Query Privacy in Sensing-as-a-Service Platforms
Ruben Rios David Nu˜ nez Javier Lopez
Network, Information and Computer Security Lab Department of Computer Science University of Malaga {ruben,dnunez,jlm}@lcc.uma.es
Query Privacy in Sensing-as-a-Service Platforms Ruben Rios David Nu - - PowerPoint PPT Presentation
Query Privacy in Sensing-as-a-Service Platforms Ruben Rios David Nu nez Javier Lopez Network, Information and Computer Security Lab Department of Computer Science University of Malaga {ruben,dnunez,jlm}@lcc.uma.es IFIP SEC 2017 May 29,
Network, Information and Computer Security Lab Department of Computer Science University of Malaga {ruben,dnunez,jlm}@lcc.uma.es
Introduction
Sensing devices may belong to companies, administrations or citizens Sensing servers act as communication gateways The user issues queries and waits for the response
nez and J. Lopez Query Privacy in S2aaS Platforms IFIP SEC 2017 2 / 20
Introduction
nez and J. Lopez Query Privacy in S2aaS Platforms IFIP SEC 2017 3 / 20
Introduction
nez and J. Lopez Query Privacy in S2aaS Platforms IFIP SEC 2017 4 / 20
Introduction Problem Statement
I User privacy is at stake!
nez and J. Lopez Query Privacy in S2aaS Platforms IFIP SEC 2017 5 / 20
Introduction Problem Statement
nez and J. Lopez Query Privacy in S2aaS Platforms IFIP SEC 2017 6 / 20
Introduction Problem Statement
Query confidentiality: hide the query and response contents Query privacy: hide the communication end points
nez and J. Lopez Query Privacy in S2aaS Platforms IFIP SEC 2017 7 / 20
Introduction Problem Statement
Example: Smart City scenario
nez and J. Lopez Query Privacy in S2aaS Platforms IFIP SEC 2017 8 / 20
Introduction Problem Statement
Wants to learn the interests of a particular user based on his/her queries
Content analysis: it can observe packet payloads and headers Statistical analysis: it can analyze features of the communication flow
Collude with external entities located in the vicinity of the sensing devices Try to cheat by slightly modifying its behaviour as long as it does not deviate from the protocol specification
nez and J. Lopez Query Privacy in S2aaS Platforms IFIP SEC 2017 9 / 20
QPSP Protocol
nez and J. Lopez Query Privacy in S2aaS Platforms IFIP SEC 2017 10 / 20
QPSP Protocol Preliminaries
nez and J. Lopez Query Privacy in S2aaS Platforms IFIP SEC 2017 11 / 20
QPSP Protocol Protocol Phases
Re-encryption keys are also generated in this phase.
server using the re-encryption key (rkP!i) of an arbitrary cluster head. The cluster head decrypts the query and forwards it to the appropriate sensing device.
incorporating a fresh key into the query.
1No single entity controls the corresponding decryption key
nez and J. Lopez Query Privacy in S2aaS Platforms IFIP SEC 2017 12 / 20
QPSP Protocol Protocol Phases
N
i=1
N
i=1
N
j=1
N
j=1
nez and J. Lopez Query Privacy in S2aaS Platforms IFIP SEC 2017 13 / 20
QPSP Protocol Protocol Phases
nez and J. Lopez Query Privacy in S2aaS Platforms IFIP SEC 2017 14 / 20
QPSP Protocol Protocol Phases
For any given identifier, k destinations are chosen using a deterministic function Destinations may receive the actual or bogus queries
nez and J. Lopez Query Privacy in S2aaS Platforms IFIP SEC 2017 15 / 20
Evaluation
nez and J. Lopez Query Privacy in S2aaS Platforms IFIP SEC 2017 16 / 20
Evaluation
I 256-bit Barreto-Naehrig (BN) curve
†Core2Duo@2.66GHz, 8GB §SoC@700MHz, 512MB ⇤SoC@400MHz, 256MB
nez and J. Lopez Query Privacy in S2aaS Platforms IFIP SEC 2017 17 / 20
Conclusion
nez and J. Lopez Query Privacy in S2aaS Platforms IFIP SEC 2017 18 / 20
Conclusion
Scenarios where users need to be authorized to query for data Issues related to node revokation and the addition of new cluster heads Dealing with a portion of compromised sensing devices
nez and J. Lopez Query Privacy in S2aaS Platforms IFIP SEC 2017 19 / 20
Extra Slides
1, gb 2) = e(g1, g2)ab = e(gb 1, ga 2)
nez and J. Lopez Query Privacy in S2aaS Platforms IFIP SEC 2017 19 / 20
Security Analysis
Challenger Adversary DDH tuple (ga, gb, gx)
Sample h 2 G2 pk⇤
P = e(ga, h)
pk⇤
P
m0, m1
R
{0, 1} c⇤ = (gb, mδ · e(gx, h)) c⇤
δ0
nez and J. Lopez Query Privacy in S2aaS Platforms IFIP SEC 2017 19 / 20
Security Analysis
This is true for a single and multiple runs of the protocol
He learns nothing since all cluster heads use the same mapping function
The only thing it learns is the mapping function for a particular node But this is not sensitive
nez and J. Lopez Query Privacy in S2aaS Platforms IFIP SEC 2017 19 / 20
Related Work
Consists of making all nodes reply to every query
Data-aggregation [DPV11] Bogus queries [CYS+10] Actual destination is hidden with the query path [DCDT09] Sensed data is unlinked from sensing device [DS11, CP13] Query transformations [LL12, CL12, ZDP+14]
nez and J. Lopez Query Privacy in S2aaS Platforms IFIP SEC 2017 19 / 20
Related Work
nez and J. Lopez Query Privacy in S2aaS Platforms IFIP SEC 2017 19 / 20
Related Work
nez and J. Lopez Query Privacy in S2aaS Platforms IFIP SEC 2017 20 / 20