Professor Tzong-Chen Wu

Slides:



Advertisements
Similar presentations
Inter WISP WLAN roaming
Advertisements

Key Management And Key Distribution The essential problems addressed by all cryptosystems is how to safely exchange keys and how to easily manage the.
Supervisor :Dr. Lo'ai Ali Tawalbeh Done by: Wa’el Musa Hadi
Key distribution and certification In the case of public key encryption model the authenticity of the public key of each partner in the communication must.
Kerberos 1 Public domain image of Heracles and Cerberus. From an Attic bilingual amphora, 530–520 BC. From Italy (?).
Secure Data Storage in Cloud Computing Submitted by A.Senthil Kumar( ) C.Karthik( ) H.Sheik mohideen( ) S.Lakshmi rajan( )
Contextualized Information-Centric Home Networking (draft-ravindran-cibus-01.txt) IRTF/ICN-RG (IETF-89) Ravi Ravindran, Asit Chakraborti, G.Q.Wang.
Presenter: Nguyen Ba Anh HCMC University of Technology Information System Security Course.
Key Provisioning Use Cases and Requirements 67 th IETF KeyProv BOF – San Diego Mingliang Pei 11/09/2006.
CMSC 414 Computer and Network Security Lecture 16 Jonathan Katz.
Privacy and Integrity Preserving in Distributed Systems Presented for Ph.D. Qualifying Examination Fei Chen Michigan State University August 25 th, 2009.
FI-WARE – Future Internet Core Platform FI-WARE Security July 2011 High-level Description.
Freenet A Distributed Anonymous Information Storage and Retrieval System I Clarke O Sandberg I Clarke O Sandberg B WileyT W Hong.
OWASP Mobile Top 10 Why They Matter and What We Can Do
Chapter 10: Authentication Guide to Computer Network Security.
Cong Wang1, Qian Wang1, Kui Ren1 and Wenjing Lou2
Mobile and Wireless Communication Security By Jason Gratto.
HPCC 2015, August , New York, USA Wei Chang c Joint work with Qin Liu a, Guojun Wang b, and Jie Wu c a. Hunan University, P. R. China b. Central.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
1 Mail Saurus Reference:“Usable Encryption Enabled by AJAX” J.F. Ryan; B.L. Reid; Networking and Services, ICNS '06. Digital Object Identifier /ICNS
A security framework combining access control and trust management for mobile e-commerce applications Gregor v.Bochmann, Zhen Zhang, Carlisle Adams School.
Customer Interface for wuw.com 1.Context. Customer Interface for wuw.com 2. Content Our web-site can be classified as an service-dominant website. 3.
. 1. Computer Security Concepts 2. The OSI Security Architecture 3. Security Attacks 4. Security Services 5. Security Mechanisms 6. A Model for Network.
1 Common Secure Index for Conjunctive Keyword-Based Retrieval over Encrypted Data Peishun Wang, Huaxiong Wang, and Josef Pieprzyk: SDM LNCS, vol.
The ERA of API in the World of IoT Jing Zhang-Lee November, 2015.
m-Privacy for Collaborative Data Publishing
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
Authentication has three means of authentication Verifies user has permission to access network 1.Open authentication : Each WLAN client can be.
CPT 123 Internet Skills Class Notes Internet Security Session B.
Directory Services CS5493/7493. Directory Services Directory services represent a technological breakthrough by integrating into a single management tool:
SOURCE:2014 IEEE 17TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING AUTHER: MINGLIU LIU, DESHI LI, HAILI MAO SPEAKER: JIAN-MING HONG.
Secure Biometric Authentication for Weak Computational Devices Mikhail Atallah (Purdue),Keith Frikken (Purdue), Michael Goodrich (UC- Irvine), Roberto.
Successfully Implementing The Information System Systems Analysis and Design Kendall and Kendall Fifth Edition.
Transparent Authentication for IoT-oriented Cloud Architecture Digital Content Lab – Information Security Group Department of Information Management National.
Big Data Security and Privacy
BUILD SECURE PRODUCTS AND SERVICES
Searchable Encryption in Cloud
Talal H. Noor, Quan Z. Sheng, Lina Yao,
A brief introduction to IoT gateway
Intrusion Tolerant Architectures
DASH2M: Exploring HTTP/2 for Internet Streaming to Mobile Devices
University of Maryland College Park
A Dynamic ID-Based Generic Framework for Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks Source: Wireless Personal Communications,
Module 8: Networking Services
A lightweight authentication scheme based on self-updating strategy for space information network Source: International Journal Of Satellite Communications.
Discussion about Use Case and Architecture in Developer Guide
Cryptography and Network Security
System Design of Internet-of-Things for Residential Smart Grid
Security Issues.
Hybrid Cloud Architecture for Software-as-a-Service Provider to Achieve Higher Privacy and Decrease Securiity Concerns about Cloud Computing P. Reinhold.
Radius, LDAP, Radius used in Authenticating Users
A Secure Anonymity Preserving Authentication Scheme for Roaming Service in Global Mobility Networks Source: Wireless Personal Communications, ahead of.
OTA & IoT A Shared & Collaborative Responsibility 24 October 2017
CSCE 715: Network Systems Security
State of the art – Part 1 Xin Jin
Trends in my profession, Information Technology
Store, Share, Sync and Collaborate
Internet of Things (IoT)
Internet of Things Vulnerabilities
Recent Developments on Multimedia and Secure Networking Technologies
Home Internet Vulnerabilities
Securing the Internet of Things: Key Insights and Best Practices Across the Industry Theresa Bui Revon IoT Cloud Strategy.
Cryptography and Network Security
Recent Developments on Multimedia and Secure Networking Technologies
The Dark Side of the Internet
Privacy Protection for E-Health Systems by
Presentation transcript:

Professor Tzong-Chen Wu Security and Privacy for Mobile Applications and Cloud Services in Distributed Mobile Cloud Environments Leading Investigator: Professor Tzong-Chen Wu Researchers: Nai-Wei Lo Chuan-Kai Yang Shi-Cho Cha Raylin Tso Kuo-Hui Yeh

Agenda Research picture Four focused areas Deliverables Privacy-Preserving Video Retrieval Privacy-Preserving Data Analysis Transparent Authentication Privacy Policy Notification Framework Deliverables

Research Picture Cloud Sensor Data Center Gateway IoT Environment Internet Gateway Transparent Authentication Sensor Sensor Encrypted Data Access Mobile Device Encrypted Data/Video Access Privacy Policy Notification Mobile Device

Four Focused Areas Privacy-Preserving Video Retrieval Privacy-Preserving Data Analysis Transparent Authentication Privacy Policy Notification Framework

Privacy-Preserving Video Retrieval State of the Art As videos are huge and stored on the cloud in an encrypted form, how do we retrieve them? Li et al.’s work: the encryption is through permutation of pixels Suffer from known-plaintext attack Unless the permutation can be changed dynamically Lu et al.’s work: Separate the content and index Use traditional encryption for content Build secure search indices

Privacy-Preserving Video Retrieval Research Goals (1/2) Naïve way: Download Decode  Compare Time consuming Better way (our goal): Compare in the encryption domain on the cloud and return only the matched videos

Privacy-Preserving Video Retrieval Research Goals (2/2)

Privacy-Preserving Data Analysis State of the Art To keep the secrecy of the data stored in cloud servers, data should be encrypted Need some privacy-preserving statistical analysis protocols allow users to perform statistical analysis on the encrypted data without compromising the data privacy Most of the existing schemes based on homomorphic encryption or PKC are inefficient and not applicable to the IoT devices as well as sensor networks

Privacy-Preserving Data Analysis Research Goals (1/2) Introduce a new practical technique to support data retrieval from cloud environment for statistical data analysis and prevent data disclosure from resource-limited client devices at the same time Utilize the concept and techniques of secure multi-party computation to defend against security threats from insider attacks

Privacy-Preserving Data Analysis Research Goals (2/2)

Transparent Authentication State of the Art Few studies focus on the transparent authentication with biometric features in Body Area Networks The evolution of wearable IoT device has led the design of authentication into a new era Personal bio-data, such as heartbeat, brain-weaves and body-temperature can be analyzed to support the transparent authentication

Transparent Authentication Research Goals An authentication scheme using adaptive biometric features, such as heart rate, body temperature, and personal preference pattern, for IoT-based cloud environments Use transparent token concept to construct continuous authenticated sessions for IoT-like client devices

Privacy Policy Notification Framework State of the Art While current smartphones usually equip with different kinds of sensors, using mobile applications may pose new risks to user privacy Although several governmental agencies start to request mobile application developers to provide privacy policies with their applications, current marketplace providers usually do not force mobile applications developers to provide privacy policies about their applications Even application developers provide privacy policies in application marketplaces, current marketplaces usually do not address the issues of privacy policies updates There is no standard way to enable users to know privacy policies of the application is updated

Privacy Policy Notification Framework Research Goals (1/2) To design and implement a Privacy Policy Notification Framework for Android applications to achieve the following requirements: To provide a standard way for Android application developers to express their privacy policies and to embed the privacy policies in Android applications To enable third-party to inspect whether privacy policies of an application comply with practices of the application To provide a standard means for application users to obtain privacy policies of Android applications and know whether privacy policies of the applications are verified by third parties To enable application users know application privacy policies updates of applications If application marketplace providers find that the privacy policy of an application is mismatched with the practices of the application, the marketplace providers can notify application users to stop using the application

Privacy Policy Notification Framework Research Goals (2/2)

Deliverables Privacy-Preserving Video Retrieval A privacy-preserving video retrieval system Privacy-Preserving Data Analysis A lightweight encryption algorithm for resource-limited devices A scheme supports statistic analysis on stored data without compromising the data privacy Transparent Authentication A transparent authentication scheme using adaptive biometric features Privacy Policy Notification Framework A privacy policy notification framework and its prototype for Android applications Multiple conference papers (published or accepted) and journal papers (submitted)