design exploration of transparency enhancing technology
play

Design Exploration of Transparency Enhancing Technology for - PowerPoint PPT Presentation

Design Exploration of Transparency Enhancing Technology for Government Mathijs Houtenbos Supervisor: Guido van t Noordende, Whitebox Systems 2016-02-02 Transparency Enhancing Technology Mathijs Houtenbos Supervisor: Guido van t Noordende,


  1. Design Exploration of Transparency Enhancing Technology for Government Mathijs Houtenbos Supervisor: Guido van ’t Noordende, Whitebox Systems 2016-02-02 Transparency Enhancing Technology Mathijs Houtenbos Supervisor: Guido van ’t Noordende, Whitebox Systems 1 of 30

  2. Content Introduction 1 Motivation Research question Requirements Existing Technology 2 DigiD eID / Idensys MijnOverheid Architecture 3 Centralized Distributed Federated Design 4 Conclusion 5 Questions 6 Transparency Enhancing Technology Mathijs Houtenbos Supervisor: Guido van ’t Noordende, Whitebox Systems 2 of 30

  3. Introduction Transparency Enhancing Technology Mathijs Houtenbos Supervisor: Guido van ’t Noordende, Whitebox Systems 3 of 30

  4. Motivation Vision of Dutch digital government by 2017 and 2020 Citizens have right of transparency and control over their data Transparency Enhancing Technology Mathijs Houtenbos Supervisor: Guido van ’t Noordende, Whitebox Systems 4 of 30

  5. Research question Research question How could transparency enhancing technology be designed for use by the government without negatively impacting citizen privacy? Transparency Enhancing Technology Mathijs Houtenbos Supervisor: Guido van ’t Noordende, Whitebox Systems 5 of 30

  6. Requirements Citizens rights Government Authentication View your data Security Correct your data Electronic ID Easily accessible Foreign eIDs Authorize others Digital services Granular access Transparency Enhancing Technology Mathijs Houtenbos Supervisor: Guido van ’t Noordende, Whitebox Systems 6 of 30

  7. Existing Technology Existing DigiD eID / Idensys MijnOverheid These example systems are all part of the solution currently implemented by the Dutch government. Transparency Enhancing Technology Mathijs Houtenbos Supervisor: Guido van ’t Noordende, Whitebox Systems 7 of 30

  8. DigiD Existing DigiD eID / Idensys MijnOverheid Secure* identity provider for government sites. Transparency Enhancing Technology Mathijs Houtenbos Supervisor: Guido van ’t Noordende, Whitebox Systems 8 of 30

  9. eID / Idensys Existing DigiD eID / Idensys MijnOverheid Secure identity provider for government and business providing STORK 3 / 4 level authentication. Transparency Enhancing Technology Mathijs Houtenbos Supervisor: Guido van ’t Noordende, Whitebox Systems 9 of 30

  10. MijnOverheid Existing DigiD eID / Idensys MijnOverheid printer Digital postbox for official government mail. Transparency Enhancing Technology Mathijs Houtenbos Supervisor: Guido van ’t Noordende, Whitebox Systems 10 of 30

  11. MijnOverheid Existing DigiD eID / Idensys MijnOverheid printer Digital ✘✘✘ postbox for official government mail. ✘ Transparency Enhancing Technology Mathijs Houtenbos Supervisor: Guido van ’t Noordende, Whitebox Systems 11 of 30

  12. Distribution Architecture Centralized Distributed Federated Transparency Enhancing Technology Mathijs Houtenbos Supervisor: Guido van ’t Noordende, Whitebox Systems 12 of 30

  13. Architecture - Centralized ... a1 a2 a3 aN s1 ... u1 u2 u3 uN A centralized server architecture where all agencies (a1-aN) and users (u1-uN) use the same central service. Transparency Enhancing Technology Mathijs Houtenbos Supervisor: Guido van ’t Noordende, Whitebox Systems 13 of 30

  14. Architecture - Distributed a u u a a u u a a u u a a u u a A distributed architecture where all agencies and users are peers. Transparency Enhancing Technology Mathijs Houtenbos Supervisor: Guido van ’t Noordende, Whitebox Systems 14 of 30

  15. Architecture - Federated ... a1 a2 a3 a4 a5 aN s1 s5 s2 s4 s3 ... u1 u2 u3 u4 u5 uN A Federated server architecture where all agencies (a1-aN) and users (u1-uN) choose which service they use. Transparency Enhancing Technology Mathijs Houtenbos Supervisor: Guido van ’t Noordende, Whitebox Systems 15 of 30

  16. Design Discussion Design Architecture When we evaluate the requirements for the transparency enhancing system, with an additional focus on the requirement for privacy by design , it seems most promising to use a federated architecture for our design. Transparency Enhancing Technology Mathijs Houtenbos Supervisor: Guido van ’t Noordende, Whitebox Systems 16 of 30

  17. Design - Distribution ... a1 a2 a3 a4 a5 aN s1 s5 s2 directory s4 s3 ... u1 u2 u3 u4 u5 uN Design based on a federated architecture where all users can choose their home service by storing a signed pointer in a public directory. Transparency Enhancing Technology Mathijs Houtenbos Supervisor: Guido van ’t Noordende, Whitebox Systems 17 of 30

  18. Design - Home service ... a1 a2 a3 a4 a5 aN s1 u1 → s5 s5 s2 directory s4 s3 ... u1 u2 u3 u4 u5 uN Public home service example: User u1 indicates his/her home service is s5 . Transparency Enhancing Technology Mathijs Houtenbos Supervisor: Guido van ’t Noordende, Whitebox Systems 18 of 30

  19. Design - Home lookup ... a1 a2 a3 a4 a5 aN s1 u1 → s5 s5 s2 directory s4 s3 ... u1 u2 u3 u4 u5 uN Public home service lookup example: Agency a1 needs to find u1 home service. Transparency Enhancing Technology Mathijs Houtenbos Supervisor: Guido van ’t Noordende, Whitebox Systems 19 of 30

  20. Design - File push ... a1 a2 a3 a4 a5 aN s1 u1 → s5 s5 s2 directory s4 s3 ... u1 u2 u3 u4 u5 uN Agency file push example: Agency a1 pushes a file to their user u1 namespace at service s5 . Transparency Enhancing Technology Mathijs Houtenbos Supervisor: Guido van ’t Noordende, Whitebox Systems 20 of 30

  21. Design - Key issuance Government key issuance visit issue + + You Physically Identification Government Official eID Card Certificate Own keypair registration visit vouch + + You Physically Identification Smart Card Government Official Certificate Transparency Enhancing Technology Mathijs Houtenbos Supervisor: Guido van ’t Noordende, Whitebox Systems 21 of 30

  22. Design - Encryption Symmetric file encryption with asymmetric key encryption = + + + File Symmetric key Public key Encrypted file Encrypted key Asymmetric key decryption with symmetric file decryption = + + + Encrypted file Encrypted key Private key File Symmetric key Transparency Enhancing Technology Mathijs Houtenbos Supervisor: Guido van ’t Noordende, Whitebox Systems 22 of 30

  23. Design - Request 1 file Iteratively request a single user file: 1 Send user lookup 2 Return user home 3 Sign request 4 Send request Directory Storage 5 Home 5 Authorise + Log 6 Return key + meta 2 7 4 6 7 Request file blob 1 8 8 Return file blob 3 Client 9 9 Client decodes file Transparency Enhancing Technology Mathijs Houtenbos Supervisor: Guido van ’t Noordende, Whitebox Systems 23 of 30

  24. Design - Namespaces Users have namespaces with separate access control, for example: user12345678/belastingdienst = + + + Signed ACL Symmetric key User12345678 key Belastingdienst key Accountant key user12345678/gemeente amsterdam = + + + Signed ACL Symmetric key User12345678 key E. van der Laan key My wife’s key Transparency Enhancing Technology Mathijs Houtenbos Supervisor: Guido van ’t Noordende, Whitebox Systems 24 of 30

  25. Design - Add file(s) Add one or more files to a namespace: 1 Sign request 2 Send request Agency 1 7 3 Return user home 2 4 Resend request 3 4/8 6/12 5 Authorise + Log 10 6 Return key + OK Directory 5/9 Home Storage 7 Encrypt file(s) 11 8 Send file(s) + meta 9 Verify + Log 10 Forward file blob(s) 11 Report status 12 Forward status Transparency Enhancing Technology Mathijs Houtenbos Supervisor: Guido van ’t Noordende, Whitebox Systems 25 of 30

  26. Conclusion Conclusion Transparency enhancing technology that does not negatively impact user privacy is feasible. Advantages Ideal scenario Only hardware tokens Privacy by design No data leakage Strong crypto Independent audits Verifyable Large infrastructure Scalable Forward compatibility Future proof Transparency Enhancing Technology Mathijs Houtenbos Supervisor: Guido van ’t Noordende, Whitebox Systems 26 of 30

  27. Questions Transparency Enhancing Technology Mathijs Houtenbos Supervisor: Guido van ’t Noordende, Whitebox Systems 27 of 30

  28. Design - Request N files Recursively request multiple user files trough directory proxy: 1 Sign request 2 Send request 4 Home s1 s2 s3 3 Forward request 5 6 6 4 Authorise + Log 6 7 7 3 7 5 Return key + meta Trusted proxy 6 Request file blobs 7 Return file blobs 8 (HTTP2) 2 8 Forward file blobs 1 Client 9 9 Client decodes files Transparency Enhancing Technology Mathijs Houtenbos Supervisor: Guido van ’t Noordende, Whitebox Systems 28 of 30

  29. Design - Additional keys Register your own additional smart card vouch + + Primary card Certificate New card certificate Transparency Enhancing Technology Mathijs Houtenbos Supervisor: Guido van ’t Noordende, Whitebox Systems 29 of 30

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend