1.07k likes | 1.25k Views
Identity A desiderata for the Next Generation Internet. presented by Pat Burke and Christian Loza University of North Texas at the “Seminar II, Saturday October 6, 2005”. Biometric ID Problem Definition. Conventional password security is NOT secure because passwords tend to be:
E N D
IdentityA desideratafor the Next Generation Internet presented by Pat Burke and Christian Loza University of North Texas at the “Seminar II, Saturday October 6, 2005”
Biometric ID Problem Definition • Conventional password security is NOT secure because passwords tend to be: • Easily guessed • Forgotten • Written down in easily accessible locations • Shared with a friend • Common for a given user across a wide range of applications/systems
Biometric ID Problem Definition • Biometric Identification is one possible solution to the user authentication problem • Biometric ID refers to verifying individuals based on their physical and behavioral characteristics such as face, fingerprint, hand geometry, iris, keystroke, signature, voice, and even body odor. [7] • Two proposed Biometric ID solutions will be presented: • Robust hashing with a one-way transformation [8] • Multimodal Biometric ID [9]
Biometrics ID Problem Definition • Biometric data has some shortcomings: • If compromised, cannot be reset • Storing of actual biometric templates should be avoided • Variability of biometric data precludes the use of exact matching hashing algorithms such as MD-5 and SHA-1 [8] • “Fuzzy” logic must be employed in evaluating the biometric input
Biometric ID Background • Enrollment and Authentication Process
Biometric ID Background • KEY METRICS • False Acceptance Rate • How many unauthorized individuals gain access due to biometric features similar to an authorized user • MUST BE MINIMIZED to maintain security • MUST BE ZERO for some security applications • False Rejection Rate • How many authorized individuals are denied access due to the inability to match their input with their biometric template. • This is an inconvenience, but not a security problem
Biometric ID Background • OTHER METRICS • Time required for the enrollment process • Time required for the verification process • Computer resources utilized for the security system • Memory • Algorithmic efficiency (CPU time)
Robust Hashing • Is it possible to design a robust hashing algorithm such that the hashes of two close inputs are judged identical while those inputs which are not so close will give completely different outputs? • “Features” of the biometric data are selected based upon the type of biometric data chosen • During enrollment, “enough” samples are acquired from each user to obtain a range value (2δ) for EACH feature value.
Robust Hashing • A unique hash value is then assigned to EACH feature and stored (encrypted) for verification • A Gaussian function is then fitted to the data for each feature which results in the assigned hashed output value. • The Gaussian function is then combined with “fake Gaussian peaks” to hide the true input, resulting in a non-invertable one-way transformation
Robust Hashing Parameters of the Guassian non-invertable transforms are stored on “smartcards” of some sort which the user must present at authentication time. TRUE GUASSIAN FUNCTION (red)
Robust Hashing USER AUTHENTICATION
Robust Hashing • Tested against the OLR Database of Faces available at http:/www.uk.research.att.com/facedatabase.html • Consists of 10 different images taken under extensively varying conditions of 40 distinct subjects • 6 of the images for each individual was used in the enrollment phase • The remaining 4 were used in the test sets • 20 features were selected • Tests were conducted with 5% and 10% tolerance factors for the inputs to account for variation in the non-enrolled faces
Robust Hashing • Tested against the OLR Database of Faces available at http:/www.uk.research.att.com/facedatabase.html • Consists of 10 different images taken under extensively varying conditions of 40 distinct subjects • 6 of the images for each individual was used in the enrollment phase • The remaining 4 were used in the test sets • 20 features were selected • Tests were conducted with 5% and 10% tolerance factors for the inputs to account for variation in the non-enrolled faces
Robust Hashing TEST RESULTS FALSE REJECTION RATE How many GOOD GUYS could not get in 15 subjects were correctly identified on 4/4 images with a 10% tolerance factor. 1 subject was NEVER correctly identified using ANY of the 4 images with a 10% tolerance factor. FALSE ACCEPTANCE RATE How many BAD GUYS COULD get in 12 subjects who were NEVER falsely admitted using ANY another person’s credentials with a 5% tolerance factor. 25 subjects WERE authenticated using at least 4 other individual’s credentials at a 10% tolerance factor.
Multimodal • Description of the Dialog Communication System’s BioID commercial user-authentication system • In use in many systems worldwide • Uses three different sources of biometric data to achieve better accuracy than a single feature system • Voice – using a user-resetable “password” • Lip Movement – using the same password • Facial Data
Multimodal • During enrollment, biometric templates are collected for each biometric feature • For authentication, the system compares these templates against the biometric input • The client sets the recognition threshholds for each of the features independently to achieve the desired level of security. [9]
Multimodal • FACE PROCESSING [9] Original image Edge-extracted image Face Model Face model overlaid on the edge-extracted image
Multimodal • FACE PROCESSING Samples of extracted faces: BioID scales all faces to the same size and crops the images uniformly for easier comparison. This photo collection shows 12 individuals. Note the uniformity that the system achieves. [9]
Multimodal • TEST RESULTS • Live Test using 150 individuals for 3 months • “False-acceptance rate significantly below 1 percent, depending on the security level.
Pro’s and Con’s ROBUST HASHING • Scalable – easy to add new users • Secure – lost or stolen ID card not likely to compromise security of the system • Flexible – can be set up using other features than fingerprints PRO CON • Test results not good • Intelligent attacker may be able to fool system with brute force guessing • Much research left to make the system more secure (fewer FAR violations)
Pro’s and Con’s Multimodal BioID • Scalable – easy to add new users • Secure – lost or stolen ID card not likely to compromise security of the system • Flexible – feature values can be manipulated to meet security needs PRO CON • Stable product • Multiple Bio sources make it more secure
Conclusion • Biometrics is a current area of intense research • Multiple Bio-sources should yield a more desirable product
IDENTITY • Second Part: Federated Systems, Identity Management
Desiderata Desiderata What we want • Federate Identity across organizations maintaining access rights and privileges • Web-based Federated Identity integrated with Web-based privilege management systems • One identity, multiple roles across organizations. Trust management and Information sharing between trusted organizations
Desiderata Desiderata • NSF: About the Next generation Internet: In the context of the GENI Research Program “Creating new core functionality: Going beyond existing paradigms of datagram, packet and circuit switching; designing new naming, addressing, and overall identity architectures, and new paradigms of network management;” “Building higher-level service abstractions: Using, for example, information objects, location-based services, and identity frameworks;”
Desiderata Desiderata • Microsoft Research: In the context of The Next Generation Internet “.NET Building Block Services. A new family of highly distributed, programmable developer services that run across standalone machines, in corporate data centers and across the Internet. Services include Identity, Notification and Messaging, Personalization, Schematized Storage, Calendar, Directory, Search and Software Delivery.”
Federated Identity Proposal Bhatti, Bertino and Ghafoor • SSO Single sign on • Effective access control • Decentralized model • Authentication for estrangers • Trust, Anatomy and Privacy • Standardized Approach Towards Improved Federated Identity And Privilege Management System in Open Systems
Proposed Approach Proposal • Proposed Approach
Proposed Approach Proposal > Other approaches • The other approaches • Earlier Authentication/Authorization mechanisms (IAPM, XECB… etc). • X.509 • X.509 PKI + PMI • Kerberos
The Earlier approach Proposal > The Earlier approach
Problems of Earlier Approaches Proposal > Problems of all Traditional Approaches
Credentials Based Systems Kerberos > Credentials Based Systems • Kerberos
Kerberos Based on Tickets Centralized Initiates getting a initial ticket With the ticket, it can request services Credentials Based Systems Kerberos > Credentials Based Systems
Kerberos The authentication process can run in both Master and Slaves machines The slaves are read-only The KDBM manages changes of passwords. WHY? Credentials Based Systems Kerberos > Credentials Based Systems
Kerberos The changes can be introduced in the KDBM Each Kerberos has a realm master machine You can have additional master machines Credentials Based Systems Kerberos > Credentials Based Systems
Kerberos Kerberos > Credentials Based Systems Authorization Authorization Authentication Authentication CREDENTIALS BASED ON ROLES CREDENTIALS BASED ON IDENTITY I know WHO you are, therefore, I know what you are allowed to do. I know WHAT role you are allowed to play Kerberos Desiderata
Credentials Based Systems X.509 > Credentials Based Systems • X.509
Credentials Based Systems X.509 > Credentials Based Systems Proposal X.509 Authorization Authorization Authentication Authentication CREDENTIALS BASED ON ROLES CREDENTIALS BASED ON ROLES BINDS Credentials to a KEY BINDS Credentials to Role
Credentials Based Systems X.509 > Credentials Based Systems Proposal X.509 Authorization Authorization Authentication Authentication CREDENTIALS BASED ON ROLES CREDENTIALS BASED ON ROLES BINDS Credentials to a KEY BINDS Credentials to Role
Credentials Based Systems X.509 > Credentials Based Systems • X.509 PKI + PMI
Credentials Based Systems X.509 > Credentials Based Systems • X.509 PKI + PMI
Credentials Based Systems Authentication Schemes > Credentials Based Systems • X.509 PKI + PMI
Proposed Approach Proposed Approach
Proposed Approach Proposed Approach
Proposed Approach Proposed Approach • XKMS, the four corner approach
Proposed Approach Proposed Approach
Federated IdentityXML Public Protocols Proposed Approach • SAML (Security Assertion Markup Protocol) • XML based • Avoid limitations of cookies • SSO Interoperability: Different implementations can be compatible • Web Services: Suited to work on browser environments • Federations: Can simplify Federation usability
Proposed Approach Proposed Approach
Proposed Approach Proposed Approach • XML Key Signature /
Desiderata Proposed Approach 1. Request page 2. Auto redirect 7. Request page w/credentials 8. Set ticket Roles 4. Request credentials 3. Redirect 5. Login 6. Redirect w/tickets in header