SeCol: Secure Collaborative Applications using Group Communication and Publish/Subscribe Systems Himanshu Khurana NCSA.

Slides:



Advertisements
Similar presentations
Chapter 10 Encryption: A Matter of Trust. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic Algorithm.
Advertisements

A Survey of Key Management for Secure Group Communications Celia Li.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
SSL : An Overview Bruhadeshwar Bezawada International Institute of Information Technology, Hyderabad.
URSA: Providing Ubiquitous and Robust Security Support for MANET
1 Jeremy Wyant W3C DRM Workshop 23 January 2001 Establishing Security Requirements For DRM Enabled Systems.
Cryptography. 2 Objectives Explain common terms used in the field of cryptography Outline what mechanisms constitute a strong cryptosystem Demonstrate.
Cryptography and Authentication Lab ECE4112 Group4 Joel Davis Scott Allen Quinn.
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
Principles of Information Security, 2nd edition1 Cryptography.
Security Overview Hofstra University University College for Continuing Education - Advanced Java Programming Lecturer: Engin Yalt May 24, 2006.
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
Cryptographic Techniques Instructor: Jerry Gao Ph.D. San Jose State University URL: May,
Cryptographic Technologies
Presented by Xiaoping Yu Cryptography and PKI Cosc 513 Operating System Presentation Presented to Dr. Mort Anvari.
Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.
Multicast Security May 10, 2004 Sam Irvine Andy Nguyen.
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
Information Security of Embedded Systems : Algorithms and Measures Prof. Dr. Holger Schlingloff Institut für Informatik und Fraunhofer FIRST.
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
Applied Cryptography for Network Security
Fall 2010/Lecture 311 CS 426 (Fall 2010) Public Key Encryption and Digital Signatures.
Distributed Publish/Subscribe Network Presented by: Yu-Ling Chang.
CS5204 – Fall Cryptographic Security Presenter: Hamid Al-Hamadi October 13, 2009.
Copyright ©1997 NetDox, Inc. All Rights Reserved. CONFIDENTIAL 1 DATE HERE Julie Grace - NetDox, Inc. Emerging Internet Commerce.
1 Introduction to Security and Cryptology Enterprise Systems DT211 Denis Manley.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
Best Practices in Deploying a PKI Solution BIEN Nguyen Thanh Product Consultant – M.Tech Vietnam
Lecture 19 Page 1 CS 111 Online Symmetric Cryptosystems C = E(K,P) P = D(K,C) E() and D() are not necessarily the same operations.
Scalable Security and Accounting Services for Content-based Publish/Subscribe Systems Himanshu Khurana NCSA, University of Illinois.
Computer Networks Ivan Marsic Rutgers University Chapter 7 – Network Security Chapter 8 – Network Monitoring Chapter 9 – Internet Protocols APPENDIX: Probability.
Guomin Yang et al. IEEE Transactions on Wireless Communication Vol. 6 No. 9 September
On P2P Collaboration Infrastructures Manfred Hauswirth, Ivana Podnar, Stefan Decker Infrastructure for Collaborative Enterprise, th IEEE International.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Cryptography  Why Cryptography  Symmetric Encryption  Key exchange  Public-Key Cryptography  Key exchange  Certification.
James Higdon, Sameer Sherwani
New Cryptographic Techniques for Active Networks Sandra Murphy Trusted Information Systems March 16, 1999.
V0.0CPSC415 Biometrics and Cryptography1 Placement of Encryption Function Lecture 3.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
Upper OSI Layers Natawut Nupairoj, Ph.D. Department of Computer Engineering Chulalongkorn University.
1 Normal executable Infected executable Sequence of program instructions Entry Original program Entry Jump Replication and payload Viruses.
Deck 10 Accounting Information Systems Romney and Steinbart Linda Batch March 2012.
Using Public Key Cryptography Key management and public key infrastructures.
Overview of Testbed Area PAWNS Testbed Secure Sensor Middleware Integrating Policy and Group Key Management Himanshu Khurana Senior Security Engineer,
Private key
Securing Broker-Less Publish/Subscribe Systems Using Identity-Based Encryption.
Network Security Celia Li Computer Science and Engineering York University.
Security Review Q&A Session May 1. Outline  Class 1 Security Overview  Class 2 Security Introduction  Class 3 Advanced Security Constructions  Class.
9.2 SECURE CHANNELS JEJI RAMCHAND VEDULLAPALLI. Content Introduction Authentication Message Integrity and Confidentiality Secure Group Communications.
Encryption Name : Maryam Mohammed Alshami ID:H
SELS: A Secure List Service Himanshu Khurana, Adam Slagell, Rafael Bonilla NCSA, University of Illinois Appeared in the ACM Symposium of Applied.
Miklós Zoltán Technical University of Vienna Distributed Systems Group
Key management issues in PGP
Computer Communication & Networks
e-Health Platform End 2 End encryption
Sindhusha Doddapaneni
IS3230 Access Security Unit 9 PKI and Encryption
به نام آنکه هستی نام از او یافت
Chinese wall model in the internet Environment
Public-Key, Digital Signatures, Management, Security
Scalable Group Key Management with Partially Trusted Controllers
Review of Cryptography: Symmetric and Asymmetric Crypto Advanced Network Security Peter Reiher August, 2014.
Presentation transcript:

SeCol: Secure Collaborative Applications using Group Communication and Publish/Subscribe Systems Himanshu Khurana NCSA

Project Overview Goal: develop novel security solutions that minimize trust liabilities in messaging infrastructures Dates: Sep 1, Aug 31, 2006 Budget: $200k Personnel Himanshu Khurana (PI) Rakesh Bobba (Security Engineer) Weiting Cao (PhD Student) Radostina Koleva (Consultant)

Introduction Collaborative applications need a messaging infrastructure E.g., conferencing uses group communication, tickers (stock, news, game-score) uses pub/sub Widespread use requires secure messaging infrastructures Integrity and authentication typically provided via CA/PKI Works but imposes certificate distribution/revocation problems Confidentiality provided by trusted servers Servers bear significant trust liability of maintaining confidentiality of messages and keys E.g., group controllers store long term and session keys Availability provided via replication However, replicating keys makes the system insecure

Introduction Challenges for minimizing trust liability Infrastructure servers must not be able to access messages However, servers often need to process these messages Solution should not require establishment of keys between collaborating entities O(n 2 ) problem and, furthermore, does not take advantage of the presence of the messaging infrastructure Solution must scale to support a large number of users Approach Explore novel proxy encryption techniques to address the problem Convert ciphertext between keys without access to plaintext Use techniques to design secure messaging infrastructures Group communication and Publish/Subscribe infrastructures

Secure Group Communication (SGC) SGC needed to support many military and commercial applications; e.g., Conferencing (Video and/or Audio), Command-and-Control Systems, Interactive Distance-Learning Group Key Management (GKM) cornerstone of SGC Involves distribution of symmetric key to group members Must be efficient and scalable Shared key changed every time a member joins/leaves group Existing GKM Schemes Logical Key Hierarchies (LKH) using Group Controllers (GC) Advantage: Very efficient, constant number of rounds Drawback: GC is completely trusted Decentralized or Contributory Schemes Advantage: Does not involve a GC Drawback: Scale poorly

TASK - Tree-based w/ Asymmetric Split Keys Efficient and Scalable Log(n) computation and storage Log(n) message size, constant number of communication rounds Partially Trusted GC GC does not store encryption keys Confidentiality maintained even if GC is compromised Therefore, GC no longer single point of security failure Instead, GC uses proxy encryption to transform messages between members for key establishment Simpler recovery from GC compromise Assumptions GC and a member are not simultaneously compromised

Difference between LKH & TASK

Goals for Y3 Complete development and testing of prototype lines code written and partially tested Extend prototype For wireless communication using Elliptic Curve Cryptography Compatibility with other reliable messaging solutions such as NORM (NRL) Address collusion problem Simultaneous compromise of member and GC reveals GKEK Explore improvements to proxy encryption (known problem) as well as alternatives

Introduction to Pub/Sub B PB SB PB SB B B B B B B B B B B B PB SB B B Border Broker Broker Publisher Subscriber Pub/Sub Infrastructure (e.g., Gryphon, Siena) Applications: software updates, location-based services, supply chain management, traffic control, and stock quote dissemination Three types: Topic-based, type-based, and content-based Content-based considered to be the most general

Security Challenges Addressed for Content-Based Pub/Sub Systems (CBPS) Confidentiality, integrity, and authentication of events Deliver information to authorized subscribers Usage-based accounting E.g., for stock quote dissemination Solution Highlights Strong adversarial model: PBs & SBs don’t trust broker network Adversary has access to CBPS network traffic and will attempt to Violate confidentiality of events by observing them Violate integrity and authentication by inserting/modifying fake events and subscriptions No security associations (e.g. keys) needed between PBs and SBs No modifications needed to existing matching & routing algorithms Scales to support an Internet-scale pub/sub infrastructure

Confidentiality Adversary has access to network traffic  contents cannot be disclosed to brokers One approach: perform computations on encrypted data Difficult to implement in practice Require modifications to matching and routing techniques Observation Only selected parts of an event’s content need to be confidential Matching and routing can be accomplished without these parts Our Approach Encode events in XML documents Selectively encrypt sensitive parts of events Use Bertino and Ferrari’s XML document dissemination techniques Distribute keys to authorized subscribers Using Jakobsson’s proxy encryption techniques

Confidentiality Examples Encrypted Packages Cleartext Event Contents Message: id 100 YHOO Message: id 100 YHOO E k (70.2) Encrypt Message: id 200 8/5/04 NY-CA 10-3 Message: id 200 8/5/04 NY-CA E k (10-3) Encrypt Enc PK (k) E k ()  symmetric key encryption (e.g., AES) using key k Enc PK ()  El Gamal public key encryption using key PK

Distributing Keys to Authorized Subscribers PB SB 123n Proxy Security and Accounting Service (PSAS) … n servers with t of n threshold key sharing of K PS Border Broker B 2 Border Broker B 1 … broker network Register/ Publish Transform Register/ Receive For each EG decryption key (K PS, PK PS ): K ps =  K PSi where K PSi is a key share held by any server i=1 t RSA Signature Key (K PS, PK PS ): K ps =  K PSi where K PSi is a key share held by any coordinator i=1 m clcl l coordinators with m of l sharing of K PS c1c1 c2c2 …

Goals for Y3 Complete scalability analysis A single PSAS can support 10s of thousands of subscribers Address potential leakage of sensitive event contents Formal security analysis of solution Implementation of prototype Leverage existing pub/sub systems Siena, supports XML encoding of events Leverage existing threshold cryptographic libraries CODEX, leverages COCA

Questions? Himanshu Khurana and Radostina Koleva, “Scalable Security and Accounting Services in Content-based Publish/Subscribe Systems”, International Journal of E-Business Research, to appear, Himanshu Khurana, “Scalable Security and Accounting Services in Content-based Publish/Subscribe Systems”, i n proceedings of the E- Commerce Track of the ACM Symposium on Applied Computing (SAC), March Himanshu Khurana, Rafael Bonilla, Adam Slagell, Raja Afandi, Hyung- Seok Hahm, and Jim Basney, “Scalable Group Key Management with Partially Trusted Controllers”, in the International Conference on Networking, Reunion Island, April Himanshu Khurana, Luke St. Clair, and Weiting Cao, “Scalable Group Key Management with Partially Trusted Controllers”, in preparation for submission to the Journal of Communication and Networking.