WebALPS: Using Trusted Co-Servers to Enhance Privacy and Security of Web Interactions

This report describes a project that aims to fill two gaps in recent security and privacy research. The first gap is {\em trust.} Too often, ``security of Web transactions'' reduces to ``encryption of the channel''---and neglects to address what happens at the server on the other end. This oversight forces clients to trust the good intentions and competence of the server operator---but gives clients no basis for that trust. The second gap is {\em secure coprocessing.} Despite early academic research in the potential of this technology, and the subsequent industrial research that resulted high-assurance,
programmable secure coprocessors as COTS products, many in the computer science community still regard ``secure hardware'' as a synonym for ``cryptographic accelerator.' This oversight neglects the real potential of COTS secure coprocessing technology to establish trusted islands of computation in hostile environments (e.g., at servers with risk of insider attack).

The WebALPS project proposes to address both issues by using secure coprocessors to establish trusted third parties at Web servers. Having clients establish an SSL session {\em into} an application
running inside the secure hardware at the Web server (instead of just using secure hardware to speed cryptography) provides a systematic way to enhance the security of a broad family of Web-based
services---including {\em security against insider attack}---without requiring a substantial change to the currently deployed Web infrastructure.

By: Sean W. Smith

Published in: RC21851 in 2000

LIMITED DISTRIBUTION NOTICE:

This Research Report is available. This report has been submitted for publication outside of IBM and will probably be copyrighted if accepted for publication. It has been issued as a Research Report for early dissemination of its contents. In view of the transfer of copyright to the outside publisher, its distribution outside of IBM prior to publication should be limited to peer communications and specific requests. After outside publication, requests should be filled only by reprints or legally obtained copies of the article (e.g., payment of royalties). I have read and understand this notice and am a member of the scientific community outside or inside of IBM seeking a single copy only.

rc21851.pdf

Questions about this service can be mailed to reports@us.ibm.com .