This document is for academic purposes only. © 2012 Department of Computer Science, Hong Kong Baptist University. All rights reserved. 1 Authenticating.

Slides:



Advertisements
Similar presentations
An Alternative to Short Lived Certificates By Vipul Goyal Department of Computer Science & Engineering Institute of Technology Banaras Hindu University.
Advertisements

Finding the Sites with Best Accessibilities to Amenities Qianlu Lin, Chuan Xiao, Muhammad Aamir Cheema and Wei Wang University of New South Wales, Australia.
CSC 774 Advanced Network Security
Computer Science and Engineering Inverted Linear Quadtree: Efficient Top K Spatial Keyword Search Chengyuan Zhang 1,Ying Zhang 1,Wenjie Zhang 1, Xuemin.
Quality Aware Privacy Protection for Location-based Services Zhen Xiao, Xiaofeng Meng Renmin University of China Jianliang Xu Hong Kong Baptist University.
CSC 774 Advanced Network Security
School of Computer Science and Engineering Finding Top k Most Influential Spatial Facilities over Uncertain Objects Liming Zhan Ying Zhang Wenjie Zhang.
Digital Signatures and Hash Functions. Digital Signatures.
Mohamed F. Mokbel University of Minnesota
A Generic Framework for Handling Uncertain Data with Local Correlations Xiang Lian and Lei Chen Department of Computer Science and Engineering The Hong.
Environmental Council of States Network Authentication and Authorization Services The Shared Security Component February 28, 2005.
SIA: Secure Information Aggregation in Sensor Networks Bartosz Przydatek, Dawn Song, Adrian Perrig Carnegie Mellon University Carl Hartung CSCI 7143: Secure.
Using Secure Coprocessors to Protect Access to Enterprise Networks Dr. José Carlos Brustoloni Dept. Computer Science University of Pittsburgh
1 Dynamic Key-Updating: Privacy- Preserving Authentication for RFID Systems Li Lu, Lei Hu State Key Laboratory of Information Security, Graduate School.
B+-tree and Hashing.
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation Edith C.H. Ngai and Michael R.
Optimization of Spatial Joins on Mobile Devices N. Mamoulis 1, P. Kalnis 2, S. Bakiras 3, X. Li 2 1 Department of Computer Science and Information Systems,
Computer Science Spatio-Temporal Aggregation Using Sketches Yufei Tao, George Kollios, Jeffrey Considine, Feifei Li, Dimitris Papadias Department of Computer.
1 SINA: Scalable Incremental Processing of Continuous Queries in Spatio-temporal Databases Mohamed F. Mokbel, Xiaopeng Xiong, Walid G. Aref Presented by.
Privacy-Preserving Cross-Domain Network Reachability Quantification
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Privacy and Integrity Preserving in Distributed Systems Presented for Ph.D. Qualifying Examination Fei Chen Michigan State University August 25 th, 2009.
DSAC (Digital Signature Aggregation and Chaining) Digital Signature Aggregation & Chaining An approach to ensure integrity of outsourced databases.
Privacy-Preserving Computation and Verification of Aggregate Queries on Outsourced Databases Brian Thompson 1, Stuart Haber 2, William G. Horne 2, Tomas.
1 SINA: Scalable Incremental Processing of Continuous Queries in Spatio-temporal Databases Mohamed F. Mokbel, Xiaopeng Xiong, Walid G. Aref Presented by.
APPLAUS: A Privacy-Preserving Location Proof Updating System for Location-based Services Zhichao Zhu and Guohong Cao Department of Computer Science and.
DSAC (Digital Signature Aggregation and Chaining) Digital Signature Aggregation & Chaining An approach to ensure integrity of outsourced databases.
SIA: Secure Information Aggregation in Sensor Networks Dhiman Barman Authors: Bartosz Przydateck, Dawn Song, and Adrian Perrig CMU SenSys 2003.
Database Laboratory Regular Seminar TaeHoon Kim.
Yin Yang, Dimitris Papadias, Stavros Papadopoulos HKUST, Hong Kong Panos Kalnis KAUST, Saudi Arabia Providence, USA, 2009.
Cong Wang1, Qian Wang1, Kui Ren1 and Wenjing Lou2
Construction of efficient PDP scheme for Distributed Cloud Storage. By Manognya Reddy Kondam.
VLDB '2006 Haibo Hu (Hong Kong Baptist University, Hong Kong) Dik Lun Lee (Hong Kong University of Science and Technology, Hong Kong) Victor.
An Ad Hoc Group Signature Scheme for Accountable and Anonymous Access to Outsourced Data Chuang Wang a,b and Wensheng Zhang a a Department of Computer.
Qian Chen, Haibo Hu, Jianliang Xu Hong Kong Baptist University Authenticated Online Data Integration Services1.
Computer Science iBigTable: Practical Data Integrity for BigTable in Public Cloud CODASPY 2013 Wei Wei, Ting Yu, Rui Xue 1/40.
02/22/2005 Joint Seminer Satoshi Koga Information Technology & Security Lab. Kyushu Univ. A Distributed Online Certificate Status Protocol with Low Communication.
Certification asynchrone à grande échelle avec des arbres de vérification de certificats Josep Domingo-Ferrer Universitat Rovira i Virgili
Computer Science Integrity Assurance for Outsourced Databases without DBMS Modification DBSec 2014 Wei Wei, Ting Yu 1.
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
How far removed are you? Scalable Privacy-Preserving Estimation of Social Path Length with Social PaL Marcin Nagy joint work with Thanh Bui, Emiliano De.
sec1 IEEE MEDIA INDEPENDENT HANDOVER DCN: sec Title: TGa_Proposal_Antonio_Izquierdo (Protecting the Information Service.
SIA: Secure Information Aggregation in Sensor Networks B. Przydatek, D. Song, and A. Perrig. In Proc. of ACM SenSys 2003 Natalia Stakhanova cs610.
1 SpaceTwist: A Flexible Approach for Hiding Query User Location Speaker: Man Lung Yiu Aalborg University Joint work with Christian S. Jensen, Xuegang.
ASYNCHRONOUS LARGE-SCALE CERTIFICATION BASED ON CERTIFICATE VERIFICATION TREES Josep Domingo-Ferrer, Marc Alba and Francesc Sebé Dept. of Computer Engineering.
Merkle trees Introduced by Ralph Merkle, 1979 An authentication scheme
Computer Science CSC 774 Adv. Net. Security1 Presenter: Tong Zhou 11/21/2015 Practical Broadcast Authentication in Sensor Networks.
Qian Chen, Haibo Hu, Jianliang Xu Hong Kong Baptist University Authenticating Top-k Queries in Location-based Services with Confidentiality1.
QED: A Novel Quaternary Encoding to Completely Avoid Re-labeling in XML Updates Changqing Li,Tok Wang Ling.
Shambhu Upadhyaya 1 Ad Hoc Networks – Network Access Control Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 20)
A Hybrid Technique for Private Location-Based Queries with Database Protection Gabriel Ghinita 1 Panos Kalnis 2 Murat Kantarcioglu 3 Elisa Bertino 1 1.
Location Privacy Protection for Location-based Services CS587x Lecture Department of Computer Science Iowa State University.
Efficient OLAP Operations in Spatial Data Warehouses Dimitris Papadias, Panos Kalnis, Jun Zhang and Yufei Tao Department of Computer Science Hong Kong.
1 CSIS 7101: CSIS 7101: Spatial Data (Part 1) The R*-tree : An Efficient and Robust Access Method for Points and Rectangles Rollo Chan Chu Chung Man Mak.
Efficient Processing of Updates in Dynamic XML Data Changqing Li, Tok Wang Ling, Min Hu.
Jonathan Katz University of Maryland Andrew Lindell Aladdin Knowledge Systems and Bar-Ilan University 04/08/08 CRYP-108 Aggregate Message- Authentication.
Privacy-Preserving and Content-Protecting Location Based Queries.
Secure Data Outsourcing
 Attacks and threats  Security challenge & Solution  Communication Infrastructure  The CA hierarchy  Vehicular Public Key  Certificates.
Center for E-Business Technology Seoul National University Seoul, Korea Private Queries in Location Based Services: Anonymizers are not Necessary Gabriel.
Presented by Edith Ngai MPhil Term 3 Presentation
Authenticated Join Processing in Outsourced Databases
Efficient CRT-Based RSA Cryptosystems
CS/ECE 478 Introduction to Network Security
Fast Nearest Neighbor Search on Road Networks
You Lu, Zhiyang Wang, Yu-Ting Yu, Mario Gerla
Hash-based Primitives Credits: Dr. Peng Ning and Dr. Adrian Perrig
Continuous Density Queries for Moving Objects
University of Cyprus By: Nectarios Efstathiou
Ensuring Correctness over Untrusted Private Database
Presentation transcript:

This document is for academic purposes only. © 2012 Department of Computer Science, Hong Kong Baptist University. All rights reserved. 1 Authenticating Location-based Services without Compromising Privacy Haibo Hu Jianliang Xu Qian Chen Ziwei Yang Hong Kong Baptist University

This document is for academic purposes only. © 2012 Department of Computer Science, Hong Kong Baptist University. All rights reserved. 2 Motivating Example A typical LBS business model consists of a location registry, a service provider (3 rd party app.), and a client (typically mobile).

This document is for academic purposes only. © 2012 Department of Computer Science, Hong Kong Baptist University. All rights reserved. 3 Motivating Example (Cont’d) LBS service providers may not be trusted in terms of the service/query result –“nearby location-based restaurant browsing” may fake the number of diners in favor of “sponsored restaurants” –“online traffic monitoring” may provide delayed or inaccurate congestion reports to free users. Our problem: the query client needs to authenticate the result of the service without disclosing user locations –Soundness –Completeness –Freshness

This document is for academic purposes only. © 2012 Department of Computer Science, Hong Kong Baptist University. All rights reserved. 4 Roadmap Motivation and Problem Preliminary Baseline R-tree based Scheme Grid-file based Schemes Analysis and Optimizations Experimental Results Conclusion

This document is for academic purposes only. © 2012 Department of Computer Science, Hong Kong Baptist University. All rights reserved. 5 Background: Authentication on Indexed Data Merkle Hash Tree (1980) –VO includes the digests of N 1 and N 4 (i.e. h(d 1 ) and h(d 4 )) and the signed root digest N –The client computes h(d 1 ) and h(d 2 ), then N 12 = h( h(d 1 ) | h(d 2 )), and finally N 1234 = h( N 12 | N 34 ). This computed root digest is then compared with the signed root digest in the VO. Signature Chaining (SC) [ICDE’04] –VO includes: (1) the signatures of d 2 and d 3, and (2) the boundary values d 1 and d 4. –The client verify: (1) the two boundary values fall outside the query range, and (2) all signatures are valid –To reduce bandwidth, signatures can be aggregated into a single signature. In addition to the results, the server also sends a verification object (VO) to the client, based on which the client verifies the authenticity through some signature(s) from the data owner. Better for sorted data

This document is for academic purposes only. © 2012 Department of Computer Science, Hong Kong Baptist University. All rights reserved. 6 Preliminary: Privacy-Preserving Authentication 1D range query [α, β] on B + -tree indexed data and the result is {r a, r a+1, …, r b } Authentication on the following 3 conditions –Soundness 1: r a, r a+1, …, r b (and their ids) are not tampered with –Completeness: no other user has such x that α ≤ x ≤ β –Soundness 2: r a ≥ α, r a-1 β. [SIGMOD’05] Pang et al. designed a proof for verifying x ≥ y without disclosing x –The client and server jointly compute the digest g of value x: the server first computes g(x-y) and sends it to the client, The client then computes g(x) = g(x-y) ⊗ g(y), where ⊗ is a well defined operation on the digest. The digest function g() has a nature that accepts only non-negative numbers. As such, by sending g(x - y), the server proves x ≥ y. Merkle or V B-tree Hard if r i cannot be disclosed

This document is for academic purposes only. © 2012 Department of Computer Science, Hong Kong Baptist University. All rights reserved. 7 Verification Object for 1D Range Query

This document is for academic purposes only. © 2012 Department of Computer Science, Hong Kong Baptist University. All rights reserved. 8 Roadmap Motivation and Problem Preliminary Baseline R-tree based Scheme Grid-file based Schemes Analysis and Optimizations Experimental Results Conclusion

This document is for academic purposes only. © 2012 Department of Computer Science, Hong Kong Baptist University. All rights reserved. 9 Verification for 2D Range Queries on R-tree Challenge: leaf level entries of the index are not sorted. Quick patch: boundary verification on every node where the query stops branching

This document is for academic purposes only. © 2012 Department of Computer Science, Hong Kong Baptist University. All rights reserved. 10 Issues Disclosure of Relative Positions –N 11 is to the west of Q because N 11 ’s x upper bound is compared with Q’s x lower bound Big VO size for small query –As of all MHT-based schemes, a lot of digests of intermediate nodes must be sent to the client to compute the root digest. –An extreme case, Q is contained in only 1 leaf node. The total number of g()-related digest components is O(fh), where f = tree fanout, and h = tree depth

This document is for academic purposes only. © 2012 Department of Computer Science, Hong Kong Baptist University. All rights reserved. 11 Eliminating the Disclosure of Relative Positions Cause: “|” concatenation enforces order Solution: replace “|” with an order insensitive (i.e., commutative) operator –Modular multiplication –Dig(x) = h( x 1 | x 2 | … | x m ) → Dig(x) = h( h(x 1 ) x h(x 2 ) x … x h(x m ) mod n), where n=pq, two large primes –The latter not also remove relative position disclosure, but also guarantees stronger authenticity Hardness of quadratic residuosity problem Irreversible and one-way hashing

This document is for academic purposes only. © 2012 Department of Computer Science, Hong Kong Baptist University. All rights reserved. 12 Roadmap Motivation and Problem Preliminary Baseline R-tree based Scheme Grid-file based Schemes Analysis and Optimizations Experimental Results Conclusion

This document is for academic purposes only. © 2012 Department of Computer Science, Hong Kong Baptist University. All rights reserved. 13 Reducing VO for Small Q: Grid-File Index Grid-file index forces the index nodes to regain linearity by imposing an order on the grid cells. Every cell is signed –The signature chains all neighboring 4 cells.

This document is for academic purposes only. © 2012 Department of Computer Science, Hong Kong Baptist University. All rights reserved. 14 A Step Further: Accumulative Digest Problems in grid-file index –Number of signatures sent to the client = number of cells If updates are minimum, we can chain the cells in the digest level, instead of in the signature level VO contains the signatures of –the bottom right cell, C(4,3). –the two cells that are immediate left and top to the top left cell: C(2,1)

This document is for academic purposes only. © 2012 Department of Computer Science, Hong Kong Baptist University. All rights reserved. 15 Security Analysis Threats: –the client may infer the locations of returned users from the VO –the SP dishonestly returning wrong results. Security results obtained by proof by simulation The R-tree based scheme privately authenticates the query result. The grid/accu_grid based scheme privately authenticates the query result if the grid is defined as a “loose grid”.

This document is for academic purposes only. © 2012 Department of Computer Science, Hong Kong Baptist University. All rights reserved. 16 Optimization 1: Linear Ordering Impose a linear order wherever no order exists Simplest order is x (or y) order Applicable to child nodes in R- tree or objects in a grid cell Disadvantages: –Low locality –Cause rearranging entries when insertion

This document is for academic purposes only. © 2012 Department of Computer Science, Hong Kong Baptist University. All rights reserved. 17 Optimization 2: Linear Embedding Use global order instead of local order Use Hilbert value for order to preserve locality

This document is for academic purposes only. © 2012 Department of Computer Science, Hong Kong Baptist University. All rights reserved. 18 Roadmap Motivation and Problem Preliminary Baseline R-tree based Scheme Grid-file based Schemes Analysis and Optimizations Experimental Results Conclusion

This document is for academic purposes only. © 2012 Department of Computer Science, Hong Kong Baptist University. All rights reserved. 19 Experimental Settings Dataset: California MAF/TIGER database. –2,249,727 points Server: Dual 4-core Intel Xeon X GHz CPU and 32GB RAM, running GNU/Linux, OpenJDK 1.6 Client: Core 2 Quad processor and 4GB RAM, WinXP Network: 2Mbps download and 1Mbps upload h() = SHA1 (160 bits) g(), the same as [SIGMOD’05] from Pang et al.

This document is for academic purposes only. © 2012 Department of Computer Science, Hong Kong Baptist University. All rights reserved. 20 Basic Authentication Performance T The query response time indicates the winner is accu_grid for small/medium queries, and is R-tree for extremely large queries.

This document is for academic purposes only. © 2012 Department of Computer Science, Hong Kong Baptist University. All rights reserved. 21 Performance with Optimizations For small queries, the VO reduction is significant, and the overall performance always improves.

This document is for academic purposes only. © 2012 Department of Computer Science, Hong Kong Baptist University. All rights reserved. 22 Conclusion Authenticable location-based services are essential to take the mobile service to a new level. We propose a privacy-preserving solution to authenticate a range query result without disclosing the location of any user. Some ongoing work: –We are investigating privacy-preserving authentication for k nearest neighbor queries. –May require a binary comparison protocol while both sides should preserve privacy.

This document is for academic purposes only. © 2012 Department of Computer Science, Hong Kong Baptist University. All rights reserved. 23