Reputation Systems Reputation systems: quantify the trust between - - PowerPoint PPT Presentation

reputation systems
SMART_READER_LITE
LIVE PREVIEW

Reputation Systems Reputation systems: quantify the trust between - - PowerPoint PPT Presentation

Formal Verification of e-Reputation Protocols 1 Ali Kassem 2 , Pascal Lafourcade 1 , Yassine Lakhnech 2 1 University dAuvergne, LIMOS 2 Universit Grenoble Alpes, CNRS, VERIMAG The 7th International Symposium on Foundations & Practice of


slide-1
SLIDE 1

Formal Verification of e-Reputation Protocols1

Ali Kassem2, Pascal Lafourcade1, Yassine Lakhnech2

1University d’Auvergne, LIMOS 2Université Grenoble Alpes, CNRS, VERIMAG

The 7th International Symposium on Foundations & Practice of Security FPS’2014, Montréal November 4, 2014

1This research was conducted with the support of the "Digital trust" Chair

from the Foundation of the University of Auvergne.

1/32

slide-2
SLIDE 2

Reputation Systems

Reputation systems: quantify the trust between different users. Application:

◮ Electronic commerce ◮ Social news ◮ Peer-to-peer routing ◮ etc.

Goal: act in truthfulness way.

2/32

slide-3
SLIDE 3

E-Reputation Players

Three Players: different interest.

User Authority Target

3/32

slide-4
SLIDE 4

How they work?

Interaction Feedback

( , )

Computation

( , )

4/32

slide-5
SLIDE 5

Requirements

To be beneficial: users have to provide fedbacks → preserve their privacy and anonymity To rely on them: compute the score correctly → score verifiability

5/32

slide-6
SLIDE 6

Related Work

Related Work:

◮ Several secure e-reputation protocols:

◮ Supporting Privacy in Decentralized Additive Reputation

Systems [?]

◮ Signatures of Reputation [?] ◮ Extending Signatures of Reputation [?] ◮ etc.

◮ Definitions of the security properties are only informal. ◮ No tool to check whether a reputation protocol satisfies the

security properties.

6/32

slide-7
SLIDE 7

Contributions

Contributions:

◮ Formalize e-reputation protocols in the applied π-calculus. ◮ Formal definitions of Privacy, Authentication and

Verifiability properties.

◮ Automated verification in ProVerif of Pavlov et al.

reputation protocol [?]

7/32

slide-8
SLIDE 8

Plan

Introduction Model and Properties Authentication Properties Privacy Properties Verifiability Properties Case Study: Pavlov et al. Protocol Conclusion

8/32

slide-9
SLIDE 9

Plan

Introduction Model and Properties Authentication Properties Privacy Properties Verifiability Properties Case Study: Pavlov et al. Protocol Conclusion

9/32

slide-10
SLIDE 10

Attacker

Dolev-Yao [?] attacker:

◮ controls the public channels ◮ read, block, modify and send messages ◮ under perfect cryptographic assumption

M K

10/32

slide-11
SLIDE 11

Processes

Players as processes in the applied π-calculus [?] P, Q ::= Processes null process in(u, x).P message input

  • ut(u, m).P

message output νn.P name restriction if m = m′ then P else Q conditional P|Q parallel composition !P replication Annotated using events

11/32

slide-12
SLIDE 12

Events

User Authority Target

eligible( )

Interaction Interaction

slide-13
SLIDE 13

Events

User Authority Target

eligible( )

Interaction Interaction

sent( , , ) record( , , )

Rate

12/32

slide-14
SLIDE 14

Plan

Introduction Model and Properties Authentication Properties Privacy Properties Verifiability Properties Case Study: Pavlov et al. Protocol Conclusion

13/32

slide-15
SLIDE 15

User Eligibility

All recorded rates are casted by eligible users, and only one rate per user. On every trace:

eligible( )

Interaction Interaction

sent( , , ) record( , , )

Rate preceeded by distinct occurence

14/32

slide-16
SLIDE 16

Rate Integrity

Rates are recorded as casted without modification. On every trace:

eligible( )

Interaction Interaction

sent( , , ) record( , , )

Rate preceeded by distinct occurence

15/32

slide-17
SLIDE 17

Plan

Introduction Model and Properties Authentication Properties Privacy Properties Verifiability Properties Case Study: Pavlov et al. Protocol Conclusion

16/32

slide-18
SLIDE 18

Rate Privacy

No information about the rates is leaked. Observational equivalence of two instances Instance 1 Rate 1 ≈l Instance 2 Rate 2 Can be considered with or without dishonest users.

17/32

slide-19
SLIDE 19

Rate Anonymity

An attacker cannot link a rate to a user. Observational equivalence of two instances Instance 1 Rate 1 Rate 2 ≈l Instance 2 Rate 2 Rate 1 Can be considered with or without dishonest users and target.

18/32

slide-20
SLIDE 20

Receipt-Freeness

A user cannot prove to an attacker that he provided a certain rate Instance 1 Rate Rate

s e c r e t s

≈l Instance 2 Rate Rate The coerced user cooperates with the attacker by leaking secrets.

19/32

slide-21
SLIDE 21

Coercion-Resistance

Even when interacting with a coercer, the user can still provide a rate of his choice. Instance 1 Rate Rate

s e c r e t s

  • r

d e r s

≈l Instance 2 Rate Rate The coerced user is forced by the attacker to provide Rate .

20/32

slide-22
SLIDE 22

Relations

Rate Privacy Rate Anonymity Coercion-Resistance Receipt-Freeness

21/32

slide-23
SLIDE 23

Plan

Introduction Model and Properties Authentication Properties Privacy Properties Verifiability Properties Case Study: Pavlov et al. Protocol Conclusion

22/32

slide-24
SLIDE 24

Verifiability for Reputation Protocols

Definition (Verifiability): A reputation protocol ensures Verifiability if there are Verification tests UEV, RSV respecting the following conditions:

  • 1. User Eligibility Verifiability (UEV):

◮ UEV = true ⇒ all rates are casted by eligible users

  • 2. Reputation Score Verifiability (RSV):

◮ RSV = true ⇒ the reputation score is computed correctly

from the casted rates

  • 3. Completeness: if all participants follow the protocol honestly,

the above tests succeed.

23/32

slide-25
SLIDE 25

Plan

Introduction Model and Properties Authentication Properties Privacy Properties Verifiability Properties Case Study: Pavlov et al. Protocol Conclusion

24/32

slide-26
SLIDE 26

Application: Pavlov et al. Protocol [?]

Aq U1 U2 U3 Un

  • rand. rq = 0

rq + r1 rq + r1 + r2 rpre.

  • rpre. + rn

Score: Aq subtracts rq from the summation. Assumption: secure authenticated channels between users. Goal: ensure rate privacy if all users act honestly

25/32

slide-27
SLIDE 27

Modeling in ProVerif

We model the protocol in ProVerif for two users in addition to Aq. Addition and Subtraction: sub(sum(x, y), x) = y sub(sum(x, y), y) = x sub(sum(sum(x, y), z), x) = sum(y, z) sub(sum(sum(x, y), z), y) = sum(x, z) Secure Authenticated Channels:

◮ encrypt the exchanged messages ◮ include the unique identities of the sender and the receiver in

the messages

26/32

slide-28
SLIDE 28

Results

Formal Verification with ProVerif [?]: Property Result Rate Privacy

  • Rate Anonymity
  • Receipt-Freeness

× Coercion-Resistance × Rate Integrity 2 User Eligibility

  • Reputation Score Verifiability

3 User Eligibility Verifiability × Time: less than one second with standard PC.

2without injectivity 3if the rates are published in a Bulletin Board 27/32

slide-29
SLIDE 29

Attacks

Receipt-Freeness: the shared symmetric key k can act as a recipet. ri = decrypt(rp + ri, k) − decrypt(rp, k) ⇒ Coercion-Resistance is not ensured also. User Eligibility Verifiability: users do not provide any proof (e.g., certificate) of their eligibility.

28/32

slide-30
SLIDE 30

Plan

Introduction Model and Properties Authentication Properties Privacy Properties Verifiability Properties Case Study: Pavlov et al. Protocol Conclusion

29/32

slide-31
SLIDE 31

Conclusion

Conclusion:

◮ E-reputation protocols have many applications ◮ Secure reputation protocols exist ◮ Lack of formal verification ◮ First formal framework for analysis of e-reputation:

◮ Formal model in the applied π-calculus ◮ Definitions for privacy, authentication, verifiability properties

◮ Automated verification in ProVerif of one case study.

30/32

slide-32
SLIDE 32

Future Work

Future work:

◮ Analyze more reputation protocols ◮ Study properties such as : correctness, accountability, . . . ◮ Verify other protocols such as: e-cash, . . .

31/32

slide-33
SLIDE 33

Thank you for your attention!

Questions? ali.kassem@imag.fr pascal.lafourcade@udamail.fr

32/32