A Privacy-Preserving E-Ticketing System for Public Transportation Supporting Fine-Granular Billing and Local Validation
|
|
|
- Berenice Edwards
- 10 years ago
- Views:
Transcription
1 A Privacy-Preserving E-Ticketing System for Public Transportation Supporting Fine-Granular Billing and Local Validation Ivan Gudymenko Chair of Privacy and Data Security Faculty of Computer Science, TU Dresden 11 th of September, 2014
2 OUTLINE Introduction Privacy Issues State-of-the Art and Core Challenges Our Solution A Privacy-Preserving E-Ticketing System Ivan Gudymenko Faculty of Computer Science, TU Dresden 2
3 OUTLINE Introduction Privacy Issues State-of-the Art and Core Challenges Our Solution A Privacy-Preserving E-Ticketing System Ivan Gudymenko Faculty of Computer Science, TU Dresden 3
4 E-TICKETING IN PUBLIC TRANSPORT [Courtesy of MünsterscheZeitung.de] A Privacy-Preserving E-Ticketing System Ivan Gudymenko Faculty of Computer Science, TU Dresden 4
5 WHAT AN E-TICKET IS A digitalized version of a travel permission (or a proof thereof) Stored as an e-ticket at a user device: Smart Card NFC-enabled smart phone A Privacy-Preserving E-Ticketing System Ivan Gudymenko Faculty of Computer Science, TU Dresden 5
6 WHAT AN E-TICKET IS A digitalized version of a travel permission (or a proof thereof) Stored as an e-ticket at a user device: Smart Card NFC-enabled smart phone A Privacy-Preserving E-Ticketing System Ivan Gudymenko Faculty of Computer Science, TU Dresden 5
7 WHAT AN E-TICKET IS A digitalized version of a travel permission (or a proof thereof) Stored as an e-ticket at a user device: Smart Card NFC-enabled smart phone A Privacy-Preserving E-Ticketing System Ivan Gudymenko Faculty of Computer Science, TU Dresden 5
8 WHAT AN E-TICKET IS A digitalized version of a travel permission (or a proof thereof) Stored as an e-ticket at a user device: Smart Card NFC-enabled smart phone T-ticket Smartcard A Privacy-Preserving E-Ticketing System Ivan Gudymenko Faculty of Computer Science, TU Dresden 5
9 WHAT AN E-TICKET IS A digitalized version of a travel permission (or a proof thereof) Stored as an e-ticket at a user device: Smart Card NFC-enabled smart phone T-ticket Smartcard NFC A Privacy-Preserving E-Ticketing System Ivan Gudymenko Faculty of Computer Science, TU Dresden 5
10 WHAT AN E-TICKET IS NOT A widely used online ticket (air transport, etc.) Pointing to the respective entry in the back-end DB A Privacy-Preserving E-Ticketing System Ivan Gudymenko Faculty of Computer Science, TU Dresden 6
11 WHAT AN E-TICKET IS NOT A widely used online ticket (air transport, etc.) Pointing to the respective entry in the back-end DB A Privacy-Preserving E-Ticketing System Ivan Gudymenko Faculty of Computer Science, TU Dresden 6
12 WHAT AN E-TICKET IS NOT A widely used online ticket (air transport, etc.) Pointing to the respective entry in the back-end DB A Privacy-Preserving E-Ticketing System Ivan Gudymenko Faculty of Computer Science, TU Dresden 6
13 NON-INTERACTIVE VS. INTERACTION-BASED Non-interactive Interaction-based enable fine-granular billing. A Privacy-Preserving E-Ticketing System Ivan Gudymenko Faculty of Computer Science, TU Dresden 7
14 NON-INTERACTIVE VS. INTERACTION-BASED Non-interactive Interaction-based enable fine-granular billing. A Privacy-Preserving E-Ticketing System Ivan Gudymenko Faculty of Computer Science, TU Dresden 7
15 NON-INTERACTIVE VS. INTERACTION-BASED Non-interactive Interaction-based enable fine-granular billing. A Privacy-Preserving E-Ticketing System Ivan Gudymenko Faculty of Computer Science, TU Dresden 7
16 NON-INTERACTIVE VS. INTERACTION-BASED Non-interactive Interaction-based enable fine-granular billing. A Privacy-Preserving E-Ticketing System Ivan Gudymenko Faculty of Computer Science, TU Dresden 7
17 NON-INTERACTIVE VS. INTERACTION-BASED Non-interactive Interaction-based enable fine-granular billing. A Privacy-Preserving E-Ticketing System Ivan Gudymenko Faculty of Computer Science, TU Dresden 7
18 NON-INTERACTIVE VS. INTERACTION-BASED Non-interactive Interaction-based enable fine-granular billing. A Privacy-Preserving E-Ticketing System Ivan Gudymenko Faculty of Computer Science, TU Dresden 7
19 E-TICKETING: A GENERAL APPLICATION SCENARIO Station A Trip Station B Back-end Terminal 1 (Check-in) Terminal 2 (Check-out) Backbone network A Privacy-Preserving E-Ticketing System Ivan Gudymenko Faculty of Computer Science, TU Dresden 8
20 OUTLINE Introduction Privacy Issues State-of-the Art and Core Challenges Our Solution A Privacy-Preserving E-Ticketing System Ivan Gudymenko Faculty of Computer Science, TU Dresden 9
21 CONVENTIONAL E-TICKETING SYSTEMS: PRIVACY Primary focus on functionality (and security) Privacy is often not directly considered A Privacy-Preserving E-Ticketing System Ivan Gudymenko Faculty of Computer Science, TU Dresden 10
22 CONVENTIONAL E-TICKETING SYSTEMS: PRIVACY Primary focus on functionality (and security) Privacy is often not directly considered A Privacy-Preserving E-Ticketing System Ivan Gudymenko Faculty of Computer Science, TU Dresden 10
23 CONVENTIONAL E-TICKETING SYSTEMS: PRIVACY Primary focus on functionality (and security) Privacy is often not directly considered A Privacy-Preserving E-Ticketing System Ivan Gudymenko Faculty of Computer Science, TU Dresden 10
24 PRIVACY CONSIDERATIONS Traceability Transactions linkability Customer profiling Ubiquitous identification A Privacy-Preserving E-Ticketing System Ivan Gudymenko Faculty of Computer Science, TU Dresden 11
25 PRIVACY CONSIDERATIONS Traceability Transactions linkability Customer profiling Ubiquitous identification A Privacy-Preserving E-Ticketing System Ivan Gudymenko Faculty of Computer Science, TU Dresden 11
26 PRIVACY CONSIDERATIONS Traceability Transactions linkability Customer profiling Ubiquitous identification A Privacy-Preserving E-Ticketing System Ivan Gudymenko Faculty of Computer Science, TU Dresden 11
27 PRIVACY CONSIDERATIONS Traceability Transactions linkability Customer profiling Ubiquitous identification A Privacy-Preserving E-Ticketing System Ivan Gudymenko Faculty of Computer Science, TU Dresden 11
28 PRIVACY CONSIDERATIONS Traceability Transactions linkability Customer profiling Ubiquitous identification A Privacy-Preserving E-Ticketing System Ivan Gudymenko Faculty of Computer Science, TU Dresden 11
29 PRIVACY CONSIDERATIONS Traceability Transactions linkability Customer profiling Ubiquitous identification A Privacy-Preserving E-Ticketing System Ivan Gudymenko Faculty of Computer Science, TU Dresden 11
30 A GENERAL SYSTEM ARCHITECTURE Check-in/out E-tickets Terminals E-ticket 1 Terminal 1 E-ticket 2 Terminal E-ticket n Terminal n Real-time Backbone Network Non-real-time Back-end TR Processing: - Singulation - Billing - Identification A Privacy-Preserving E-Ticketing System Ivan Gudymenko Faculty of Computer Science, TU Dresden 12
31 A PRIVACY-PRESERVING E-TICKETING SYSTEM: CORE REQUIREMENTS A Privacy-Preserving E-Ticketing System Ivan Gudymenko Faculty of Computer Science, TU Dresden 13
32 A PRIVACY-PRESERVING E-TICKETING SYSTEM: CORE REQUIREMENTS (1) Privacy A Privacy-Preserving E-Ticketing System Ivan Gudymenko Faculty of Computer Science, TU Dresden 13
33 A PRIVACY-PRESERVING E-TICKETING SYSTEM: CORE REQUIREMENTS (1) Privacy (a) Against terminals Identification: Correlation: no no A Privacy-Preserving E-Ticketing System Ivan Gudymenko Faculty of Computer Science, TU Dresden 13
34 A PRIVACY-PRESERVING E-TICKETING SYSTEM: CORE REQUIREMENTS (1) Privacy (a) Against terminals (b) Against back-end Identification: Correlation: Identification: Correlation: no no no yes A Privacy-Preserving E-Ticketing System Ivan Gudymenko Faculty of Computer Science, TU Dresden 13
35 A PRIVACY-PRESERVING E-TICKETING SYSTEM: CORE REQUIREMENTS (1) Privacy (a) Against terminals (b) Against back-end Identification: Correlation: Identification: Correlation: no no no yes (c) Against observers PII Derivation: no A Privacy-Preserving E-Ticketing System Ivan Gudymenko Faculty of Computer Science, TU Dresden 13
36 A PRIVACY-PRESERVING E-TICKETING SYSTEM: CORE REQUIREMENTS (1) Privacy (a) Against terminals (b) Against back-end Identification: Correlation: Identification: Correlation: no no no yes (c) Against observers PII Derivation: no (2) Fine-granular billing support A Privacy-Preserving E-Ticketing System Ivan Gudymenko Faculty of Computer Science, TU Dresden 13
37 A PRIVACY-PRESERVING E-TICKETING SYSTEM: CORE REQUIREMENTS (1) Privacy (a) Against terminals (b) Against back-end Identification: Correlation: Identification: Correlation: no no no yes (c) Against observers PII Derivation: no (2) Fine-granular billing support (3) Loose-coupling A Privacy-Preserving E-Ticketing System Ivan Gudymenko Faculty of Computer Science, TU Dresden 13
38 A PRIVACY-PRESERVING E-TICKETING SYSTEM: CORE REQUIREMENTS (1) Privacy (a) Against terminals (b) Against back-end Identification: Correlation: Identification: Correlation: no no no yes (c) Against observers PII Derivation: no (2) Fine-granular billing support (3) Loose-coupling (4) Efficiency Check-in/out events handling A Privacy-Preserving E-Ticketing System Ivan Gudymenko Faculty of Computer Science, TU Dresden 13
39 A PRIVACY-PRESERVING E-TICKETING SYSTEM: CORE REQUIREMENTS (1) Privacy (a) Against terminals (b) Against back-end Identification: Correlation: Identification: Correlation: no no no yes (c) Against observers PII Derivation: no (2) Fine-granular billing support (3) Loose-coupling (4) Efficiency Check-in/out events handling (5) Multilateral security A Privacy-Preserving E-Ticketing System Ivan Gudymenko Faculty of Computer Science, TU Dresden 13
40 CORE SYSTEM REQUIREMENTS: INHERENT CONTRADICTIONS (1) Privacy (a) Against terminals (b) Against back-end Identification: Correlation: Identification: Correlation: no no no yes (c) Against observers PII Derivation: no (2) Fine-granular billing support (3) Loose-coupling (4) Efficiency Check-in/out events handling (5) Multilateral security A Privacy-Preserving E-Ticketing System Ivan Gudymenko Faculty of Computer Science, TU Dresden 14
41 OUTLINE Introduction Privacy Issues State-of-the Art and Core Challenges Our Solution A Privacy-Preserving E-Ticketing System Ivan Gudymenko Faculty of Computer Science, TU Dresden 15
42 RELATED WORK/OTHER SOLUTIONS Academic solutions: not covering all requirements Industry: essentially not interested in privacy preservation A Privacy-Preserving E-Ticketing System Ivan Gudymenko Faculty of Computer Science, TU Dresden 16
43 RELATED WORK/OTHER SOLUTIONS Academic solutions: not covering all requirements Industry: essentially not interested in privacy preservation A Privacy-Preserving E-Ticketing System Ivan Gudymenko Faculty of Computer Science, TU Dresden 16
44 RELATED WORK/OTHER SOLUTIONS Academic solutions: not covering all requirements Industry: essentially not interested in privacy preservation A Privacy-Preserving E-Ticketing System Ivan Gudymenko Faculty of Computer Science, TU Dresden 16
45 CORE CHALLENGES How to provide for a privacy-preserving local validation at the terminal side such that: valid e-tickets remain anonymous to the terminal; invalid e-tickets are rejected. How to allow for privacy-preserving travel records processing in the back-end such that: fine-granular billing for the registered tickets is possible; direct identification of customers is prevented. A Privacy-Preserving E-Ticketing System Ivan Gudymenko Faculty of Computer Science, TU Dresden 17
46 CORE CHALLENGES How to provide for a privacy-preserving local validation at the terminal side such that: valid e-tickets remain anonymous to the terminal; invalid e-tickets are rejected. How to allow for privacy-preserving travel records processing in the back-end such that: fine-granular billing for the registered tickets is possible; direct identification of customers is prevented. A Privacy-Preserving E-Ticketing System Ivan Gudymenko Faculty of Computer Science, TU Dresden 17
47 CORE CHALLENGES How to provide for a privacy-preserving local validation at the terminal side such that: valid e-tickets remain anonymous to the terminal; invalid e-tickets are rejected. How to allow for privacy-preserving travel records processing in the back-end such that: fine-granular billing for the registered tickets is possible; direct identification of customers is prevented. A Privacy-Preserving E-Ticketing System Ivan Gudymenko Faculty of Computer Science, TU Dresden 17
48 CORE CHALLENGES How to provide for a privacy-preserving local validation at the terminal side such that: valid e-tickets remain anonymous to the terminal; invalid e-tickets are rejected. How to allow for privacy-preserving travel records processing in the back-end such that: fine-granular billing for the registered tickets is possible; direct identification of customers is prevented. A Privacy-Preserving E-Ticketing System Ivan Gudymenko Faculty of Computer Science, TU Dresden 17
49 CORE CHALLENGES How to provide for a privacy-preserving local validation at the terminal side such that: valid e-tickets remain anonymous to the terminal; invalid e-tickets are rejected. How to allow for privacy-preserving travel records processing in the back-end such that: fine-granular billing for the registered tickets is possible; direct identification of customers is prevented. A Privacy-Preserving E-Ticketing System Ivan Gudymenko Faculty of Computer Science, TU Dresden 17
50 CORE CHALLENGES How to provide for a privacy-preserving local validation at the terminal side such that: valid e-tickets remain anonymous to the terminal; invalid e-tickets are rejected. How to allow for privacy-preserving travel records processing in the back-end such that: fine-granular billing for the registered tickets is possible; direct identification of customers is prevented. A Privacy-Preserving E-Ticketing System Ivan Gudymenko Faculty of Computer Science, TU Dresden 17
51 CORE CHALLENGES How to provide for a privacy-preserving local validation at the terminal side such that: valid e-tickets remain anonymous to the terminal; invalid e-tickets are rejected. How to allow for privacy-preserving travel records processing in the back-end such that: fine-granular billing for the registered tickets is possible; direct identification of customers is prevented. A Privacy-Preserving E-Ticketing System Ivan Gudymenko Faculty of Computer Science, TU Dresden 17
52 OUTLINE Introduction Privacy Issues State-of-the Art and Core Challenges Our Solution A Privacy-Preserving E-Ticketing System Ivan Gudymenko Faculty of Computer Science, TU Dresden 18
53 ADVERSARY MODEL 1. (Outsider) External observers can observe the communication between terminals and e-tickets (front-end) Ñ no PII derivation 2. (Insider) Terminals can analyse the logs, may leak information. Ñ No tracking and identification of valid e-tickets 3. (Insider) Back-end can process all information pieces under its control Ñ No direct identification of any e-ticket Ñ Insider/outsider with respect to the involvement into the system flow. A Privacy-Preserving E-Ticketing System Ivan Gudymenko Faculty of Computer Science, TU Dresden 19
54 ADVERSARY MODEL 1. (Outsider) External observers can observe the communication between terminals and e-tickets (front-end) Ñ no PII derivation 2. (Insider) Terminals can analyse the logs, may leak information. Ñ No tracking and identification of valid e-tickets 3. (Insider) Back-end can process all information pieces under its control Ñ No direct identification of any e-ticket Ñ Insider/outsider with respect to the involvement into the system flow. A Privacy-Preserving E-Ticketing System Ivan Gudymenko Faculty of Computer Science, TU Dresden 19
55 ADVERSARY MODEL 1. (Outsider) External observers can observe the communication between terminals and e-tickets (front-end) Ñ no PII derivation 2. (Insider) Terminals can analyse the logs, may leak information. Ñ No tracking and identification of valid e-tickets 3. (Insider) Back-end can process all information pieces under its control Ñ No direct identification of any e-ticket Ñ Insider/outsider with respect to the involvement into the system flow. A Privacy-Preserving E-Ticketing System Ivan Gudymenko Faculty of Computer Science, TU Dresden 19
56 ADVERSARY MODEL 1. (Outsider) External observers can observe the communication between terminals and e-tickets (front-end) Ñ no PII derivation 2. (Insider) Terminals can analyse the logs, may leak information. Ñ No tracking and identification of valid e-tickets 3. (Insider) Back-end can process all information pieces under its control Ñ No direct identification of any e-ticket Ñ Insider/outsider with respect to the involvement into the system flow. A Privacy-Preserving E-Ticketing System Ivan Gudymenko Faculty of Computer Science, TU Dresden 19
57 ADVERSARY MODEL 1. (Outsider) External observers can observe the communication between terminals and e-tickets (front-end) Ñ no PII derivation 2. (Insider) Terminals can analyse the logs, may leak information. Ñ No tracking and identification of valid e-tickets 3. (Insider) Back-end can process all information pieces under its control Ñ No direct identification of any e-ticket Ñ Insider/outsider with respect to the involvement into the system flow. A Privacy-Preserving E-Ticketing System Ivan Gudymenko Faculty of Computer Science, TU Dresden 19
58 ADVERSARY MODEL 1. (Outsider) External observers can observe the communication between terminals and e-tickets (front-end) Ñ no PII derivation 2. (Insider) Terminals can analyse the logs, may leak information. Ñ No tracking and identification of valid e-tickets 3. (Insider) Back-end can process all information pieces under its control Ñ No direct identification of any e-ticket Ñ Insider/outsider with respect to the involvement into the system flow. A Privacy-Preserving E-Ticketing System Ivan Gudymenko Faculty of Computer Science, TU Dresden 19
59 ADVERSARY MODEL 1. (Outsider) External observers can observe the communication between terminals and e-tickets (front-end) Ñ no PII derivation 2. (Insider) Terminals can analyse the logs, may leak information. Ñ No tracking and identification of valid e-tickets 3. (Insider) Back-end can process all information pieces under its control Ñ No direct identification of any e-ticket Ñ Insider/outsider with respect to the involvement into the system flow. A Privacy-Preserving E-Ticketing System Ivan Gudymenko Faculty of Computer Science, TU Dresden 19
60 ADVERSARY MODEL 1. (Outsider) External observers can observe the communication between terminals and e-tickets (front-end) Ñ no PII derivation 2. (Insider) Terminals can analyse the logs, may leak information. Ñ No tracking and identification of valid e-tickets 3. (Insider) Back-end can process all information pieces under its control Ñ No direct identification of any e-ticket Ñ Insider/outsider with respect to the involvement into the system flow. A Privacy-Preserving E-Ticketing System Ivan Gudymenko Faculty of Computer Science, TU Dresden 19
61 SOLUTION BUILDING BLOCKS Privacy-preserving eticketing System Mutual Authentication (front-end) - non-identifiability - non-traceability must enable Local Revocation (front-end) - non-identifiability - non-traceability must enable Path Reconstruction (back-end) - non-identifiability - traceability (singulation) must enable A Privacy-Preserving E-Ticketing System Ivan Gudymenko Faculty of Computer Science, TU Dresden 20
62 SOLUTION BUILDING BLOCKS (2) Privacy-preserving eticketing System Mutual Authentication (front-end) - non-identifiability - non-traceability must enable Local Revocation (front-end) - non-identifiability - non-traceability must enable Path Reconstruction (back-end) - non-identifiability - traceability (singulation) must enable Tools available: - Group Signatures - ZKP of possession of a valid credential Tools available: - Dynamic Accumulators - Homomorphic encryption and ZKP of correctness Tools available: - Predefined Matrix-based - Private Information Retrieval? A Privacy-Preserving E-Ticketing System Ivan Gudymenko Faculty of Computer Science, TU Dresden 21
63 SOLUTION BUILDING BLOCKS: SUMMARY Privacy-preserving eticketing System Mutual Authentication (front-end) - non-identifiability - non-traceability must enable Local Revocation (front-end) - non-identifiability - non-traceability must enable Path Reconstruction (back-end) - non-identifiability - traceability (singulation) must enable Tools available: - Group Signatures - ZKP of possession of a valid credential Chosen approach: - A slightly modified certificate-based authentication Tools available: - Dynamic Accumulators - Homomorphic encryption and ZKP of correctness Chosen approach: - A custom blacklisting scheme Tools available: - Predefined Matrix-based - Other approaches? Chosen approach: - A custom pseudonymisation scheme A Privacy-Preserving E-Ticketing System Ivan Gudymenko Faculty of Computer Science, TU Dresden 22
64 SOLUTION OUTLINE Transport Authority - Operates on pseudonyms - Can correlate travel records for billing - Cannot identify users 1. (Bill, Pseudonym) External TTP - Does not know user travel patterns 2. (Bill, ID) 4. Aggregated Payment - Can identify users - Performs end user billing 3. (Payment, ID) Information minimization Separation of concerns A Privacy-Preserving E-Ticketing System Ivan Gudymenko Faculty of Computer Science, TU Dresden 23
65 THE SUGGESTED PRIVACY-PRESERVING FRAMEWORK Transport Authority (TA) E-tickets E-ticket 1 Check-in/out 1. SC Establishment Terminals Terminal 1 E-ticket 2 2. Mutual Authent. Terminal E-ticket n 3. BL Check Terminal n Real-time Backbone Network Travel Rec. Update BL Non-real-time Back-end Travel records Processing: - Singulation - Billing T (BillD P i, Aggregated Payment Trusted Third Party External TTP - End User Identification - End User Billing (BillD ID, (PaymentD ID, Front-end Interaction (time critical, Back-end Processing Distributed Billing A Privacy-Preserving E-Ticketing System Ivan Gudymenko Faculty of Computer Science, TU Dresden 24
66 PATH RECONSTRUCTION: PSEUDONYMISATION Privacy-preserving eticketing System Path Reconstruction (back-end) - non-identifiability - traceability (singulation) Chosen approach: - A custom pseudonymisation scheme A Privacy-Preserving E-Ticketing System Ivan Gudymenko Faculty of Computer Science, TU Dresden 25
67 PATH RECONSTRUCTION: PSEUDONYMISATION Transport Authority (TA) E-tickets E-ticket 1 Check-in/out 1. SC Establishment Terminals Terminal 1 E-ticket 2 2. Mutual Authent. Terminal E-ticket n 3. BL Check Terminal n Real-time Backbone Network Send TR Update BL Non-real-time Back-end Travel records Processing: - Singulation - Billing T (Billz P i, Aggregated Payment External TTP - End User Identification - End User Billing (Billz ID, (Paymentz ID, Randomization for untraceability SP 1 SP 2 Singulation Decrypt P i T P i T Decrypt ID... SP j (Bill, P i T ) (Bill, ID) A Privacy-Preserving E-Ticketing System Ivan Gudymenko Faculty of Computer Science, TU Dresden 26
68 LOCAL REVOCATION BASED ON BLACKLISTS Privacy-preserving eticketing System Local Revocation (front-end) - non-identifiability - non-traceability Chosen approach: - A custom blacklisting scheme A Privacy-Preserving E-Ticketing System Ivan Gudymenko Faculty of Computer Science, TU Dresden 27
69 LOCAL REVOCATION BASED ON BLACKLISTS Based on the inherent homomorphism of an encryption scheme in use: Pi A E k P T ta i ; Homomorphic property: Epx rq Epxq r ; On validation, an e-ticket presents a tuple to a terminal: SPT Ð Epx rq, Eprq ; Black list: ty : y P BLu; Check SP j against the P BL, Eprq P SPT : c Ð Eprq y c? Epx P C. A Privacy-Preserving E-Ticketing System Ivan Gudymenko Faculty of Computer Science, TU Dresden 28
70 LOCAL REVOCATION BASED ON BLACKLISTS Based on the inherent homomorphism of an encryption scheme in use: Pi A E k P T ta i ; Homomorphic property: Epx rq Epxq r ; On validation, an e-ticket presents a tuple to a terminal: SPT Ð Epx rq, Eprq ; Black list: ty : y P BLu; Check SP j against the P BL, Eprq P SPT : c Ð Eprq y c? Epx P C. A Privacy-Preserving E-Ticketing System Ivan Gudymenko Faculty of Computer Science, TU Dresden 28
71 LOCAL REVOCATION BASED ON BLACKLISTS Based on the inherent homomorphism of an encryption scheme in use: Pi A E k P T ta i ; Homomorphic property: Epx rq Epxq r ; On validation, an e-ticket presents a tuple to a terminal: SPT Ð Epx rq, Eprq ; Black list: ty : y P BLu; Check SP j against the P BL, Eprq P SPT : c Ð Eprq y c? Epx P C. A Privacy-Preserving E-Ticketing System Ivan Gudymenko Faculty of Computer Science, TU Dresden 28
72 LOCAL REVOCATION BASED ON BLACKLISTS Based on the inherent homomorphism of an encryption scheme in use: Pi A E k P T ta i ; Homomorphic property: Epx rq Epxq r ; On validation, an e-ticket presents a tuple to a terminal: SPT Ð Epx rq, Eprq ; Black list: ty : y P BLu; Check SP j against the P BL, Eprq P SPT : c Ð Eprq y c? Epx P C. A Privacy-Preserving E-Ticketing System Ivan Gudymenko Faculty of Computer Science, TU Dresden 28
73 LOCAL REVOCATION BASED ON BLACKLISTS Based on the inherent homomorphism of an encryption scheme in use: Pi A E k P T ta i ; Homomorphic property: Epx rq Epxq r ; On validation, an e-ticket presents a tuple to a terminal: SPT Ð Epx rq, Eprq ; Black list: ty : y P BLu; Check SP j against the P BL, Eprq P SPT : c Ð Eprq y c? Epx P C. A Privacy-Preserving E-Ticketing System Ivan Gudymenko Faculty of Computer Science, TU Dresden 28
74 LOCAL REVOCATION BASED ON BLACKLISTS Based on the inherent homomorphism of an encryption scheme in use: Pi A E k P T ta i ; Homomorphic property: Epx rq Epxq r ; On validation, an e-ticket presents a tuple to a terminal: SPT Ð Epx rq, Eprq ; Black list: ty : y P BLu; Check SP j against the P BL, Eprq P SPT : c Ð Eprq y c? Epx P C. A Privacy-Preserving E-Ticketing System Ivan Gudymenko Faculty of Computer Science, TU Dresden 28
75 LOCAL REVOCATION BASED ON BLACKLISTS (2) Check-in/Check-out E-tickets Terminals E-ticket 1 1. SC Establishment Terminal 1 E-ticket 2 2. Mutual Authent. Terminal BL Check E-ticket n Terminal n Real-time Backbone Communication A Privacy-Preserving E-Ticketing System Ivan Gudymenko Faculty of Computer Science, TU Dresden 29
76 LOCAL REVOCATION: BOOSTING PERFORMANCE Basic version has linear complexity in the number of blacklisted elements The anonymity set of each session pseudonym can be reduced in a controllable way Additional k-anonymous identifier Results in partitioned blacklist and Op1q in the number of blacklisted elements A Privacy-Preserving E-Ticketing System Ivan Gudymenko Faculty of Computer Science, TU Dresden 30
77 LOCAL REVOCATION: BOOSTING PERFORMANCE Basic version has linear complexity in the number of blacklisted elements The anonymity set of each session pseudonym can be reduced in a controllable way Additional k-anonymous identifier Results in partitioned blacklist and Op1q in the number of blacklisted elements A Privacy-Preserving E-Ticketing System Ivan Gudymenko Faculty of Computer Science, TU Dresden 30
78 LOCAL REVOCATION: BOOSTING PERFORMANCE Basic version has linear complexity in the number of blacklisted elements The anonymity set of each session pseudonym can be reduced in a controllable way Additional k-anonymous identifier Results in partitioned blacklist and Op1q in the number of blacklisted elements A Privacy-Preserving E-Ticketing System Ivan Gudymenko Faculty of Computer Science, TU Dresden 30
79 LOCAL REVOCATION: BOOSTING PERFORMANCE Basic version has linear complexity in the number of blacklisted elements The anonymity set of each session pseudonym can be reduced in a controllable way Additional k-anonymous identifier Results in partitioned blacklist and Op1q in the number of blacklisted elements A Privacy-Preserving E-Ticketing System Ivan Gudymenko Faculty of Computer Science, TU Dresden 30
80 LOCAL REVOCATION: BOOSTING PERFORMANCE Basic version has linear complexity in the number of blacklisted elements The anonymity set of each session pseudonym can be reduced in a controllable way Additional k-anonymous identifier Results in partitioned blacklist and Op1q in the number of blacklisted elements A Privacy-Preserving E-Ticketing System Ivan Gudymenko Faculty of Computer Science, TU Dresden 30
81 PRIVACY-PRESERVING MUTUAL AUTHENTICATION Privacy-preserving eticketing System Mutual Authentication (front-end) - non-identifiability - non-traceability Chosen approach: - A slightly modified certificate-based authentication A Privacy-Preserving E-Ticketing System Ivan Gudymenko Faculty of Computer Science, TU Dresden 31
82 PRIVACY-PRESERVING MUTUAL AUTHENTICATION A variation of the certificate-based authentication Alternatively, more profound group signatures can be used Key K e Ð pk gr, k grq K t Ð pk t, k t q K ta Ð pk ta, k ta q Type group key pair of an e-ticket; unique key pair of a terminal; unique key pair of a transport authority; A Privacy-Preserving E-Ticketing System Ivan Gudymenko Faculty of Computer Science, TU Dresden 32
83 THE DEVELOPED PROTOTYPE PN532 NFC Breakout Board via SPI on Raspberry Pi Model B 256MB RAM NFC Smart phone: Samsung Galaxy Nexus GT-I9250 A Privacy-Preserving E-Ticketing System Ivan Gudymenko Faculty of Computer Science, TU Dresden 33
84 THE DEVELOPED PROTOTYPE PN532 NFC Breakout Board via SPI on Raspberry Pi Model B 256MB RAM NFC Smart phone: Samsung Galaxy Nexus GT-I9250 A Privacy-Preserving E-Ticketing System Ivan Gudymenko Faculty of Computer Science, TU Dresden 33
85 THE DEVELOPED PROTOTYPE PN532 NFC Breakout Board via SPI on Raspberry Pi Model B 256MB RAM NFC Smart phone: Samsung Galaxy Nexus GT-I9250 A Privacy-Preserving E-Ticketing System Ivan Gudymenko Faculty of Computer Science, TU Dresden 33
86 THE DEVELOPED PROTOTYPE PN532 NFC Breakout Board via SPI on Raspberry Pi Model B 256MB RAM NFC Smart phone: Samsung Galaxy Nexus GT-I9250 A Privacy-Preserving E-Ticketing System Ivan Gudymenko Faculty of Computer Science, TU Dresden 33
87 A SHORT DEMO Check-in/check-out session: a video demonstration A Privacy-Preserving E-Ticketing System Ivan Gudymenko Faculty of Computer Science, TU Dresden 34
88 PROTOTYPE PERFORMANCE Execution time vs. the size of the blacklist 2500 execution time, ms B A k opt = blacklist size (# of elements) A Privacy-Preserving E-Ticketing System Ivan Gudymenko Faculty of Computer Science, TU Dresden 35
89 INTEGRATION OF OUR SOLUTION INTO REAL-WORLD SYSTEMS Can be achieved at a relatively low cost, since: Our solution is based on loose-coupling Multi-entity environment (interoperability and separation of concerns): The interfaces for accommodating TTP are already present E.g., KVP in eticket Germany (VDV-KA) Leveraging the cryptographic mechanisms supported by constrained devices Smart card industry Smart phone industry A Privacy-Preserving E-Ticketing System Ivan Gudymenko Faculty of Computer Science, TU Dresden 36
90 INTEGRATION OF OUR SOLUTION INTO REAL-WORLD SYSTEMS Can be achieved at a relatively low cost, since: Our solution is based on loose-coupling Multi-entity environment (interoperability and separation of concerns): The interfaces for accommodating TTP are already present E.g., KVP in eticket Germany (VDV-KA) Leveraging the cryptographic mechanisms supported by constrained devices Smart card industry Smart phone industry A Privacy-Preserving E-Ticketing System Ivan Gudymenko Faculty of Computer Science, TU Dresden 36
91 INTEGRATION OF OUR SOLUTION INTO REAL-WORLD SYSTEMS Can be achieved at a relatively low cost, since: Our solution is based on loose-coupling Multi-entity environment (interoperability and separation of concerns): The interfaces for accommodating TTP are already present E.g., KVP in eticket Germany (VDV-KA) Leveraging the cryptographic mechanisms supported by constrained devices Smart card industry Smart phone industry A Privacy-Preserving E-Ticketing System Ivan Gudymenko Faculty of Computer Science, TU Dresden 36
92 INTEGRATION OF OUR SOLUTION INTO REAL-WORLD SYSTEMS Can be achieved at a relatively low cost, since: Our solution is based on loose-coupling Multi-entity environment (interoperability and separation of concerns): The interfaces for accommodating TTP are already present E.g., KVP in eticket Germany (VDV-KA) Leveraging the cryptographic mechanisms supported by constrained devices Smart card industry Smart phone industry A Privacy-Preserving E-Ticketing System Ivan Gudymenko Faculty of Computer Science, TU Dresden 36
93 INTEGRATION OF OUR SOLUTION INTO REAL-WORLD SYSTEMS Can be achieved at a relatively low cost, since: Our solution is based on loose-coupling Multi-entity environment (interoperability and separation of concerns): The interfaces for accommodating TTP are already present E.g., KVP in eticket Germany (VDV-KA) Leveraging the cryptographic mechanisms supported by constrained devices Smart card industry Smart phone industry A Privacy-Preserving E-Ticketing System Ivan Gudymenko Faculty of Computer Science, TU Dresden 36
94 INTEGRATION OF OUR SOLUTION INTO REAL-WORLD SYSTEMS Can be achieved at a relatively low cost, since: Our solution is based on loose-coupling Multi-entity environment (interoperability and separation of concerns): The interfaces for accommodating TTP are already present E.g., KVP in eticket Germany (VDV-KA) Leveraging the cryptographic mechanisms supported by constrained devices Smart card industry Smart phone industry A Privacy-Preserving E-Ticketing System Ivan Gudymenko Faculty of Computer Science, TU Dresden 36
95 INTEGRATION OF OUR SOLUTION INTO REAL-WORLD SYSTEMS Can be achieved at a relatively low cost, since: Our solution is based on loose-coupling Multi-entity environment (interoperability and separation of concerns): The interfaces for accommodating TTP are already present E.g., KVP in eticket Germany (VDV-KA) Leveraging the cryptographic mechanisms supported by constrained devices Smart card industry Smart phone industry A Privacy-Preserving E-Ticketing System Ivan Gudymenko Faculty of Computer Science, TU Dresden 36
96 INTEGRATION OF OUR SOLUTION INTO REAL-WORLD SYSTEMS Can be achieved at a relatively low cost, since: Our solution is based on loose-coupling Multi-entity environment (interoperability and separation of concerns): The interfaces for accommodating TTP are already present E.g., KVP in eticket Germany (VDV-KA) Leveraging the cryptographic mechanisms supported by constrained devices Smart card industry Smart phone industry A Privacy-Preserving E-Ticketing System Ivan Gudymenko Faculty of Computer Science, TU Dresden 36
97 INTEGRATION OF OUR SOLUTION INTO REAL-WORLD SYSTEMS Can be achieved at a relatively low cost, since: Our solution is based on loose-coupling Multi-entity environment (interoperability and separation of concerns): The interfaces for accommodating TTP are already present E.g., KVP in eticket Germany (VDV-KA) Leveraging the cryptographic mechanisms supported by constrained devices Smart card industry Smart phone industry A Privacy-Preserving E-Ticketing System Ivan Gudymenko Faculty of Computer Science, TU Dresden 36
98 CURRENT CHALLENGES: CONCEPT Secure proof of correctness and well-formedness of the tuple delivered to the terminal: without relying on device tamper-resistance and on the security of transport authority s security domain More efficient local revocation: advanced cryptographic tools impose additional restrictions (require further assumptions) efficiency considerations. Securing critical info on a smart phone (keys, etc.) no tamper-resistant storage by default A Privacy-Preserving E-Ticketing System Ivan Gudymenko Faculty of Computer Science, TU Dresden 37
99 CURRENT CHALLENGES: CONCEPT Secure proof of correctness and well-formedness of the tuple delivered to the terminal: without relying on device tamper-resistance and on the security of transport authority s security domain More efficient local revocation: advanced cryptographic tools impose additional restrictions (require further assumptions) efficiency considerations. Securing critical info on a smart phone (keys, etc.) no tamper-resistant storage by default A Privacy-Preserving E-Ticketing System Ivan Gudymenko Faculty of Computer Science, TU Dresden 37
100 CURRENT CHALLENGES: CONCEPT Secure proof of correctness and well-formedness of the tuple delivered to the terminal: without relying on device tamper-resistance and on the security of transport authority s security domain More efficient local revocation: advanced cryptographic tools impose additional restrictions (require further assumptions) efficiency considerations. Securing critical info on a smart phone (keys, etc.) no tamper-resistant storage by default A Privacy-Preserving E-Ticketing System Ivan Gudymenko Faculty of Computer Science, TU Dresden 37
101 CURRENT CHALLENGES: CONCEPT Secure proof of correctness and well-formedness of the tuple delivered to the terminal: without relying on device tamper-resistance and on the security of transport authority s security domain More efficient local revocation: advanced cryptographic tools impose additional restrictions (require further assumptions) efficiency considerations. Securing critical info on a smart phone (keys, etc.) no tamper-resistant storage by default A Privacy-Preserving E-Ticketing System Ivan Gudymenko Faculty of Computer Science, TU Dresden 37
102 CURRENT CHALLENGES: CONCEPT Secure proof of correctness and well-formedness of the tuple delivered to the terminal: without relying on device tamper-resistance and on the security of transport authority s security domain More efficient local revocation: advanced cryptographic tools impose additional restrictions (require further assumptions) efficiency considerations. Securing critical info on a smart phone (keys, etc.) no tamper-resistant storage by default A Privacy-Preserving E-Ticketing System Ivan Gudymenko Faculty of Computer Science, TU Dresden 37
103 CURRENT CHALLENGES: CONCEPT Secure proof of correctness and well-formedness of the tuple delivered to the terminal: without relying on device tamper-resistance and on the security of transport authority s security domain More efficient local revocation: advanced cryptographic tools impose additional restrictions (require further assumptions) efficiency considerations. Securing critical info on a smart phone (keys, etc.) no tamper-resistant storage by default A Privacy-Preserving E-Ticketing System Ivan Gudymenko Faculty of Computer Science, TU Dresden 37
104 CURRENT CHALLENGES: CONCEPT Secure proof of correctness and well-formedness of the tuple delivered to the terminal: without relying on device tamper-resistance and on the security of transport authority s security domain More efficient local revocation: advanced cryptographic tools impose additional restrictions (require further assumptions) efficiency considerations. Securing critical info on a smart phone (keys, etc.) no tamper-resistant storage by default A Privacy-Preserving E-Ticketing System Ivan Gudymenko Faculty of Computer Science, TU Dresden 37
105 CURRENT CHALLENGES: CONCEPT Secure proof of correctness and well-formedness of the tuple delivered to the terminal: without relying on device tamper-resistance and on the security of transport authority s security domain More efficient local revocation: advanced cryptographic tools impose additional restrictions (require further assumptions) efficiency considerations. Securing critical info on a smart phone (keys, etc.) no tamper-resistant storage by default A Privacy-Preserving E-Ticketing System Ivan Gudymenko Faculty of Computer Science, TU Dresden 37
106 CURRENT CHALLENGES: CONCEPT Secure proof of correctness and well-formedness of the tuple delivered to the terminal: without relying on device tamper-resistance and on the security of transport authority s security domain More efficient local revocation: advanced cryptographic tools impose additional restrictions (require further assumptions) efficiency considerations. Securing critical info on a smart phone (keys, etc.) no tamper-resistant storage by default A Privacy-Preserving E-Ticketing System Ivan Gudymenko Faculty of Computer Science, TU Dresden 37
107 CURRENT CHALLENGES: IMPLEMENTATION For off-the-shelf smart cards: resource constraints supported cryptographic operations are tailored for specific use cases and standards. In case of NFC-enabled handsets: interactive NFC interface (supporting challenge-response) turned out to be a problem supported NFC reader types are relatively slow (UART-to-USB vs. SPI) A Privacy-Preserving E-Ticketing System Ivan Gudymenko Faculty of Computer Science, TU Dresden 38
108 CURRENT CHALLENGES: IMPLEMENTATION For off-the-shelf smart cards: resource constraints supported cryptographic operations are tailored for specific use cases and standards. In case of NFC-enabled handsets: interactive NFC interface (supporting challenge-response) turned out to be a problem supported NFC reader types are relatively slow (UART-to-USB vs. SPI) A Privacy-Preserving E-Ticketing System Ivan Gudymenko Faculty of Computer Science, TU Dresden 38
109 CURRENT CHALLENGES: IMPLEMENTATION For off-the-shelf smart cards: resource constraints supported cryptographic operations are tailored for specific use cases and standards. In case of NFC-enabled handsets: interactive NFC interface (supporting challenge-response) turned out to be a problem supported NFC reader types are relatively slow (UART-to-USB vs. SPI) A Privacy-Preserving E-Ticketing System Ivan Gudymenko Faculty of Computer Science, TU Dresden 38
110 CURRENT CHALLENGES: IMPLEMENTATION For off-the-shelf smart cards: resource constraints supported cryptographic operations are tailored for specific use cases and standards. In case of NFC-enabled handsets: interactive NFC interface (supporting challenge-response) turned out to be a problem supported NFC reader types are relatively slow (UART-to-USB vs. SPI) A Privacy-Preserving E-Ticketing System Ivan Gudymenko Faculty of Computer Science, TU Dresden 38
111 CURRENT CHALLENGES: IMPLEMENTATION For off-the-shelf smart cards: resource constraints supported cryptographic operations are tailored for specific use cases and standards. In case of NFC-enabled handsets: interactive NFC interface (supporting challenge-response) turned out to be a problem supported NFC reader types are relatively slow (UART-to-USB vs. SPI) A Privacy-Preserving E-Ticketing System Ivan Gudymenko Faculty of Computer Science, TU Dresden 38
112 CURRENT CHALLENGES: IMPLEMENTATION For off-the-shelf smart cards: resource constraints supported cryptographic operations are tailored for specific use cases and standards. In case of NFC-enabled handsets: interactive NFC interface (supporting challenge-response) turned out to be a problem supported NFC reader types are relatively slow (UART-to-USB vs. SPI) A Privacy-Preserving E-Ticketing System Ivan Gudymenko Faculty of Computer Science, TU Dresden 38
113 CURRENT CHALLENGES: IMPLEMENTATION For off-the-shelf smart cards: resource constraints supported cryptographic operations are tailored for specific use cases and standards. In case of NFC-enabled handsets: interactive NFC interface (supporting challenge-response) turned out to be a problem supported NFC reader types are relatively slow (UART-to-USB vs. SPI) A Privacy-Preserving E-Ticketing System Ivan Gudymenko Faculty of Computer Science, TU Dresden 38
114 OUR SOLUTION: SUMMARY A privacy-preserving framework for e-ticketing systems Satisfies all the requirements Goes in line with the adopted attacker model A Privacy-Preserving E-Ticketing System Ivan Gudymenko Faculty of Computer Science, TU Dresden 39
115 OUR SOLUTION: SUMMARY A privacy-preserving framework for e-ticketing systems Satisfies all the requirements Goes in line with the adopted attacker model A Privacy-Preserving E-Ticketing System Ivan Gudymenko Faculty of Computer Science, TU Dresden 39
116 Thank you for your attention! Questions? Comments? Suggestions? A Privacy-Preserving E-Ticketing System Ivan Gudymenko Faculty of Computer Science, TU Dresden 40
117 REFERENCES I [1] F. Baldimtsi, G. Hinterwalder, A. Rupp, A. Lysyanskaya, C. Paar, and W. P. Burleson, Pay as you go, in Workshop on hot topics in privacy enhancing technologies, HotPETSs 2012, [2] T. S. Heydt-Benjamin, H.-J. Chae, B. Defend, and K. Fu, Privacy for Public Transportation, in Proceedings of the 6th international conference on Privacy Enhancing Technologies, PET 06, (Berlin, Heidelberg), pp. 1 19, Springer-Verlag, [3] A.-R. Sadeghi, I. Visconti, and C. Wachsmann, User Privacy in Transport Systems Based on RFID E-Tickets, in Workshop on Privacy in Location-Based Applications (PILBA 2008), vol of Lecture Notes in Computer Sciences, Springer-Verlag, October [4] F. Garcia and P. Rossum, Modeling Privacy for Off-Line RFID Systems, in Smart Card Research and Advanced Application (D. Gollmann, J.-L. Lanet, and J. Iguchi-Cartigny, eds.), vol of Lecture Notes in Computer Science, pp , Springer Berlin Heidelberg, [5] G. Avoine, C. Lauradoux, and T. Martin, When Compromised Readers Meet RFID, in Information Security Applications (H. Y. Youm and M. Yung, eds.), vol of Lecture Notes in Computer Science, pp , Springer Berlin Heidelberg, [6] M. Ohkubo, K. Suzuki, and S. Kinoshita, Cryptographic Approach to Privacy-Friendly Tags, in In RFID Privacy Workshop, [7] B. Song and C. J. Mitchell, Scalable RFID security protocols supporting tag ownership transfer, Comput. Commun., vol. 34, pp , apr [8] A. Juels and R. Pappu, Squealing Euros: Privacy Protection in RFID-Enabled Banknotes, in Financial Cryptography 03, pp , Springer-Verlag, [9] T.-L. Lim, T. Li, and S.-L. Yeo, Randomized Bit Encoding for Stronger Backward Channel Protection in RFID Systems, in Proceedings of the 2008 Sixth Annual IEEE International Conference on Pervasive Computing and Communications, PERCOM 08, (Washington, DC, USA), pp , IEEE Computer Society, A Privacy-Preserving E-Ticketing System Ivan Gudymenko Faculty of Computer Science, TU Dresden 41
118 REFERENCES II [10] W. Choi and B.-h. Roh, Backward Channel Protection Method for RFID Security Schemes Based on Tree-Walking Algorithms, in Computational Science and Its Applications - ICCSA 2006 (M. Gavrilova, O. Gervasi, V. Kumar, C. Tan, D. Taniar, A. Lagan, Y. Mun, and H. Choo, eds.), vol of Lecture Notes in Computer Science, pp , Springer Berlin / Heidelberg, [11] T.-L. Lim, T. Li, and S.-L. Yeo, A Cross-layer Framework for Privacy Enhancement in RFID systems, Pervasive and Mobile Computing, vol. 4, no. 6, pp , [12] I. Gudymenko, Protection of the Users Privacy in Ubiquitous RFID Systems, Master s thesis, Technische Universitt Dresden, Faculty of Computer Science, December A Privacy-Preserving E-Ticketing System Ivan Gudymenko Faculty of Computer Science, TU Dresden 42
119 BACKUP SLIDES A Privacy-Preserving E-Ticketing System Ivan Gudymenko Faculty of Computer Science, TU Dresden 43
120 FARE COLLECTION APPROACHES IN E-TICKETING Fare collection approaches 1. Electronic Paper Ticket (EPT) 2. Check-in/Check-out based (CICO) a) Pure CICO b) Seamless CICO i. Walk in/walk out (WIWO) ii. Be in/be out (BIBO) Focus on CICO-based systems A Privacy-Preserving E-Ticketing System Ivan Gudymenko Faculty of Computer Science, TU Dresden 44
121 A GENERAL APPLICATION SCENARIO: DETAILED Travel Records E-ticket Distribution Trip Begin Event Processing Unit (e.g. GPS-based) Back-end System E-ticket NFC Check-in E-ticket Smartcard On-board Reader (Terminal) Check-out NFC E-ticket E-ticket Smartcard - Event Storage - Distance Calculation - Billing - Customer Accounts Management - Statistics (1) (2a) (2b) (3) A Privacy-Preserving E-Ticketing System Ivan Gudymenko Faculty of Computer Science, TU Dresden 45
122 E-TICKETING: TECHNOLOGIES AND STANDARDS RFID-based stack (proximity cards); NFC stack (NFC-enabled devices); E-ticket Germany: Core Application (VDV-KA) Architecture ISO EN (conceptual framework) EN (logical level, abstract interface, security) Data Interfaces EN 1545 (data elements) ISO/IEC (commands, security) Communication Interface ISO (parts 1-3 required) RFID-based E-Ticketing Stack Reader/Writer Peer-to-Peer Card Emulation The NFC Forum Specifications VDV Core App. E-ticket Smartcard NFC A Privacy-Preserving E-Ticketing System Ivan Gudymenko Faculty of Computer Science, TU Dresden 46
123 WHY FINE-GRANULAR BILLING? An important feature (with high potential) Enables highly flexible fare polices (loyalty programs, individual discounts, etc.): Essential for a modern public transport market Personalized cards are often a preferred choice due to more services they provide [de Panizza et al., 2010]; Several real-world systems are already supporting regular billing (Hannover, Phoenix). A Privacy-Preserving E-Ticketing System Ivan Gudymenko Faculty of Computer Science, TU Dresden 47
124 E-TICKETING: MAIN ADVANTAGES For transport companies decrease in system maintenance costs; significant reduction of payment handling costs; fare dodgers rate improvement; better support of flexible pricing schemes; support of multiapplication/nontransit scenarios; a high interoperability potential. For customers faster verification of an e-ticket; pay as you go ; flexible pricing schemes; increased usability. A Privacy-Preserving E-Ticketing System Ivan Gudymenko Faculty of Computer Science, TU Dresden 48
125 FARE SYSTEM IN DANEMARK A Privacy-Preserving E-Ticketing System Ivan Gudymenko Faculty of Computer Science, TU Dresden 49
126 GENERIC PRIVACY THREATS IN E-TICKETING SYSTEMS 1. Unintended customer identification: a) Exposure of the customer ID: i. Personal ID exposure (direct identification); ii. Indirect identification through the relevant object s ID. b) Exposure of a non-encrypted identifier during the anti-collision session; c) Physical layer identification (RFID fingerprinting). 2. Information linkage; 3. Illegal customer profiling. Ñ A cross-layered set of countermeasures required. A Privacy-Preserving E-Ticketing System Ivan Gudymenko Faculty of Computer Science, TU Dresden 50
127 GENERIC COUNTERMEASURES Threats Countermeasures 1. Unintended customer identification: a) Exposure of the customer ID: i. Personal ID exposure (direct) Privacy-respecting authentication; ID encryption/randomization; access-control functions [8] ii. Indirect identification ID encryption b) Unencrypted ID during anti-collision Randomized bit encoding [9]; bit collision masking [10, 11] (protocol dependent) c) PHY-layer identification Shielding; switchable antennas [12] 2. Information linkage Anonymization (in front-end and back-end): threat 1 countermeasures; privacy-respecting data processing 3. Illegal customer profiling Privacy-respecting data storage (back-end); the same as in threat 1 Difficult to apply in a joint fashion. A Privacy-Preserving E-Ticketing System Ivan Gudymenko Faculty of Computer Science, TU Dresden 51
128 STATE OF THE ART Real-world systems Academic solutions A Privacy-Preserving E-Ticketing System Ivan Gudymenko Faculty of Computer Science, TU Dresden 52
129 REAL-WORLD SYSTEMS Primary focus on: direct functionality system security resource effectiveness (cost implications) Privacy is usually considered in the second place, if at all Frequently, privacy is traded-off for efficiency (as far as legislation allows) Examples: eticket Germany (KA), Metrô São Paulo,... A Privacy-Preserving E-Ticketing System Ivan Gudymenko Faculty of Computer Science, TU Dresden 53
130 ACADEMIC SOLUTIONS Loosely-coupled architecture Tightly-coupled architecture A Privacy-Preserving E-Ticketing System Ivan Gudymenko Faculty of Computer Science, TU Dresden 54
131 IMPORTANT EVALUATION CRITERIA Mutual authentication between terminals and e-ticket; E-ticket anonymity/untraceability against terminals; Trust assumptions (esp. concerning terminals); Back-end coupling; Regular billing support. A Privacy-Preserving E-Ticketing System Ivan Gudymenko Faculty of Computer Science, TU Dresden 55
132 ACADEMTIC SOLUTIONS: TAXONOMY E-ticketing Systems Close-coupled Loosely-coupled Fully Offline Semi-offline Asymmetric Crypto Symmetric Crypto Asymmetric Crypto Symmetric Crypto Asymmetric Crypto Symmetric Crypto E-cash based Linear Ohnf Logarithmic ~Ohlog nf Constant time OhYf E-cash based Reader-specific Tag Access Lists Full DB on a terminal E-cash based Precomputation (T-M Trade-off) Secrets Ordering Precomputed Look-up table HCDF [HvBenjamin et alv] OSK [Okubo et alv] Bloom filters [Nohara et alv] Tree structure [MWW] Yptime Pseudop nyms [SWM ] TanSL [Tan et alv] PAYG [Baldimtsi et alv] ALM [Avoine et alv] SWM Protocol [SongWMitchell] OSK Improved [Avoine et alv] Matrix structv [Cheon et alv] LpTier DB [Alomair et alv] GR [GarciaWRossum] A Privacy-Preserving E-Ticketing System Ivan Gudymenko Faculty of Computer Science, TU Dresden 56
133 ACADEMIC SOULUTIONS: ASSESSMENT Criteria The most relevant approaches Reviewed PAYG[1] HCDF[2] SVW[3] GR[4] ALM[5] OSK[6] RSMP[7] Anonymity terminals yes yes p no no yes yes Untraceability terminals yes yes p no no yes yes Mutual authentication no no no no yes no yes Close-coupling no yes no no no yes yes Regular billing no no no H H H H BE is trusted no no yes yes yes yes yes ATs are trusted no no yes yes yes no no Legend: H not considered; p partially provided; A Privacy-Preserving E-Ticketing System Ivan Gudymenko Faculty of Computer Science, TU Dresden 57
134 REQUIREMENTS: PRIVACY AGAINST TERMINALS (1) Privacy (a) Against terminals Identification: Correlation: no no Check-in/out E-tickets Terminals E-ticket 1 Terminal 1 E-ticket 2 Terminal E-ticket n Terminal n Real-time Backbone Network Non-real-time Back-end TR Processing: - Singulation - Billing - Identification A Privacy-Preserving E-Ticketing System Ivan Gudymenko Faculty of Computer Science, TU Dresden 58
135 REQUIREMENTS: PRIVACY AGAINST THE BACK-END (1) Privacy (b) Against back-end Identification: no Correlation: yes Check-in/out E-tickets Terminals E-ticket 1 Terminal 1 E-ticket 2 Terminal E-ticket n Terminal n Real-time Backbone Network Non-real-time Back-end TR Processing: - Singulation - Billing - Identification A Privacy-Preserving E-Ticketing System Ivan Gudymenko Faculty of Computer Science, TU Dresden 59
136 REQUIREMENTS AGAINST OBSERVERS (1) Privacy (c) Against observers PII Derivation: no Check-in/out E-tickets External Observer Terminals E-ticket 1 E-ticket 2... Terminal 1 Terminal 2... E-ticket n Terminal n Real-time Backbone Network Non-real-time Back-end TR Processing: - Singulation - Billing - Identification A Privacy-Preserving E-Ticketing System Ivan Gudymenko Faculty of Computer Science, TU Dresden 60
137 REQUIREMENTS: FINE-GRANULAR BILLING SUPPORT (2) Fine-granular billing support Enabling best price calculation and discounts Tariff schemes must be separated from system architecture Check-in/out E-tickets Terminals E-ticket 1 Terminal 1 E-ticket 2 Terminal E-ticket n Terminal n Real-time Backbone Network Non-real-time Back-end TR Processing: - Singulation - Billing - Identification A Privacy-Preserving E-Ticketing System Ivan Gudymenko Faculty of Computer Science, TU Dresden 61
138 REQUIREMENTS: LOOSE-COUPLING (3) Loose-coupling Large-scale distribution; Compatibility to real-world systems (e.g., Metrô São Paulo, Dresdner Verskehrsbetriebe) Check-in/out E-tickets Terminals E-ticket 1 Terminal 1 E-ticket 2 Terminal E-ticket n Terminal n Real-time Backbone Network Non-real-time Back-end TR Processing: - Singulation - Billing - Identification A Privacy-Preserving E-Ticketing System Ivan Gudymenko Faculty of Computer Science, TU Dresden 62
139 REQUIREMENTS: EFFICIENCY (4) Efficiency Check-in/out events handling Time-critical Directly affects customer experience Check-in/out E-tickets Terminals E-ticket 1 Terminal 1 E-ticket 2 Terminal E-ticket n Terminal n Real-time Backbone Network Non-real-time Back-end TR Processing: - Singulation - Billing - Identification A Privacy-Preserving E-Ticketing System Ivan Gudymenko Faculty of Computer Science, TU Dresden 63
140 REQUIREMENTS: MULTILATERAL SECURITY (5) Multilateral security Security goals of transport authority Security goals of users User Transport authority Dresden A Privacy-Preserving E-Ticketing System Ivan Gudymenko Faculty of Computer Science, TU Dresden 64
141 CHALLENGES: MUTUAL AUTHENTICATION 1. Dynamic extensibility. Support for dynamic accommodation of new e-tickets is a must. 2. Bootstrapping authentication. Enabling authentication without tracking. 3. Implications for path reconstruction. Fully anonymous mutual authentication prohibits path reconstruction in the back-end 4. Efficiency. Advanced methods often have negative efficiency implications and can be resource prohibitive for constrained devices. Ñ In our solution, a slightly modified certificate-based approach is chosen. A Privacy-Preserving E-Ticketing System Ivan Gudymenko Faculty of Computer Science, TU Dresden 65
142 CHALLENGES: LOCAL REVOCATION 1. Determine (on the fly) if an e-ticket is valid or not 2. Without being able to track or identify e-tickets 3. Valid e-tickets must remain anonymous (to the terminal) and untraceable 4. Cryptographic tools like various cryptographic accumulators do not suit Ñ Our solution considers a custom blacklisting scheme A Privacy-Preserving E-Ticketing System Ivan Gudymenko Faculty of Computer Science, TU Dresden 66
143 CHALLENGES: PATH RECONSTRUCTION 1. The supported fare schemes need to be flexible and extensible 2. It should be possible to combine the rides to issue discounts 3. At the same time, in a privacy-preserving way 4. Simple fare schemes (e.g. matrix-based) allow for privacy-preserving billing with decent privacy properties Efficiency is an issue, though [KHG13] Ñ Our solution is based on a special pseudonymisation scheme A Privacy-Preserving E-Ticketing System Ivan Gudymenko Faculty of Computer Science, TU Dresden 67
144 LOCAL REVOCATION BASED ON BLACKLISTS: A CHOICE OF A SUITABLE ENCRYPTION SCHEME Based on the discrete exponentiation function Epxq g x pmod pq Homomorphic property: Epx rq g px rq g x r Epxq r. pmod pq Okamoto-Uchiyama trapdoor as a private key Other inherently homomorphic deterministic schemes possible. A Privacy-Preserving E-Ticketing System Ivan Gudymenko Faculty of Computer Science, TU Dresden 68
145 LOCAL REVOCATION BASED ON BLACKLISTS: A CHOICE OF A SUITABLE ENCRYPTION SCHEME Based on the discrete exponentiation function Epxq g x pmod pq Homomorphic property: Epx rq g px rq g x r Epxq r. pmod pq Okamoto-Uchiyama trapdoor as a private key Other inherently homomorphic deterministic schemes possible. A Privacy-Preserving E-Ticketing System Ivan Gudymenko Faculty of Computer Science, TU Dresden 68
146 LOCAL REVOCATION BASED ON BLACKLISTS: A CHOICE OF A SUITABLE ENCRYPTION SCHEME Based on the discrete exponentiation function Epxq g x pmod pq Homomorphic property: Epx rq g px rq g x r Epxq r. pmod pq Okamoto-Uchiyama trapdoor as a private key Other inherently homomorphic deterministic schemes possible. A Privacy-Preserving E-Ticketing System Ivan Gudymenko Faculty of Computer Science, TU Dresden 68
147 LOCAL REVOCATION BASED ON BLACKLISTS: A CHOICE OF A SUITABLE ENCRYPTION SCHEME Based on the discrete exponentiation function Epxq g x pmod pq Homomorphic property: Epx rq g px rq g x r Epxq r. pmod pq Okamoto-Uchiyama trapdoor as a private key Other inherently homomorphic deterministic schemes possible. A Privacy-Preserving E-Ticketing System Ivan Gudymenko Faculty of Computer Science, TU Dresden 68
148 LOCAL REVOCATION BASED ON BLACKLISTS: A CHOICE OF A SUITABLE ENCRYPTION SCHEME Based on the discrete exponentiation function Epxq g x pmod pq Homomorphic property: Epx rq g px rq g x r Epxq r. pmod pq Okamoto-Uchiyama trapdoor as a private key Other inherently homomorphic deterministic schemes possible. A Privacy-Preserving E-Ticketing System Ivan Gudymenko Faculty of Computer Science, TU Dresden 68
149 LOCAL REVOCATION BASED ON BLACKLISTS: A CHOICE OF A SUITABLE ENCRYPTION SCHEME Based on the discrete exponentiation function Epxq g x pmod pq Homomorphic property: Epx rq g px rq g x r Epxq r. pmod pq Okamoto-Uchiyama trapdoor as a private key Other inherently homomorphic deterministic schemes possible. A Privacy-Preserving E-Ticketing System Ivan Gudymenko Faculty of Computer Science, TU Dresden 68
150 OTHER ACADEMIC SOLUTIONS AND OURS Criteria The most relevant approaches Reviewed PAYG[1] HCDF[2] SVW[3] GR[4] ALM[5] OSK[6] RSMP[7] Our Anonymity terminals yes yes p no no yes yes yes Untraceability terminals yes yes p no no yes yes yes Mutual authentication no no no no yes no yes yes Close-coupling no yes no no no yes yes no Regular billing no no no H H H H yes BE is trusted no no yes yes yes yes yes no ATs are trusted no no yes yes yes no no no Legend: H not considered; p partially provided; A Privacy-Preserving E-Ticketing System Ivan Gudymenko Faculty of Computer Science, TU Dresden 69
2 Advantages and Disadvantages of E-ticketing
Fakultät Informatik Institut für Systemarchitektur State-of-the-Art Privacy Analysis of E-ticketing Systems Work in progress April 2012 Abstract This essay performs state-of-the-art privacy analysis of
A Simple and Secure E-Ticketing System for Intelligent Public Transportation based on NFC
A Simple and Secure E-Ticketing System for Intelligent Public Transportation based on NFC Ivan Gudymenko TU Dresden 01062 Dresden Saxony, Germany [email protected] Felipe Sousa UFCG
A Secure RFID Ticket System For Public Transport
A Secure RFID Ticket System For Public Transport Kun Peng and Feng Bao Institute for Infocomm Research, Singapore Abstract. A secure RFID ticket system for public transport is proposed in this paper. It
Privacy-preserving E-ticketing Systems for Public Transport Based on RFID/NFC Technologies
Fakultät Informatik Institut für Systemarchitektur Privacy-preserving E-ticketing Systems for Public Transport Based on RFID/NFC Technologies Dissertation Submitted to the Faculty of Computer Science,
Tackling Security and Privacy Issues in Radio Frequency Identification Devices
Tackling Security and Privacy Issues in Radio Frequency Identification Devices Dirk Henrici and Paul Müller University of Kaiserslautern, Department of Computer Science, PO Box 3049 67653 Kaiserslautern,
Back-end Server Reader Tag
A Privacy-preserving Lightweight Authentication Protocol for Low-Cost RFID Tags Shucheng Yu, Kui Ren, and Wenjing Lou Department of ECE, Worcester Polytechnic Institute, MA 01609 {yscheng, wjlou}@wpi.edu
Strengthen RFID Tags Security Using New Data Structure
International Journal of Control and Automation 51 Strengthen RFID Tags Security Using New Data Structure Yan Liang and Chunming Rong Department of Electrical Engineering and Computer Science, University
Security/Privacy Models for "Internet of things": What should be studied from RFID schemes? Daisuke Moriyama and Shin ichiro Matsuo NICT, Japan
Security/Privacy Models for "Internet of things": What should be studied from RFID schemes? Daisuke Moriyama and Shin ichiro Matsuo NICT, Japan 1 Internet of Things (IoT) CASAGRAS defined that: A global
Security and Privacy Flaws in a Recent Authentication Protocol for EPC C1 G2 RFID Tags
Security and Privacy Flaws in a Recent Authentication Protocol for EPC C1 G2 RFID Tags Seyed Mohammad Alavi 1, Karim Baghery 2 and Behzad Abdolmaleki 3 1 Imam Hossein Comprehensive University Tehran, Iran
An NFC Ticketing System with a new approach of an Inverse Reader Mode
An NFC Ticketing System with a new approach of an Inverse Reader Mode Christian Saminger, Stefan Grünberger and Josef Langer NFC University of Applied Sciences Upper Austria 5 th International Workshop
Touch & Travel a SIM-based eticketing System
Touch & Travel a SIM-based eticketing System NFC Congress Austria 08 Dr. Stephan Spitz G&D [email protected] Agenda Project Overview System Overview Applied New Technologies and Standards Seite 2
A Study on the Security of RFID with Enhancing Privacy Protection
A Study on the Security of RFID with Enhancing Privacy Protection *Henry Ker-Chang Chang, *Li-Chih Yen and *Wen-Chi Huang *Professor and *Graduate Students Graduate Institute of Information Management
50 ways to break RFID privacy
50 ways to break RFID privacy Ton van Deursen 1 University of Luxembourg [email protected] 1 Financial support received from the Fonds National de la Recherche (Luxembourg). RFID privacy 1 / 40 Outline
Information Security in Big Data using Encryption and Decryption
International Research Journal of Computer Science (IRJCS) ISSN: 2393-9842 Information Security in Big Data using Encryption and Decryption SHASHANK -PG Student II year MCA S.K.Saravanan, Assistant Professor
A Survey of RFID Authentication Protocols Based on Hash-Chain Method
Third 2008 International Conference on Convergence and Hybrid Information Technology A Survey of RFID Authentication Protocols Based on Hash-Chain Method Irfan Syamsuddin a, Tharam Dillon b, Elizabeth
Privacy and Security in library RFID Issues, Practices and Architecture
Privacy and Security in library RFID Issues, Practices and Architecture David Molnar and David Wagner University of California, Berkeley CCS '04 October 2004 Overview Motivation RFID Background Library
A Secure and Open Solution for Seamless Transit Systems
A Secure and Open Solution for Seamless Transit Systems Today s Proprietary Fare Collection Systems Transit operators must combat growing security threats while identifying new revenue sources and enhancing
Top Ten Security and Privacy Challenges for Big Data and Smartgrids. Arnab Roy Fujitsu Laboratories of America
1 Top Ten Security and Privacy Challenges for Big Data and Smartgrids Arnab Roy Fujitsu Laboratories of America 2 User Roles and Security Concerns [SKCP11] Users and Security Concerns [SKCP10] Utilities:
Single Sign-On Secure Authentication Password Mechanism
Single Sign-On Secure Authentication Password Mechanism Deepali M. Devkate, N.D.Kale ME Student, Department of CE, PVPIT, Bavdhan, SavitribaiPhule University Pune, Maharashtra,India. Assistant Professor,
Scalable RFID Security Protocols supporting Tag Ownership Transfer
Scalable RFID Security Protocols supporting Tag Ownership Transfer Boyeon Song a,1, Chris J. Mitchell a,1 a Information Security Group, Royal Holloway, University of London, Egham, Surrey, TW20 0EX, UK
Enhanced Privacy ID (EPID) Ernie Brickell and Jiangtao Li Intel Corporation
Enhanced Privacy ID (EPID) Ernie Brickell and Jiangtao Li Intel Corporation 1 Agenda EPID overview EPID usages Device Authentication Government Issued ID EPID performance and standardization efforts 2
User Privacy in Transport Systems Based on RFID E-Tickets
User Privacy in Transport Systems Based on RFID E-Tickets Ahmad-Reza Sadeghi 1, Ivan Visconti 2, and Christian Wachsmann 1 1 Ruhr-University Bochum Horst-Görtz Institute for IT-Security (HGI), Germany
An NFC Ticketing System with a new approach of an Inverse Reader Mode
An NFC Ticketing System with a new approach of an Inverse Reader Mode Dresden, 22/11/2013 Felipe de Sousa Silva Outline NFC Overview NFC Public Ticket System. Intention of the Inverse Reader Mode The Inverse
SECURITY IMPLICATIONS OF NFC IN AUTHENTICATION AND IDENTITY MANAGEMENT
SECURITY IMPLICATIONS OF NFC IN AUTHENTICATION AND IDENTITY MANAGEMENT Dmitry Barinov SecureKey Technologies Inc. Session ID: MBS-W09 Session Classification: Advanced Session goals Appreciate the superior
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi Purpose This paper is intended to describe the benefits of smart card implementation and it combination with Public
RFID Security: Threats, solutions and open challenges
RFID Security: Threats, solutions and open challenges Bruno Crispo Vrije Universiteit Amsterdam [email protected] 1 Table of Content RFID technology and applications Security Issues Privacy Proposed (partial)
A Vulnerability in the Song Authentication Protocol for Low-Cost RFID Tags
A Vulnerability in the Song Authentication Protocol for Low-Cost RFID Tags Sarah Abughazalah, Konstantinos Markantonakis, and Keith Mayes Smart Card Centre-Information Security Group (SCC-ISG) Royal Holloway,
Privacy-preserving Digital Identity Management for Cloud Computing
Privacy-preserving Digital Identity Management for Cloud Computing Elisa Bertino [email protected] Federica Paci [email protected] Ning Shang [email protected] Rodolfo Ferrini [email protected]
A secure email login system using virtual password
A secure email login system using virtual password Bhavin Tanti 1,Nishant Doshi 2 1 9seriesSoftwares, Ahmedabad,Gujarat,India 1 {[email protected]} 2 SVNIT, Surat,Gujarat,India 2 {[email protected]}
Best Practices for the Use of RF-Enabled Technology in Identity Management. January 2007. Developed by: Smart Card Alliance Identity Council
Best Practices for the Use of RF-Enabled Technology in Identity Management January 2007 Developed by: Smart Card Alliance Identity Council Best Practices for the Use of RF-Enabled Technology in Identity
Privacy in e-ticketing & e-identity
Privacy in e-ticketing & e-identity Attribute-proving for Smart Cards ir. Pim Vullers [email protected] Institute for Computing and Information Sciences Digital Security 17th May 2011 Pim Vullers Collis
Rfid Authentication Protocol for security and privacy Maintenance in Cloud Based Employee Management System
Rfid Authentication Protocol for security and privacy Maintenance in Cloud Based Employee Management System ArchanaThange Post Graduate Student, DKGOI s COE, Swami Chincholi, Maharashtra, India [email protected],
A Survey on Untransferable Anonymous Credentials
A Survey on Untransferable Anonymous Credentials extended abstract Sebastian Pape Databases and Interactive Systems Research Group, University of Kassel Abstract. There are at least two principal approaches
Security Requirements for RFID Computing Systems
International Journal of Network Security, Vol.6, No.2, PP.214 226, Mar. 2008 214 Security Requirements for RFID Computing Systems Xiaolan Zhang 1 and Brian King 2 (Corresponding author: Xiaolan Zhang)
E-Visas Verification Schemes Based on Public-Key Infrastructure and Identity Based Encryption
Journal of Computer Science 6 (7): 723-727, 2010 ISSN 1549-3636 2010 Science Publications E-Visas Verification Schemes Based on Public-Key Infrastructure and Identity Based Encryption Najlaa A. Abuadhmah,
SECURITY ANALYSIS OF PASSWORD BASED MUTUAL AUTHENTICATION METHOD FOR REMOTE USER
SECURITY ANALYSIS OF PASSWORD BASED MUTUAL AUTHENTICATION METHOD FOR REMOTE USER Mrs. P.Venkateswari Assistant Professor / CSE Erode Sengunthar Engineering College, Thudupathi ABSTRACT Nowadays Communication
On the Security of RFID
On the Security of RFID Hung-Min Sun Information Security Lab. Department of Computer Science National Tsing Hua University slide 1 What is RFID? Radio-Frequency Identification Tag Reference http://glossary.ippaper.com
Training. MIFARE4Mobile. Public. MobileKnowledge April 2015
MIFARE4Mobile Public MobileKnowledge April 2015 Agenda Why MIFARE4Mobile? MIFARE in Mobile related technologies MIFARE technology NFC technology MIFARE4Mobile technology High level system architecture
Loyalty Systems over Near Field Communication (NFC)
Loyalty Systems over Near Field Communication (NFC) Diogo Simões IST - Technical University of Lisbon Av. Prof. Cavaco Silva Tagus Park 2780-990 Porto Salvo, Portugal [email protected] Abstract.
SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD
SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD S.REVATHI B.HASEENA M.NOORUL IZZATH PG Student PG Student PG Student II- ME CSE II- ME CSE II- ME CSE Al-Ameen Engineering
Full Drive Encryption Security Problem Definition - Encryption Engine
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 Full Drive Encryption Security Problem Definition - Encryption Engine Introduction for the FDE Collaborative Protection Profiles
Associate Prof. Dr. Victor Onomza Waziri
BIG DATA ANALYTICS AND DATA SECURITY IN THE CLOUD VIA FULLY HOMOMORPHIC ENCRYPTION Associate Prof. Dr. Victor Onomza Waziri Department of Cyber Security Science, School of ICT, Federal University of Technology,
Attribute-proving for Smart Cards
Attribute-proving for Smart Cards progress made over the past two years ir. Pim Vullers [email protected] Institute for Computing and Information Sciences Digital Security 5th October 2011 Pim Vullers
Significance of Tokenization in Promoting Cloud Based Secure Elements
Significance of Tokenization in Promoting Cloud Based Secure Elements Busra O zdenizci 1, Vedat Coskun 1*, Kerem Ok 1 and Turgay Karlidere 2 1 NFC Lab - Istanbul, Department of Information Technologies,
Documentation of Use Cases for NFC Mobile Devices in Public Transport
NFC Forum TM Market Requirements Document Documentation of Use Cases for NFC Mobile Devices in Public Transport Version 1.7.3 / 2015-06-19 Transport SIG WORKING DOCUMENT This document is copyright 2015
A Survey on Secure Auditing and Deduplicating Data in Cloud
A Survey on Secure Auditing and Deduplicating Data in Cloud Tejaswini Jaybhaye 1 ; D. H. Kulkarni 2 PG Student, Dept. of Computer Engineering, SKNCOE, Pune, India 1 Assistant Professor, Dept. of Computer
PUF Physical Unclonable Functions
Physical Unclonable Functions Protecting next-generation Smart Card ICs with SRAM-based s The use of Smart Card ICs has become more widespread, having expanded from historical banking and telecommunication
The Future Of Cloud based Ticketing. Ernst Bovelander Director Advisory Services
The Future Of Cloud based Ticketing Ernst Bovelander Director Advisory Services UL and the UL logo are trademarks of UL LLC 2014 1 Goal for today Establish a route for enabling Cloud Based Ticketing Introduction
SECURE AND EFFICIENT PRIVACY-PRESERVING PUBLIC AUDITING SCHEME FOR CLOUD STORAGE
International Journal of Computer Network and Security(IJCNS) Vol 7. No.1 2015 Pp. 1-8 gopalax Journals, Singapore available at : www.ijcns.com ISSN: 0975-8283 ----------------------------------------------------------------------------------------------------------------------------------------------------------
Seminar: Security Metrics in Cloud Computing (20-00-0577-se)
Technische Universität Darmstadt Dependable, Embedded Systems and Software Group (DEEDS) Hochschulstr. 10 64289 Darmstadt Seminar: Security Metrics in Cloud Computing (20-00-0577-se) Topics Descriptions
Software Card Emulation in NFC-enabled Mobile Phones: Great Advantage or Security Nightmare?
Software Card Emulation in NFC-enabled Mobile Phones: Great Advantage or Security Nightmare? Michael Roland University of Applied Sciences Upper Austria,, Austria IWSSISPMU2012 International Workshop on
SWIFT: Advanced identity management
SWIFT: Advanced identity management Elena Torroglosa, Alejandro Pérez, Gabriel López, Antonio F. Gómez-Skarmeta and Oscar Cánovas Department of Information and Communications Engineering University of
Security Analysis and Complexity Comparison of Some Recent Lightweight RFID Protocols
Security Analysis and Complexity Comparison of Some Recent Lightweight RFID Protocols Ehsan Vahedi, Rabab K. Ward and Ian F. Blake Department of Electrical and Computer Engineering The University of British
Longmai Mobile PKI Solution
Longmai Mobile PKI Solution A quick Solution to External and Internal fraud in Insurance Industry Putting the client at the center of modernization Contents 1. INTRODUCTION... 3 1.1 Challenges... 3 1.2
RFIDs and European Policies
ICTSB Seminar on RFID Standardisation CEN/CENELEC Meeting Centre Brussels, Belgium RFIDs and European Policies Gérald SANTUCCI, Head of Unit [email protected] European Commission Directorate
A Note on the Relay Attacks on e-passports
A Note on the Relay Attacks on e-passports The Case of Czech e-passports Martin Hlaváč 1 and Tomáš Rosa 1,2 [email protected] and [email protected] 1 Department of Algebra, Charles University
NSF Workshop on Big Data Security and Privacy
NSF Workshop on Big Data Security and Privacy Report Summary Bhavani Thuraisingham The University of Texas at Dallas (UTD) February 19, 2015 Acknowledgement NSF SaTC Program for support Chris Clifton and
Enabling Public Auditing for Secured Data Storage in Cloud Computing
IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719 Vol. 3, Issue 5 (May. 2013), V3 PP 01-05 Enabling Public Auditing for Secured Data Storage in Cloud Computing 1 Er.Amandeep Kaur,
Mobile Electronic Payments
Chapter 7 Mobile Electronic Payments 7.1 Rationale and Motivation Mobile electronic payments are rapidly becoming a reality. There is no doubt that users of mobile phones are willing and even asking to
Rights Management Services
www.css-security.com 425.216.0720 WHITE PAPER Microsoft Windows (RMS) provides authors and owners the ability to control how they use and distribute their digital content when using rights-enabled applications,
RFID Security. April 10, 2006. Martin Dam Pedersen Department of Mathematics and Computer Science University Of Southern Denmark
April 10, 2006 Martin Dam Pedersen Department of Mathematics and Computer Science University Of Southern Denmark 1 Outline What is RFID RFID usage Security threats Threat examples Protection Schemes for
NFC: Enabler for Innovative Mobility and Payment NFC: MOBILIDADE E MEIOS DE PAGAMENTO
NFC: Enabler for Innovative Mobility and Payment Cards Brazil Sao Paulo, April 3rd to 5th 2007 Rodolfo Gomes - 1st Level Customer Application Support NFC&RFID Europe A new Company has reborn Few months
Lecture slides by Lawrie Brown for Cryptography and Network Security, 5/e, by William Stallings, Chapter 14 Key Management and Distribution.
Lecture slides by Lawrie Brown for Cryptography and Network Security, 5/e, by William Stallings, Chapter 14 Key Management and Distribution. 1 Opening quote. 2 The topics of cryptographic key management
Deriving a Trusted Mobile Identity from an Existing Credential
Deriving a Trusted Mobile Identity from an Existing Credential Exploring and applying real-world use cases for mobile derived credentials +1-888-690-2424 entrust.com Table of contents Approval of the mobile
Attestation and Authentication Protocols Using the TPM
Attestation and Authentication Protocols Using the TPM Ariel Segall June 21, 2011 Approved for Public Release: 11-2876. Distribution Unlimited. c 2011. All Rights Reserved. (1/28) Motivation Almost all
E-Democracy and e-voting
E-Democracy and e-voting How to make them secure and transparent August 2013 Jordi Puiggali CSO and SVP R&D [email protected] Index Introduction e-democracy Security and Transparency in e-voting
Internet Anonymity and the Design Process - A Practical Approach
anon.next: A Framework for Privacy in the Next Generation Internet Matthew Wright Department of Computer Science and Engineering, The University of Texas at Arlington, Arlington, TX, USA, [email protected],
A Secure Model for Medical Data Sharing
International Journal of Database Theory and Application 45 A Secure Model for Medical Data Sharing Wong Kok Seng 1,1,Myung Ho Kim 1, Rosli Besar 2, Fazly Salleh 2 1 Department of Computer, Soongsil University,
How To Ensure Data Integrity In Cloud Computing
A Novel Approach for public exploration Data with Effective user Denial in the cloud Mahankali Anitha PG Scholar Department of CSE J.Vijayasree Assistant professor Department of CSE Dr.M.V.Siva Prasad
The Contactless- NFC Project of ATM Barcelona
1 The Contactless- NFC Project of ATM Barcelona Carme Fabregas Head of IT Systems [email protected] Working Group on NFC ticketing Barcelona, 6-7 September 2012 2 PRELIMINARY CONSIDERATIONS In 2001, a
Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions. July, 2006. Developed by: Smart Card Alliance Identity Council
Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions July, 2006 Developed by: Smart Card Alliance Identity Council Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked
Trusted Public Auditing Process for Secure Cloud Storage
Trusted Public Auditing Process for Secure Cloud Storage K.Adhiyaman 1, A. Jesudoss 2, D.Saravanan 3 1 Final Year MCA, Faculty of Computing, Department of MCA Sathyabama University, Chennai,Tamil Nadu,
Analysis on Secure Data sharing using ELGamal s Cryptosystem in Cloud
Analysis on Secure Data sharing using ELGamal s Cryptosystem in Cloud M.Jayanthi, Assistant Professor, Hod of MCA.E mail: [email protected] MahatmaGandhi University,Nalgonda, INDIA. B.Ranganatha
Arnab Roy Fujitsu Laboratories of America and CSA Big Data WG
Arnab Roy Fujitsu Laboratories of America and CSA Big Data WG 1 The Big Data Working Group (BDWG) will be identifying scalable techniques for data-centric security and privacy problems. BDWG s investigation
EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY
EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY Siliveru Ashok kumar* S.G. Nawaz ## and M.Harathi # * Student of M.Tech, Sri Krishna Devaraya Engineering College, Gooty # Department
Two Factor Zero Knowledge Proof Authentication System
Two Factor Zero Knowledge Proof Authentication System Quan Nguyen Mikhail Rudoy Arjun Srinivasan 6.857 Spring 2014 Project Abstract It is often necessary to log onto a website or other system from an untrusted
Surveying Cloud Storage Correctness using TPA with BLS
Surveying Cloud Storage Correctness using TPA with BLS Priyanka Dehariya 1, Prof. Shweta Shrivastava 2, Dr. Vineet Richaraya 3 1 M.Tech Scholar (CSE), LNCT, Bhopal 2 Asst.Professors, (CSE Department),
A Secure Decentralized Access Control Scheme for Data stored in Clouds
A Secure Decentralized Access Control Scheme for Data stored in Clouds Priyanka Palekar 1, Abhijeet Bharate 2, Nisar Anjum 3 1 SKNSITS, University of Pune 2 SKNSITS, University of Pune 3 SKNSITS, University
RFID based Bill Generation and Payment through Mobile
RFID based Bill Generation and Payment through Mobile 1 Swati R.Zope, 2 Prof. Maruti Limkar 1 EXTC Department, Mumbai University Terna college of Engineering,India Abstract Emerging electronic commerce
Security Digital Certificate Manager
IBM i Security Digital Certificate Manager 7.1 IBM i Security Digital Certificate Manager 7.1 Note Before using this information and the product it supports, be sure to read the information in Notices,
Frequently Asked Questions
Frequently Asked Questions NFC for Consumers What is NFC? Near Field Communication (NFC) is a short-range wireless connectivity technology standard designed for intuitive, simple, and safe communication
PRIME IDENTITY MANAGEMENT CORE
PRIME IDENTITY MANAGEMENT CORE For secure enrollment applications processing and workflow management. PRIME Identity Management Core provides the foundation for any biometric identification platform. It
Device-Centric Authentication and WebCrypto
Device-Centric Authentication and WebCrypto Dirk Balfanz, Google, [email protected] A Position Paper for the W3C Workshop on Web Cryptography Next Steps Device-Centric Authentication We believe that the
CONTACTLESS INTEROPERABILITY IN TRANSIT
NEW SCIENCE TRANSACTION SECURITY ARTICLE CONTACTLESS INTEROPERABILITY IN TRANSIT SUMMER 2014 UL.COM/NEWSCIENCE NEW SCIENCE TRANSACTION SECURITY OVERVIEW From research on the latest electronic transaction
Karsten Nohl University of Virginia. Henryk Plötz HU Berlin
Karsten Nohl University of Virginia Henryk Plötz HU Berlin Radio Frequency IDentification Tiny computer chips Passively Powered Karsten Nohl, Henryk Plötz - RFID Security 2 Constant monitoring is already
Electronic ticketing the key to linking different means of transportation
Electronic ticketing the key to linking different means of transportation Pre-press conference InnoTrans 2012 Nils Schmidt Head of City IT Siemens Mobility and Logistics Division Vienna, June 28, 2012
How To Hack An Rdi Credit Card
RFID Payment Card Vulnerabilities Technical Report Thomas S. Heydt-Benjamin 1, Daniel V. Bailey 2, Kevin Fu 1, Ari Juels 2, and Tom O'Hare 3 Abstract 1: University of Massachusetts at Amherst {tshb, kevinfu}@cs.umass.edu
