Privacy and Identity Management in Cloud Rohit Ranchal, Bharat Bhargava, Pelin Angin, Noopur Singh, Lotfi Ben Othmane, Leszek Lilien Department of Computer.

Slides:



Advertisements
Similar presentations
Chapter 10 Encryption: A Matter of Trust. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic Algorithm.
Advertisements

Secure Naming structure and p2p application interaction IETF - PPSP WG July 2010 Christian Dannewitz, Teemu Rautio and Ove Strandberg.
Key distribution and certification In the case of public key encryption model the authenticity of the public key of each partner in the communication must.
User-centric Handling of Identity Agent Compromise Daisuke Mashima Dr. Mustaque Ahamad Swagath Kannan College of Computing Georgia Institute of Technology.
Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Privacy in Cloud Computing Through Identity Management Purdue University Bharat Bhargava, Noopur Singh U.S Airforce Asher Sinclair.
Lect. 18: Cryptographic Protocols. 2 1.Cryptographic Protocols 2.Special Signatures 3.Secret Sharing and Threshold Cryptography 4.Zero-knowledge Proofs.
Trustworthy Services from Untrustworthy Components: Overview Fred B. Schneider Department of Computer Science Cornell University Ithaca, New York
Identity Management Based on P3P Authors: Oliver Berthold and Marit Kohntopp P3P = Platform for Privacy Preferences Project.
Grid Security. Typical Grid Scenario Users Resources.
Trustworthy and Personalized Computing Christopher Strasburg Department of Computer Science Iowa State University November 12, 2008.
Cryptography and Authentication Lab ECE4112 Group4 Joel Davis Scott Allen Quinn.
Privacy and Identity Management in Cloud Rohit Ranchal, Bharat Bhargava, Pelin Angin, Noopur Singh, Lotfi Ben Othmane, Leszek Lilien Department of Computer.
Mar 12, 2002Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities SSL/TLS.
Protection of Identity Information in Cloud Computing without Trusted Third Party 作者 :Rohit Ranchal, Bharat Bhargave, Lotfi Ben Othmane, Leszek Lilien,
This paper states that one of the major problem to the adoption of cloud computing is that of security.  Existing cloud computing problem or concerns.
Lecture III : Communication Security, Services & Mechanisms Internet Security: Principles & Practices John K. Zao, PhD SMIEEE National Chiao-Tung University.
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
1 Trust and Privacy in Authorization Bharat Bhargava Yuhui Zhong Leszek Lilien CERIAS Security Center CWSA Wireless Center Department of CS and ECE Purdue.
FIT3105 Smart card based authentication and identity management Lecture 4.
Spring 2002CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Apr 22, 2003Mårten Trolin1 Agenda Course high-lights – Symmetric and asymmetric cryptography – Digital signatures and MACs – Certificates – Protocols Interactive.
Using Digital Credentials On The World-Wide Web M. Winslett.
Mar 4, 2003Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities.
Mar 5, 2002Mårten Trolin1 Previous lecture More on hash functions Digital signatures Message Authentication Codes Padding.
FI-WARE – Future Internet Core Platform FI-WARE Security July 2011 High-level Description.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
Computer Science Public Key Management Lecture 5.
Students: Rohit Ranchal and Gen Nishida PI: Bharat Bhargava ( PLM Center of Excellence and CERIAS Computer Sciences Purdue University.
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
Cloud Computing Cloud Security– an overview Keke Chen.
Construction of efficient PDP scheme for Distributed Cloud Storage. By Manognya Reddy Kondam.
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
Research in Cloud Security and Privacy
1 Chapter 9 E- Security. Main security risks 2 (a) Transaction or credit card details stolen in transit. (b) Customer’s credit card details stolen from.
Trusted Systems Laboratory Hewlett-Packard Laboratories Bristol, UK InfraSec 2002 InfraSec 2002 Bristol, October 2002 Marco Casassa Mont Richard.
Security in Virtual Laboratory System Jan Meizner Supervisor: dr inż. Marian Bubak Consultancy: dr inż. Maciej Malawski Master of Science Thesis.
Privacy and Identity Management in Cloud
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
General Key Management Guidance. Key Management Policy  Governs the lifecycle for the keying material  Hope to minimize additional required documentation.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
1 Using EMV cards for Single Sign-On 26 th June st European PKI Workshop Andreas Pashalidis and Chris J. Mitchell.
Shib-Grid Integrated Authorization (Shintau) George Inman (University of Kent) TF-EMC2 Meeting Prague, 5 th September 2007.
Cryptography, Authentication and Digital Signatures
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Privacy Preserving Cross-Domain Data Dissemination (with adaptable service selection) Northrop Grumman TechFest June 2015 PI: Prof. Bharat Bhargava Purdue.
Internet Security. 2 PGP is a security technology which allows us to send that is authenticated and/or encrypted. Authentication confirms the identity.
Middleware for Secure Environments Presented by Kemal Altıntaş Hümeyra Topcu-Altıntaş Osman Şen.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #22 Secure Web Information.
Privacy in Cloud Computing Identity Management System for Cloud Microsoft CardSpace Purdue University.
Secure Communication between Set-top Box and Smart Card in DTV Broadcasting Authors: T. Jiang, Y. Hou and S. Zheng Source: IEEE Transactions on Consumer.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Identification Authentication. 2 Authentication Allows an entity (a user or a system) to prove its identity to another entity Typically, the entity whose.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
SSL(HandShake) Protocol By J.STEPHY GRAFF IIM.SC(C.S)
IPSec is a suite of protocols defined by the Internet Engineering Task Force (IETF) to provide security services at the network layer. standard protocol.
CSCE 201 Identification and Authentication Fall 2015.
Csci5233 Computer Security1 Bishop: Chapter 14 Representing Identity.
Security By Meenal Mandalia. What is ? stands for Electronic Mail. much the same as a letter, only that it is exchanged in a different.
Technical Security Issues in Cloud Computing By: Meiko Jensen, Jorg Schwenk, Nils Gruschka, Luigi Lo Lacono Presentation by: Winston Tong 2009 IEEE.
SECURITY. Security Threats, Policies, and Mechanisms There are four types of security threats to consider 1. Interception 2 Interruption 3. Modification.
Big Data Security Issues in Cloud Management. BDWG Big Data Working Group Researchers 1: Data analytics for security 2: Privacy preserving 3: Big data-scale.
Application of Active Bundles Bharat Bhargava. A. Identity Management (IDM) Service-Oriented Architecture (SOA) IDM in traditional application-centric.
Cloud Security– an overview Keke Chen
PAYMENT GATEWAY Presented by SHUJA ASHRAF SHAH ENROLL: 4471
Radius, LDAP, Radius used in Authenticating Users
Privacy and Identity Management in Cloud
Trust-based Privacy Preservation for Peer-to-peer Data Sharing
Presentation transcript:

Privacy and Identity Management in Cloud Rohit Ranchal, Bharat Bhargava, Pelin Angin, Noopur Singh, Lotfi Ben Othmane, Leszek Lilien Department of Computer Science Purdue University, Western Michigan University {rranchal, Mark Linderman Air Force Research Laboratory Rome, NY, USA This research was supported by AFRL Rome, USA and NGC

Outline Motivation Identity Management (IDM) Goals of Proposed User-Centric IDM Mechanisms Description of proposed solution Advantages of the Proposed Scheme Conclusion & Future Work References Questions?

Motivation User on Amazon Cloud Name Password Billing Address Shipping Address Credit Card Name Shipping Address Name Billing Address Credit Card Name Password Billing Address Shipping Address Credit Card Name Shipping Address

Motivation User on Amazon Cloud Name Password Billing Address Shipping Address Credit Card Name Shipping Address Name Billing Address Credit Card Name Password Billing Address Shipping Address Credit Card Name Shipping Address

Motivation The migration of web applications to Cloud computing platform has raised concerns about the privacy of sensitive data belonging to the consumers of cloud services. How can consumers verify that a service provider conform to the privacy laws and protect consumer’s digital identity. The username/password security token used by most service providers to authenticate consumers, leaves the consumer vulnerable to phishing attacks. The solution to address the above problems can be the use of an Identity Management (IDM) System. The solution should help the consumer in making a proactive choice about how and what personal information they disclose, control how their information can be used, cancel their subscription to the service, and monitor to verify that a service provider applies required privacy policies.

Identity Management (IDM) IDM in traditional application-centric IDM model ◦ Each service keeps track of identifying information of its users. Existing IDM Systems ◦ Microsoft Windows CardSpace [W. A. Alrodhan] ◦ OpenID [ ◦ PRIME [S. F. Hubner, Karlstad Univ] trusted third party These systems require a trusted third party and do not work on untrusted host. an untrusted host. If Trusted Third Party is compromised, all the identifying information of the users is also compromised leading to serious problems like Identity Theft. AT&T iPad leak [AT&T iPad leak ]

Identity Management (IDM) Microsoft Windows CardSpace Windows CardSpace is an Identity-metasystem which provides a way, for managing multiple digital identities of a user. It is claims based access platform/ architecture, developed for windows XP. It uses a plug-in for Internet explorer 7 browser. OpenID With OpenID a user uses one username and one password to access many web applications. The user authenticate to an OpenID server to get his/her OpenID token in order to authenticate itself to web applications. PRIME (Privacy and Identity Management for Europe) PRIME, is an application -the PRIME Console middleware running on a user’s machine, It handles management and disclosure of personal data for the user.

IDM in Cloud Computing Cloud introduces several issues to IDM ◦ Collusion between Cloud Services multiple accountsmultiple service providers.  Users have multiple accounts associated with multiple service providers. mapping of the identities to the user.  Sharing sensitive identity information between services can lead to undesirable mapping of the identities to the user. ◦ Lack of trust  Cloud hosts are untrusted  Use of Trusted Third Party is not an option ◦ Loss of control  Service-centric IDM Model IDM in Cloud needs to be user-centric

Goals of Proposed User-Centric IDM for the Cloud 1. Authenticate without disclosing identifying information 2. Ability to securely use a service while on an untrusted host (VM on the cloud) 3. Minimal disclosure and minimized risk of disclosure during communication between user and service provider (Man in the Middle, Side Channel and Correlation Attacks) 4. Independence of Trusted Third Party for identity information

Mechanisms in Proposed IDM Active Bundle [L. Othmane, R. Ranchal] Anonymous Identification [A. Shamir] Computing Predicates with encrypted data [E. Shi] Multi-Party Computing [A. Shamir] Selective Disclosure [B. Laurie]

Active Bundle Active bundle AB Active bundle (AB) protectingdatawithin – An encapsulating mechanism protecting data carried within it data – Includes data metadata – Includes metadata used for managing confidentiality Both privacy of data and privacy of the whole AB – Includes Virtual Machine (VM) operations performing a set of operations protecting confidentiality protecting its confidentiality Active Bundles—Operations Active Bundles—Operations – Self-Integrity check E.g., Uses a hash function – Evaporation/ Filtering Self-destroys (a part of) AB’s sensitive data when threatened with a disclosure – Apoptosis Self-destructs AB’s completely

Active Bundle Scheme – Metadata: Access control policies Data integrity checks Dissemination policies Life duration ID of a trust server ID of a security server App-dependent information … – Sensitive Data: Identity Information... – Virtual Machine (algorithm): Interprets metadata Checks active bundle integrity Enforces access and dissemination control policies … E(Name) E( ) E(Password) E(Shipping Address) E(Billing Address) E(Credit Card) … * E( ) - Encrypted Information

Anonymous Identification User on Amazon Cloud 1. 2.Password 1. 2.Password User Request for service Function f and number k f k ( , Password) = R ZKP Interactive Protocol Authenticated Use of Zero-knowledge proofing for user authentication without disclosing its identifier.

Interaction using Active Bundle Active Bundle (AB) Security Services Agent (SSA) Active Bundle Services User Application Active Bundle Coordinator Active Bundle Creator Directory Facilitator Active Bundle Destination Trust Evaluation Agent (TEA) Audit Services Agent (ASA) Active Bundle AB information disclosure

Predicate over Encrypted Data Verification without disclosing unencrypted identity data. Password E(Name) E(Shipping Address) E(Billing Address) E(Credit Card) E(Name) E(Billing Address) E(Credit Card) Predicate Request* *Age Verification Request *Credit Card Verification Request

Multi-Party Computing To become independent of a trusted third party Multiple Services hold shares of the secret key Minimize the risk E(Name) E(Billing Address) E(Credit Card) Key Management Services K’1K’1 K’2K’2 K’3K’3 K’nK’n Predicate Request * Decryption of information is handled by the Key Management services

Multi-Party Computing To become independent of a trusted third party Multiple Services hold shares of the secret key Minimize the risk Name Billing Address Credit Card Key Management Services K’1K’1 K’2K’2 K’3K’3 K’nK’n Predicate Reply* *Age Verified *Credit Card Verified

Selective Disclosure Password E(Name) E(Shipping Address) E(Billing Address) E(Credit Card) Selective disclosure* E(Name) E(Shipping Address) User Policies in the Active Bundle dictate dissemination *e-bay shares the encrypted information based on the user policy

Selective Disclosure E(Name) E(Shipping Address) Selective disclosure* E(Name) E(Shipping Address) *e-bay seller shares the encrypted information based on the user policy

Selective Disclosure E(Name) E(Shipping Address) Selective disclosure Name Shipping Address Decryption handled by Multi-Party Computing as in the previous slides

Selective Disclosure E(Name) E(Shipping Address) Selective disclosure Name Shipping Address Fed-Ex can now send the package to the user

Identity in the Cloud User on Amazon Cloud Name Password Billing Address Shipping Address Credit Card Name Shipping Address Name Billing Address Credit Card Password

Characteristics and Advantages Ability to use Identity data on untrusted hosts Self Integrity Check Integrity compromised- apoptosis or evaporation Data should not be on this host Establishes the trust of users in IDM ◦ Through putting the user in control of who has his data and how is is used ◦ Identity is being used in the process of authentication, negotiation, and data exchange. Independent of Third Party for Identity Information ◦ Minimizes correlation attacks Minimal disclosure to the SP ◦ SP receives only necessary information.

Conclusion & Future Work Problems with IDM in Cloud Computing ◦ Collusion of Identity Information ◦ Prohibited Untrusted Hosts ◦ Usage of Trusted Third Party Proposed Approaches ◦ IDM based on Anonymous Identification ◦ IDM based on Predicate over Encrypted data ◦ IDM based on Multi-Party Computing Future work ◦ Develop the prototype, conduct experiments and evaluate the approach

References [1] C. Sample and D. Kelley. Cloud Computing Security: Routing and DNS Threats, June 23,2009. [2] W. A. Alrodhan and C. J. Mitchell. Improving the Security of CardSpace, EURASIP Journal on Information Security Vol. 2009, doi: /2009/167216, [3] OPENID, [4] S. F. Hubner. HCI work in PRIME, [5] A. Gopalakrishnan, Cloud Computing Identity Management, SETLabsBriefings, Vol7, [6] A. Barth, A. Datta, J. Mitchell and H. Nissenbaum. Privacy and Contextual Integrity: Framework and Applications, Proc. of the 2006 IEEE Symposium on Security and Privacy, [7] L. Othmane, Active Bundles for Protecting Confidentiality of Sensitive Data throughout Their Lifecycle, PhD Thesis, Western Michigan Univ, [8] A. Fiat and A. Shamir, How to prove yourself: Practical Solutions to Identification and Signature Problems, CRYPTO, [9] A. Shamir, How to Share a Secret, Communications of the ACM, [10] M. Ben-Or, S. Goldwasser and A. Wigderson, Completeness theorems for non- cryptographic fault-tolerant distributed computation, ACM Symposium on Theory of Computing, [11] E. Shi, Evaluating Predicates over Encrypted Data, PhD Thesis, CMU, 2008.

Thank you! Any question?

Approach - 1 IDM Wallet: ◦ Use of AB scheme to protect PII from untrusted hosts. Anonymous Identification: ◦ Use of Zero-knowledge proofing for authentication of an entity without disclosing its identifier.

Components of Active Bundle (Approach – 1) Identity data: Data used during authentication, getting service, using service (i.e. SSN, Date of Birth). Disclosure policy: A set of rules for choosing Identity data from a set of identities in IDM Wallet. Disclosure history: Used for logging and auditing purposes. Negotiation policy: This is Anonymous Identification, based on the Zero Knowledge Proofing. Virtual Machine: Code for protecting data on untrusted hosts. It enforces the disclosure policies.

Anonymous Identification (Approach – 1) Anonymous Identification (Shamir's approach for Credit Cards) IdP provides Encrypted Identity Information to the user and SP. SP and User interact Both run IdP's public function on the certain bits of the Encrypted data. Both exchange results and agree if it matches.

Usage Scenario (Approach – 1)

Approach - 2 Active Bundle scheme Active Bundle scheme to protect PII from untrusted hosts Predicates over encrypted data Predicates over encrypted data to authenticate without disclosing unencrypted identity data. Multi-party computing Multi-party computing to be independent of a trusted third party

Usage Scenario (Approach – 2) Owner O encrypts Identity Data(PII) using algorithm Encrypt and O’s public key PK. Encrypt outputs CT—the encrypted PII. SP transforms his request for PII to a predicate represented by function p. SP sends shares of p to the n parties who hold the shares of MSK. n parties execute together KeyGen using PK, MSK, and p, and return TKp to SP. SP calls the algorithm Query that takes as input PK, CT, TKp and produces p(PII) which is the evaluation of the predicate. The owner O is allowed to use the service only when the predicate evaluates to “true”.

Representation of identity information for negotiation  Token/Pseudonym  Identity Information in clear plain text  Active Bundle

Motivation: Authentication Process using PII Problem: Which information to disclose and how to disclose it.