you have something to hide sandro etalle. outline two episodes privacy in context the chair the aim...

36
You have something to hide Sandro Etalle

Upload: ansley-crafford

Post on 31-Mar-2015

212 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: You have something to hide Sandro Etalle. Outline Two Episodes Privacy in Context The Chair The Aim The Reality Check Some Projects (if time allows)

You have something to hide

Sandro Etalle

Page 2: You have something to hide Sandro Etalle. Outline Two Episodes Privacy in Context The Chair The Aim The Reality Check Some Projects (if time allows)

Outline

• Two Episodes• Privacy in Context• The Chair• The Aim• The Reality Check• Some Projects (if time allows)

Page 3: You have something to hide Sandro Etalle. Outline Two Episodes Privacy in Context The Chair The Aim The Reality Check Some Projects (if time allows)

Episode 1: Arnold

Page 4: You have something to hide Sandro Etalle. Outline Two Episodes Privacy in Context The Chair The Aim The Reality Check Some Projects (if time allows)

www.geenstijl.nl (1)

• ... Nee pisventjes. .... Daar worden we een beetje ziek van zelfs. Gelukkig wisten we de hoofddader te achterhalen. Bij deze, lafbek Ixxx xxxx (spiegeltje) (Alle info) , je bent er gloeiend bij! Veel succes de komende dagen op school, op straat, in de kroeg en op familiefeestjes...

• “Dat deze gasten mogen branden in brandend braambos, en nog veel erger.”

Page 5: You have something to hide Sandro Etalle. Outline Two Episodes Privacy in Context The Chair The Aim The Reality Check Some Projects (if time allows)

Episode 2

Page 6: You have something to hide Sandro Etalle. Outline Two Episodes Privacy in Context The Chair The Aim The Reality Check Some Projects (if time allows)

Topic & Issues

• Topic: Privacy– Secret data, policy compliance etc.

• Issues– Accountability– Quantitative Privacy Management

Page 7: You have something to hide Sandro Etalle. Outline Two Episodes Privacy in Context The Chair The Aim The Reality Check Some Projects (if time allows)

Privacy in Context

Page 8: You have something to hide Sandro Etalle. Outline Two Episodes Privacy in Context The Chair The Aim The Reality Check Some Projects (if time allows)

“if you have nothing to hide you have nothing to fear”

• Skips over the problem by attacking first.

• Is altogether wrong.

Page 9: You have something to hide Sandro Etalle. Outline Two Episodes Privacy in Context The Chair The Aim The Reality Check Some Projects (if time allows)

The Arguments in Favor

• “huge (security) benefits”– “Stop terrorism”

• “small privacy loss”– only few people have access to the data– (if you have nothing to hide) no-one is

going to really look at your record.

Page 10: You have something to hide Sandro Etalle. Outline Two Episodes Privacy in Context The Chair The Aim The Reality Check Some Projects (if time allows)

“huge (security) benefits”

• Don’t want to get into this.• See Blog of Bruce Schneier.

Page 11: You have something to hide Sandro Etalle. Outline Two Episodes Privacy in Context The Chair The Aim The Reality Check Some Projects (if time allows)

“small privacy loss (1)”

• “few people have access to the data”

• trained? • accountable?

• Power balance

“Personal data for 650,000

customers vanishes into thin air”

http://www.theregister.co.uk/2008/01/18/jc_penney_customer_data_lost/

Page 12: You have something to hide Sandro Etalle. Outline Two Episodes Privacy in Context The Chair The Aim The Reality Check Some Projects (if time allows)

“small privacy loss (2)”

• “(if you have nothing to hide) no-one is going to look at your record.– clerks are not really overpaid– Hackers– Governments

Page 13: You have something to hide Sandro Etalle. Outline Two Episodes Privacy in Context The Chair The Aim The Reality Check Some Projects (if time allows)

An altogether wrong start

• Experience hath shewn, that even under the best forms of government those entrusted with power have, in time, and by slow operations, perverted it into tyranny. Thomas Jefferson (1743 – 1823)

• “a crime can always be found”

• The mere fact that the data is there, and potentially accessible is a problem.

Page 14: You have something to hide Sandro Etalle. Outline Two Episodes Privacy in Context The Chair The Aim The Reality Check Some Projects (if time allows)

Indeed

• Definition: “Privacy is the ability to lie about yourself and get away with it”

– Bob Blakley– chief scientist for Security and Privacy at

IBM Tivoli Software

• Corollary: “if you have nothing hidden, you have no privacy”.

Page 15: You have something to hide Sandro Etalle. Outline Two Episodes Privacy in Context The Chair The Aim The Reality Check Some Projects (if time allows)

Two issues

• Private information– Should be collected/used/etc moderately

• Misuse should be discovered – Power balance issue

• Challenges @ TU/e: – Quantitative Privacy Management– Accountability

Page 16: You have something to hide Sandro Etalle. Outline Two Episodes Privacy in Context The Chair The Aim The Reality Check Some Projects (if time allows)

Quantitative Privacy Management

• “privacy is being eroded”– Measure it!

• Guaranteeing graceful degradation– Normal in critical infrastructures– Why not for personal Data?

• EHR?

– (also) an architectural challenge.

Page 17: You have something to hide Sandro Etalle. Outline Two Episodes Privacy in Context The Chair The Aim The Reality Check Some Projects (if time allows)

Part 2: the security chair

Page 18: You have something to hide Sandro Etalle. Outline Two Episodes Privacy in Context The Chair The Aim The Reality Check Some Projects (if time allows)

The Security Chair

• Started 1/10/2007• SEC is financed by CeDICT, the Centre

for Dependable ICT Systems, one of the centres of excellence of the 3TU Federation of Technical Universities of the Netherlands.

Page 19: You have something to hide Sandro Etalle. Outline Two Episodes Privacy in Context The Chair The Aim The Reality Check Some Projects (if time allows)

The Security Group• Prof. dr. Sandro Etalle

– Trust management & policies for mobile systems

– Protocol verification, – Intrusion detection, – Risk Management

• Prof. dr. Bart Jacobs 0.2 FTE– Software Security– Cybercryme

• Dr. Jerry den Hartog– Smartcards. Security and

formal methods

• Dr. Nicola Zannone– Access Control

• Vacancy– Embedded Systems Security

• Dr. Fred Spiessens – Trust management

• Dr. Lu – smartcards, side-channels

attacks• Dr. Vacancy

• PhD– Daniel Trivellato

• trust management– Bruno Pontes Soares Rocha

• security of mobile devices– Jing Pan:

• Side channels attacks – Gabriel George Popa– 2/3 more

A technical group working at

technical + non-technical problems

Page 20: You have something to hide Sandro Etalle. Outline Two Episodes Privacy in Context The Chair The Aim The Reality Check Some Projects (if time allows)

EIPSI

Security (informatica) + Coding and Crypto (wiskunde) =

30 people by the end of 2008.The largest technical security group of NL

Page 21: You have something to hide Sandro Etalle. Outline Two Episodes Privacy in Context The Chair The Aim The Reality Check Some Projects (if time allows)

Teaching

• Kerckhoffs Security Master– Twente – Nijmegen– Eindhoven

Page 22: You have something to hide Sandro Etalle. Outline Two Episodes Privacy in Context The Chair The Aim The Reality Check Some Projects (if time allows)

Projects

• TAS3: EU IP– WP leaders

• Poseidon– ESI – Thales

• S-mobile– With VU Amsterdam

• PEARL– Leaders, with RU & TUD

• PinpasJC– With RU

Page 23: You have something to hide Sandro Etalle. Outline Two Episodes Privacy in Context The Chair The Aim The Reality Check Some Projects (if time allows)

The research dream in a nutshell

Page 24: You have something to hide Sandro Etalle. Outline Two Episodes Privacy in Context The Chair The Aim The Reality Check Some Projects (if time allows)

The middle ages of compliance control

• Confidential data,– medical record, – RFID data, …

• Policy enforcement– Data should not be disclosed to unauthorized

users• How? Nowadays: DRM, Access Control

– preventive– No control outside the walls– One security domain: no x-organization

• In case of more domains– Lawyers & Auditors

Page 25: You have something to hide Sandro Etalle. Outline Two Episodes Privacy in Context The Chair The Aim The Reality Check Some Projects (if time allows)

Towards A Posteriori Compliance Control

• Setting: a number of different security domains, – different authorities,– different policies– different policy enforcement

systems

• Goal: policy enforcement– data should be used, & distributed

according to policies

• How: by detecting infringements.

Page 26: You have something to hide Sandro Etalle. Outline Two Episodes Privacy in Context The Chair The Aim The Reality Check Some Projects (if time allows)

The Idea

• Audit Based Compliance Control– users are responsible.– auditing authorities to detect misuse.

• Does not prevent misuse – actions can always be executed.– A posteriori, an authority can ask for justification – The user submits a proof that justifies the action.

• Architecture– Some degree of trustworthiness

26

Page 27: You have something to hide Sandro Etalle. Outline Two Episodes Privacy in Context The Chair The Aim The Reality Check Some Projects (if time allows)

27

Technical Challenges

• Access Control:– Security monitor: should this action be

allowed?• A Posteriori Compliance Control

– Auditor: is this observable indicating an infringement?

• {observables} => decision• Depends on the architecture

– User: is this policy the right one?• Authority problem

Page 28: You have something to hide Sandro Etalle. Outline Two Episodes Privacy in Context The Chair The Aim The Reality Check Some Projects (if time allows)

Reality

Accountability

Logging

Privacy

Page 29: You have something to hide Sandro Etalle. Outline Two Episodes Privacy in Context The Chair The Aim The Reality Check Some Projects (if time allows)

The role trade-off

Privacy Accountability

PrivateCitizen Manager

Clerk Head of the Army

CEO

Page 30: You have something to hide Sandro Etalle. Outline Two Episodes Privacy in Context The Chair The Aim The Reality Check Some Projects (if time allows)

30

Summarizing

• A Posteriori Compliance Control – Alternative to access control– Not yet feasible, but this will change

• Salient Features– Notion of observable– Authority problem

Page 31: You have something to hide Sandro Etalle. Outline Two Episodes Privacy in Context The Chair The Aim The Reality Check Some Projects (if time allows)

Poseidon

• “radar traces concerning boats in the west side of the theatre may be seen only by officers of ally Y or Z with a special clearance”

Page 32: You have something to hide Sandro Etalle. Outline Two Episodes Privacy in Context The Chair The Aim The Reality Check Some Projects (if time allows)

PEARL

• Privacy Enhancing security Architecture for RFID Labels– Specification & enforcement of privacy

policies– Across domains

• STW/Sentinels– With RUN, Delft– Philips TNO

Page 33: You have something to hide Sandro Etalle. Outline Two Episodes Privacy in Context The Chair The Aim The Reality Check Some Projects (if time allows)

Trusted Architecture for Securely Shared Services

TopicsTrust management

Information Protection

Workflows

Privacy, Legal

Authentication

Application AreasHealthcare

Employability

FP7 Integrated Project, 1 Jan 2008 - 31 Dec 201118 Partners: KU Leuven, SAP, Oracle, TU/e, ...

Page 34: You have something to hide Sandro Etalle. Outline Two Episodes Privacy in Context The Chair The Aim The Reality Check Some Projects (if time allows)

S-mobile

• Security of Services on Mobile Systems– Only games endorsed by

ProvacyPreserving.com should access my calendar.

– This applet should not cost me more than 3EUR per week.

• Matching• Trust

• STW/Sentinels, – with VU, Philips, TNO

Page 35: You have something to hide Sandro Etalle. Outline Two Episodes Privacy in Context The Chair The Aim The Reality Check Some Projects (if time allows)

PINPAS Java CardProgram Inferred Power-Analysis in Software for Java Card

Trend: Security relies on smartcards– bank&cash cards, SIM, biometric passport

Threat: side channel attacks– Passive; timing, power consumption, ...– Active, fault attacks; power glitch, card tear, ...

Goal: Predict and Prevent vulnerabilities– Software simulation (predict)– Coding guidelines (avoid)– Program analysis tools (detect)

Initial Results:– Simulation tool, JavaCard compliance tests, verification

security properties w.r.t. faults

Research at: case-studies by:

Page 36: You have something to hide Sandro Etalle. Outline Two Episodes Privacy in Context The Chair The Aim The Reality Check Some Projects (if time allows)

Questions?