protecting people location information september 29, 2002 urs hengartner & peter steenkiste

18
Protecting People Location Information September 29, 2002 Urs Hengartner & Peter Steenkiste

Upload: allan-oneal

Post on 05-Jan-2016

213 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Protecting People Location Information September 29, 2002 Urs Hengartner & Peter Steenkiste

Protecting People Location Information

September 29, 2002

Urs Hengartner & Peter Steenkiste

Page 2: Protecting People Location Information September 29, 2002 Urs Hengartner & Peter Steenkiste

2

Motivation• Ubiquitous computing relies on

location information. • Location information is sensitive.

– Location activity

• Access to it needs to be protected in location policies.

• What properties need to be controllable in policies?

• How do different environments influence policy specification?

Page 3: Protecting People Location Information September 29, 2002 Urs Hengartner & Peter Steenkiste

3

Overview

• Location policies• Different environments• Prototype of secure location

system• Conclusions

Page 4: Protecting People Location Information September 29, 2002 Urs Hengartner & Peter Steenkiste

4

User vs. Room Policies

• Two types of queries:– User query

• Where is Alice?

– Room query• Who is in CMU Wean Hall 8220?

• Two types of policies:– User policy– Room policy

Page 5: Protecting People Location Information September 29, 2002 Urs Hengartner & Peter Steenkiste

5

Controllable Properties

• Granularity– CMU Campus vs. CMU Wean Hall

8220– Alice vs. someone

• Subject– Alice, Bob’s friends, tracking

service

Page 6: Protecting People Location Information September 29, 2002 Urs Hengartner & Peter Steenkiste

6

Controllable Properties (cont.)

• Time intervals– During weekdays only

• Location/Users– Return my location only if

I’m in my office.– Return people in my office

only if it is Alice or Bob.

Additional properties should be possible!

Page 7: Protecting People Location Information September 29, 2002 Urs Hengartner & Peter Steenkiste

7

Transitivity

Should Bob be able to forward his access right ?

Alice can locate Carol.

Bob

Bob can locate me.

Carol

Page 8: Protecting People Location Information September 29, 2002 Urs Hengartner & Peter Steenkiste

8

Transitivity (cont.)• Should access rights be transitive?• Depends on environment.• Location system should selectively

support transitivity.• Non-transitivity can be circumvented.

Page 9: Protecting People Location Information September 29, 2002 Urs Hengartner & Peter Steenkiste

9

Conflicting PoliciesBob can locate

people in my office

Carol’s office

Should Bob learn about Alice’s location?

Who is in Carol’s office?

Bob

Bob cannot locate me

Alice

Bob cannot locate me

Alice

Page 10: Protecting People Location Information September 29, 2002 Urs Hengartner & Peter Steenkiste

10

Resolving Conflicts• Prioritization:

– Check user policy for user queries.– Check room policy for room queries.

• Intersection:– Check both room and user policy for any

query.

• Synchronization:– Establish user and room policies in a

synchronized way.

Best approach depends on environment.

Page 11: Protecting People Location Information September 29, 2002 Urs Hengartner & Peter Steenkiste

11

Individual vs. Institutional Definition

• Different entities can define policies:– Individuals:

• User policy User• Room policy Room “owner”

– Institution (central authority)

• Which one depends on environment.• Combined specification should be

possible.

Page 12: Protecting People Location Information September 29, 2002 Urs Hengartner & Peter Steenkiste

12

Environments - MilitarySecurity based on labeling and

clearances.• Definition

– Policies are specified by central authority.

• Transitivity– Policies are non-transitive.

• Conflicts– Both user and room policies need to be

checked for any query.

Page 13: Protecting People Location Information September 29, 2002 Urs Hengartner & Peter Steenkiste

13

Environments - HospitalMultilateral security model.• Definition

– Most policies are specified by central authority.

– Patients can give additional people access in user policy.

• Transitivity– Patient policies can be transitive.

• Conflicts– Synchronization of user and room

policies is not necessary.

Page 14: Protecting People Location Information September 29, 2002 Urs Hengartner & Peter Steenkiste

14

Environments - UniversityInstitution cares less about security.• Definition

– User policies and room policies for offices are specified by individuals.

• Transitivity– User policies are transitive, room

policies probably not.

• Conflicts– Have user and room policies become

synchronized for lecture halls.

Page 15: Protecting People Location Information September 29, 2002 Urs Hengartner & Peter Steenkiste

15

Prototype• People location system for university

environment.• Multiple front ends.• Digital certificates for expressing

location policies.– transparent to users.

• Location system exploits – calendar information,– Finger service,– wireless network access points.

Page 16: Protecting People Location Information September 29, 2002 Urs Hengartner & Peter Steenkiste

16

Status• Emphasis on user queries• Controllable properties

– Subject, Granularity– Soon: Location, Time

• Transitivity– supported by back end

• Conflicts– configurable option

• Definition– by individuals

Page 17: Protecting People Location Information September 29, 2002 Urs Hengartner & Peter Steenkiste

17

Evaluation

• Evaluation of prototype with real users (in progress).

• Questions:– What kind of policies are specified?– What features are used/requested?– How is location system used?

Page 18: Protecting People Location Information September 29, 2002 Urs Hengartner & Peter Steenkiste

18

Conclusions• Location information needs to be

protected.• Location policies should provide control

over multiple properties.• Policy-related issues are dealt with

differently in different environments.• Location policies and system thus need

to be flexible.• How should society deal with ubiquitous

location information?