Cloud and Mobile Computing



Similar documents
An Introduction to the RSA Encryption Method

An Efficient and Secure Data Sharing Framework using Homomorphic Encryption in the Cloud

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

perform computations on stored data (Elastic Compute Cloud (EC2). )

Secure Network Communication Part II II Public Key Cryptography. Public Key Cryptography

Advanced Cryptography

FACTORING LARGE NUMBERS, A GREAT WAY TO SPEND A BIRTHDAY

Mathematics of Internet Security. Keeping Eve The Eavesdropper Away From Your Credit Card Information

Network Security. Omer Rana

Associate Prof. Dr. Victor Onomza Waziri

A COMPARATIVE STUDY OF SECURE SEARCH PROTOCOLS IN PAY- AS-YOU-GO CLOUDS

Forward Secrecy: How to Secure SSL from Attacks by Government Agencies

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography

NEW CRYPTOGRAPHIC CHALLENGES IN CLOUD COMPUTING ERA

ANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMING

An Efficient Data Security in Cloud Computing Using the RSA Encryption Process Algorithm

IMPROVED SECURITY MEASURES FOR DATA IN KEY EXCHANGES IN CLOUD ENVIRONMENT

Efficient and Robust Secure Aggregation of Encrypted Data in Wireless Sensor Networks

The application of prime numbers to RSA encryption

CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives

Elements of Applied Cryptography Public key encryption

A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA

ESPRESSO: An Encryption as a Service for Cloud Storage Systems

Network Security. Security. Security Services. Crytographic algorithms. privacy authenticity Message integrity. Public key (RSA) Message digest (MD5)

AStudyofEncryptionAlgorithmsAESDESandRSAforSecurity

SAS Data Set Encryption Options

CSCE 465 Computer & Network Security

A Comparative Study of Applying Real- Time Encryption in Cloud Computing Environments

Keywords- Cloud Computing, Android Platform, Encryption, Decryption, NTRU, RSA, DES, throughput.

Applied Cryptography Public Key Algorithms

Network Security. Gaurav Naik Gus Anderson. College of Engineering. Drexel University, Philadelphia, PA. Drexel University. College of Engineering

Binary Number System. 16. Binary Numbers. Base 10 digits: Base 2 digits: 0 1

Fully homomorphic encryption equating to cloud security: An approach

Privacy and Security in Cloud Computing

Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu

The Mathematics of the RSA Public-Key Cryptosystem

Public Key Cryptography and RSA. Review: Number Theory Basics

Secure and privacy-preserving DRM scheme using homomorphic encryption in cloud computing

Secure Computation Martin Beck

CRYPTOGRAPHY IN NETWORK SECURITY

Computing on Encrypted Data

RSA Question 2. Bob thinks that p and q are primes but p isn t. Then, Bob thinks Φ Bob :=(p-1)(q-1) = φ(n). Is this true?

siftservice.com - Turning a Computer Vision algorithm into a World Wide Web Service

A Fully Homomorphic Encryption Implementation on Cloud Computing

Lecture 3: One-Way Encryption, RSA Example

FPGAs for Trusted Cloud Computing

Implementing RSA Algorithm in MANET and Comparison with RSA Digital Signature Spinder Kaur 1, Harpreet Kaur 2

International Journal of Advance Foundation and Research in Computer (IJAFRC) Volume 2, Special Issue (NCRTIT 2015), January 2015.

Computer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University

3-6 Toward Realizing Privacy-Preserving IP-Traceback

Cryptography and Network Security Chapter 9

Security in Distributed Systems. Network Security

Published by the IEEE Computer Society

A Survey on Performance Analysis of DES, AES and RSA Algorithm along with LSB Substitution Technique

AN IMPLEMENTATION OF HYBRID ENCRYPTION-DECRYPTION (RSA WITH AES AND SHA256) FOR USE IN DATA EXCHANGE BETWEEN CLIENT APPLICATIONS AND WEB SERVICES

Public Key Cryptography: RSA and Lots of Number Theory

CIS 5371 Cryptography. 8. Encryption --

RSA Attacks. By Abdulaziz Alrasheed and Fatima

The Scientific Data Mining Process

Side Channel Analysis and Embedded Systems Impact and Countermeasures

CHAPTER 1 INTRODUCTION

Securing Data in the Cloud

Computer Networks. Network Security 1. Professor Richard Harris School of Engineering and Advanced Technology

High speed 3D capture for Configuration Management DOE SBIR Phase II Paul Banks

How To Protect Your Data From Being Hacked On Security Cloud

CPSC 467b: Cryptography and Computer Security

Evaluating The Performance of Symmetric Encryption Algorithms

CS Computer Security Third topic: Crypto Support Sys

Techniques of Asymmetric File Encryption. Alvin Li Thomas Jefferson High School For Science and Technology Computer Systems Lab

Simple Encryption/Decryption Application

Secure Network Communication Based on Text-to-Image Encryption

Privacy-preserving Data-aggregation for Internet-of-things in Smart Grid

Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ MEng. Nguyễn CaoĐạt

Overview of Public-Key Cryptography

An Efficient data storage security algorithm using RSA Algorithm

Big Data Systems CS 5965/6965 FALL 2014

Information Security Theory vs. Reality

A NOVEL STRATEGY TO PROVIDE SECURE CHANNEL OVER WIRELESS TO WIRE COMMUNICATION

: Network Security. Name of Staff: Anusha Linda Kostka Department : MSc SE/CT/IT

Network Security. Security Attacks. Normal flow: Interruption: 孫 宏 民 Phone: 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室

Secure cloud access system using JAR ABSTRACT:

Privacy Preservation and Secure Data Sharing in Cloud Storage

Saving Mobile Battery Over Cloud Using Image Processing

Lukasz Pater CMMS Administrator and Developer

Cloud Security and Algorithms: A Review Divya saraswat 1, Dr. Pooja Tripathi 2 1

Privacy & Security of Mobile Cloud Computing (MCC)

Properties of Secure Network Communication

Virtual Mouse Using a Webcam

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

Experimental Analysis of Privacy-Preserving Statistics Computation

Speeding Up RSA Encryption Using GPU Parallelization

Transcription:

Cloud and Mobile Computing Protect Privacy in Offloading Yung-Hsiang Lu Electrical and Computer Engineering Purdue University

Technological Trends Mobile systems become primary computing platforms for most people. Mobile systems have limited resources: storage, performance, network bandwidths, and battery life. Cloud computing gains popularity replacing inhouse servers and desktop applications. Existing cloud services: webmail, video hosting, social networks Can the cloud help mobile users? Can mobile systems help the cloud? o Mobile systems need resources. o The cloud needs (real-time) data. 2

"Cheap" Massive Parallelism allow users to rent many computers for only hours meet the increasing need for storage, organization, analysis of large amounts of data (image, video, audio, document ) by end users respond to events by allocating resources quickly (for example, simulations in emergency) 3

Computation Offloading mobile system heavy computation (e.g. image search and recognition) high-performance server 4

Demo: Computation Offloading for Robot 5

Challenges offer fine-grained offloading services (for seconds or minutes, not hours or months) schedule real-time tasks with high parallelism (such as image processing and object recognition) provide easy-to-program interface with automatic parallelism detection and scalability tolerate bandwidth fluctuations with multiple levels of details / accuracy design programming languages for applications whose executions may be migrated easily protect privacy 6

Are you willing to put private information in the cloud? 7

NCTU 2010/12/18-19 8

NCTU 2010/12/18-19 9

NCTU 2010/12/18-19 10

NCTU 2010/12/18-19 11

NCTU 2010/12/18-19 12

NCTU 2010/12/18-19 13

Energy Savings in Privacy- Preserving Computation Offloading with Protection by Homomorphic Encryption Jibang Liu and Yung-Hsiang Lu Electrical and Computer Engineering Purdue University HotPower 2010, Vancouver, Canada 14

Save Mobile Energy by Offloading mobile system heavy computation (e.g. image search and recognition) high-performance server 15

Technology to Protect Data Anonymize Erase history Steganography Watermark Encryption inside image source: Wikipedia Contribution: first paper showing how to use homomorphic encryption for offloading and saving mobile energy. 16

Is it possible to perform computation on encrypted data? Rivest, Adleman, Dertouzos 1978 17

Process without Access Darkroom locked glovebox 18

Homomorphic Encryption x: plaintext r: result y: ciphertext e(x) = y e: encryption d(y) = x d: decryption f(x) = r f: operation d(f(y)) = r Homomorphic encryption is not an encryption algorithm (like RSA, DES, or AES). Instead, it says that some encryption algorithms allow operations on the encrypted data. 19

Example (Addition) Suppose p and q are two prime numbers, n = pq. y = e(x) = (x + pr) mod n, r is a user-chosen integer x = d(y) = y mod p x must be smaller than p p = 7, q = 5, x1 = 2, x2 = 1 y1 = (2 + 2 7) mod 35 = 16, choose 2 for r y2 = (1 + 6 7) mod 35 = 8, choose 6 for r x1 + x2 = 3 y1 + y2 = 16 + 8 = 24 24 mod 7 = 3 20

Example (Multiplication) y = e(x) = (x + pr) mod n, r is a random integer x = d(y) = y mod p p = 7, q = 5, x1 = 2, x2 = 1 y1 = (2 + 2 7) mod 35 = 16, choose 2 for r y2 = (1 + 6 7) mod 35 = 8, choose 6 for r x1 x2 = 2, y1 y2 = 16 8 = 128 128 mod 7 = 2 (16 16 16) mod 7 = 4096 mod 7 = 1 2 2 2 = 8 In practice, p and q are very large. wrong ("overflow") 21

Nondeterministic Encryption f(x) = r x f r f is + and in the examples x e d y f f(y) d r sometimes x e d y f f(y) d wrong r 22

"Noise" in Homomorphic Encryption x e y f1 f1(y) f2 f2(f1(y)) f3 f3(f2(f1(y))) d more operations noise accumulates eventually falls outside the region. The region's size (i.e. tolerance of noise) depends on the encryption key (larger key, better tolerance) Frequent denoising is needed but no efficient solution was discovered until [Gentry STOC 2009] This paper does not consider denoising. 23

Save Mobile Energy by Offloading mobile system heavy computation (e.g. image search and recognition) high-performance server 24

Gabor Filtering (Insensitive to Rotations and Noise) Original 4-pixel average gray level shuffle 4-pixel block 45-degree rotation 90-degree rotation 180-degree rotation motion blur zoom blur noise 25

Step 1/2 (S1) Scale + Convolution 2 2 1 x y G( x, y) exp( )cos(2 fx ) 2 2 2 2 x xcos ysin y xsin y cos = 1, 10, 100, 200 in our evaluation = 0 /4 /2 3 /4 scale: convert floating point values to integers by multiplying a large number (such as 10,000) 26

Step 2/2 (S2) Features computing "features" using means, standard deviations, and distributions of these images compare the features to find similar images computation intensive S1 S2 Y > 99% N <1% operations + and + and and efficient operations on encrypted data offload Y N Y N 27

Offloading Options (a) images S1 S2 result mobile (b) images S1 S2 result server (c) images encrypt S1 decrypt S2 result Save Energy Protect Privacy (a) N Y (b) Y N (c) Y Y 28

Parameters and Protections encryption key + protection, accuracy - energy saving scaling factor + accuracy attacks ciphertext-only attacks known plaintext chosen plaintext adaptively-chosen plaintext more difficult for an attacker 29

Experimental Setup Mobile: HP ipaq 6954 PDA Server: 2GHz CPU, 3GB memory power measurement: National Instrument data acquisition, power from battery,1 KHz sampling accuracy measured by recall L: number of returned images (20 in our evaluations) Y: number of similar images (10 in our evaluation) X: number matched images recall( L) X Y 30

Results inaccurate because of noise stronger protection Scaling Factor Key Length (bits) 31

better original images steganography encrypted images compared with steganography [ISLPED 2010] The modified Gabor filter can handle both original and encrypted images. 10,000 images from Flickr evaluated on the server 32

better offload and no protection 64-bit key 80-bit 96-bit 112-bit 128-bit 1000 images on the PDA, sent to server at run time baseline: no protection, on PDA, ~2 hours 33

Future Work migrate to newer mobile systems and re-evaluate the parameters extend the Gabor filter to handle zooming use SIFT (scale invariant feature transformation) to handle distortion implement denoising and evaluate the effects on energy consumption and performance compare different encryption algorithms 34

Conclusion Present a method to offload image retrieval with data protected by homomorphic encryption. Obtain accuracy comparable to no protection. Modify Gabor retrieval algorithm that can handle unprotected and protected images. Evaluate the effects of key size and scaling factor. Acknowledgements: This work is supported in part by NSF grants CNS-0716271. Any opinions, findings, and conclusions or recommendations in the paper are those of the authors and do no necessarily reflect the views of the sponsor. 35

36

Encryption and Decryption e(x) = (x + pr) y mod n x + pr = bpq + y y = x + pr - bpq d(y) = y mod p (x + pr - bpq) mod p (x + p(r - bq)) mod p = x 37