Download presentation
Presentation is loading. Please wait.
1
Cryptography In Censorship Resistant Web Publishing Systems By Hema Hariharan Swati B Shah
2
Outline Publisher Retriever Relationship What is a publisher friendly Web publishing system? How to remain Anonymous? How to be Censorship Resistant The trick to Tamper Resistance Present Technology Case study :Publius Q & A
3
Publisher Retriever Relationship Publisher and the Retriever Security issues Retriever Protection Hackers,Virus etc Publisher Protection Protecting his documents from being tampered Protecting his freedom of speech
4
What is publisher friendly Web publishing system? Source Anonymous Censorship resistant Tamper evedent Content Unknown Updateable Fault tolerant
5
How to remain Anonymous? URL rewriting service Anonymous URL generation URL “U” Encrypted URL E k (U) using public key k New URL http://www.rewebber.com/Ek(u)http://www.rewebber.com/Ek(u Retreving content using an Anonymous URL Given URL http://www.serviceprovider.com//E k (uhttp://www.serviceprovider.com//E k (u) Decrypted using private key corresponding to k Content retrieved form URL “U” Rewriting Service Provider Network
6
How to be Censorship resistant? Replication Distributed servers all around the world. Diversity of ownership of the servers A simple example A file hosted on to 100 servers of which 10 names are retained and the rest destroyed.
7
The trick to Tamper Resistance Mixnets method Store file in Remote servers Each remote server encrypts with public key and send it to the file servers under its control Search at random at some remote security servers to retrieve from the corresponding file servers Disadvantages Chances of not finding the file Deletion impossible Expiry date set during publishing
8
The trick to Tamper Resistance Encrypt and Distribute Document Encrypt,Divide and Distribute Key Access to the document based on the number of shares of the key the user has access to. Updation Deletion
9
The Current Technology The Eternity Service Distributed network Replication Mix nets Persistent storage till a specified expiration date Publius Distributed network Replication Key sharing technique Dragster No replication
10
Case Study :PUBLIUS Three Components Publishers Retrievers Servers - a static list of m servers Operations Publish Retrieve Update Delete
11
Publish Operation Encrypt file F with Symmetric key K Split K into N parts using Shamir’s Secret sharing scheme - (P,N) Threshold Scheme Compute names for all N parts: name i = wrap(H(F. part i )) Compute locations for each part location i = (name i MOD m) + 1 Publish encrypted file and one part of K to each of these locations, save under directory name i on the server
12
Publish Operation (Contd.)
13
Retrieve Operation Retriever must have the URL U of the intended file Parse the name values from U and compute locations of the Servers hosting the file Select P of these arbitrarily Retrieve the encrypted file and P parts of key K Reconstruct K, and retrieve the file Perform temper-check
14
Delete Operation Generate a password PW while publishing To delete, send H(server domain name.PW) to each hosting server Each server performs authentication, then deletes the file A file can be published as Undeletable
15
Update Operation Updates file without changing its URL Specify new file, original URL, old PW and new PW to each hosting server Server first publishes the new file by calling Publius Publish operation, and gets new URL Performs authentication Puts the new URL in a directory called update under the corresponding name i A file can be published as nonupdatable
16
Implementation Issues Publius URL http://!publius!/options/encode(name 1 ) … encode(name n ) Option field has: Version number Number of parts needed to reconstruct the key Size of the server list Update flag Server Software Client Software
17
Goals Achieved! Censorship Resistant Tamper Evident Content Anonymous Source Anonymous Fault tolerant Persistent Updateable Extensible Freely Available
18
Limitation of Publius Supports only static contents Key-parts/file deletion or corruption Vulnerable to Redirection Attack Vulnerable to Denial of Service Attack Threats to Publisher Anonymity
19
Pros and Cons Prevents denial of service attacks A persistent backup system Protects privacy and human rights Child pornography Pirated songs and software Violating Copyrights Illegal material
20
Publius Website: http://cs1.cs.nyu.edu/~waldman/publius Thank You! Any Questions?
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.