Presenter: Nguyen Ba Anh HCMC University of Technology Information System Security Course.

Slides:



Advertisements
Similar presentations
Trusted Data Sharing over Untrusted Cloud Storage Provider Gansen Zhao, Chunming Rong, Jin Li, Feng Zhang, and Yong Tang Cloud Computing Technology and.
Advertisements

AUTHENTICATION AND KEY DISTRIBUTION
Key distribution and certification In the case of public key encryption model the authenticity of the public key of each partner in the communication must.
Data Integrity Proofs in Cloud Storage Sravan Kumar R, Ashutosh Saxena Communication Systems and Networks (COMSNETS), 2011 Third International Conference.
2 Your data is anywhere but not in your control Security breaches are recurrent – Weakest link: hardware, software, technicians, … You may trust the science.
Introduction Cloud characteristics Security and Privacy aspects Principal parties in the cloud Trust in the cloud 1. Trust-based privacy protection 2.Subjective.
Principles of Information Security, 2nd edition1 Cryptography.
 Guarantee that EK is safe  Yes because it is stored in and used by hw only  No because it can be obtained if someone has physical access but this can.
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
Dr. Sarbari Gupta Electrosoft Services Tel: (703) Security Characteristics of Cryptographic.
Dr Alejandra Flores-Mosri Message Authentication Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to:
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
Apr 4, 2003Mårten Trolin1 Previous lecture TLS details –Phases Handshake Securing messages –What the messages contain –Authentication.
YA-TRAP: Yet Another Trivial RFID Authentication Protocol Gene Tsudik International Conference on Pervasive Computing and Communications, PerCom 2006.
Key Management and Distribution. YSLInformation Security – Mutual Trust2 Major Issues Involved in Symmetric Key Distribution For symmetric encryption.
Hippocratic Databases Paper by Rakesh Agrawal, Jerry Kiernan, Ramakrishnan Srikant, Yirong Xu CS 681 Presented by Xi Hua March 1st,Spring05.
Copyright © 2015 Pearson Education, Inc. Confidentiality and Privacy Controls Chapter
A Survey of Mobile Phone Sensing Michael Ruffing CS 495.
D ATABASE S ECURITY Proposed by Abdulrahman Aldekhelallah University of Scranton – CS521 Spring2015.
Sinaia, Romania August, TH Workshop “Software Engineering Education and Reverse Engineering” Dhuratë Hyseni, Betim Çiço South East European University.
Preserving Privacy in Location-Based Services using Sudoku Structures A Presentation for ICISS-2014 IDRBT, Hyderabad Authors : Sumitra Biswal, Goutam Paul.
PKI in Higher Education: Dartmouth PKI Lab Update Internet2 Virtual Meeting 5 October 2001.
Introduction to the Mobile Security (MD)  Chaitanya Nettem  Rawad Habib  2015.
Overview of Privacy Preserving Techniques.  This is a high-level summary of the state-of-the-art privacy preserving techniques and research areas  Focus.
1 Anonymous Roaming Authentication Protocol with ID-based Signatures Lih-Chyau Wuu Chi-Hsiang Hung Department of Electronic Engineering National Yunlin.
DATA DYNAMICS AND PUBLIC VERIFIABILITY CHECKING WITHOUT THIRD PARTY AUDITOR GUIDED BY PROJECT MEMBERS: Ms. V.JAYANTHI M.E Assistant Professor V.KARTHIKEYAN.
SSL / TLS in ITDS Arun Vishwanathan 23 rd Dec 2003.
Solutions to Security and Privacy Issues in Mobile Social Networking
HPCC 2015, August , New York, USA Wei Chang c Joint work with Qin Liu a, Guojun Wang b, and Jie Wu c a. Hunan University, P. R. China b. Central.
General Key Management Guidance. Key Management Policy  Governs the lifecycle for the keying material  Hope to minimize additional required documentation.
Privacy risks of collaborative filtering Yuval Madar, June 2012 Based on a paper by J.A. Calandrino, A. Kilzer, A. Narayanan, E. W. Felten & V. Shmatikov.
Shiyuan Wang, Divyakant Agrawal, Amr El Abbadi Department of Computer Science UC Santa Barbara DBSec 2010.
Network Security Lecture 9 Presented by: Dr. Munam Ali Shah.
7-Oct-15 Threat on personal data Let the user be aware Privacy and protection.
@Yuan Xue CS 285 Network Security Fall 2008.
Privacy-Aware Personalization for Mobile Advertising
Cryptography, Authentication and Digital Signatures
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Session ID: Session Classification: Dr. Michael Willett OASIS and WillettWorks DSP-R35A General Interest OASIS Privacy Management Reference Model (PMRM)
1 Anonymous Trust: Digital Rights Management Using Broadcast Encryption Proceedings of the IEEE, Vol. 92, No. 6, June 2004.
10. Key Management. Contents Key Management  Public-key distribution  Secret-key distribution via public-key cryptography.
Hiding in the Mobile Crowd: Location Privacy through Collaboration.
Privacy in computing Material/text on the slides from Chapter 10 Textbook: Pfleeger.
Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Relational Data.
Survey on Privacy-Related Technologies Presented by Richard Lin Zhou.
Database Security and Data Protection Suseel Pachalla, CISSP.
ACOMP 2011 A Novel Framework for LBS Privacy Preservation in Dynamic Context Environment.
Summary of Distributed Computing Security Yifeng Zou Georgia State University
Presented by: Sanketh Beerabbi University of Central Florida.
Enforcing Cyber security in Mobile Applications – Public Sector Use Case SAPHINA MCHOME, VIOLA RUKIZA TANZANIA REVENUE AUTHORITY INFORMATION AND COMMUNICATION.
P2: Privacy-Preserving Communication and Precise Reward Architecture for V2G Networks in Smart Grid P2: Privacy-Preserving Communication and Precise Reward.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
Lecture 13: Anonymity on the Web Modified from Levente Buttyan, Michael K. Reiter and Aviel D. Rubin.
Secure Messenger Protocol using AES (Rijndael) Sang won, Lee
Location Privacy Protection for Location-based Services CS587x Lecture Department of Computer Science Iowa State University.
Personal Privacy: Limited Disclosure using Cryptographic Techniques Mark Shaneck Karthikeyan Mahadevan SCLab.
Key Management and Distribution Anand Seetharam CST 312.
Introduction Web analysis includes the study of users’ behavior on the web Traffic analysis – Usage analysis Behavior at particular website or across.
Efficient Opportunistic Sensing using Mobile Collaborative Platform MOSDEN.
Secure Instant Messenger in Android Name: Shamik Roy Chowdhury.
@Yuan Xue CS 285 Network Security Fall 2013 Yuan Xue.
@Yuan Xue CS 285 Network Security Fall 2012 Yuan Xue.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Personalized Ontology for Web Search Personalization S. Sendhilkumar, T.V. Geetha Anna University, Chennai India 1st ACM Bangalore annual Compute conference,
Principles Identified - UK DfT -
Professor Tzong-Chen Wu
Hybrid Cloud Architecture for Software-as-a-Service Provider to Achieve Higher Privacy and Decrease Securiity Concerns about Cloud Computing P. Reinhold.
ONLINE SECURE DATA SERVICE
IoT: Privacy and Security
Presentation transcript:

Presenter: Nguyen Ba Anh HCMC University of Technology Information System Security Course

1. Location-based service concepts 2. Preserving Privacy in Location-based Mobile Social Applications 2.1. Introduction 2.2. Motivating applications 2.3. Goals, system and threat model 2.4. Building blocks and their usage 2.5. Privacy analysis and tradeoffs

3. Privacy-Preserving Techniques for Location- based Services 3.1. Problems 3.2. Two main approach 3.3. PROBE (Privacy-preserving Obfuscation Environment) 3.4. Private information retrieval (PIR) techniques 3.5. Privacy in some kind of LBS 4. Conclusion

 A general class of computer program- level services used to include specific controls for location and time data as control features in computer programs (Wikipedia)

 Users  Usages

◦ Wide-spread adoption (tremendous penetration) ◦ Empower users with knowledge of their vicinity ◦ Numerous untrusted servers offering different services ◦ Proposed design: simple encrypted data store & move the application functionality to client smartphones.

◦ Collaborative Content Downloading ◦ Social Recommendations ◦ Local Businesses ◦ Locations-Based Reminders ◦ Friend Locator

 System model: ◦ iPhone 3G comes with a 412MHz processor and 512MB of RAM ◦ Smartphones decrypt and consume friends’ data, the server stores users’ data, backs them up, and serve data to users

 Threat model: ◦ third-party storage server is untrusted ◦ user privacy lost even when the data stored on the server is leaked to an attacker

 Friendship Proof: ◦ a cryptographic attestation A -> B using symmetric key ◦ Users stores all their proofs from their friends ◦ Communicate via a wireless interface and exchange using a cryptographically secure handshake

 Transaction Proof: ◦ cryptographically attests that a piece of information belongs to a user ◦ Include message for friends (current location, opinion, something helpful) ◦ message is application-dependent, encrypted with the user’s session key when it is stored on the storage server

 Interfaces Exposed by the Storage Server

 Server Interface Privacy and Tradeoffs ◦ Only the friend users with appropriate keys can decrypt the data ◦ improve the performance by tagging each proof stored via a putLocationInfo call with an Id (or public key) of the user that generated the proof ◦ achieve both performance and privacy in this call is to tag the proofs with an userId that changes periodically in a known pattern (known only to friends)

 Impact of Several Potential Attacks ◦ A compromised client can leak the location privacy of all her friends ◦ Compromised Third-party Storage Server (Stronger Threat Model) ◦ DoS Attacks on the Server

 Location information is critical for providing customized services, on the other hand, can lead to privacy breaches  attacker may infer sensitive information about the individual by cross-referencing location information about an individual with other information and by exploiting domain knowledge

 Location obfuscation

 k-anonymization

 Based on key elements  The 1 st element: sensitive entities and unreachable entities  The 2 nd element: personal profile  The 3 rd element: probabilistic privacy model  preferences are recorded in the individual personal profile

 does not require intermediate parties to generate cloaked regions nor the presence of other individuals to achieve anonymity  may be quite expensive

Privacy in Location-aware LBS Privacy principles Purpose specification User consent Limited collection Limited use Limited disclosure Limited retention Accuracy and context preservation OpennessCompliance

Privacy in Location-aware LBS

Privacy in Real-time LBS

Privacy and Location Anonymization in LBS

 LBS present an important parts in the development of human  Customers, regulators and legislators all have an interest in privacy  Privacy can and should be designed into systems by minimizing personal data collection, storage