security framework for decentralized shared calendars
play

Security Framework for Decentralized Shared Calendars Jagdish Prasad - PowerPoint PPT Presentation

Security Framework for Decentralized Shared Calendars Jagdish Prasad Achara Research Master of Computer Science (Specialty : Services, Security and Networks) 24 juin 2011 Universit Henri Poincar Jagdish Prasad Achara (UHP Nancy 1)


  1. Security Framework for Decentralized Shared Calendars Jagdish Prasad Achara Research Master of Computer Science (Specialty : Services, Security and Networks) 24 juin 2011 Université Henri Poincaré Jagdish Prasad Achara (UHP – Nancy 1) Security Framework for DeSCal 24 juin 2011 1 / 25

  2. Outline Introduction 1 Security Requirements of DeSCal 2 State of the art 3 Proposed Security Framework 4 Implementation on iPhone OS 5 Possible Directions of Future Work 6 Jagdish Prasad Achara (UHP – Nancy 1) Security Framework for DeSCal 24 juin 2011 2 / 25

  3. Outline Introduction 1 Decentralized & third party independent shared calendar About DeSCal Problem Statement & Motivations Challenges & Contributions Security Requirements of DeSCal 2 State of the art 3 Proposed Security Framework 4 Security Framework Design Requirements Security Framework Description An illustrating example Securing the communication between users Discussion Implementation on iPhone OS 5 Possible Directions of Future Work 6 Jagdish Prasad Achara (UHP – Nancy 1) Security Framework for DeSCal 24 juin 2011 3 / 25

  4. Decentralized & third party independent shared calendar ◮ Shared Calendar ? ◮ Why decentralized & third party independent ? ◮ Support for Ad-Hoc networks (802.11 networks). ◮ No single point of failure. ◮ Secrecy/confidentiality of shared calendar events. ◮ Availability of data. User 1 User 1 User 2 User 3 3 rd party has all shared calendar information Confidentiality? Availability? User 4 Jagdish Prasad Achara (UHP – Nancy 1) Security Framework for DeSCal 24 juin 2011 4 / 25

  5. About DeSCal ◮ Considering the usefulness of such a decentralized shared calendar, DeSCal (abbreviation of De centralized S hared Cal endar) is proposed by us. ◮ What is DeSCal ? ◮ An administrator of an event and his role ? ◮ A user can take two types of operation in DeSCal : Cooperative operation : On shared calendar to ‘Insert’, ‘Delete’ & ‘Edit’ 1 events. Administrative operation : On his access control policy to allow/deny other 2 users to ‘Read’, ‘Delete’ & ‘Edit’ his events. ◮ The design of DeSCal consists of four modules : Coordination module : needs cooperative log 1 Access Control module : needs administrative log or admin log in short 2 P2P/Ad-Hoc Network 3 User Interface 4 ◮ DeSCal replicates whole shared calendar state (Shared Calendar, Cooperative log, Policies, Admin logs) for fault tolerance, availability and crash recovery. Jagdish Prasad Achara (UHP – Nancy 1) Security Framework for DeSCal 24 juin 2011 5 / 25

  6. Problem Statement & Motivations User (1) legal access (1) (2) illegal access (2) DeSCal Persistent Storage ◮ Motivations ◮ Providing confidentiality to replicated shared calendar events. ◮ Securing the communication between users. Jagdish Prasad Achara (UHP – Nancy 1) Security Framework for DeSCal 24 juin 2011 6 / 25

  7. Challenges & Contributions ◮ Challenges ◮ DeSCal’s characteristic features ? ◮ Decentralized ‘Read’ access control ? ◮ Dynamic group of users.. ◮ Contributions ◮ Proposed a required security framework. ◮ Its implementation on iPhone OS. Jagdish Prasad Achara (UHP – Nancy 1) Security Framework for DeSCal 24 juin 2011 7 / 25

  8. Outline Introduction 1 Decentralized & third party independent shared calendar About DeSCal Problem Statement & Motivations Challenges & Contributions Security Requirements of DeSCal 2 State of the art 3 Proposed Security Framework 4 Security Framework Design Requirements Security Framework Description An illustrating example Securing the communication between users Discussion Implementation on iPhone OS 5 Possible Directions of Future Work 6 Jagdish Prasad Achara (UHP – Nancy 1) Security Framework for DeSCal 24 juin 2011 8 / 25

  9. Security Requirements of DeSCal ◮ Providing confidentiality to replicated shared calendar events. ◮ In Shared calendar, cooperative log, policy and admin log ? ◮ Securing the communication between users. ◮ Group communication ? Jagdish Prasad Achara (UHP – Nancy 1) Security Framework for DeSCal 24 juin 2011 9 / 25

  10. Outline Introduction 1 Decentralized & third party independent shared calendar About DeSCal Problem Statement & Motivations Challenges & Contributions Security Requirements of DeSCal 2 State of the art 3 Proposed Security Framework 4 Security Framework Design Requirements Security Framework Description An illustrating example Securing the communication between users Discussion Implementation on iPhone OS 5 Possible Directions of Future Work 6 Jagdish Prasad Achara (UHP – Nancy 1) Security Framework for DeSCal 24 juin 2011 10 / 25

  11. State of the art With the absence of central authority, security of 1) replicated data & 2) messages exchanged between peers, is a challenging task. ◮ Overview ◮ Other decentralized shared calendars and collaborative environments. ◮ Securing replicated data. ◮ Secrecy by splitting. Jagdish Prasad Achara (UHP – Nancy 1) Security Framework for DeSCal 24 juin 2011 11 / 25

  12. Outline Introduction 1 Decentralized & third party independent shared calendar About DeSCal Problem Statement & Motivations Challenges & Contributions Security Requirements of DeSCal 2 State of the art 3 Proposed Security Framework 4 Security Framework Design Requirements Security Framework Description An illustrating example Securing the communication between users Discussion Implementation on iPhone OS 5 Possible Directions of Future Work 6 Jagdish Prasad Achara (UHP – Nancy 1) Security Framework for DeSCal 24 juin 2011 12 / 25

  13. Security Framework Design Requirements ◮ DeSCal’s characteristic features e.g., fault tolerance, availability, crash recovery, dynamic access control must not be lost. ◮ On top of coordination and access control models already employed by DeSCal. ◮ Must preserve broadcast group communication of DeSCal. Jagdish Prasad Achara (UHP – Nancy 1) Security Framework for DeSCal 24 juin 2011 13 / 25

  14. Security Framework Description It uses public key cryptography where authentication of public key is compulsory. ◮ Pathak & Iftode’s protocol Jagdish Prasad Achara (UHP – Nancy 1) Security Framework for DeSCal 24 juin 2011 14 / 25

  15. Security Framework Description ◮ Encryption Notations used : ◮ Symmetric : E K e (e) and D K e (e) ◮ Asymmetric : { m } K u and { m } K − 1 u ◮ Description based on all possible happenings : ◮ User-generated happenings Inserting a new event 1 Deleting an existing event 2 Editing an existing event 3 Grant Read right 4 Revoke Read right 5 Grant/Revoke Delete/Edit right ( Not Relevant ) 6 ◮ System-wide happenings A new user joins the shared calendar group. 1 An existing user leaves the group. 2 A user goes off-line and then, comes on-line again. 3 ◮ How fault tolerance is achieved in DeSCal ? ◮ Surviving a crash. ◮ How availability of data is ensured ? Jagdish Prasad Achara (UHP – Nancy 1) Security Framework for DeSCal 24 juin 2011 15 / 25

  16. Security Framework Description ◮ Inserting a new event e ′ = E K e ( e ) , { K e } K Owner , { K e } K AuthUser 1 , { K e } K AuthUser 2 , .... e ′ = E K e ( e ) , { K e } K Owner ◮ Granting ‘Read’ right i = { K e } K u 1 , { K e } K u 2 Jagdish Prasad Achara (UHP – Nancy 1) Security Framework for DeSCal 24 juin 2011 16 / 25

  17. Security Framework Description ◮ Concurrency Issues ◮ ‘Read’ right revocation and ‘Edit’ concurrent operations Initially, authorized to Initially, authorized to Owner of event ' e ' read and edit event ' e ' read event ' e ' u 1 u 2 u 3 Revoke read right Edits event ' e ' to ' f ' Concurrent Operations to u 2 for event ' e ' E Kf (f), {k f } Ku3 ,{k f } Ku1 ,{k f } Ku2 ??? Jagdish Prasad Achara (UHP – Nancy 1) Security Framework for DeSCal 24 juin 2011 17 / 25

  18. Security Framework Description ◮ Concurrency Issues ◮ ‘Read’ right grant and ‘Edit’ concurrent operations Initially, authorized to Initially, authorized to Initially, not authorized read and edit event ' e ' read event ' e ' to read event ' e ' Owner of event ' e ' u 1 u 2 u 3 u 4 Revoke read right to u 2 for event ' e ' Concurrent Operations Edits event ' e ' to ' f ' (New key (k f ) Right attribution for generation because of event 'e' to u 3 Will not be possible to immediate revocation) decrypt as the symmetric {k e } Ku3 key is changed in previous E Kf (f), {k f } Ku4 ,{k f } Ku1 edition of this event by u 1 ??? Jagdish Prasad Achara (UHP – Nancy 1) Security Framework for DeSCal 24 juin 2011 18 / 25

Recommend


More recommend