1 Security and Cryptography II Anonymous & Unobservable Communication Stefan Köpsell (Slides [mainly] created by Andreas Pfitzmann) Technische Universität.

Slides:



Advertisements
Similar presentations
Security by Design A Prequel for COMPSCI 702. Perspective “Any fool can know. The point is to understand.” - Albert Einstein “Sometimes it's not enough.
Advertisements

COMMUNICATING IN DIFFERENT WAYS USING THE TECHNOLOGIES AVAILABLE TO SUPPORT THEM. Over the years, each of the main technologies of the telecommunications.
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
Greg Lamb. Introduction It is clear that we as consumers and entrepreneurs cannot expect complete privacy when discussing business matters. However… There.
Security and Privacy Issues in Wireless Communication By: Michael Glus, MSEE EEL
E-Commerce Security Issues. General E-Business Security Issues Any E-Business needs to be concerned about network security. The Internet is a “ public.
Chapter 9: Privacy, Crime, and Security
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
1 An Introduction to Digital Identity Andreas Pfitzmann Dresden University of Technology, Department of Computer Science, D Dresden Nöthnitzer Str.
 Guarantee that EK is safe  Yes because it is stored in and used by hw only  No because it can be obtained if someone has physical access but this can.
Electronic Transaction Security (E-Commerce)
1 Enterprise Security Your Information Security and Privacy Responsibilities © 2008 Providence Health & Services This information may be replicated for.
Introduction (Pendahuluan)  Information Security.
What is Localgiving.com? Offered throughout the Community Foundation Network as a fundraising tool for voluntary and community groups Mission: To provide.
By Godfrey Aziyo Department of LIS Telephone:
CAP6135: Malware and Software Vulnerability Analysis Examples of Term Projects Cliff Zou Spring 2012.
Lecture Week 2 Networks, The Internet and the World Wide Web.
Hierarchical file system Hierarchical file system - A hierarchical file system is how drives, folders, and files are displayed on an operating system.
Security Measures Using IS to secure data. Security Equipment, Hardware Biometrics –Authentication based on what you are (Biometrics) –Biometrics, human.
Week 5 IBS 520 Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal.
Cyber Crimes.
CISB113 Fundamentals of Information Systems Telecommunications & Network.
Chapter 16 The World Wide Web Chapter Goals ( ) Compare and contrast the Internet and the World Wide Web Describe general Web processing.
Networks and Hackers Copyright © Texas Education Agency, All rights reserved. 1.
Copyright © Allyn & Bacon 2008 POWER PRACTICE Chapter 7 The Internet and the World Wide Web START This multimedia product and its contents are protected.
BUSINESS B1 Information Security.
INTERNET PRIVACY Marketing companies The cookie leak security hole in the HTML messages The Web Bug Can we trust the privacy.
E-commerce Vocabulary Terms. E-commerce Buying and selling of goods, services, or information via World Wide Web, , or other pathways on the Internet.
E-commerce Vocabulary Terms By: Laura Kinchen. Buying and selling of goods, services, or information via World Wide Web, , or other pathways on the.
Chapter 8 Safeguarding the Internet. Firewalls Firewalls: hardware & software that are built using routers, servers and other software A point between.
Privacy & Security Online Ivy, Kris & Neil Privacy Threat - Ivy Is Big Brother Watching You? - Kris Identity Theft - Kris Medical Privacy - Neil Children’s.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Cryptography, Authentication and Digital Signatures
Safeguarding Your Privacy Section 1.3. Safeguarding Your Privacy 1. What is Identity Theft? 2. Research a story on identity theft and be prepared to report.
CHAPTER 7: PRIVACY, CRIME, AND SECURITY. Privacy in Cyberspace  Privacy: an individual’s ability to restrict or eliminate the collection, use and sale.
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Computer and Information Science Ch1.3 Computer Networking Ch1.3 Computer Networking Chapter 1.
Types of Electronic Infection
CSCE 201 Web Browser Security Fall CSCE Farkas2 Web Evolution Web Evolution Past: Human usage – HTTP – Static Web pages (HTML) Current: Human.
Key Terms. Online Communication Online community A virtual community which exists only online. It may be open to anyone (eg. a bulletin board) or restricted.
ACM 511 Introduction to Computer Networks. Computer Networks.
Network Security & Accounting
 LAN ◦ A LAN (Local Area Network) is a system whereby individual PCs are connected together within a company or organization.  WAN ◦ A WAN (Wide Area.
Lecture 13: Anonymity on the Web Modified from Levente Buttyan, Michael K. Reiter and Aviel D. Rubin.
Managing the Information Copyright © Texas Education Agency, All rights reserved.
Anonymity - Background R. Newman. Topics Defining anonymity Need for anonymity Defining privacy Threats to anonymity and privacy Mechanisms to provide.
VCE IT Theory Slideshows By Mark Kelly Vceit.com Websites & Data.
© Copyright 2009 SSLPost 01. © Copyright 2009 SSLPost 02 a recipient is sent an encrypted that contains data specific to that recipient the data.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Introduction Web analysis includes the study of users’ behavior on the web Traffic analysis – Usage analysis Behavior at particular website or across.
Revision Unit 1 – The Online World Online Services Online Documents Online Communication Cloud Computing The Internet Internet Infrastructure Internet.
 Internet –INTERnational NETwork is the network of computer networks.  It is a Wide Area Network(WLAN).You can have unlimited access to internet. 
Vijay V Vijayakumar.  Implementations  Server Side Security  Transmission Security  Client Side Security  ATM’s.
Information Systems Design and Development Security Precautions Computing Science.
Top Ten Ways to Protect Privacy Online -Abdul M. Look for privacy policies on Web Sites  Web sites can collect a lot of information about your visit.
1 Anonymity. 2 Overview  What is anonymity?  Why should anyone care about anonymity?  Relationship with security and in particular identification 
LESSON 12 Business Internet. Electronic business, or e-business, is the application of information and communication technologies (ICT) in support of.
Digital Citizenship Project Justin Lann. Netiquette Netiquette on Social Media Sites – A set of social conventions that facilitate interactions over networks.
Intro to Digital Technology Review for Final Introduction to Digital Technology Finals Seniors Monday, 5/16 – 2 nd Tuesday 5/17 – 1 st,3 rd Underclassmen.
START. A room full of computers Two or more computers connected together in order to communicate A computer that can communicate with every living thing.
Anonymous Communication
Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity and Identity Management – A Consolidated Proposal for Terminology Authors: Andreas.
What is Cookie? Cookie is small information stored in text file on user’s hard drive by web server. This information is later used by web browser to retrieve.
Web Privacy Chapter 6 – pp 125 – /12/9 Y K Choi.
Anonymous Communication
Introduction to Networks
Introduction to computers
Unit# 5: Internet and Worldwide Web
Anonymous Communication
Do You Have Multiple Amazon Seller Accounts? Amazon Knows it! By EsellersCare Contact : +1 (855)
Presentation transcript:

1 Security and Cryptography II Anonymous & Unobservable Communication Stefan Köpsell (Slides [mainly] created by Andreas Pfitzmann) Technische Universität Dresden, Faculty of Computer Science, D Dresden Nöthnitzer Str. 46, Room 3067 Phone: ,

Observability of users in switched networks interceptor possible attackers telephone exchange operator manufacturer (Trojan horse) employee network termination radio television videophone phone internet countermeasure encryption link encryption

Observability of users in switched networks countermeasure encryption end-to-end encryption interceptor possible attackers telephone exchange operator manufacturer (Trojan horse) employee network termination radio television videophone phone internet

Observability of users in switched networks countermeasure encryption link encryption end-to-end encryption Problem:traffic data who with whom? when? how long? how much information? Aim: “protect” traffic data (and so data on interests, too) so that they couldn’t be captured. data on interests: Who? What? communication partner interceptor possible attackers telephone exchange operator manufacturer (Trojan horse) employee network termination radio television videophone phone internet

Observability of users in broadcast networks interceptor possible attackers radio television videophone phone internet (Examples: bus-, radio networks) any station gets all bits analogue signals (distance, bearing)

Since about 1990 reality Video-8 tape5 Gbyte = 3 * all census data of 1987 in Germany memory costs < 25 EUR 100 Video-8 tapes (or in 2014: 1 hard drive disk with 500 GByte for ≈ 35 EUR) store all telephone calls of one year: Who with whom ? When ? How long ? From where ? Reality or fiction?

With the development of television, and the technical advance which made it possible to receive and transmit simultaneously on the same instrument, private life came to an end. George Orwell, 1948 Excerpt from: 1984

Examples of changes w.r.t. anonymity and privacy Broadcast allows recipient anonymity — it is not detectable who is interested in which programme and information

Examples of changes w.r.t. anonymity and privacy Internet-Radio, IPTV, Video on Demand etc. support profiling

Remark: Plain old letter post has shown its dangers, but nobody demands full traceability of them … Anonymous plain old letter post is substituted by „surveillanceable“ s

The massmedia „newspaper“ will be personalised by means of Web, elektronic paper and print on demand

Privacy and the Cloud? [

Mechanisms to protect traffic data Protection outside the network Public terminals – use is cumbersome Temporally decoupled processing – communications with real time properties Local selection – transmission performance of the network – paying for services with fees Protection inside the network

Attacker (-model) Questions:  How widely distributed ? (stations, lines)  observing / modifying ?  How much computing capacity ? (computationally unrestricted, computationally restricted)

Realistic protection goals/attacker models: Technical solution possible?

===T===Gat e===

Online Social Networks– Web 2.0

The Facebook-Problems  …at least two different problems:  1. Information leakage by (more or less) intentionally published (Profil-)data  ( ) Contact list  Face recognitation  2. Profiling of every Internet user  „Like“-Button

 developed 1997 by Netscape  original purpose: enable sessions (transactions) on the Web  small amount of data, sent from the Web server to the Browser  will be:  stored by the Browser  automatically transmitted with every visit of the Web server  usual content: unique identifier for re-identification (tracking) Cookies – served on the Web

 1st visit of a Web-site  2nd and further visits of that Web-site Cookies – served on the Web

 besides Cookies many other tracking mechanisms exist in modern Browsers  Flash-Cookies, DOM-Storage  GEO-Location, Web-Bugs  List of Fonts, List of Plugins, …  Tracking  Profiling, especially: group profiles  Goal: Link a person to a group of persons to derive unknown attributes of that person  “behavioural targeting / advertising”  „to be ‚read‘ out“  Why?  Make money!  “If you are not paying for it, you're not the customer; you're the product being sold.” [post on MetaFilter.com, August 26, 2010] To be tracked or not to be tracked?

Google‘s Revenue in Million Dollar

Facebook-“Like“-Button  small picture, embedded into many Web sites  > Web-Sites  if a Facebook user clicks on the Like-Button, his friends will be informed  Facebook learns, which sites a user likes

Facebook-“Like“-Button

Facebook-“Like“-Button

Facebook-“Like“-Button

Facebook-“Like“-Button

Facebook-“Like“-Button Before You are allowed to enter this Web-site you have to call Facebook. Please tell your name, your address and the web-sites you plan to visit. Thanks for your cooperation.

Attacker (-model) Questions:  How widely distributed ? (stations, lines)  observing / modifying ?  How much computing capacity ? (computationally unrestricted, computationally restricted) Unobservability of an event E For attacker holds for all his observations B: 0 < P(E|B) < 1 perfect: P(E) = P(E|B) Anonymity of an entity Unlinkability of events if necessary: partitioning in classes

Counter measures  anonymous & unobservable communication  Broadcast  Mixes  DC-Net  private information retrieval  …  privacy-preserving  identity management  service utilisation  value exchange

The Mix protocol Idea: Provide unlinkability between incoming and outgoing messages Mix 1Mix 2 A Mix collects messages, changes their coding and forwards them in a different order. If all Mixes work together, they can reveal the way of a given messages.

Pseudonyms person pseudonyms role pseudonyms public person pseudonym non-public person pseudonym anonymous- person pseudonym business- relationship pseudonym transaction pseudonym A n o n y m i t y Scalability concerning the protection phone number account number biometric, DNA (as long as no register) pen name one-time password examples

Pseudonyms: Use across different contexts  partial order A  B stands for “B enables stronger unlinkability than A” number of an identity card, social security number, bank account pen name, employee identity card number customer number contract number one-time password, TAN, one-time use public-key pair

 Usually: one identity per user Identity Management Age driving license Name Address Phone number Tax class account number Problem: Linkability of records

 Many Partial-Identities per user  Management / disclosure / linkability under the control of the user Privacy-preserving Identity management age Name address tax class account number p2p2 Name account number p3p3 Alter driving license p5p5 p4p4 Name p1p1 phone number

many services need only a few data revealing that data under a Pseudonym prevents unnecessary linkability with other data of the user different actions / data are initially unlinkable if one uses different pseudonyms Implementation: Pseudonyms Example: Car Rental necessary data : Possesion of a driving license valid for the car wanted p1p1 p2p2

Anonymous Credentials  Credential = Attestation of an attribute of a user (e.g. „Users has driving licvense “)  Steps:  Organisation issues Credentials  User shows credential to service provider  Properties:  User can show credentials under different pseudonyms (transformation)  Usage of the same credential with different pseudonyms prevents linkability against the service provider and the issuer. shows Credentials issues Credential publishes credential types Organisation User Service providers

Usage of Anonymous Credentials User A Credentials issuing Organisation have driving- license User B User X : User A has driving- license Service provider have driving- license have driving- license have driving- license