Vanish: Increasing Data Privacy with Self-Destructing Data Roxana Geambasu Tadayoshi Kohno Amit A. Levy Henry M. Levy University of Washington.

Slides:



Advertisements
Similar presentations
Public Key Infrastructure A Quick Look Inside PKI Technology Investigation Center 3/27/2002.
Advertisements

P2P data retrieval DHT (Distributed Hash Tables) Partially based on Hellerstein’s presentation at VLDB2004.
PROVENANCE FOR THE CLOUD (USENIX CONFERENCE ON FILE AND STORAGE TECHNOLOGIES(FAST `10)) Kiran-Kumar Muniswamy-Reddy, Peter Macko, and Margo Seltzer Harvard.
1 Computer Networks: A Systems Approach, 5e Larry L. Peterson and Bruce S. Davie Chapter 8 Network Security Copyright © 2010, Elsevier Inc. All rights.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
Modelling and Analysing of Security Protocol: Lecture 10 Anonymity: Systems.
Kademlia: A Peer-to-peer Information System Based on the XOR Metric Petar Mayamounkov David Mazières A few slides are taken from the authors’ original.
Click to edit Master title style Defeating Vanish with Low-Cost Sybil Attacks Against Large DHTs Scott Wolchok 1 Owen S. Hofmann 2 Nadia Heninger 3 Edward.
Authentication Cristian Solano. Cryptography is the science of using mathematics to encrypt and decrypt data. Public Key Cryptography –Problems with key.
TrustMe: Anonymous Management of Trust Relationships in Decentralized P2P Systems Aameek Singh and Ling Liu Presented by: Korporn Panyim.
Vanish: Increasing Data Privacy with Self-Destructing Data Roxana Geambasu Yoshi Kohno Amit Levy Hank Levy University of Washington.
S EMINAR A SELF DESTRUCTING DATA SYSTEM BASED ON ACTIVE STORAGE FRAMEWORK ONON P RESENTED BY S HANKAR G ADHVE G UIDED BY P ROF.P RAFUL P ARDHI.
Outline for today Structured overlay as infrastructures Survey of design solutions Analysis of designs.
Small-world Overlay P2P Network
Roberto Di Pietro, Luigi V. Mancini and Alessandro Mei.
 Key exchange o Kerberos o Digital certificates  Certificate authority structure o PGP, hierarchical model  Recovery from exposed keys o Revocation.
Peer to Peer File Sharing Huseyin Ozgur TAN. What is Peer-to-Peer?  Every node is designed to(but may not by user choice) provide some service that helps.
Cryptography In Censorship Resistant Web Publishing Systems By Hema Hariharan Swati B Shah.
P2P: Advanced Topics Filesystems over DHTs and P2P research Vyas Sekar.
Protecting Free Expression Online with Freenet Presented by Ho Tsz Kin I. Clarke, T. W. Hong, S. G. Miller, O. Sandberg, and B. Wiley 14/08/2003.
Freenet A Distributed Anonymous Information Storage and Retrieval System I Clarke O Sandberg I Clarke O Sandberg B WileyT W Hong.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
Fall 2010/Lecture 311 CS 426 (Fall 2010) Public Key Encryption and Digital Signatures.
Wide-area cooperative storage with CFS
Masud Hasan Secure Project 1. Secure It uses Digital Certificate combined with S/MIME capable clients to digitally sign and.
Freenet: A Distributed Anonymous Information Storage and Retrieval System Presentation by Theodore Mao CS294-4: Peer-to-peer Systems August 27, 2003.
Bob can sign a message using a digital signature generation algorithm
Defeating Vanish with Low-Cost Sybil Attacks Against Large DHTs The University of Michigan Scott Wolchok J. Alex Halderman The University of Texas at Austin.
Privacy Preserving Query Processing in Cloud Computing Wen Jie
Masud Hasan Secue VS Hushmail Project 2.
Recordkeeping for Good Governance Toolkit Digital Recordkeeping Guidance Funafuti, Tuvalu – June 2013.
Aggregation in Sensor Networks
Click to edit Master title style Fall, Privacy&Security - Virginia Tech – Computer Science Cryptographic Security Secret Sharing, Vanishing Data.
COEN 351 E-Commerce Security Essentials of Cryptography.
SEC835 Practical aspects of security implementation Part 1.
Freenet: A Distributed Anonymous Information Storage and Retrieval System Presenter: Chris Grier ECE 598nb Spring 2006.
Freenet File sharing for a political world. Freenet: A Distributed Anonymous Information Storage and Retrieval System I. Clarke, O. Sandberg, B. Wiley,
Lecture 11: Strong Passwords
Códigos y Criptografía Francisco Rodríguez Henríquez Security Attacks: Active and Passive Active Masquerade (impersonation) Replay Modification of message.
March 16 & 21, Csci 2111: Data and File Structures Week 9, Lectures 1 & 2 Indexed Sequential File Access and Prefix B+ Trees.
1 Distributed Hash Tables (DHTs) Lars Jørgen Lillehovde Jo Grimstad Bang Distributed Hash Tables (DHTs)
Vanish: Increasing Data Privacy with Self-Destructing Data Roxana Geambasu, Tadayoshi Kohno, Amit Levy, et al. University of Washington USENIX Security.
Chapter 3: Basic Protocols Dulal C. Kar. Key Exchange with Symmetric Cryptography Session key –A separate key for one particular communication session.
4 th lecture.  Message to be encrypted: HELLO  Key: XMCKL H E L L O message 7 (H) 4 (E) 11 (L) 11 (L) 14 (O) message + 23 (X) 12 (M) 2 (C) 10 (K) 11.
Cryptographic Security Secret Sharing, Vanishing Data 1Dennis Kafura – CS5204 – Operating Systems.
Vanish: Increasing Data Privacy with Self-Destructing Data Roxana Geambasu | Tadayoshi Kohno | Amit A. Levy | Henry M. Levy Presented by: Libert Tapia.
Cryptography (2) University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
An Improved Kademlia Protocol In a VoIP System Xiao Wu , Cuiyun Fu and Huiyou Chang Department of Computer Science, Zhongshan University, Guangzhou, China.
Kaleidoscope – Adding Colors to Kademlia Gil Einziger, Roy Friedman, Eyal Kibbar Computer Science, Technion 1.
Paper Survey of DHT Distributed Hash Table. Usages Directory service  Very little amount of information, such as URI, metadata, … Storage  Data, such.
Paper by: Roxana Geambasu, Tadayoshi Kohno, Amit A. Levy, Henry M. Levy University of Washington Vanish: Increasing Data Privacy with Self-Destructing.
COEN 350: Network Security Authentication. Between human and machine Between machine and machine.
Freenet “…an adaptive peer-to-peer network application that permits the publication, replication, and retrieval of data while protecting the anonymity.
1 Chapter 10: Key Management in Public key cryptosystems Fourth Edition by William Stallings Lecture slides by Lawrie Brown (Modified by Prof. M. Singhal,
COEN 351 E-Commerce Security
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Fall, Privacy&Security - Virginia Tech – Computer Science Click to edit Master title style Cryptographic Security Identity-Based Encryption.
Key Management Network Systems Security Mort Anvari.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Personal Privacy: Limited Disclosure using Cryptographic Techniques Mark Shaneck Karthikeyan Mahadevan SCLab.
Network Security Celia Li Computer Science and Engineering York University.
Keyword search on encrypted data. Keyword search problem  Linux utility: grep  Information retrieval Basic operation Advanced operations – relevance.
Fall 2006CS 395: Computer Security1 Key Management.
Cryptographic Security Aveek Chakraborty CS5204 – Operating Systems1.
Searchable Encryption in Cloud
CHAPTER 3 Architectures for Distributed Systems
Presentation by Theodore Mao CS294-4: Peer-to-peer Systems
Vanish: Increasing Data Privacy with Self-Destructing Data
Presentation transcript:

Vanish: Increasing Data Privacy with Self-Destructing Data Roxana Geambasu Tadayoshi Kohno Amit A. Levy Henry M. Levy University of Washington

Problem:  Data is never truly forgotten caches caches Chat History Chat History Cloud Services Cloud Services Data Backups Data Backups Transmission to 3 rd parties Transmission to 3 rd parties  Resting data is vulnerable Recent hack on Sony for example Recent hack on Sony for example 2

Problem:  What kind of data? Chat History Chat History Posts on public forums Posts on public forums Pictures Pictures Personal Files Personal Files  Many items of sensitive data are only useful for a limited time 3

Problem:  Who wants your data? The spouse in a divorce case The spouse in a divorce case The public during an election cycle The public during an election cycle The government in a criminal case The government in a criminal case The plaintiff in a civil case The plaintiff in a civil case Your employer Your employer Identity Thief Identity Thief Someone who intends to blackmail you. Someone who intends to blackmail you. 4

Requirements:  We would like sensitive data to be permanently deleted after it has served its original purpose. Even if it is archived by any number of 3 rd parties Even if it is archived by any number of 3 rd parties Without any explicit action by the creator Without any explicit action by the creator Without the need to access the data where it is stored Without the need to access the data where it is stored Without the use of secure hardware Without the use of secure hardware Without deployment of new external services. Without deployment of new external services. 5

Intro to Vanish  Vanish claims to solve the problem while meeting all requirements.  At a High Level: Threshold Secret Sharing Threshold Secret Sharing Distributed Hash Tables (Vuze and OpenDHT) Distributed Hash Tables (Vuze and OpenDHT) Vanishing Data Object (VDO) Vanishing Data Object (VDO) 6

Threshold Secret Sharing  Many different implementations  Basic Principal n = Number of “shares” n = Number of “shares” t = Threshold t = Threshold The Secret can be revealed using any combination of t shares. The Secret can be revealed using any combination of t shares.  Vanish uses Shamir secret sharing 7

Threshold Secret Sharing Crafting and distributing shares 1. Generate a secret key K 2. Determine value for n and t 3. Calculate and distribute n shares Obtaining a secret from shares 1. Collect t shares from the set of n shareholders 2. Combine shares and determine the value K 8

Shamir Secret Sharing It takes k points to define a polynomial of degree k-1 1. Choose threshold coefficients a 1..a t 2. Choose its y-intercept (a 0 ) as the key 3. Choose any N points along the curve and distribute them as shares 4. One only needs k points to re-construct the curve and find the y-intercept. 9

Vuze Distributed Hash Table Desirable Properties: 1. Availability 2. Scale 3. Geographic Distribution 4. Decentralization 5. Churn 10

Vuze Distributed Hash Table  Based on the Kademlia Protocol  Has indexes split over 1M+ nodes  An index has a fixed 8-hour timeout  Data is copied to the 20 closest nodes to ensure availability until the timeout. Three commands: 1. Lookup – Find which node owns a particular index 2. Get – Get the data from a host for an index 3. Store – Store data on a host at an index. 11

Vanishing Data Object (VDO)  Input: Data Object D Data Object D Timeout T (optional) Timeout T (optional)  Output: VDO V = {L,C,N,threshold} VDO V = {L,C,N,threshold} 12

Vanish: Encapsulation Building the VDO: 1. Pick a random symmetric key K 2. Encrypt D with K to obtain C 3. Create N shares of K (secret sharing) 4. Generate access key L 5. Use PRNG seeded with L to generate DHT indices I 1 – I N 6. Store shares K 1 -K N into indices I 1 -I N 13

Vanish: Encapsulation 14 Image Credit: “Vanish”; Geambasu, Kohno, Levy, Levy 2009 pp. 7

Vanish: Decapsulation Getting back your data: 1. Obtain VDO V = {L,C,N,threshold} 2. Use L and N to derive indices I 1 -I N 3. Obtain at least threshold shares of K 1 -K N 4. Calculate key K 5. Obtain Data D = decrypt K (C) 15

Vanish Applications  FireVanish Plugin written for Firefox 3.0 Plugin written for Firefox 3.0 Requires the Unix Vuze DHT implementation. Requires the Unix Vuze DHT implementation. Was adapted from FireGPG Was adapted from FireGPG  Desktop File Application Only discussed in the paper and never distributed Only discussed in the paper and never distributed Claimed secure erasure of items in host trash bin. Claimed secure erasure of items in host trash bin. 16

Vanish: VDO Availability Using N=1 1% of VDOs expire too early 1% of VDOs expire too early 5% of VDOs expire LONG after intended 5% of VDOs expire LONG after intended Using N=100, T=99% Average Life was only 4 hours Average Life was only 4 hours Using 20≤ N ≤50+, T=90% Almost ideal results Almost ideal results 17 Image Credit: “Vanish”; Geambasu, Kohno, Levy, Levy 2009 pp. 8

Vanish: Performance  In 2009, it took 17 seconds to push 20 Index-Data pairs into Vuze DHT  Retrieving 20 values took 2.0 seconds  Both scale linearly  Pre-Push feature added to speed up encapsulation to about 0.1 seconds. 18

Vanish: Security  Attacks after the VDO has expired are infeasible Shares were spread over jurisdictions Shares were spread over jurisdictions Churn in Vuze makes it infeasible to identify which machines had shares. Churn in Vuze makes it infeasible to identify which machines had shares. 19

Vanish: Security  Some attacks before VDO’s expire: ISP proactively encapsulates ISP proactively encapsulates ○ Ans: Put VDO’s inside PGP container Someone sniffs and archives all DHT operations of sender or receiver Someone sniffs and archives all DHT operations of sender or receiver ○ Ans: Use tor The attacker joins the DHT in an attempt to retain copies of store and lookup requests. The attacker joins the DHT in an attempt to retain copies of store and lookup requests. ○ Ans: Stay Tuned… 20

21