06.11.2014 Views

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

4.1 Introduction<br />

4.1 Introduction<br />

The ecosystem of the UCOM is centred around smart cards that have to implement adequate<br />

security and operational functionality to support a) en<strong>for</strong>cement of security policies<br />

stipulated by the card plat<strong>for</strong>m and individual SPs <strong>for</strong> their respective applications, and<br />

b) operational functionality that enables an SP to manage its application(s), and a cardholder<br />

to manage her ownership privileges. The smart card architecture has to represent<br />

this change in ownership architecture. For this purpose, we require a trusted module as<br />

part of the smart card architecture. The module would validate the current state of the<br />

plat<strong>for</strong>m to requesting entities in order to establish the trustworthiness of a smart card in<br />

the UCOM architecture.<br />

In the UCOM, the card manufacturers make sure that smart cards have adequate security<br />

and operational functionality to support user ownership. In addition, the cardholder<br />

manages her relationship with individual SPs. These relationships enable her to request<br />

installation of their applications. Be<strong>for</strong>e leasing an application, SPs will require an assurance<br />

of the smart card's security and reliability. This assurance will be achieved through<br />

a third party security evaluation of the smart cards be<strong>for</strong>e they are issued to individual<br />

users. Furthermore, to provide a dynamic security validation, the evaluated smart cards<br />

implement an attestation mechanism. The attestation mechanism should accommodate<br />

remote validation, as in the UCOM an SP will not always have physical access to the<br />

smart card. In addition, the attestation mechanism will certify that the current state of<br />

the smart card is as evaluated by the independent third party. There<strong>for</strong>e, the trust architecture<br />

in the UCOM is based on the adequacy of the third party evaluation, and the<br />

security and reliability of the remote attestation mechanism.<br />

Structure of the Chapter: Section 4.2, discusses the UCTD architecture and its major<br />

components. To provide security and reliability assurance to remote entities we dene the<br />

role of the Trusted Environment & Execution Manager (TEM) in section 4.3. Subsequently,<br />

we extend the discussion to the security evaluation in section 4.4, followed by the remote<br />

attestation mechanism in section 4.5. In section 4.6, we discuss dierent types of UCTD<br />

ownership and how an o-card entity can acquire them. In section 4.7 we propose an<br />

attestation protocol; in section 4.8 we detail an in<strong>for</strong>mal analysis and test implementation<br />

results of the attestation protocol.<br />

4.2 Plat<strong>for</strong>m Architecture<br />

The proposed architecture <strong>for</strong> a UCTD is depicted in gure 4.1 and this architecture<br />

satises the requirements of the UCOM discussed in section 3.5.3.<br />

80

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!