* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Download PPT
Survey
Document related concepts
Transcript
Guarantee that EK is safe Yes because it is stored in and used by hw only No because it can be obtained if someone has physical access but this can be detected by user or remote system (tamper bit is set in TPM) Guarantee that no keys can be compromised No, keys that go to OS and are used by sw can still be compromised Guarantee that applications cannot be changed or compromised No, I can only detect compromise by comparing hashes of apps in hw Guarantee the system that no rootkits can reside on No, but we can detect compromise by comparing hashes of OS files in hw Guarantee that applications cannot interfere with each other Yes, due to OS separation Guarantee Yes, data safety on disk we can encrypt data separately for each virtual system and we can encrypt the whole disk No, because encryption happens in sw Privacy is about PII It is primarily a policy issue Privacy is an issue of user education oMake sure users are aware of the potential use of the information they provide oGive the user control Privacy is a security issue o Security is needed to implement the policy Sometimes conflicting o Many security technologies depend on o identification Many approaches to privacy depend on hiding one’s identity Sometimes supportive o Privacy depends on protecting PII (personally o identifiable information) Poor security makes it more difficult to protect such information How much low level information should be kept to help track down cyber attacks o Such information can be used to breach o privacy assurances How long can such data be kept Business Concerns o Disclosing Information we think of as privacyrelated can divulge business plans ▪ Mergers ▪ Product plans ▪ Investigations Some “private” information is used for authentication o SSN o Credit card numbers Location o From IP address o From Cell Phones o From RFID Interests, Purchase History, Political/Religious Affiliations o From RFID o From transaction details o From network and server traces Associates o From network, phone, email records o From location based information Health Information o From Purchases o From location based information o From web history Aren’t the only ones that need to be concerned about privacy the ones that are doing things that they shouldn’t? Consider the following: o Use of information outside original context Certain information may be omitted o Implications may be mis-represented o Inference of data that is sensitive o Data can be used for manipulation Consider whether it is safe to release information in aggregate o Such information is presumably no longer o personally identifiable But given partial information, it is sometimes possible to derive other information by combining it with the aggregated data. Consider whether it is safe to release information that has been stripped of so called personal identifiers o Such information is presumably no longer personally identifiable • What is important is not just anonymity, but linkability • If I can link multiple queries, I might be able to infer the identity of the person issuing the query through one query, at which point, all anonymity is lost Even when specifics of communication are hidden, the mere knowledge of communication between parties provides useful information to an adversary o E.g. pending mergers or acquisitions o Relationships between entities o Created visibility of the structure of an o organizations Allows some inference about interests Lists of the web sites you visit Email logs Phone records Perhaps you expose the linkages through web sites like linked in Consider what information remains in the clear when you design security protocols Researchers need network data oTo validate their solutions oTo mine and understand trends Sharing network data creates necessary diversity oEnables generalization of results oCreates a lot of privacy concerns oVery few public traffic trace archives (CAIDA, WIDE, LBNL, ITA, PREDICT, CRAWDAD, MIT DARPA) Remove or obscure (anonymize) sensitive data o Remove packet contents and application headers o Anonymize IP addresses Positional - anonymize in order of appearance. Inconsistent and lose information about networks Cryptographic - anonymize by encrypting with a key. Consistent but still lose information about networks. Prefix-preserving - cryptographic approach is applied to portions of IP separately to preserve network information. Sanitization loses a lot of data - application headers, contents, IP addresses o This is acceptable for some research but not for all Sanitized data still has sensitive information Passive attacker oObserve publicly released trace oUse some public or private auxiliary information to infer private data Active attacker oInsert traffic during trace collection oIdentify this traffic later in public trace This creates an auxiliary information channel Can learn what method was used to obscure private data Can verify presence or absence of data items with same/similar values in other records oProvider cannot identify injected traffic Covert channel problem