User Controlled Content Access György Kálmán, Josef Noll IEEE Symposium on Wireless Pervasive Computing, Santorini, Greece Speaker:黃韋綸 Outline Introduction Proposed Architecture Threats Conclusion 2 Introduction Users are willing to share their own content (pictures, videos etc.),but lack the capability and the knowledge to protect themselves against theft. The user has to buy a new hardware device. 3 Proposed Architecture - Content sharing with identity management and trusted component 4 Proposed Architecture – Direct key exchange while in physical proximity, the user and the recipient are putting their phones close, and the public keys are exchanged automatically. 5 Proposed Architecture – Access rights update The user made changes on the rights associated to his content and wants to update the server. 6 Proposed Architecture – Service discovery User can put his phone close to a server, and the capabilities and the directory of the offered services is automatically downloaded to his phone, is possible also between two phones. 7 Compar WiFi Bluetooth Infrared NFC Range 0 ~ 100 m 0 ~ 10 m 0~1m < 50 cm Transfer rate High 54 Mbps Medium 1 Mbps Medium 4 Mbps Low 54 Mbps Security Low High Low Very High Cost High Medium Medium Very Low 8 Threats - Problem areas in the user content sharing scenario 9 Threats - Eavesdroppers WLANs broadcast information in a considerable range. Countermeasures: symmetric encryption 10 Threats - Man in the Middle Countermeasures: Identity checks. The highest level of assurance may be reached with a trusted third party(CA). 11 Threats - Tampered software Attackers may change the original code, install a trojan or hide other malicious program with the help of a rootkit. Countermeasures: A possible solution is to use a SIM included in every mobile phone. 12 Conclusion Mobile providers usually do not allow access to the SIM in order to ensure correct functionality of the network. SIM has the potential to provide strong encryption services. This paper propose a smartcard based right management solution, which is using the SIM of a mobile phone as trusted entity. 13