Vanish: Increasing Data Privacy with Self-Destructing Data Roxana Geambasu | Tadayoshi Kohno | Amit A. Levy | Henry M. Levy Presented by: Libert Tapia.

Slides:



Advertisements
Similar presentations
Secure Mobile IP Communication
Advertisements

1 Computer Networks: A Systems Approach, 5e Larry L. Peterson and Bruce S. Davie Chapter 8 Network Security Copyright © 2010, Elsevier Inc. All rights.
Grid Computing, B. Wilkinson, 20045a.1 Security Continued.
Cryptography Chapter 7 Part 4 Pages 833 to 874. PKI Public Key Infrastructure Framework for Public Key Cryptography and for Secret key exchange.
Click to edit Master title style Defeating Vanish with Low-Cost Sybil Attacks Against Large DHTs Scott Wolchok 1 Owen S. Hofmann 2 Nadia Heninger 3 Edward.
Chapter 5 Network Security Protocols in Practice Part I
Vanish: Increasing Data Privacy with Self-Destructing Data Roxana Geambasu Yoshi Kohno Amit Levy Hank Levy University of Washington.
S EMINAR A SELF DESTRUCTING DATA SYSTEM BASED ON ACTIVE STORAGE FRAMEWORK ONON P RESENTED BY S HANKAR G ADHVE G UIDED BY P ROF.P RAFUL P ARDHI.
Encryption and Firewalls Chapter 7. Learning Objectives Understand the role encryption plays in firewall architecture Know how digital certificates work.
Security strategy. What is security strategy? How an organisation plans to protect and respond to security attacks on their information technology assets.
Security Overview Hofstra University University College for Continuing Education - Advanced Java Programming Lecturer: Engin Yalt May 24, 2006.
Real-Time Authentication Using Digital Signature Schema Marissa Hollingsworth BOISECRYPT ‘09.
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
Security (Part 2) School of Business Eastern Illinois University © Abdou Illia, Spring 2007 (Week 13, Thursday 4/5/2007)
Cryptography In Censorship Resistant Web Publishing Systems By Hema Hariharan Swati B Shah.
Secure communications Week 10 – Lecture 2. To summarise yesterday Security is a system issue Technology and security specialists are part of the system.
Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.
Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.
Key Distribution CS 470 Introduction to Applied Cryptography
Secure Systems Research Group - FAU Patterns for Digital Signature using hashing Presented by Keiko Hashizume.
SMUCSE 5349/49 Security. SMUCSE 5349/7349 Threats Threats to the security of itself –Loss of confidentiality s are sent in clear over.
1 Lecture 18: Security issues specific to security key management services –privacy –integrity/authentication –nonrepudiation/plausible deniability.
OV Copyright © 2011 Element K Content LLC. All rights reserved. System Security  Computer Security Basics  System Security Tools  Authentication.
1 Computer & Web Security  Security Problems in Computer Use  Privacy-Protecting Techniques  Privacy-Protecting Technologies: cryptography, digital.
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
Defeating Vanish with Low-Cost Sybil Attacks Against Large DHTs The University of Michigan Scott Wolchok J. Alex Halderman The University of Texas at Austin.
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
Secure r How do you do it? m Need to worry about sniffing, modifying, end- user masquerading, replaying. m If sender and receiver have shared secret.
Privacy-Preserving P2P Data Sharing with OneSwarm -Piggy.
Masud Hasan Secue VS Hushmail Project 2.
Click to edit Master title style Fall, Privacy&Security - Virginia Tech – Computer Science Cryptographic Security Secret Sharing, Vanishing Data.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
1 Section 10.9 Internet Security Association and Key Management Protocol ISAKMP.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Archiving s. How to Manage Auto-Archive in Outlook Your Microsoft Outlook mailbox grows as you create and receive items. To manage the space.
EIDE Design Considerations 1 EIDE Design Considerations Brian Wright Portland General Electric.
Types of Electronic Infection
Vanish: Increasing Data Privacy with Self-Destructing Data Roxana Geambasu, Tadayoshi Kohno, Amit Levy, et al. University of Washington USENIX Security.
Lecture 16 Page 1 Advanced Network Security Perimeter Defense in Networks: Virtual Private Networks Advanced Network Security Peter Reiher August, 2014.
Cryptographic Security Secret Sharing, Vanishing Data 1Dennis Kafura – CS5204 – Operating Systems.
Internet Security. Four Issues of Internet Security Authenticity: Is the sender of a message who they claim to be? Privacy: Are the contents of a message.
Vanish: Increasing Data Privacy with Self-Destructing Data Roxana Geambasu Tadayoshi Kohno Amit A. Levy Henry M. Levy University of Washington.
Not only business information, but a large amount of personal information too is now digitized and stored in computer connected to the internet. System.
1 Mail Saurus Reference:“Usable Encryption Enabled by AJAX” J.F. Ryan; B.L. Reid; Networking and Services, ICNS '06. Digital Object Identifier /ICNS
Presented by: Sanketh Beerabbi University of Central Florida.
CIS 450 – Network Security Chapter 4 - Spoofing. Definition - To fool. In networking, the term is used to describe a variety of ways in which hardware.
NETWORK SECURITY.
Paper by: Roxana Geambasu, Tadayoshi Kohno, Amit A. Levy, Henry M. Levy University of Washington Vanish: Increasing Data Privacy with Self-Destructing.
Network Components David Blakeley LTEC HUB A common connection point for devices in a network. Hubs are commonly used to connect segments of a LAN.
COEN 351 E-Commerce Security
Security fundamentals Topic 5 Using a Public Key Infrastructure.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Chapter 14 Network Encryption
science/internet-intro
2/19/2016clicktechsolution.com Security. 2/19/2016clicktechsolution.com Threats Threats to the security of itself –Loss of confidentiality.
Network Security Celia Li Computer Science and Engineering York University.
IPSec is a suite of protocols defined by the Internet Engineering Task Force (IETF) to provide security services at the network layer. standard protocol.
December 14, 2000Securely Available Credentails (SACRED) - Framework Draft 1 Securely Available Credentials (SACRED) Protocol Framework, Draft Specification.
Securing Access to Data Using IPsec Josh Jones Cosc352.
Securing Interconnect Networks By: Bryan Roberts.
1 Managing Security Additional notes. 2 Intercepting confidential messages Attacker Taps into the Conversation: Tries to Read Messages Client PC Server.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
SSL: Secure Socket Layer By: Mike Weissert. Overview Definition History & Background SSL Assurances SSL Session Problems Attacks & Defenses.
Chapter 5 Network Security Protocols in Practice Part I
Hybrid Cloud Architecture for Software-as-a-Service Provider to Achieve Higher Privacy and Decrease Securiity Concerns about Cloud Computing P. Reinhold.
Vanish: Increasing Data Privacy with Self-Destructing Data
ONLINE SECURE DATA SERVICE
Secure Diffie-Hellman Algorithm
Presentation transcript:

Vanish: Increasing Data Privacy with Self-Destructing Data Roxana Geambasu | Tadayoshi Kohno | Amit A. Levy | Henry M. Levy Presented by: Libert Tapia USENIX Security Symposium (Usenix), 2009 (best student paper award)

What is Vanish ? Vanish is a project developed at the University of Washington which give the users the ability to determine the lifespan of their personal data stored in the web such as private message on Facebook, documents on Google Docs, or private photo on Flickr by making the Web object self-destruct or vanish automatically.

Motivating Problem: Data Lives Forever Sensitive sender HotmailGmail The sensitive is store in several servers before arriving to its final destination and if the sender deletes the from his / hers inbox the will still be store on several other locations for a long period of time. Creates multiple points where an attack can be performed. And compromise the person involved in the conversation

Effects Sensitive sender HotmailGmail subpoena Lawyer, Attacker Receiver

Candidate Approaches User explicitly and manually delete there data or install a cron job to do that. Use a standard public key or symmetric encryption scheme. Stenography, Deniable encryption or Deniable file system Ephemeral key exchange for interactive communication systems (eg: OTR) Ephemerizer (trusted 3rd parties)

Assumptions Vanishing Data Object (VDO) 1.Time-limited value – store only for a limited period of time. 2.Known timeout – can be specified by the user. 3.Internet connectivity – required to interact with the VDO. 4.Dispensability under attack – user can destroy even if prematurely.

Goals Even if an attacker can retroactively obtain a pristine copy of that data and any relevant persistent cryptographic keys and passphrases from before that timeout, perhaps from stored or archived copies; Without the use of any explicit delete action by the user or the parties storing that data; (Automatically) Without needing to modify any of the stored or archived copies of that data; Without the use of secure hardware; and Without relying on the introduction of any new external services that would need to be deployed (whether trusted or not).

Threat Model Goal: 1.Trusted data owners 2.Retroactive attacks on privacy Out of scope threats 1.User making a clear text copy of the VDO and storing it. 2.ISPs that might spy on user DHT interaction.

World-Wide DHT How Vanish Works: Data Encapsulation Vanish Encapsulate (data, timeout) Vanish Data Object VDO = {C, L} Secret Sharing (M of N) k1k1 k2k2 kNkN... k3k3 Random indexes k1k1 k2k2 k3k3 kNkN C = E K (data) L K k1k1 k3k3 kNkN k2k2 9 VDO = {C, L}

Data Encapsulation

How Vanish Works: Data Decapsulation 11 Vanish Encapsulate (data, timeout) Random indexes C = E K (data) World-Wide DHT Vanish Decapsulate (VDO = {C, L}) data Secret Sharing (M of N)... Random indexes k1k1 k3k3 kNkN data = D K (C) kNkN k3k3 k1k1 LL K Secret Sharing (M of N) VDO = {C, L} k2k2 k2k2 Vanish Data Object VDO = {C, L}. k1k1 k2k2 k3k3 kNkN. k1k1 k2k2 k3k3 kNkN

How Vanish Works: Data Timeout The DHT loses key pieces over time – Natural churn: nodes crash or leave the DHT – Built-in timeout: DHT nodes purge data periodically Key loss makes all data copies permanently unreadable 12 World-Wide DHT Vanish Secret Sharing (M of N)... Random indexes k1k1 k3k3 kNkN data = D K (C) L K X kNkN k3k3 k1k1 12 X X

Vuze Background (a.k.a Azureus) Uses Kademlia protocol Nodes or assigned a random 160-bit Id based on IP and port. Looks for 20 nodes with ID closets to the index. Republish every 30 minutes to the other 19 nodes to combat churn.

Availability and Expiration in Vuze

Vanish Applications FireVanish Vanishing Files – Self-destructive trash bin or Microsoft Word’s auto save

Performance Based on T2500 DUO 2GB of Ram, Java 1.6 basic broadband network.

Security Analyses DHT can store information about the communication and an anonymization software like Tor is recommended. User not Vanishing the proper data. Vanish my raise legal implication in the new eDiscovery rules.

Retroactive Attacks Vanish Secret Sharing (M of N) k1k1 k2k2 kNkN... k3k3 K Direct put Replication Defense The attacker must join ~8% of the DHT size, for 25% capture. Decentralization Constant Evolution

Decapsulation Prior to Expiration provider decapsulate on real time and storing them. Defense – Use PGP(Pretty Good Privacy) or GPG(GNU Privacy Guard) – this will make it harder for the provider to decapsulate and the VDO will expire.

Sniff User’s Internet Connection Attacker might try to intercept and preserve the data users push into or retrieve from DHT. Defense – Vuze provides security for this type of attack. – Use Tor to tunnel the interaction with a DHT through remote machine.

Integrate into DHT (Sybil / Eclipse Attacks) Attacker integrate within the DHT in order to create copies of all data that is ask to store. This is estimate to cost around $860k/year in Amazon EC2 computation and networking cost.

Conclusions This paper introduced a new approach for protecting data privacy from attackers who retroactively obtain, through legal or other means, a user’s stored data and private decryption keys.

Improvements Using RSA before sending data to the node(SafeVanish Paper) provider stores decrypted data every certain time.