, we consider a Company A that oers an online gaming<br />

plat<strong>for</strong>m, and games store to its customers. The objectives of Company A are: (1) to<br />

ensure that customers can be uniquely identied and their credentials can be validated,<br />

(2) to ensure customers get the services <strong>for</strong> which they are authorised, and nally (3) to<br />

ensure that customers can make purchases while being logged onto the games store or<br />

online-gaming plat<strong>for</strong>m.<br />

Company A oers an application that a user can download onto her UCTD. The download<br />

application is personalised to the user. It has the user's name, email address, and<br />

postal address (if necessary). The user identity at Company A's server is identied by a<br />

unique user identity (i.e. it is a pseudo-identity that does not have any obvious link to<br />

the user). The user has her password stored on her UCTD rather than on Company A's<br />

server; there<strong>for</strong>e, when the user tries to access Company A's resources, she provides her<br />

password to the UCTD. We do not delve into the details of how the user identication and<br />

authentication will be carried out using a UCTD in our case study, but similar mechanisms<br />

are already in operation, <strong>for</strong> example the EMV Dynamic Data Authentication (DDA) or<br />

Combined DDA (CDA) mechanisms [9] (i.e. card transactions at a POS). This will allow<br />

Company A to identify and authenticate their customer. In addition, the service privileges<br />

associated with the user are also stored in the application. There<strong>for</strong>e, Company A does<br />

not have to store any of these details at a centralised location as they are already stored<br />

on a tamper-resistant device as part of the Company A's application.<br />

2 Cost-benet comparison of a potential attacks and outcome from it is referred as economics of attack.<br />

49

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!