Building an Encrypted and Searchable Audit Log

Slides:



Advertisements
Similar presentations
Efficient Information Retrieval for Ranked Queries in Cost-Effective Cloud Environments Presenter: Qin Liu a,b Joint work with Chiu C. Tan b, Jie Wu b,
Advertisements

Building web applications on top of encrypted data using Mylar Presented by Tenglu Liang Tai Liu.
Building an Encrypted and Searchable Audit Log Brent Waters Dirk Balfanz Glenn Durfee D.K. Smetters.
SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
Public Key Management and X.509 Certificates
Offline Untrusted Storage with Immediate Detection of Forking and Replay Attacks Marten van Dijk, Jonathan Rhodes, Luis Sarmenta Srini Devadas MIT Computer.
Introduction to Practical Cryptography Lecture 9 Searchable Encryption.
Negotiated Privacy CS551/851CRyptographyApplicationsBistro Mike McNett 30 March 2004 Stanislaw Jarecki, Pat Lincoln, Vitaly Shmatikov. Negotiated Privacy.Negotiated.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
16.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
19.1 Silberschatz, Galvin and Gagne ©2003 Operating System Concepts with Java Chapter 19: Security The Security Problem Authentication Program Threats.
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
Security Chapters 14,15. The Security Environment Threats Security goals and threats.
Practical Techniques for Searches on Encrypted Data Author: Dawn Xiaodong Song, David Wagner, Adrian Perrig Presenter: 紀銘偉.
CMSC 414 Computer and Network Security Lecture 22 Jonathan Katz.
21 June 2006Copyright 2006 University of Kent1 Delegation of Authority (DyVOSE project) David Chadwick University of Kent.
Efficient Search on Encrypted Data. Outline SWP Linear Scan SWP encrypted index Goh Bloom Filter Hybird scheme Discussion.
Key Management and Distribution. YSLInformation Security – Mutual Trust2 Major Issues Involved in Symmetric Key Distribution For symmetric encryption.
Building an Encrypted and Searchable Audit Log 11th Annual Network and Distributed Security Symposium (NDSS '04); 2004 February 5-6; San Diego; CA. Presented.
BR1 Protection and Security B. Ramamurthy Chapters 18 and 19.
Security Management.
Practical Techniques for Searches on Encrypted Data Yongdae Kim Written by Song, Wagner, Perrig.
Authentication and Authorization Authentication is the process of verifying a principal’s identity (but how to define “identity”?) –Who the person is –Or,
1 Architectural Support for Copy and Tamper Resistant Software David Lie, Chandu Thekkath, Mark Mitchell, Patrick Lincoln, Dan Boneh, John Mitchell and.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Cryptography, Authentication and Digital Signatures
CSE 548 Advanced Computer Network Security Document Search in MobiCloud using Hadoop Framework Sayan Cole Jaya Chakladar Group No: 1.
1 Practical Techniques for Searches on Encrypted Data Dawn Song, David Wagner, Adrian Perrig.
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
1 Private Resource Pairing Joseph Calandrino Department of Computer Science University of Virginia August 10, 2005.
Public Key Encryption with keyword Search Author: Dan Boneh Rafail Ostroversity Giovanni Di Crescenzo Giuseppe Persiano Presenter: 陳昱圻.
Security (and privacy) Larry Rudolph With help from Srini Devedas, Dwaine Clark.
1 Common Secure Index for Conjunctive Keyword-Based Retrieval over Encrypted Data Peishun Wang, Huaxiong Wang, and Josef Pieprzyk: SDM LNCS, vol.
1 Network Security Lecture 7 Overview of Authentication Systems Waleed Ejaz
Secure Conjunctive Keyword Search Over Encrypted Data Philippe Golle Jessica Staddon Palo Alto Research Center Brent Waters Princeton University.
Pairing Based Cryptography Standards Terence Spies VP Engineering Voltage Security
Security & Privacy. Learning Objectives Explain the importance of varying the access allowed to database elements at different times and for different.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Deck 10 Accounting Information Systems Romney and Steinbart Linda Batch March 2012.
Fuzzy Identity Based Encryption Brent Waters Current Research with Amit Sahai.
Lecture 9 Overview. Digital Signature Properties CS 450/650 Lecture 9: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
Keyword search on encrypted data. Keyword search problem  Linux utility: grep  Information retrieval Basic operation Advanced operations – relevance.
SECURITY. Security Threats, Policies, and Mechanisms There are four types of security threats to consider 1. Interception 2 Interruption 3. Modification.
Information Systems Design and Development Security Precautions Computing Science.
Prof. Reuven Aviv, Nov 2013 Public Key Infrastructure1 Prof. Reuven Aviv Tel Hai Academic College Department of Computer Science Public Key Infrastructure.
Key management issues in PGP
Searchable Encryption in Cloud
Web Applications Security Cryptography 1
Database Security and Authorization
網路環境中通訊安全技術之研究 Secure Communication Schemes in Network Environments
Computer Communication & Networks
TRUST Area 3 Overview: Privacy, Usability, & Social Impact
e-Health Platform End 2 End encryption
Unit OS7: Security 7.4. Quiz Windows Operating System Internals - by David A. Solomon and Mark E. Russinovich with Andreas Polze.
Authentication.
pVault Sharing Architecture
Topic 1: Data, information, knowledge and processing
Cryptographic Algorithms for Privacy in an Age of Ubiquitous Recording
based on slides by Debra Cook
Offline Auditing for Privacy
NET 311 Information Security
Pooja programmer,cse department
Chapter 4 Cryptography / Encryption
Security.
Protection and Security
Searchable Encryption
Key Distribution Reference: Pfleeger, Charles P., Security in Computing, 2nd Edition, Prentice Hall, /18/2019 Ref: Pfleeger96, Ch.4.
Operating System Concepts
Electronic Payment Security Technologies
Introduction to Cryptography
Presentation transcript:

Building an Encrypted and Searchable Audit Log Brent Waters Dirk Balfanz Glenn Durfee D.K. Smetters

Audit Logs Employed on most server systems Web logs Database logs Provide invaluable access to past activity Hold users accountable for their actions Diagnostics

Desirable Characteristics Tamper Resistant Verifiable Can check that entries are present and have not been altered Data Access Control Entries may be sensitive to individuals or log owner Searchability Search for log on specific criteria e.g keyword search

Desirable Characteristics Tamper Resistant Verifiable Can check that entries are present and have not been altered Data Access Control Entries may be sensitive to individuals or log owner Searchability Search for log on specific criteria e.g keyword search

An Audit Log for a Database System user: Alice Smith keyword: cars keyword: make keyword: ford time: 2003/08/26 23:34:24 authentication clock keyword extraction “select * from cars where make=‘ford’” database audit record creation keywords for audit record log storage (untrusted)

Requirements Data Access Control Searchability Entries must be encrypted on untrusted storage Forward security in case auditing device becomes compromised  asymmetric encryption Limit scope of data released to that of the search Searchability Be able to efficiently retrieve entries based on certain criteria We focus on keyword search

A Simple Solution Encrypt all entries with a public key Auditor downloads all entries, then decrypts them, then performs the search

A Simple Solution Encrypt all entries with a public key Auditor downloads all entries, then decrypts them, then performs the search Disadvantages Auditor sees all entries and regardless of what search criteria was All entries must be transmitted from server

Delegating Search Capabilities The investigator requests a capability to search for all entries that were made by the user Alice. “user: Alice Smith” 1 capability for search master secret investigator audit escrow agent The investigator submits the capability to the audit log and receives only entries that the capability matches. capability for search 2 audit record audit record … audit record investigator audit log

Searching on Asymmetrically Encrypted Data Document Keywords Alice Ford Loans Auditing Device

Searching on Asymmetrically Encrypted Data Document Keywords Alice Ford Loans Auditing Device Encrypted Data Keywords must not be in the clear!

Searching on Asymmetrically Encrypted Data Document Keywords Alice Ford Loans master secret audit escrow agent Auditing Device Encrypted Data

Searching on Asymmetrically Encrypted Data Document Keywords Alice Ford Loans master secret audit escrow agent Auditing Device Encrypted Data Honda Search Capability

Searching on Asymmetrically Encrypted Data Document Keywords Alice Ford Loans master secret audit escrow agent Auditing Device Encrypted Data Honda Search Capability

Searching on Asymmetrically Encrypted Data Document Keywords Alice Ford Loans master secret audit escrow agent Auditing Device Encrypted Data Honda Search Capability No information is learned

Searching on Asymmetrically Encrypted Data Document Keywords Alice Ford Loans master secret audit escrow agent Auditing Device Encrypted Data

Searching on Asymmetrically Encrypted Data Document Keywords Alice Ford Loans master secret audit escrow agent Auditing Device Encrypted Data Alice Search Capability

Searching on Asymmetrically Encrypted Data Document Keywords Alice Ford Loans master secret audit escrow agent Auditing Device Embed decryption in search Encrypted Data Alice Search Capability Document Keywords Alice Ford Loans

Identity Based Encryption (IBE) Public Key is simply a string e.g. bob@parc.com Private Key given from master secret holder(s) Removes need for distribution of public key certificates We use scheme of Boneh and Franklin (2001)

Using IBE to Search on Asymmetrically Encrypted Data Auditing Device Keywords Alice Ford Loans Document

Using IBE to Search on Asymmetrically Encrypted Data Auditing Device Keywords Alice Ford Loans Document Document K

Using IBE to Search on Asymmetrically Encrypted Data Auditing Device Keywords Alice Ford Loans Document FLAG | K “Alice” Document K

Using IBE to Search on Asymmetrically Encrypted Data Auditing Device Keywords Alice Ford Loans Document FLAG | K “Ford” FLAG | K “Alice” Document K

Using IBE to Search on Asymmetrically Encrypted Data FLAG | K “Loans” Auditing Device Keywords Alice Ford Loans Document FLAG | K “Ford” FLAG | K “Alice” Document K

Using IBE to Search on Asymmetrically Encrypted Data FLAG | K “Loans” Auditing Device Keywords Alice Ford Loans Document FLAG | K “Ford” FLAG | K “Alice” Document K FLAG used to test K to decrypt on match

Using IBE to Search on Asymmetrically Encrypted Data FLAG | K “Loans” Auditing Device Keywords Alice Ford Loans Document FLAG | K “Ford” FLAG | K “Alice” Document K FLAG used to test K to decrypt on match Key-privacy propertykeywords kept private

Using IBE to Search on Asymmetrically Encrypted Data FLAG | K “Loans” Auditing Device Keywords Alice Ford Loans Document FLAG | K “Ford” FLAG | K “Alice” Document K FLAG used to test K to decrypt on match Key-privacy propertykeywords kept private “Pairing” operation per keyword

Using IBE to Search on Asymmetrically Encrypted Data FLAG | K “Loans” Alice Search Capability FLAG | K “Ford” FLAG | K “Alice” Document K

Using IBE to Search on Asymmetrically Encrypted Data FLAG | K “Loans” Alice Search Capability FLAG | K “Ford” FLAG | K “Alice” Document K Attempt IBE decryption on each part Test for presence of FLAG

Using IBE to Search on Asymmetrically Encrypted Data FLAG | K “Loans” 011010… Alice Search Capability FLAG | K “Ford” FLAG | K “Alice” Document K Attempt IBE decryption on each part Test for presence of FLAG

Using IBE to Search on Asymmetrically Encrypted Data FLAG | K “Loans” Alice Search Capability FLAG | K “Ford” 0011100… FLAG | K “Alice” Document K Attempt IBE decryption on each part Test for presence of FLAG

Using IBE to Search on Asymmetrically Encrypted Data FLAG | K “Loans” Alice Search Capability FLAG | K “Ford” FLAG | K “Alice” FLAG | K Document K Attempt IBE decryption on each part Test for presence of FLAG

Using IBE to Search on Asymmetrically Encrypted Data FLAG | K “Loans” Alice Search Capability FLAG | K “Ford” FLAG | K “Alice” FLAG | K Document K Attempt IBE decryption on each part Test for presence of FLAG On match use K to decrypt document Document

Using IBE to Search on Asymmetrically Encrypted Data FLAG | K “Loans” Alice Search Capability FLAG | K “Ford” FLAG | K “Alice” FLAG | K Document K Attempt IBE decryption on each part Test for presence of FLAG On match use K to decrypt document Pairing per keyword in document Document

Scoping of Keywords We want to type keywords e.g. Capability to search on entries about “Alice” vs. those made by “Alice” Solution: Prefix keywords with type “user:Alice” “kw:Alice”

Performance Encryption Search/Decryption One pairing per keyword in document One exponentiation per keyword Search/Decryption One pairing per keyword per document

Optimizations Cache pairings of frequently used keywords eg. ê(“user:Alice”,sP) Only need a pairing per new keyword on encryption In limit exponentiation per keyword is dominant cost

Optimizations Cache pairings of frequently used keywords eg. ê(“user:Alice”,sP) Only need a pairing per new keyword on encryption In limit exponentiation per keyword is dominant cost Reuse randomness for IBE encryption within one document Okay since cannot use same public key per document In decryption only one pairing per document Save storage in log

Indexing Incremental update of an index on untrusted storage is insecure

Indexing Incremental update of an index on untrusted storage is insecure Keywords Alice Ford Loans Document Index

Indexing Incremental update of an index on untrusted storage is insecure Keywords Alice Ford Loans Document Index

Indexing Incremental update of an index on untrusted storage is insecure Keywords Alice Loans Washington Document Index

Indexing Incremental update of an index on untrusted storage is insecure Keywords Alice Loans Washington Document Index

Indexing Build local index on auditing device and flush out to storage

Indexing Build local index on auditing device and flush out to storage FLAG | … “Sam” FLAG | K | K’’ “Alice” Document K Document K’ Document K’’

Indexing Longer index is held in auditing device more information leaked on device compromise

Implementation Implemented a logging system for MySQL database queries Goal to protect individual’s privacy Used Stanford IBE library Pairing cost ~80ms on current machines

Related Work Searching on Encrypted Data Boneh, Crescenzo, Ostrovsky and Persiano (2003) Song, Wagner and Perrig (2000) Goh (2003) Identity Based Encryption Boneh and Franklin (2001)

Conclusion Tension between data access control and searchability in audit logs Asymmetric scheme for searching on encrypted data Explored optimizations for practical systems

Searching on Asymmetrically Encrypted Data audit escrow agent master secret Keywords Alice Ford Loans Document Auditing Device Encrypted Data Bob Search Capability Keywords Alice Ford Loans Document

Using IBE to Search on Asymmetrically Encrypted Data Document K FLAG | K “Alice” “Ford” “Loans” Auditing Device Document Keywords Alice Ford Loans FLAG used to test K to decrypt on match Key-privacy propertykeywords kept private “Pairing” operation per keyword

Using IBE to Search on Asymmetrically Encrypted Data Document K FLAG | K “Alice” “Ford” “Loans” Alice Search Capability Attempt IBE decryption on each part Test for presence of FLAG On match use K to decrypt document Pairing per test