a model of trust evaluation for a model of trust
play

A Model of Trust Evaluation for A Model of Trust Evaluation for - PowerPoint PPT Presentation

A Model of Trust Evaluation for A Model of Trust Evaluation for X.509 Certificate Abu Shohel Ahmed Abu Shohel Ahmed NordSecMob, University of Tartu How to identify an anonymous persons in online or virtual world? or virtual world? Whom to


  1. A Model of Trust Evaluation for A Model of Trust Evaluation for X.509 Certificate Abu Shohel Ahmed Abu Shohel Ahmed NordSecMob, University of Tartu

  2. How to identify an anonymous persons in online or virtual world? or virtual world? Whom to Trust 2

  3. Overview � Digital Certificate & Public Key Infrastructure � X.509 Certificate Fields � Trust in Certificate Authority policy � Proposed Trust Evaluation Technique 3

  4. Digital Certificate � ”A digital certificate is an electronic document which uses a digital signature to bind together a which uses a digital signature to bind together a public key with an identity” — wiki Name Issuer Public Key Signature Signature 4

  5. Public Key Infrastructure PKI allows us to PKI allows us to know that a given key belongs to a given user. 5

  6. How to Get a Certificate � Create a public/private key pair � Send a Certificate Signing Request. Send a Certificate Signing Request. � Provide your identity � Get the signed certificate from CA � Publish certificate 6

  7. How Validation Works � Certificate validation chain � Checking against OCSP or CRL Checking against OCSP or CRL 7

  8. X.509 Certificate Certificate format defined by IETF Some important fields: Some important fields: � Key Usage � Certificate Policy � Name Constraint 8

  9. Extended Validated Certificate � A special type of X.509 certificate that requires more extensive investigation of the requesting more extensive investigation of the requesting entity � Based on certifcate policy mapping field. 9

  10. Certificate Authorities � A set of trusted entities known as Certificate Authorities (CAs) are established to sign Authorities (CAs) are established to sign certificates. � X.509 certificate delegates trust in certificate to CA. 10

  11. Where is Trust in Certificate � Certificate is granted based on two documents Certificate policy Certificate policy 1. Certification practice statement 2. But who will evaluate these policy and actual CA practice? practice? How to automate trust evaluation process from this document? 11

  12. Trust evaluation in CA policy Some previous research: � Criteriata for certificate trust requirements Criteriata for certificate trust requirements � Certificate practice statement formalization or semi-formalization. � Platform for Internet Content Selection rating service 12

  13. What Needs to be Introduced Introduction of a trust level in certificate Introduction of a trust level in certificate fields. (currently defined in CP) Semi-formalization of CPS document 13

  14. Comparison Solution Advantage Disadvantage CPS semi formalization Processing is performed Trust evaluation is based using local knowledge on weak assumptions which means applications (e.g., counting MUST). can independently Requires online request to evaluate a certificate. get CPS file. CPS formalization Provides more accurate CPS has no common information about the standard. Requires an CPS file. CPS file. online request for CPS online request for CPS file. Ratings Flexible and easy to find Trust depends on the in- service rating for a certificate. dependent auditing Provides a clear direction authority. Requires an about a certificate. online request to get rating information. 14

  15. Proposed Evaluation Model � Based on all the best known Trust solution for certificate. certificate. � Rating based system. � Stepwise – Modular � Incorporate online and offline evaluation 15

  16. 16

  17. Discussion � Model can be used for trust evaluation in most Model can be used for trust evaluation in most of the cases. � Model is extendable with other rating feature. � Mapped with VirtualLife indentification strategy. 17

  18. Questions 18

  19. References � http://www.ietf.org/rfc/rfc2560.txt. � http://www.ietf.org/rfc/rfc3280.txt. � http://www.ietf.org/rfc/rfc3280.txt. � Borja Sotomayor. Certicates and certicate authorities. http://gdp.globus.org/gt3-tutorial/multipehtml/ch10s04.html. � Gabriel A, Weaver, Scott Rea, Sean W, and Smith. A computational framework for certificate policy operations. In Dartmouth College Hanover, NH03755, USA 19

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend