Multi-Dimensional Range Query over Encrypted Data Authors: Elaine Shi, Joint work with John Bethencourt, Hubert Chan, Dawn Song, Adrian Perrig Slides originated.

Slides:



Advertisements
Similar presentations
1 DATA STRUCTURES USED IN SPATIAL DATA MINING. 2 What is Spatial data ? broadly be defined as data which covers multidimensional points, lines, rectangles,
Advertisements

Private Inference Control David Woodruff MIT Joint work with Jessica Staddon (PARC)
Private Inference Control
Boneh-Franklin Identity-based Encryption. 2 Symmetric bilinear groups G = ágñ, g p = 1 e: G G G t Bilinear i.e. e(u a, v b ) = e(u, v) ab Non-degenerate:
Attacking Cryptographic Schemes Based on Perturbation Polynomials Martin Albrecht (Royal Holloway), Craig Gentry (IBM), Shai Halevi (IBM), Jonathan Katz.
Adaptively Attribute-Hiding ( Hierarchical ) Inner Product Encryption
Probabilistic Public Key Encryption with Equality Test Duncan S. Wong Department of Computer Science City University of Hong Kong Joint work with Guomin.
Oblivious Branching Program Evaluation
1 IP-Lookup and Packet Classification Advanced Algorithms & Data Structures Lecture Theme 08 – Part I Prof. Dr. Th. Ottmann Summer Semester 2006.
Fast Algorithms For Hierarchical Range Histogram Constructions
Group Protocols for Secure Wireless Ad hoc Networks Srikanth Nannapaneni Sreechandu Kamisetty Swethana pagadala Aparna kasturi.
Russell Martin August 9th, Contents Introduction to CPABE Bilinear Pairings Group Selection Key Management Key Insulated CPABE Conclusion & Future.
1 CIS 5371 Cryptography 5b. Pseudorandom Objects in Practice Block Ciphers.
Building an Encrypted and Searchable Audit Log Brent Waters Dirk Balfanz Glenn Durfee D.K. Smetters.
Encryption Public-Key, Identity-Based, Attribute-Based.
A Ternary Unification Framework for Optimizing TCAM-Based Packet Classification Systems Author: Eric Norige, Alex X. Liu, and Eric Torng Publisher: ANCS.
LOGO Multi-user Broadcast Authentication in Wireless Sensor Networks ICU Myunghan Yoo.
A Framework for Secure Data Aggregation in Sensor Networks Yi Yang Xinran Wang, Sencun Zhu and Guohong Cao The Pennsylvania State University MobiHoc’ 06.
Introduction to Practical Cryptography Lecture 9 Searchable Encryption.
SIA: Secure Information Aggregation in Sensor Networks Bartosz Przydatek, Dawn Song, Adrian Perrig Carnegie Mellon University Carl Hartung CSCI 7143: Secure.
Jan. 2013Dr. Yangjun Chen ACS Outline Signature Files - Signature for attribute values - Signature for records - Searching a signature file Signature.
Models and Security Requirements for IDS. Overview The system and attack model Security requirements for IDS –Sensitivity –Detection Analysis methodology.
Multiple-key indexes Index on one attribute provides pointer to an index on the other. If V is a value of the first attribute, then the index we reach.
B+-tree and Hashing.
1 Multi-Dimensional Range Query over Encrypted Data Presenter: 陳國璋 Elaine Shi, John Bethencourt, T-H. Hubert Chan, Dawn Song and Adrian Perrig IEEE Symposium.
1 Identity-Based Encryption form the Weil Pairing Author : Dan Boneh Matthew Franklin Presentered by Chia Jui Hsu Date :
Asymmetric Cryptography part 1 & 2 Haya Shulman Many thanks to Amir Herzberg who donated some of the slides from
Efficient Multidimensional Packet Classification with Fast Updates Author: Yeim-Kuan Chang Publisher: IEEE TRANSACTIONS ON COMPUTERS, VOL. 58, NO. 4, APRIL.
1 Conjunctive, Subset, and Range Queries on Encrypted Data Dan Boneh Brent Waters Stanford University SRI International.
Efficient Storage and Retrieval of Data
Privacy and Integrity Preserving in Distributed Systems Presented for Ph.D. Qualifying Examination Fei Chen Michigan State University August 25 th, 2009.
DSAC (Digital Signature Aggregation and Chaining) Digital Signature Aggregation & Chaining An approach to ensure integrity of outsourced databases.
Efficient Consistency Proofs for Generalized Queries on a Committed Database R. Ostrovsky C. Rackoff A. Smith UCLA Toronto.
Computer Science CSC 774Dr. Peng Ning1 CSC 774 Advanced Network Security Topic 2. Review of Cryptographic Techniques.
Ciphertext-Policy, Attribute-Based Encryption Brent Waters SRI International John Bethencourt CMU Amit Sahai UCLA.
Practical Techniques for Searches on Encrypted Data Yongdae Kim Written by Song, Wagner, Perrig.
1 Efficient packet classification using TCAMs Authors: Derek Pao, Yiu Keung Li and Peng Zhou Publisher: Computer Networks 2006 Present: Chen-Yu Lin Date:
Privacy Preserving Query Processing in Cloud Computing Wen Jie
Functional Encryption: An Introduction and Survey Brent Waters.
Indexing. Goals: Store large files Support multiple search keys Support efficient insert, delete, and range queries.
Functional Encryption: Beyond Public Key Cryptography
1 CPS216: Advanced Database Systems Notes 04: Operators for Data Access Shivnath Babu.
1 Practical Techniques for Searches on Encrypted Data Dawn Song, David Wagner, Adrian Perrig.
Fall, Privacy&Security - Virginia Tech – Computer Science Click to edit Master title style Collusion-Resistant Group Key Management Using Attribute-
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
SIA: Secure Information Aggregation in Sensor Networks B. Przydatek, D. Song, and A. Perrig. In Proc. of ACM SenSys 2003 Natalia Stakhanova cs610.
Fall, Privacy&Security - Virginia Tech – Computer Science Click to edit Master title style Key-Policy Attribute-Based Encryption Present by Xiaokui.
On the Communication Complexity of SFE with Long Output Daniel Wichs (Northeastern) joint work with Pavel Hubáček.
1 Tree Indexing (1) Linear index is poor for insertion/deletion. Tree index can efficiently support all desired operations: –Insert/delete –Multiple search.
Peer to Peer A Survey and comparison of peer-to-peer overlay network schemes And so on… Chulhyun Park
Secure Conjunctive Keyword Search Over Encrypted Data Philippe Golle Jessica Staddon Palo Alto Research Center Brent Waters Princeton University.
1 An Arc-Path Model for OSPF Weight Setting Problem Dr.Jeffery Kennington Anusha Madhavan.
Presented By Amarjit Datta
1 Efficient Selective-ID IBE Without Random Oracle Dan Boneh Stanford University Xavier Boyen Voltage Security.
1/28 Chosen-Ciphertext Security from Identity- Based Encryption Jonathan Katz U. Maryland Ran Canetti, Shai Halevi IBM.
2011 IEEE TrustCom-11 Sushmita Ruj Amiya Nayak and Ivan Stojmenovic Regular Seminar Tae Hoon Kim.
EE 122: Lecture 24 (Security) Ion Stoica December 4, 2001.
Keyword search on encrypted data. Keyword search problem  Linux utility: grep  Information retrieval Basic operation Advanced operations – relevance.
Online/Offline Attribute-Based Encryption Brent WatersSusan Hohenberger Presented by Shai Halevi.
Cryptographic methods. Outline  Preliminary Assumptions Public-key encryption  Oblivious Transfer (OT)  Random share based methods  Homomorphic Encryption.
Multidimensional Access Structures COMP3017 Advanced Databases Dr Nicholas Gibbins –
Searchable Encryption in Cloud
Tries 07/28/16 11:04 Text Compression
CPS216: Data-intensive Computing Systems
Multidimensional Access Structures
Boneh-Franklin Identity Based Encryption Scheme
Privacy Preserving Record Linkage
Verifiable Oblivious Storage
Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data An, Sanghong KAIST
Multi-Dimensional Range Query over Encrypted Data
Presentation transcript:

Multi-Dimensional Range Query over Encrypted Data Authors: Elaine Shi, Joint work with John Bethencourt, Hubert Chan, Dawn Song, Adrian Perrig Slides originated from Elaine Shi, modified by Michael Chen CSC 774 Advanced Network Security Instructor: Dr. Peng Ning Presenter: Michael Chen April 19, 2007

2Speaking Requirement Talk Motivation - Network Audit Logs Network gateway Data center

3Speaking Requirement Talk An Ideal Solution Network gateway Data center

4Speaking Requirement Talk Auditor auditor Trusted authority Query: ( 100 · port · 200 ) Æ ( ip *.* )

5Speaking Requirement Talk Auditor auditor Trusted authority Capability: ( 100 · port · 200 ) Æ ( ip *.* ) Query: ( 100 · port · 200 ) Æ ( ip *.* )

6Speaking Requirement Talk Security Query: ( 100 · port · 200 ) Æ ( ip *.* ) Can decrypt all matching entries Cannot learn additional information for non-matching entries –Except for the fact that they do not match

7Speaking Requirement Talk The Challenges Current practices: –No encryption –All-or-nothing decryption Challenge: –How to design such an encryption scheme –Efficiency –Security

8Speaking Requirement Talk Related work Search on encrypted data (SoE) –Not clear if can be extended to range query over multiple attributes. Anonymous hierarchical IBE (AHIBE) –Could be used to implement MRQED, encryption cost O(T D ) Concurrent work –BonehWaters06: Complex query over encrypted data. More expensive public key size, encryption cost, cheaper decryption cost and shorter decryption key size.

9Speaking Requirement Talk Generalized Problem Definition Time-stamp t, source address a, destination port p A tuple (t, a, p)  can be viewed as a point x in 3 dimensional space. Query for flows with Hyper-rectangle B in space x is in B ?

10Speaking Requirement Talk Generalized Problem Definition KeyGen – Key generation Encrypt – Encryption DeriveKey – Compute a decryption key QueryDecrypt – Attempt to decrypt using a capability

11Speaking Requirement Talk KeyGen ( , n) Input –k: security parameter –n: bit-length of x Output –public key PK & master private key SK KeyGen( , n) Trusted authority

12Speaking Requirement Talk Encrypt(PK, x, msg) x – a point Cipher_Text à Encrypt(PK, x, msg)

13Speaking Requirement Talk DeriveKey(PK, SK, B ) B – “hyper-rectangle” DK B t1t1 t2t2 r1r1 r2r2

14Speaking Requirement Talk QueryDecrypt(PK, DK, C) Output –msg if – if

15Speaking Requirement Talk Roadmap Trivial construction AIBE – MRQED1 –Efficient representation for ranges –1 dimensional scheme Extension to multiple dimensions

16Speaking Requirement Talk Trivial Construction SchemePK. sizeEnc. CostCT. SizeDK. SizeDec. Cost TrivialO(T 2D ) O(D) T : # different values along each dimension D : # dimensions 1 dimension One public key pair for each possible range - O(T 2 ) public key pairs - O(T 2 ) cipher texts and decryption keys for each range Performance of D dimensions

17Speaking Requirement Talk Roadmap Trivial construction AIBE – MRQED 1 –Efficient representation for ranges –1 dimensional scheme Extension to multiple dimensions

18Speaking Requirement Talk AIBE – MRQED 1 Try to decrease storage and computation cost Efficient representation of range: - Define Interval Tree tr(T) as a binary tree over [1, T], each node represents a range - ith leaf node: cv(ID) = i - non-leaf node: cv(ID) = cv(ID1) U cv(ID2) in which ID1 & ID2 are its children nodes

19Speaking Requirement Talk AIBE – MRQED 1 – cont’d Set of IDs covering a point x - if, ID covers x if. - Define P(x) to be the set such IDs. - P(x) includes all nodes on the path from leaf x to root. Range as a collection of IDs - Define (s, t) to be the minimum set of nodes that cover range [s, t].

20Speaking Requirement Talk AIBE – MRQED 1 – cont’d [0, 1] [2, 3] [4, 5] [6, 7] [0, 3] [4, 7] [0, 7] [1, 7]

21Speaking Requirement Talk AIBE – MRQED 1 : Encrypt C 0 =Encrypt(PK, ID A, msg) C 1 =Encrypt(PK, ID B, msg) C2C2 C3C3 A B

22Speaking Requirement Talk AIBE – MRQED 1 : Encrypt C0C0 C1C1 C2C2 C3C3 O(logT) ciphertext size

23Speaking Requirement Talk AIBE – MRQED 1 : DeriveKey [2, 6]

24Speaking Requirement Talk AIBE – MRQED 1 : DeriveKey [2, 6] [2, 3][4, 5] [6, 6]

25Speaking Requirement Talk AIBE – MRQED 1 : DeriveKey [2, 6] SK  SK  SK 

26Speaking Requirement Talk AIBE – MRQED 1 : DeriveKey [2, 6] SK  SK  SK  O(logT) decryption key size

27Speaking Requirement Talk AIBE – MRQED 1 : QueryDecrypt Observations: If x 2 [s, t], then | P(x) Å (s, t) | = 1 If x 2 [s, t], P(x) Å (s, t) = ;

28Speaking Requirement Talk AIBE – MRQED 1 : Decrypt C1C1 C2C2 C3C3 C0C0

29Speaking Requirement Talk AIBE – MRQED 1 : Decrypt [2, 6] C1C1 C2C2 C3C3 C0C0 SK  SK  SK 

30Speaking Requirement Talk AIBE – MRQED 1 : Decrypt C1C1 C2C2 C3C3 C0C0

31Speaking Requirement Talk AIBE – MRQED 1 : Decrypt [0, 3] C1C1 C2C2 C3C3 C0C0 SK 

32Speaking Requirement Talk AIBE – MRQED 1 : Decrypt [4, 7] C1C1 C2C2 C3C3 C0C0 SK 

33Speaking Requirement Talk AIBE – MRQED 1 : Performance SchemePK. sizeEnc. CostCT. SizeDK. SizeDec. Cost TrivialO(T 2D ) O(D) AIBE-MRQED 1 O(1)O(logT) T : # different values along each dimension D : # dimensions

34Speaking Requirement Talk AIBE – MRQED D – Encryption D = 2 dimensional example To encrypt point x = (3,5)

35Speaking Requirement Talk AIBE – MRQED D – DeriveKey Query range: [2,6] x [7,3] 1 st dimension: (2, 6) 2 nd dimension: (3,7)

36Speaking Requirement Talk AIBE – MRQED D Performance O(1) PK size O(D ¢ logT) –Encryption cost –Cipher Text. size –Decryption key size O((logT) D ) decrypt. cost Good performance, but has a serious vulnerability – prone to collusion attack

37Speaking Requirement Talk Collusion Attack K x1 K x2 SK y2 SK y1 {SK x1, SK y1 } {SK x2, SK y2 } R1R1 R2R2 R3R3 R4R4 {SK x1, SK y2 } {SK x2, SK y1 } How fix the problem but preserve the AIBE – MRQED D efficiency?

38Speaking Requirement Talk Collusion Attack solution - “Binding” SK x1 SK x2 SK y2 SK y1 {SK x1, SK y1 } {SK x2, SK y2 } {SK x1, SK y1 }  x ¢  y = c

39Speaking Requirement Talk Collusion Attack solution - “Binding” SK x1 SK x2 SK y2 SK y1 {SK x1, SK y1 } {SK x2, SK y2 }  x ¢  y = c  x 4 SK x1 {SK x1, SK y1 }

40Speaking Requirement Talk Collusion Attack solution - “Binding” SK x1 SK x2 SK y2 SK y1 {SK x1, SK y1 } {SK x2, SK y2 }  x ¢  y = c  x SK x1 {SK x1, SK y1 }

41Speaking Requirement Talk Collusion Attack solution - “Binding” SK x1 SK x2 SK y2 SK y1 {SK x1, SK y1 } {SK x2, SK y2 }  x ¢  y = c  x SK x1 {SK x1, SK y1 }  y SK y1

42Speaking Requirement Talk Collusion Attack solution - “Binding” SK x1 SK x2 SK y2 SK y1 {SK x1, SK y1 } {SK x2, SK y2 } x ¢ y = c {SK x2, SK y2 } x SK x2 y SK y2

43Speaking Requirement Talk The “Binding” Construction Use Bilinear Groups Rely on well-known difficult problem: –Decision BDH Assumption –Decision linear Assumption Algebraically intensive

44Speaking Requirement Talk Conclusion SchemePK. sizeEnc. CostCT. SizeDK. SizeDec. Cost TrivialO(T 2D ) O(D) BW06O(D ¢ T) O(D) RQEQ D O(D∙logT) O((logT) D ) T : # different values along each dimension D : # dimensions

45Speaking Requirement Talk Future work Further exploration of ways to decrease the decryption co Possible other privacy-preserving applications in addition to network audit logs, financial audit logs, etc.

46Speaking Requirement Talk Question Observations: If x 2 [s, t], then | P(x) Å (s, t) | = 1 If x 2 [s, t], P(x) Å (s, t) = ; Why is this always true?

Thank you!