Cryptography In Censorship Resistant Web Publishing Systems By Hema Hariharan Swati B Shah.

Slides:



Advertisements
Similar presentations
Kerberos 1 Public domain image of Heracles and Cerberus. From an Attic bilingual amphora, 530–520 BC. From Italy (?).
Advertisements

HiveMind Distributed File Storage Using JavaScript Botnets Copyright 2013 Sean T. Malone.
Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
Building web applications on top of encrypted data using Mylar Presented by Tenglu Liang Tai Liu.
1 Computer Networks: A Systems Approach, 5e Larry L. Peterson and Bruce S. Davie Chapter 8 Network Security Copyright © 2010, Elsevier Inc. All rights.
Publius A Robust, Tamper Evident, Censorship Resistant WWW Based Publishing System Marc Waldman NYU – CS Dept. Lorrie Cranor AT&T Research Aviel Rubin.
Lorrie Cranor AT&T Labs Avi Rubin AT&T Labs Marc Waldman
Publius: A robust, tamper-evident, censorship-resistant web publishing system By Waldman, Rubin, and Cranor Presented by Marco Barreno October 8th, 2003.
Michelle J. Gosselin, Jennifer Schommer Guanzhong Wang.
1 MD5 Cracking One way hash. Used in online passwords and file verification.
Public Key Infrastructure (PKI) Providing secure communications and authentication over an open network.
Chapter 1 – Introduction
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
Security Overview Hofstra University University College for Continuing Education - Advanced Java Programming Lecturer: Engin Yalt May 24, 2006.
Security Chapters 14,15. The Security Environment Threats Security goals and threats.
Online Security Tuesday April 8, 2003 Maxence Crossley.
Computers and Society Carnegie Mellon University Spring 2006 Cranor/Tongia/Farber 1 Regulating Online Speech.
Mar 4, 2003Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities.
CMSC 414 Computer and Network Security Lecture 16 Jonathan Katz.
Privacy Policy, Law and Technology Carnegie Mellon University Fall 2007 Lorrie Cranor 1 Identity, Anonymity,
70-270, MCSE/MCSA Guide to Installing and Managing Microsoft Windows XP Professional and Windows Server 2003 Chapter Nine Managing File System Access.
Cryptography and Network Security Chapter 1. Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming,
Building an Encrypted and Searchable Audit Log 11th Annual Network and Distributed Security Symposium (NDSS '04); 2004 February 5-6; San Diego; CA. Presented.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
Cookies COEN 351 E-commerce Security. Client / Session Identification HTTP does not maintain state. State Information can be passed using: HTTP Headers.
Operating System & Application Files BACS 371 Computer Forensics.
OS and Application Files BACS 371 Computer Forensics.
Computer Security Tran, Van Hoai Department of Systems & Networking Faculty of Computer Science & Engineering HCMC University of Technology.
.Net Security and Performance -has security slowed down the application By Krishnan Ganesh Madras.
Cryptography and Network Security
1 Chapter 9 E- Security. Main security risks 2 (a) Transaction or credit card details stolen in transit. (b) Customer’s credit card details stolen from.
15 Maintaining a Web Site Section 15.1 Identify Webmastering tasks Identify Web server maintenance techniques Describe the importance of backups Section.
Privacy Policy, Law and Technology Carnegie Mellon University Fall 2004 Lorrie Cranor 1 Anonymity and Privacy Enhancing.
JavaScript, Fourth Edition
RSA Implementation. What is Encryption ? Encryption is the transformation of data into a form that is as close to impossible as possible to read without.
SEC835 Practical aspects of security implementation Part 1.
Chapter 8 Safeguarding the Internet. Firewalls Firewalls: hardware & software that are built using routers, servers and other software A point between.
Systems Analysis and Design in a Changing World, 6th Edition 1 Chapter 12 - Databases, Controls, and Security.
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Chapter 8 Cookies And Security JavaScript, Third Edition.
Secure Distributed Document Sharing System Dukyun Nam, Seunghyun Han, CDS&N Lab. ICU.
PGP ENCRYPTION Prepared by Noel Kigaraba. Introduction This presentation explains the basic information about PGP encryption software. It discusses the.
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
10. Key Management. Contents Key Management  Public-key distribution  Secret-key distribution via public-key cryptography.
Evoting using collaborative clustering Justin Gray Osama Khaleel Joey LaConte Frank Watson.
Cryptography and Network Security (CS435) Part One (Introduction)
Public Key Encryption.
Security Digital Cash Onno W. Purbo
CS 4244: Internet Programming Security 1.0. Introduction Client identification and cookies Basic Authentication Digest Authentication Secure HTTP.
Freenet “…an adaptive peer-to-peer network application that permits the publication, replication, and retrieval of data while protecting the anonymity.
Your friend, Bluestem. What is Bluestem? “Bluestem is a software system which enables one or more high-security SSL HTTP servers in a domain (entrusted.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Windows 2000 Security Yingzi Jin. Introduction n Active Directory n Group Policy n Encrypting File System.
Private key
Configuring, Managing and Maintaining Windows Server® 2008 Servers Course 6419A.
Website Design:. Once you have created a website on your hard drive you need to get it up on to the Web. This is called "uploading“ or “publishing” or.
Freenet: Anonymous Storage and Retrieval of Information
Implementing Secure IRC App with Elgamal By Hyungki Choi ID : Date :
Cryptography and Network Security Chapter 1. Background  Information Security requirements have changed in recent times  traditionally provided by physical.
Network Security Celia Li Computer Science and Engineering York University.
9.2 SECURE CHANNELS JEJI RAMCHAND VEDULLAPALLI. Content Introduction Authentication Message Integrity and Confidentiality Secure Group Communications.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
Security Issues in Information Technology
Key management issues in PGP
World Wide Web policy.
Ad-blocker circumvention System
NETWORK SECURITY Cryptography By: Abdulmalik Kohaji.
File Transfer Protocol
ONLINE SECURE DATA SERVICE
Operating Systems Concepts
Presentation transcript:

Cryptography In Censorship Resistant Web Publishing Systems By Hema Hariharan Swati B Shah

Outline  Publisher Retriever Relationship  What is a publisher friendly Web publishing system?  How to remain Anonymous?  How to be Censorship Resistant  The trick to Tamper Resistance  Present Technology  Case study :Publius  Q & A

Publisher Retriever Relationship  Publisher and the Retriever  Security issues Retriever Protection Hackers,Virus etc Publisher Protection Protecting his documents from being tampered Protecting his freedom of speech

What is publisher friendly Web publishing system?  Source Anonymous  Censorship resistant  Tamper evedent  Content Unknown  Updateable  Fault tolerant

How to remain Anonymous?  URL rewriting service  Anonymous URL generation  URL “U”  Encrypted URL E k (U) using public key k  New URL  Retreving content using an Anonymous URL  Given URL k (uhttp:// k (u)  Decrypted using private key corresponding to k  Content retrieved form URL “U”  Rewriting Service Provider Network

How to be Censorship resistant?  Replication  Distributed servers all around the world.  Diversity of ownership of the servers  A simple example  A file hosted on to 100 servers of which 10 names are retained and the rest destroyed.

The trick to Tamper Resistance  Mixnets method  Store file in Remote servers  Each remote server encrypts with public key and send it to the file servers under its control  Search at random at some remote security servers to retrieve from the corresponding file servers  Disadvantages  Chances of not finding the file  Deletion impossible  Expiry date set during publishing

The trick to Tamper Resistance  Encrypt and Distribute Document  Encrypt,Divide and Distribute Key  Access to the document based on the number of shares of the key the user has access to.  Updation  Deletion

The Current Technology  The Eternity Service  Distributed network  Replication  Mix nets  Persistent storage till a specified expiration date  Publius  Distributed network  Replication  Key sharing technique  Dragster  No replication

Case Study :PUBLIUS  Three Components Publishers Retrievers Servers - a static list of m servers  Operations Publish Retrieve Update Delete

Publish Operation  Encrypt file F with Symmetric key K  Split K into N parts using Shamir’s Secret sharing scheme - (P,N) Threshold Scheme  Compute names for all N parts:  name i = wrap(H(F. part i ))  Compute locations for each part  location i = (name i MOD m) + 1  Publish encrypted file and one part of K to each of these locations, save under directory name i on the server

Publish Operation (Contd.)

Retrieve Operation Retriever must have the URL U of the intended file Parse the name values from U and compute locations of the Servers hosting the file Select P of these arbitrarily Retrieve the encrypted file and P parts of key K Reconstruct K, and retrieve the file Perform temper-check

Delete Operation  Generate a password PW while publishing  To delete, send H(server domain name.PW) to each hosting server  Each server performs authentication, then deletes the file  A file can be published as Undeletable

Update Operation  Updates file without changing its URL  Specify new file, original URL, old PW and new PW to each hosting server  Server first publishes the new file by calling Publius Publish operation, and gets new URL  Performs authentication  Puts the new URL in a directory called update under the corresponding name i  A file can be published as nonupdatable

Implementation Issues  Publius URL  1 ) … encode(name n ) Option field has: Version number Number of parts needed to reconstruct the key Size of the server list Update flag  Server Software  Client Software

Goals Achieved! Censorship Resistant Tamper Evident Content Anonymous Source Anonymous Fault tolerant Persistent Updateable Extensible Freely Available

Limitation of Publius  Supports only static contents  Key-parts/file deletion or corruption  Vulnerable to Redirection Attack  Vulnerable to Denial of Service Attack  Threats to Publisher Anonymity

Pros and Cons  Prevents denial of service attacks  A persistent backup system  Protects privacy and human rights  Child pornography  Pirated songs and software  Violating Copyrights  Illegal material

Publius Website: Thank You! Any Questions?