160 likes | 271 Views
University of British Columbia. Towards Web 2.0 Content Sharing Beyond Walled Gardens. San-Tsai Sun Supervisor: Kosta Beznosov. Laboratory for Education and Research in Secure Systems Engineering ( LERSSE ) University of British Columbia. practical problem.
E N D
University of British Columbia Towards Web 2.0 Content Sharing Beyond Walled Gardens San-Tsai Sun Supervisor: KostaBeznosov Laboratory for Education and Research in Secure Systems Engineering (LERSSE) University of British Columbia
practical problem lack of usable mechanisms for secure Web 2.0 user content sharing across content and service providers (CSPs)
content sharing scenario CCA scouts only Colonial Coast Adventures (CCA) Girl Scouts Alice Jenny Picasa Web Alice’s CCA scout friends in Picasa Web
question • how to enable useful sharing of Web 2.0 content across CSPs? • can existing technologies enable this type of sharing?
secret-link approach http://picasaweb.google.com/Alice?authkey=Gv1sRgCOzuv • usable for Web users • easy to implement by CSPs • Alice does not have control over Jenny’s sharing of secret link with others • Alice has to know Jenny’s email secret-link Alice Jenny jenny@aol.com Picasa Web
design goals • content sharing useful for average users • user-centric, i.e., access policy and identity follow the user • only use browser, no special software or crypto on the user computer • CSPs • separation of content hosting and content sharing • not required to change their existing access-control mechanism
approach • OpenIDemailextension [1] to enable OpenID IdPs to use email as an alternative identifier • www.alo.com/santsai vs. santsas@alo.com • policy hosting service • role-based trust-management policy language (RT) for credentials and policies [2] • distributed membership and containment queries [1] B. Adida, “EmID: Web authentication by email address,” in The Proceedings of Web 2.0 Security and Privacy Workshop 2008, Oakland, California, USA, 2008. [2] N. Li, J. C. Mitchell, and W. H. Winsborough, “Design of a role-based trust-management framework,” in SP ’02 Proceedings of the 2002 IEEE Symposium on Security and Privacy, 2002
sharing scenario CCA.scout Alice@gmail.com CCA.scout Jenny@aol.com CCA.scout Betty@hotmail.com CCA secret-link memberships secret-link, Alice@gmail.com.scout Alice policy service Gmail policy service Yahoo Alice@gmail.com.scout CCA.@yahoo.scout Alice@gmail.com.scout Picasa Web Alice@gmail.com.scout
access scenario CCA.scout Alice@gmail.com CCA.scout Jenny@aol.com CCA.scout Betty@hotmail.com Jenny@aol.com CCA containment secret-link Jenny@aol.com, Alice@gmail.com.scout Jenny policy service Gmail policy service Yahoo OpenIDemail AOL yes/no Alice@gmail.com.scout CCA.@yahoo.scout Picasa Web Alice@gmail.com.scout
content sharing scenario 2 CCA scouts and their parents only Colonial Coast Adventures (CCA) Girl Scouts Mary Alice Jenny Picasa Web Alice’s scout friends in Picasa Web
sharing scenario 2 CCA.scout Alice@gamil.com CCA.scout Jenny@aol.com CCA.scout Betty@hotmail.com CCA Jenny@aol.com.parent Mary@hotmail.com Alice@gamil.com.scout_parent Alice Jenny policy service Gmail policy service Yahoo policy service AOL Alice@gamil.com.scout CCA.@yahoo.scout Alice@gamil.com.scout_parent Alice@gamil.com.scout.parent Alice@gamil.com.scout Alice@gamil.com.scout_parent Picasa
access scenario 2 secret-link CCA.scout Alice@gamil.com CCA.scout Jenny@aol.com CCA.scout Betty@hotmail.com CCA Jenny@aol.com.parent Mary@hotmail.com memberships containment secret-link Alice@gamil.com.scout_parent ,Mary@hotmail.com Mary Jenny policy service Gmail policy service Yahoo policy service AOL yes/no Alice@gamil.com.scout CCA.@yahoo.scout Alice@gamil.com.scout_parent Alice@gamil.com.scout.parent Alice@gamil.com.scout Alice@gamil.com.scout_parent Picasa
progress up-to-date • protocols/algorithms for distributed memberships and containment queries • preliminary prototype • initial performance evaluation
open questions • what is the expressiveness of sharing control that users need? • how to design useable interface for controlled sharing? • how to limit transitive trust? • A trusts B B trusts C A trusts C • how to preserve the confidentiality of credentials and policies? • CCA does not want everybody to know email addresses of its scouts
future work • investigate user needs in controlled sharing • design user interface • evaluate usability • investigate an approach for limiting transitive trust • preserve the confidentiality of credentials and policies • investigate phishing/spam prevention • improve performance
San-Tsai Sun <santsais@ece.ubc.ca> • San-Tsai Sun and Konstantin Beznosov. Open problems in Web 2.0 user content sharing. Presented at iNetSec Workshop, April 23th 2009. • San-Tsai Sun, KirstieHawkey, and Konstantin Beznosov. Towards enabling web 2.0 content sharing beyond walled gardens. To be presented at the Workshop on Security and Privacy in Online Social Networking, August 29th 2009