SlideShare ist ein Scribd-Unternehmen logo
1 von 81
Crypto-Book:
An Architecture for Privacy
Preserving Online Identities
John Maheswaran, David Isaac Wolinsky, Bryan Ford

HotNets ’13 (11/22/2013)
Talk Overview
• The problem
– Cross-site Authentication
– Social network privacy concerns

• Solution
– Overview
– Key assignment
– Conscripting an anonymity set
– Anonymous login

• Conclusions and future work
Talk Overview
• The problem
– Cross-site Authentication
– Social network privacy concerns

• Solution
– Overview
– Key assignment
– Conscripting an anonymity set
– Anonymous login

• Conclusions and future work
Cross-site Authentication
Cross-site Authentication
Cross-site Authentication
Cross-site Authentication
Cross-site Authentication
Talk Overview
• The problem
– Cross-site Authentication
– Social network privacy concerns

• Solution
– Overview
– Key assignment
– Conscripting an anonymity set
– Anonymous login

• Conclusions and future work
Talk Overview
• The problem
– Cross-site Authentication
– Social network privacy concerns

• Solution
– Overview
– Key assignment
– Conscripting an anonymity set
– Anonymous login

• Conclusions and future work
Privacy and Security Concerns
Privacy and Security Concerns
Privacy and Security Concerns
Privacy and Security Concerns
Privacy and Security Concerns
Privacy and Security Concerns
Privacy and Security Concerns
Privacy and Security Concerns
Problem Summary
• Increasingly use of cross-site authentication
– OAuth, OpenID, Facebook/Twitter/Google+ login

• Use social network for online IDs
– Convenient, easy to use

• Using these IDs brings privacy/tracking risks
– Cross-site tracking, browsing history, actions across
different sites
Talk Overview
• The problem
– Cross-site Authentication
– Social network privacy concerns

• Solution
– Overview
– Key assignment
– Conscripting an anonymity set
– Anonymous login

• Conclusions and future work
Talk Overview
• The problem
– Cross-site Authentication
– Social network privacy concerns

• Solution
– Overview
– Key assignment
– Conscripting an anonymity set
– Anonymous login

• Conclusions and future work
Goals
• Crypto-Book aims to
– Allow users to use social network IDs
– Provide better privacy between social network
and third party sides
Crypto-Book

Personally identifiable
social networking ID
Crypto-Book

Personally identifiable
social networking ID
Crypto-Book Layer

Crypto-Book privacy preserving layer

Personally identifiable
social networking ID
Crypto-Book Layer

Crypto-Book privacy preserving layer

Personally identifiable
social networking ID
Crypto-Book Layer

Anonymized IDs – one pseudonym per site

Crypto-Book privacy preserving layer

Personally identifiable
social networking ID
Crypto-Book Layer

Crypto-Book privacy preserving layer
Crypto-Book Layer

Crypto-Book privacy preserving layer

Not linkable by
Facebook, Crypto-Book
or by third party sites
Talk Overview
• The problem
– Cross-site Authentication
– Social network privacy concerns

• Solution
– Overview
– Key assignment
– Conscripting an anonymity set
– Anonymous login

• Conclusions and future work
Talk Overview
• The problem
– Cross-site Authentication
– Social network privacy concerns

• Solution
– Overview
– Key assignment
– Conscripting an anonymity set
– Anonymous login

• Conclusions and future work
Key Assignment
• Cross-site authentication often relies on
OAuth/OpenID
• Crypto-Book fits into OAuth protocol to isolate
third party site from social network
– Protects cross-site privacy
– Assigns key pairs to social network IDs
OAuth
OAuth

Give me a limited
scope OAuth
access token
OAuth

Give me a limited
scope OAuth
access token

Issue me an OAuth
access token with
requested scope
OAuth

Give me a limited
scope OAuth
access token

Issue me an OAuth
access token with
requested scope
OAuth

Give me a limited
scope OAuth
access token

Issue me an OAuth
access token with
requested scope
Key Assignment
• To use privacy preserving cryptographic
techniques
– have to assign public/private keypairs to users

• Cloud of key servers with split trust
• Clients do not provide own key
– Allows us to conscript users into anonymity sets
without their knowledge/permission
OAuth

Give me a limited
scope OAuth
access token

Issue me an OAuth
access token with
requested scope
OAuth
Crypto-Book Workflow
Crypto-Book Workflow
Crypto-Book Workflow
Crypto-Book Workflow
Crypto-Book Workflow
Crypto-Book Workflow
Crypto-Book Workflow

abuse resistant anonymous
1-to-1 mapping
Anytrust key servers
• An anytrust cloud is:
– a decentralized client/server network model
– trust there is at least one honest server

• Anytrust cloud of key servers
– assigns key pairs to each social network user
– Run by various privacy advocates e.g. EFF
Anytrust key servers
Key Server

Key Server
Key Server
Anytrust key servers
Key Server

Key Server
Key Server
Anytrust key servers
Key Server

Key Server
Key Server
Anytrust key servers
Key Server

Key Server
Key Server
Talk Overview
• The problem
– Cross-site Authentication
– Social network privacy concerns

• Solution
– Overview
– Key assignment
– Conscripting an anonymity set
– Anonymous login

• Conclusions and future work
Talk Overview
• The problem
– Cross-site Authentication
– Social network privacy concerns

• Solution
– Overview
– Key assignment
– Conscripting an anonymity set
– Anonymous login

• Conclusions and future work
Anonymity set conscription
Anonymity set conscription
Anonymity set conscription
Anonymity set conscription
Anonymity set conscription
Anonymity set conscription
Talk Overview
• The problem
– Cross-site Authentication
– Social network privacy concerns

• Solution
– Overview
– Key assignment
– Conscripting an anonymity set
– Anonymous login

• Conclusions and future work
Talk Overview
• The problem
– Cross-site Authentication
– Social network privacy concerns

• Solution
– Overview
– Key assignment
– Conscripting an anonymity set
– Anonymous login

• Conclusions and future work
Balancing Anonymity with
Accountability
• Need to balance:
– Supporting free speech, free expression of
opinion
– Improving the quality of public discourse. By
allowing people to fully hide anonymously, they
may do things they would not otherwise
• e.g. Wikipedia sock-puppetry, vandalism
Balancing Anonymity with
Accountability
• Solution needs to provide both
– Anonymity
– Accountability

• Wikipedia would like to allow users to remain
anonymous, but are worried about vandalism
– Users need to be anonymous yet accountable
Digital Signature
Digital Signature
Digital Signature
Digital Signature
Linkable Ring Signature (LRS)
Linkable Ring Signature (LRS)
Linkable Ring Signature (LRS)
Linkable Ring Signature (LRS)
Linkable Ring Signature (LRS)
• Created by member of a group of users (each
have keys)
• Third party can verify:
– Some member of the group signed something
– If two signatures are by same member

• Third party cannot discover
– Which specific user created the signature
Privacy Preserving Crypto Layer
• LRS has linkage tag
– If a client generates two LRSs, they will have the
same linkage tag
– Means LRSs can be linked across time

• Linkage tag provides accountability
– 1-to-1 mapping between Facebook users and
anonymized identities
Crypto-Book Summary
Crypto-Book Summary

abuse resistant anonymous
1-to-1 mapping
Talk Overview
• The problem
– Cross-site Authentication
– Social network privacy concerns

• Solution
– Overview
– Key assignment
– Conscripting an anonymity set
– Anonymous login

• Conclusions and future work
Talk Overview
• The problem
– Cross-site Authentication
– Social network privacy concerns

• Solution
– Overview
– Key assignment
– Conscripting an anonymity set
– Anonymous login

• Conclusions and future work
Future Work
• Provide OAuth/OpenID API
– Integration with more third party sites

• Deploy Crypto-Book key servers at various
host institutions
• Abuse resistant way of using anonymous
systems such as Tor
• Investigation of anonymity set selection
Conclusion
• Crypto-Book provides privacy preserving
online identities
– anonymous
– abuse resistant

• www.crypto-book.com
– Demo video
– More info, SOSP’13 poster, more talk slides
– Link to source code on GitHub
Questions?
www.crypto-book.com

Weitere ähnliche Inhalte

Was ist angesagt?

common online terminologies
common online terminologiescommon online terminologies
common online terminologies
jayceenavarrete
 

Was ist angesagt? (20)

Online Social Networks: 5 threats and 5 ways to use them safely
Online Social Networks: 5 threats and 5 ways to use them safelyOnline Social Networks: 5 threats and 5 ways to use them safely
Online Social Networks: 5 threats and 5 ways to use them safely
 
DEF CON 27 - ZHANG XIANGQIAN AND LIU HULMING - your secret files are mine
DEF CON 27 - ZHANG XIANGQIAN AND LIU HULMING - your secret files are mineDEF CON 27 - ZHANG XIANGQIAN AND LIU HULMING - your secret files are mine
DEF CON 27 - ZHANG XIANGQIAN AND LIU HULMING - your secret files are mine
 
Blognone - Feb 09
Blognone - Feb 09Blognone - Feb 09
Blognone - Feb 09
 
Hacking Presentation
Hacking PresentationHacking Presentation
Hacking Presentation
 
Basics of Maltego
Basics of MaltegoBasics of Maltego
Basics of Maltego
 
Social media and Security risks
Social media and Security risksSocial media and Security risks
Social media and Security risks
 
Understanding the basics of web design 2
Understanding the basics of web design 2Understanding the basics of web design 2
Understanding the basics of web design 2
 
Maltego Radium Mapping Network Ties and Identities across the Internet
Maltego Radium Mapping Network Ties and Identities across the InternetMaltego Radium Mapping Network Ties and Identities across the Internet
Maltego Radium Mapping Network Ties and Identities across the Internet
 
Hacker tool talk: maltego
Hacker tool talk: maltegoHacker tool talk: maltego
Hacker tool talk: maltego
 
common online terminologies
common online terminologiescommon online terminologies
common online terminologies
 
Hacking
HackingHacking
Hacking
 
Tools for Open Source Intelligence (OSINT)
Tools for Open Source Intelligence (OSINT)Tools for Open Source Intelligence (OSINT)
Tools for Open Source Intelligence (OSINT)
 
Computer Ethics
Computer  EthicsComputer  Ethics
Computer Ethics
 
Enterprise Open Source Intelligence Gathering
Enterprise Open Source Intelligence GatheringEnterprise Open Source Intelligence Gathering
Enterprise Open Source Intelligence Gathering
 
Internet Safety Glossary of Terms
Internet Safety Glossary of TermsInternet Safety Glossary of Terms
Internet Safety Glossary of Terms
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2
 
National information security education & awareness program
National information security education & awareness programNational information security education & awareness program
National information security education & awareness program
 
OSINT - Open Soure Intelligence - Webinar on CyberSecurity
OSINT - Open Soure Intelligence - Webinar on CyberSecurityOSINT - Open Soure Intelligence - Webinar on CyberSecurity
OSINT - Open Soure Intelligence - Webinar on CyberSecurity
 
OSINT x UCCU Workshop on Open Source Intelligence
OSINT x UCCU Workshop on Open Source IntelligenceOSINT x UCCU Workshop on Open Source Intelligence
OSINT x UCCU Workshop on Open Source Intelligence
 
Password Cracking
Password CrackingPassword Cracking
Password Cracking
 

Ähnlich wie Hotnets Slides

Anon p2p slides
Anon p2p slidesAnon p2p slides
Anon p2p slides
chintaan
 
20 security
20 security20 security
20 security
abiy2004
 
Chapter 13Network EncryptionChapter 13 OverviewRole of.docx
Chapter 13Network EncryptionChapter 13 OverviewRole of.docxChapter 13Network EncryptionChapter 13 OverviewRole of.docx
Chapter 13Network EncryptionChapter 13 OverviewRole of.docx
bartholomeocoombs
 
Blockchain_ver0.5_MIT_security_and Privacy_am_final_upload
Blockchain_ver0.5_MIT_security_and Privacy_am_final_uploadBlockchain_ver0.5_MIT_security_and Privacy_am_final_upload
Blockchain_ver0.5_MIT_security_and Privacy_am_final_upload
Anish Mohammed
 
SSL: Past, Present and Future
SSL: Past, Present and FutureSSL: Past, Present and Future
SSL: Past, Present and Future
Luis Grangeia
 

Ähnlich wie Hotnets Slides (20)

Anon p2p slides
Anon p2p slidesAnon p2p slides
Anon p2p slides
 
Cyber security workshop talk.pptx
Cyber security workshop talk.pptxCyber security workshop talk.pptx
Cyber security workshop talk.pptx
 
SFSCON23 - Frank Karlitschek - What the AI revolution means for Open Source, ...
SFSCON23 - Frank Karlitschek - What the AI revolution means for Open Source, ...SFSCON23 - Frank Karlitschek - What the AI revolution means for Open Source, ...
SFSCON23 - Frank Karlitschek - What the AI revolution means for Open Source, ...
 
20 security
20 security20 security
20 security
 
DEF CON 27 - MASARAH PAQUET CLOUSTON and OLIVER BILODEAU - the industry of so...
DEF CON 27 - MASARAH PAQUET CLOUSTON and OLIVER BILODEAU - the industry of so...DEF CON 27 - MASARAH PAQUET CLOUSTON and OLIVER BILODEAU - the industry of so...
DEF CON 27 - MASARAH PAQUET CLOUSTON and OLIVER BILODEAU - the industry of so...
 
Dublin Blockchain Group
Dublin Blockchain GroupDublin Blockchain Group
Dublin Blockchain Group
 
The Myth of The Iron Triangle in Security
The Myth of The Iron Triangle in SecurityThe Myth of The Iron Triangle in Security
The Myth of The Iron Triangle in Security
 
Whatscrypt Messenger for android project
Whatscrypt Messenger for android projectWhatscrypt Messenger for android project
Whatscrypt Messenger for android project
 
AtlSecCon 2016
AtlSecCon 2016AtlSecCon 2016
AtlSecCon 2016
 
Chapter 13Network EncryptionChapter 13 OverviewRole of.docx
Chapter 13Network EncryptionChapter 13 OverviewRole of.docxChapter 13Network EncryptionChapter 13 OverviewRole of.docx
Chapter 13Network EncryptionChapter 13 OverviewRole of.docx
 
Scuttlebutt or how to exit facebook and start coding your first web 3.0 socia...
Scuttlebutt or how to exit facebook and start coding your first web 3.0 socia...Scuttlebutt or how to exit facebook and start coding your first web 3.0 socia...
Scuttlebutt or how to exit facebook and start coding your first web 3.0 socia...
 
Respect Connect: From Social Login to Personal Cloud Login
Respect Connect: From Social Login to Personal Cloud LoginRespect Connect: From Social Login to Personal Cloud Login
Respect Connect: From Social Login to Personal Cloud Login
 
Fundamentals of Cryptography
Fundamentals of CryptographyFundamentals of Cryptography
Fundamentals of Cryptography
 
Blockchain_ver0.5_MIT_security_and Privacy_am_final_upload
Blockchain_ver0.5_MIT_security_and Privacy_am_final_uploadBlockchain_ver0.5_MIT_security_and Privacy_am_final_upload
Blockchain_ver0.5_MIT_security_and Privacy_am_final_upload
 
Dmk bo2 k8_ccc
Dmk bo2 k8_cccDmk bo2 k8_ccc
Dmk bo2 k8_ccc
 
Bsides-Philly-2016-Finding-A-Companys-BreakPoint
Bsides-Philly-2016-Finding-A-Companys-BreakPointBsides-Philly-2016-Finding-A-Companys-BreakPoint
Bsides-Philly-2016-Finding-A-Companys-BreakPoint
 
Knock x Knock: The Design and Evaluation of a Unified Authentication Manageme...
Knock x Knock: The Design and Evaluation of a Unified Authentication Manageme...Knock x Knock: The Design and Evaluation of a Unified Authentication Manageme...
Knock x Knock: The Design and Evaluation of a Unified Authentication Manageme...
 
SSL: Past, Present and Future
SSL: Past, Present and FutureSSL: Past, Present and Future
SSL: Past, Present and Future
 
SSL: Past, Present and Future
SSL: Past, Present and FutureSSL: Past, Present and Future
SSL: Past, Present and Future
 
Privacy on the Internet - Init6 InfoSec August Meeting
Privacy on the Internet - Init6 InfoSec August MeetingPrivacy on the Internet - Init6 InfoSec August Meeting
Privacy on the Internet - Init6 InfoSec August Meeting
 

Kürzlich hochgeladen

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Kürzlich hochgeladen (20)

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 

Hotnets Slides