Controlled sharing of body-sensor data for sportsanalytics using code consent capabilities

With the advent of body sensor technology, athletes can easily record individual physiological metrics such as heart rate, steps, and blood sugar. In parallel, there is an increasing number of web services that use the raw body-sensor data as input to sports analytics. For the individual athletes, this can yield valuable insights on their performance and suggestions on individual training programs, which consequently aid their development. Once the data is imported into these analytics systems, the athletes are however left with little control over their data. This thesis presents code consent, a user-centric mechanism which combines informed consent and capabilities to enables athletes to share their private data in a more controllable manner. Furthermore, it gives both the athletes and analytical services the extensibility, flexibility to delegate the authority across protect domains by chaining keyed cryptographic hashes. The action and terms of informed consent are transformed to the reference to the source code and attributes of a capability. When executing a capability, the policy of access control to the resource is enforced, and the operation to the resource is performed in OpenCPU server which is a R sandbox. With a use case, we demonstrate now a user is able to share with others a graph of his aggregated data by delegating a capability. This paper details the implementation of constructing a code consent capability, and verification, delegation, execution of a capability. The security of the prototype is also discussed when users revokes capabilities. In the prototype implementation, we also evaluate the end-to-end latency of executing a capability, which includes the time of verifying the signature, the time of executing the program code, as well as downloading the output file. The analysis of the performance guides us to investigate the optimization of our prototype such as capability cache and function chaining.

[1]  Robbert van Renesse,et al.  Secure Abstraction with Code Capabilities , 2013, 2013 21st Euromicro International Conference on Parallel, Distributed, and Network-Based Processing.

[2]  Andrew W. Leung,et al.  Scalable security for petascale parallel file systems , 2007, Proceedings of the 2007 ACM/IEEE Conference on Supercomputing (SC '07).

[3]  P. Samarati,et al.  Access control: principle and practice , 1994, IEEE Communications Magazine.

[4]  Hugo Krawczyk,et al.  HMAC: Keyed-Hashing for Message Authentication , 1997, RFC.

[5]  Wei Zhang,et al.  Management of body-sensor data in sports analytic with operative consent , 2014, 2014 IEEE Ninth International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP).

[6]  Ramaswamy Chandramouli,et al.  The Queen's Guard: A Secure Enforcement of Fine-grained Access Control In Distributed Data Analytics Platforms , 2001, ACM Trans. Inf. Syst. Secur..

[7]  Dick Hardt,et al.  The OAuth 2.0 Authorization Framework , 2012, RFC.

[8]  Angelos D. Keromytis,et al.  Decentralized access control in distributed file systems , 2008, CSUR.

[9]  T. Beauchamp,et al.  Principles of biomedical ethics , 1991 .

[10]  L. Roth,et al.  What we do and do not know about informed consent. , 1981, JAMA.

[11]  Peter J. Denning,et al.  Computing as a discipline , 1989, Computer.

[12]  John Linn,et al.  The Kerberos Version 5 GSS-API Mechanism , 1996, RFC.

[13]  Randal C. Burns,et al.  Authenticating Network-Attached Storage , 2000, IEEE Micro.

[14]  Elliot K. Kolodner,et al.  Scalable Computing: Practice and Experience , 2011 .

[15]  Henry M. Levy,et al.  Capability-Based Computer Systems , 1984 .

[16]  Norman Hardy,et al.  The Confused Deputy: (or why capabilities might have been invented) , 1988, OPSR.

[17]  Håvard D. Johansen,et al.  Combining Video and Player Telemetry for Evidence-based Decisions in Soccer , 2018, icSPORTS.

[18]  D. Estrin,et al.  Open mHealth Architecture: An Engine for Health Care Innovation , 2010, Science.

[19]  Erik Riedel,et al.  The OSD security protocol , 2005, Third IEEE International Security in Storage Workshop (SISW'05).

[20]  Robbert van Renesse,et al.  Amoeba A Distributed Operating System for the 1990 s Sape , 1990 .

[21]  Robbert van Renesse,et al.  FirePatch: Secure and Time-Critical Dissemination of Software Patches , 2007, SEC.

[22]  Deborah Estrin,et al.  ohmage: An open mobile system for activity and experience sampling , 2012, 2012 6th International Conference on Pervasive Computing Technologies for Healthcare (PervasiveHealth) and Workshops.

[23]  J. Shapiro,et al.  EROS: a fast capability system , 2000, OPSR.

[24]  Robbert van Renesse,et al.  Fireflies: scalable support for intrusion-tolerant network overlays , 2006, EuroSys.

[25]  Dalit Naor,et al.  Capability based Secure Access Control to Networked Storage Devices , 2007, 24th IEEE Conference on Mass Storage Systems and Technologies (MSST 2007).

[26]  Jack B. Dennis,et al.  Programming semantics for multiprogrammed computations , 1966, CACM.

[27]  Deborah Estrin,et al.  Personal data vaults: a locus of control for personal data streams , 2010, CoNEXT.

[28]  Mohammed Kaosar,et al.  A Privacy-Preserving Framework for Personally Controlled Electronic Health Record (PCEHR) System , 2013 .

[29]  Arnar Birgisson,et al.  Macaroons: Cookies with Contextual Caveats for Decentralized Authorization in the Cloud , 2014, NDSS.

[30]  Carsten Griwodz,et al.  Bagadus: An integrated real-time system for soccer analytics , 2014, ACM Trans. Multim. Comput. Commun. Appl..