06.11.2014 Views

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

3.4 <strong>User</strong> <strong>Centric</strong> Smart Card Ownership <strong>Model</strong> (UCOM)<br />

3.4.1 Supplier<br />

A supplier is an organisation that sells UCSCs. A smart card manufacturer, an SP, or a<br />

third party vendor can be the supplier. The suppliers ensure that the UCSCs supplied<br />

to a user have a reliable and secure plat<strong>for</strong>m that supports the UCOM and fulls the<br />

requirements of a UCSC, as stipulated in section 3.5.3.<br />

3.4.2 Cardholder<br />

A cardholder is not just a user of the UCSC, but she is also the owner of the card.<br />

Cardholders would have the ability to install and delete any application they require. A<br />

cardholder would also be a registered customer of the respective SPs. The cardholder could<br />

install an application on the UCSC after being authorised by the corresponding SP. After<br />

installation, the cardholder could use the application to access associated services.<br />

From a UCOM's perspective, cardholders do not have to be technically literate (about the<br />

underlying architecture of the plat<strong>for</strong>m) and do not have to be trusted users. In subsequent<br />

chapters, it will be shown that we adopt the default assumption that the cardholder may<br />

be malicious.<br />

3.4.3 <strong>User</strong> <strong>Centric</strong> Smart Card (UCSC)<br />

The UCSC is the cornerstone of the UCOM proposal. It provides a seamless framework<br />

<strong>for</strong> application installation, management, and deletion to the cardholder. The ownership<br />

management and delegation (i.e. the transfer of ownership between dierent users) is also<br />

provided by the UCSC while preserving the integrity and security of the plat<strong>for</strong>m, and the<br />

privacy of the cardholder. Furthermore, the UCSC manages secure communication with<br />

the respective SP to request the lease of the application. An SP does not have to trust the<br />

cardholder, but they need to trust the smart cards. The UCSC supports mechanisms that<br />

can provide dynamic and ubiquitous security assurance and validation to the requesting<br />

entity. It ensures that during the lifetime of the smart card, the entire plat<strong>for</strong>m along with<br />

the installed applications will be secure and reliable.<br />

Hence<strong>for</strong>th, we will be using the term UCSC and smart card interchangeably, unless otherwise<br />

specied.<br />

67

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!