Friday 11 January 2013


Privacy in Ubiquitous computing

            In ubiquitous environment the data is shared freely at anytime, anywhere by any device without any restrictions. In this environment the personal information regarding the particular user can be revealed and shared without consent of the owner of that particular data. Privacy is main issue in ubiquitous environment. The Kerberos model is standard model with in ubiquitous computing environment. This model has been studied widely applied and implemented to various applications. The existing models such as Role Based Access Control Model and Trust Based Approach not solved the privacy problems in the ubiquitous computing. The paper proposed will explains the concept privacy in ubiquitous computing and how efficiently the personal information (privacy) is handled in ubiquitous computing by using the proposed Kerberos model. Privacy protection plays a vital role in ubiquitous computing environment. User feels uncomfortable to be in ubiquitous computing if privacy is not implemented. Kerberos model is integrated with public key cryptography results in stronger privacy and security to user’s data in ubiquitous computing. By implementing the Kerberos model with cryptography the user data in ubiquitous environment can be secured.                        
Keywords: privacy, Role Based Access Control Model, Trust Based Approach, Kerberos Model, Ubiquitous Computing.








Contents


2. Introduction:

            Ubiquitous computing represents the today’s technology of computing generation characterising the usage of mini portable devices in form of phones, personal digital assistants which results each and every person is having and accessing them all at a time simultaneously. The research was started in early 1990’s. Mark Weiser is the man who derived the term ubiquitous computing and defined ubiquitous computing as: “The most profound technologies are those that disappear. They weave themselves into the fabric if everyday life until they are indistinguishable from it.”  Weiser (1991).
Many different research works are done and still many of them on the process in the field of ubiquitous computing. And it’s time to mainly concentrate on issues in ubiquitous computing. Privacy is the most important issue that is to be discussed in the ubiquitous computing. Why privacy? The privacy and the technology are closely bonding each other. The capacity to see and capture the data and manipulate the data which affects the personal life of the particular user. Now privacy is the major issue in the ubiquitous computing application system. Extra services must be taken to implement more privacy to users in the ubiquitous computing.
Aim of this report mainly concentrates on privacy implementations in ubiquitous computing. But it is very hard to implement the concept of privacy because privacy is not a ready-made solution to solve the problems of privacy in ubiquitous computing. Each and every system in ubiquitous environment must have its own privacy policy to be implemented according its behaviour where privacy is a major issue no single solution exist to implement the concept privacy.     

 2.1Challenges     

The service which is delivered in the ubiquitous computing is quite different compared to service provide to the system.  In ubiquitous computing the users will move frequently and it is smart environment. When a people move around the smart spaces the system must provide the privacy and security to the data of users. Tinghuai Ma et al (2008)

2.1.1Non-perceivably:

            The data of the user collected non-perceivably by RFID tags. This tag makes the user to give large amount of information without manual interaction by the scans and captures devices which gain data of the user when and where the user used the tag. In future it is very hard to find when we are communicating with the device. The user doesn’t know where the personal data is stored.

2.1.2Ubiquitously:

            There is no privacy among the ubiquitous computing. Each and every movement of the user is observed by sensing devices and there is a chance of leakage of the data. Anything which is done by the particular user like talking, driving a car and going to office is stored and it can be retrieved any time.   

 2.1.3 Effectively:

The sensors with high power are integrated in to the ubiquitous system to observe certain things of environment. At present the sensors can observe sound, noise etc. as well as human sensitive life such as stress, tension and fear. These types of devices hold the large amount of data.   

3. Ethical Issues:


            The data used in this project is correct and it not contains the data of other users.
There will not be any leakage of data and loss of the data during project in process. Project is done according to the rules and regulations followed by the Staffordshire university ethical issues. The person who is interested doing the project on same project must fallow the Staffordshire university rules. The software is patented and referencing is done in Harvard style.

4. Risk Assessments: 

           
            The risks evolved during the projects are

ü  Unavailability of the data such as the data for the project may not available.

ü  The data may be stolen by others.

ü  The system is crashed while project in progress.

ü  Loss of USB drive.

ü  Project is not submitted with in time.

 

ü  The risk associated for not following the rules and regulations according to the university.

ü  Collapse of the document.

5. Literature review:


Privacy in ubiquitous computing:

 Ubiquitous computing is an environment where users access the data, at any time, at anywhere through any device without any limitations. Privacy is one of key issues in ubiquitous computing environment.

5.1RBAC model:

At present by implementing the (RBAC) role based access control model in the ubiquitous computing environment which provides the privacy. Here the RBAC is a multi-user application on line approach designed in 1970. Here by using the role concept the RBAC model can manage the users and the permissions of users. In RBAC the permissions are given to the roles and the users are members of the roles. As per sandhu et al (1996) this model executes the permissions according to roles. This model consists of four elements: users, roles and sessions, permissions. Figure (1) represents the RBAC model where users (u) denote the human activity, role (R) denotes the job functionality in the organisation having responsibility (here at present ubiquitous computing environment). Permission (p) which provides an approval (or) permission to have an access with the objects.
             

Figure (1): Role based access control model (RBAC) (Sandhu et al, 1996) p.p  278-283
In above figure there exist many-to-many relations among (UA) user assignments and (PA) permission assignments. Here constraints are the rules followed by the user assignments and permission assignments. Hierarchical structure of roles is defined by role hierarchy.

5.2The Actual Framework implemented for the privacy policy:

Implementing the concept of RBAC sung et al (2006) came with a new privacy policy solution in ubiquitous computing environments. In RBAC model system administrator creates and maintains the roles and permissions.  Hence RBAC model had some restrictions on treating different needs of the users. Due to this problem the core component of RBAC is separated to user assignment (UA) and permission assignment (PA) for creating the privacy policy, which represents individual and granting the permission to control the personal information.
Untitled
Figure 2: Modified (RBAC) Role based access control model (Sung, et al, 2006) p.p 278-283.
The figure above represents the modified RBAC and it consists of two components such as user assignment and permission assignment, where in user assignment component (UA) which represents many-to-many user-to-roles assignments relation. In permission assignment component (PA) which represents many-to-many permission-to-roles assignments relation. Here user component (UA) is operated by the user as per the rules of the privacy policy and the permission component (PA) is operated by the security administrator. Here the UA component acts as trusted third party agent to users and agents, here the agent is an expert in trusting users in ubiquitous computing. Each and every user follows the privacy policy that personal information of the particular user is to disclose. The permission assignment component (PA) is approved to the security administrator who controls the components as per the organisation rules. Here the UA user assignment and PA permission assignment having communication regarding the information between the user and trusted agent and approve exact information to the user as per the rules of privacy policy requested by users.    

6. Trust Based Approach in privacy control:

Giang et al (2007) designed a trust based model to provide privacy in ubiquitous computing because this model deals with trust evaluation of the users system depending on interactions that are done in past and peer recommendations. Depending on this evaluation process, how much amount of information is delivered to user’s system and data protection against the intruders. Solution for this is defined in two stages such as (a) by calculating trust value of each requests from users system. (b) By making use of this trust based privacy policy, decisions are made how much amount of data should be delivered to the particular users system (guest).

1
Figure 3: Flow Chart for Truth Evaluation (Giang et al 2007) p.p 149-152
The above figure describes how trust evaluation is done
1)      If the request is from the familiar person then the request is forwarded to time based evaluation else if the request is made from different person then that request must be acknowledged by peer. The positive request is processed to trust value calculation directly.
2)      The request from the familiar person which is forwarded to time based evaluation is followed by trust value calculation, pre-defined privacy policy and finally gets the response for the request.    
This process allows the users to specify how much information he can provide depending on the trust value of the particular entity. This model specifies the level of privacy.

 7. Disadvantages of the above system:

The designing of RBAC model is quite success, but implementing this model in ubiquitous computing is complicated such as assigning permissions, roles and user assignments to users and system. From the organizational point of view RBAC model is result oriented system and good for simple applications compared with heavy applications. Privacy in ubiquitous computing system deals manly with network applications (heavy applications). So RBAC model is not good system to implement in privacy of ubiquitous system environment.
The Trust based evaluation system is a trusted model but raises problems like the trust opinion is by single individual where one user takes it as trustworthy and another user may think the opinion is not trustworthy. The evaluation of the truth at this instance may not be correct and the model seems to be an unrealistic in providing privacy to the system.

8. PROPOSAL:   

Ubiquitous computing deals with the networks, so by implementing privacy in ubiquitous environment results positive if encryption methods implemented in network. The different types of encryption techniques are cryptography, public key cryptography, Deffie-Hellman key exchange, DES, etc. these encryption techniques are successfully implemented. One of the best application models that were developed by implementing the encryption technique is Kerberos application model   (Neuman & Ts’o, 1994).  

 



Brief description about the techniques:
                                                             
Encryption
Decryption
Creation of hash function
Figure 4 cryptography methods

9. Primary research and investigations:

 Primary research mainly concentrates on privacy in ubiquitous computing.  Ubiquitous computing deals with the networks, so by implementing privacy in ubiquitous environment results positive if encryption methods implemented in network. The different types of encryption techniques are cryptography, public key cryptography, Deffie-Hellman key exchange, DES, etc. these encryption techniques are successfully implemented. One of the best application models that were developed by implementing the encryption technique is Kerberos application model   (Neuman & Ts’o, 1994).
Now a day’s modern computer systems can handle the multiple users and services provided to the users. The systems can identify the requests made by the users and actions performed by the users. In traditional systems identification is done by verifying the passwords. Authentication is process which verifies the user’s identity. The passwords which are sent across the network are interrupted and they can be used by the intruders by using certain programmes. In order to provide the authentication and confidentiality to the data, I propose to use Kerberos which is more secured. Neuman et al (1994)

 9.1 Why Kerberos?

                        Kerberos comes into play when problems associated with password based authentication, where the passwords are collected by the intruders. Coming to the security issues the password based authentication is having some problems like the users will not enter the passwords each and every time when users   access the network services where security problems arise. Here Kerberos is stronger authentication method based on cryptography. When authentication method based on cryptography used, intruder cannot access the information, even though the information is captured, the captured data will be in different format where intruder can’t understand the data.

9.2How Kerberos work:

                        Kerberos is a distributed service which had a three parts such as
Ø  Client software.
Ø  Application server (KDC).
Ø  Security server (or) authentication server.

    
http://www.codeproject.com/KB/webservices/KerberosAuthenticationPOC/2.jpg
 Figure (3): Kerberos process (Neuman, et al, 1994), PP.33-38.

The figure explains the entire process of the Kerberos. The client asks the authentication access by sending the ticket request to the authentication server. Here authentication server maintains the database of encrypted user identities and authentication server gives the service ticket to the client. Next client sends the request to application server by using ticket granted by authentication server  

9.3Kerberos authentication service:

                        Kerberos is a distributed authentication service that provides the authentication service to client and the identity must be verified at server, Client runs for user. The data can’t be sent between the client and server before the identity is verified. The Kerberos provides the confidentiality for the data which is processed between client and server.   

9.4Kerberos encryption:

                        In Kerberos encryption public key is used for both encryption and decryption. Client runs for user and client will have the information regarding the public key that is used for encryption and decryption. User and authentication server will have the encryption key which is used for encryption.
DES (Data Encryption Stranded) is an encrypting method which is implemented in the Kerberos. It defines that if the cipher text is encrypted by using the encrypting key that is used for the cipher text produces the plan text and produces the checksum message that matches the data. When the different key is used for the encryption such as encrypting cipher text to plain text it produces the checksum message that does not match the data. Both encryption and checksum gives the integrity and confidentiality to the encrypted messages in the Kerberos model.      

9.5Kerberos Ticket:

            Kerberos ticket is used for distribution of the session key to the server. Client’s authentication depends on the authentication server. Whenever client makes a request to server.  The authentication sever generates the encryption key and distributed to the user and the server. The key is called session key.
Authentication server generates the certificate known as Kerberos ticket. And Kerberos ticket is encrypted by server key where Kerberos ticket contains the information regarding session key used for authentication, session key is issued to particular user, expiry time key which is expired after certain time period.   

9.6Application Requests and responses:

                        The application request exists in two parts such as ticket and authenticator. The authenticator consists of checksum, encrypted key and current time. The client sent a request to verifier (server) and waiting for the response. Here the verifier performs encryption techniques such as encryption and decryption and verify the checksum and timestamp of the message requested by client. If the time stamp period of the message is with in specified time (around 5 to 10 mints) then the verifier thinks the request is fresh and sent a response to the client. In the figure 3 and 4 are request and response by client and server.
 

Figure (4) Kerberos Request and Response (Neuman, et al, 1994), PP.33-38.

9.7Cross Realm Authentication:

Kerberos is having an advantage such as cross-realm authentication. The cross realm authentication comes into play when the systems cross the boundaries. It is not enough correct for the user registered in single authentication server instead the user must be registered in multiple number of authentication servers. Neuman et al (1994) Realm defines the subset of particular user and the server registered in authentication server.  The advantage here is the client can prove is identity to verifier (server) registered in different locations located outside the boundaries. Coming to the versions of the Kerberos, version 4 does not produce the cross realm authentication which is not scalable and interconnection is necessary to exchange of n keys where n is number of different realms. Version 5 produces the Multi Hop Cross Realm Authentication and interconnections of the keys among the different realms are possible. The key of each realm is shared by parent and children such as ISI.EDU are a realm that shares a key with EDU realm and MIT.EDU, USE.EDU.

9.8Getting and using Kerberos:

            One can get the source codes of version 4 and version 5 from the MIT, But MIT officially will not support the release of version 4 and version 5. Companies deliver the product of version 4 and version 5 with the reference of MIT.  One can get the information regarding the free releases by sending the messages to info-kerberos@mit.edu.

9.9Kerberos utilities:

            Utilities play a major part in the Kerberos. In order to use all services provide by the Kerberos the utility programs must be installed. The services are list of the credentials (KList), Kerberos credentials (KList), destroy credentials (Kdestroy), change password (Kpasswd). The user can use all those services and it will be easy to login when Kerberos login toolkit is combined with login program. Where user can enter the password only once while login. Which is very transparent and will not have knowledge that user is using Kerberos.

9.10Improving the security:

            When Kerberos is integrated with public key cryptography it produces more and stronger security.

10. Public key cryptography:

            In public key cryptography encryption and decryption plays a vital role. Two set of keys are used to perform cryptography operations.one key is public key which is known by very one and second key is private key which is known by the user and the server. These keys are used for the communication between the user and the server. Public key cryptography is good for the store and forward applications like electronic mails etc. public key cryptography faces few difficulties while accessing the multiple authentications operations at a time. And work is under process to add the public key cryptography to the Kerberos. When public key is added it also may perform the operation performed like Kerberos. Where authentication may use the service of public key cryptography by exchanging the keys between the different authentication servers. 



11. Conclusion:  

                        Ubiquitous computing is an emerging research area with great potential.  In this paper we present a Kerberos model of everyday privacy in ubiquitous computing environments because this model meets the privacy objectives such as privacy and confidentiality. This model describes how privacy can be achieved by implementing in ubiquitous computing.       The use of encrypting methods with Kerberos model guarantees the confidentiality of the data. The existing models such as RBAC (Role Based Access Control model) and Trust Based Approach Model failed to solve the problems of the privacy. Our main aim mainly concentrates on ‘privacy enhancing services’ that provide protection for the users which allows users to use services in ubiquitous environment. Privacy protection plays a vital role in ubiquitous computing environment. User feels uncomfortable to be in ubiquitous computing if privacy is not implemented and mainly concentrates on how efficiently the personal information (privacy) is handled in ubiquitous computing by using the proposed Kerberos model. By implementing Kerberos model the user data in ubiquitous computing can be secured.    

12. References:


            Giang, Pho Duc; Hung, Le Xuan; Shaikh, Riaz Ahmed; Zhung, Yonil; Lee, Sungyoung; Lee, Young-Koo; Lee, Heejo; , "A Trust-Based Approach to Control Privacy Exposure in Ubiquitous Computing Environments," Pervasive Services, IEEE International Conference on , vol., no., pp.149-152, 15-20 July 2007.[online]Available at:
doi: 10.1109/PERSER.2007.4283905
URL: 
http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=4283905&isnumber=4283875 [Accessed ON 22 OCT 2011].

Neuman, B.C.; Ts'o, T.; "Kerberos: an authentication service for computer networks," Communications Magazine, IEEE, vol.32, no.9, pp.33-38, Sep 1994. [Online]Available at:
doi: 10.1109/35.312841
U RL: 
http:// eeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=312841&isnumber=7577 [Accessed ON 08 OCT 2011].

Tinghuai Ma; Shin-Dug Kim; Jun Wang; Yawei Zhao; , "Privacy Preserving in Ubiquitous Computing: Challenges & Issues," e-Business Engineering, 2008. ICEBE '08. IEEE International Conference on , vol., no., pp.297-301, 22-24 Oct. 2008.[online]Available at:
doi: 10.1109/ICEBE.2008.55
URL: 
http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=4690629&isnumber=4690569  [Accessed ON 30 OCT 2011].

Sung-Ho Hong; Eun-Ae Cho; Chang-Joo Moon; Doo-Kwon Baik; , "RBAC-Based Access Control Framework for ensuring Privacy in Ubiquitous Computing," Hybrid Information Technology, 2006. ICHIT '06. International Conference on , vol.1, no., pp.278-283, 9-11 Nov. 2006.[online]Available at:
doi: 10.1109/ICHIT.2006.253499
URL: 
http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=4021102&isnumber=4021047 [Accessed ON 10 Nov 2011].

Norbert A.Streitz,”Augmented Reality and the Disappearing Computer” Intelligent agents and virtual reality, 2001[online] available from http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.3.4304&rep=rep1&type=pdf. [Accessed ON 18 NOV 2011].

Bibliography:
            Primeaux, D.; Ames, J.E.; , "Personal, private, secret, public [ethics of data privacy]," Technology and Society, 2002. (ISTAS'02). 2002 International Symposium on , vol., no., pp. 157- 161, 2002.[online]Available at:
doi: 10.1109/ISTAS.2002.1013811
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=1013811&isnumber=21825 [Accessed ON 28 OCT 2011].

Yang Cao; Yan Li; Hui Li; Xingfang Wang; , "An Anonymous Authentication Protocol for Privacy Protection in Location Based Services," Wireless Communications, Networking and Mobile Computing, 2008. WiCOM '08. 4th International Conference on , vol., no., pp.1-5, 12-14 Oct. 2008.[online]Available at:
doi: 10.1109/WiCom.2008.1136
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=4679044&isnumber=4677909 [Accessed ON 16 NOV 2011].

Karger, P. A.; Kc, G. S.; Toll, D. C.; , "Privacy is essential for secure mobile devices," IBM Journal of Research and Development , vol.53, no.2, pp.5:1-5:17, March 2009.[online]Available at:
doi: 10.1147/JRD.2009.5429047
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5429047&isnumber=5429042 [Accessed ON 02 NOV 2011].

Adam, J.A.; , "Data security-cryptography=privacy?," Spectrum, IEEE , vol.29, no.8, pp.29-35, Aug 1992.[online]Available at:
doi: 10.1109/6.144533
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=144533&isnumber=3867 [Accessed ON 08 OCT 2011].