hotnets slides
DESCRIPTION
Crypto-Book Hotnets SlidesTRANSCRIPT
![Page 1: Hotnets Slides](https://reader037.vdocument.in/reader037/viewer/2022103115/5575a19fd8b42aff598b4cbf/html5/thumbnails/1.jpg)
Crypto-Book: An Architecture for Privacy Preserving Online Identities
John Maheswaran, David Isaac Wolinsky, Bryan Ford
HotNets ’13 (11/22/2013)
![Page 2: Hotnets Slides](https://reader037.vdocument.in/reader037/viewer/2022103115/5575a19fd8b42aff598b4cbf/html5/thumbnails/2.jpg)
Talk Overview
• The problem– Cross-site Authentication– Social network privacy concerns
• Solution– Overview– Key assignment– Conscripting an anonymity set– Anonymous login
• Conclusions and future work
![Page 3: Hotnets Slides](https://reader037.vdocument.in/reader037/viewer/2022103115/5575a19fd8b42aff598b4cbf/html5/thumbnails/3.jpg)
Talk Overview
• The problem– Cross-site Authentication– Social network privacy concerns
• Solution– Overview– Key assignment– Conscripting an anonymity set– Anonymous login
• Conclusions and future work
![Page 4: Hotnets Slides](https://reader037.vdocument.in/reader037/viewer/2022103115/5575a19fd8b42aff598b4cbf/html5/thumbnails/4.jpg)
Cross-site Authentication
![Page 5: Hotnets Slides](https://reader037.vdocument.in/reader037/viewer/2022103115/5575a19fd8b42aff598b4cbf/html5/thumbnails/5.jpg)
Cross-site Authentication
![Page 6: Hotnets Slides](https://reader037.vdocument.in/reader037/viewer/2022103115/5575a19fd8b42aff598b4cbf/html5/thumbnails/6.jpg)
Cross-site Authentication
![Page 7: Hotnets Slides](https://reader037.vdocument.in/reader037/viewer/2022103115/5575a19fd8b42aff598b4cbf/html5/thumbnails/7.jpg)
Cross-site Authentication
![Page 8: Hotnets Slides](https://reader037.vdocument.in/reader037/viewer/2022103115/5575a19fd8b42aff598b4cbf/html5/thumbnails/8.jpg)
Cross-site AuthenticationTr
acki
ng in
fo Tracking info
Tracking info
![Page 9: Hotnets Slides](https://reader037.vdocument.in/reader037/viewer/2022103115/5575a19fd8b42aff598b4cbf/html5/thumbnails/9.jpg)
Talk Overview
• The problem– Cross-site Authentication– Social network privacy concerns
• Solution– Overview– Key assignment– Conscripting an anonymity set– Anonymous login
• Conclusions and future work
![Page 10: Hotnets Slides](https://reader037.vdocument.in/reader037/viewer/2022103115/5575a19fd8b42aff598b4cbf/html5/thumbnails/10.jpg)
Talk Overview
• The problem– Cross-site Authentication– Social network privacy concerns
• Solution– Overview– Key assignment– Conscripting an anonymity set– Anonymous login
• Conclusions and future work
![Page 11: Hotnets Slides](https://reader037.vdocument.in/reader037/viewer/2022103115/5575a19fd8b42aff598b4cbf/html5/thumbnails/11.jpg)
Privacy and Security Concerns
![Page 12: Hotnets Slides](https://reader037.vdocument.in/reader037/viewer/2022103115/5575a19fd8b42aff598b4cbf/html5/thumbnails/12.jpg)
Privacy and Security Concerns
![Page 13: Hotnets Slides](https://reader037.vdocument.in/reader037/viewer/2022103115/5575a19fd8b42aff598b4cbf/html5/thumbnails/13.jpg)
Privacy and Security Concerns
![Page 14: Hotnets Slides](https://reader037.vdocument.in/reader037/viewer/2022103115/5575a19fd8b42aff598b4cbf/html5/thumbnails/14.jpg)
Privacy and Security Concerns
![Page 15: Hotnets Slides](https://reader037.vdocument.in/reader037/viewer/2022103115/5575a19fd8b42aff598b4cbf/html5/thumbnails/15.jpg)
Privacy and Security Concerns
![Page 16: Hotnets Slides](https://reader037.vdocument.in/reader037/viewer/2022103115/5575a19fd8b42aff598b4cbf/html5/thumbnails/16.jpg)
Privacy and Security Concerns
![Page 17: Hotnets Slides](https://reader037.vdocument.in/reader037/viewer/2022103115/5575a19fd8b42aff598b4cbf/html5/thumbnails/17.jpg)
Privacy and Security Concerns
![Page 18: Hotnets Slides](https://reader037.vdocument.in/reader037/viewer/2022103115/5575a19fd8b42aff598b4cbf/html5/thumbnails/18.jpg)
Privacy and Security Concerns
![Page 19: Hotnets Slides](https://reader037.vdocument.in/reader037/viewer/2022103115/5575a19fd8b42aff598b4cbf/html5/thumbnails/19.jpg)
Problem Summary• Increasingly use of cross-site authentication– OAuth, OpenID, Facebook/Twitter/Google+ login
• Use social network for online IDs– Convenient, easy to use
• Using these IDs brings privacy/tracking risks– Cross-site tracking, browsing history, actions across
different sites
![Page 20: Hotnets Slides](https://reader037.vdocument.in/reader037/viewer/2022103115/5575a19fd8b42aff598b4cbf/html5/thumbnails/20.jpg)
Talk Overview
• The problem– Cross-site Authentication– Social network privacy concerns
• Solution– Overview– Key assignment– Conscripting an anonymity set– Anonymous login
• Conclusions and future work
![Page 21: Hotnets Slides](https://reader037.vdocument.in/reader037/viewer/2022103115/5575a19fd8b42aff598b4cbf/html5/thumbnails/21.jpg)
Talk Overview
• The problem– Cross-site Authentication– Social network privacy concerns
• Solution– Overview– Key assignment– Conscripting an anonymity set– Anonymous login
• Conclusions and future work
![Page 22: Hotnets Slides](https://reader037.vdocument.in/reader037/viewer/2022103115/5575a19fd8b42aff598b4cbf/html5/thumbnails/22.jpg)
Goals
• Crypto-Book aims to– Allow users to use social network IDs– Provide better privacy between social network
and third party sides
![Page 23: Hotnets Slides](https://reader037.vdocument.in/reader037/viewer/2022103115/5575a19fd8b42aff598b4cbf/html5/thumbnails/23.jpg)
Crypto-Book
Personally identifiable social networking ID
![Page 24: Hotnets Slides](https://reader037.vdocument.in/reader037/viewer/2022103115/5575a19fd8b42aff598b4cbf/html5/thumbnails/24.jpg)
Crypto-Book
Personally identifiable social networking ID
![Page 25: Hotnets Slides](https://reader037.vdocument.in/reader037/viewer/2022103115/5575a19fd8b42aff598b4cbf/html5/thumbnails/25.jpg)
Crypto-Book Layer
Personally identifiable social networking ID
Crypto-Book privacy preserving layer
![Page 26: Hotnets Slides](https://reader037.vdocument.in/reader037/viewer/2022103115/5575a19fd8b42aff598b4cbf/html5/thumbnails/26.jpg)
Crypto-Book Layer
Personally identifiable social networking ID
Crypto-Book privacy preserving layer
![Page 27: Hotnets Slides](https://reader037.vdocument.in/reader037/viewer/2022103115/5575a19fd8b42aff598b4cbf/html5/thumbnails/27.jpg)
Crypto-Book Layer
Personally identifiable social networking ID
Anonymized IDs – one pseudonym per site
Crypto-Book privacy preserving layer
![Page 28: Hotnets Slides](https://reader037.vdocument.in/reader037/viewer/2022103115/5575a19fd8b42aff598b4cbf/html5/thumbnails/28.jpg)
Crypto-Book Layer
Crypto-Book privacy preserving layer
![Page 29: Hotnets Slides](https://reader037.vdocument.in/reader037/viewer/2022103115/5575a19fd8b42aff598b4cbf/html5/thumbnails/29.jpg)
Crypto-Book Layer
Crypto-Book privacy preserving layer
Not linkable by Facebook, Crypto-Book or by third party sites
![Page 30: Hotnets Slides](https://reader037.vdocument.in/reader037/viewer/2022103115/5575a19fd8b42aff598b4cbf/html5/thumbnails/30.jpg)
Talk Overview
• The problem– Cross-site Authentication– Social network privacy concerns
• Solution– Overview– Key assignment– Conscripting an anonymity set– Anonymous login
• Conclusions and future work
![Page 31: Hotnets Slides](https://reader037.vdocument.in/reader037/viewer/2022103115/5575a19fd8b42aff598b4cbf/html5/thumbnails/31.jpg)
Talk Overview
• The problem– Cross-site Authentication– Social network privacy concerns
• Solution– Overview– Key assignment– Conscripting an anonymity set– Anonymous login
• Conclusions and future work
![Page 32: Hotnets Slides](https://reader037.vdocument.in/reader037/viewer/2022103115/5575a19fd8b42aff598b4cbf/html5/thumbnails/32.jpg)
Key Assignment
• Cross-site authentication often relies on OAuth/OpenID
• Crypto-Book fits into OAuth protocol to isolate third party site from social network– Protects cross-site privacy– Assigns key pairs to social network IDs
![Page 33: Hotnets Slides](https://reader037.vdocument.in/reader037/viewer/2022103115/5575a19fd8b42aff598b4cbf/html5/thumbnails/33.jpg)
OAuth
![Page 34: Hotnets Slides](https://reader037.vdocument.in/reader037/viewer/2022103115/5575a19fd8b42aff598b4cbf/html5/thumbnails/34.jpg)
OAuth
Give me a limited scope OAuth access token
![Page 35: Hotnets Slides](https://reader037.vdocument.in/reader037/viewer/2022103115/5575a19fd8b42aff598b4cbf/html5/thumbnails/35.jpg)
OAuth
Give me a limited scope OAuth access token Issue me an OAuth
access token with requested scope
![Page 36: Hotnets Slides](https://reader037.vdocument.in/reader037/viewer/2022103115/5575a19fd8b42aff598b4cbf/html5/thumbnails/36.jpg)
OAuth
Give me a limited scope OAuth access token Issue me an OAuth
access token with requested scope
![Page 37: Hotnets Slides](https://reader037.vdocument.in/reader037/viewer/2022103115/5575a19fd8b42aff598b4cbf/html5/thumbnails/37.jpg)
OAuth
Give me a limited scope OAuth access token Issue me an OAuth
access token with requested scope
![Page 38: Hotnets Slides](https://reader037.vdocument.in/reader037/viewer/2022103115/5575a19fd8b42aff598b4cbf/html5/thumbnails/38.jpg)
Key Assignment
• To use privacy preserving cryptographic techniques– have to assign public/private keypairs to users
• Cloud of key servers with split trust• Clients do not provide own key– Allows us to conscript users into anonymity sets
without their knowledge/permission
![Page 39: Hotnets Slides](https://reader037.vdocument.in/reader037/viewer/2022103115/5575a19fd8b42aff598b4cbf/html5/thumbnails/39.jpg)
OAuth
Give me a limited scope OAuth access token Issue me an OAuth
access token with requested scope
![Page 40: Hotnets Slides](https://reader037.vdocument.in/reader037/viewer/2022103115/5575a19fd8b42aff598b4cbf/html5/thumbnails/40.jpg)
OAuth
![Page 41: Hotnets Slides](https://reader037.vdocument.in/reader037/viewer/2022103115/5575a19fd8b42aff598b4cbf/html5/thumbnails/41.jpg)
Crypto-Book Workflow
![Page 42: Hotnets Slides](https://reader037.vdocument.in/reader037/viewer/2022103115/5575a19fd8b42aff598b4cbf/html5/thumbnails/42.jpg)
Crypto-Book Workflow
![Page 43: Hotnets Slides](https://reader037.vdocument.in/reader037/viewer/2022103115/5575a19fd8b42aff598b4cbf/html5/thumbnails/43.jpg)
Crypto-Book Workflow
![Page 44: Hotnets Slides](https://reader037.vdocument.in/reader037/viewer/2022103115/5575a19fd8b42aff598b4cbf/html5/thumbnails/44.jpg)
Crypto-Book Workflow
![Page 45: Hotnets Slides](https://reader037.vdocument.in/reader037/viewer/2022103115/5575a19fd8b42aff598b4cbf/html5/thumbnails/45.jpg)
Crypto-Book Workflow
![Page 46: Hotnets Slides](https://reader037.vdocument.in/reader037/viewer/2022103115/5575a19fd8b42aff598b4cbf/html5/thumbnails/46.jpg)
Crypto-Book Workflow
![Page 47: Hotnets Slides](https://reader037.vdocument.in/reader037/viewer/2022103115/5575a19fd8b42aff598b4cbf/html5/thumbnails/47.jpg)
Crypto-Book Workflow
abuse resistant anonymous 1-to-1 mapping
![Page 48: Hotnets Slides](https://reader037.vdocument.in/reader037/viewer/2022103115/5575a19fd8b42aff598b4cbf/html5/thumbnails/48.jpg)
Anytrust key servers• An anytrust cloud is:– a decentralized client/server network model– trust there is at least one honest server
• Anytrust cloud of key servers– assigns key pairs to each social network user– Run by various privacy advocates e.g. EFF
![Page 49: Hotnets Slides](https://reader037.vdocument.in/reader037/viewer/2022103115/5575a19fd8b42aff598b4cbf/html5/thumbnails/49.jpg)
Anytrust key servers
Key Server
Key Server
Key Server
![Page 50: Hotnets Slides](https://reader037.vdocument.in/reader037/viewer/2022103115/5575a19fd8b42aff598b4cbf/html5/thumbnails/50.jpg)
Anytrust key servers
Key Server
Key Server
Key Server
![Page 51: Hotnets Slides](https://reader037.vdocument.in/reader037/viewer/2022103115/5575a19fd8b42aff598b4cbf/html5/thumbnails/51.jpg)
Anytrust key servers
Key Server
Key Server
Key Server
![Page 52: Hotnets Slides](https://reader037.vdocument.in/reader037/viewer/2022103115/5575a19fd8b42aff598b4cbf/html5/thumbnails/52.jpg)
Anytrust key servers
Key Server
Key Server
Key Server
![Page 53: Hotnets Slides](https://reader037.vdocument.in/reader037/viewer/2022103115/5575a19fd8b42aff598b4cbf/html5/thumbnails/53.jpg)
Talk Overview
• The problem– Cross-site Authentication– Social network privacy concerns
• Solution– Overview– Key assignment– Conscripting an anonymity set– Anonymous login
• Conclusions and future work
![Page 54: Hotnets Slides](https://reader037.vdocument.in/reader037/viewer/2022103115/5575a19fd8b42aff598b4cbf/html5/thumbnails/54.jpg)
Talk Overview
• The problem– Cross-site Authentication– Social network privacy concerns
• Solution– Overview– Key assignment– Conscripting an anonymity set– Anonymous login
• Conclusions and future work
![Page 55: Hotnets Slides](https://reader037.vdocument.in/reader037/viewer/2022103115/5575a19fd8b42aff598b4cbf/html5/thumbnails/55.jpg)
Anonymity set conscription
![Page 56: Hotnets Slides](https://reader037.vdocument.in/reader037/viewer/2022103115/5575a19fd8b42aff598b4cbf/html5/thumbnails/56.jpg)
Anonymity set conscription
![Page 57: Hotnets Slides](https://reader037.vdocument.in/reader037/viewer/2022103115/5575a19fd8b42aff598b4cbf/html5/thumbnails/57.jpg)
Anonymity set conscription
![Page 58: Hotnets Slides](https://reader037.vdocument.in/reader037/viewer/2022103115/5575a19fd8b42aff598b4cbf/html5/thumbnails/58.jpg)
Anonymity set conscription
![Page 59: Hotnets Slides](https://reader037.vdocument.in/reader037/viewer/2022103115/5575a19fd8b42aff598b4cbf/html5/thumbnails/59.jpg)
Anonymity set conscription
![Page 60: Hotnets Slides](https://reader037.vdocument.in/reader037/viewer/2022103115/5575a19fd8b42aff598b4cbf/html5/thumbnails/60.jpg)
Anonymity set conscription
![Page 61: Hotnets Slides](https://reader037.vdocument.in/reader037/viewer/2022103115/5575a19fd8b42aff598b4cbf/html5/thumbnails/61.jpg)
Talk Overview
• The problem– Cross-site Authentication– Social network privacy concerns
• Solution– Overview– Key assignment– Conscripting an anonymity set– Anonymous login
• Conclusions and future work
![Page 62: Hotnets Slides](https://reader037.vdocument.in/reader037/viewer/2022103115/5575a19fd8b42aff598b4cbf/html5/thumbnails/62.jpg)
Talk Overview
• The problem– Cross-site Authentication– Social network privacy concerns
• Solution– Overview– Key assignment– Conscripting an anonymity set– Anonymous login
• Conclusions and future work
![Page 63: Hotnets Slides](https://reader037.vdocument.in/reader037/viewer/2022103115/5575a19fd8b42aff598b4cbf/html5/thumbnails/63.jpg)
Balancing Anonymity with Accountability
• Need to balance:– Supporting free speech, free expression of opinion– Improving the quality of public discourse. By
allowing people to fully hide anonymously, they may do things they would not otherwise• e.g. Wikipedia sock-puppetry, vandalism
![Page 64: Hotnets Slides](https://reader037.vdocument.in/reader037/viewer/2022103115/5575a19fd8b42aff598b4cbf/html5/thumbnails/64.jpg)
Balancing Anonymity with Accountability
• Solution needs to provide both– Anonymity– Accountability
• Wikipedia would like to allow users to remain anonymous, but are worried about vandalism– Users need to be anonymous yet accountable
![Page 65: Hotnets Slides](https://reader037.vdocument.in/reader037/viewer/2022103115/5575a19fd8b42aff598b4cbf/html5/thumbnails/65.jpg)
Digital Signature
![Page 66: Hotnets Slides](https://reader037.vdocument.in/reader037/viewer/2022103115/5575a19fd8b42aff598b4cbf/html5/thumbnails/66.jpg)
Digital Signature
![Page 67: Hotnets Slides](https://reader037.vdocument.in/reader037/viewer/2022103115/5575a19fd8b42aff598b4cbf/html5/thumbnails/67.jpg)
Digital Signature
![Page 68: Hotnets Slides](https://reader037.vdocument.in/reader037/viewer/2022103115/5575a19fd8b42aff598b4cbf/html5/thumbnails/68.jpg)
Digital Signature
![Page 69: Hotnets Slides](https://reader037.vdocument.in/reader037/viewer/2022103115/5575a19fd8b42aff598b4cbf/html5/thumbnails/69.jpg)
Linkable Ring Signature (LRS)
![Page 70: Hotnets Slides](https://reader037.vdocument.in/reader037/viewer/2022103115/5575a19fd8b42aff598b4cbf/html5/thumbnails/70.jpg)
Linkable Ring Signature (LRS)
![Page 71: Hotnets Slides](https://reader037.vdocument.in/reader037/viewer/2022103115/5575a19fd8b42aff598b4cbf/html5/thumbnails/71.jpg)
Linkable Ring Signature (LRS)
![Page 72: Hotnets Slides](https://reader037.vdocument.in/reader037/viewer/2022103115/5575a19fd8b42aff598b4cbf/html5/thumbnails/72.jpg)
Linkable Ring Signature (LRS)
![Page 73: Hotnets Slides](https://reader037.vdocument.in/reader037/viewer/2022103115/5575a19fd8b42aff598b4cbf/html5/thumbnails/73.jpg)
Linkable Ring Signature (LRS)
• Created by member of a group of users (each have keys)
• Third party can verify:– Some member of the group signed something– If two signatures are by same member
• Third party cannot discover– Which specific user created the signature
![Page 74: Hotnets Slides](https://reader037.vdocument.in/reader037/viewer/2022103115/5575a19fd8b42aff598b4cbf/html5/thumbnails/74.jpg)
Privacy Preserving Crypto Layer
• LRS has linkage tag– If a client generates two LRSs, they will have the
same linkage tag– Means LRSs can be linked across time
• Linkage tag provides accountability– 1-to-1 mapping between Facebook users and
anonymized identities
![Page 75: Hotnets Slides](https://reader037.vdocument.in/reader037/viewer/2022103115/5575a19fd8b42aff598b4cbf/html5/thumbnails/75.jpg)
Crypto-Book Summary
![Page 76: Hotnets Slides](https://reader037.vdocument.in/reader037/viewer/2022103115/5575a19fd8b42aff598b4cbf/html5/thumbnails/76.jpg)
Crypto-Book Summary
abuse resistant anonymous 1-to-1 mapping
![Page 77: Hotnets Slides](https://reader037.vdocument.in/reader037/viewer/2022103115/5575a19fd8b42aff598b4cbf/html5/thumbnails/77.jpg)
Talk Overview
• The problem– Cross-site Authentication– Social network privacy concerns
• Solution – Overview– Key assignment– Conscripting an anonymity set– Anonymous login
• Conclusions and future work
![Page 78: Hotnets Slides](https://reader037.vdocument.in/reader037/viewer/2022103115/5575a19fd8b42aff598b4cbf/html5/thumbnails/78.jpg)
Talk Overview
• The problem– Cross-site Authentication– Social network privacy concerns
• Solution – Overview– Key assignment– Conscripting an anonymity set– Anonymous login
• Conclusions and future work
![Page 79: Hotnets Slides](https://reader037.vdocument.in/reader037/viewer/2022103115/5575a19fd8b42aff598b4cbf/html5/thumbnails/79.jpg)
Future Work
• Provide OAuth/OpenID API– Integration with more third party sites
• Deploy Crypto-Book key servers at various host institutions
• Abuse resistant way of using anonymous systems such as Tor
• Investigation of anonymity set selection
![Page 80: Hotnets Slides](https://reader037.vdocument.in/reader037/viewer/2022103115/5575a19fd8b42aff598b4cbf/html5/thumbnails/80.jpg)
Conclusion
• Crypto-Book provides privacy preserving online identities – anonymous – abuse resistant
• www.crypto-book.com– Demo video– More info, SOSP’13 poster, more talk slides– Link to source code on GitHub