vanish increasing data privacy with self destructing data
play

Vanish: Increasing Data Privacy with Self-Destructing Data Roxana - PowerPoint PPT Presentation

Vanish: Increasing Data Privacy with Self-Destructing Data Roxana Geambasu Yoshi Kohno Amit Levy Hank Levy University of Washington Outline Part 1: Introducing Self-Destructing Data Part 2: Vanish Architecture and Implementation Part 3:


  1. Vanish: Increasing Data Privacy with Self-Destructing Data Roxana Geambasu Yoshi Kohno Amit Levy Hank Levy University of Washington

  2. Outline Part 1: Introducing Self-Destructing Data Part 2: Vanish Architecture and Implementation Part 3: Evaluation and Applications �

  3. Motivating Problem: Data Lives Forever Sensitive Ann Carla email ISP This is sensitive stuff. This is sensitive stuff. This is sensitive stuff. This is sensitive stuff. This is sensitive stuff. This is sensitive stuff. This is sensitive stuff. This is sensitive stuff. This is sensitive stuff. This is sensitive stuff. This is sensitive stuff. This is sensitive stuff. This is sensitive stuff. This is sensitive stuff. This is sensitive stuff. This is sensitive stuff. This is sensitive stuff. This is sensitive stuff. Sensiti ve Sensiti ve Sensiti ve Sensiti ve Sensti ve Sensti ve Sensti ve Sensti ve Sensiti ve Sensiti ve Sensiti ve Sensiti ve How can Ann delete her sensitive email? � She doesn’t know where all the copies are � Services may retain data for long after user tries to delete �

  4. Archived Copies Can Resurface Years Later Ann Carla ISP Sensiti ve Sensiti ve Sensti ve Sensti ve Sensiti ve Sensiti ve Subpoena, Some time later… hacking, … Retroactive attack This is sensitive stuff. This is sensitive stuff. This is sensitive stuff. This is sensitive stuff. on archived data This is sensitive stuff. This is sensitive stuff. �

  5. The Retroactive Attack Retroactive Upload Copies User tries months or years attack begins data archived to delete Time �

  6. Why Not Use Encryption (e.g., PGP)? Ann Carla ISP Sensiti ve Sensiti ve Sensti ve Sensti ve Sensiti ve Sensiti ve Subpoena, hacking, … This is sensitive stuff. This is sensitive stuff. This is sensitive stuff. This is sensitive stuff. This is sensitive stuff. This is sensitive stuff. �

  7. Why Not Use Encryption (e.g., PGP)? Ann Carla ISP Sensiti ve Sensiti ve Sensti ve Sensti ve Sensiti ve Sensiti ve Subpoena, hacking, … This is sensitive stuff. This is sensitive stuff. This is sensitive stuff. This is sensitive stuff. This is sensitive stuff. This is sensitive stuff. �

  8. Why Not Use a Centralized Service? Ann Carla ISP Backdoor Centralized Service agreement “Trust us: we’ll help you delete your data on time.” �

  9. Why Not Use a Centralized Service? Ann Carla ISP Backdoor Centralized Service agreement “Trust us: we’ll help you delete your data on time.” �

  10. The Problem: Two Huge Challenges for Privacy 1. Data lives forever � On the web: emails, Facebook photos, Google Docs, blogs, … � In the home: disks are cheap, so no need to ever delete data � In your pocket: phones and USB sticks have GBs of storage 2. Retroactive disclosure of both data and user keys has become commonplace � Hackers � Misconfigurations � Legal actions � Border seizing � Theft � Carelessness ��

  11. The Problem: Two Huge Challenges for Privacy 1. Data lives forever � On the web: emails, Facebook photos, Google Docs, blogs, … � In the home: disks are cheap, so no need to ever delete data � In your pocket: phones and USB sticks have GBs of storage 2. Retroactive disclosure of both data and user keys has become commonplace � Hackers � Misconfigurations � Legal actions � Border seizing � Theft � Carelessness ��

  12. The Problem: Two Huge Challenges for Privacy 1. Data lives forever � On the web: emails, Facebook photos, Google Docs, blogs, … � In the home: disks are cheap, so no need to ever delete data � In your pocket: phones and USB sticks have GBs of storage 2. Retroactive disclosure of both data and user keys has become commonplace � Hackers � Misconfigurations � Legal actions � Border seizing � Theft � Carelessness ��

  13. The Problem: Two Huge Challenges for Privacy 1. Data lives forever � On the web: emails, Facebook photos, Google Docs, blogs, … � In the home: disks are cheap, so no need to ever delete data � In your pocket: phones and USB sticks have GBs of storage 2. Retroactive disclosure of both data and user keys has become commonplace � Hackers � Misconfigurations � Legal actions � Border seizing � Theft � Carelessness ��

  14. Question: Can we empower users with control of data lifetime? Answer: Self-destructing data User tries Retroactive Upload Copies months or years to delete attack begins data archived Time ��

  15. Question: Can we empower users with control of data lifetime? Answer: Self-destructing data Timeout User tries Retroactive Upload Copies (all copies months or years to delete attack begins data archived self destruct) Time ��

  16. Self-Destructing Data Model Sensitive Ann Carla email ISP This is sensitive stuff. This is sensitive stuff. This is sensitive stuff. This is sensitive stuff. This is sensitive stuff. This is sensitive stuff. self-destructing data (timeout) 1. Until timeout, users can read original message ��

  17. Self-Destructing Data Model Sensitive Ann Carla email ISP This is sensitive stuff. This is sensitive stuff. This is sensitive stuff. This is sensitive stuff. This is sensitive stuff. This is sensitive stuff. self-destructing data (timeout) 1. Until timeout, users can read original message 2. After timeout, all copies become permanently unreadable 2.1. even for attackers who obtain an archived copy & user keys 2.2. without requiring explicit delete action by user/services 2.3. without having to trust any centralized services ��

  18. Self-Destructing Data Model Sensitive Ann Carla email ISP This is sensitive stuff. This is sensitive stuff. This is sensitive stuff. This is sensitive stuff. This is sensitive stuff. This is sensitive stuff. self-destructing data (timeout) Goals of Self-Destructing Data 1. Until timeout, users can read original message 2. After timeout, all copies become permanently unreadable 2.1. even for attackers who obtain an archived copy & user keys 2.2. without requiring explicit delete action by user/services 2.3. without having to trust any centralized services ��

  19. Outline Part 1: Introducing Self-Destructing Data Part 2: Vanish Architecture and Implementation Part 3: Evaluation and Applications ��

  20. Vanish: Self-Destructing Data System � Traditional solutions are not sufficient for self-destructing data goals: � PGP � Centralized data management services � Forward-secure encryption � … � Let’s try something completely new! Idea: Leverage P2P systems ��

  21. P2P 101: Intro to Peer-To-Peer Systems � A system composed of individually-owned computers that make a portion of their resources available directly to their peers without intermediary managed hosts or servers. [~wikipedia] Important P2P properties (for Vanish): � Huge scale – millions of nodes � Geographic distribution – hundreds of countries � Decentralization – individually-owned, no single point of trust � Constant evolution – nodes constantly join and leave ��

  22. Distributed Hashtables (DHTs) � Hashtable data structure implemented on a P2P network � Get and put (index, value) pairs DHT � Each node stores part of the index space Logical structure � DHTs are part of many file sharing systems: � Vuze, Mainline, KAD � Vuze has ~1.5M simultaneous nodes in ~190 countries � Vanish leverages DHTs to provide self-destructing data � One of few applications of DHTs outside of file sharing ��

  23. How Vanish Works: Data Encapsulation Ann Encapsulate (data, timeout) Vanish L k 1 k 1 Secret World-Wide k 2 k 2 Sharing DHT K k 3 k 3 . (M of N) . . k N k N C = E K (data) ��

  24. How Vanish Works: Data Encapsulation Ann Encapsulate (data, timeout) Vanish L k N k 3 k 1 k 1 Secret World-Wide k 2 k 2 Sharing DHT K k 2 k 3 k 3 . (M of N) . . k 1 k N k N C = E K (data) ��

  25. How Vanish Works: Data Encapsulation Ann Carla VDO = {C, L} Encapsulate Vanish Data Object (data, timeout) VDO = {C, L} Vanish L k N k 3 Secret World-Wide Sharing DHT k 2 (M of N) k 1 C = E K (data) ��

  26. How Vanish Works: Data Decapsulation Ann Carla VDO = {C, L} Encapsulate Vanish Data Object Decapsulate (data, timeout) VDO = {C, L} (VDO = {C, L}) Vanish Vanish L L k N k N k 3 k 3 k 1 Secret World-Wide k 2 Sharing DHT k 2 k 2 k 3 (M of N) . . . k 1 k 1 k N C = E K (data) ��

  27. How Vanish Works: Data Decapsulation Ann Carla VDO = {C, L} Encapsulate Vanish Data Object Decapsulate data (data, timeout) VDO = {C, L} (VDO = {C, L}) Vanish Vanish L L k N k N k 3 k 3 k 1 Secret Secret World-Wide k 2 Sharing Sharing DHT K k 2 k 2 k 3 (M of N) . (M of N) . . k 1 k 1 k N C = E K (data) data = D K (C) ��

  28. How Vanish Works: Data Decapsulation Ann Carla VDO = {C, L} Encapsulate Vanish Data Object Decapsulate data (data, timeout) VDO = {C, L} (VDO = {C, L}) Vanish Vanish L L k N k N k 3 k 3 k 1 Secret Secret World-Wide X Sharing Sharing DHT K k 3 (M of N) . (M of N) . . k 1 k 1 k N C = E K (data) data = D K (C) ��

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend