90 likes | 182 Views
PeerShare : A System for Secure Distribution of Sensitive Data among Social Contacts. Marcin Nagy , N. Asokan , Jörg Ott. Motivation. K ey management is difficult O nline social networks popular (provide SSO)
E N D
PeerShare: A System for Secure Distribution of Sensitive Data among Social Contacts Marcin Nagy, N. Asokan, JörgOtt
Motivation • Key management is difficult • Online social networks popular (provide SSO) Observation: Social networks can be used for authentic public keys distribution (SocialKeys project) Concept: Securely distribute application-specific data to a specific set of social contacts
Example applications • Exchanging public keys • Sharing access point keys • Detecting nearby friends (<user name, device address>) • Finding common friends (<friendship proof>) • Authenticity-only vs. authenticity+confidentiality • User-specific vs. device-specific data
Requirements Threat model • Channel compromise • Unauthorized usage • Impersonation • Accessing restricted data
System design PeerShare Server PeerSharemaster bindings database Social Network (SN) SN access protocol (eg. Facebook Graph API) Social Network App PeerShareprotocol (server) • SN authentication protocol(e.g. OAuth) • PeerShareprotocol SN authentication protocol Applications PeerShare API PeerSharecommunicationmodule Bindings database PeerShare Service Device
Security considerations • Channel compromise • TLS • Impersonation • User: SN user authentication (e.g. OAuth + SSO) • Server: TLS + certificate “pinning” • Application: e.g. Facebook user access token validation • User access control • User specifies authorized recipients • Enforced by server and service-on-device • Application access control • Only an application that has created data can access it
Minimizing trust on the PeerShare server • Trusted-hardware (HSM) • On-board Credentials • Application-specific server
Sample applications Tethering App nearbyPeople Technical Report ACNS 2013 paper Technical Report ACSAC 2013 paper