Trustworthy Clients: Extending TNC for Integrity Checks in Web-Based Environments
نویسنده
چکیده
Web-based services are vulnerable to a number of attacks. While providers of these services employ countermeasures (such as firewalls, encryption, and authentication systems) to reduce security risks, some of these security measures can be rendered useless if the PC of a user that accesses such a web-based service is not properly secured. Malicious software that is installed on a user’s PC, for example, can potentially circumvent existing protection measures by recording login credentials and impersonating the victim. To counter threats that are arising through client PCs, many providers of security sensitive web-based services have introduced usage policies for their services. These policies require users to ensure that their PCs are in a proper security state (e.g. the PC is equipped with an up-to-date anti-virus application, a personal firewall, and all security updates have been installed). However, service providers have no possible means of enforcing these policies and they have to rely on users to check the security state of their PCs manually. This thesis presents a mechanism that allows a service provider to remotely measure the security state of a user’s PC. This mechanism is based on Trusted Network Connect (TNC). TNC is a network access control mechanism that takes the security state of an access requesting party into account before making an access decision. However, TNC is currently limited to closed environments such as LANs and VPNs. This thesis proposes solutions based on authentication standards for enabling TNC in open, web-based scenarios. In particular, an architectural model for TNC is proposed that takes additional security and privacy requirements into account. Furthermore, a communication scheme is proposed that is based on standardised protocols and message formats. These protocols and message formats have been leveraged to allow web-based TNC checks to be triggered through a Web browser and TNC messages to be exchanged. These building blocks have been combined into a prototype implementation which has been evaluated using a test bed approach. This prototype successfully demonstrated that TNC can be adapted to web-based environments where it provides assurance as to the security state of clients accessing security sensitive web-based services.
منابع مشابه
Trustworthy Clients: Architectural Approaches for Extending TNC to Web-Based Environments
Trusted Network Connect (TNC) is a network access control mechanism that takes the security state of access requesting endpoints into account. This mechanism is currently limited to local area networks and VPN connections. However, TNC can further be useful in other scenarios, such as security sensitive web-based applications. An architectural approach for TNC in this environment based on authe...
متن کاملA Secure Cloud Gateway based upon XML and Web Services
Storing data in the cloud offers a scalable and easy way to handle large amounts of data guaranteeing availability and scalability by the hosting Cloud Service Providers. The price for the gained availability is uncertainness about the integrity and confidentiality of the data. Even if common approaches provide high availability and end-to-end encryption necessary to achieve Availability and Co...
متن کاملUniversally Composable Secure TNC Protocol Based on IF-T Binding to TLS
Trusted Network Connect (TNC) requires both user authentication and integrity validation of an endpoint before it connects to the internet or accesses some web service. However, as the user authentication and integrity validation are usually done via independent protocols, TNC is vulnerable to the Man-in-the-Middle (MitM) attack. This paper analyzes TNC which uses keys with Subject Key Attestat...
متن کاملOn Similarities between SOA-Based Web Service and Smart Card Application for Ease of Understanding and Securing the Former
This paper is to leverage familiarity with smart card application, i.e. understanding and practical experiences of implementing trustworthy smart card application, to uncover secret veil surrounding the SOA-Based Web Services, and further develop and implement effective strategies for achieving trustworthy Web Services. Aspects being compared, of smart card application and SOA-Based Web Service...
متن کاملData Integrity and Dynamic Storage Way in Cloud Computing
ISSN 2250 – 110X | © 2011 Bonfring Abstract--It is not an easy task to securely maintain all essential data where it has the need in many applications for clients in cloud. To maintain our data in cloud, it may not be fully trustworthy because client doesn’t have copy of all stored data. But any authors don’t tell us data integrity through its user and CSP level by comparison before and after t...
متن کامل