moderator controlled information sharing by identity
play

Moderator-controlled Information Sharing by Identity-based - PowerPoint PPT Presentation

Moderator-controlled Information Sharing by Identity-based Aggregate Signatures for Information Centric Networking Tohru Asami 1 , Byambajav Namsraijav 1 , Yoshihiko Kawahara 1 , Kohei Sugiyama 2 , Atsushi Tagami 2 , Tomohiko Yagyu 3 , Kenichi


  1. Moderator-controlled Information Sharing by Identity-based Aggregate Signatures for Information Centric Networking Tohru Asami 1 , Byambajav Namsraijav 1 , Yoshihiko Kawahara 1 , Kohei Sugiyama 2 , Atsushi Tagami 2 , Tomohiko Yagyu 3 , Kenichi Nakamura 4 , Toru Hasegawa 5 1 The University of Tokyo 2 KDDI R&D Laboratories 3 NEC Corporation 4 Panasonic Corporation 5 Osaka University

  2. Ag Agenda • Introduction • Moderator Controlled Information-Sharing Service (MIS) • Identity-Based Aggregate Signatures (IBAS) • Implementation of IBAS in NDN • Evaluation Results • RSA vs IBAS packet size comparison • Throughput (computational overhead) • Conclusion • Future Discussions 2 San Francisco, October 2015 ACM ICN

  3. Introduction 3 San Francisco, October 2015 ACM ICN

  4. Safety co Sa confirmation methods at at th the 2011 Tōhoku ea Tō earthquake e and tsunami 100 1.4 90 Useful/Usage = Availability 80 Usage Useful Availability 1.2 Usage & Useful (%) 70 1 60 0.8 50 40 0.6 30 0.4 20 0.2 10 0 0 The availability of SNS was around 50%. How to increase it? 4 San Francisco, October 2015 ACM ICN

  5. In Introductio ion Goal • All-weather social networking service (SNS) • Available even if the central server is down Propose • Moderator-controlled information sharing (MIS) service: an ICN-based distributed SNS 5 San Francisco, October 2015 ACM ICN

  6. Moderator Controlled Information-Sharing Service (MIS) 6 San Francisco, October 2015 ACM ICN

  7. Mode Mo derator r Cont ntrolled d Inf nform rmation- Sh Sharing Service ce (MIS) • routing Administrator • timestamp Moderator 2 Moderator n Moderator 1 ……….. Peer 1 Peer 2 Peer m Peer 3 7 San Francisco, October 2015 ACM ICN

  8. Ro Roles of Entities • Peer • publish messages to moderated groups • subscribe messages from moderated groups to assure • Moderator non-repudiation • check the messages in their group with signature • timestamp the moderated messages • relay moderated messages to the peers • Administrator • moderates the public group • conducts initial setups 8 San Francisco, October 2015 ACM ICN

  9. Mo Mode derator r Cont ntrolled d Inf nform rmation- Sh Sharing Service ce (MIS) at a Disaster Administrator (Moderator of the public group) Groups Public David’s friends Shelter#2 GW Shelter#1 GW David (Moderator of group: David’s Friends) John Alice Bob 9 San Francisco, October 2015 ACM ICN

  10. Re Requirements fo for MIS (A (All-we weather SNS) Without relying on a central server: • Peer can publish/subscribe a message if an accessible moderator exists • Subscriber can verify the publisher and moderator’s authenticity • Assure non-repudiation 10 San Francisco, October 2015 ACM ICN

  11. Ad Advantages of ICN for MIS Content signatures • authentication of received messages Network caches and routing • Fault tolerant even if the administrator is unreachable 11 San Francisco, October 2015 ACM ICN

  12. Dis Disad advan antag ages of ICN for MIS Central verification authority of public key infrastructure (PKI) must be reachable • In a disaster scenario, one may not be able to verify a message’s signature if a required Certification Authority (CA) is out of reach. Solved by ID-based Signatures Large overhead for short messages • Each message contains two signatures Solved by Aggregate Signatures 12 San Francisco, October 2015 ACM ICN

  13. Identity-Based Aggregate Signatures (IBAS) 13 San Francisco, October 2015 ACM ICN

  14. Ag Aggregate si signatures s and Id Iden entity-ba based d si signatures • Aggregate signatures : aggregating n signatures on n distinct messages from n distinct users into a single signature of constant size m 1 m 2 m 3 σ 1 σ 1 ∪ σ 2 ∪ σ 3 σ 1 ∪ σ 2 • Identity-based signatures : IDs such as email address or phone number is used instead of public keys. Verifier only needs PKG’s public parameter and the signer’s ID to verify a message. 14 San Francisco, October 2015 ACM ICN

  15. Pr Propose ICN with Identity-ba based Ag Aggregate Si Signatures (I (IBAS) IBAS [1]: combination of aggregate signatures and IBS IBAS operations • Setup • Private key distribution Offline Online • Individual signing (Master Key, Private Key Public Parameter) • Aggregation Generator (PKG) • Verification Public private private ID 2 ID 1 , ID 2 ID 1 Parameter key 1 key 2 Accept m 1 || σ 1 Signer 1 Signer 2 Verifier m 1 || m 2 / ||(σ 1 ∪ σ 2 ) (Publisher) (Moderator) (Subscriber) Reject m 1 m 2 [1] Gentry, Craig, and Zulfikar Ramzan. "Identity-based aggregate signatures.” 15 San Francisco, October 2015 ACM ICN

  16. Implementation of IBAS in NDN 16 San Francisco, October 2015 ACM ICN

  17. Im Implem lemen entat atio ion of of I IBAS S in in NDN DN [1 [1] Extend NDN’s open source C++ library ndn-cxx [2]. Application (Moderator-Controlled • Add a new New Information Sharing) SignatureType named signIbas() / SignatureSha256Ibas which verifySignatureIbas() signAndAggregateIbas() tells that the content is ndn- signed using IBAS. cxx & KeyChain Validator New • Use PBC Library[3] for pairing and other elliptic IbasSigner New curve computations. [1] https://github.com/byambajav/ndn-ibas Pairing & Elliptic Curve PBC Library Computation [2] https://github.com/named-data/ndn-cxx [3] https://crypto.stanford.edu/pbc/ 17 San Francisco, October 2015 ACM ICN

  18. Evaluation Results 18 San Francisco, October 2015 ACM ICN

  19. Ev Evaluation Scenario Measure following two metrics • Signature size : for a disaster scenario • Computational overhead of signature generation and verification: for normal condition compare this Government packet’s size (Moderator) (2) (4) (1) (3) verify, sign, and aggregate (a) (c) Bob Alice (Subscriber) (Publisher) sign verify 19 San Francisco, October 2015 ACM ICN

  20. Ev Evaluation Scenario: Assumptions • IBAS’s offline steps ( setup and private key distribution ) are done beforehand. • In PKI, the subscriber has all the certificates required for signature verification in advance. 20 San Francisco, October 2015 ACM ICN

  21. Results: RSA vs IBAS pack cket size co comparison Structure of a data packet sent from moderator to subscriber 1(DATA-TLV)+3(TLV-LENGTH) Bytes 1(DATA-TLV)+3(TLV-LENGTH) Bytes 74 Bytes Name 74Bytes Name /moderators/Government/safetyConfirmation /moderators/Government/safetyConfirmation /wonderland/Alice/2/9 /wonderland/Alice/2/9 MetaInfo 5 Bytes MetaInfo 5 Bytes <META-INFO-TYPE TLV-LENGTH ContentType> <META-INFO-TYPE TLV-LENGTH ContentType> Moderator: Government Moderator: Government 110+x Bytes Content Accepted: Thu Oct 02 09:15:30 2014 Accepted: Thu Oct 02 09:15:30 2014 452+x Bytes From: Alice From: Alice Content Published: Thu Oct 02 08:53:09 2014 Published: Thu Oct 02 08:53:09 2014 I am OK. I am OK. Signature 342 bytes 157 bytes Signature <Aggregation of individual signatures made by <Signature made by Publisher> Moderator and Publisher> Signature 347 bytes <Signature made by Moderator> (a) RSA-2048 (b) IBAS 21 San Francisco, October 2015 ACM ICN

  22. Re Results: Message size reduced by 60% Packet size* of different signature methods (byte) Thus, in case of a message “ I’m OK ” (6 bytes) the size of the packet sent from IBAS(512, 160) moderator to message subscriber will be 888B content size and 356B for RSA-2048 and IBAS respectively *size also depends on the IBAS(512, 160) participators’ names 22 San Francisco, October 2015 ACM ICN

  23. Re Results: Assumptions of c computational ov overhead com omparison on • Choose signatures of almost same strength: RSA-2048, ECDSA-256, and IBAS(224, 112) qbits rbits Comparable Strengths IFC (e.g., RSA) and ECC (e.g., ECDSA) [1] [2] [1] NIST, “Recommendation for Key Management” [2] Yasuda et al, “On the strength comparison of the ECDLP and the IFP “ 23 San Francisco, October 2015 ACM ICN

  24. Ev Evaluation environment • OS: Ubuntu 14.04 • Hardware specifications • Model name: Intel(R) Core(TM) i7-3520M • CPU frequency: 2.9GHz • Cache size: 4MB 24 San Francisco, October 2015 ACM ICN

  25. Re Results: Computational overhead is 2. 2.4 4 times bigger than that of RSA IBAS(224, 112) ⩬ ECDSA-256 ⩬ 2.4 x RSA-2048 Video communication: IBAS(224, 112) can achieve throughput of 2.4Mbps when each packet’s content size is 1497bytes (IEEE802.3). 25 San Francisco, October 2015 ACM ICN

  26. Conclusion & Future Discussions 26 San Francisco, October 2015 ACM ICN

  27. Co Conclusion • All-weather SNS: Moderator Controlled Information-Sharing Service (MIS) • Core technology of MIS is Identity-based Aggregate Signatures (IBAS) • Implementation on NDN is evaluated against the traditional PKI signatures. • 60% smaller packet size: suitable for usages at a disaster • 2.4 times larger computational overhead: 2.4Mbps throughput on Intel i7-3520M@2.9GHz in normal condition 27 San Francisco, October 2015 ACM ICN

  28. Fu Future Discussions • IBAS key parameter size choice • Distribution of secret parameters and key revocation • Improve current implementation toward a testbed experiment as a real world application 28 San Francisco, October 2015 ACM ICN

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend