Research - Department of Computer and Information Sciences

advertisement
HOMMER: Holistic Model for Minority
Education & Research
“The Balancing Act”:
Accountability vs. Privacy
by
Deidre W. Evans
Christy L. Chatmon
Department of Computer and Information Sciences
May 5th, 2004
Overview
• Introduction
• Research Discussion
– “The Balancing Act”
• Goals of Research
– Security Track in Curricula
– Center of Educational Excellence in
Information Assurance by NSA
– Build Collaborations
Department of Computer and Information Sciences
May 5th, 2004
Introduction
• September 11, 2001 was in part due to a
lack of operational balance between
privacy and accountability:
– “Uncrackable encryption is allowing terrorists
to communicate about their intentions without
fear of outside intrusion. They’re thwarting
the efforts of law enforcement to detect,
prevent and investigate illegal activities.”
[FBI director]
Department of Computer and Information Sciences
May 5th, 2004
Introduction
• Increase in security threats
– Denial of service, worms, viruses, etc.
• Advancement in data retrieval & storage
mechanisms
– Data-mining, CRM, WEB Tracking
“The Balancing Act”
• Privacy/Anonymity
– Controlling all information about one’s self &
personal activity
– Authentication
• Passwords, PKI’s, biometrics, etc.
• Accountability/Security
– Attribute actions to the user that caused those
actions
“The Balancing Act”
• Investigate existing methodologies:
– Key Escrow
• third party retrieves cryptographic keys for data
confidentiality for recovery of encrypted data
– PKIs
Department of Computer and Information Sciences
May 5th, 2004
“The Balancing Act”
Anonymity
Accountability
Privacy
Authentication
Privacy
Cyber-forensics
Free Speech
Liability/Copyright
Department of Computer and Information Sciences
May 5th, 2004
Goals of Research
• Problem:
– Existing paradigms embody conflict between
security goals and privacy goals
• Goal:
– Explore alternative paradigms that balances
the needs for security with the needs for
personal privacy
• Develop a cryptographic infrastructure models,
techniques, & tools to facilitate “privacy-balanced
accountability”
Department of Computer and Information Sciences
May 5th, 2004
Goals of Research
• FAMU CIS department recognized as a
Center of Educational Excellence in
Information Security by National Security
Agency
• Information Security Track in CIS curricula
Department of Computer and Information Sciences
May 5th, 2004
Goals of Research
Cisco Router
Cisco 24 Port Switch
Cloud
Cisco Pix Firewall
Cisco 24 Port Switch
NT 2000 Server
Solaris 9 server
NT 2003 Server with Terminal Services
Workstations - Operating systems Linux Win2K Win98 VMWare
Goals of Research
• Standalone Security Lab to support
research & course needs
– explore new paradigms for training students
about security and to foster students’ interests
in security issues
• Extend collaborations with other security
educators
– FSU, University of Central Florida, etc.
Department of Computer and Information Sciences
May 5th, 2004
References
[1]
[2]
[3]
[4]
[5]
[6]
Carl Ellison and Bruce Schneier. Ten Risks of PKI, What You Are Not
Being Told About PKI. Computer Security Journal, Vol. XVI, No. 1,
2000.
Donald Runsfeld. US Secretary of State, Comments to the press,
Sept 12, 2001, http://www.defenselink.mil/cgibin/real_audio.pl?Sep2001/DoD091201a&1000322100
Hosmer, C., Gordon, G., Hyde, C., Grant, T. "Cyber Forensics 2000."
Proceedings, 1st Annual Study of the State-of-the-Art in Cyber Forensics.
J.K. Millen and R.N. Wright. Reasoning about Trust and Insurance in a
Public Key Infrastructure. Proceedings of 13th IEEE Computer Security
Foundations Workshop, IEEE Computer Society, July 2000.
Jack Kelley. Terror groups hide behind Web encryption. USA Today, June
19, 2001, http://www.usatoday.com/life/cyber/tech/2001-02-05-binladen.htm
M. Burmester, Y. Desmedt and J. Seberry. Equitable key escrow with limited
time-span. Advances in Cryptology, Asiacrypt 98, LNCS 1514, Springer,
Berlin, pp. 380-391, 1998.
Department of Computer and Information Sciences
May 5th, 2004
Download