Paper by: Roxana Geambasu, Tadayoshi Kohno, Amit A. Levy, Henry M. Levy University of Washington Vanish: Increasing Data Privacy with Self-Destructing.

Slides:



Advertisements
Similar presentations
Secure Data Storage in Cloud Computing Submitted by A.Senthil Kumar( ) C.Karthik( ) H.Sheik mohideen( ) S.Lakshmi rajan( )
Advertisements

CHANGING THE WAY IT WORKS Cloud Computing 4/6/2015 Presented by S.Ganesh ( )
P2P data retrieval DHT (Distributed Hash Tables) Partially based on Hellerstein’s presentation at VLDB2004.
Storage management and caching in PAST, a large-scale, persistent peer-to-peer storage utility Antony Rowstron, Peter Druschel Presented by: Cristian Borcea.
II.I Selected Database Issues: 1 - SecuritySlide 1/20 II. Selected Database Issues Part 1: Security Lecture 2 Lecturer: Chris Clack 3C13/D6.
Clayton Sullivan PEER-TO-PEER NETWORKS. INTRODUCTION What is a Peer-To-Peer Network A Peer Application Overlay Network Network Architecture and System.
15.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 15: Configuring a Windows.
Telnet and FTP. Telnet Lets you use the resources of some other computer on the Internet to access files, run programs, etc. Creates interactive connection.
Cryptography. 2 Objectives Explain common terms used in the field of cryptography Outline what mechanisms constitute a strong cryptosystem Demonstrate.
Vanish: Increasing Data Privacy with Self-Destructing Data Roxana Geambasu Yoshi Kohno Amit Levy Hank Levy University of Washington.
S EMINAR A SELF DESTRUCTING DATA SYSTEM BASED ON ACTIVE STORAGE FRAMEWORK ONON P RESENTED BY S HANKAR G ADHVE G UIDED BY P ROF.P RAFUL P ARDHI.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
Security Overview Hofstra University University College for Continuing Education - Advanced Java Programming Lecturer: Engin Yalt May 24, 2006.
Content  Overview of Computer Networks (Wireless and Wired)  IP Address, MAC Address and Workgroups  LAN Setup and Creating Workgroup  Concept on.
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
Evidor: The Evidence Collector Software using for: Software for lawyers, law firms, corporate law and IT security departments, licensed investigators,
Cryptography In Censorship Resistant Web Publishing Systems By Hema Hariharan Swati B Shah.
CMSC 414 Computer and Network Security Lecture 21 Jonathan Katz.
Freenet A Distributed Anonymous Information Storage and Retrieval System I Clarke O Sandberg I Clarke O Sandberg B WileyT W Hong.
Hands-On Microsoft Windows Server 2003 Administration Chapter 5 Administering File Resources.
Stephen S. Yau CSE465 & CSE591, Fall Information Assurance (IA) & Security Overview Concepts Security principles & strategies Techniques Guidelines,
Wide-area cooperative storage with CFS
Term 2, 2011 Week 3. CONTENTS Network security Security threats – Accidental threats – Deliberate threats – Power surge Usernames and passwords Firewalls.
Pay As You Go – Associating Costs with Jini Leases By: Peer Hasselmeyer and Markus Schumacher Presented By: Nathan Balon.
Alexander Potapov.  Authentication definition  Protocol architectures  Cryptographic properties  Freshness  Types of attack on protocols  Two-way.
Christopher M. Pascucci Basic Structural Concepts of.NET Browser – Server Interaction.
Key Management Lifecycle. Cryptographic key management encompasses the entire lifecycle of cryptographic keys and other keying material. Basic key management.
INTRODUCTION TO WEB DATABASE PROGRAMMING
Defeating Vanish with Low-Cost Sybil Attacks Against Large DHTs The University of Michigan Scott Wolchok J. Alex Halderman The University of Texas at Austin.
BitTorrent Presentation by: NANO Surmi Chatterjee Nagakalyani Padakanti Sajitha Iqbal Reetu Sinha Fatemeh Marashi.
XP New Perspectives on Microsoft Office Access 2003 Tutorial 12 1 Microsoft Office Access 2003 Tutorial 12 – Managing and Securing a Database.
JavaScript, Fourth Edition
A Survey on Secure Cloud Data Storage ZENG, Xi CAI, Peng
CIS 450 – Network Security Chapter 8 – Password Security.
Peer to Peer Research survey TingYang Chang. Intro. Of P2P Computers of the system was known as peers which sharing data files with each other. Build.
Click to edit Master title style Fall, Privacy&Security - Virginia Tech – Computer Science Cryptographic Security Secret Sharing, Vanishing Data.
| nectar.org.au NECTAR TRAINING Module 5 The Research Cloud Lifecycle.
Cryptography, Authentication and Digital Signatures
Chapter 8 Cookies And Security JavaScript, Third Edition.
Vanish: Increasing Data Privacy with Self-Destructing Data Roxana Geambasu, Tadayoshi Kohno, Amit Levy, et al. University of Washington USENIX Security.
Cryptographic Security Secret Sharing, Vanishing Data 1Dennis Kafura – CS5204 – Operating Systems.
Vanish: Increasing Data Privacy with Self-Destructing Data Roxana Geambasu Tadayoshi Kohno Amit A. Levy Henry M. Levy University of Washington.
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
Vanish: Increasing Data Privacy with Self-Destructing Data Roxana Geambasu | Tadayoshi Kohno | Amit A. Levy | Henry M. Levy Presented by: Libert Tapia.
STATE MANAGEMENT.  Web Applications are based on stateless HTTP protocol which does not retain any information about user requests  The concept of state.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
By Gianluca Stringhini, Christopher Kruegel and Giovanni Vigna Presented By Awrad Mohammed Ali 1.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”. © 2016 Pearson.
Chap1: Is there a Security Problem in Computing?.
Unit 9: Distributing Computing & Networking Kaplan University 1.
Microsoft FrontPage 2003 Illustrated Complete Integrating a Database with a Web Site.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
© ITT Educational Services, Inc. All rights reserved. IS3230 Access Security Unit 6 Implementing Infrastructure Controls.
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
| nectar.org.au NECTAR TRAINING Module 5 The Research Cloud Lifecycle.
TrustMe: Anonymous Management of Trust Relationships in Decentralized P2P System Aameek Singh, Ling Liu College of Computing, Georgia Tech International.
File Transfer And Access (FTP, TFTP, NFS). Remote File Access, Transfer and Storage Networks For different goals variety of approaches to remote file.
Dos and Don’ts of Client Authentication on the Web Kevin Fu, Emil Sit, Kendra Smith, Nick Feamster Presented: Jesus F. Morales.
Cloud Archive By: Kimberly Nolan. What it is?  The goal of a cloud archiving service is to provide a data storage (ex. Google drive and SkyDrive) as.
VPN. CONFIDENTIAL Agenda Introduction Types of VPN What are VPN Tokens Types of VPN Tokens RSA How tokens Work How does a user login to VPN using VPN.
Fall 2006CS 395: Computer Security1 Key Management.
CS457 Introduction to Information Security Systems
Key management issues in PGP
Searchable Encryption in Cloud
USAGE OF CRYPTOGRAPHY IN NETWORK SECURITY
CHAPTER 3 Architectures for Distributed Systems
IS3230 Access Security Unit 9 PKI and Encryption
Vanish: Increasing Data Privacy with Self-Destructing Data
ONLINE SECURE DATA SERVICE
Presentation transcript:

Paper by: Roxana Geambasu, Tadayoshi Kohno, Amit A. Levy, Henry M. Levy University of Washington Vanish: Increasing Data Privacy with Self-Destructing Data Paper by: Roxana Geambasu, Tadayoshi Kohno, Amit A. Levy, Henry M. Levy University of Washington Presented by: Carlos Leon Monday April 1 st, 2013

1.INTRODUCTION Increasing reliance on Web services causes personal data to be cached, copied, and archived by third parties, often without our knowledge or control. The disclosure of private data has become commonplace due to carelessness, theft, or legal actions. Act of storing data indefinitely at intermediate locations creates a potential privacy risk. Main idea: Applications could benefit from self destructing data such as: private s (gmail/hotmail), backup systems.

“Don’t ever say anything on or text messaging that you don’t want to come back and bite you” EXAMPLE:

2.GOALS Protect the privacy of past, archived data against accidental, malicious and legal attacks (e.g. s, Trash Bin). Ensure that all copies of certain data become unreadable after a user-specified time, without any specific action on the part of a user. Even if an attacker obtains both a cached copy and the user’s cryptographic keys and passwords.

3.OVERALL CONCEPT All users need to keep certain data for only a limited period of time. After that time, access to that data should be revoked for everyone, including: o The legitimate users of that data. o The known or unknown entities holding copies of it o And the attackers. The unavailability of the data would be guaranteed even if the forensic examiner is given a pristine copy of the hard drive from before the files self-destructed o E.g., because the machines were confiscated as part of a raid.

4.VANISH PRINCIPLES Novel integration of cryptographic techniques. Leverage the services provided by decentralized, global-scale P2P infrastructures and distributed hash tables (DHTs). Use the million-plus-node Vuze Bit-Torrent DHT and the restricted-membership OpenDHT. Also, two applications that they prototyped on Vanish: 1. Firefox plugin for Gmail and other Web sites. 2. A sel-destructing file management application.

4.VANISH PRINCIPLES(Cont.) 1.Vanish DATA: Without the use of any explicit delete action by the user or the parties storing that data. 2.Vanish DATA: Without needing to modify any of the stored or archived copies of that data. 3.Vanish DATA: Without the use of secure hardware. 4.Vanish DATA: Without relying on the introduction of any new external services that would need to be deployed (whether trusted or not).

5.VDO-CONCEPT#1 Vanish Introduces the notion of VDO (Vanishing Data Object): – It encapsulates the user’s data (such as a file or message) and prevents its contents from persisting indefinitely and becoming a source of retroactive information leakage. – Regardless of whether the VDO is copied, transmitted, or stored in the internet, it becomes unreadable after a predefined period of time even if an attacker retroactively obtains both a pristine copy of the VDO from before its expiration, and all of the user’s past persistent cryptographic keys and passwords.

5.VDO-CONCEPT#1 Timeline for VDO USAGE AND ATTACK

5.1 VDO PROPERTIES  Destruction after timeout: A VDO must expire automatically and without any explicit action on the part of its users or any party storing a copy of the VDO. Once expired, the VDO must also be inaccessible to any party who obtains a pristine copy of the VDO from prior to its expiration.  Accessible until timeout: During its lifetime, a VDO’s contents should be available to legitimate users.  Leverage existing infrastructures: The system must leverage existing infrastructures. It must not rely on external, special- purpose dedicated services.

5.1 VDO PROPERTIES (cont.)  No secure hardware: The system must not require the use of dedicated secure hardware.  No new privacy risks: The system should not introduce new privacy risks to the users.

6.DHT-CONCEPT#2 DHT: Distributed Hash Table  Peer-to peer (P2P) storage network with multiple nodes.  DHT exhibit a put/get interface for reading and storing data.  It implements (3) operations: lookup, get, and store.  The data itself consists of an (index, value) pair.  Each node in the DHT manages a part of an astronomically large index name space (e.g., 2160 values for Vuze).

6.1 DHT FOR VANISH STEP 1-LOOKUP NODE: A user performs a lookup to determine the nodes responsible for the index STEP 2-STORE DATA: A user issues a store to the responsible node, who saves that (index, value) pair in its local DHT database. STEP 3: RETRIEVE DATA: A user would lookup the nodes responsible for the index and then issue get requests to those nodes in order to retrieve the value at a particular index. DHT may replicate data on multiple nodes to increase availability.

6.2 DHT PROPERTIES 1.Availability: Provide good availability of data prior to a specific timeout. (e.g., Vuze has a fixed 8-hour timeout, OpenDHT has a timeout of up to one week) 2.Scale, geographic distribution, and decentralization: Measurement studies of the Vuze and Mainline DHTs estimate in excess of one million simultaneously active nodes in each of the two networks. 3.Churn: DHTs evolve naturally and dynamically over time as new nodes constantly join and old nodes leave. The average lifetime of a node in the DHT varies across networks and has been measured from minutes.

7.VANISH ARCHITECTURE

8. VANISH SYSTEM: OVERALL Vanish takes a data object D (and possibly an explicit timeout T), and encapsulates it into a VDO. To encapsulate the data D, Vanish picks a random data key, K, and encrypts D with K to obtain a ciphertext C. Vanish uses threshold secret sharing to split the data key K into N pieces (shares) K1,...,KN. A parameter of the secret sharing is a threshold that can be set by the user or by the application.

8.VANISH SYSTEM: OVERALL (cont.) The threshold determines how many of the N shares are required to reconstruct the original key. Example: if we split the key into N = 20 shares and the threshold is 10 keys, then we can compute the key given any 10 of the 20 shares. Once Vanish has computed the key shares, it picks at random an access key, L. It then uses a cryptographically secure pseudorandom number generator, keyed by L, to derive N indices into the DHT, I1,..., IN. Vanish then sprinkles the N shares K1,...,KN at these pseudorandom locations throughout the DHT.

8. VANISH SYSTEM:OVERALL (cont.) Vanish stores the share Ki at index Ii in the DHT. If the DHT allows a variable timeout (OpenDHT), Vanish will also set the user-chosen timeout T for each share. The final VDO V consists of (L,C,N) and is sent over to the server or stored in the file system upon encapsulation At this point, the VDO becomes permanently unavailable.

9. VANISH DECAPSULATION The de-capsulation of V happens in the natural way: 1.Vanish extracts the access key, L. 2.Vanish derives the locations of the shares of K. 3.Vanish retrieves the required number of shares as specified by the threshold. 4.Vanish reconstructs K. 5.Vanish decrypts C to obtain D.

10.PROTOTYPE APPLICATIONS 1.FIRE VANISH: Firefox plugin for the popular Gmail service that provides the option of sending and reading self-destructing s. No requires no server-side changes. Vanish daemon jobs to transform an into a VDO (sending it and extracting data from Gmail). The user can optionally wrap the VDO in GPG (Gnu Privacy Guard for increased protection against malicious services.

10.PROTOTYPE APPLICATIONS 2. FIRE VANISH EXTENSION FOR THE WEB: A Firefox user can select text in any Web page input box, right click on that selected text (FireVanish replaces that text inline with an ecapsulated VDO) When reading a Web page containing a VDO, a user can select that VDO and right click to decapsulate it (FireVanish leaves the VDO in place and displays the cleartext in a separate popup window)

10.PROTOTYPE APPLICATIONS Web-Wide Applicability of Vanish

11.SECURITY ANALYSIS Vanish does not introduce any new threats to privacy. Vanish is secure against adversaries attempting to Retroactively read a VDO post-expiration. For the experimental attacks, they leverage Amazon’s EC2 cloud service to create a Vuze deployment and to emulate attacks against medium-scale DHTs.

11.SECURITY ANALYSIS (CONT.) 1.Avoiding Retroactive Privacy Attacks:  De-capsulate VDO Prior to Expiration.  Sniff User’s Internet Connection.  Integrate into DHT. 2.Privacy Against DHT-Integrated Adversaries:  The Store Sniffing Attack.  The lookup Sniffing Attack.  Standard DHT Attacks.

12. STRENGTHS Proof-of concept Vanish prototype, which is capable of using either: – Bittorrent’s Vuze DHT client : support 8-hour timeouts in the basic Vanish usage model. – PlanetLabhosted openDHT : support timeouts up to one week. Vanish targets post-facto, retroactive attacks; that is, it defends the user against future attacks on old, forgotten, or unreachable copies of data. The attacker’s job is very difficult, since he must develop an infrastructure capable of attacking all users at all times.

12.STRENGTHS (cont.) Prototype system and applications are deployable today using existing DHTs, while achieving acceptable performance 1. Time-limited value: The VDO will be used to encapsulate data that is only of value to the user for a limited period of time. 2. Known timeout. When a user encapsulates data in a VDO, he knows the approximate lifetime that he wants for his VDO.

12.STRENGTHS (cont.) 3. Internet connectivity. Users are connected to the Internet when interacting with VDOs. Also Internet connectivity is not required for deletion. VDO will become unreadable even if connectivity is removed from its storage site (or if that storage site is offline. 4. Dispensability under attack. Rather than risk exposure to an adversary, the user prefers the VDO to be destroyed, even if Prematurely.

12.STRENGTHS (cont.) The constant churn in the DHT is an advantage, because it means that data stored in DHTs will naturally and irreversibly disappear over time as the DHT evolves. e.g: In many cases, trying to determine the contents of the DHT one week in the past let alone several months or years may be impossible, because many of the nodes storing DHT data will have left or changed their locations in the index space.

13.WEAKNESS This mechanism is NOT universally applicable to all users or data types. They focus in particular on sensitive data that a user would prefer to see destroyed early rather than fall into the wrong hands. Vanish applications may compose VDOs with traditional encryption systems like PGP and GPG. In this case, the user will naturally need to manipulate the PGP/GPG keys and passphrases. we do not defend against denial of service attacks that could prevent reading of the data during its lifetime.

13.WEAKNESS Implications to Vanish are unclear : the use of Vanish might raise new legal implications. In particular, the new “eDiscovery” rules embraced by the U.S. may require a user to preserve s and other data once in anticipation of a Litigious action.

CONCLUSIONS Practical to use and it meets functionality, security, and performance properties. Both individuals and corporations could benefit from self- destructing s. With self-destructing data, users can regain control over the lifetimes of their Web objects, such as private messages on Facebook, documents on Google Docs, or private photos on Flickr. Researchers designed both the system and applications to be composable with other systems to support defense-in-depth. (Vanish Gmail plugin can be composed with GPG in order to avoid VDO sniffing by malicious services.

Questions?