Skip to main content
Erschienen in: Mobile Networks and Applications 1/2009

01.02.2009

Privacy from Promises to Protection

Privacy Guaranteeing Execution Container

verfasst von: Michael Maaser, Peter Langendörfer

Erschienen in: Mobile Networks and Applications | Ausgabe 1/2009

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Privacy issues are becoming more and more important especially since the cyber and the real world are converging up to certain extent when using mobile devices. Means that really protect privacy are still missing. The problem is, as soon as a user provides data to a service provider the user looses control over her data. The simple solution is not to provide any data but then many useful services, e.g. navigation applications, cannot be used. In order to solve this problem, we propose privacy guaranteeing execution containers (PGEC). Basically the concept is that the application obtains access to the user data in a specially protected and certified environment, the PGEC. PGECs enable applications to access private user data and guarantee that the user data is deleted as soon as the service is quit. The PGEC also restricts the communication between the application and the service provider to what is explicitly allowed by the service user. In addition to those means the PGEC also implements countermeasures against malicious attacks such as modified host systems and covert channel attacks, which might be misusing CPU load to signal data out of the PGEC. Thus, the PGEC guarantees a “one time use” of the provided private data.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Weitere Produktempfehlungen anzeigen
Fußnoten
1
We are aware that there exist multiple ways to queue a print from Java. In this example we show the simplest approach.
 
2
There might be other channels that we are not aware of. But the container can render the most prominent ones already useless, which improves its security level significantly.
 
3
We are aware that embedded keys are subject to attacks similar to the approaches to extract decryption keys from software players for HD-DVD and Blu-Ray discs [30]. To reduce the chances for extracting the keys it should be considered to embed them into (tamper proof) hardware dongles or trusted platform modules [26].
 
Literatur
1.
Zurück zum Zitat Bennicke M, Langendörfer P (2003) Towards automatic negotiation of privacy contracts for internet services. In: Proceedings of the 11th IEEE conference on networks, ICON. IEEE Society Press, Piscataway, pp 312–324 Bennicke M, Langendörfer P (2003) Towards automatic negotiation of privacy contracts for internet services. In: Proceedings of the 11th IEEE conference on networks, ICON. IEEE Society Press, Piscataway, pp 312–324
2.
Zurück zum Zitat Bruschi D, Cavallaro L, Lanzi A, Monga M (2005) Attacking a trusted computing platform—improving the security of the tcg specification. Technical report rt 05-05, Universit’a degli Studi di Milano, Milano MI, Italy Bruschi D, Cavallaro L, Lanzi A, Monga M (2005) Attacking a trusted computing platform—improving the security of the tcg specification. Technical report rt 05-05, Universit’a degli Studi di Milano, Milano MI, Italy
3.
Zurück zum Zitat Cranor LF, Dobbs B, Egelman S, Hogben G, Humphrey J, Langheinrich M, Marchiori M, Presler-Marshall M, Reagle J, Schunter M, Stampley DA, Wenning R (2006) W3c: platform for privacy preferences (p3p) project. http://www.w3.org/P3P/ Cranor LF, Dobbs B, Egelman S, Hogben G, Humphrey J, Langheinrich M, Marchiori M, Presler-Marshall M, Reagle J, Schunter M, Stampley DA, Wenning R (2006) W3c: platform for privacy preferences (p3p) project. http://​www.​w3.​org/​P3P/​
6.
Zurück zum Zitat Garcia-Molina H, Ketchpel S, Shivakumar N (1998) Safeguarding and charging for content on the internet. In: Proceedings of the international conference on data engineering ’98. International conference on data engineering, Orlando, 23–27 February 1998 Garcia-Molina H, Ketchpel S, Shivakumar N (1998) Safeguarding and charging for content on the internet. In: Proceedings of the international conference on data engineering ’98. International conference on data engineering, Orlando, 23–27 February 1998
7.
Zurück zum Zitat Gruteser M, Grunwald D (2003) Anonymous usage of location-based services through spatial and temporal cloaking. In: Proceedings of the international conference on mobile systems, applications, and services. ACM/USENIX international conference on mobile systems, applications, and services (MobiSys), San Francisco, 5–8 May 2003 Gruteser M, Grunwald D (2003) Anonymous usage of location-based services through spatial and temporal cloaking. In: Proceedings of the international conference on mobile systems, applications, and services. ACM/USENIX international conference on mobile systems, applications, and services (MobiSys), San Francisco, 5–8 May 2003
10.
Zurück zum Zitat Hohl F (1998) Time limited blackbox security: protecting mobile agents from malicious hosts. In: Mobile agents and security. Springer, London, pp 92–113CrossRef Hohl F (1998) Time limited blackbox security: protecting mobile agents from malicious hosts. In: Mobile agents and security. Springer, London, pp 92–113CrossRef
11.
Zurück zum Zitat Huda N, Yamada S, Kamioka E (2005) Privacy protection in mobile agent based service domain. In: Proceedings of the third international conference on information technology and applications (ICITA’05), Sydney, 2005 Huda N, Yamada S, Kamioka E (2005) Privacy protection in mobile agent based service domain. In: Proceedings of the third international conference on information technology and applications (ICITA’05), Sydney, 2005
12.
Zurück zum Zitat Kauer B (2007) Oslo: improving the security of trusted computing. In: Proceedings of 16th USENIX security symposium on usenix security symposium Kauer B (2007) Oslo: improving the security of trusted computing. In: Proceedings of 16th USENIX security symposium on usenix security symposium
13.
Zurück zum Zitat Langendörfer P, Kraemer R (2002) Towards user defined privacy in location-aware platforms. In: Proceedings of the 3rd international conference on internet computing. 3rd international conference on internet computing. CSREA Langendörfer P, Kraemer R (2002) Towards user defined privacy in location-aware platforms. In: Proceedings of the 3rd international conference on internet computing. 3rd international conference on internet computing. CSREA
14.
Zurück zum Zitat Lee H, Alves-Foss J, Harrison S (2004) The use of encrypted functions for mobile agent security. In: HICSS ’04: proceedings of the proceedings of the 37th annual Hawaii international conference on system sciences (HICSS’04) - Track 9, vol 9. IEEE Computer Society, Washington, DC, p 90297.2 Lee H, Alves-Foss J, Harrison S (2004) The use of encrypted functions for mobile agent security. In: HICSS ’04: proceedings of the proceedings of the 37th annual Hawaii international conference on system sciences (HICSS’04) - Track 9, vol 9. IEEE Computer Society, Washington, DC, p 90297.2
15.
Zurück zum Zitat López J, Maña A, Pimentel E, Troya JM, Yagüe MI (2002) Access control infrastructure for digital objects. In: Proceedings of the international conference on information and communications security (ICICS’02). International conference on information and communications security (ICICS’02), LNCS 2513. Springer, Singapore, pp 399–410 López J, Maña A, Pimentel E, Troya JM, Yagüe MI (2002) Access control infrastructure for digital objects. In: Proceedings of the international conference on information and communications security (ICICS’02). International conference on information and communications security (ICICS’02), LNCS 2513. Springer, Singapore, pp 399–410
16.
Zurück zum Zitat Maaser M, Langendörfer P (2005) Automated negotiation of privacy contracts. In: Proceedings of the 29th annual international computer software and applications conference (COMPSAC). IEEE Society Press, Edinburgh Maaser M, Langendörfer P (2005) Automated negotiation of privacy contracts. In: Proceedings of the 29th annual international computer software and applications conference (COMPSAC). IEEE Society Press, Edinburgh
17.
Zurück zum Zitat Maaser M, Ortmann S, Langendörfer P (2008) The privacy advocate: assertion of privacy by personalised contracts. In: Books of selected papers from WEBIST conferences, pp 85–97 Maaser M, Ortmann S, Langendörfer P (2008) The privacy advocate: assertion of privacy by personalised contracts. In: Books of selected papers from WEBIST conferences, pp 85–97
18.
Zurück zum Zitat Maña A, Lopez J, Ortega JJ, Pimentel E, Troya JM (2004) A framework for secure execution of software. Int J Inf Secur 2(4):99–112CrossRef Maña A, Lopez J, Ortega JJ, Pimentel E, Troya JM (2004) A framework for secure execution of software. Int J Inf Secur 2(4):99–112CrossRef
19.
Zurück zum Zitat Page J, Zaslavsky A, Indrawan M (2004) Countering security vulnerabilities in agent execution using a self executing security examination. In: Proceedings of the third international joint conference on autonomous agents and multiagent systems (AAMAS’04), vol 3. IEEE Computer Society, Los Alamitos, pp 1486–1487. doi:http://doi.ieeecomputersociety.org/10.1109/AAMAS.2004.10229 Page J, Zaslavsky A, Indrawan M (2004) Countering security vulnerabilities in agent execution using a self executing security examination. In: Proceedings of the third international joint conference on autonomous agents and multiagent systems (AAMAS’04), vol 3. IEEE Computer Society, Los Alamitos, pp 1486–1487. doi:http://​doi.​ieeecomputersoci​ety.​org/​10.​1109/​AAMAS.​2004.​10229
20.
Zurück zum Zitat Poggi A, Rimassa G, Tomaiuolo M (2001) Multi-user and security support for multi-agent systems. In: Proceedings of WOA 2001 workshop. Modena Poggi A, Rimassa G, Tomaiuolo M (2001) Multi-user and security support for multi-agent systems. In: Proceedings of WOA 2001 workshop. Modena
21.
Zurück zum Zitat Riordan J, Schneier B (1998) Environmental key generation towards clueless agents. In: Mobile agents and security. Springer, London, pp 15–24CrossRef Riordan J, Schneier B (1998) Environmental key generation towards clueless agents. In: Mobile agents and security. Springer, London, pp 15–24CrossRef
22.
Zurück zum Zitat Sailer R, Zhang X, Jaeger T, van Doorn L (2004) Design and implementation of a tcg-based integrity measurement architecture. In: Proceedings of the USENIX security symposium Sailer R, Zhang X, Jaeger T, van Doorn L (2004) Design and implementation of a tcg-based integrity measurement architecture. In: Proceedings of the USENIX security symposium
23.
Zurück zum Zitat Seshadri A, Luk M, Shi E, Perrig A, van Doorn L, Khosla P (2005) Pioneer: verifying code integrity and enforcing untampered code execution on legacy systems. In: 20th ACM symposium on operating systems principles (SOSP 2005) Seshadri A, Luk M, Shi E, Perrig A, van Doorn L, Khosla P (2005) Pioneer: verifying code integrity and enforcing untampered code execution on legacy systems. In: 20th ACM symposium on operating systems principles (SOSP 2005)
24.
Zurück zum Zitat Seshadri A, Perrig A, van Doorn L (2004) Using software-based attestation for verifying embedded systems in cars. In: Proceedings of the embedded security in cars workshop ’04. Embedded security in cars workshop (escar) Seshadri A, Perrig A, van Doorn L (2004) Using software-based attestation for verifying embedded systems in cars. In: Proceedings of the embedded security in cars workshop ’04. Embedded security in cars workshop (escar)
25.
Zurück zum Zitat Synnes K, Nord J, Parnes P (2003) Location privacy in the alipes platform. In: Proceedings of the Hawai’i international conference on system sciences. Hawai’i international conference on system sciences (HICSS-36). Big Island, Hawaii Synnes K, Nord J, Parnes P (2003) Location privacy in the alipes platform. In: Proceedings of the Hawai’i international conference on system sciences. Hawai’i international conference on system sciences (HICSS-36). Big Island, Hawaii
27.
Zurück zum Zitat Wagealla W, Terzis S, English C (2003) Trust-based model for privacy control in context-aware systems. In: Proceedings of the 2nd workshop on security in ubiquitous computing. 2nd workshop on security in ubiquitous computing Wagealla W, Terzis S, English C (2003) Trust-based model for privacy control in context-aware systems. In: Proceedings of the 2nd workshop on security in ubiquitous computing. 2nd workshop on security in ubiquitous computing
29.
Zurück zum Zitat Yannopoulos A, Stavroulasa Y, Papadakis N, Halkos D, Varvarigou T (2002) A method which enables the assessment of private data by an untrusted party using arbitrary algorithms but prevents disclosure of their content. In: Langendoerfer P, Tsaoussidis V (eds) Proceedings of the 3rd international conference on internet computing. 3rd international conference on internet computing. CSREA Press Yannopoulos A, Stavroulasa Y, Papadakis N, Halkos D, Varvarigou T (2002) A method which enables the assessment of private data by an untrusted party using arbitrary algorithms but prevents disclosure of their content. In: Langendoerfer P, Tsaoussidis V (eds) Proceedings of the 3rd international conference on internet computing. 3rd international conference on internet computing. CSREA Press
Metadaten
Titel
Privacy from Promises to Protection
Privacy Guaranteeing Execution Container
verfasst von
Michael Maaser
Peter Langendörfer
Publikationsdatum
01.02.2009
Verlag
Springer US
Erschienen in
Mobile Networks and Applications / Ausgabe 1/2009
Print ISSN: 1383-469X
Elektronische ISSN: 1572-8153
DOI
https://doi.org/10.1007/s11036-008-0116-7

Weitere Artikel der Ausgabe 1/2009

Mobile Networks and Applications 1/2009 Zur Ausgabe

Neuer Inhalt