Top Banner
Vault: A Secure Binding Service Guor-Huar Lu, Changho Choi, Zhi-Li Zh ang University of Minnesota
30

Vault: A Secure Binding Service Guor-Huar Lu, Changho Choi, Zhi-Li Zhang University of Minnesota.

Dec 19, 2015

Download

Documents

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Vault: A Secure Binding Service Guor-Huar Lu, Changho Choi, Zhi-Li Zhang University of Minnesota.

Vault: A Secure Binding Service

Guor-Huar Lu, Changho Choi, Zhi-Li ZhangUniversity of Minnesota

Page 2: Vault: A Secure Binding Service Guor-Huar Lu, Changho Choi, Zhi-Li Zhang University of Minnesota.

What are binding services? A binding service:

Stores bindings (a <key,value> pair) Translates (binding) key into (binding) values.

DNS is a good example maps hostnames into IP addresses Reverse lookup maps IP addresses into hostnames

Other example: SIP registrars, location service in MANET, etc.

Page 3: Vault: A Secure Binding Service Guor-Huar Lu, Changho Choi, Zhi-Li Zhang University of Minnesota.

Outline

Binding Services Motivation, Challenges and Approach Vault Evaluation Conclusion

Page 4: Vault: A Secure Binding Service Guor-Huar Lu, Changho Choi, Zhi-Li Zhang University of Minnesota.

Generic Binding Services What is generic binding services?

Internet-scale infrastructure service Allows arbitrary key-value pairs Many applications can use the same

infrastructure Why is it different from typical lookup

service? Ownership is essential E.g., in reverse DNS lookup the key (IP address)

gives no indication of the owner. Security is important!

Page 5: Vault: A Secure Binding Service Guor-Huar Lu, Changho Choi, Zhi-Li Zhang University of Minnesota.

Secure Binding Services Two minimum requirements:

Only the owner can update or delete its bindings

The binding returned must be the correct one deposited by the owner

Must be robust against “man-in-the-middle” attacks An attacker between users and the

service can intercept and modify messages

Page 6: Vault: A Secure Binding Service Guor-Huar Lu, Changho Choi, Zhi-Li Zhang University of Minnesota.

Objective A generic binding service that is

Scalable Robust Secure

Distributed Hash Table (DHT) Takes care of scalability and robustness Semantic free, flat id space allows generality

What about security? RSA/PKI enough? Not really.. Other crypto-mechanisms?

Page 7: Vault: A Secure Binding Service Guor-Huar Lu, Changho Choi, Zhi-Li Zhang University of Minnesota.

Example: Binding service using DHT

Similar to DHT’s put/get operations. B=(k,v), idk=H(k)

root(idk)

Question: how to make it secure?

put(idk, B)get(idk)

Return OK or BUser

Page 8: Vault: A Secure Binding Service Guor-Huar Lu, Changho Choi, Zhi-Li Zhang University of Minnesota.

RSA/PKI approach Not robust against “man-in-the-middle”

attacks Users can sign their requests

Signatures can be easily replaced Using Certificates?

only if the binding key is part of the owner id. Key problem: need to verify the association

between user id and public key Need another secure binding service!

Page 9: Vault: A Secure Binding Service Guor-Huar Lu, Changho Choi, Zhi-Li Zhang University of Minnesota.

Our approach: using IBE

In identity-based encryption (IBE) identity is the public key! Private key can be generated on-demand

Key idea: use IBE to establish secure channels between users and the system.

Robust against MITM attacks

Page 10: Vault: A Secure Binding Service Guor-Huar Lu, Changho Choi, Zhi-Li Zhang University of Minnesota.

DHT+IBE: an example

Private Key Generator (PKG)

DHT System

User

root(idk)

Encrypt data and sk using idk

Send encrypted data to the service

Return responseencrypted with sk

Retrieves the private key for idk

Page 11: Vault: A Secure Binding Service Guor-Huar Lu, Changho Choi, Zhi-Li Zhang University of Minnesota.

Outline

Introduction Motivation, Challenges and Approach Vault Evaluation Conclusion

Page 12: Vault: A Secure Binding Service Guor-Huar Lu, Changho Choi, Zhi-Li Zhang University of Minnesota.

Vault: Architecture overview Two-level

architecture Better control over

the service Efficient key

management Pillars: issue keys Columns: handle

users and store bindings.

Pillars

Columns

Zone 1Zone 4

Zone 2Zone 3

Page 13: Vault: A Secure Binding Service Guor-Huar Lu, Changho Choi, Zhi-Li Zhang University of Minnesota.

Vault: Design principles Secures user to service

communication Use IBE to establish secure channels

Focus on the basic mechanism But provide hooks for namespace

management Secures internal system operations

Only active columns should serve user requests

Page 14: Vault: A Secure Binding Service Guor-Huar Lu, Changho Choi, Zhi-Li Zhang University of Minnesota.

Vault: basic operations User Operations:

Registration for owners Provides necessary hooks for namespace

management Establish owner credential with its user id.

Insertion Update and delete Query

Internal Operations: Key retrieval between column and pillars

Page 15: Vault: A Secure Binding Service Guor-Huar Lu, Changho Choi, Zhi-Li Zhang University of Minnesota.

User operation example: insertion

Binding is sent to home column first.

Home column verifies ownership and forwards to root(idk)

root(idk) returns encrypted response.

Page 16: Vault: A Secure Binding Service Guor-Huar Lu, Changho Choi, Zhi-Li Zhang University of Minnesota.

Internal operations Secure Key

retrieval process Two way hash-

chains allows the pillar to: Verify a node is

currently active Verify a node’s

id space range

Page 17: Vault: A Secure Binding Service Guor-Huar Lu, Changho Choi, Zhi-Li Zhang University of Minnesota.

Outline

Introduction Motivation, Challenges and Approach Vault Evaluation Conclusion

Page 18: Vault: A Secure Binding Service Guor-Huar Lu, Changho Choi, Zhi-Li Zhang University of Minnesota.

Local Testbed: System response time

The more nodes the better the performance.

IBE operations are expensive, the price we pay for added security.

Page 19: Vault: A Secure Binding Service Guor-Huar Lu, Changho Choi, Zhi-Li Zhang University of Minnesota.

Planetlab

• System response time does not change much.

• Some other factors?

Page 20: Vault: A Secure Binding Service Guor-Huar Lu, Changho Choi, Zhi-Li Zhang University of Minnesota.

Planetlab Wide area network

latency has large impact.

Local proxy should help

Page 21: Vault: A Secure Binding Service Guor-Huar Lu, Changho Choi, Zhi-Li Zhang University of Minnesota.

Conclusion

New approach in constructing generic secure binding services. DHT+IBE

Cornerstone for future networks and applications.

Currently building more applications using Vault.

Page 22: Vault: A Secure Binding Service Guor-Huar Lu, Changho Choi, Zhi-Li Zhang University of Minnesota.

Thank YouQuestions?

Page 23: Vault: A Secure Binding Service Guor-Huar Lu, Changho Choi, Zhi-Li Zhang University of Minnesota.

Extras

Extra slides follows

Page 24: Vault: A Secure Binding Service Guor-Huar Lu, Changho Choi, Zhi-Li Zhang University of Minnesota.

Example: Binding Service using DHT

Basic operation To insert a binding B=(k,v)

Compute idk=H(k) The owner “puts” B at a node responsible for idk

To query B Again, compute idk=H(k) The Querier “gets” B from the node responsible for

idk

Question: how to make it secure?

Page 25: Vault: A Secure Binding Service Guor-Huar Lu, Changho Choi, Zhi-Li Zhang University of Minnesota.

DHT+IBE: an example

User

root(idk)

Private Key Generator (PKG)

2. Send encrypted data to the service

3. Retrieves private key for idk

1. Encrypts data and sk using idk

4. Returns response

encrypted with sk

Page 26: Vault: A Secure Binding Service Guor-Huar Lu, Changho Choi, Zhi-Li Zhang University of Minnesota.

DHT+IBE Encrypts data and a symmetric key sk with idk

Sends encrypted data to the service The root node of idk (root(idk)) requests a key fo

r idk

root(idk) decrypts the data, returns a reply encrypted using sk

Page 27: Vault: A Secure Binding Service Guor-Huar Lu, Changho Choi, Zhi-Li Zhang University of Minnesota.

User Operation: Update and Delete Two modes:

direct if symmetric key is still valid, indirect if it expires.

No IBE in direct mode: efficient!

Indirect mode is similar to the insert operation.

Page 28: Vault: A Secure Binding Service Guor-Huar Lu, Changho Choi, Zhi-Li Zhang University of Minnesota.

User Operations: Query

Queriers: No need to reg

ister Queries:

Delivered to root(idk) directly.

Symmetric key: Prevents MITM

attacks Nonce:

Prevents reply attacks.

Page 29: Vault: A Secure Binding Service Guor-Huar Lu, Changho Choi, Zhi-Li Zhang University of Minnesota.

Evaluations

Evaluate computational overhead and system response time

Computation overhead for local testbed

Computational overhead for crypto-primitives

Computational overhead for binding operations

Page 30: Vault: A Secure Binding Service Guor-Huar Lu, Changho Choi, Zhi-Li Zhang University of Minnesota.

Additional Enhancement

Local Vault Proxy Reduce latency

Binding Delegation Reduce Flash crowd effect

Timed permit Defend against DoS attacks