Secure Naming structure and p2p application interaction IETF - PPSP WG July 2010 Christian Dannewitz, Teemu Rautio and Ove Strandberg.

Slides:



Advertisements
Similar presentations
Holding the Internet Accountable David Andersen, Hari Balakrishnan, Nick Feamster, Teemu Koponen, Daekyeong Moon, Scott Shenker.
Advertisements

Wei Lu 1, Kate Keahey 2, Tim Freeman 2, Frank Siebenlist 2 1 Indiana University, 2 Argonne National Lab
Adapted Multimedia Internet KEYing (AMIKEY): An extension of Multimedia Internet KEYing (MIKEY) Methods for Generic LLN Environments draft-alexander-roll-mikey-lln-key-mgmt-01.txt.
Research & Development Workshop on e-Voting and e-Government in the UK - February 27, 2006 Votinbox - a voting system based on smart cards Sébastien Canard.
Chapter 14 – Authentication Applications
PIS: Unit III Digital Signature & Authentication Sanjay Rawat PIS Unit 3 Digital Sign Auth Sanjay Rawat1 Based on the slides of Lawrie.
Information-Centric Networks09c-1 Week 9 / Paper 3 VoCCN: Voice Over Content-Centric Networks –V. Jacobson, D. K. Smetters, N. H. Briggs, M. F. Plass,
By Md Emran Mazumder Ottawa University Student no:
Chapter 17: WEB COMPONENTS
Distributed Systems Major Design Issues Presented by: Christopher Hector CS8320 – Advanced Operating Systems Spring 2007 – Section 2.6 Presentation Dr.
Securing Critical Unattended Systems with Identity Based Cryptography A Case Study Johannes Blömer, Peter Günther University of Paderborn Volker Krummel.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Building web applications on top of encrypted data using Mylar Presented by Tenglu Liang Tai Liu.
Location vs. Identities in Internet Content: Applying Information-Centric Principles in Today’s Networks Instructor: Assoc. Prof. Chung-Horng Lung Group.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Grid Security Infrastructure Tutorial Von Welch Distributed Systems Laboratory U. Of Chicago and Argonne National Laboratory.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Lect. 18: Cryptographic Protocols. 2 1.Cryptographic Protocols 2.Special Signatures 3.Secret Sharing and Threshold Cryptography 4.Zero-knowledge Proofs.
16.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
Security Chapters 14,15. The Security Environment Threats Security goals and threats.
CMSC 414 Computer (and Network) Security Lecture 15 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 7 Jonathan Katz.
Edward Tsai – CS 239 – Spring 2003 Strong Security for Active Networks CS 239 – Network Security Edward Tsai Tuesday, May 13, 2003.
SSH : The Secure Shell By Rachana Maheswari CS265 Spring 2003.
Introduction to Signcryption November 22, /11/2004 Signcryption Public Key (PK) Cryptography Discovering Public Key (PK) cryptography has made.
CMSC 414 Computer and Network Security Lecture 20 Jonathan Katz.
Information Security of Embedded Systems : Algorithms and Measures Prof. Dr. Holger Schlingloff Institut für Informatik und Fraunhofer FIRST.
Introduction to Public Key Infrastructure (PKI) Office of Information Security The University of Texas at Brownsville & Texas Southmost College.
Long-term Archive Service Requirements draft-ietf-ltans-reqs-00.txt.
TrustPort Public Key Infrastructure. Keep It Secure Table of contents  Security of electronic communications  Using asymmetric cryptography.
Application of Attribute Certificates in S/MIME Greg Colla & Michael Zolotarev Baltimore Technologies 47 th IETF Conference Adelaide, March 2000.
Alexander Potapov.  Authentication definition  Protocol architectures  Cryptographic properties  Freshness  Types of attack on protocols  Two-way.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
Page 1 Sandboxing & Signed Software Paul Krzyzanowski Distributed Systems Except as otherwise noted, the content of this presentation.
Host Identity Protocol
Chapter 3 Mohammad Fozlul Haque Bhuiyan Assistant Professor CITI Jahangirnagar University.
Chapter 10: Authentication Guide to Computer Network Security.
Cong Wang1, Qian Wang1, Kui Ren1 and Wenjing Lou2
.Net Security and Performance -has security slowed down the application By Krishnan Ganesh Madras.
Masud Hasan Secue VS Hushmail Project 2.
Digital Certificates Made Easy Sam Lutgring Director of Informational Technology Services Calhoun Intermediate School District.
Scalable Security and Accounting Services for Content-based Publish/Subscribe Systems Himanshu Khurana NCSA, University of Illinois.
Csci5233 Computer Security1 Bishop: Chapter 14 Representing Identity.
Registration Processing for the Wireless Internet Ian Gordon Director, Market Development Entrust Technologies.
DRM Building Blocks - Protecting and Tracking Content Adopted from Chapter 5, Digital Rights Management Business and Technology.
WS-Security: SOAP Message Security Web-enhanced Information Management (WHIM) Justin R. Wang Professor Kaiser.
Security.  is one of the most widely used and regarded network services  currently message contents are not secure may be inspected either.
Cryptography, Authentication and Digital Signatures
Strong Security for Distributed File Systems Group A3 Ka Hou Wong Jahanzeb Faizan Jonathan Sippel.
Copyright © cs-tutorial.com. Overview Introduction Architecture Implementation Evaluation.
Chapter 4 Using Encryption in Cryptographic Protocols & Practices.
CS 4244: Internet Programming Security 1.0. Introduction Client identification and cookies Basic Authentication Digest Authentication Secure HTTP.
Freenet “…an adaptive peer-to-peer network application that permits the publication, replication, and retrieval of data while protecting the anonymity.
Decentralized authorization and data security in web content delivery * Danfeng Yao (Brown University, USA) Yunhua Koglin (Purdue University, USA) Elisa.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
A Simple Traceable Pseudonym Certificate System for RSA-based PKI SCGroup Jinhae Kim.
Deck 10 Accounting Information Systems Romney and Steinbart Linda Batch March 2012.
Csci5233 Computer Security1 Bishop: Chapter 14 Representing Identity.
Building Preservation Environments with Data Grid Technology Reagan W. Moore Presenter: Praveen Namburi.
 Attacks and threats  Security challenge & Solution  Communication Infrastructure  The CA hierarchy  Vehicular Public Key  Certificates.
Cryptography CSS 329 Lecture 13:SSL.
Cryptography and Network Security
Authentication Applications
S/MIME T ANANDHAN.
Pooja programmer,cse department
Electronic Payment Security Technologies
Presentation transcript:

Secure Naming structure and p2p application interaction IETF - PPSP WG July 2010 Christian Dannewitz, Teemu Rautio and Ove Strandberg

Slide 2 Motivation: secure naming structure Future Information-centric Network Dissemination of Information Objects Information-centric abstraction Todays Internet Conversations between Hosts Host-centric abstraction Evolution No common persistent naming scheme for Information Security is host-centric Mainly based on securing channels and trusting servers Cant trust a copy received from an untrusted server

P2P data identification challenges Identification of the same data at different location require knowledge of multiple data IDs (host centric addressing) Streaming application have their own identification system –Hard to use same data between different p2p application Security based on trusting hosts –selection of arbitrary source is not possible as only trusted hosts can be used

Secure naming characteristics Self certified ID –using hash of data Name persistence, in spite of –Location changes –Content changes –Owner changes –Organizational changes 12/02/2014Slide 4

Self-Certification Prevent unauthorized changes, ensure data integrity –Important to support data retrieval from any available copy/source Static content –Include hash(content) in ID Label field –Advantage: no need to retrieve metadata –Verification: compute hash(retrieved data) and compare to hash in ID Dynamic content –Storing hash(dyn.content) in ID would violate ID persistence –Store hash(content) in security metadata and sign with SK IO –Verification: Verify that signature is correct and corresponds to PK IO Compute hash(retrieved data) and compare to hash in security metadata 12/02/2014Slide 5

Naming Scheme Overview 1 12/02/2014Slide 6 Information Object (IO) = (ID, Data, Metadata) Each IO has an owner All equivalent copies have the same ID –This might include different versions Type A=Hash(PK IO ) L={attributes} Security Metadata SK IO

Naming Scheme Overview 2 12/02/2014Slide 7 ID = (Type tag, Authenticator, Label) –Type tag: mandatory, globally standardized Adapt naming scheme to named entity type –Authenticator A: bind ID to PK IO Secure ID – security metadata binding (Original) owner authentication (see owner change) –Label L: Arbitrary, ensure global uniqueness Security metadata –All information required for embedded NetInf security features –Securely bound to ID via PK IO /SK IO pair Type A=Hash(PK IO ) L={attributes} Security Metadata SK IO

Secure naming & P2P application interaction With self-certifying names, the data received is the data requested in P2P system In todays P2P system, no guarantee that the downloaded content actually matches the expected/correct content –Like forged torrent file and/or data file can be inserted Additions to P2P –Extend torrent file with additional security metadata –Generate torrent name along draft method

Summary and Conclusion Information-centric type of networks have inherent need for secure naming scheme Secure naming structure combines features not available in existing naming schemes Example of torrent changes Feasibility of secure naming demonstrated via prototyping: – – 12/02/2014 © 4WARD Consortium Confidential WPx/Slide 9

Thank you for your attention 12/02/2014Slide 10

Background slide

Name Persistence Location change –Based on ID/locator split –ID dynamically bound to network location(s) via name resolution service Content change –See self-certification Owner change –PK IO /SK IO pair conceptually bound to IO, not owner –Basic approach: PK IO /SK IO pair securely passed on to new owner Disadvantage: not robust with respect to SK disclosure –Adv. approach: new owner uses new PK/SK pair Sign metadata using the new PK/SK pair Securely bind PK/SK pair to ID via certificate chain Owners organizational change –IDs are flat and do not reflect organizational structures 12/02/2014Slide 12

Owner Authentication and Identification Owner authentication separated from data self-certification –By allowing the corresponding PK/SK pairs to be different –Owner authentication is possible even if multiple owners use the same PK/SK pair for data self-certification –More freedom in the choice of PK/SK pairs for data self-certification Owner authentication binds self-certified data to owners PK –Include hashed owners PK in self-certified data and sign this data with the corresponding SK (anonymous) –Build up trust in (anonymous) owner by reusing PK for different IOs Owner identification: in addition, bind self-certified data to owners real world identity –Achieved like owner authentication, where owners PK and identity data are included in self-certified data –Owners PK and identity are bound by PK certificate issued by TTP 12/02/2014Slide 13

Evaluation Java-based NetInf prototype Naming scheme proved easy to implement –Based on established security mechanisms (encryption, digital sign.) Easy to integrate and use naming scheme in applications –Built applications from scratch –Extended existing applications (e.g., Firefox, Thunderbird) Example: Firefox plugin –Interprets links containing NetInf IDs instead of URLs –User adv.: automatic content integrity check, reduce broken links –Publishers adv.: simplify content management via persistent IDs Load and overhead not an issue –Implementation also smoothly running on Android cell phones 12/02/2014Slide 14

prototype implementation –self-certification –persistent IDs –owner authentication –basics of owner identification algorithm –can use any encryption/signature algorithm. –currently use RSA and SHA1 for the hashing