Enforcing Physically Restricted Access Control for Remote Data
Download
Author
Michael S. Kirkpatrick
Tech report number
CERIAS TR 2011-18
Entry type
inproceedings
Abstract
In a distributed computing environment, remote devices must often be granted access to sensitive information. In such settings, it is desirable to restrict access only to known, trusted devices. While approaches based on public key infrastructure and trusted hardware can be used in many cases, there are settings for which these solutions are not practical. In this work, we define physically restricted access control to reflect the practice of binding access to devices based on their intrinsic properties. Our approach is based on the application of physically unclonable functions. We define and formally analyze protocols enforcing this policy, and present experimental results observed from developing a prototype implementation. Our results show that non-deterministic physical properties of devices can be used as a reliable authentication and access control factor.
Download
Date
2011 – 2 – 1
Key alpha
Kirkpatrick
Publication Date
2011-02-01

