Engineering privacy-friendly computations Dr George Danezis University College London.

Slides:



Advertisements
Similar presentations
I have a DREAM! (DiffeRentially privatE smArt Metering) Gergely Acs and Claude Castelluccia {gergely.acs, INRIA 2011.
Advertisements

Last Class: The Problem BobAlice Eve Private Message Eavesdropping.
CS470, A.SelcukCryptographic Authentication1 Cryptographic Authentication Protocols CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
Efficient Zero-Knowledge Proof Systems Jens Groth University College London.
Daisuke Mashima and Arnab Roy Fujitsu Laboratories of America, Inc. Privacy Preserving Disclosure of Authenticated Energy Usage Data.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
 Introduction  Benefits of VANET  Different types of attacks and threats  Requirements and challenges  Security Architecture  Vehicular PKI.
Claudia Diaz, Hannelore Dekeyser, Markulf Kohlweiss, Girma Nigusse K.U.Leuven IDIS Workshop 29/05/2008 [Work done in the context of the ADAPID project]
Digital Signatures and Hash Functions. Digital Signatures.
Lect. 18: Cryptographic Protocols. 2 1.Cryptographic Protocols 2.Special Signatures 3.Secret Sharing and Threshold Cryptography 4.Zero-knowledge Proofs.
Gaurav Lahoti University of Illinois at Urbana-Champaign, IL, USA Daisuke Mashima Wei-Peng Chen Fujitsu Laboratories of America Inc., USA Customer-centric.
A Practical Smart Metering System Supporting Privacy Preserving Billing and Load Monitoring Hsiao-Ying Lin National Chiao Tung University Joint work with.
15-1 Last time Internet Application Security and Privacy Public-key encryption Integrity.
Using Cryptographic ICs For Security and Product Management Misconceptions about security Network and system security Key Management The Business of Security.
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
CMSC 414 Computer and Network Security Lecture 2 Jonathan Katz.
Privacy-Preserving Smart Metering
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 7 Wenbing Zhao Department of Electrical and Computer Engineering.
CMSC 414 Computer and Network Security Lecture 19 Jonathan Katz.
EEC 688/788 Secure and Dependable Computing Lecture 7 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
K.U.Leuven George Danezis 1 and Alfredo Rial 1,2 Privacy-Preserving Smart Metering 1 Microsoft Research Cambridge 2 KULeuven ESAT/SCD/COSIC – IBBT, Belgium.
Security in Databases. 2 Outline review of databases reliability & integrity protection of sensitive data protection against inference multi-level security.
K-Anonymous Message Transmission Luis von Ahn Andrew Bortz Nick Hopper The Aladdin Center Carnegie Mellon University.
Privacy-Preserving Data Aggregation in Smart Metering Systems Mi Wen Shanghai University of Electric Power 8/8/2015 Zekeriya Erkin,
D ATABASE S ECURITY Proposed by Abdulrahman Aldekhelallah University of Scranton – CS521 Spring2015.
Practical Techniques for Searches on Encrypted Data Yongdae Kim Written by Song, Wagner, Perrig.
Cong Wang1, Qian Wang1, Kui Ren1 and Wenjing Lou2
Secure Localization Algorithms for Wireless Sensor Networks proposed by A. Boukerche, H. Oliveira, E. Nakamura, and A. Loureiro (2008) Maria Berenice Carrasco.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
K.U.Leuven George Danezis 1, Markulf Kohlweiss 1, Ben Livshits 1, and Alfredo Rial 2 Private Client-Side Profiling with Random Forests and Hidden Markov.
Network Security. Cryptography Cryptography functions Secret key (e.g., DES) Public key (e.g., RSA) Message digest (e.g., MD5) Security services Privacy:
Smart Grid Security Challenges Ahmad Alqasim 1. Agenda Problem Statement Power system vs. smart grid Background Information Focus Point Privacy Attack.
Csci5233 Computer Security1 Bishop: Chapter 10 (Cont.) Key Management: Storage & Revoking.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
ZQL ZQL a cryptographic compiler for processing private data George Danezis Cédric Fournet Markulf Kohlweiss Zhengqin Luo & Alfredo Rial CraigMu’s review,
The Cryptographic Sensor FTO Libor Dostálek, Václav Novák.
Smart Metering and the Smart Grid How does it work and what can it do? Will Chaney 1Energy Awareness Week, 3-8 May 2010.
COEN 351 E-Commerce Security Essentials of Cryptography.
Cryptography, Authentication and Digital Signatures
Cryptography and Network Security (CS435) Part Eight (Key Management)
JEMMA: an open platform for a connected Smart Grid Gateway GRUPPO TELECOM ITALIA MAS2TERING Smart Grid Workshop Brussels, September Strategy &
Presented by: Sanketh Beerabbi University of Central Florida.
Chapter 3 (B) – Key Management; Other Public Key Cryptosystems.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
Encryption No. 1  Seattle Pacific University Encryption: Protecting Your Data While in Transit Kevin Bolding Electrical Engineering Seattle Pacific University.
WISTP’08 ©LAM /05/2008 A Self-Certified and Sybil-Free Framework for Secure Digital Identity Domain Buildup Christer Andersson Markulf Kohlweiss.
Merkle trees Introduced by Ralph Merkle, 1979 An authentication scheme
Lecture 2: Introduction to Cryptography
Encryption. Introduction The incredible growth of the Internet has excited businesses and consumers alike with its promise of changing the way we live.
Identification Authentication. 2 Authentication Allows an entity (a user or a system) to prove its identity to another entity Typically, the entity whose.
COEN 351 E-Commerce Security
Privacy Issues in Smart Grid R. Newman. Topics Defining anonymity Need for anonymity Defining privacy Threats to anonymity and privacy Mechanisms to provide.
1 Diffie-Hellman (Key Exchange) Protocol Rocky K. C. Chang 9 February 2007.
1 Diffie-Hellman (Key Exchange) Protocol Rocky K. C. Chang 9 February 2007.
 5.1 Zero-Knowledge Proofs  5.2 Zero-Knowledge Proofs of Identity  5.3 Identity-Based Public-Key Cryptography  5.4 Oblivious Transfer  5.5 Oblivious.
Engineering privacy-friendly computations George Danezis University College London.
Database Laboratory Regular Seminar TaeHoon Kim Article.
SECURITY. Security Threats, Policies, and Mechanisms There are four types of security threats to consider 1. Interception 2 Interruption 3. Modification.
Security of the Internet of Things: perspectives and challenges
Daisuke Mashima Fujitsu Laboratories of America, Inc. Sunnyvale, CA Copyright 2015 Fujitsu Laboratories of America Authenticated Down-sampling for Privacy-preserving.
Customer-centric Energy Usage Data Management for Balancing Tradeoff of Benefit and Privacy Daisuke Mashima, Ph.D. Fujitsu Laboratories of America (Sunnyvale,
Cryptographic Hash Function. A hash function H accepts a variable-length block of data as input and produces a fixed-size hash value h = H(M). The principal.
The Fallacy Behind “There’s Nothing to Hide” Why End-to-End Encryption Is a Must in Today’s World.
Multimedia Content Identification Through Smart
Cryptographic Hash Function
January 15th Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Security protocol for Body area networks]
Published in: IEEE Transactions on Industrial Informatics
Smart Meter Data Privacy: A Survey
ELEC-E Smart Grid Smart Meters and Security Issues
Presentation transcript:

Engineering privacy-friendly computations Dr George Danezis University College London.

What is cryptography good for? Alice and Bob love each other … The secure channel: a great success story for cryptography. Except: deployed instances (TLS, IPSec, …) are brittle. Limits the imagination of the public and decision makers. Does not solve the whole “privacy” problem. They can use TLS, IPSec, OTR, Tor to talk authentically and in secret. No one will know what we are really talking about!

Alice and Bob do not trust each other The contemporary “privacy problem”: Users, customers, citizens are asked to … … share personal information… … with entities they would not trust to keep their secrets. Cannot be solved with a secure channel. … or signatures. Alice’s HomeBob Energy Ltd. I am not sure what else you are going to do with this information. I need your half-hourly smart meter readings to calculate the correct bill.

A Smart electricity meter in every EU home by 2020 … Current operation uses estimates. Smart Metering: Record ½ hour readings and transmit them through a WAN. Application: time-of-use bills, profiling. Application: timely statistics, fraud detection. Alice’s Home Bob Energy Ltd. Distributor The UK Grid Energy Producer e e e Data Contracts, $$$ DCC $$$

Are granular smart meter readings sensitive? Depending on the granularity: Number of persons in the home. Times when home empty. Devices and appliances used. Patterns of sleep. Measures of wealth. Mental and physical health. Data protection authorities recognize them as personal data. Commercial advantage

What can you learn from electricity? (I) Popular culture: Cannabis farms. Germany 1970s. Police used records of low energy consumption and cash based payment to find the safe-house of Rolf Heissler, a member of the Red Army Faction [5]. At the time this practice was ruled illegal. Hart [26]: disaggregating appliances from consumption data: First, a training phase and then an actual working phase. The training phase learns the electricity profile of different appliances, either by manually or automatically turning them on and off. The training can also be augmented or replaced by a database of known appliance signatures. Enev et al. [20] analyse electro-magnetic interference (EMI) of television sets on the power line and how it varies with the content displayed. They show that movies can be identified from EMI traces of 1200 known movies with up to 92% accuracy for some sets.

What can you learn from electricity? (II) Greveler et al. [24] also describe an approach to identify displayed TV channels. They use the 0.5 hz smart meter measurements to create a prediction function that predicts the energy consumption of a dynamic back lighting LCD depending on the brightness of displayed content. Clark et al. [54] employ direct load monitoring at a computer with a sampling frequency of 1khz to identify which website, out of a pool of 8 popular websites, the computer is downloading and rendering. Lisovich et al. [40] predict inhabitants behaviour directly from smart metering data. They construct a sample disclosure metric that divides their behavior deductions into categories like presence, sleep schedule and others.

Is there an alternative to sharing data? The subject of the rest of this talk! No. We do not “need” to share readings to: compute time-of-use bills (or more). extract aggregate statistics.

A non-cryptographic privacy solution: Compute in the Smart Meter Sensitive readings never leave the meter. Assurance: tamper proof meter (same as for integrity of readings). auditing outputs for privacy. Limitations: What about other parties? What about other computations? Aggregates? Avoid mobile code, and generic interpreters. Smart meters: they are not very powerful. Carmela Troncoso, George Danezis, Eleni Kosta, Josep Balasch, Bart Preneel: PriPAYD: Privacy-Friendly Pay-As-You-Drive Insurance. IEEE Trans. Dependable Sec. Comput. 8(5): (2011) Alice’s Home Bob Energy Ltd. Time-of-use tariffs Monthly bill

Computational integrity: User centric private computation Intuition: Sensors are small, simple devices – no computation! Users own a number of other computers. Sensors record authoritative readings, computers compute, and send results to relying parties. Cryptography enables this! George Danezis, Benjamin Livshits: Towards ensuring client-side computational integrity. CCSW 2011: Sensor User Device Relying Service Readings Computation Results Enc + Commit + Sig Sig ZK Proof Straight line code

Smart metering & private billing Note: No need for anonymity. Readings encoded to allow for efficient proofs! User control? Alfredo Rial, George Danezis: Privacy-preserving smart metering. WPES 2011: Bob Energy Ltd. Alice’s Home User Device Key DCC Other Service Ltd. Encrypted Readings Query (Bill) Response & ZK Proof Query (Other) Response & ZK Proof

Simple Meters Size considerations: bytes for each reading. 2 hashes + signature per batch of readings. Fits in the standard DLMS format. No need to transmit commitments. Computation efficiency: 2 PRF + 2 HASH + E Can pre-compute most of the commitment + 32 mod-mult. We can retrofit 8-bit microcontrollers to run it within the allowed time. Straight-line code, easier to verify. Aizatulin, Gordon and Jürjens 2011 Andres Molina-Markham, George Danezis, Kevin Fu, Prashant J. Shenoy, David E. Irwin: Designing Privacy-Preserving Smart Meters with Low-Cost Microcontrollers. Financial Cryptography 2012: Time - t i :4 Reading - r i :4 K – Master Key K i = PRF 1 (K; t i ) o i = PRF 2 (K; t i ) C i = g ri h oi Er i = E(K i ; Er i ) H i = HASH(C i | H i-1 ) G i = HASH(t i | r i | G i-1 ) Key derivation Commit & Encrypt Prepare Signature (t 0,Er 0 ) … (t i,Er i ), sig(H i, G i )

Complex Computations How complex can billing be? Simple: weighted sum of tariffs and readings – UK’s bills in 12 days / 1 core. Non-linear: tariff may change after a certain threshold. Arbitrary: e.g. map each amount to an arbitrary bill. In general full zero-knowledge proofs of knowledge are required. Key trick: how to prove a look-up in ZK? Use re-randomizable signatures (CL). (10Hz-100Hz) The power of Zero-knowledge lookups: Prove that a substring is in a regular language in ZK. Prove the classification result of a random forest classifier. Important for generic user centric computations. The future: Pinocchio George Danezis, Markulf Kohlweiss, Benjamin Livshits, Alfredo Rial: Private Client-Side Profiling with Random Forests and Hidden Markov Models. Privacy Enhancing Technologies 2012: CLSig(k 1, v 1 ) … CLSig(k n, v n ) CLSig(k 1, v i ) & Proof k 1, v i are in commitments.

Results leak information George Danezis, Markulf Kohlweiss, Alfredo Rial: Differentially Private Billing with Rebates. Information Hiding 2011: Noisy bills? I do not want to pay more!

How to express computations? Fact: Engineers cannot write ZK proofs. ZQL: a language to express simple data processing. No mention of cryptography. Type annotations to denote public variables. All other variables are private. Basic types and operators: integers tables Arithmetic Lookups Compile to: code + prover. Code + verification. Cédric Fournet, Markulf Kohlweiss, George Danezis, and Zhengqin Luo. ZQL: a compiler for privacy-preserving data processing. In Proceedings of the 13th conference on USENIX Security Symposium, vol. 13, pp

Limitations of user centric computations What if we want to compute on multiple users’ data? Privacy-friendly aggregates: e.g. simple sums Day to day running of the grid: planning capacity for the next hours. Distributors’ network planning: ensuring peak capacity is sufficient. Settlement process: do the contracts of a supplier cover customer base consumption? Theft detection: Is the sum of readings same as the aggregate meter? r1r1 r2r2 r3r3 R r 1 + r 2 + r 3 ≈ R ?

Secret sharing based aggregation Two phases: Group formation. Reading Encryption. Group formation: Key exchange Managed. Done once. Reading Encryption: 4 byte ciphertext. Only PRF used. Compatible with previous scheme! Klaus Kursawe, George Danezis, Markulf Kohlweiss: Privacy-Friendly Aggregation for the Smart-Grid. PETS 2011: x1x1 x2x2 x3x3 Group Manager Cert{g x1, M 1 } Cert{g x2, M 2 } Cert{g x3, M 3 } K ij = g xixj K 12, K 13 K 12, K 23 K 13, K 23 Group formation Reading encryption Note that:

Deployment and limitations ENCS is deploying the privacy-friendly aggregation protocols in a large test bed in the Netherlands. With Aliander (DSO) and Elster (Smart meters) Standardization effort. Limitations: The size of the group is limited. The more members the more storage for keys and computation to encrypt. If a single meter in the group fails the aggregate is not available. The groups are fixed – not so flexible. Only simple sums are possible. Benessa Defend and Klaus Kursawe. Implementation of Privacy Friendly Aggregation for the Smart Grid. SEGS 2013.

Authority based aggregation Require: a number of authorities – one of them honest. Meters: exactly the same functionality (by design). Authorities: “unlock” result in a 1-round protocol with DCC. Meter oblivious to further computations. Any weighted sum can be extracted: failing meters can be ignored. Differential Privacy through addition of noise (n). Simple linear time-of-use billing protocol. Machine checked formal proof in easycrypt. Gilles Barthe, George Danezis, Benjamin Grégoire, César Kunz, Santiago Zanella Béguelin: Verified Computational Differential Privacy with Applications to Smart Metering. CSF 2013: xixi K i2, K i3 DCC y1y1 y2y2 K i1 K i2

The need for differential privacy Simple aggregation protocol: fixed groups = fixed computations / time. Flexible aggregation protocol: Arbitrary linear sums of secrets. Attack: n-queries can extract n exact secrets. Solution: Distributed differentially private mechanism. Each authority adds some noise. Downside: inaccurate results. Option: some regulated computations are not noised. Option: auditing model. Any mechanisms that allows weighted sums will need this!

Non-linear computations Aggregation protocol: linear secret sharing based computation. Non-linear computations: Use computations (mod p) Same trick to only require 1 share per reading. Authorities & DCC use SPDZ-like secret sharing computation. V1V1 V2V2 ? V 2 – V 1 > T George Danezis, Cedric Fournet, Markulf Kohlweiss and Santiago Zanella-Beguelin. Smart Meter Aggregation via Secret- Sharing. ACM SEGS 2013: Smart Energy Grid Security Workshop, Berlin, Line theft detection use-case

Key question: Whom to trust? User devices, meters, authorities User devices may be insecure. User devices may not always be available. The user may not have any devices. Meters are simple and insecure. Meters are under the control of suppliers (or others). Who knows what code, update run on a meter. What are the incentives to run an authority. What about them coming under compulsion to reveal keys. Worse for non-linear operations. One thing is sure: Just giving the data to the supplier is the worse privacy option.

Key question: Which properties? Privacy, Integrity, public verifiability Current situation: no privacy. Integrity relies on meter and correctness of back end code. Ultimate integrity check: meters store 13 months of readings. Controversial: do we need integrity for the aggregation protocols? Against malicious authorities? Verifiability for billing: currently pretty much none. In itself an advantage of the privacy friendly solutions.

Key question: What is stopping deployment? Theory is cool: Zero-knowledge and secret sharing. Cost to implement protocols makes them prohibitive. Cost = architecture changes & salaries of cryptographers. Generic protocols both a blessing and a curse Can do “anything”. Which means that it is hard to make them do “something”. Not integrated in development tools, frameworks and libraries. The industry is still trying to transit to public key cryptography or elliptic curves. Anything that is not security channels or certificates is not on the map. New IT industries do not employ any cryptographers. Oh, and every law enforcement agency is happy enough to not see more privacy. Data protection and consumer protection authorities do not employ cryptographers.

All references Alfredo Rial, George Danezis: Privacy-preserving smart metering. WPES 2011: Klaus Kursawe, George Danezis, Markulf Kohlweiss: Privacy-Friendly Aggregation for the Smart-Grid. PETS 2011: George Danezis, Markulf Kohlweiss, Alfredo Rial: Differentially Private Billing with Rebates. Information Hiding 2011: George Danezis, Benjamin Livshits: Towards ensuring client-side computational integrity. CCSW 2011: Andres Molina-Markham, George Danezis, Kevin Fu, Prashant J. Shenoy, David E. Irwin: Designing Privacy-Preserving Smart Meters with Low-Cost Microcontrollers. Financial Cryptography 2012: Gilles Barthe, George Danezis, Benjamin Grégoire, César Kunz, Santiago Zanella Béguelin: Verified Computational Differential Privacy with Applications to Smart Metering. CSF 2013: George Danezis, Cedric Fournet, Markulf Kohlweiss and Santiago Zanella-Beguelin. Smart Meter Aggregation via Secret-Sharing. ACM SEGS 2013: Smart Energy Grid Security Workshop, Berlin, Carmela Troncoso, George Danezis, Eleni Kosta, Josep Balasch, Bart Preneel: PriPAYD: Privacy- Friendly Pay-As-You-Drive Insurance. IEEE Trans. Dependable Sec. Comput. 8(5): (2011) George Danezis, Markulf Kohlweiss, Benjamin Livshits, Alfredo Rial: Private Client-Side Profiling with Random Forests and Hidden Markov Models. Privacy Enhancing Technologies 2012: 18-37

Technology does not have to result in loss of privacy … Engineering is all about options.