ahmed osama research assistant. presentation outline winc- nile university- privacy preserving over...

24
Privacy Preservation Over Network Coding Ahmed Osama Research Assistant

Upload: aubrie-newton

Post on 04-Jan-2016

217 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Ahmed Osama Research Assistant. Presentation Outline Winc- Nile University- Privacy Preserving Over Network Coding 2  Introduction  Network coding

Privacy Preservation Over Network Coding

Ahmed Osama

Research Assistant

Page 2: Ahmed Osama Research Assistant. Presentation Outline Winc- Nile University- Privacy Preserving Over Network Coding 2  Introduction  Network coding

2

Presentation Outline

Winc- Nile University- Privacy Preserving Over Network Coding

Introduction Network coding Applications of network coding: recent work

Primitives Linear Network Coding Traffic analysis

Privacy preserving Scheme Security proposed scheme

Future work References

Page 3: Ahmed Osama Research Assistant. Presentation Outline Winc- Nile University- Privacy Preserving Over Network Coding 2  Introduction  Network coding

Winc- Nile University- Privacy Preserving Over Network Coding

3

Network Coding

Network coding is a field of information theory and coding theory and is a method of attaining maximum information flow in a network [Wikipedia].

Pioneering work: [1] R. Ahlswede, N. Cai, S.-Y. R. Li, and R.W. Yeung, “Network information flow,” IEEE Trans. on Information Theory, vol. 46, no. 4, July 2000.

Page 4: Ahmed Osama Research Assistant. Presentation Outline Winc- Nile University- Privacy Preserving Over Network Coding 2  Introduction  Network coding

Winc- Nile University- Privacy Preserving Over Network Coding

4

Network CodingExample Simple store and forward Multicast rate of 1.5 bits per time unit

Page 5: Ahmed Osama Research Assistant. Presentation Outline Winc- Nile University- Privacy Preserving Over Network Coding 2  Introduction  Network coding

Winc- Nile University- Privacy Preserving Over Network Coding

5

Network Coding X-OR is one of the simplest form of data

coding Multicast rate of 2 bits per time unit

Page 6: Ahmed Osama Research Assistant. Presentation Outline Winc- Nile University- Privacy Preserving Over Network Coding 2  Introduction  Network coding

6

Presentation Outline

Winc- Nile University- Privacy Preserving Over Network Coding

Introduction Network coding Applications of network coding: recent work

Primitives Linear Network Coding Traffic analysis “Unobservability Vs Anonymity”

Privacy preserving Scheme Security proposed scheme

Future work References

Page 7: Ahmed Osama Research Assistant. Presentation Outline Winc- Nile University- Privacy Preserving Over Network Coding 2  Introduction  Network coding

Winc- Nile University- Privacy Preserving Over Network Coding

7

Applications of network coding: recent work

Page 8: Ahmed Osama Research Assistant. Presentation Outline Winc- Nile University- Privacy Preserving Over Network Coding 2  Introduction  Network coding

Winc- Nile University- Privacy Preserving Over Network Coding

8

Application 1:Content DistributionDistribute content to millions of users, such as Software updates Music Films

Traditional MethodContent collected in servers, clients connect to servers to download the information.Problems:Not-scalable, expensive, slow and Single point of failure

Page 9: Ahmed Osama Research Assistant. Presentation Outline Winc- Nile University- Privacy Preserving Over Network Coding 2  Introduction  Network coding

Winc- Nile University- Privacy Preserving Over Network Coding

9

Application 1:Content Distribution P2P networks:

Capacity and computational power of thenetwork increases with the number of users

Avalanche

Example

Page 10: Ahmed Osama Research Assistant. Presentation Outline Winc- Nile University- Privacy Preserving Over Network Coding 2  Introduction  Network coding

Winc- Nile University- Privacy Preserving Over Network Coding

10

Application 2:Vehicular Networks Vehicles communicate with each other and

with roadside infrastructure to increase safety and optimize traffic.

[Y. Lin ;MobiOpp 2007]

Page 11: Ahmed Osama Research Assistant. Presentation Outline Winc- Nile University- Privacy Preserving Over Network Coding 2  Introduction  Network coding

11

Presentation Outline

Winc- Nile University- Privacy Preserving Over Network Coding

Introduction Network coding Applications of network coding: recent work

Primitives Linear Network Coding Traffic analysis

Privacy preserving Scheme Security proposed scheme

Future work References

Page 12: Ahmed Osama Research Assistant. Presentation Outline Winc- Nile University- Privacy Preserving Over Network Coding 2  Introduction  Network coding

Winc- Nile University- Privacy Preserving Over Network Coding

12

Linear Network Coding

The output flow at a given node is obtained as a linear combination of its input flows. The coefficients of the combination are, by definition, selected from a finite field

……

x1

x2

xn

n

iiixay

Page 13: Ahmed Osama Research Assistant. Presentation Outline Winc- Nile University- Privacy Preserving Over Network Coding 2  Introduction  Network coding

Paper Summary- WINC- Nile University

13

Network Model

t

s

t

s ϵ V

T ϵ V ; t means one destinationAcyclic graph Is the multi

cast capacity and x1…..,xh

Edge symbols comes from a finite field Fq

y(e) is the symbol carried

on edge e

ᵝ(e) is the LEV

),( TsMinCuth

'

' )'()()(e

e eyeey

Page 14: Ahmed Osama Research Assistant. Presentation Outline Winc- Nile University- Privacy Preserving Over Network Coding 2  Introduction  Network coding

Paper Summary- WINC- Nile University

14

Network Model

T ϵ V ; t means one destination

Acyclic graph By induction we can

calculate that

Global Encoding

Vector(GEV) g(e) = [g1(e),

….gh(e)]

h

iie xegey

1' )()(

'

' )'()()(e

e egeeg

t

s

t

s ϵ V

Page 15: Ahmed Osama Research Assistant. Presentation Outline Winc- Nile University- Privacy Preserving Over Network Coding 2  Introduction  Network coding

Paper Summary- WINC- Nile University

15

Network Model

By induction we can

calculate that

Global Encoding

Vector(GEV) g(e) = [g1(e),

….gh(e)]

h

iie xegey

1' )()(

'

' )'()()(e

e egeeg

h

t

hhhh

h

h x

x

G

x

x

egeg

egeg

ey

ey

.

.

.

.

.

.

)(...)(

...

...

...

)(...)(

)(.

.

.)( 11

1

1111

Global Encoding Matrix

Page 16: Ahmed Osama Research Assistant. Presentation Outline Winc- Nile University- Privacy Preserving Over Network Coding 2  Introduction  Network coding

16

Presentation Outline

Winc- Nile University- Privacy Preserving Over Network Coding

Introduction Network coding Applications of network coding: recent work

Primitives Linear Network Coding Traffic analysis

Privacy preserving Scheme Security proposed scheme

Future work References

Page 17: Ahmed Osama Research Assistant. Presentation Outline Winc- Nile University- Privacy Preserving Over Network Coding 2  Introduction  Network coding

Winc- Nile University- Privacy Preserving Over Network Coding

17

Traffic analysis

Traffic analysis is the process of intercepting and examining messages in order to deduce information from patterns in communication. It can be performed even when the messages are encrypted and cannot be decrypted. In general, the greater the number of messages observed, or even intercepted and stored, the more can be inferred from the traffic.

Passive attack

Page 18: Ahmed Osama Research Assistant. Presentation Outline Winc- Nile University- Privacy Preserving Over Network Coding 2  Introduction  Network coding

18

Presentation Outline

Winc- Nile University- Privacy Preserving Over Network Coding

Introduction Network coding Applications of network coding: recent work

Primitives Linear Network Coding Traffic analysis

Privacy preserving Scheme Security proposed scheme

Future work References

Page 19: Ahmed Osama Research Assistant. Presentation Outline Winc- Nile University- Privacy Preserving Over Network Coding 2  Introduction  Network coding

Winc- Nile University- Privacy Preserving Over Network Coding

19

Security proposed schemeProblem Statement Privacy threats exist in network coding since

explicit GEVs provide a back door for adversaries.

We need to prevent flow tracing to protect source and destination from being revealed, Specially in multi-hop wireless network.

Page 20: Ahmed Osama Research Assistant. Presentation Outline Winc- Nile University- Privacy Preserving Over Network Coding 2  Introduction  Network coding

Winc- Nile University- Privacy Preserving Over Network Coding

20

Security proposed scheme Solution

Encoding Global Encoding Vectors using Homomorphic Functions

Homomorphism means operations on plain text can be performed by operating on corresponding cipher text. We need additive propertyE(x+y) = Add(E(x),E(y)) Also we need Scalar Multiplicative propertyE(t.x) = Mul(E(x),t)

Page 21: Ahmed Osama Research Assistant. Presentation Outline Winc- Nile University- Privacy Preserving Over Network Coding 2  Introduction  Network coding

21

Presentation Outline

Winc- Nile University- Privacy Preserving Over Network Coding

Introduction Network coding Applications of network coding: recent work

Primitives Linear Network Coding Traffic analysis

Privacy preserving Scheme Security proposed scheme

Future work References

Page 22: Ahmed Osama Research Assistant. Presentation Outline Winc- Nile University- Privacy Preserving Over Network Coding 2  Introduction  Network coding

Winc- Nile University- Privacy Preserving Over Network Coding

22

Future Work Propose a scheme that provide less

computational overhead. Authentication vs. privacy tradeoff

Page 23: Ahmed Osama Research Assistant. Presentation Outline Winc- Nile University- Privacy Preserving Over Network Coding 2  Introduction  Network coding

Winc- Nile University- Privacy Preserving Over Network Coding

23

References [1] Y. Lin, B. Liang, and B. Li, “Performance Modeling of

Network Coding in Epidemic Routing,” in Proc. of the First ACM International Workshop on Mobile Opportunistic Networking (MobiOpp), 2007.

[2] S.-Y. R. Li, R. W. Yeung, and N. Cai, “Linear network Coding”, IEEE Trans. on Information Theory, vol. 49, no. 2, Feb. 2003.

[3] R. Ahlswede, N. Cai, S.-Y. R. Li, and R.W. Yeung, “Network information flow,” IEEE Trans. on Information Theory, vol. 46, no. 4, July 2000.

[4] Y. Fan, Y. Jiang, H. Zhu, and X. Shen, "An Efficient Privacy-Preserving Scheme against Traffic Analysis Attacks in Network Coding", Proc.IEEE INFOCOM'09, Rio de Janeiro, Brazil, April 19-25, 2009.

Page 24: Ahmed Osama Research Assistant. Presentation Outline Winc- Nile University- Privacy Preserving Over Network Coding 2  Introduction  Network coding

Winc- Nile University- Privacy Preserving Over Network Coding

24

Thank you

Any Questions ?