A Security Framework of Group Location-Based Mobile Applications in Cloud Computing

advertisement
多媒體網路安全實驗室
A Security Framework of Group
Location-Based
Mobile Applications in Cloud
Computing
Date:2012.07.17
Reporter : Hong Ji Wei
Authors : Yu-Jia Chen and Li-Chun Wang
From:2011 International Conference on Parallel Processing Workshops
多媒體網路安全實驗室
OUTLINE
1
INTRODUCTION
2
SYSTEM MODEL AND PROBLEM
3
IMSI-BASE JOIN SECURE ALGORITHM
4
ANALYSIS AND DISCUSSION
35
SIMULATION RESULTS
46
CONCLUSIONS
多媒體網路安全實驗室
INTRODUCTION
With rapid advances in mobile communications and
location-aware mobile devices.
Location based services (LBS) are emerging as one
of the killer applications for the next generation mobile systems.
Traditional LBS of mobile applications focusing on
emergency services.
The current LBS in mobile systems are much more
versatile and consist of router planners.
多媒體網路安全實驗室
INTRODUCTION
The LBS can be categorized into two types:
1.Location-Tracking : Tracks users’ footprints by frequent
updating users’ locations, such as GOOGLE LATITUTE.
2.Position-Aware : Relies on the nearby stores’ locations
around the served user’s position, such as FOURSQURE
.COM.
FACEBOOK announced a new service called PLACES,
which provides LBS to users with both their friends’ and
nearby stores’ locations.
多媒體網路安全實驗室
INTRODUCTION
This paper focuses on the two security perspectives
of LBS using Outsource Database:
1. Privacy
Ensuring the security of location data of user and avoiding
be stolen by hacker.
2. Authentication
Ensuring only legal users can access and update location
information.
多媒體網路安全實驗室
SYSTEM MODEL AND PROBLEM
The ODB - the key element for database as a service
(DaaS) in cloud computing.
The customers of DaaS can utilize huge storage capacity through the Internet.
The security of mobile users’ locations becomes an
important issue when the ODB is adopted.
Trusted third party (TTP) was not considered in our
model because JOIN.
多媒體網路安全實驗室
SYSTEM MODEL AND PROBLEM
1
2
3
5
4
6
8
7
9
10
多媒體網路安全實驗室
SYSTEM MODEL AND PROBLEM
Data security issues can be classified as
1.Security during data transmission
It’s can be resolved by SSL、IPSec
2.Security in data storage
It’s rarely studied by other researcher
多媒體網路安全實驗室
SYSTEM MODEL AND PROBLEM
JOIN is a location-based group scheduling service
with ODB model.
多媒體網路安全實驗室
IMSI-BASE JOIN SECURE ALGORITHM
IMSI is a unique global number that stored in SIM
card for identifying subscriber in each phone.
A mobile phone user rarely changes the IMSI.
This algorithm include two functions:
1.Key generation function
2.Encrytion function
多媒體網路安全實驗室
IMSI-BASE JOIN SECURE ALGORITHM
This algorithm can be divided into four steps:
1. Register
2. Log in
3. Initiate
4. Store
多媒體網路安全實驗室
IMSI-BASE JOIN SECURE ALGORITHM
Register
Client
JOIN Server
Cloud Database
Compute KeyA from IMSI
Compute KeyB
from KeyA with ID
多媒體網路安全實驗室
IMSI-BASE JOIN SECURE ALGORITHM
Login
Client
JOIN Server
After ID/PW passed
Keep this thread
Cloud Database
多媒體網路安全實驗室
IMSI-BASE JOIN SECURE ALGORITHM
Initiate
Client
JOIN Server
All other members
in this group
Cloud Database
多媒體網路安全實驗室
IMSI-BASE JOIN SECURE ALGORITHM
Store
Client
JOIN Server
Cloud Database
多媒體網路安全實驗室
ANALYSIS AND DISCUSSION
It is assumed that the adversary does not know users’
IMSI number.
There are no effective ways to get somebody’s IMSI
except stealing their SIM cards or break into the database of their telecom operator.
Analysis can be divided to three parts
1. Privacy
2. Authentication
3. Continuity
多媒體網路安全實驗室
ANALYSIS AND DISCUSSION
Privacy
Client
JOIN Server
Initiate
Store
Cloud Database
多媒體網路安全實驗室
ANALYSIS AND DISCUSSION
Authentication
Client
JOIN Server
Cloud Database
Login
Authentication
Initiate
多媒體網路安全實驗室
ANALYSIS AND DISCUSSION
Continuity
We hope that user location records can still be preserved and continued.
The new location data can append to the same historic records.
User identification in the location database does not
need to change frequently.
多媒體網路安全實驗室
SIMULATION RESULTS
多媒體網路安全實驗室
CONCLUSIONS
The location-base service will become a popular
service on the cell phone in the future.
The security of location data is an important issue.
The author proposed an IJS algorithm that can improve privacy, authentication and continuity.
In the future, author will propose more efficient mechanisms and algorithms to mobile phone for location data security in cloud computing.
多媒體網路安全實驗室
Download