controlled sharing of sensitive content ndn case study
play

Controlled Sharing of Sensitive Content NDN Case Study Yingdi Yu - PowerPoint PPT Presentation

Controlled Sharing of Sensitive Content NDN Case Study Yingdi Yu UCLA 10/3/15 1 Content-based confidentiality Confidentiality stays with content independent from where the content is independent from how it is


  1. � Controlled Sharing of Sensitive Content NDN Case Study � Yingdi Yu � UCLA � 10/3/15 1

  2. Content-based confidentiality • Confidentiality stays with content � • independent from where the content is � • independent from how it is delivered � • content are produced in encrypted format � • only authorized consumers are able to access the content � encrypt decrypt Producer Consumer • Application-level end-to-end confidentiality � • not just the end of a connection � • multi-party communication � 10/3/15 2

  3. Req. on confidentiality • Encryption requires careful design � • differential confidentiality � • different content may be visible to different groups of consumers � • flexibility � • retain the ability of changing access � • scalability � • keep reasonable number of encryption keys � • avoid unnecessary re-encryption/signing � • forward secrecy � • make encryption keys less dependent on other keys � • Content encryption should not block data production � 10/3/15 3

  4. Application driven approach Data Owner • NdnFit � • distributed production � Alice Bob • a group of producers � Blood sugar sensor under the same name � space � Data Cathy Storage Activity sensor • differential confidentiality � • different consumers may Data Producers alice David Data Consumers access different content � health • online data sharing � samples • producer can freely produce medical activity encrypted content without knowing who can access the bloodsugar step location content � 10/3/15 4

  5. Encryption Scheme • Separate content production from access control � Namespace Manager • producer-created content key � consumer public key consumer private key encrypts decrypts • Control access through a group group private key key � group decryption key • created by namespace manager � group encryption key • distributed by namespace manager � • public key in current implementation � decrypts encrypts • Producers retrieve group content key encryption key (public key), encrypt content key properly � encrypts decrypts data • Consumers retrieve group decryption key (encrypted private Producer Consumer key) � 10/3/15 5

  6. Name-based Access Control • Name of group encryption key serves as access control instruction � • /<data_prefix>/E-KEY E-KEY/<additional_restriction> � • /alice/health/read/activity/E-KEY E-KEY/ 20150930160000/20150930180000 � • scope: any Alice’s activity data produced during Sep 30, 4pm-6pm � • Producer retrieves group encryption key, encrypts content keys falling into the scope � • /alice/health/samples/activity/steps/C-KEY C-KEY/ 20150930170000/20150930180000 � • encrypt Alice’s step data produced during Sep 30, 5pm-6pm � 10/3/15 6

  7. � Encrypted Content Format • Data packet must carry enough information for authorized consumers to decrypt content � • Experiment as application semantics � • content encoding � • not a part of architecture yet � content key Name: data name Content • Three sub-TLVs: � EncryptionAlgorithm • EncryptionAlgorithm � DecryptionKeyName • may also algorithm-specific fields, � EncryptedContent • e.g., Initial Vector � Signature • DecryptionKeyName � • facilitate decryption key retrieval � • EncryptedContent � • When a data has more than one encrypted copies � • each encrypted copy is an independent data packet � • naming convention: /<content_name>/FOR FOR/<decrypt_key_name> � NDN Tutorial – ACM ICN 2015 (http:// 10/3/15 7 named-data.net/icn2015-tutorial)

  8. Content production/consuming • Producer create a symmetric key (content key) to encrypt content � • content key has the minimum granularity, e.g. one hour � • /alice/health/samples/activity/steps/C-KEY/20150928080000/20150928090000 � • Producer retrieves group encryption key from namespace manager � • encrypt content key using a group encryption key if the content key name falls into the scope of the group encryption key � • /alice/health/samples/activity/steps/C-KEY/20150928080000/20150928090000/FOR/ alice/health/read/activity � • Consumer decrypts content by constructing a decryption key chain � • retrieve encrypted content, encrypted content key, encrypted group decryption key � group consumer decrypt key decrypt key content key Name: /alice/health/samples/activity/step Name: /<C-KEY name>/ FOR /<group key name> Name: /<group key name>/ FOR /<bob key name> Content Content Content EncryptionAlgorithm: AES_CBC, IV=b43d... EncryptionAlgorithm: RSA EncryptionAlgorithm: RSA DecryptionKeyName: C-KEY name DecryptionKeyName: group decryption key name DecryptionKeyName: bob key name EncryptedContent: EncryptedContent: EncryptedContent: Signature Signature Signature • Application library will be available in next NDN platform release � 10/3/15 8

  9. Open questions • Enable forward secrecy: decouple consumer private key with content key � • key distribution services � • Name privacy � • Convert key exchange between namespace manager and producers to identity-based encryption, attribute-based encryption � • Access revocation � • Secure multi-party computing � 10/3/15 9

  10. Summary • Content-based confidentiality makes confidentiality of content location-independent � • Content should be carefully encrypted to achieve flexible and scalable access control at fine granularity � • Expressive NDN name can be leveraged for efficient access control � • More encryption schemes need to be explored to address remaining issues � 10/3/15 10

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend