KYUSHUUNIVERSITYKYUSHUUNIVERSITY SAKURAILABORATORYSAKURAILABORATORY 1 Introduction of Sakurai Lab. Kyushu Univ. JAPAN.

Slides:



Advertisements
Similar presentations
TCC 2006 Research on Password-Authenticated Group Key Exchange Jeong Ok Kwon, Ik Rae Jeong, and Dong Hoon Lee (CIST, Korea Univ.) Kouchi Sakurai (Kyushu.
Advertisements

Chapter 10 Encryption: A Matter of Trust. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic Algorithm.
E W H A W U New Nominative Proxy Signature Scheme for Mobile Communication April Seo, Seung-Hyun Dept. of Computer Science and.
Message Integrity in Wireless Senor Networks CSCI 5235 Instructor: Dr. T. Andrew Yang Presented by: Steven Turner Abstract.
CSE300-1 Profs. Steven A. Demurjian Q. Jin, J. Nam, Z. Qian and C. Phillips Computer Science & Engineering Department 191 Auditorium Road, Box U-155 The.
An Improvement on Privacy and Authentication in GSM Young Jae Choi, Soon Ja Kim Computer Networks Lab. School of Electrical Engineering and Computer Science,
Secure Systems Research Group - FAU Process Standards (and Process Improvement)
CS470, A.SelcukSSL/TLS & SET1 CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
Presenter: Nguyen Ba Anh HCMC University of Technology Information System Security Course.
1 Key-Exchange Protocol Using Pre-Agreed Session-ID Kenji Imamoto, Kouichi Sakurai Kyushu University, JAPAN This research was partly supported from the.
Lect. 18: Cryptographic Protocols. 2 1.Cryptographic Protocols 2.Special Signatures 3.Secret Sharing and Threshold Cryptography 4.Zero-knowledge Proofs.
Cryptography. 2 Objectives Explain common terms used in the field of cryptography Outline what mechanisms constitute a strong cryptosystem Demonstrate.
UTEPComputer Science Dept.1 University of Texas at El Paso Privacy in Statistical Databases Dr. Luc Longpré Computer Science Department Spring 2006.
Cryptography and Authentication Lab ECE4112 Group4 Joel Davis Scott Allen Quinn.
Department of Information Engineering1 Major Concerns in Electronic Commerce Authentication –there must be proof of identity of the parties in an electronic.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
 Guarantee that EK is safe  Yes because it is stored in and used by hw only  No because it can be obtained if someone has physical access but this can.
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
FIT3105 Smart card based authentication and identity management Lecture 4.
Polytechnic University of Tirana Faculty of Information Technology Computer Engineering Department Identification of on-line users and Digital Signature.
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation Edith C.H. Ngai and Michael R.
An Efficient and Anonymous Buyer- Seller Watermarking Protocol C. L. Lei, P. L. Yu, P. L. Tsai and M. H. Chan, IEEE Transactions on Image Processing, VOL.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
Apr 22, 2003Mårten Trolin1 Agenda Course high-lights – Symmetric and asymmetric cryptography – Digital signatures and MACs – Certificates – Protocols Interactive.
An Efficient and Spontaneous Privacy-Preserving Protocol for Secure Vehicular Communications Hu Xiong, Konstantin Beznosov, Zhiguang Qin, Matei Ripeanu.
Information Security of Embedded Systems : Algorithms and Measures Prof. Dr. Holger Schlingloff Institut für Informatik und Fraunhofer FIRST.
Computer Science 1 Research on Sensor Network Security Peng Ning Cyber Defense Laboratory Department of Computer Science NC State University 2005 TRES.
Privacy in Computing Legal & Ethical Issues in Computer …Security Information Security Management …and Security Controls Week-9.
Dan Boneh Introduction What is cryptography? Online Cryptography Course Dan Boneh.
1 ECE453 – Introduction to Computer Networks Lecture 19 – Network Security (II)
ECE453 – Introduction to Computer Networks Lecture 18 – Network Security (I)
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
Overview of Privacy Preserving Techniques.  This is a high-level summary of the state-of-the-art privacy preserving techniques and research areas  Focus.
Computer Science and Engineering 1 Service-Oriented Architecture Security 2.
NID Expert Group Activities in ASTAP Jun Seob Lee Hyoung Jun Kim ETRI, Korea.
Working Connection Computer and Network Security - Introduction - Dr. Hwajung Lee Radford University.
RFID Privacy Using User-controllable Uniqueness Sozo INOUE, Hiroto YASUURA System LSI Research Center, Grad. Sch. Information Science & Electrical Engineering,
Secure Sensor Data/Information Management and Mining Bhavani Thuraisingham The University of Texas at Dallas October 2005.
Secure Authentication Scheme with Anonymity for Wireless Communications Speaker : Hong-Ji Wei Date :
Cryptography and Network Security (CS435) Part One (Introduction)
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
A Secure Identification and Key Agreement Protocol with User Anonymity (SIKA) Authors: Kumar Mangipudi and Rajendra Katti Source: Computers & Security,
Mining Multiple Private Databases Topk Queries Across Multiple Private Databases (2005) Mining Multiple Private Databases Using a kNN Classifier (2007)
Review of: All You Can Eat or Breaking a Real-World Contactless Payment System Timo Kasper, Michael Silbermann, and Christof Paar Financial Cryptography.
COSC 513 Operating Systems Project Presentation: Internet Security Instructor: Dr. Anvari Student: Ying Zhou Spring 2003.
Codes & Ciphers Ltd 12 Duncan Road Richmond, Surrey TW9 2JD Information Security Group Royal Holloway, University of London Egham, Surrey TW20 0EX Impersonation.
Lecture 13: Anonymity on the Web Modified from Levente Buttyan, Michael K. Reiter and Aviel D. Rubin.
P ROTOCOL FOR COLLABORATING MOBILE AGENTS IN THE NETWORK INTRUSION DETECTION SYSTEMS. By Olumide Simeon Ogunnusi Shukor Abd Razak.
Privacy Preserving Payments in Credit Networks By: Moreno-Sanchez et al from Saarland University Presented By: Cody Watson Some Slides Borrowed From NDSS’15.
1 Privacy Aware Incentive Mechanism to Collect Mobile Data While Preventing Duplication Junggab Son*, Donghyun Kim*, Rasheed Hussain**, Sung-Sik Kwon*,
Hoda Jannati School of Computer Science
RFID SECURITY.
1 Key-Exchange Protocol Using Pre-Agreed Session-ID Kenji Imamoto Kyushu University, JAPAN.
Security Analysis of a Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption Scheme.
Erik Jonsson School of Engineering and Computer Science The University of Texas at Dallas Cyber Security Research on Engineering Solutions Dr. Bhavani.
Cyber Security Institute Dr. Ferhat Ozgur Catak TÜBİTAK BİLGEM Cyber Security Institute Role: Senior Researcher Proposal activity:
Lecture 6 (Chapter 16,17,18) Network and Internet Security Prepared by Dr. Lamiaa M. Elshenawy 1.
Security of the Internet of Things: perspectives and challenges
1/18 Talking to Strangers: Authentication in Ad-Hoc Wireless Networks Dirk Balfanz 외 2 명 in Xerox Palo Alto Research Center Presentation: Lee Youn-ho.
Big Data Security Issues in Cloud Management. BDWG Big Data Working Group Researchers 1: Data analytics for security 2: Privacy preserving 3: Big data-scale.
Financial Sector Cybersecurity R&D Priorities The Members of the FSSCC R&D Committee November 2014.
Prof. Reuven Aviv, Nov 2013 Public Key Infrastructure1 Prof. Reuven Aviv Tel Hai Academic College Department of Computer Science Public Key Infrastructure.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
1 Security problems on RFID tags (short introduction) Sakurai Lab., Kyushu Univ. Junichiro SAITO
網路環境中通訊安全技術之研究 Secure Communication Schemes in Network Environments
Computer Communication & Networks
Speaker: Yoshifumi Ueshige (ISIT 2nd Laboratory)
Privacy for Public Transportation
A Framework of Remote Biometric Authentication on the Open Network
Presentation transcript:

KYUSHUUNIVERSITYKYUSHUUNIVERSITY SAKURAILABORATORYSAKURAILABORATORY 1 Introduction of Sakurai Lab. Kyushu Univ. JAPAN

KYUSHUUNIVERSITYKYUSHUUNIVERSITY SAKURAILABORATORYSAKURAILABORATORY 2 Address Department of Computer Science and Communication Engineering, Kyushu University, Hakozaki, Higashi-ku, Fukuoka, Fukuoka , Japan ITSLAB (Information Technology & Security Laboratory) This building Kyushu Univ.

KYUSHUUNIVERSITYKYUSHUUNIVERSITY SAKURAILABORATORYSAKURAILABORATORY 3 Topics of Researches Design of Secure Protocols –Key-Exchange Protocol with ID protection (One-time ID) –Fair-Exchange Protocol for E-contract –Secure Data Mining Design of Secure Systems –Anonymity in Peer-to-Peer Network –Privacy of RFID –Combine ID-based Cryptography to PKI –Anti-SPAM Tools for Enhanced Computer Security –Software Obfuscation –Secure OS Tools for Enhanced Network Security –Information Visualization to detect malicious behavior –Detection of Port-Scan

KYUSHUUNIVERSITYKYUSHUUNIVERSITY SAKURAILABORATORYSAKURAILABORATORY 4 Key-Exchange Protocol Shared Secret  Leakage of User ’ s ID, DoS attack In most existing works, Establish a short-term key to achieve integrity and/or secrecy of following transaction Our approach: introduce One-time ID –Disposable ID used as substitution of (fixed) user's identity How to manage One-time ID ? model privacy and DoS-resiliency ?

KYUSHUUNIVERSITYKYUSHUUNIVERSITY SAKURAILABORATORYSAKURAILABORATORY 5 Research of Secure RFID (Radio-Frequency Identification) RFID tag is a small and inexpensive microchip that emits an identifier in response to query from nearby reader –Contactless physical-access cards –Automated toll payment –Inventory tags shoe size ○○ yen in wallet price of the suit Privacy concern (linkability, traceability) –We solve it by using universal re-encryption to change information on RFID tags frequently Improve a protocol proposed by Golle et al. (2004) to provide location privacy, and integrity of messages

KYUSHUUNIVERSITYKYUSHUUNIVERSITY SAKURAILABORATORYSAKURAILABORATORY 6 Privacy Preserving Data Mining  Data Mining –To discover some meaningful predictive information from large volumes of data Technical challenge: –Collaboration of different distributed parties without revealing private data We have developed accurate model without access to precise information in data records –Privacy-preserving two-party K-mean clustering using cryptographic techniques without trusted third party Large Databases…Valuable knowledge found!!

KYUSHUUNIVERSITYKYUSHUUNIVERSITY SAKURAILABORATORYSAKURAILABORATORY 7 Collaborations ISIT, 2 nd Laboratory, Japan Center of Information Security Technology (CIST), Korea Univ., Korea Chungnam Univ., Korea Gwangju Institute of Science and Technology (GIST), Korea Okayama Univ., Japan Kyushu Institute Univ., Japan Institute for InfocommResearch (I2R), Singapore …

KYUSHUUNIVERSITYKYUSHUUNIVERSITY SAKURAILABORATORYSAKURAILABORATORY 8 SSR Project ( Purpose –Investigation and research of security function of operating system Member –Sakurai Lab. (Kyushu University) –In cooperation with GIST, Korea –Corporation members Fujitsu, Hitachi, IBM, Toshiba, Toshiba Solution

KYUSHUUNIVERSITYKYUSHUUNIVERSITY SAKURAILABORATORYSAKURAILABORATORY 9 Invited Researchers ( ) CIST members –Prof. Jongin Lim, Prof. Donghoon Lee, Yong Ho Kim, Jeong Jae Yu, Tae Hyun Kim, Hwa Yean Lee, … GIST members –Jongyoul Park, Wook Shin, Hyung Chan Kim, Hyunjin Yoo, Jiho Cho Prof. Man Young Rhee (Kyung Hee Univ.) Prof. Mridul Nandi (Indian Statistical Institute) Prof. Hyang-Sook Lee (Ewha Womans Univ.) Dr. Guilin Wang (I2R) …

KYUSHUUNIVERSITYKYUSHUUNIVERSITY SAKURAILABORATORYSAKURAILABORATORY 10 Website of ITSLAB