Context-Aware Security for Mobiles

46
Context-Aware Security for Mobiles SIDAR SPRING 2009, Stuttgart Leonid Batyuk DAI-Labor, Technische Universität Berlin September 14, 2009

Transcript of Context-Aware Security for Mobiles

Page 1: Context-Aware Security for Mobiles

Context-Aware Security for MobilesSIDAR SPRING 2009, Stuttgart

Leonid Batyuk

DAI-Labor, Technische Universität Berlin

September 14, 2009

Page 2: Context-Aware Security for Mobiles

Motivation The Notion of Context Context-Awareness in IT-Security Proposed Approach

Outline1 Motivation

2 The Notion of ContextWhat is Context?Context ClassificationContext-Awareness

3 Context-Awareness in IT-SecuritySecurity and privacy in context-aware applicationsContext-awareness in security applications

4 Proposed ApproachThe Problem - RevisitedProposed Solution

Context-Aware Security Leonid Batyuk Slide 2/38

Page 3: Context-Aware Security for Mobiles

Motivation The Notion of Context Context-Awareness in IT-Security Proposed Approach

Outline1 Motivation

2 The Notion of ContextWhat is Context?Context ClassificationContext-Awareness

3 Context-Awareness in IT-SecuritySecurity and privacy in context-aware applicationsContext-awareness in security applications

4 Proposed ApproachThe Problem - RevisitedProposed Solution

Context-Aware Security Leonid Batyuk Slide 3/38

Page 4: Context-Aware Security for Mobiles

Motivation The Notion of Context Context-Awareness in IT-Security Proposed Approach

Motivation

MotivationWhat is context and why is it important?

Anytime, anywhere connected.Increasing ubiquity of technology.The smartphone is always with you.But - is it secure enough?

Goal:Make a smartphone more securethrough automatic proactive and reactiveassistance.

Context-Aware Security Leonid Batyuk Slide 4/38

Page 5: Context-Aware Security for Mobiles

Motivation The Notion of Context Context-Awareness in IT-Security Proposed Approach

Motivation

Problem

Established security solutions are mostly designed forwired networksA mobile node moving through potentially hostileenvironments implies new security threatsBut: a node can tell a lot about its state and its environmentSolution: consider this context information in securitydecisions

Context-Aware Security Leonid Batyuk Slide 5/38

Page 6: Context-Aware Security for Mobiles

Motivation The Notion of Context Context-Awareness in IT-Security Proposed Approach

Motivation

The Vision

Secure, autonomous, context-awaremobile deviceUse context information to:

Enforce security policiesRecognize data leaksProvide the right information in theright contextIncrease usability and acceptanceof smartphonesSave power

Context-Aware Security Leonid Batyuk Slide 6/38

Page 7: Context-Aware Security for Mobiles

Motivation The Notion of Context Context-Awareness in IT-Security Proposed Approach

Motivation

Use Cases

Corporate user Highly secured(governmen-tal?) devices

A customerconcerned about

her privacyand security

Context-Aware Security Leonid Batyuk Slide 7/38

Page 8: Context-Aware Security for Mobiles

Motivation The Notion of Context Context-Awareness in IT-Security Proposed Approach

Outline1 Motivation

2 The Notion of ContextWhat is Context?Context ClassificationContext-Awareness

3 Context-Awareness in IT-SecuritySecurity and privacy in context-aware applicationsContext-awareness in security applications

4 Proposed ApproachThe Problem - RevisitedProposed Solution

Context-Aware Security Leonid Batyuk Slide 8/38

Page 9: Context-Aware Security for Mobiles

Motivation The Notion of Context Context-Awareness in IT-Security Proposed Approach

What is Context?

The Notion of Context

Very complex notion.Everything - from temperature to grade of happiness.

Context-Aware Security Leonid Batyuk Slide 9/38

Page 10: Context-Aware Security for Mobiles

Motivation The Notion of Context Context-Awareness in IT-Security Proposed Approach

What is Context?

Existing Definitions

The complete state of the universeat an instant of time[McCarthy and Hayes, 1969]The elements of the user’senvironment that the computerknows about [Brown, 1996]Any information that can be used tocharacterize the situation of anentity [Abowd et al., 1999]

Context-Aware Security Leonid Batyuk Slide 10/38

Page 11: Context-Aware Security for Mobiles

Motivation The Notion of Context Context-Awareness in IT-Security Proposed Approach

What is Context?

Existing Definitions IIThe best one

Precise, for ubiquitous computing - our case!Context is the set of environmental states and settings thateither determines an application’s behavior or in which anapplication event occurs and is interesting to the user[Chen and Kotz, 2000]

Context-Aware Security Leonid Batyuk Slide 11/38

Page 12: Context-Aware Security for Mobiles

Motivation The Notion of Context Context-Awareness in IT-Security Proposed Approach

Context Classification

Classification of Context Components

Context consists of many componentsAlmost everything can be considered context.Now, how to classify these components?

Context-Aware Security Leonid Batyuk Slide 12/38

Page 13: Context-Aware Security for Mobiles

Motivation The Notion of Context Context-Awareness in IT-Security Proposed Approach

Context Classification

Classification of Context Components

Context

remote local

physical virtual

+ +

+ +

Context-Aware Security Leonid Batyuk Slide 13/38

Page 14: Context-Aware Security for Mobiles

Motivation The Notion of Context Context-Awareness in IT-Security Proposed Approach

Context Classification

Examples of Sensors

Context

remote local

physical virtual

Temperature

Proximity

Light

Foreground process

System load

Connectivity

Location service Other device

Presence service

+ +

+ +

Context-Aware Security Leonid Batyuk Slide 14/38

Page 15: Context-Aware Security for Mobiles

Motivation The Notion of Context Context-Awareness in IT-Security Proposed Approach

Context Classification

Arising Questions

Context

remote local

physical virtual

Which sensors to use?

Sensor connectivity?

Power consumption?

Performance?

Granularity?

Update strategy?

Privacy? Security?

Communication cost?

+ +

+ +

Context-Aware Security Leonid Batyuk Slide 15/38

Page 16: Context-Aware Security for Mobiles

Motivation The Notion of Context Context-Awareness in IT-Security Proposed Approach

Context-Awareness

Function of a Context-Aware Application

Context-aware software is able to sense, reason and actuate.[Baker et al., 2009]

Sense Reason Actuate

Context-Aware System

+ +

+ +

Context-Aware Security Leonid Batyuk Slide 16/38

Page 17: Context-Aware Security for Mobiles

Motivation The Notion of Context Context-Awareness in IT-Security Proposed Approach

Context-Awareness

Function of a Context-Aware Application

Context-aware software is able to sense, reason and actuate.[Baker et al., 2009]

Sense Reason Actuate

Context-Aware System

Looks familiar?

+ +

+ +

Context-Aware Security Leonid Batyuk Slide 16/38

Page 18: Context-Aware Security for Mobiles

Motivation The Notion of Context Context-Awareness in IT-Security Proposed Approach

Context-Awareness

Function of a Context-Aware Application

Context-aware software is able to sense, reason and actuate.[Baker et al., 2009]

Sense Reason Actuate

Context-Aware System

Sensor AI Effector

Intelligent Agent

+ +

+ +

Context-Aware Security Leonid Batyuk Slide 16/38

Page 19: Context-Aware Security for Mobiles

Motivation The Notion of Context Context-Awareness in IT-Security Proposed Approach

Context-Awareness

Function of a Context-Aware Application

Context-aware software is able to sense, reason and actuate.[Baker et al., 2009]

Sense Reason Actuate

Context-Aware System

Sensor AI Effector

Intelligent AgentMatch!

+ +

+ +

Context-Aware Security Leonid Batyuk Slide 16/38

Page 20: Context-Aware Security for Mobiles

Motivation The Notion of Context Context-Awareness in IT-Security Proposed Approach

Context-Awareness

Function of a Context-Aware Application

Context-aware software is able to sense, reason and actuate.[Baker et al., 2009]

Sense Reason Actuate

Context-Aware System

Sensor AI Effector

Intelligent AgentMatch!

+ +

+ +

Context-Aware Security Leonid Batyuk Slide 16/38

Page 21: Context-Aware Security for Mobiles

Motivation The Notion of Context Context-Awareness in IT-Security Proposed Approach

Context-Awareness

Function of a Context-Aware Application

Context-aware software is able to sense, reason and actuate.[Baker et al., 2009]

Sense Reason Actuate

Context-Aware System

Sensor AI Effector

Intelligent AgentMatch!

Profit!

+ +

+ +

Context-Aware Security Leonid Batyuk Slide 16/38

Page 22: Context-Aware Security for Mobiles

Motivation The Notion of Context Context-Awareness in IT-Security Proposed Approach

Context-Awareness

Common Properties of a Context-Aware System

Actuator Layer

Control-Decision Layer

Context & Semantic Layer

Sensor Layer

CAS Layers [Baker et al., 2009]

Context-Aware Systemsare oftenknowledge-orientedAI methods arefrequently used forcontext definition andanalysis

Context-Aware Security Leonid Batyuk Slide 17/38

Page 23: Context-Aware Security for Mobiles

Motivation The Notion of Context Context-Awareness in IT-Security Proposed Approach

Context-Awareness

Common Properties of a Context-Aware System

Actuator Layer

Control-Decision Layer

Context & Semantic Layer

Sensor Layer

CAS Layers [Baker et al., 2009]

Context-Aware Systemsare oftenknowledge-orientedAI methods arefrequently used forcontext definition andanalysis

Context-Aware Security Leonid Batyuk Slide 17/38

Page 24: Context-Aware Security for Mobiles

Motivation The Notion of Context Context-Awareness in IT-Security Proposed Approach

Context-Awareness

Common Properties of a Context-Aware System

Actuator Layer

Control-Decision Layer

Context & Semantic Layer

Sensor Layer

CAS Layers [Baker et al., 2009]

Context-Aware Systemsare oftenknowledge-orientedAI methods arefrequently used forcontext definition andanalysis

Context-Aware Security Leonid Batyuk Slide 17/38

Page 25: Context-Aware Security for Mobiles

Motivation The Notion of Context Context-Awareness in IT-Security Proposed Approach

Context-Awareness

Aspects of Context Handling

Active Badge Indoor Positioning

System - the godfather of

context-aware applications

Sensor access strategy:directmiddlewarenetworked

Context dissemination strategy:polling (“pull”)publish-subscribe (“push”)

Application field:cyberguidessmart environmentsaugmented reality. . .

Context-Aware Security Leonid Batyuk Slide 18/38

Page 26: Context-Aware Security for Mobiles

Motivation The Notion of Context Context-Awareness in IT-Security Proposed Approach

Outline1 Motivation

2 The Notion of ContextWhat is Context?Context ClassificationContext-Awareness

3 Context-Awareness in IT-SecuritySecurity and privacy in context-aware applicationsContext-awareness in security applications

4 Proposed ApproachThe Problem - RevisitedProposed Solution

Context-Aware Security Leonid Batyuk Slide 19/38

Page 27: Context-Aware Security for Mobiles

Motivation The Notion of Context Context-Awareness in IT-Security Proposed Approach

Context-awareness and Security

Two aspects:Security and privacy incontext-aware applicationsContext-awareness in securityapplications⇐ this one ismore interesting for me

Context-Aware Security Leonid Batyuk Slide 20/38

Page 28: Context-Aware Security for Mobiles

Motivation The Notion of Context Context-Awareness in IT-Security Proposed Approach

Security and privacy in context-aware applications

Securing existing context-aware applications

Security is an issue in distributed context-awareapplicationsMost authors concentrate on two issues[Baldauf et al., 2004]:

1 establishing secure communications2 ensuring the credibility of context - ”Quality of Context“

[Toninelli et al., 2009]

Context-Aware Security Leonid Batyuk Slide 21/38

Page 29: Context-Aware Security for Mobiles

Motivation The Notion of Context Context-Awareness in IT-Security Proposed Approach

Context-awareness in security applications

Context-aware access control

Several authors propose using context information toenrich access control mechanismsA common concept is adding context-awareness to RBACACL vs. Context-Aware RBAC:

Who? × What?

Allow/Deny

ACL

Who? × Where? × When? × What? × W*?

Allow/Deny

Context-Aware RBAC

Context-Aware Security Leonid Batyuk Slide 22/38

Page 30: Context-Aware Security for Mobiles

Motivation The Notion of Context Context-Awareness in IT-Security Proposed Approach

Context-awareness in security applications

Context-aware access controlExisiting solutions

CASA - Context Aware Security Architecture[Covington et al., 2002]

Provides access control in a smart homeBased on GRBAC [Covington et al., 2001]Uses a modified Context Toolkit [Dey et al., 1999]

DRBAC - Dynamic RBAC [Zhang and Parashar, 2004]

Context-Aware Security Leonid Batyuk Slide 23/38

Page 31: Context-Aware Security for Mobiles

Motivation The Notion of Context Context-Awareness in IT-Security Proposed Approach

Context-awareness in security applications

Context-aware access controlExisting solutions (continued)

DCASS - Dynamic Context-Aware Security System[Hu and Weaver, 2004]

Provides access control in a pervasive healthcareenvironmentHeavy use of web services, WS-PolicyOverly complicated, but theoretically sound

Proteus - semantic context-aware access control modelthat is centered around the concept of context[Toninelli et al., 2009]

Introduces the quality of context as a measure of contexttrustworthinessUses RDF to define policiesUses Contory [Riva, 2006] and SPARQL[Prud’hommeaux and Seaborne, 2006]

Context-Aware Security Leonid Batyuk Slide 24/38

Page 32: Context-Aware Security for Mobiles

Motivation The Notion of Context Context-Awareness in IT-Security Proposed Approach

Outline1 Motivation

2 The Notion of ContextWhat is Context?Context ClassificationContext-Awareness

3 Context-Awareness in IT-SecuritySecurity and privacy in context-aware applicationsContext-awareness in security applications

4 Proposed ApproachThe Problem - RevisitedProposed Solution

Context-Aware Security Leonid Batyuk Slide 25/38

Page 33: Context-Aware Security for Mobiles

Motivation The Notion of Context Context-Awareness in IT-Security Proposed Approach

The Problem - Revisited

Disadvantages of the existing solutions

?Most mobile solutions focus onusability, not securityMost security-enabling solutions donot focus on mobile devicesThose which focus on both haveevolved out of Smart HomeEnvironments and thus rely on anexternal sensor architecture.

Context-Aware Security Leonid Batyuk Slide 26/38

Page 34: Context-Aware Security for Mobiles

Motivation The Notion of Context Context-Awareness in IT-Security Proposed Approach

Proposed Solution

Overview

Device Monitoring

Context Recognition

Context Matching

Reaction

AI

Policy DB

+ +

+ +

Context-Aware Security Leonid Batyuk Slide 27/38

Page 35: Context-Aware Security for Mobiles

Motivation The Notion of Context Context-Awareness in IT-Security Proposed Approach

Proposed Solution

Overview

Device Monitoring

Context Recognition

Context Matching

Reaction

AI

Policy DB

User

+ +

+ +

Context-Aware Security Leonid Batyuk Slide 27/38

Page 36: Context-Aware Security for Mobiles

Motivation The Notion of Context Context-Awareness in IT-Security Proposed Approach

Proposed Solution

Scenario: Stolen Device

Device Monitoring

Context Recognition

Context Matching

Reaction

Unusual activities

Unfamiliar context

Device may have been stolen

Require authentication

+ +

+ +

Context-Aware Security Leonid Batyuk Slide 28/38

Page 37: Context-Aware Security for Mobiles

Motivation The Notion of Context Context-Awareness in IT-Security Proposed Approach

Proposed Solution

Scenario: Insecure Environment

Device Monitoring

Context Recognition

Context Matching

Reaction

Unprotected wireless connection

Insecure context

Device may be in a hostile environment

Activate VPN

+ +

+ +

Context-Aware Security Leonid Batyuk Slide 29/38

Page 38: Context-Aware Security for Mobiles

Motivation The Notion of Context Context-Awareness in IT-Security Proposed Approach

Proposed Solution

Scope

In scopeRun locally on the deviceRely on as less external architecture as possibleModular, configurable and manageableShift security responsiblity from the user to the middleware

Out of scopeUsing AI to render policiesBullet-proof system, immune against attacksA corporate-grade quality product

Context-Aware Security Leonid Batyuk Slide 30/38

Page 39: Context-Aware Security for Mobiles

Appendix

For Further Reading

Thank you!

+49 (0) 30 - 314 74119+49 (0) 30 - 314 74003

[email protected]

Dipl.-Inf. Leonid Batyuk

Competence Center SecurityResearcher

Context-Aware Security Leonid Batyuk Slide 31/38

Page 40: Context-Aware Security for Mobiles

Appendix

For Further Reading

For Further Reading I

Abowd, G. D., Dey, A. K., Brown, P. J., Davies, N., Smith,M., and Steggles, P. (1999).Towards a better understanding of context andcontext-awareness.In Proceedings of the Workshop on What, Who, Where,When and How of Context-Awareness.

Baker, N., Zafar, M., Moltschanov, B., and Knappmeyer, M.(2009).Context-aware systems and implications for future internet.In Future Internet Conference and Technical Workshops.

Context-Aware Security Leonid Batyuk Slide 32/38

Page 41: Context-Aware Security for Mobiles

Appendix

For Further Reading

For Further Reading II

Baldauf, M., Dustdar, S., and Rosenberg, F. (2004).A survey on context-aware systems.International Journal of Ad Hoc and Ubiquitous Computing,2(4):263–277.

Brown, P. J. (1996).The stick-e document: a framework for creatingcontext-aware applications.In Proceedings of EP’96, Palo Alto.

Context-Aware Security Leonid Batyuk Slide 33/38

Page 42: Context-Aware Security for Mobiles

Appendix

For Further Reading

For Further Reading III

Chen, G. and Kotz, D. (2000).A survey of context-aware mobile computing research.Technical Report TR2000-381, Dept. of Computer Science,Dartmouth College.

Covington, M. J., Fogla, P., Zhan, Z., and Ahamad, M.(2002).A context-aware security architecture for emergingapplications.In ACSAC ’02: Proceedings of the 18th Annual ComputerSecurity Applications Conference, page 249. IEEEComputer Society.

Context-Aware Security Leonid Batyuk Slide 34/38

Page 43: Context-Aware Security for Mobiles

Appendix

For Further Reading

For Further Reading IVCovington, M. J., Long, W., Srinivasan, S., Dev, A. K.,Ahamad, M., and Abowd, G. D. (2001).Securing context-aware applications using environmentroles.In SACMAT ’01: Proceedings of the sixth ACM symposiumon Access control models and technologies, pages 10–20,New York, NY, USA. ACM.

Dey, A. K., Salber, D., and Abowd, G. D. (1999).A context-based infrastructure for smart environments.In Proceedings of the 1st International Workshop onManaging Interactions in Smart Environments (MANSE’99), pages 114–128, Dublin, Ireland.

Context-Aware Security Leonid Batyuk Slide 35/38

Page 44: Context-Aware Security for Mobiles

Appendix

For Further Reading

For Further Reading V

Hu, J. and Weaver, A. C. (2004).Dynamic, context-aware access control for distributedhealthcare applications.In Workshop on Pervasive Security, Privacy, and Trust(PSPT’04), Boston, MA.

McCarthy, J. and Hayes, P. (1969).Some philosophical problems from the standpoint ofartificial intelligence.In Machine Intelligence 4, pages 463–502. EdunburghUniversity Press.

Context-Aware Security Leonid Batyuk Slide 36/38

Page 45: Context-Aware Security for Mobiles

Appendix

For Further Reading

For Further Reading VI

Prud’hommeaux, E. and Seaborne, A. (2006).Sparql query language for rdf.Technical report, W3C.

Riva, O. (2006).Contory: a middleware for the provisioning of contextinformation on smart phones.In Middleware ’06: Proceedings of the ACM/IFIP/USENIX2006 International Conference on Middleware, pages219–239, New York, NY, USA. Helsinki Institute forInformation Technology, HUT, Finland, Springer-Verlag NewYork, Inc.

Context-Aware Security Leonid Batyuk Slide 37/38

Page 46: Context-Aware Security for Mobiles

Appendix

For Further Reading

For Further Reading VII

Toninelli, A., Corradi, A., and Montanari, R. (2009).A quality of context-aware approach to access control inpervasive environments.In MobileWireless Middleware, Operating Systems, andApplications, pages 236–251.

Zhang, G. and Parashar, M. (2004).Context-aware dynamic access control for pervasiveapplications.In CNDS ’04: Proceedings of the Communication Networksand Distributed Systems Modeling and SimulationConference. Society for Modeling and SimulationInternational.

Context-Aware Security Leonid Batyuk Slide 38/38