Privacy Enhancements for Hardware-Based Security Modules

被引:0
|
作者
Pasupathinathan, Vijayakrishnan [1 ]
Pieprzyk, Josef [1 ]
Wang, Huaxiong [2 ]
机构
[1] Macquarie Univ, Dept Comp, Ctr Adv Comp Algorithms & Cryptog, Sydney, NSW 2109, Australia
[2] Nanyang Technol Univ, Div Sci Mat, Singapore 639798, Singapore
来源
基金
澳大利亚研究理事会;
关键词
Pseudonyms; Anonymity; Hardware-based security; SYSTEMS;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The increasing growth in the use of Hardware Security Modules (HSMs) towards identification and authentication of a security endpoint have raised numerous privacy and security concerns. HSMs have the ability to tie a system or an object, along with its users to the physical world. However, this enables tracking of the user and/or an object associated with the HSM. Current systems do not adequately address the privacy needs and as such are susceptible to various attacks. In this work, we analyse various security and privacy concerns that arise when deploying such hardware security modules and propose a system that allow users to create pseudonyms from a trusted master public-secret key pair. The proposed system is based on the intractability of factoring and finding square roots of a quadratic residue modulo a composite number, where the composite number is a product of two large primes. Along with the standard notion of protecting privacy of an user, the proposed system offers colligation between seemingly independent pseudonyms. This new property when combined with HSMs that store the master secret key is extremely beneficial to a user, as it offers a convenient way to generate a large number of pseudonyms using relatively small storage requirements.
引用
收藏
页码:224 / +
页数:3
相关论文
共 50 条
  • [1] Virtualization and hardware-based security
    Perez, Ronald
    Sailer, Reiner
    van Doorn, Leendert
    IEEE SECURITY & PRIVACY, 2008, 6 (05) : 24 - 31
  • [2] Hardware-based IT security - Security Token Technologies in Automation
    Runde, Markus
    Niemann, Karl-Heinz
    Tebbe, Christopher
    ATP EDITION, 2012, (03): : 42 - 49
  • [3] Security by design: Hardware-based Security in Windows 8
    EMEA, United Kingdom
    Souren, J., 1600, Elsevier Ltd (2013):
  • [4] Security Primitives for Reconfigurable Hardware-Based Systems
    Huffmire, Ted
    Levin, Timothy
    Thuy Nguyen
    Irvine, Cynthia
    Brotherton, Brett
    Wang, Gang
    Sherwood, Timothy
    Kastner, Ryan
    ACM TRANSACTIONS ON RECONFIGURABLE TECHNOLOGY AND SYSTEMS, 2010, 3 (02)
  • [5] SpecCert: Specifying and Verifying Hardware-Based Security Enforcement
    Letan, Thomas
    Chifflier, Pierre
    Hiet, Guillaume
    Neron, Pierre
    Morin, Benjamin
    FM 2016: FORMAL METHODS, 2016, 9995 : 496 - 512
  • [6] Application of hardware-based IT security measures in automation networks
    Runde, Markus
    Niemann, K. -H.
    Hausmann, Stefan
    Heiss, Stefan
    AUTOMATION 2012, 2012, 2171 : 391 - 394
  • [7] Security & privacy architectural modules: On the hardware & software integration platforms
    Electrical and Computer Engineering Dept., University of Patras, Patras, Greece
    不详
    不详
    WSEAS Trans. Inf. Sci. Appl., 2006, 5 (965-971):
  • [8] Security for Building Automation with Hardware-Based Node Authentication
    Fischer, Thomas
    Lesjak, Christian
    Hoeller, Andrea
    Steger, Christian
    2017 22ND IEEE INTERNATIONAL CONFERENCE ON EMERGING TECHNOLOGIES AND FACTORY AUTOMATION (ETFA), 2017,
  • [9] A Hardware-Based Security Scheme for In-Vehicle CAN
    Maruaisap, Adirek
    Kumhom, Pinit
    2016 20TH INTERNATIONAL COMPUTER SCIENCE AND ENGINEERING CONFERENCE (ICSEC), 2016,
  • [10] A Study on the Hardware-based Security Solutions for Smart Devices
    Ju, Hongil
    Jeon, Yongsung
    Kim, Jeongnyeo
    2015 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND COMPUTATIONAL INTELLIGENCE (CSCI), 2015, : 833 - 834