PRIAM: PRivate Information Access Management on Outsourced Storage Service Providers Mark Shaneck Karthikeyan Mahadevan Jeff Yongdae Kim.

Slides:



Advertisements
Similar presentations
1 Key Exchange Solutions Diffie-Hellman Protocol Needham Schroeder Protocol X.509 Certification.
Advertisements

Trusted Data Sharing over Untrusted Cloud Storage Provider Gansen Zhao, Chunming Rong, Jin Li, Feng Zhang, and Yong Tang Cloud Computing Technology and.
Chapter 10 Real world security protocols
Key distribution and certification In the case of public key encryption model the authenticity of the public key of each partner in the communication must.
Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Digital Signatures Good properties of hand-written signatures: 1. Signature is authentic. 2. Signature is unforgeable. 3. Signature is not reusable (it.
Authentication and Digital Signatures CSCI 5857: Encoding and Encryption.
Lecture 3.3: Public Key Cryptography III CS 436/636/736 Spring 2012 Nitesh Saxena.
Using Auxiliary Sensors for Pair-Wise Key Establishment in WSN Source: Lecture Notes in Computer Science (2010) Authors: Qi Dong and Donggang Liu Presenter:
Session 5 Hash functions and digital signatures. Contents Hash functions – Definition – Requirements – Construction – Security – Applications 2/44.
Lecture III : Communication Security, Services & Mechanisms Internet Security: Principles & Practices John K. Zao, PhD SMIEEE National Chiao-Tung University.
CS555Spring 2012/Topic 161 Cryptography CS 555 Topic 16: Key Management and The Need for Public Key Cryptography.
ECOMMERCE TECHNOLOGY FALL 2003 COPYRIGHT © 2003 MICHAEL I. SHAMOS Cryptography.
1 Digital Signatures CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute April 12, 2004.
ITIS 3200: Introduction to Information Security and Privacy Dr. Weichao Wang.
ITIS 6200/8200. time-stamping services Difficult to verify the creation date and accurate contents of a digital file Required properties of time-stamping.
More on AuthenticationCS-4513 D-term More on Authentication CS-4513 Distributed Computing Systems (Slides include materials from Operating System.
How cryptography is used to secure web services Josh Benaloh Cryptographer Microsoft Research.
Freenet A Distributed Anonymous Information Storage and Retrieval System I Clarke O Sandberg I Clarke O Sandberg B WileyT W Hong.
[[ NET-CENTRIC CAPABILITIES TURBULENCE TECHNICAL OVERVIEW : AUGUST 2007 ]] MATH CAREERS AT NATIONAL SECURITY AGENCY Jill Calhoun May 2010.
Dan Boneh Introduction What is cryptography? Online Cryptography Course Dan Boneh.
Alexander Potapov.  Authentication definition  Protocol architectures  Cryptographic properties  Freshness  Types of attack on protocols  Two-way.
Encryption. Introduction Computer security is the prevention of or protection against –access to information by unauthorized recipients –intentional but.
Public Key Model 8. Cryptography part 2.
Secure Electronic Transactions (SET). SET SET is an encryption and security specification designed to protect credit card transactions on the Internet.
Tonga Institute of Higher Education Design and Analysis of Algorithms IT 254 Lecture 9: Cryptography.
Cryptology Digital Signatures and Digital Certificates Prof. David Singer Dept. of Mathematics Case Western Reserve University.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
Digital Signatures Good properties of hand-written signatures: 1. Signature is authentic. 2. Signature is unforgeable. 3. Signature is not reusable (it.
Csci5233 Computer Security1 Bishop: Chapter 10 (Cont.) Key Management: Storage & Revoking.
A Survey on Secure Cloud Data Storage ZENG, Xi CAI, Peng
RSA Implementation. What is Encryption ? Encryption is the transformation of data into a form that is as close to impossible as possible to read without.
10/1/2015 9:38:06 AM1AIIS. OUTLINE Introduction Goals In Cryptography Secrete Key Cryptography Public Key Cryptograpgy Digital Signatures 2 10/1/2015.
Public Key Encryption and the RSA Public Key Algorithm CSCI 5857: Encoding and Encryption.
Cryptography, Authentication and Digital Signatures
Lecture 11: Strong Passwords
Public-Key Cryptography CS110 Fall Conventional Encryption.
How cryptography is used to secure web services Josh Benaloh Cryptographer Microsoft Research.
Digital Signatures A primer 1. Why public key cryptography? With secret key algorithms Number of key pairs to be generated is extremely large If there.
4 th lecture.  Message to be encrypted: HELLO  Key: XMCKL H E L L O message 7 (H) 4 (E) 11 (L) 11 (L) 14 (O) message + 23 (X) 12 (M) 2 (C) 10 (K) 11.
Chapter 31 Cryptography And Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Public Key Encryption CS432 – Security in Computing Copyright © 2005, 2008 by Scott Orr and the Trustees of Indiana University.
CSC 386 – Computer Security Scott Heggen. Agenda Exploring that locked box thing from Friday?
1 Common Secure Index for Conjunctive Keyword-Based Retrieval over Encrypted Data Peishun Wang, Huaxiong Wang, and Josef Pieprzyk: SDM LNCS, vol.
1 Normal executable Infected executable Sequence of program instructions Entry Original program Entry Jump Replication and payload Viruses.
A A E E D D C C B B # Symmetric Keys = n*(n-1)/2 F F
Security Using PGP - Prajakta Bahekar. Importance of Security is one of the most widely used network service on Computer Currently .
Identity based signature schemes by using pairings Parshuram Budhathoki Department of Mathematical Science FAU 02/21/2013 Cyber Security Seminar, FAU.
COEN 351 E-Commerce Security
Data Integrity Proofs in Cloud Storage Author: Sravan Kumar R and Ashutosh Saxena. Source: The Third International Conference on Communication Systems.
When DRM Meets Restricted Multicast A Content Encryption Key Scheme for Restricted Multicast and DRM Min FENG and Bin ZHU Microsoft Research Asia.
Chapter 40 Network Security (Access Control, Encryption, Firewalls)
Key Management Network Systems Security Mort Anvari.
多媒體網路安全實驗室 Anonymous Authentication Systems Based on Private Information Retrieval Date: Reporter: Chien-Wen Huang 出處: Networked Digital Technologies,
Personal Privacy: Limited Disclosure using Cryptographic Techniques Mark Shaneck Karthikeyan Mahadevan SCLab.
1 Authenticated Key Exchange Rocky K. C. Chang 20 March 2007.
Breaking Cryptosystems Joshua Langford University of Texas at Tyler Fall 2007 Advisor: Dr. Ramona Ranalli Alger.
Database Laboratory Regular Seminar TaeHoon Kim Article.
Lesson Introduction ●Authentication protocols ●Key exchange protocols ●Kerberos Security Protocols.
SECURITY. Security Threats, Policies, and Mechanisms There are four types of security threats to consider 1. Interception 2 Interruption 3. Modification.
Pertemuan #8 Key Management Kuliah Pengaman Jaringan.
Database Management Systems, 3ed, R. Ramakrishnan and J. Gehrke1 Database architecture and security Workshop 4.
Key management issues in PGP
Attacks on Public Key Encryption Algorithms
Boneh-Franklin Identity Based Encryption Scheme
Public Key Infrastructure
Lecture 10: Network Security.
Presentation transcript:

PRIAM: PRivate Information Access Management on Outsourced Storage Service Providers Mark Shaneck Karthikeyan Mahadevan Jeff Yongdae Kim

Collection of Personal Information on the Internet * A survey by on the hot 100 websites ( suggested that 49 of these collect private informationwww.epic.org “For example America Online is matching its subscribers to demographic and psychographic data obtained from Donnelley Marketing” *Source:

Privacy – do we have it on the Internet ? Privacy is a right that every individual should possess Apparently this concept is not true in the Internet "You have zero privacy now. Get over it“ - Sun CEO Scott McNealy Conclusion: Protecting privacy will be one the greatest challenges for the Internet

Outline

Problem Setting Alice wants to have control over her private information She wants to store it with a highly available storage provider, which she could access from anywhere Storage provider should not know what she is storing Alice - Minimal computation Alice should be able to let the people she like access some information for a limited period of time

Basic Architecture

Existing Approaches - ACL Access Control List: Owner defines an ACL and gives it to the PIP Problems PIP should be trusted. Else encrypt the data – implies more key management issues

Existing Approaches - Kerberos Kerberos : Owner has to play AS Problems Owner has to online Also PIP should be trusted Else encrypt files – key management problems (similar to ACL approach)

Existing Approaches - Lockbox Idea – encrypt the file with symmetric key and encrypt the symmetric key with public key of users who will be granted access (used in Storage Security) Problem owner has to be online to provide access to new user! Once the authorization expires – update the lockbox, has to contact PIP!

PRIAM PRIAM is a suite of protocols: Private Information Storage Protocol Private Information Evolution Protocol Private Information Authorization Protocol Private Information Retrieval Protocol

Challenge How can the PIP do updation without owner interference? There exists a function f such that:

Building Blocks Safe Prime: A prime p is called a safe prime if it is of the form p = 2p ’ +1, where p ’ is a prime Odd hash function Key Chain

Set up Owner does the following Choose two safe primes p, q and compute n=pq Pick random odd number r (blinding factor) which is co prime to φ(n) Public value : n Private values: p, q, p ’, q ’, φ(n), r

Private Information Storage Alice wants to store t items {m (0), m (1),…,m (t) } – after initial setup For each i, 1≤i≤t, generate an odd random number such that Compute: To store the information with PIP, Alice will send encrypted message, along with initial value of k, index i:

Private Information Evolution PIP updates the encryption key every night (whenever appropriate) as follows: Note, that for day j :

Private Information Authorization Bob wants to know some information about Alice, he must get Alice’s consent. Alice -> Bob : This message is sent over a secure channel, where r is a fixed odd random. Alice could give Bob authorization for over a period of time

Temporal Private Information Retrieval Querier can now recover the message as

Performance Evaluation CommunicationComputationStorage Private Information Storage 1Owner: tPIP: t records, t keys Owner: TJ tokens Private Information Evolution 0N0 Private Information Authorization 20Querier: T tokens Temporal Private Information Retrieval 2Querier: 10

Security Analysis Confidentiality Our scheme is secure against an outside attack Our scheme is secure against an inside attacker under the hardness of finding φ(n) from n Integrity: RSA guarantees this property

Security Analysis – Cont’d Collusion The advantage of any number of collusion is not better that that of an inside attacker with several transcripts Knowing the values of encryption keys without the knowledge of φ(n) does not help finding the inverse of a future key

Application – (1) Private Information on the Internet We will be able to realize privacy on the Internet using our approach. For example Alice purchasing products from a website could provide authorization to some information, with which the website could contact a PIP

Application – (2) Disclosure of Medical History Information Any doctor would be able to access the required medical information about a patient with his/her authorization

Conclusions We have proposed a scheme to achieve control over one’s private information Provide dynamic authorization No necessity to contact the PIP for key updates PIP is minimally trusted !

Future Work Applying to Storage Area Networks Symmetric Key Version of this scheme Supporting multiple owners Digital watermarking or traitor tracing to prevent information dissemination from an authorized querier.