06.11.2014 Views

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

2.6 Summary<br />

Furthermore, to per<strong>for</strong>m online monetary transactions the user does not have to register her<br />

credit card with Company A which would then have to invest a huge amount to safeguard<br />

its security. In our case study, the user also has a banking application (issued by her bank)<br />

installed on the UCTD. When a user makes a purchase online, the UCTD application of<br />

Company A will communicate the purchase request to the banking application that will<br />

then process the transaction (e.g. 3D-Secure [75] but it asks the user to enter her password,<br />

not at the bank's website, but to the UCTD application). This removes any need to register<br />

the card on Company A's website.<br />

In this case study, we have decentralised the data storage that is related to the user's<br />

identication and online payment (i.e. credit card details). It is comparatively easy to<br />

embed a (small) secure application and get it certied by an independent third party<br />

rather than having to implement and secure a large database of user's credit card details.<br />

We do not suggest that in our proposed case study all attacks are eliminated. Adversaries<br />

can per<strong>for</strong>m attacks, but the nancial rewards of such attacks are limited and in comparison<br />

less attractive than the invasion of a centralised database (in the breach of Sony's Servers<br />

in April 2011, data related to approximately 70 million users was compromised).<br />

2.6 Summary<br />

In this chapter, we discussed the motivation behind the <strong>User</strong> <strong>Centric</strong> <strong>Tamper</strong>-<strong>Resistant</strong><br />

Device (UCTD). The motivation came from three distinct but continuously converging<br />

technologies: smart cards, hand-held devices, and general purpose computing plat<strong>for</strong>ms.<br />

We briey discussed dierent architectures <strong>for</strong> tamper-resistant devices that can be considered<br />

as possible candidates <strong>for</strong> the UCTD architecture. We then compared these architectures<br />

with the smart card technology in dierent stated aspects of the UCTD. Finally,<br />

we discussed the UCTD and its requirements that compel modication to certain aspects<br />

of smart card technology. We briey introduced the concept of multi-application smart<br />

cards, its related management models, and its issues. This was followed by a description of<br />

selected case studies that utilise UCTDs to provide security and privacy services to existing<br />

frameworks.<br />

50

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!