81
Crypto-Book: An Architecture for Privacy Preserving Online Identities John Maheswaran , David Isaac Wolinsky, Bryan Ford HotNets ’13 (11/22/2013)

Hotnets Slides

  • Upload
    mahan9

  • View
    3.332

  • Download
    0

Embed Size (px)

DESCRIPTION

Crypto-Book Hotnets Slides

Citation preview

Page 1: Hotnets Slides

Crypto-Book: An Architecture for Privacy Preserving Online Identities

John Maheswaran, David Isaac Wolinsky, Bryan Ford

HotNets ’13 (11/22/2013)

Page 2: Hotnets Slides

Talk Overview

• The problem– Cross-site Authentication– Social network privacy concerns

• Solution– Overview– Key assignment– Conscripting an anonymity set– Anonymous login

• Conclusions and future work

Page 3: Hotnets Slides

Talk Overview

• The problem– Cross-site Authentication– Social network privacy concerns

• Solution– Overview– Key assignment– Conscripting an anonymity set– Anonymous login

• Conclusions and future work

Page 4: Hotnets Slides

Cross-site Authentication

Page 5: Hotnets Slides

Cross-site Authentication

Page 6: Hotnets Slides

Cross-site Authentication

Page 7: Hotnets Slides

Cross-site Authentication

Page 8: Hotnets Slides

Cross-site AuthenticationTr

acki

ng in

fo Tracking info

Tracking info

Page 9: Hotnets Slides

Talk Overview

• The problem– Cross-site Authentication– Social network privacy concerns

• Solution– Overview– Key assignment– Conscripting an anonymity set– Anonymous login

• Conclusions and future work

Page 10: Hotnets Slides

Talk Overview

• The problem– Cross-site Authentication– Social network privacy concerns

• Solution– Overview– Key assignment– Conscripting an anonymity set– Anonymous login

• Conclusions and future work

Page 11: Hotnets Slides

Privacy and Security Concerns

Page 12: Hotnets Slides

Privacy and Security Concerns

Page 13: Hotnets Slides

Privacy and Security Concerns

Page 14: Hotnets Slides

Privacy and Security Concerns

Page 15: Hotnets Slides

Privacy and Security Concerns

Page 16: Hotnets Slides

Privacy and Security Concerns

Page 17: Hotnets Slides

Privacy and Security Concerns

Page 18: Hotnets Slides

Privacy and Security Concerns

Page 19: Hotnets Slides

Problem Summary• Increasingly use of cross-site authentication– OAuth, OpenID, Facebook/Twitter/Google+ login

• Use social network for online IDs– Convenient, easy to use

• Using these IDs brings privacy/tracking risks– Cross-site tracking, browsing history, actions across

different sites

Page 20: Hotnets Slides

Talk Overview

• The problem– Cross-site Authentication– Social network privacy concerns

• Solution– Overview– Key assignment– Conscripting an anonymity set– Anonymous login

• Conclusions and future work

Page 21: Hotnets Slides

Talk Overview

• The problem– Cross-site Authentication– Social network privacy concerns

• Solution– Overview– Key assignment– Conscripting an anonymity set– Anonymous login

• Conclusions and future work

Page 22: Hotnets Slides

Goals

• Crypto-Book aims to– Allow users to use social network IDs– Provide better privacy between social network

and third party sides

Page 23: Hotnets Slides

Crypto-Book

Personally identifiable social networking ID

Page 24: Hotnets Slides

Crypto-Book

Personally identifiable social networking ID

Page 25: Hotnets Slides

Crypto-Book Layer

Personally identifiable social networking ID

Crypto-Book privacy preserving layer

Page 26: Hotnets Slides

Crypto-Book Layer

Personally identifiable social networking ID

Crypto-Book privacy preserving layer

Page 27: Hotnets Slides

Crypto-Book Layer

Personally identifiable social networking ID

Anonymized IDs – one pseudonym per site

Crypto-Book privacy preserving layer

Page 28: Hotnets Slides

Crypto-Book Layer

Crypto-Book privacy preserving layer

Page 29: Hotnets Slides

Crypto-Book Layer

Crypto-Book privacy preserving layer

Not linkable by Facebook, Crypto-Book or by third party sites

Page 30: Hotnets Slides

Talk Overview

• The problem– Cross-site Authentication– Social network privacy concerns

• Solution– Overview– Key assignment– Conscripting an anonymity set– Anonymous login

• Conclusions and future work

Page 31: Hotnets Slides

Talk Overview

• The problem– Cross-site Authentication– Social network privacy concerns

• Solution– Overview– Key assignment– Conscripting an anonymity set– Anonymous login

• Conclusions and future work

Page 32: Hotnets Slides

Key Assignment

• Cross-site authentication often relies on OAuth/OpenID

• Crypto-Book fits into OAuth protocol to isolate third party site from social network– Protects cross-site privacy– Assigns key pairs to social network IDs

Page 33: Hotnets Slides

OAuth

Page 34: Hotnets Slides

OAuth

Give me a limited scope OAuth access token

Page 35: Hotnets Slides

OAuth

Give me a limited scope OAuth access token Issue me an OAuth

access token with requested scope

Page 36: Hotnets Slides

OAuth

Give me a limited scope OAuth access token Issue me an OAuth

access token with requested scope

Page 37: Hotnets Slides

OAuth

Give me a limited scope OAuth access token Issue me an OAuth

access token with requested scope

Page 38: Hotnets Slides

Key Assignment

• To use privacy preserving cryptographic techniques– have to assign public/private keypairs to users

• Cloud of key servers with split trust• Clients do not provide own key– Allows us to conscript users into anonymity sets

without their knowledge/permission

Page 39: Hotnets Slides

OAuth

Give me a limited scope OAuth access token Issue me an OAuth

access token with requested scope

Page 40: Hotnets Slides

OAuth

Page 41: Hotnets Slides

Crypto-Book Workflow

Page 42: Hotnets Slides

Crypto-Book Workflow

Page 43: Hotnets Slides

Crypto-Book Workflow

Page 44: Hotnets Slides

Crypto-Book Workflow

Page 45: Hotnets Slides

Crypto-Book Workflow

Page 46: Hotnets Slides

Crypto-Book Workflow

Page 47: Hotnets Slides

Crypto-Book Workflow

abuse resistant anonymous 1-to-1 mapping

Page 48: Hotnets Slides

Anytrust key servers• An anytrust cloud is:– a decentralized client/server network model– trust there is at least one honest server

• Anytrust cloud of key servers– assigns key pairs to each social network user– Run by various privacy advocates e.g. EFF

Page 49: Hotnets Slides

Anytrust key servers

Key Server

Key Server

Key Server

Page 50: Hotnets Slides

Anytrust key servers

Key Server

Key Server

Key Server

Page 51: Hotnets Slides

Anytrust key servers

Key Server

Key Server

Key Server

Page 52: Hotnets Slides

Anytrust key servers

Key Server

Key Server

Key Server

Page 53: Hotnets Slides

Talk Overview

• The problem– Cross-site Authentication– Social network privacy concerns

• Solution– Overview– Key assignment– Conscripting an anonymity set– Anonymous login

• Conclusions and future work

Page 54: Hotnets Slides

Talk Overview

• The problem– Cross-site Authentication– Social network privacy concerns

• Solution– Overview– Key assignment– Conscripting an anonymity set– Anonymous login

• Conclusions and future work

Page 55: Hotnets Slides

Anonymity set conscription

Page 56: Hotnets Slides

Anonymity set conscription

Page 57: Hotnets Slides

Anonymity set conscription

Page 58: Hotnets Slides

Anonymity set conscription

Page 59: Hotnets Slides

Anonymity set conscription

Page 60: Hotnets Slides

Anonymity set conscription

Page 61: Hotnets Slides

Talk Overview

• The problem– Cross-site Authentication– Social network privacy concerns

• Solution– Overview– Key assignment– Conscripting an anonymity set– Anonymous login

• Conclusions and future work

Page 62: Hotnets Slides

Talk Overview

• The problem– Cross-site Authentication– Social network privacy concerns

• Solution– Overview– Key assignment– Conscripting an anonymity set– Anonymous login

• Conclusions and future work

Page 63: Hotnets Slides

Balancing Anonymity with Accountability

• Need to balance:– Supporting free speech, free expression of opinion– Improving the quality of public discourse. By

allowing people to fully hide anonymously, they may do things they would not otherwise• e.g. Wikipedia sock-puppetry, vandalism

Page 64: Hotnets Slides

Balancing Anonymity with Accountability

• Solution needs to provide both– Anonymity– Accountability

• Wikipedia would like to allow users to remain anonymous, but are worried about vandalism– Users need to be anonymous yet accountable

Page 65: Hotnets Slides

Digital Signature

Page 66: Hotnets Slides

Digital Signature

Page 67: Hotnets Slides

Digital Signature

Page 68: Hotnets Slides

Digital Signature

Page 69: Hotnets Slides

Linkable Ring Signature (LRS)

Page 70: Hotnets Slides

Linkable Ring Signature (LRS)

Page 71: Hotnets Slides

Linkable Ring Signature (LRS)

Page 72: Hotnets Slides

Linkable Ring Signature (LRS)

Page 73: Hotnets Slides

Linkable Ring Signature (LRS)

• Created by member of a group of users (each have keys)

• Third party can verify:– Some member of the group signed something– If two signatures are by same member

• Third party cannot discover– Which specific user created the signature

Page 74: Hotnets Slides

Privacy Preserving Crypto Layer

• LRS has linkage tag– If a client generates two LRSs, they will have the

same linkage tag– Means LRSs can be linked across time

• Linkage tag provides accountability– 1-to-1 mapping between Facebook users and

anonymized identities

Page 75: Hotnets Slides

Crypto-Book Summary

Page 76: Hotnets Slides

Crypto-Book Summary

abuse resistant anonymous 1-to-1 mapping

Page 77: Hotnets Slides

Talk Overview

• The problem– Cross-site Authentication– Social network privacy concerns

• Solution – Overview– Key assignment– Conscripting an anonymity set– Anonymous login

• Conclusions and future work

Page 78: Hotnets Slides

Talk Overview

• The problem– Cross-site Authentication– Social network privacy concerns

• Solution – Overview– Key assignment– Conscripting an anonymity set– Anonymous login

• Conclusions and future work

Page 79: Hotnets Slides

Future Work

• Provide OAuth/OpenID API– Integration with more third party sites

• Deploy Crypto-Book key servers at various host institutions

• Abuse resistant way of using anonymous systems such as Tor

• Investigation of anonymity set selection

Page 80: Hotnets Slides

Conclusion

• Crypto-Book provides privacy preserving online identities – anonymous – abuse resistant

• www.crypto-book.com– Demo video– More info, SOSP’13 poster, more talk slides– Link to source code on GitHub

Page 81: Hotnets Slides

Questions?

www.crypto-book.com