Whitewash: Securely Outsourcing Garbled Circuit Generation



Similar documents
Computing on Encrypted Data

Secure Data Exchange: A Marketplace in the Cloud

SECURITY ANALYSIS OF A SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTER NETWORKS

Verifiable Outsourced Computations Outsourcing Computations to Untrusted Servers

Energy Efficiency in Secure and Dynamic Cloud Storage

An Efficient and Secure Data Sharing Framework using Homomorphic Encryption in the Cloud

Secure and Efficient Outsourcing of Sequence Comparisons

Cloud Panel Service Evaluation Scenarios

Privacy, Security and Cloud

CLOUD computing systems, in which the clients

Survey on Efficient Information Retrieval for Ranked Query in Cost-Efficient Clouds

Index Terms Cloud Storage Services, data integrity, dependable distributed storage, data dynamics, Cloud Computing.

Security and Privacy in Big Data, Blessing or Curse?

Experimental Analysis of Privacy-Preserving Statistics Computation

Reuse It Or Lose It: More Efficient Secure Computation Through Reuse of Encrypted Values

Blazing Fast 2PC in the Offline/Online Setting with Security for Malicious Adversaries

Secure Computation Martin Beck

TRACE PERFORMANCE TESTING APPROACH. Overview. Approach. Flow. Attributes

Offloading file search operation for performance improvement of smart phones

Index Terms: Cloud Computing, Third Party Auditor, Threats In Cloud Computing, Dynamic Encryption.

Copyright 1

Patient Controlled Encryption: Ensuring Privacy of Electronic Medical Records

Digital Object Identifier /MSP Date of publication: 5 December 2012

Client Server Registration Protocol

ZQL. a cryptographic compiler for processing private data. George Danezis. Joint work with Cédric Fournet, Markulf Kohlweiss, Zhengqin Luo

Data Storage Security in Cloud Computing for Ensuring Effective and Flexible Distributed System

WIRELESS PUBLIC KEY INFRASTRUCTURE FOR MOBILE PHONES

A Secure & Efficient Data Integrity Model to establish trust in cloud computing using TPA

Security of Cloud Storage: - Deduplication vs. Privacy

Monitoring Data Integrity while using TPA in Cloud Environment

Ensuring Integrity in Cloud Computing via Homomorphic Digital Signatures: new tools and results

Keywords: Authentication, Third party audit, cloud storage, cloud service provider, Access control.

Lecture 10: CPA Encryption, MACs, Hash Functions. 2 Recap of last lecture - PRGs for one time pads

PORs: Proofs of Retrievability for Large Files

Protecting Mobile Devices From TCP Flooding Attacks

The application of prime numbers to RSA encryption

Kleptography: The unbearable lightness of being mistrustful

Privacy Preserving String Pattern Matching on Outsourced Data

IT of SPIM Data Storage and Compression. EMBO Course - August 27th! Jeff Oegema, Peter Steinbach, Oscar Gonzalez

3-6 Toward Realizing Privacy-Preserving IP-Traceback

Multipath TCP in Data Centres (work in progress)

Ensuring Data Storage Security in Cloud Computing

Wireless VPN White Paper. WIALAN Technologies, Inc.

Paillier Threshold Encryption Toolbox

PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING

Verifiable Delegation of Computation over Large Datasets

Applying Cryptography as a Service to Mobile Applications

Secure Deduplication of Encrypted Data without Additional Independent Servers

Enable Public Audit ability for Secure Cloud Storage

A NOVEL STRATEGY TO PROVIDE SECURE CHANNEL OVER WIRELESS TO WIRE COMMUNICATION

Using Data-Oblivious Algorithms for Private Cloud Storage Access. Michael T. Goodrich Dept. of Computer Science

Key Management (Distribution and Certification) (1)

EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY

Dynamic Searchable Encryption in Very Large Databases: Data Structures and Implementation

Official Arbitration with Secure Cloud Storage Application

PRIVACY PRESERVING PUBLIC AUDITING FOR SECURED DATA STORAGE IN CLOUD USING BLOCK AUTHENTICATION CODE

Associate Prof. Dr. Victor Onomza Waziri

Enabling Public Auditing for Secured Data Storage in Cloud Computing

Erasure correcting to enhance data security in cloud data storage

Trusted Public Auditing Process for Secure Cloud Storage

Performance Comparison of low-latency Anonymisation Services from a User Perspective

Data Integrity and Dynamic Storage Way in Cloud Computing

Privacy preserving technique to secure cloud

Whitepaper Performance Testing and Monitoring of Mobile Applications

Cryptography: Authentication, Blind Signatures, and Digital Cash

Testing & Assuring Mobile End User Experience Before Production. Neotys

Boosting Linearly-Homomorphic Encryption to Evaluate Degree-2 Functions on Encrypted Data

February. ISSN:

Database Security. The Need for Database Security

IMCM: A Flexible Fine-Grained Adaptive Framework for Parallel Mobile Hybrid Cloud Applications

Categorical Heuristic for Attribute Based Encryption in the Cloud Server

SPI I2C LIN Ethernet. u Today: Wired embedded networks. u Next lecture: CAN bus u Then: wireless embedded network

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

Data Storage Security in Cloud Computing

Tor Anonymity Network & Traffic Analysis. Presented by Peter Likarish

Transcription:

Whitewash: Securely Outsourcing Garbled Circuit Generation MSR Workshop on Applied Multi-Party Computation February 2014 Henry Hank Carter, Charles Lever, Patrick Traynor

SMC on mobile devices Mobile devices loaded with private and context-sensitive information and applications that use this information Highly constrained system resources (memory, power, processing, communication) 2

Why don t we have mobile SMC? The dominant two-party construction, garbled circuits, requires too much memory and processing power Special purpose protocols can be optimized, but no efficient general purpose techniques Wish: an efficient mobile two-party SFE protocol that generalizes to any function 3

Head in the clouds Given a technique for performing SFE between servers, can we outsource expensive operations to the cloud? How trustworthy is the cloud? Secure outsourcing requires mechanisms for Hiding inputs and outputs Ensuring the cloud follows the protocol 4

Setting A limited mobile device (Bob) communicating with a web server (Alice). Bob also has access to a cloud service (Cloud). Goal: Alice and Bob securely compute a two-party function using garbled circuits. Security: Preserve input and output privacy from both the other party and the cloud Security in the malicious setting 5

Previous work Salus Framework (Kamara et al., CCS 2012) First garbled circuit outsourcing scheme Provides malicious and covert secure protocols for outsourcing CMTB Outsourcing (USENIX Security 2013) Used outsourced oblivious transfer (OOT) to deliver garbled inputs of phone to the evaluating cloud Phone performs some checks to ensure that the cloud doesn t lazily check 6

Can we do better? OT on the phone Reduced, but slow. Bottleneck for parallelization Consistency checks Ensure cloud is behaving, but require exponentiations Shown to be very slow on mobile devices Restricted collusion model Can we improve on these techniques? 7

Whitewash Consider reversing outsourced party (i.e., outsource generation instead of evaluation) Have the mobile device produce random seeds, server generates garbled circuits Standard OT/evaluation between servers to garble evaluating server s inputs 8

Whitewash Built on two garbled circuit advances: shelat-shen (CCS 13) Uses only symmetric-key operations (outside of OT) PCF (Kreuter et al. USENIX 13) compiles smaller circuits with compact program representations Improved efficiency for both mobile and servers Improved Security for certain types of collusion Protocol takes place in 6 phases 9

Phase 1-2: Parameter Setup Random Seeds 10

Phase 1-2: Parameter Setup M, H 10

Phase 1-2: Parameter Setup Label Commit 10

Phase 3: Input Commitment 11

Phase 3: Input Commitment Commit 11

Phase 3: Input Commitment Commit 11

Phase 4: Oblivious Transfers Circuit, Input 12

Phase 5: Evaluation Pipeline 13

Phase 6: output proof and release Integrity Proof 14

Phase 6: output proof and release Blind Blind 14

What have we gained? No OT on the phone Mobile device generates randomness and input wire labels, so it can garble its own input No consistency check on the phone Significantly reduces the number of group algebraic ops required on the device Stronger collusion resistance Secure when mobile and cloud collude In exchange: randomness generation Can be done a priori to save time. 15

Collusion Assumptions Kamara et al. notes that an outsourcing scheme with collusion implies an SFE scheme where one party performs sub-linear work w.r.t. circuit size. Previous work assumes NO collusion with the cloud Whitewash reduces to shelat-shen 13 when Bob and Cloud collude Loss of fair release Remains malicious secure Realistic scenario: cloud service may collude with the customer 16

Evaluation Server setup 64 core, 1 TB memory 802.11g wireless connection Samsung Nexus One Test circuits Hamming Distance Matrix-Multiplication RSA Comparison against KsS, CMTB 17

Improvement: execution time Hamming Dist 3000 2500 WW CMTB KSS Time (sec) 2000 1500 1000 500 0 Hamming 1600 Hamming 16384 Circuit X 18

Improvement: execution time Hamming Dist 3000 2500 96% WW CMTB KSS Time (sec) 2000 1500 1000 500 0 Hamming 1600 Hamming 16384 Circuit X 18

Improvement: execution time Matrix-Mult 2500 2000 WW CMTB Time (sec) 1500 1000 500 0 3x3 5x5 8x8 16x16 Circuit 19

Improvement: execution time Matrix-Mult 73% Time (sec) 2500 2000 1500 1000 WW CMTB 98% 500 0 3x3 5x5 8x8 16x16 Circuit 19

Improvement: execution time Matrix-Mult 3x3 Time (sec) 10 3 10 2 10 1 CHKS MOBI EVL OT CHKS MOBI EVL 10 0 WW OT CMTB 20

Improvement: Bandwidth Bandwidth (MB) Reduction Over Circuit WW CMTB KSS CMTB KSS Hamming (1600) 23.56 41.05 240.33 42.62% 90.20% Hamming (16384) 241.02 374.03 x 35.56% x Matrix (3x3) 4.26 11.50 x 62.97% x Matrix (5x5) 11.79 23.04 x 48.82% x Matrix (8x8) 30.15 51.14 x 41.05% x Matrix (16x16) 120.52 189.52 x 36.41% x RSA-256 3.97 x x x x 21

Improvement: Bandwidth Bandwidth (MB) Reduction Over Circuit WW CMTB KSS CMTB KSS Hamming (1600) 23.56 41.05 240.33 42.62% 90.20% Hamming (16384) 241.02 374.03 x 35.56% x Matrix (3x3) 4.26 11.50 x 62.97% x Matrix (5x5) 11.79 23.04 x 48.82% x Matrix (8x8) 30.15 51.14 x 41.05% x Matrix (16x16) 120.52 189.52 x 36.41% x RSA-256 3.97 x x x x 21

Summary New protocol for outsourcing garbled circuit generation Removes OT and public key operations performed on the mobile device Performance evaluations show up to 98% improvement in evaluation time and 63% improvement in bandwidth usage 22

Questions? Thanks for your attention! carterh@gatech.edu 23