Application of Active Bundles Bharat Bhargava. A. Identity Management (IDM) Service-Oriented Architecture (SOA) IDM in traditional application-centric.

Slides:



Advertisements
Similar presentations
RP Designs Semi-Custom e-Commerce Package. Overview RP Designs semi- custom e-commerce package is a complete website solution. Visitors can browse a catalog.
Advertisements

Wei Lu 1, Kate Keahey 2, Tim Freeman 2, Frank Siebenlist 2 1 Indiana University, 2 Argonne National Lab
Building web applications on top of encrypted data using Mylar Presented by Tenglu Liang Tai Liu.
Unifying the conceptual levels of network security through use of patterns Ph.D Dissertation Proposal Candidate: Ajoy Kumar, Advisor: Dr Eduardo B. Fernandez.
SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
Lect. 18: Cryptographic Protocols. 2 1.Cryptographic Protocols 2.Special Signatures 3.Secret Sharing and Threshold Cryptography 4.Zero-knowledge Proofs.
TrustMe: Anonymous Management of Trust Relationships in Decentralized P2P Systems Aameek Singh and Ling Liu Presented by: Korporn Panyim.
Trustworthy and Personalized Computing Christopher Strasburg Department of Computer Science Iowa State University November 12, 2008.
Privacy and Identity Management in Cloud Rohit Ranchal, Bharat Bhargava, Pelin Angin, Noopur Singh, Lotfi Ben Othmane, Leszek Lilien Department of Computer.
Trust Establishment in Pervasive Grid Environments Syed Naqvi, Michel Riguidel TÉLÉCOM PARIS ÉNST É cole N ationale S upérieur des T élécommunications.
Mar 12, 2002Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities SSL/TLS.
Protection of Identity Information in Cloud Computing without Trusted Third Party 作者 :Rohit Ranchal, Bharat Bhargave, Lotfi Ben Othmane, Leszek Lilien,
This paper states that one of the major problem to the adoption of cloud computing is that of security.  Existing cloud computing problem or concerns.
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
1 Trust and Privacy in Authorization Bharat Bhargava Yuhui Zhong Leszek Lilien CERIAS Security Center CWSA Wireless Center Department of CS and ECE Purdue.
Confidentiality using Symmetric Encryption traditionally symmetric encryption is used to provide message confidentiality consider typical scenario –workstations.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
Mar 4, 2003Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities.
Wireless Encryption By: Kara Dolansky Network Management Spring 2009.
CSI 400/500 Operating Systems Spring 2009 Lecture #20 – Security Measures Wednesday, April 29 th.
A Trust Based Assess Control Framework for P2P File-Sharing System Speaker : Jia-Hui Huang Adviser : Kai-Wei Ke Date : 2004 / 3 / 15.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
D ATABASE S ECURITY Proposed by Abdulrahman Aldekhelallah University of Scranton – CS521 Spring2015.
A Seminar on Securities In Cloud Computing Presented by Sanjib Kumar Raul Mtech(ICT) Roll-10IT61B09 IIT Kharagpur Under the supervision of Prof. Indranil.
Computer Security Tran, Van Hoai Department of Systems & Networking Faculty of Computer Science & Engineering HCMC University of Technology.
Chapter 10: Authentication Guide to Computer Network Security.
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
1 Chapter 9 E- Security. Main security risks 2 (a) Transaction or credit card details stolen in transit. (b) Customer’s credit card details stolen from.
Privacy and Identity Management in Cloud
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
Computer Science and Engineering 1 Service-Oriented Architecture Security 2.
OHT 11.1 © Marketing Insights Limited 2004 Chapter 9 Analysis and Design EC Security.
Privacy and Identity Management in Cloud Rohit Ranchal, Bharat Bhargava, Pelin Angin, Noopur Singh, Lotfi Ben Othmane, Leszek Lilien Department of Computer.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
CSC8320. Outline Content from the book Recent Work Future Work.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
Privacy Preserving Cross-Domain Data Dissemination (with adaptable service selection) Northrop Grumman TechFest June 2015 PI: Prof. Bharat Bhargava Purdue.
V0.0CPSC415 Biometrics and Cryptography1 Placement of Encryption Function Lecture 3.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
SOA-39: Securing Your SOA Francois Martel Principal Solution Engineer Mitigating Security Risks of a De-coupled Infrastructure.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #22 Secure Web Information.
Enterprise Integration Patterns CS3300 Fall 2015.
Kerberos By Robert Smithers. History of Kerberos Kerberos was created at MIT, and was named after the 3 headed guard dog of Hades in Greek mythology Cerberus.
Security & Privacy. Learning Objectives Explain the importance of varying the access allowed to database elements at different times and for different.
P ROTOCOL FOR COLLABORATING MOBILE AGENTS IN THE NETWORK INTRUSION DETECTION SYSTEMS. By Olumide Simeon Ogunnusi Shukor Abd Razak.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Security March 9, Security What is security?  Techniques that control access to use a shared resource  Uses of shared resource must be authorized.
VPN. CONFIDENTIAL Agenda Introduction Types of VPN What are VPN Tokens Types of VPN Tokens RSA How tokens Work How does a user login to VPN using VPN.
Fall 2006CS 395: Computer Security1 Key Management.
9.2 SECURE CHANNELS JEJI RAMCHAND VEDULLAPALLI. Content Introduction Authentication Message Integrity and Confidentiality Secure Group Communications.
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
SECURITY. Security Threats, Policies, and Mechanisms There are four types of security threats to consider 1. Interception 2 Interruption 3. Modification.
1 Example security systems n Kerberos n Secure shell.
SAMET KARTAL No one wants to share own information with unknown person. Sometimes while sharing something with someone people wants to keep.
Presented by Edith Ngai MPhil Term 3 Presentation
Talal H. Noor, Quan Z. Sheng, Lina Yao,
Secure Software Confidentiality Integrity Data Security Authentication
Radius, LDAP, Radius used in Authenticating Users
Examples of Data Dissemination
Autonomous Aggregate Data Analytics in Untrusted Cloud
Privacy and Identity Management in Cloud
ONLINE SECURE DATA SERVICE
Cybersecurity Simplified: Phishing
Presentation transcript:

Application of Active Bundles Bharat Bhargava

A. Identity Management (IDM) Service-Oriented Architecture (SOA) IDM in traditional application-centric IDM model  Each application keeps trace of identities of the entities it uses. IDM in SOA  Entities have multiple accounts associated with a single or multiple service providers (SPs).  Sharing sensitive identity information along with associated attributes of the same entity across services can lead to mapping of the identities to the entity.

Goals of IDM 1.Authenticate without disclosing data (Unencrypted data) 2.Use service on untrusted hosts (hosts not owned by user) 3.Minimal disclosure and minimize risk of disclosure during communication between user and service provider (Man in the Middle, Side Channel and Correlation Attacks) 4.Independence of Trusted Third Party

Anonymous Identification User VM on Amazon Cloud 1. 2.Password 1. 2.Password User Request for service Function f and number k f k ( , Password) = R ZKP Interactive Protocol Authenticated R is correct Use of Zero-knowledge proofing for user authentication without disclosing its identifier.

Interaction using Active Bundle Active Bundle (AB) Key Management Security Services Agent (SSA) Active Bundle Services User Application Active Bundle Creator Active Bundle Destination Trust Evaluation Agent (TEA) Active Bundle AB information disclosure

Predicate over Encrypted Data Verification without disclosing unencrypted identity data. Password E(Name) E(Shipping Address) E(Billing Address) E(Credit Card) E(Name) E(Billing Address) E(Credit Card) Predicate Request* *Credit Card Verification Request

Multi-Party Computation To become independent of a trusted third party Multiple Services hold shares of the secret key Minimize the risk E(Name) E(Billing Address) E(Credit Card) Key Management Services K’1K’1 K’2K’2 K’3K’3 K’nK’n Predicate Request * Decryption of information is handled by the Key Management services

Multi-Party Computation Credit Card Verified Name Billing Address Credit Card Key Management Services K’1K’1 K’2K’2 K’3K’3 K’nK’n Predicate Reply*

Selective Disclosure Password E(Name) E(Shipping Address) E(Billing Address) E(Credit Card) Selective disclosure* E(Name) E(Shipping Address) User Policies in the Active Bundle dictate dissemination *e-bay shares the encrypted information based on the user policy

Selective Disclosure E(Name) E(Shipping Address) Selective disclosure* E(Name) E(Shipping Address) *e-bay seller shares the encrypted information based on the user policy

Selective Disclosure E(Name) E(Shipping Address) Selective disclosure Name Shipping Address Decryption handled by Multi-Party Computing as in the previous slides

Selective Disclosure E(Name) E(Shipping Address) Selective disclosure Name Shipping Address Fed-Ex can now send the package to the user

Identity revealed to Vendors User on Amazon Cloud Name Password Billing Address Shipping Address Credit Card Name Shipping Address Name Billing Address Credit Card Password

Advantage of AB for IDM Ability to use Identity data on untrusted hosts Self Integrity Check against Corruption of AB content Compromised AB leads to apoptosis Establishes the trust of users in Requesters Through putting the user in control of who has her data and how it is disseminated Independent of Third Party Minimizes identity correlation attacks Minimal disclosure to the requester.

B. Mobile-Cloud Pedestrian Crossing Guide for the Blind Bundle the image, position, and destination as well as the computation in an active bundle; send the AB to the cloud service Process the code and return the AB to the mobile Ensure data are protected; e.g., removed from the cloud when processing finishes.

C. A Trust-based Approach for Secure Data Dissemination in a Mobile Peer-to-Peer Network of UAVs Mobile peer-to-peer networks of unmanned aerial vehicles (UAVs) have become significant in collaborative tasks including military missions and search and rescue operations Data communication (over shared media) between the nodes in a UAV network makes the disseminated data prone to interception by malicious parties, which could cause serious harm for the designated mission of the network A scheme for secure dissemination of data between UAV nodes is needed

Proposed Data Protection Scheme Application Data Protection Mechanism (Active Bundle) Data Folder Trust Evaluation Server Security Server Identity Management Middleware ProducerConsumer Services provided by Trusted Third Parties Filtered Data 1.Data producer UAV (publisher) invokes its data sharing application 2.The application gets the desired data from the data folder and bundles it along with the policy for data protection in the protection structure proposed (active bundle) 3.The active bundle consults trusted third party services to determine the trust level of the destination UAV(consumer) 4.The active bundle filters its data based on the trust level of the consumer and the matching of policies between the producer and consumer and presents the filtered data to the consumer.

Dynamic Trust Calculation The trust calculation component works like a reputation system, where the trustworthiness of a node is evaluated based on various dynamic parameters Trust parameters vary with the scenario in which the UAVs communicate, and have different weights Computed trust value is used to determine whether it is safe to share the data and the degree of filtering to apply on the data before sharing Trust value T for a particular UAV u at time t also depends on previous interactions with that UAV and is calculated using the below formula, where α determines how important previous interactions are and P is the trust value determined by the dynamic parameters T u (t) = α ∙ T u (t-1) + (1- α) ∙ P

Trust Evaluation Trust level for the destination UAV (data consumer) can be evaluated and verified by a Trusted Third Party and can be based on different parameters such as: Location: USA, Middle East, Iraq, etc Security Clearance Level: Top-secret, Secret, Confidential, Unclassified Bandwidth: High Bandwidth, Low Bandwidth History of Obligations: Satisfactory, Unsatisfactory Distance: Not necessarily based on metric distance, i.e. more trusted entities are closer Authentication Level: Fully authenticated, Partially authenticated, Not authenticated Context: Emergency, Disaster, Normal etc.

Example of DataFiltering Example of Data Filtering a. Data consumer verified as doctor at the hospital can get all patient data b. Hospital Receptionist gets filtered data c. Insurance company gets only the minimal required data EPHI (Electronic Private Health Information): Stored in a relational database, data filtering for different data consumers performed through SQL queries run in the Active Bundle VM

Image Data Filtering Techniques Low Dynamic Range Rendering: This method applies the reverse of high dynamic range rendering on an image to degrade image quality and hide details. Pattern Recognition and Blurring: This method involves recognition of specific patterns in the image to black out those high sensitivity areas. Data Equivalence Techniques: Image can be transformed such that the information content of the image remains the same while the fine grain details change (such as replacing the model number of an aircraft with another model’s).

Data Dissemination Models Direct Link: UAVs discover each other through broadcast of ALIVE messages and initiate data transfer without involvement of third-party nodes. Publish-Subscribe: This model requires a third-party (ground controller) called the information broker (IB) to mediate data dissemination between UAVs. The publisher node registers an active bundle with the IB and subscriber receives data from IB after evaluation of its trustworthiness by the IB.

Simulation Fig.a. UAV Network. Data transfer is initiated from UAV 3 to UAV 1. Available bandwidths are displayed on the lines connecting pairs of AVs. Fig.b. Policy of data sharing is at the top, original data in the middle and the virtual machine status at the bottom. Policy is based on the trust level of the AV: If above 2.5, original data is shared; if below 2.5 but above 2.3, minimal filtering is applied; if between 2.3 and 2.0 greater filtering is applied and if below the threshold of 2.0, no data is shared, in which case the active bundle destroys itself.

Simulation (cont.) Fig.c. The trust level of the receiver AV is calculated as 2.09, which is higher than the threshold trust level, but not high enough to share the original data. Fig.d. Data transformed by the virtual machine according to the policy and the transformed data shared with the receiver node. The data shared provides a narrower view of the environment than the original image.

Simulation