Secure Content Delivery in Information- Centric Networks: Design, Implementation, and Analysis Satysjayant Misra, Reza Tourani, Nahid Ebrahimi Majd Presenter.

Slides:



Advertisements
Similar presentations
A Survey of Key Management for Secure Group Communications Celia Li.
Advertisements

Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Secure Content Delivery in Information-Centric Networks: Design, Implementation, and Analyses Computer Science Department New Mexico State University,
Mitigate DDoS Attacks in NDN by Interest Traceback Huichen Dai, Yi Wang, Jindou Fan, Bin Liu Tsinghua University, China 1.
Distribution and Revocation of Cryptographic Keys in Sensor Networks Amrinder Singh Dept. of Computer Science Virginia Tech.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
1 Network Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
URSA: Providing Ubiquitous and Robust Security Support for MANET
Computer Science SDAP: A Secure Hop-by-Hop Data Aggregation Protocol for Sensor Networks Yi Yang, Xinran Wang, Sencun Zhu and Guohong Cao April 24, 2007.
Traitor Tracing Papers Benny Chor, Amos Fiat and Moni Naor, Tracing Traitors (1994) Moni Naor and Benny Pinkas, Threshold Traitor Tracing (1998) Presented.
Secure and Efficient Key Management in Mobile Ad Hoc Networks Bing Wu, Jie Wu, Eduardo B. Fernandez, Mohammad Ilyas, Spyros Magliveras Department of Computer.
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
Network Coding for Large Scale Content Distribution Christos Gkantsidis Georgia Institute of Technology Pablo Rodriguez Microsoft Research IEEE INFOCOM.
1 Key Management in Mobile Ad Hoc Networks Presented by Edith Ngai Spring 2003.
Spring 2002CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
Security in Wireless LAN Layla Pezeshkmehr CS 265 Fall 2003-SJSU Dr.Mark Stamp.
Distributed Collaborative Key Agreement Protocols for Dynamic Peer Groups Patrick P. C. Lee, John C. S. Lui and David K. Y. Yau IEEE ICNP 2002.
Secret Sharing Algorithms
INSENS: Intrusion-Tolerant Routing For Wireless Sensor Networks By: Jing Deng, Richard Han, Shivakant Mishra Presented by: Daryl Lonnon.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Gnutella, Freenet and Peer to Peer Networks By Norman Eng Steven Hnatko George Papadopoulos.
Spring 2003CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
MOCA : Mobile Certificate Authority for Wireless Ad Hoc Networks The 2nd Annual PKI Research Workshop (PKI 2003) Seung Yi, Robin Kravets September. 25,
1 Introduction to Security and Cryptology Enterprise Systems DT211 Denis Manley.
Cong Wang1, Qian Wang1, Kui Ren1 and Wenjing Lou2
1 Chapter06 Mobile IP. 2 Outline What is the problem at the routing layer when Internet hosts move?! Can the problem be solved? What is the standard solution?
Adaptive flow control via Interest Aggregation in CCN by Dojun Byun, Byoung-joon, Myeong-Wuk Jang Samsung Electronics, Advanced Institute of Technology.
Part Two Network Security Applications Chapter 4 Key Distribution and User Authentication.
Efficient and Robust Private Set Intersection and multiparty multivariate polynomials Dana Dachman-Soled 1, Tal Malkin 1, Mariana Raykova 1, Moti Yung.
Zhen Feng, Mingwei Xu, Yu Wang and Qing Li Tsinghua University, Beijing, China, Globalcom2013 – NGN Symposium Katto Lab Hiroto Kisara AN ARCHITECTURE FOR.
Aggregation in Sensor Networks
Security for the Optimized Link- State Routing Protocol for Wireless Ad Hoc Networks Stephen Asherson Computer Science MSc Student DNA Lab 1.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Dr. L. Christofi1 Local & Metropolitan Area Networks ACOE322 Lecture 8 Network Security.
A NAMED DATA NETWORKING FLEXIBLE FRAMEWORK FOR MANAGEMENT COMMUNICATION Authors: Daneil Corjuo and Rui L. Aguiar Ivan Vidal and Jamie Garcia-Reinoso Presented.
SOS: Security Overlay Service Angelos D. Keromytis, Vishal Misra, Daniel Rubenstein- Columbia University ACM SIGCOMM 2002 CONFERENCE, PITTSBURGH PA, AUG.
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
Chapter 3: Basic Protocols Dulal C. Kar. Key Exchange with Symmetric Cryptography Session key –A separate key for one particular communication session.
Fall, Privacy&Security - Virginia Tech – Computer Science Click to edit Master title style Collusion-Resistant Group Key Management Using Attribute-
Cryptographic Security Secret Sharing, Vanishing Data 1Dennis Kafura – CS5204 – Operating Systems.
Review of the literature : DMND:Collecting Data from Mobiles Using Named Data Takashima Daiki Park Lab, Waseda University, Japan 1/15.
Distributed Authentication in Wireless Mesh Networks Through Kerberos Tickets draft-moustafa-krb-wg-mesh-nw-00.txt Hassnaa Moustafa
Strong Security for Distributed File Systems Group A3 Ka Hou Wong Jahanzeb Faizan Jonathan Sippel.
Evoting using collaborative clustering Justin Gray Osama Khaleel Joey LaConte Frank Watson.
A Dynamic Packet Stamping Methodology for DDoS Defense Project Presentation by Maitreya Natu, Kireeti Valicherla, Namratha Hundigopal CISC 859 University.
A secure re-keying scheme Introduction Background Re-keying scheme User revocation User join Conclusion.
SOS: An Architecture For Mitigating DDoS Attacks Angelos D. Keromytis, Vishal Misra, Dan Rubenstein ACM SIGCOMM 2002 Presented By : Tracy Wagner CDA 6938.
Multimedia & Mobile Communications Lab.
Networking Named Content Van Jacobson, Diana K. Smetters, James D. Thornton, Michael F. Plass, Nicholas H. Briggs, Rebecca L. Braynard.
Group-based Source Authentication in VANETs You Lu, Biao Zhou, Fei Jia, Mario Gerla UCLA {youlu, zhb, feijia,
PROACTIVE SECRET SHARING Or: How to Cope With Perpetual Leakage Herzberg et al. Presented by: Avinash Ravi Kevin Skapinetz.
Weichao Wang, Bharat Bhargava Youngjoo, Shin
Chapter 40 Network Security (Access Control, Encryption, Firewalls)
Network Security Celia Li Computer Science and Engineering York University.
Threshold password authentication against guessing attacks in Ad hoc networks ► Chai, Zhenchuan; Cao, Zhenfu; Lu, Rongxing ► Ad Hoc Networks Volume: 5,
Improving Security Over Ipv6 Authentication Header Protocol using IP Traceback and TTL Devon Thomas, Alex Isaac, Majdi Alharthi, Ali Albatainah & Abdelshakour.
Chapter 27 Network Management Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Computer Science Least Privilege and Privilege Deprivation: Towards Tolerating Mobile Sink Compromises in Wireless Sensor Network Presented by Jennifer.
PROJECT DOMAIN : NETWORK SECURITY Project Members : M.Ananda Vadivelan & E.Kalaivanan Department of Computer Science.
Presented by Edith Ngai MPhil Term 3 Presentation
Security Outline Encryption Algorithms Authentication Protocols
You Lu, Zhiyang Wang, Yu-Ting Yu, Mario Gerla
Path key establishment using multiple secured paths in wireless sensor networks CoNEXT’05 Guanfeng Li  University of Pittsburgh, Pittsburgh, PA Hui Ling.
Privacy in Content-Oriented Networking: Threats and Countermeasures
Slalom: Fast, Verifiable and Private Execution of Neural Networks in Trusted Hardware Kriti shreshtha.
Presentation transcript:

Secure Content Delivery in Information- Centric Networks: Design, Implementation, and Analysis Satysjayant Misra, Reza Tourani, Nahid Ebrahimi Majd Presenter : WANG YU, Katto Lab 1

Outline Introduction Related work Models and Assumptions Design of the framework Implementation results in CCNx Conclusion 2

Introduction This paper explores the design of a framework for highly available and efficient secure content delivery in ICN (information centric network) Motivation: a)Today, Content Provider (CP) uses Content Delivery Network(CDN) to balance the load, reduce data latency and reduce redundant traffic. b)But CDN nodes are at the edge of ISPs; Result in explosive growth in repeated data request. c)So ICN solves the problem by allowing data to be stored anywhere to reduce their network traffic load d)But, the important is, how do we ensure high availability of the cached data to only legitimate users 3

Introduction (Cont.) Problem A user has to authenticate itself to the server. Upon authentication, it connects a CDN node and obtains the content. However, if the sever is down, the user cannot be authenticated. In this scenario, data is available in routers close to the users, but legitimate users are unable to authenticate themselves and access the data securely. So, the proposed framework is applicable to all scenarios where server- based authentication is unavailable or difficult. Figure 1 4

Related work In CCN, content is split into packets/chunks, and each user sends interest containing the name of the chunk into the network. Any node in the path contains the request chunk can satisfy the interest. Every intermediate node has the chance to caching the chunks. Composed of three main components: Forwarding Information Base (FIB), the Pending Interest Table (PIT), and the Content Store (CS ). IN the framework, it choose to use the public key-based traitor- tracing t-resilient algorithm proposed by Tzeng (Broadcast encryption), which uses the Shamir’s secret sharing algorithm as a building block. 5

Shamir’s secret sharing algorithm (additional knowledge) Divide secret S into n pieces of data D 1, D 2,… D n, in such a way that: 1.Knowledge of any t or more D i pieces makes S easily computable. 2.Knowledge of any t-1 or fewer pieces D i leaves completely undetermined. This scheme is called ( t, n) threshold scheme. If t=n, then all pieces are required to reconstruct the secret. Example: Suppose our secret is 1234 (S=1234) We wish to divide the secret into 6 parts(n=6), where any subset of 3 parts (t=3) is sufficient to reconstruct the secret. At random we obtain two (t-1) numbers:166 and 96. (a 1 =166; a 2 =94) Our polynomial to produce secret shares(points) is therefore: We construct 6 points from the polynomial: In order to reconstruct the secret S any 3 points will be enough through Lagrange basis polynomials. 6

Models and Assumptions System Model Hierarchical set-up as shown in Figure 1 (CP->CDN->ISP->end users), and it can be cached at any node in the path. n is the number of users in the system, t (<<n) is the revocation threshold as we explained in shamir’s secret sharing Set-up and Security Assumptions Content is encrypted by the content provider, either at the servers or in the CDN, using a symmetric key encryption algorithm Only a legitimate user can obtain the symmetric key to decrypt the content. 7

Models and Assumptions Threat Model The use of the sequence numbers in the interest and data packets, and caching at the edge routers can help neutralize reply attacks. Interest packets make it difficult to mount DoS attacks on the system. 8

Design of the Framework Overview of the Framework (3 steps) At the server: 1.First, it generates a polynomial of degree t and evaluates n+t ( >>t ) number of points on it, and distributes n of the evaluated points among the clients (one per client), and it keeps t of them as its own shares. 2.Then it generates a enabling block, which contains the secret symmetric key ( r ), and is used by the client in the last component for the secret extraction. (the enabling block is forwarded to all the routers with contents cached as part of the content) At the client: 3.A legitimate client extracts the embedded secret key from the enabling block that is downloaded along with the content, by using its share. 9

Design of the Framework Basic Protocols: 1.Polynomial and shares generation n is the number of users, and the maximum number of allowed revoked users is t. The server calculates random coefficients a 0,..., a t of a t - degree poly-nominal p t (x). Then it calculates each user u j ’s share/tuple T j =, where x j is generated randomly and f(x j ) is calculated. Besides, the server calculates t -tuples that it stores as the server share E. Then the server transmits T j = to the user u j using u j ’s public key, the signature, and the timeout so that u j can correctly extract the secret key and them decrypt the content. 10

Design of the Framework Basic Protocols: 2.Generation and encryption of enabling block The server encrypts the content using a symmetric key algorithm and a secret key r. A bigger key say 128-bit for AES, can be handled by splitting the key r = { r 1 ||... || r b ||... || r m }. An enabling block is an integral part of any Broadcast Encryption scheme. It contains information for a legitimate user to extract the secret key r and is delivered to the user along with the data packets. The user can decrypt using the enabling block and by the Lagrangian interpolation method. The original Lagrangian interpolation requires computations of t coefficients at the client with running time complexity of O( t 2 ), the author devised a mechanism for pre-computing the Lagrangian coefficients at the server to reduce the complexity of the coputation at the user to O( t ) 11

Design of the Framework Basic Protocols: 3.Secret Extraction at the User The user u j obtains the enabling block from a router in it’s neighborhood, verifies the source of the enabling block by verifying the signature. On successful verification it computes the t complete Lagrangian coefficients (from the partials) using its share and also the Lagrangian coefficient corresponding to it’s own share, resulting in a total of t + 1 coefficients. The user u j uses the computed Lagrangian coefficients to extract the secret key from using the Lagrangian interpolation method. 12

Design of the Framework CCN/NDN Architecture Specific Details 1.User registration (Format of registration interest): /Netflix/Registration/Unique User ID It contains user’s credentials, encrypted with the CP’s public key and signed by user’s private key 2.Chunk Creation: The enabling block and the content are both split into equal sized chunks and given appropriate names to distinguish them 13

Design of the Framework CCN/NDN Architecture Specific Details 3.Packet Naming: Naming rules: CP’s name/kind(video or novel)/category/type of data(enabling block or movie name)/version/chunk number 14

Design of the Framework CCN/NDN Architecture Specific Details 4.User Revocation The user requests service-cancellation using a revocation interest packet. The revocation interest is sent out to the CP in the same way as the registration request. After that the CP regenerates the new enabling blocks by replacing one of its t tuple in the server share, the updated enabling block has to be disseminated in the network. This may be done in a proactive manner (immediately after a revocation), periodically (every week or month), or by a pull-mechanism from the network (when the enabling block at routers times out, they seek new versions of the enabling) 15

Design of the Framework Security Analysis A set of colluding nodes can create a new share for a new malicious (illegitimate) node, which requires at least t+1 malicious nodes to collude. With t+1 being the order of thousands that is unlikely. To counter longstanding threats of content privacy, r can be renewed at regular intervals and content re-encrypted. 16

Implementation Results in CCNx The framework is implemented in the CCNx-0.7 testbed. The multimedia content was hosted ( ccnputfile ) in the content store of the server. The rest of the nodes were clients, which sent out the interest to the server using ccnsimplecat They implemented the Polynomial Generation protocol, the Enabling Blocking Generation and Encryption protocol, and the Secret Extraction protocol. 17

Implementation Results in CCNx Figure (a) shows the time taken by the server to generate a polynomial ( p t (x) ) of a certain degree, including generating its random coefficients ({a 0,..., a t }), and then evaluating p t (x) at n+t points. The X-axis represents different values for t and the Y -axis represents the time in thousands of seconds. The polynomial generation procedure is the most time consuming component of the framework. 18

Implementation Results in CCNx Figure (b) shows the size of the enabling block in the PSD (with pre-computation of t Lagrangian coefficients at the server) and SD(without pre- computation) cases. It is desirable to have smaller enabling block size to reduce network overhead But refer to figure (3), PSD reduce the extraction time at the client significantly; PSD adds less than 0.3% overhead for a two-hour movie. 19

Implementation Results in CCNx Figure(c) presents a comparative analysis of the secret key extraction time in PSD and SD. 20

Conclusion In this paper, they present an efficient framework for secure and high availability content delivery in ICNs. They sketch the protocols, present the architecture details and experimental results demonstrating the framework’s practicality. In future, study in-depth application of the framework to other ICN architectures and optimize and implement their protocols on smartphones and a larger testbed. 21