ESP Egocentric Social Platform

Similar documents
DISPATCH: SECURE MOBILE JOURNALISM

WhatsApp Encryption Overview. Technical white paper

Diffie-Hellman. Part 1 Cryptography 136

eduvpn François Kooman

Cryptography and Network Security. Sixth Edition by William Stallings

Salesforce1 Mobile Security White Paper. Revised: April 2014

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 11 Basic Cryptography

Tungsten Security Whitepaper

Encryption. INST 346, Section 0201 April 3, 2018

Criptext s end-to-end encryption system. Technical white paper

Midterm II December 4 th, 2006 CS162: Operating Systems and Systems Programming

Uses of Cryptography

The case for ubiquitous transport-level encryption

Security: Cryptography

1.264 Lecture 28. Cryptography: Asymmetric keys

Spring 2010: CS419 Computer Security

Pretty Good Privacy (PGP

(a) Symmetric model (b) Cryptography (c) Cryptanalysis (d) Steganography

AllNet: Ubiquitous Interpersonal Communication

PKI Credentialing Handbook

Ref:

Cryptographic Concepts

Crypto meets Web Security: Certificates and SSL/TLS

Overview. SSL Cryptography Overview CHAPTER 1

Computer Security. 08r. Pre-exam 2 Last-minute Review Cryptography. Paul Krzyzanowski. Rutgers University. Spring 2018

Chapter 8 Security. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

Kurose & Ross, Chapters (5 th ed.)

Parallelizing Cryptography. Gordon Werner Samantha Kenyon

Key Exchange. Secure Software Systems

Cryptography III. Public-Key Cryptography Digital Signatures. 2/1/18 Cryptography III

Viber Encryption Overview

Protecting Your Data With Encryption

Distributed Systems. 26. Cryptographic Systems: An Introduction. Paul Krzyzanowski. Rutgers University. Fall 2015

CS 111. Operating Systems Peter Reiher

SECURITY STORY WE NEVER SEE, TOUCH NOR HOLD YOUR DATA

Introduction to Network Security Missouri S&T University CPE 5420 Data Integrity Algorithms

On the Internet, nobody knows you re a dog.

Test Conditions. Closed book, closed notes, no calculator, no laptop just brains 75 minutes. Steven M. Bellovin October 19,

Cloud FastPath: Highly Secure Data Transfer

ח'/סיון/תשע "א. RSA: getting ready. Public Key Cryptography. Public key cryptography. Public key encryption algorithms

Nigori: Storing Secrets in the Cloud. Ben Laurie

The most important development from the work on public-key cryptography is the digital signature. Message authentication protects two parties who

Cisco Live /11/2016

CSE 127: Computer Security Cryptography. Kirill Levchenko

Document Sub Title. Yotpo. Technical Overview 07/18/ Yotpo

Cryptography: Practice JMU Cyber Defense Boot Camp

SecureDoc Disk Encryption Cryptographic Engine

Firewalls, Tunnels, and Network Intrusion Detection

Lecture Nov. 21 st 2006 Dan Wendlandt ISP D ISP B ISP C ISP A. Bob. Alice. Denial-of-Service. Password Cracking. Traffic.

L13. Reviews. Rocky K. C. Chang, April 10, 2015

Security. Communication security. System Security

PYTHIA SERVICE BY VIRGIL SECURITY WHITE PAPER

Authentication CHAPTER 17

Distributed Systems. 25. Authentication Paul Krzyzanowski. Rutgers University. Fall 2018

Chapter 8 Network Security

Key Management. Digital signatures: classical and public key Classic and Public Key exchange. Handwritten Signature

THIS IS AN OPEN BOOK, OPEN NOTES QUIZ.

Public-Key Infrastructure NETS E2008

HTTPS is Fast and Hassle-free with Cloudflare

Digital signatures: How it s done in PDF

Lecture 9a: Secure Sockets Layer (SSL) March, 2004

CS November 2018

Implementing Cryptography: Good Theory vs. Bad Practice

BCA III Network security and Cryptography Examination-2016 Model Paper 1

More on Cryptography CS 136 Computer Security Peter Reiher January 19, 2017

Pass, No Record: An Android Password Manager

9/30/2016. Cryptography Basics. Outline. Encryption/Decryption. Cryptanalysis. Caesar Cipher. Mono-Alphabetic Ciphers

GeoPal: Friend Spam Detection in Social Networks with Private Location Proofs

CS 5114 Network Programming Languages Data Plane. Nate Foster Cornell University Spring 2013

tcpcrypt: real transport-level encryption Andrea Bittau, Mike Hamburg, Mark Handley, David Mazieres, Dan Boneh. UCL and Stanford.

Cryptography Basics. IT443 Network Security Administration Slides courtesy of Bo Sheng

Developing Enterprise Cloud Solutions with Azure

A SIMPLE INTRODUCTION TO TOR

Stanford University Computer Science Department CS 240 Sample Quiz 2 Questions Winter February 25, 2005

Sicherheitsaspekte für Flashing Over The Air in Fahrzeugen. Axel Freiwald 1/2017

Cryptography Functions

BUILDING A NEXT-GENERATION FIREWALL

Decentralised Communication: The challenge of balancing interoperability and privacy.

Key Protection for Endpoint, Cloud and Data Center

USER MANUAL FOR SECURE E MAIL MICROSOFT OUTLOOK (2003)

Distributed Social Network in Browsers. Yang Ji Michael Puckett

TinySec: A Link Layer Security Architecture for Wireless Sensor Networks. Presented by Paul Ruggieri

Software Vulnerability Assessment & Secure Storage

Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls

THIRD PARTY AUDITING FOR SECURE DATA STORAGE IN CLOUD THROUGH DIGITAL SIGNATURE USING RSA

Junos Security. Chapter 8: IPsec VPNs Juniper Networks, Inc. All rights reserved. Worldwide Education Services

Introduction to Cryptography and Security Mechanisms: Unit 5. Public-Key Encryption

Personal Internet Security Basics. Dan Ficker Twin Cities DrupalCamp 2018

Network Security - ISA 656 IPsec IPsec Key Management (IKE)

Architectural Support for Copy and Tamper Resistant Software

SSL/TLS & 3D Secure. CS 470 Introduction to Applied Cryptography. Ali Aydın Selçuk. CS470, A.A.Selçuk SSL/TLS & 3DSec 1

Issues. Separation of. Distributed system security. Security services. Security policies. Security mechanism

Sieve: Cryptographically Enforced Access Control for User Data in Untrusted Clouds

RSA and ECDSA. Geoff Huston APNIC. #apricot2017

PyNaCl Release 1.0 Oct 31, 2017

Security Fundamentals

DreamFactory Security Guide

Chapter 4: Securing TCP connections

IEEE Std and IEEE Std 1363a Ashley Butterworth Apple Inc.

Cryptography for Software and Web Developers

Transcription:

ESP Egocentric Social Platform T. J. Purtell, Ian Vo, Monica S. Lam With: Kanak Biscuitwala, Willem Bult, Dan Boneh, Ben Dodson, Steve Fan, and Frank Wang,

Global Social Platforms Ideal for Meeting strangers Stalking people Discovering long lost hook-ups Marketing Hosting lots of personal pictures for free Laboring in the virtual world to avoid real work EULA for most networks Provider owns everything you post.

Egocentric Social Platforms Ideal for Sharing freely I am not going to be at my home which is at 14233 Ridge Way for 2 weeks Maintaining boundaries Mixing Work + Friends = Work Rules Quantified Self Apps Social Finance and Health Apps Limited global internet connectivity Arab spring, natural disaster, 3 rd world

Mobile First Always on Often connected Always with you

Direct Connection DENIED! Friend is offline can t send a message. Friend is on 3G NAT doesn t work. Friend is at work firewall blocked it. The cloud and phones must BUFFER.

Separation of Concerns Break the system into parts Allow consumer choice for those parts Better competition, better evolution Choice must not be HARD

The Split Identity Use existing providers; already have accounts Short-term data Notification/message routing Temporary Blobs Long-term data Backup services

An OS Service Connecting people to run apps is the next evolution of smart device platforms. ESP is the backend for Musubi Social ACLs embedded with encrypted data OS (Musubi for now) handles smart messaging

Social Primitives - Identity 1. Establish an Identity 2. Connect with Friends 3. Short Push Messaging 4. Large Pull Messaging

Everything Encrypted Friends need to exchange public keys Original Musubi generated an RSA key pair on install No way to message someone unless they are already a user No way to reuse existing phone address book

IBC to the Rescue What if the email address, Facebook ID, etc is the public key? Public key would exist before a user installs. Private key allows users to prove their identity P2P

Identity-Based Cryptography Shamir invented using the email address as the public key for signatures in 1984. Encryption of a message to a person using their email address as the public key went unsolved... Boneh and Franklin accomplished this in 2001 using elliptic curve pairings (Weil).

IBC: Server derives the private key The public keys are all well-known and there are public parameters for the IBC server. Any client can check a signature or encrypt a message to someone without talking to the server. To sign or decrypt a message you need the private key.

IBC: Identity Based Cryptography public parameters Verify Decrypt

IBC: Revocation Implicit time based revocation in IBC. Private key is tied to a specific time frame Stolen private key = only lose control of data sent during that time frame Lost private key = just request it again

Identities and Friends Solved with IBC + Mobile phone address book Can communicate P2P with trust Ideal : OAuth provider offers IBC key service Today: Stanford hosts a generic IBC for Gmail+FB+

Improved Revocation IBC automatically expires keys Every message includes implicit revocation Check authorization token at start for revocation through existing mechanisms

Social Primitives - Data 1. Establish an Identity 2. Connect with Friends 3. Short Push Messaging 4. Large Pull Messaging

Protecting Data Messages encrypted with AES Social ACL attached hashed identities IBC encrypted secrets Encryption enforces ACL Servers can apply it at a higher level ACL serves as routing information

Message Routing IP : Identity Each device has a message queue Identity is a fan out to multiple devices Frequently used groups can be fan outs Messages buffered to stable storage

Adapted AMQP Queue A stream of messages buffered persistently until consumed Exchange A destination for a message that rebroadcasts it to other exchanges or queues

Large Pull Messaging Small messages ideal for push HD quality is still needed Push a thumbnail with a pointer to a large blob of data Other devices download the full copy lazily

ESP Architecture All data are encrypted outside the mobile device

First Time Flow

Activate an Existing Identity

Contact a Friend for the 1 st Time

Responding to the 1 st Message

Evaluation

IBC and Mobile Device Performance An IBC operation takes a second! Use cached AES key between a pair of individuals Embedded in social ACL Protected by IBC Update the pair key when either identity expires On average 15 days

Message Format

Social Behavior Models IBC Expiration: 1 month Facebook Twitter Contextual # senders 229 friends 100 followings 20 friends # recipients 229 friends 10,000 followers 20 friends # posts / day 100 100 10,000 # msgs received / sender / day 100 100 10,000 msg length 50 KBytes 4 KBytes 4KBytes

Sending Costs r: # receivers s: # senders t: Expiration period (1 month) m s : Messages sent Operation CPU Time (m s ) Frequency Compute channel key 78 2 s / t Sign encrypted channel key 340 2 s / t Load cached channel key 0.58 m s * r SHA256 of message headers 0.0067 r m s SHA256 of message body 0.026 l m s AES encrypt secret block 0.78 m s * r AES encrypt message body 0.42 l m s * r

Receiving Costs r: # receivers m r : Messages received t: Expiration period (1 month) Operation CPU Time (m r ) Frequency Check user signature 590 2 s / t Decrypt channel key 522 2 s / t Load cached channel key 0.59 m r AES decrypt secret block 0.85 m r AES decrypt message body 0.43 l m r SHA256 of message headers 0.0067 r m r SHA256 of message body 0.026 l m r

Cost for Network Types Simulated Network Min Latency Size Overhead (in bytes) % CPU Send % CPU Receive Facebook 360 ms 59,266 0.05% 0.7% Contextual 74 ms 5,423 0.4% 5.6% Twitter 14 s 2,589,186 1.9% 5.4%

Future ESP messaging deployed in Musubi for Android Work on big blobs and real-time sessions is ongoing What apps need full ESP access vs. Musubi firewalled social access? Standards

Conclusion Attack the open SNS problem with crypto Make the services required dead simple Smarts on the devices They can handle it ESP is the basis for a compelling platform http://mobisocial.stanford.edu/musubi