SRDS Final
SRDS Final
SRDS Final
Management in Cloud
Rohit Ranchal, Bharat Bhargava, Pelin Angin, Noopur Singh,
Lotfi Ben Othmane, Leszek Lilien
Mark Linderman
[email protected]
Air Force Research Laboratory
Rome, NY, USA
User on
Amazon Cloud
• Name
• E-mail
• Password
• Billing Address • Name
• Shipping Address • Billing Address
• Credit Card • Credit Card
• Name
• E-mail
• Password
• Billing Address
• Shipping Address
• Credit Card
• Name
• E-mail
• Shipping Address
• Name
• E-mail
• Shipping Address
Motivation
User on
Amazon Cloud
• Name
• Billing Address
• Credit Card
• Name
• E-mail
• Password
• Billing Address
• Shipping Address
• Credit Card
Identity Management (IDM)
IDM in traditional application-centric IDM model
◦ Each service keeps track of identifying information of its users.
Existing IDM Systems
◦ Microsoft Windows CardSpace [W. A. Alrodhan]
◦ OpenID [http://openid.net]
◦ PRIME [S. F. Hubner, Karlstad Univ]
User on Amazon
Cloud ZKP Interactive Protocol
User Application
Active Bundle
Active Bundle Active
Creator Bundle (AB)
Directory
Facilitator
Trust Evaluation
Active Bundle Coordinator Agent (TEA)
Predicate Request*
• E-mail
• E(Name)
• Password
• E(Billing Address)
• E(Name)
• E(Credit Card)
• E(Shipping Address)
• E(Billing Address)
• E(Credit Card)
Predicate Request
• E(Name)
• E(Billing Address)
• E(Credit Card)
K ’1 K ’2 K ’3 K ’n
Predicate Reply*
• Name
• Billing Address
• Credit Card
K ’1 K ’2 K ’3 K ’n
*Age Verified
*Credit Card Verified
Selective Disclosure
• User Policies in the Active Bundle dictate dissemination
Selective disclosure*
• E-mail • E-mail
• Password • E(Name)
• E(Name) • E(Shipping Address)
• E(Shipping Address)
• E(Billing Address)
• E(Credit Card)
Selective disclosure*
• E-mail • E(Name)
• E(Name) • E(Shipping Address)
• E(Shipping Address)
*e-bay seller shares the encrypted information based on the user policy
Selective Disclosure
Selective disclosure
• E-mail • Name
• E(Name) • Shipping Address
• E(Shipping Address)
Selective disclosure
• E-mail • Name
• E(Name) • Shipping Address
• E(Shipping Address)
User on Amazon
Cloud
• E-mail
• Password
• Name
• Billing Address
• Credit Card
• Name
• E-mail
• Password
• Billing Address
• Shipping Address
• Credit Card
• E-mail
• Name
• Shipping Address
Characteristics and Advantages
Ability to use Identity data on untrusted hosts
• Self Integrity Check
Any question?
Approach - 1
IDM Wallet:
◦ Use of AB scheme to protect PII from untrusted
hosts.
Anonymous Identification:
◦ Use of Zero-knowledge proofing for authentication
of an entity without disclosing its identifier.
Components of Active Bundle
(Approach – 1)
Identity data: Data used during authentication,
getting service, using service (i.e. SSN, Date of
Birth).
Disclosure policy: A set of rules for choosing
Identity data from a set of identities in IDM
Wallet.
Disclosure history: Used for logging and
auditing purposes.
Negotiation policy: This is Anonymous
Identification, based on the Zero Knowledge
Proofing.
Virtual Machine: Code for protecting data on
untrusted hosts. It enforces the disclosure
policies.
Anonymous Identification (Approach –
1)
Anonymous Identification
(Shamir's approach for Credit Cards)
IdP provides Encrypted Identity
Information to the user and SP.
SP and User interact
Both run IdP's public function on the
certain bits of the Encrypted data.
Both exchange results and agree if it
matches.
Usage Scenario (Approach – 1)
Approach - 2
Active Bundle scheme to protect PII from
untrusted hosts
Predicates over encrypted data to
authenticate without disclosing
unencrypted identity data.
Multi-party computing to be independent
of a trusted third party
Usage Scenario (Approach – 2)
Owner O encrypts Identity Data(PII) using
algorithm Encrypt and O’s public key PK.
Encrypt outputs CT—the encrypted PII.
SP transforms his request for PII to a predicate
represented by function p.
SP sends shares of p to the n parties who hold the
shares of MSK.
n parties execute together KeyGen using PK,
MSK, and p, and return TKp to SP.
SP calls the algorithm Query that takes as input
PK, CT, TKp and produces p(PII) which is the
evaluation of the predicate.
The owner O is allowed to use the service only
when the predicate evaluates to “true”.
Representation of identity
information for negotiation
Token/Pseudonym
Identity Information in clear plain text
Active Bundle
Motivation:
Authentication Process using PII