学位论文详细信息
Security for Rural Public Computing
security;trusted computing;developing regions;cryptography;trusted public computing;rural public computing;public key infrastructure;computer networks;distributed systems;delay tolerant networks;security architecture;Computer Science
Ur Rahman, Sumair
University of Waterloo
关键词: security;    trusted computing;    developing regions;    cryptography;    trusted public computing;    rural public computing;    public key infrastructure;    computer networks;    distributed systems;    delay tolerant networks;    security architecture;    Computer Science;   
Others  :  https://uwspace.uwaterloo.ca/bitstream/10012/3986/1/surrahman_mmath08.pdf
瑞士|英语
来源: UWSPACE Waterloo Institutional Repository
PDF
【 摘 要 】
Current research on securing public computing infrastructure like Internet kiosks has focused on the use of smartphones to establish trust in a computing platform or to offload the processing of sensitive information, and the use of new cryptosystems such as Hierarchical Identity-based Encryption (HIBE) to protect kiosk user data. Challenges posed by rural kiosks, specifically (a) the absence of specialized hardware features such as Trusted Platform Modules (TPMs) or a modifiable BIOS in older recycled PCs, (b) the potential use of periodically disconnected links between kiosks and the Internet, (c) the absence of a production-ready implementation of HIBE and (d) the limited availability of smartphones in most developing regions make these approaches difficult, if not impossible, to implement in a rural public computing scenario. In this thesis, I present a practical, unobtrusive and easy-to-use security architecture for rural public computing that uses a combination of physical and cryptographic mechanisms to protect user data, public computing infrastructure and handheld devices that access this infrastructure. Key contributions of this work include (a) a detailed threat analysis of such systems with a particular focus on rural Internet kiosks and handheld devices, (b) a security architecture for rural public computing infrastructure that does not require any specialized hardware, (c) an application-independent and backward-compatible security API for securely sending and receiving data between these systems and the Internet that can operate over delay tolerant links,(d) an implementation of my scheme for rural Internet kiosks and (e) a performance evaluation of this implementation to demonstrate its feasibility.
【 预 览 】
附件列表
Files Size Format View
Security for Rural Public Computing 3406KB PDF download
  文献评价指标  
  下载次数:19次 浏览次数:70次