atom
play

Atom Horizontally Scaling Strong Anonymity Albert Kwon - PowerPoint PPT Presentation

Atom Horizontally Scaling Strong Anonymity Albert Kwon Henry Corrigan-Gibbs MIT Stanford Srinivas Devadas Bryan Ford MIT EPFL 10/30/17,


  1. Atom Horizontally Scaling Strong Anonymity Albert Kwon Henry Corrigan-Gibbs MIT Stanford Srinivas Devadas Bryan Ford MIT EPFL 10/30/17, SOSP’17

  2. Anonymous bulletin board (broadcast) Motivation in the face of global adversary Protest at 4 p.m.! 2

  3. Anonymous communication networks Anonymity provider (set of servers) 3

  4. Existing systems vs. Atom Tor Riposte Properties Atom [USENIX Sec’04] [Oakland’15] Horizontal Vertical Horizontal Scaling Latency < 10s 11 hrs 28min (1 million users) Anonymity against Vulnerable Secure Secure global adversaries 4

  5. Deployment and threat model ● Global network adversary ● A large number of users are malicious ● Constant fraction of the servers are malicious ○ 20% 5

  6. Atom overview 6

  7. Atom overview Layer 1 Layer 2 Layer L Unknown random 1 2 4 permutation of all inputs 2 4 1 ... 4 1 2 3 3 1 3 4 3 2 7

  8. Fixed Horizontally scalability (Independent of the width) Depth ... Width More servers ... ... ... => Larger width 8

  9. Challenges 1. Guaranteeing anytrust property … 9

  10. Challenges 1. Guaranteeing anytrust property 2. Group mixing and routing protocol 2 1 1 2 2 1 2 1 2 1 10

  11. Challenges 1. Guaranteeing anytrust property 2. Group mixing and routing protocol 3. Active adversaries 0 1 0 2 0 0 11

  12. Active attacks 1 0 0 2 0 0 ... 0 0 1 0 3 1 0 4 0 1 12

  13. Challenges 1. Guaranteeing anytrust property 2. Group mixing and routing protocol 3. Active adversaries 4. Tolerating server churn 1 13

  14. Challenges 1. Guaranteeing anytrust property 2. Group mixing and routing protocol 3. Active adversaries 4. Tolerating server churn 1 14

  15. Generating anytrust groups k = 32 20% malicious Public randomness … Randomly select k servers Pr[group is fully malicious] = 0.2 k Pr[any group is fully malicious] < (# of groups) · 0.2 k < 2 -64 15

  16. Idea: use verifiable trap messages Handling actively malicious servers Trusted third party Trap messages & $ # @ (nonces) & $ ... # @ 16

  17. Send trap and real messages in a random order : encrypted for TTP Trusted third party & $ # @ & 1 2 $ ... # 3 @ 4 17

  18. TTP checks for the traps : encrypted for TTP Trusted third party & $ # @ ... $ 3 & 2 4 @ 1 # 18

  19. What happens when a trap message is dropped? : encrypted for TTP 0 Trusted third party & $ # @ 0 ... $ 3 & 2 4 @ 1 # 19

  20. What happens when a real message is dropped? : encrypted for TTP 0 Trusted third party & $ # @ 0 ... $ 3 & 2 4 @ 1 # 20

  21. Improving the trap messages ● Distributing the trust in the third party ● Distributing the trap verification and decryption 21

  22. Properties of trap-based defense ● If the adversary tampers with any trap, then no plaintext revealed ● Can remove 1 message with probability ½ Remove t messages with probability 2 - t ○ Realistically remove < ~64 msgs ○ ● Reactive 22

  23. Two modes of operation Trap messages Zero-knowledge Proof Idea Verify untamperable traps Verify protocol with ZKP Anonymity N - t N set size Defense type Reactive Proactive Latency 1x 4x 23

  24. Implementation ● ~4000 lines of Go ● Both trap and ZKP based defenses ● Code available at github.com/kwonalbert/atom 24

  25. Evaluation setup ● Heterogenous set of 1024 EC2 servers 80% of the servers were 4-core machines ○ Depth = 10 ● 20% malicious servers ● Trap messages ● 160-byte msgs 32 server group … … … … 25

  26. Latency is inversely proportional to the number of servers 23x Better 26

  27. Latency scales linearly with the number of users Better 27

  28. Limitations ● Medium to high latency ● Denial-of-service Depth = 10 … 32 server group 28

  29. Related work Strong anonymity but veritically scaling ● Dissent[OSDI’12], Riffle [PETS’16], Riposte [Oakland’15], ... ○ Horizontally scaling systems but weaker anonymity ● Crowds [ACM’99], Mixminion [Oakland’03], Tor [USENIX Sec’04], ○ Aqua [SIGCOMM’13], Loopix [USENIX Sec’17], … Distributed mixing ● Parallel mix-net [CCS’04], matrix shuffling [Håstad’06], ○ random switching networks [SODA’99, CRYPTO’15], ... Private point-to-point messaging ● Vuvuzela [SOSP’15], Pung [OSDI’16], Stadium [SOSP’17] ○ 29

  30. Conclusion ● Atom provides horizontally-scaling strong anonymity Global anonymity set ○ Latency is inversely proportional to the number of servers ○ ● Supports 1 million users with 160 byte msgs in 28min github.com/kwonalbert/atom 30

  31. These icons were acquired from thenounprojcet.com, and are under CC BY 3.0 US Created by H Alberto Gongora Created by Andre Luiz Gollo Created by H Alberto Gongora Created by Creative Stall Created by Anil 31

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend