SafeVanish: An Improved Data Self-Destruction for Protecting Data - - PowerPoint PPT Presentation

safevanish an improved data self destruction for
SMART_READER_LITE
LIVE PREVIEW

SafeVanish: An Improved Data Self-Destruction for Protecting Data - - PowerPoint PPT Presentation

CloudCom, Dec 3, 2010 SafeVanish: An Improved Data Self-Destruction for Protecting Data Privacy Lingfang Zeng, Zhan Shi, Shengjie Xu, Dan Feng School of Computer Science and Technology, Huazhong University of Science and Technology


slide-1
SLIDE 1

SafeVanish: An Improved Data Self-Destruction for Protecting Data Privacy

Lingfang Zeng, Zhan Shi, Shengjie Xu, Dan Feng School of Computer Science and Technology, Huazhong University of Science and Technology Information Storage Division, Wuhan National Laboratory for Optoelectronics

CloudCom, Dec 3, 2010

slide-2
SLIDE 2

Solution for the sniffing attack

Outline

Conclusion Related work and motivation Solution for the hopping attack

2

slide-3
SLIDE 3

Motivation: Data Lives Forever (1/2)

Reference: Roxana Geambasu, Tadayoshi Kohno, Amit Levy, Henry

  • M. Levy. "Vanish: Increasing Data Privacy with Self-Destructing Data."

In Proceedings of the 18th USENIX Security Symposium, Montreal, Canada, August 2009.

3

This is sensitive stuff. This is sensitive stuff. This is sensitive stuff. This is sensitive stuff. This is sensitive stuff. This is sensitive stuff.

Ann Carla Sensitive email ISP

Sensitive Senstive Sensitive Sensitive Senstive Sensitive Sensitive Senstive Sensitive Sensitive Senstive Sensitive This is sensitive stuff. This is sensitive stuff. This is sensitive stuff. This is sensitive stuff. This is sensitive stuff. This is sensitive stuff.

Some time later…

Subpoena, hacking, …

Sensitive Senstive Sensitive This is sensitive stuff. This is sensitive stuff. This is sensitive stuff. This is sensitive stuff. This is sensitive stuff. This is sensitive stuff. This is sensitive stuff. This is sensitive stuff. This is sensitive stuff. This is sensitive stuff. This is sensitive stuff. This is sensitive stuff.

Retroactive attack

  • n archived data
slide-4
SLIDE 4

Motivation : Data Lives Forever (2/2)

The decapsulation process by compose the encryption key for Vanish0.1. The improved architecture

  • f Vanish0.2.1.

4

slide-5
SLIDE 5

Motivation: Hopping attack

The push operation in the VuzeDHT network. The hopping process of the malicious nodes in hopping attack.

5

slide-6
SLIDE 6

In addition, it’s very dangerous for Vanish to transmit key shares that exposed to the network.

Motivation: Sniffing

6

slide-7
SLIDE 7
  • Increase the Vanish threshold k for

composing the encryption key

  • Switching Vanish to a privately hosted DHT
  • Detect the attacker
  • Limit the ID distribution mechanism of

Vuze

Existing approaches and their shortcomings

7

slide-8
SLIDE 8

Solution for the hopping attack

Increasing the length of range of key shares

8

slide-9
SLIDE 9

The expanded length range of key shares(1/2)

9

slide-10
SLIDE 10

The expanded length range of key shares(2/2)

10

slide-11
SLIDE 11

Solution for the sniffing attack

Using the RSA encryption algorithm

11

slide-12
SLIDE 12

Conclusion

  • Discuss the existing state-of-the-art self-

destructing data schemes (Vanish) exhibit fragile for hopping attack and sniffing attack in realistic application.

  • Propose a new scheme called SafeVanish.

12

slide-13
SLIDE 13