Building an Encrypted and Searchable Audit Log 11th Annual Network and Distributed Security Symposium (NDSS '04); 2004 February 5-6; San Diego; CA. Presented.

Slides:



Advertisements
Similar presentations
Boneh-Franklin Identity-based Encryption. 2 Symmetric bilinear groups G = ágñ, g p = 1 e: G G G t Bilinear i.e. e(u a, v b ) = e(u, v) ab Non-degenerate:
Advertisements

Data Security 1 El_Gamal Cryptography. Data Security2 Introduction El_Gamal is a public-key cryptosystem technique El_Gamal is a public-key cryptosystem.
Internet and Intranet Protocols and Applications Lecture 9a: Secure Sockets Layer (SSL) March, 2004 Arthur Goldberg Computer Science Department New York.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
Building an Encrypted and Searchable Audit Log Brent Waters Dirk Balfanz Glenn Durfee D.K. Smetters.
Encryption Public-Key, Identity-Based, Attribute-Based.
Digital Signatures and Hash Functions. Digital Signatures.
Authentication and Digital Signatures CSCI 5857: Encoding and Encryption.
Negotiated Privacy CS551/851CRyptographyApplicationsBistro Mike McNett 30 March 2004 Stanislaw Jarecki, Pat Lincoln, Vitaly Shmatikov. Negotiated Privacy.Negotiated.
Information Security for Sensors Overwhelming Random Sequences and Permutations Shlomi Dolev, Niv Gilboa, Marina Kopeetsky, Giuseppe Persiano, and Paul.
 Public key (asymmetric) cryptography o Modular exponentiation for encryption/decryption  Efficient algorithms for this o Attacker needs to factor large.
Session 5 Hash functions and digital signatures. Contents Hash functions – Definition – Requirements – Construction – Security – Applications 2/44.
CS555Spring 2012/Topic 161 Cryptography CS 555 Topic 16: Key Management and The Need for Public Key Cryptography.
Identity Based Encryption
Cryptography1 CPSC 3730 Cryptography Chapter 10 Key Management.
1 Identity-Based Encryption form the Weil Pairing Author : Dan Boneh Matthew Franklin Presentered by Chia Jui Hsu Date :
Practical Techniques for Searches on Encrypted Data Author: Dawn Xiaodong Song, David Wagner, Adrian Perrig Presenter: 紀銘偉.
A Designer’s Guide to KEMs Alex Dent
Symmetric Key Distribution Protocol with Hybrid Crypto Systems Tony Nguyen.
Practical Techniques for Searches on Encrypted Data Author:Dawn Xiaodong Song, David Wagner, Adrian Perrig Presenter: 紀汶承.
More on AuthenticationCS-4513 D-term More on Authentication CS-4513 Distributed Computing Systems (Slides include materials from Operating System.
1 Secure Indexes Author : Eu-Jin Goh Presented by Yi Cheng Lin.
1 Hidden Exponent RSA and Efficient Key Distribution author: He Ge Cryptology ePrint Archive 2005/325 PDFPDF 報告人:陳昱升.
Public Key Algorithms 4/17/2017 M. Chatterjee.
1 CIS 5371 Cryptography 9. Data Integrity Techniques.
Cryptography and Network Security Chapter 10. Chapter 10 – Key Management; Other Public Key Cryptosystems No Singhalese, whether man or woman, would venture.
Diffie-Hellman Key Exchange
Computer Science CSC 774Dr. Peng Ning1 CSC 774 Advanced Network Security Topic 2. Review of Cryptographic Techniques.
C HAPTER 13 Asymmetric Key Cryptography Slides adapted from "Foundations of Security: What Every Programmer Needs To Know" by Neil Daswani, Christoph Kern,
Introduction to Public Key Cryptography
8. Data Integrity Techniques
Key Management and Diffie- Hellman Dr. Monther Aldwairi New York Institute of Technology- Amman Campus 12/3/2009 INCS 741: Cryptography 12/3/20091Dr. Monther.
10/1/2015 9:38:06 AM1AIIS. OUTLINE Introduction Goals In Cryptography Secrete Key Cryptography Public Key Cryptograpgy Digital Signatures 2 10/1/2015.
Symmetric versus Asymmetric Cryptography. Why is it worth presenting cryptography? Top concern in security Fundamental knowledge in computer security.
Public Key Encryption and the RSA Public Key Algorithm CSCI 5857: Encoding and Encryption.
Network Security Lecture 17 Presented by: Dr. Munam Ali Shah.
Cryptography, Authentication and Digital Signatures
Security: An Overview of Cryptographic Techniques /440 With slides from: Debabrata Dash, Nick Feamster, Gregory Kesden, Vyas Sekar and others.
Computer Science CSC 774 Advanced Network Security Topic 2.6 ID Based Cryptography #2 Slides by An Liu.
Chapter 3: Basic Protocols Dulal C. Kar. Key Exchange with Symmetric Cryptography Session key –A separate key for one particular communication session.
Cryptography Wei Wu. Internet Threat Model Client Network Not trusted!!
Cryptography and Network Security (CS435) Part Eight (Key Management)
Cryptography and Network Security Chapter 10 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Public Key Encryption with keyword Search Author: Dan Boneh Rafail Ostroversity Giovanni Di Crescenzo Giuseppe Persiano Presenter: 陳昱圻.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Understanding Cryptography by Christof Paar and Jan Pelzl These slides were prepared by Christof Paar and Jan Pelzl Chapter 8 –
Chapter 3 (B) – Key Management; Other Public Key Cryptosystems.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
ECE509 Cyber Security : Concept, Theory, and Practice Key Management Spring 2014.
1 Chapter 10: Key Management in Public key cryptosystems Fourth Edition by William Stallings Lecture slides by Lawrie Brown (Modified by Prof. M. Singhal,
Fall, Privacy&Security - Virginia Tech – Computer Science Click to edit Master title style Cryptographic Security Identity-Based Encryption.
When DRM Meets Restricted Multicast A Content Encryption Key Scheme for Restricted Multicast and DRM Min FENG and Bin ZHU Microsoft Research Asia.
Software Security Seminar - 1 Chapter 4. Intermediate Protocols 발표자 : 이장원 Applied Cryptography.
Key Management Network Systems Security Mort Anvari.
CHAOS CRYPTOGRAPHY Nathaniel Speiser Physics
Lecture 9 Overview. Digital Signature Properties CS 450/650 Lecture 9: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
Cryptography and Network Security Chapter 10 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Keyword search on encrypted data. Keyword search problem  Linux utility: grep  Information retrieval Basic operation Advanced operations – relevance.
Diffie-Hellman Key Exchange first public-key type scheme proposed by Diffie & Hellman in 1976 along with the exposition of public key concepts – note:
Introduction to Elliptic Curve Cryptography CSCI 5857: Encoding and Encryption.
Cryptography services Lecturer: Dr. Peter Soreanu Students: Raed Awad Ahmad Abdalhalim
Cryptography and Network Security Chapter 13
Searchable Encryption in Cloud
Attacks on Public Key Encryption Algorithms
Identity Based Encryption
Key Management Network Systems Security
Building an Encrypted and Searchable Audit Log
Presentation transcript:

Building an Encrypted and Searchable Audit Log 11th Annual Network and Distributed Security Symposium (NDSS '04); 2004 February 5-6; San Diego; CA. Presented by Yu-Sheng Chen

Outline Introduction-a searchable encrypted audit log Symmetric key based scheme Asymmetric key based scheme (New) Conclusion

An audit log Bob Server Modify xxx.c Delete xyz.dll Log in Bob 12:20 3/26/2005 Logs Investigator Alice 11:30 3/25/2005 Modify xxx.c Search “delete” 12:20 3/26/2005 Modify xxx.c Delete xyz.dll Bob

Introduction Audit logs are an important part of any secure system. Audit logs have sensitive information →encrypt audit logs Hardness: A audit log should be searchable! How to construct a searchable encrypted audit logging system?

Traditional technique Just encrypt audit logs as usual. When searching for a keyword, we need to decrypt all of the log data. Disadvantage Decrypting all regardless of what information one is looking for opens opportunities for unintended access. Require the entity with the decryption key to interactively process all the log data.

A good searchable encrypted log Should keep Integrity Prevent and detect tampering Control access to contents Only decrypt the relevant data to the investigator Usefulness searchable

A searchable encrypted log -illustration Server An Encrypted Audit Log Investigator dwdw w Search Keyword w Search capability d w for w Audit escrow Agent dwdw Search result

Symmetric key based scheme -Encrypt s is the secret key H K is a keyed pseudorandom functioneg: HMAC-SHA1 E K is a symmetric encryption functioneg: AES flag is a constant bit string of length l eg: (Server) encrypt the log entry m along with keywords w 1,w 2, …,w n For each entry choose a random symmetric encryption key K compute E K (m) choose a random bit string r For each keyword w i  a i =H s (w i )  b i =H a i (r)  c i =b i ⊕ (flag|K) The server saves as the audit log entry.

(Investigator) send keyword w to the agent (Agent) compute d w =H s (w) (d w is called a search capability for w) and give d w to the investigator. (Investigator) use d w to search: For each log entry (E K (m), r, c 1, c 2, …, c n ) b i ’=H d w (r) For each encrypted keyword c i  b i ’ ⊕ c i ?= (flag|***)  Yes → extract K=***  m = D K (E K (m)) Symmetric key based scheme -Search & Decrypt Encrypt for w i a i =H s (w i ) b i =H a i (r) c i =b i ⊕ (flag|K) recover

Symmetric key based scheme -illustration Server secret s dwdw w Search capability for w d w =H s (w) Audit escrow Agent secret s dwdw Encrypt for w i a i =H s (w i ) b i =H a i (r) c i =b i ⊕ (flag|K) Search b i ‘=H d w (r) c i ⊕ b i ‘ ?= (flag|***) An Encrypted Logs result Investigator Search Keyword w

Symmetric key based scheme -discuss An investigator receiving a search capability d w for a keyword w learns no new information about the capability corresponding to any other keyword w’. Primary problem If the adversary compromises s, he can create any search capability d w

Asymmetric key based scheme -base on IBE……….IBE IBE ( Identity-Based Encryption ) [2003Boneh&Franklin] Setup

Asymmetric key based scheme -base on IBE……….IBE (continue) IBE ( Identity-Based Encryption ) IBE Key Generation Any arbitrary string w can be a public key Private key d w = s H 1 (w) IBE encryptionIBE w (m) Q W =H 1 (w) g w =e(Q w,P 1 ) choose random r c = = IBE decryptionIBD dw (c) V ⊕ H 2 (e(d w,U)) = m ⊕ H 2 (g w r ) ⊕ H 2 (e(d w, rP 0 )) = m ∵ e(d w,rP 0 ) = e(sQ w,rP 0 ) = e(Q w,P 0 ) sr = e(Q w,sP 0 ) r = g w r

Asymmetric key based scheme -base on IBE Encrypt (Server) For each log entry ( m, w 1, w 2, …, w n ) choose a random symmetric encryption key K encrypt m using K : E K (m) For each keyword w i  compute c i = IBE w i (flag|K) The server saves as the audit log entry Search & Decrypt (Investigator) give w to Agent (Agent) compute d w = s H 1 (w) and send d w back (Investigator) For each audit log entry For each c i  IBD d w (c i ) ?= (flag|***)  Yes → extract K=***  m = D K (E K (m)) recover

Asymmetric key based scheme -illustration Server No secret dwdw w Search capability for w d w = s H 1 (w) Audit escrow Agent secret s dwdw Encrypt for w i c i = IBE w i (flag|K) Search IBD d w (c i ) ?= (flag|***) An Encrypted Logs result Investigator Search Keyword w

Asymmetric key based scheme -discuss Server only stores public parameters P, there are no secret keys for an attacker to steal. Disadvantage Low performance ∵ Computations of the pairing and modular exponentiations for each keyword w

Optimizations for the asymmetric scheme When encrypting a log entry (m, w 1, …, w n ) Pairing reuse g w only needs to be performed once per keyword. Indexing Buffer entries sent to the audit log. Randomness reuse For each entry, use the same r in calculation of c 1, c 2, …, c n In the decryption of c 1, c 2, …, c n, only one pairing is needed for each distinct r chosen. Q w =H 1 (w) g w =e(Q w,P 1 ) In the encryption… c i = = In the decryption… V ⊕ H 2 (e(d w,U)) ?= (flag|***)

Optimization result

Conclusion A searchable encrypted audit log A asymmetric key based scheme Server uses keywords as public key to encrypt. Investigator asks the audit escrow agent “search capabilities” to do search. Advantage: Server does not store secrets. Disadvantage: Low performance Optimization The End