06.11.2014 Views

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Abstract<br />

In this thesis we propose a design <strong>for</strong> a ubiquitous and interoperable device based on the<br />

smart card architecture to meet the challenges of privacy, trust, and security <strong>for</strong> traditional<br />

and emerging technologies like personal computers, smart phones and tablets. Such a device<br />

is referred a <strong>User</strong> <strong>Centric</strong> <strong>Tamper</strong>-<strong>Resistant</strong> Device (UCTD). To support the smart<br />

card architecture <strong>for</strong> the UCTD initiative, we propose the delegation of smart card ownership<br />

from a centralised authority (i.e. the card issuer) to users. This delegation mandated<br />

a review of existing smart card mechanisms and their proposals <strong>for</strong> modications/improvements<br />

to their operation.<br />

Since the inception of smart card technology, the dominant ownership model in the smart<br />

card industry has been refer to as the Issuer <strong>Centric</strong> Smart Card Ownership <strong>Model</strong> (ICOM).<br />

The ICOM has no doubt played a pivotal role in the proliferation of the technology into<br />

various segments of modern life. However, it has been a barrier to the convergence of<br />

dierent services on a smart card. In addition, it might be considered as a hurdle to the<br />

adaption of smart card technology into a general-purpose security device.<br />

To avoid these issues, we propose citizen ownership of smart cards, referred as the <strong>User</strong><br />

<strong>Centric</strong> Smart Card Ownership <strong>Model</strong> (UCOM). Contrary to the ICOM, it gives the power<br />

of decision to install or delete an application on a smart card to its user. The ownership of<br />

corresponding applications remains with their respective application providers along with<br />

the choice to lease their application to a card or not. In addition, based on the UCOM<br />

framework, we also proposed the Coopetitive Architecture <strong>for</strong> Smart Cards (CASC) that<br />

merges the centralised control of card issuers with the provision of application choice to<br />

the card user.<br />

In the core of the thesis, we analyse the suitability of the existing smart card architectures<br />

<strong>for</strong> the UCOM. This leads to the proposal of three major contributions spanning the smart<br />

card architecture, the application management framework, and the execution environment.<br />

Furthermore, we propose protocols <strong>for</strong> the application installation mechanism and the<br />

application sharing mechanism (i.e. smart card rewall). In addition to this, we propose<br />

a framework <strong>for</strong> backing-up, migrating, and restoring the smart card contents.<br />

Finally, we provide the test implementation results of the proposed protocols along with<br />

their per<strong>for</strong>mance measures. The protocols are then compared in terms of features and<br />

per<strong>for</strong>mance with existing smart cards and internet protocols. In order to provide a more<br />

detailed analysis of proposed protocols and <strong>for</strong> the sake of completeness, we per<strong>for</strong>med<br />

mechanical <strong>for</strong>mal analysis using the CasperFDR.<br />

7

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!