skip to main content
10.1145/2666141.2668385acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
abstract

Challenges of Establishing Trust in Online Entities and Beyond

Published:03 November 2014Publication History

ABSTRACT

In today's Internet, authenticating online entities is challenging since people lack the real-world cues upon which to base their context-dependent trust decisions. For example, how can a user confirm that a Facebook invitation truly originates from the claimed sender, as anyone can trivially set up a bogus online identity with someone else's photo? Given an SSL certificate warning, how can a user validate it be- fore proceeding, as the certificate could be legitimate (e.g., the certificate is signed by a legitimate authority that the browser does not recognize) or malicious (e.g., it is signed by a compromised CA)? This talk demonstrates that providing useful evidence can empower users to make informed context-dependent trust decisions regarding previously unknown entities in the context of identity and public-key authentication. We first introduce an identity authentication logic called RelationGram that visualizes interpersonal tie strength of virtual entities using both physical and social proximities [2,4]. RelationGram enables casual users to authenticate online identities in a safe and easy manner, and build trust in previously unknown online entities. We then introduce new public-key validation proposals called Accountable Key Infrastructure (AKI) [3] and Attack Resilient Public-Key Infrastructure (ARPKI) [1] that reduce the amount of trust in any single entity to improve the resilience of the current PKI systems. AKI and ARPKI support trust agility such that entities select a security policy for their public-key certificates, and checks and balances such that entities monitor each other for misbehavior and prevent a single point of failure. When users are given pieces of evidence to which they can easily relate, they can make context-dependent authentication decisions online and build trust in online entities. As concluding remarks, we highlight some of the remaining challenges and future research directions to truly empower users to make informed trust decisions.

References

  1. D. Basin, C. Cremers, T. H.-J. Kim, A. Perrig, R. Sasse, and P. Szalachowski. ARPKI: Attack-Resilient Public-Key Infrastructure. In Proceedings of the ACM Conference on Computer and Communications Security (CCS), 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. T. H.-J. Kim, V. Gligor, J. Guajardo, J. Hong, and A. Perrig. Soulmate or Acquaintance? Visualizing Tie Strength for Trust Inference. In Proceedings of the Workshop on Usable Security (USEC), 2013.Google ScholarGoogle Scholar
  3. T. H.-J. Kim, L.-S. Huang, A. Perrig, C. Jackson, and V. Gligor. Accountable Key Infrastructure (AKI): A Proposal for a Public-Key Validation Infrastructure. In Proceedings of the International World Wide Web Conference (WWW), May 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. T. H.-J. Kim, A. Yamada, V. Gligor, J. I. Hong, and A. Perrig. RelationGram: Tie-Strength Visualization for User-Controlled Online Identity Authentication. In Proceedings of the Financial Cryptography and Data Security, 2013.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Challenges of Establishing Trust in Online Entities and Beyond

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        TrustED '14: Proceedings of the 4th International Workshop on Trustworthy Embedded Devices
        November 2014
        68 pages
        ISBN:9781450331494
        DOI:10.1145/2666141

        Copyright © 2014 Owner/Author

        Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 3 November 2014

        Check for updates

        Qualifiers

        • abstract

        Acceptance Rates

        TrustED '14 Paper Acceptance Rate5of12submissions,42%Overall Acceptance Rate24of49submissions,49%

        Upcoming Conference

        CCS '24
        ACM SIGSAC Conference on Computer and Communications Security
        October 14 - 18, 2024
        Salt Lake City , UT , USA

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader