Privacy Preserving Payments in Credit Networks By: Moreno-Sanchez et al from Saarland University Presented By: Cody Watson Some Slides Borrowed From NDSS’15.

Slides:



Advertisements
Similar presentations
ACHIEVING NETWORK LEVEL PRIVACY IN WIRELESS SENSOR NETWORKS.
Advertisements

Trusted Data Sharing over Untrusted Cloud Storage Provider Gansen Zhao, Chunming Rong, Jin Li, Feng Zhang, and Yong Tang Cloud Computing Technology and.
Secure Multiparty Computations on Bitcoin
Trust relationships in sensor networks Ruben Torres October 2004.
ITIS 6200/ Secure multiparty computation – Alice has x, Bob has y, we want to calculate f(x, y) without disclosing the values – We can only do.
Location Based Trust for Mobile User – Generated Content : Applications, Challenges and Implementations Presented By : Anand Dipakkumar Joshi USC.
Lect. 18: Cryptographic Protocols. 2 1.Cryptographic Protocols 2.Special Signatures 3.Secret Sharing and Threshold Cryptography 4.Zero-knowledge Proofs.
Beyond Trilateration: On the Localizability of Wireless Ad Hoc Networks Reported by: 莫斌.
Security and Privacy Issues in Wireless Communication By: Michael Glus, MSEE EEL
Cryptography. 2 Objectives Explain common terms used in the field of cryptography Outline what mechanisms constitute a strong cryptosystem Demonstrate.
Opening Presentation of Notary Reqs 8/5/2004 Tobias Gondrom.
Madhavi W. SubbaraoWCTG - NIST Dynamic Power-Conscious Routing for Mobile Ad-Hoc Networks Madhavi W. Subbarao Wireless Communications Technology Group.
The Cache Location Problem IEEE/ACM Transactions on Networking, Vol. 8, No. 5, October 2000 P. Krishnan, Danny Raz, Member, IEEE, and Yuval Shavitt, Member,
1 Complexity of Network Synchronization Raeda Naamnieh.
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
FIT3105 Smart card based authentication and identity management Lecture 4.
An architecture for Privacy Preserving Mining of Client Information Jaideep Vaidya Purdue University This is joint work with Murat.
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation Edith C.H. Ngai and Michael R.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
Privacy-Preserving Cross-Domain Network Reachability Quantification
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Performance Comparison of Existing Leader Election Algorithms for Dynamic Networks Mobile Ad Hoc (Dynamic) Networks: Collection of potentially mobile computing.
1 Detecting Logic Vulnerabilities in E- Commerce Applications Presenter: Liu Yin Slides Adapted from Fangqi Sun Computer Science Department College of.
Abstract Shortest distance query is a fundamental operation in large-scale networks. Many existing methods in the literature take a landmark embedding.
SIDE CHANNEL ATTACKS Presented by: Vishwanath Patil Abhay Jalisatgi.
Pay As You Go – Associating Costs with Jini Leases By: Peer Hasselmeyer and Markus Schumacher Presented By: Nathan Balon.
Toward Prevention of Traffic Analysis Fengfeng Tu 11/26/01.
ObliviStore High Performance Oblivious Cloud Storage Emil StefanovElaine Shi
Mitigating DoS Attacks against Broadcast Authentication in Wireless Sensor Networks Peng Ning, An Liu North Carolina State University and Wenliang Du Syracuse.
Privacy-Preserving P2P Data Sharing with OneSwarm -Piggy.
An Efficient Identity-based Cryptosystem for
CS223 Algorithms D-Term 2013 Instructor: Mohamed Eltabakh WPI, CS Introduction Slide 1.
M i SMob i S Mob i Store - Mobile i nternet File Storage Platform Chetna Kaur.
Secure Incremental Maintenance of Distributed Association Rules.
Terminodes and Sybil: Public-key management in MANET Dave MacCallum (Brendon Stanton) Apr. 9, 2004.
02/22/2005 Joint Seminer Satoshi Koga Information Technology & Security Lab. Kyushu Univ. A Distributed Online Certificate Status Protocol with Low Communication.
Parallel and Distributed IR. 2 Papers on Parallel and Distributed IR Introduction Paper A: Inverted file partitioning schemes in Multiple Disk Systems.
Protecting Sensitive Labels in Social Network Data Anonymization.
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
Topic: P2P Trading in Social Networks: The Value of Staying Connected The purpose of this paper is to propose a P2P incentive paradigm named Networked.
Presented by: Suparita Parakarn Kinzang Wangdi Research Report Presentation Computer Network Security.
Efficient Labeling Scheme for Scale-Free Networks The scheme in detailsPerformance of the scheme First we fix the number of hubs (to O(log(N))) and show.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #22 Secure Web Information.
Xiaowei Ying, Xintao Wu Dept. Software and Information Systems Univ. of N.C. – Charlotte 2008 SIAM Conference on Data Mining, April 25 th Atlanta, Georgia.
1 Service Sharing with Trust in Pervasive Environment: Now it’s Time to Break the Jinx Sheikh I. Ahamed, Munirul M. Haque and Nilothpal Talukder Ubicomp.
OBJECTIVES  To understand the concept of Electronic Payment System and its security services.  To bring out solution in the form of applications to.
Measuring Behavioral Trust in Social Networks
Dzmitry Kliazovich University of Luxembourg, Luxembourg
Bloom Cookies: Web Search Personalization without User Tracking Authors: Nitesh Mor, Oriana Riva, Suman Nath, and John Kubiatowicz Presented by Ben Summers.
Privacy Preserving in Social Network Based System PRENTER: YI LIANG.
Vijay V Vijayakumar.  Implementations  Server Side Security  Transmission Security  Client Side Security  ATM’s.
Electronic Banking & Security Electronic Banking & Security.
Prof. Reuven Aviv, Nov 2013 Public Key Infrastructure1 Prof. Reuven Aviv Tel Hai Academic College Department of Computer Science Public Key Infrastructure.
TBAS: Enhancing Wi-Fi Authentication by Actively Eliciting Channel State Information Muye Liu, Avishek Mukherjee, Zhenghao Zhang, and Xiuwen Liu Florida.
Presented by Edith Ngai MPhil Term 3 Presentation
CSE 4095 Lecture 22 – BlockChain Slides adapted from Claudio Orlandi.
OblivP2P: An Oblivious Peer-to-Peer Content Sharing System
Hybrid Cloud Architecture for Software-as-a-Service Provider to Achieve Higher Privacy and Decrease Securiity Concerns about Cloud Computing P. Reinhold.
Anonymous Communication
Bitcoin - a distributed virtual currency system
OblivP2P: An Oblivious Peer-to-Peer Content Sharing System
Phillipa Gill University of Toronto
Bitcoin: A New Internet Currency
Path key establishment using multiple secured paths in wireless sensor networks CoNEXT’05 Guanfeng Li  University of Pittsburgh, Pittsburgh, PA Hui Ling.
Anonymous Communication
ELECTRONIC PAYMENT SYSTEM.
Resource Allocation for Distributed Streaming Applications
Anonymous Communication
A Light-weight Oblivious Transfer Protocol Based on Channel Noise
Presentation transcript:

Privacy Preserving Payments in Credit Networks By: Moreno-Sanchez et al from Saarland University Presented By: Cody Watson Some Slides Borrowed From NDSS’15 Conference

What is a Credit Network? Weighted directed graph used to represent credit The graph represents unconsumed credit Credit paths can have multiple different nodes Banks and third parties can be intricately incorporated into the network

Real Life Example I need 100$ Well I could loan that to you

Ok I owe you 100$. How about another 400? No, I will only loan you a maximum of $400. You can loan me 100$ when I need it

$400 $100

Credit Networks’ Size and Pattern Networks can be very large and very intricate Banks can be “users” contained within the network Not just for credit, also for (Ostra)

How Does the Network Work? The weighted paths are decremented when used Multipath allow different transfers to go through simultaneously Multiple users can be involved in a single transaction

Example of Active Network

After Transaction

What Makes This Possible? Universe Creator o This process creates a path between a sender and a receiver of credit through an intermediary node which we call a landmark o The Universe creator then produces a landmark universe by using a BFS algorithm to link all nodes to the landmark node with the shortest distance Path Stitcher o Reads the landmark universe searching for a path for a given amount of credits to go through o If a path is found the transaction is carried out, otherwise the graph is unchanged

Who Runs These Networks? Network service providers Help stop DOS attacks by charging a small fee Responsible for executing valid user requests Has potential to view transactions and information to carry out correlation attacks

Outline Background What is the Problem? Other Solutions PrivPay o Value Privacy o Receiver Privacy o Modules o Limitations o Contributions Performance Analysis & Evaluation Conclusion Quiz

What is the Problem? Credit networks are relatively new and one area of research that is lacking is privacy The two main areas where privacy is needed is value privacy and receiver privacy

Other Solutions Simple Anonymization o Ineffective because all transactions are linkable to each other and susceptible to deanonymization attacks Decentralized solutions: Only system users are to be trusted with credit links o Availability and efficiency plummet since service providers cannot perform transactions without the users presence online Holding back credit values but providing the topological network graph o Correlation attacks and revealing of actual identity of users

PrivPay Proposed solution for the problem Must achieve the goals of performance, accuracy, rate limiting, generality and scalability Relies on small trusted execution environment which runs novel oblivious algorithms without revealing any information Requires SC (secure processor) hardware as well as ORAM which is oblivious to data

High Level Idea of Value Privacy Both ideas of privacy are based on a complicated game played by the attacker and challenger. This game demonstrates a simple concept. That the attacker cannot determine with certainty the value of the transaction between two parties. Implementation of balanced transactions

Balanced Transaction Process

Challenger Balances

Confusion

Final Result

Receiver Privacy The attacker cannot know who the receiver is Solve by similar process to value privacy

PrivPay Modules Universe Creator Module Uses oblivious BFS algorithm to compute paths Results in landmark universe Transaction Module If credit is available it makes the payment Finds shortest path from sender to landmark node and from landmark node to receiver

Limitations of PrivPay Requires a private communication channel with service provider Requires hardware and correct implementation of hardware to protect landmark universe and data Added overhead Assumptions o User can set up private communication channel with service provider o Network graph is stored in pre-processed data storage in ORAM o Keys are managed by the SC hardware

Contributions Data oblivious algorithms for creation of network No need for computational cryptography on user end Formalize privacy properties of interest for credit networks Can implement immediately due to low dependencies

Evaluation Security analysis showed PrivPay has… o Oblivious BFS algorithm for creation o Privacy for memory o Value privacy o Reciever privacy Noted that algorithms could be optimized Implemented on Ripple for 4 months Composed over 20,000 transactions

Performance Evaluation 1.5 seconds to carry out pay and chglink methods for the network. Change credit link = 0.1 seconds 22 seconds for ObliBFS algorithm 95% accuracy compared to 97% state of the art It is scalable to Ripple which had over 24,000 nodes and about 50,000 links

Comparison Time is in ms

My Opinion Paper had many theorems with only rough proofs of each. Evaluation was weak because it compared with one other approach and it did worse Not convinced the time delay is acceptable in their comparative approach

Conclusion Established the privacy goals and implementations needed to complete those goals Demonstrated value and receiver privacy Implemented PrivPay in order to complete goals for credit network privacy Created Theorems and short proofs for goals and evaluated approach

Quiz 1.Name the two types of privacy that are essential for credit networks? 2.What do balance transactions do? 3.What does the Path Stitcher do?