Securing Electronic Portfolios Patrick Lougheed, Robin Johnson, Mayo Jordanov, Brittney Bogyo, Vive Kumar, and Jane Fee [email protected] 29 October 2004 SIMON FRASER UNIVERSITY SURREY What kinds of security? o End-to-end security o Confidentiality of interactions o Confidentiality of assessment o Security of published portfolios o Security of portfolio transfers o Verification of artifact authenticity SIMON FRASER UNIVERSITY SURREY End-to-end security o Client <-> Server o HTTP over SSL o Server <-> Database o Database connection over SSL (or SSH tunneled) o Problem is now security at endpoints o Client (unable to control) o Server (able to control) SIMON FRASER UNIVERSITY SURREY Database Security o Largest vulnerability o Possibly tens of thousands of users o Stores assessment data o Successful attacker can: o Harvest of data o Change marks o Change interactions o Administrators shouldn’t have access to confidential data o Therefore biggest target SIMON FRASER UNIVERSITY SURREY Confidentiality of Interactions o In assessment systems, teacher/learner interactions should be considered private o Private only between teacher and learner o Possibly made public upon approval of both parties SIMON FRASER UNIVERSITY SURREY Confidentiality of Assessment o Minimally two way, more likely three way; learner, teacher, person with responsibility for marks o An overseer, such as a principal or teacher-incharge o Always private, never made public o Marks need to be signed as well as encrypted o Make sure they’re legitimate SIMON FRASER UNIVERSITY SURREY Security of Published Portfolios o One person may have multiple published portfolios o Presenting different material to different intended audiences for different purposes o For example: one published version for a job application at Sun Microsystems; another for an application at Microsoft; a third for assessment purposes o Need to make sure only certain audiences can access certain portions SIMON FRASER UNIVERSITY SURREY Security of Portfolio Transfers o System-to-system direct transfers o Easily secured o Indirect transfers o And archive of some sort is kept in someone’s possession for an indefinite period of time o How do we know the portfolio hasn’t been tampered with? o When do we care? SIMON FRASER UNIVERSITY SURREY Verification of Artifact Authenticity o Hardest problem of this set to solve o Can we determine if an artifact: o Was in fact created by the portfolio creator? (or some portion of it, or they’re authorized for it….) o Is an official document? o Has been tampered with? o Example: university transcript; off-line methods of verification may not work in the online world SIMON FRASER UNIVERSITY SURREY How do we solve these problems? o End-to-end security o SSL wrapping o Database security o Proper user authentication o Database level encryption (not as easy as it sounds) o SSL o Security of published portfolios o Username/password authentication SIMON FRASER UNIVERSITY SURREY The SPARC System o Focus so far on database security o Use of both public key encryption and symmetric encryption o Keyed on user’s password, so they don’t need to remember anything new, and are less likely to forget o Data is encrypted to multiple people simultaneously o Everything encrypted with a master key, so recovery from a lost password is trivial SIMON FRASER UNIVERSITY SURREY The SPARC System SIMON FRASER UNIVERSITY SURREY What problems are we left with? Part 1 o Multiple recipient encryption o Portfolios are the inverse of most traditional encryption systems o Not one-to-one or many-to-one o Rather one-to-many o RSA multiple-recipient public-key encryption o Has been published academically - still potentially problems with it o Left with encrypting a single message multiple times with multiple keys; does this pose a risk? SIMON FRASER UNIVERSITY SURREY What problems are we left with? Part 2 o Every user needs a key o To encrypt data for a user, that user needs a key; teachers also need a signing key to sign marks o Leads to the possibility of gaining knowledge about later keys if we know something about earlier keys, assuming the system generates all the keys SIMON FRASER UNIVERSITY SURREY What problems are we left with? Part 3 o Client verification o For portfolio transfers… o How do we find the people to transfer to? o How do we know that the people we’re transferring to are correctly identifying themselves? o For viewing portfolios… o How do we know people are who they say they are or belong to the organization they say they do? o Public Key Infrastructure! o Downsides: expensive, many companies don’t have a PKI infrastructure, most employees have no access to company’s keys SIMON FRASER UNIVERSITY SURREY What problems are we left with? Part 4 o Verification of authenticity o How do we trace an artifact's history? o Can we verify it came from a particular source? o Need to be able to: o Verify a signed artifact o Verify an artifact's origin o Verify the artifact hasn’t been tampered with o Single biggest problem: just because it’s signed, doesn’t mean it’s signed by the right people! SIMON FRASER UNIVERSITY SURREY People Involved o Patrick Lougheed o [email protected] o Brittney Bogyo o [email protected] o Robin Johnson o [email protected] o Mayo Jordanov o [email protected] o Henry Ng o [email protected] o Vive Kumar o [email protected] SIMON FRASER UNIVERSITY SURREY
© Copyright 2026 Paperzz