Emerging Security Mechanisms for Medical Cyber Physical Systems

Slides:



Advertisements
Similar presentations
Public Key Infrastructure and Applications
Advertisements

Trusted Data Sharing over Untrusted Cloud Storage Provider Gansen Zhao, Chunming Rong, Jin Li, Feng Zhang, and Yong Tang Cloud Computing Technology and.
Public Key Infrastructure A Quick Look Inside PKI Technology Investigation Center 3/27/2002.
Public Key Cryptography INFSCI 1075: Network Security – Spring 2013 Amir Masoumzadeh.
An Introduction to Pairing Based Cryptography Dustin Moody October 31, 2008.
Russell Martin August 9th, Contents Introduction to CPABE Bilinear Pairings Group Selection Key Management Key Insulated CPABE Conclusion & Future.
Lect. 11: Public Key Cryptography. 2 Contents 1.Introduction to PKC 2.Hard problems  IFP  DLP 3.Public Key Encryptions  RSA  ElGamal 4.Digital Signatures.
Elliptic Curve Cryptography (ECC) Mustafa Demirhan Bhaskar Anepu Ajit Kunjal.
November 1, 2006Sarah Wahl / Graduate Student UCCS1 Public Key Infrastructure By Sarah Wahl.
Dr. Lo’ai Tawalbeh Fall 2005 Chapter 10 – Key Management; Other Public Key Cryptosystems Dr. Lo’ai Tawalbeh Computer Engineering Department Jordan University.
Public Key Cryptography
8: Network Security8-1 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key: K r e.g., key is knowing substitution.
CSCI 172/283 Fall 2010 Public Key Cryptography. New paradigm introduced by Diffie and Hellman The mailbox analogy: Bob has a locked mailbox Alice can.
Lecture 4 Cryptographic Tools (cont) modified from slides of Lawrie Brown.
Encryption Methods By: Michael A. Scott
Computer Science Public Key Management Lecture 5.
Andreas Steffen, , 4-PublicKey.pptx 1 Internet Security 1 (IntSi1) Prof. Dr. Andreas Steffen Institute for Internet Technologies and Applications.
© Neeraj Suri EU-NSF ICT March 2006 DEWSNet Dependable Embedded Wired/Wireless Networks MUET Jamshoro Computer Security: Principles and Practice Slides.
Fine-Grained Access Control (FGAC) in the Cloud Robert Barton.
Application of Elliptic Curves to Cryptography
WS-Security: SOAP Message Security Web-enhanced Information Management (WHIM) Justin R. Wang Professor Kaiser.
1 Boundary Control Chapter Materi: Boundary controls:  Cryptographic controls  Access controls  Personal identification numbers  Digital signatures.
The Dual Receiver Cryptosystem and its Applications Presented by Brijesh Shetty.
Day 37 8: Network Security8-1. 8: Network Security8-2 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key:
Cryptography and Network Security Chapter 10 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Symmetric Cryptography, Asymmetric Cryptography, and Digital Signatures.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED.
PUBLIC-KEY CRYPTOGRAPH IT 352 : Lecture 2- part3 Najwa AlGhamdi, MSc – 2012 /1433.
IPSEC : KEY MANAGEMENT PRESENTATION BY: SNEHA A MITTAL(121427)
Chapter 3 (B) – Key Management; Other Public Key Cryptosystems.
PUBLIC KEY CRYPTOGRAPHY ALGORITHM Concept and Example 1IT352 | Network Security |Najwa AlGhamdi.
Elliptic curve cryptography ECC is an asymmetric cryptosystem based on the elliptic curve discrete log problem. The ECDLP arises in Abelian groups defined.
Lecture 14 Public Key Cryptography and RSA. Summary principles of public-key cryptography principles of public-key cryptography RSA algorithm, implementation,
Cryptography services Lecturer: Dr. Peter Soreanu Students: Raed Awad Ahmad Abdalhalim
Packing Techniques for Homomorphic Encryption Schemes Scott Thompson CSCI-762 4/28/2016.
Public Key Cryptography. Asymmetric encryption is a form of cryptosystem in which Encryption and decryption are performed using the different keys—one.
@Yuan Xue CS 285 Network Security Public-Key Cryptography Yuan Xue Fall 2012.
Shucheng Yu, Cong Wang, Kui Ren,
Web Applications Security Cryptography 1
Asymmetric-Key Cryptography
Advanced Information Security 5 ECC Cryptography
Symmetric and Asymmetric Encryption
Golden Linear Group Key Agreement Protocol
Computer Communication & Networks
ETSI STF 529 on Attribute Based Encryption for IoT, Cloud, mobile
What is network security?
Public-Key Cryptography and RSA
Group theory exercise.
Information and Network Security
Quantum Cryptography Arjun Vinod S3 EC Roll No:17.
Cryptography and Network Security
SECURITY IN DISTRIBUTED FILE SYSTEMS
Elliptic Curve Cryptography (ECC)
Cryptography and Security Fall 2009 Steve Lai
Elliptic Curve Cryptography (ECC)
Chapter 4 Cryptography / Encryption
NET 311 Information Security
Chapter -7 CRYPTOGRAPHIC HASH FUNCTIONS
Introduction to Elliptic Curve Cryptography
DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S
Chapter 3 - Public-Key Cryptography & Authentication
Basic of Modern Cryptography
Asymmetric Cryptographic Algorithms
Introduction to Cryptography
Operating Systems Concepts
Elliptic-Curve Cryptography (ECC)
Cryptography Lecture 23.
10/7/2019 Created by Omeed Mustafa 1 st Semester M.Sc (Computer Science department) Cyber-Security.
How to Use Charm Crypto Lib
Cryptography and Network Security
Presentation transcript:

Emerging Security Mechanisms for Medical Cyber Physical Systems Ovunc Kocabas, Tolga Soyata, and Mehmet K. Aktas

Structure of MCPS & data flow in MCPS

Where the data gets exposed(e. g Where the data gets exposed(e.g. collected, transmitted, and stored), where security issues kick in Data Acquisition Layer Limited computational capability and battery life Generation & Management of security keys or agreed info Data Concentration Layer Sharing of the secret key among multiple parties Cloud Processing and Storage Layer Need of direct computations on encrypted data Action Layer

Encryption schemes for MCPS? Data Acquisition Layer Limited computational capability and battery life Generation & Management of security keys or agreed info Data Concentration Layer Sharing of the secret key among multiple parties Cloud Processing and Storage Layer Need of direct computations on encrypted data Action Layer Is there an one-size-fits-all encryption scheme that can address all the security issues in an MCPS?

Encryption schemes for MCPS? Data Acquisition Layer Limited computational capability and battery life Generation & Management of security keys or agreed info Data Concentration Layer Sharing of the secret key among multiple parties Cloud Processing and Storage Layer Need of direct computations on encrypted data Action Layer Is there a one-size-fits-all encryption scheme that can address all the security issues in an MCPS?

Identifying suitable encryption schemes for each layer Data Acquisition Layer Limited computational capability and battery life Advanced Encryption Standard (AES) & EC Integrated Encryption Scheme (ECIES) (Conventional) Data Concentration Layer Sharing of the secret key among multiple parties Attribute-Based Encryption(ABE) Cloud Processing and Storage Layer Need of direct computations on encrypted data Fully Homomorphic Encryption Action Layer

Identifying suitable encryption schemes for each layer Data Acquisition Layer Limited computational capability and battery life Advanced Encryption Standard (AES) & EC Integrated Encryption Scheme (ECIES) (Conventional) Data Concentration Layer Sharing of the secret key among multiple parties Attribute-Based Encryption(ABE) Cloud Processing and Storage Layer Need of direct computations on encrypted data Fully Homomorphic Encryption Action Layer Both Advanced Encryption Standard (AES) & EC Integrated Encryption Scheme (ECIES) schemes are seen as conventional encryption schemes and both of them can also use physiological or biomedical signals to agree on security keys. In conventional public-key cryptography, the receiver has two keys: The public key is shared by the sender, while the private key, which is kept only to the receiver himself/herself, is used to decrypt the received messages. AES uses a generic key exchange algorithm such as Diffie-Hellman (DH) or Elliptic Curve Diffie-Hellman (ECDH). ECIES uses ECDH to generate security keys between the sender & receiver. After the generation of the security keys, the encryption schemes start the encryption & decryption procedures.

Identifying suitable encryption schemes for each layer Data Acquisition Layer Limited computational capability and battery life Advanced Encryption Standard (AES) & EC Integrated Encryption Scheme (ECIES) (Conventional) Data Concentration Layer Sharing of the secret key among multiple parties Attribute-Based Encryption(ABE) Cloud Processing and Storage Layer Need of direct computations on encrypted data Fully Homomorphic Encryption Action Layer Attribute-based encryption (ABE) is a public-key encryption that enables secure data sharing by multiple receivers. The data is encrypted using an access policy based on credentials (i.e., attributes). Only the receivers whose credentials satisfy the access policy can access data. Ciphertext-Policy ABE (CP-ABE): Private key of an user is associated with user credentials. Ciphertexts specify an access policy and only users whose credentials satisfy the policy requirements can decrypt them. Key-Policy ABE (KP-ABE): In KP-ABE, the access policy is encoded into the receivers’ private key and a ciphertext is labeled with a set of attributes. KP-ABE schemes place the access policy on the private key of the receivers and the attributes are associated with the ciphertexts.

Identifying suitable encryption schemes for each layer Homomorphic encryption schemes enable computation of meaningful operations on encrypted data without observing the actual data. Everyone may have access to the data but only ones who have the private key can perform related homomorphic addition or homomorphic multiplication or both. Partially Homomorphic Encryption scheme, which could perform only either homomorphic addition or homomorphic multiplication. E.g., Paillier Encryption scheme is a public-key cryptosystem that is additively-homomorphic. Fully Homomorphic Encryption scheme, which needs to perform both homomorphic addition and homomorphic multiplication. E.g., Brakerski-Gentry-Vaikuntanathan (BGV). Data Acquisition Layer Limited computational capability and battery life Advanced Encryption Standard (AES) & EC Integrated Encryption Scheme (ECIES) (Conventional) Data Concentration Layer Sharing of the secret key among multiple parties Attribute-Based Encryption(ABE) Cloud Processing and Storage Layer Need of direct computations on encrypted data Fully Homomorphic Encryption Action Layer

Comparison of encryption schemes – Capability comparison

Comparison of encryption schemes – Performance comparison Evaluating six different encryption schemes based on four metrics: Encryption time Decryption time Ciphertext size Evaluation time(Direct computation time on encrypted data)

Comparison of encryption schemes – Performance comparison Conclusion: Among the six different schemes studied in this paper, AES is the clear winner in terms of computation and storage requirements, while the other five suffer substantial storage and computation overheads, but AES has many limits. An one-size-fits-all encryption scheme simply does not exist for designing an MCPS. Even if such a scheme would be developed, computation overhead could be so tremendous that it won’t be suitable to be used in MCPS.

Thank You