Transcript
Page 1: PRIVACY(PRESERVING-PHOTO-SHARING-BASED-ON-A- PUBLIC …costic1206.uvigo.es/sites/default/files/Meetings... · PRIVACY(PRESERVING-PHOTO-SHARING-BASED-ON-A-PUBLIC-KEY-INFRASTRUCTURE

PRIVACY-­‐PRESERVING  PHOTO  SHARING  BASED  ON  A  PUBLIC  KEY  INFRASTRUCTURE

Lin  Yuana,  David  McNallya,  AlptekinKüpçüb and  Touradj [email protected]

a Multimedia  Signal  Processing  Group  (MMSPG)EPFL,  Lausanne,  Switzerland

b  Cryptography,  Security,  and  Privacy  Research  GroupKoç University,  Istanbul,  Turkey  

Introduction

§ Huge  amount  of  photos  shared  in  Online Social  Networks and  Cloud  Services

§ Privacy  concern– Governmental surveillance– Private photo leakage– Service  insider– Unauthorized  access

Privacy-­Preserving  Photo  Sharing  based  on  a  Public  Key  Infrastructure 2

Page 2: PRIVACY(PRESERVING-PHOTO-SHARING-BASED-ON-A- PUBLIC …costic1206.uvigo.es/sites/default/files/Meetings... · PRIVACY(PRESERVING-PHOTO-SHARING-BASED-ON-A-PUBLIC-KEY-INFRASTRUCTURE

Objective

§ Privacy-­preserving photo  sharing  architecture– User-­defined privacy image region– Cope with a  large  number of  possible  image  protection  solutions– JPEG  compliant protected photos– PKI enabling key exchange and access control

Privacy-­Preserving  Photo  Sharing  based  on  a  Public  Key  Infrastructure 3

Illustration

§ Secure JPEG Scrambling

Privacy-­Preserving  Photo  Sharing  based  on  a  Public  Key  Infrastructure 4

Key1

Scrambled JPEG photo

������Descrambled photos Original JPEG photo

1 2 3 4 5 6

7 8 9

APP Markers in file header:

Metadata about scrambled ROIs (without keys)

ROI1,Level1,Key1 Key9ROI9,Level9,Key9

1 -1 1 1 -1 -1 1 1 -1 1 …

-1 1 1 -1 1 -1 1 -1 1 1 …

Signs of DCT coefficients

Pseudorandom numbers

Page 3: PRIVACY(PRESERVING-PHOTO-SHARING-BASED-ON-A- PUBLIC …costic1206.uvigo.es/sites/default/files/Meetings... · PRIVACY(PRESERVING-PHOTO-SHARING-BASED-ON-A-PUBLIC-KEY-INFRASTRUCTURE

Fundamentals

§ Public-­Key  Cryptography  (PKC)– Encryption with public key– Decryption with private key– Public key  infrastructure  (PKI)– Certificate  Authority (CA)

Privacy-­Preserving  Photo  Sharing  based  on  a  Public  Key  Infrastructure 5

http://www.akadia.com/services/email_security.html

Fundamentals

§ Attribute-­Based Encryption  (ABE)– A special public-­key encryption: secret  key  of  a  user  and  the  ciphertext are  dependent upon  attributes

– Decryption only possible if Attributesmatch an Access Policy• Attributes

– A set of descriptive items,e.g., (‘Close Friend’, ‘Co-­worker’, ‘Age = 26’)

• Access Policy– Access structure over all attributes, normal or numerical

e.g.,(‘Family’ OR ‘Close Friend’ AND ‘Age>18’)– Key-­Policy ABE (KP-­ABE)

• Access policy in keys• Attributes in ciphertext

– Ciphertext-­Policy ABE (CP-­ABE)• Access policy in ciphertext• Attributes in keys

Privacy-­Preserving  Photo  Sharing  based  on  a  Public  Key  Infrastructure 6

Page 4: PRIVACY(PRESERVING-PHOTO-SHARING-BASED-ON-A- PUBLIC …costic1206.uvigo.es/sites/default/files/Meetings... · PRIVACY(PRESERVING-PHOTO-SHARING-BASED-ON-A-PUBLIC-KEY-INFRASTRUCTURE

Fundamentals

§ CP-­ABE  operations– Setup à (APK, AMSK)– KeyGen à ABE Private Key (ASK)

– Encryption

– Decryption

Privacy-­Preserving  Photo  Sharing  based  on  a  Public  Key  Infrastructure 7

KeyGenAMSK

AttributesASK

EncryptionPlaintext

Access Policy

Decryption

ASK

APK Ciphertext

Plaintext

SystemDesign

§ Architecture Overview

Privacy-­Preserving  Photo  Sharing  based  on  a  Public  Key  Infrastructure 8

Client side

Server side

JPEG

……

User A

Content Server

Key Server

JPEG

JPEG

Image Image

User B

Certificate Authority

Untrusted

Trusted

Page 5: PRIVACY(PRESERVING-PHOTO-SHARING-BASED-ON-A- PUBLIC …costic1206.uvigo.es/sites/default/files/Meetings... · PRIVACY(PRESERVING-PHOTO-SHARING-BASED-ON-A-PUBLIC-KEY-INFRASTRUCTURE

SystemDesign

§ Assumptions– Client components are trustworthy– Certificate Authority is trustworthy– Content Server and Key Server are not trusted

• honest-­but-­curious– Users  do  not  keep  viewed  photo  data,  image  secret  keys  and  ABE  private  keys  on  client-­side.  • Revocation   of  a  shared   digital  good   is  impossible  without   this  assumption   anyway.  

§ Setup– Two types of information used as attributes:

• User ID or username (unique to each user)• Descriptive info (group, role, age, etc.)

– Image secret key:• Randomly generated, or• Manually set by user

Privacy-­Preserving  Photo  Sharing  based  on  a  Public  Key  Infrastructure 9

SystemDesign

§ OP1  – User  Initialization– Generate keys for user:

• PKC Public Key (TPK)• PKC Private Key (TSK)• ABE Public Key (APK)• ABE Master Key (AMSK)

§ OP2 – Add a friend

Privacy-­Preserving  Photo  Sharing  based  on  a  Public  Key  Infrastructure 10

PKCEncryption

PKCDecryption

Sender  operation Recipient  operationServer

FriendASK

EncryptedFriendASK

FriendTPK

FriendTSK

FriendASK

CP-­ABEKey Generator

SenderAMSK

SenderAPK

FriendAttributes

CA

Keep on device

Page 6: PRIVACY(PRESERVING-PHOTO-SHARING-BASED-ON-A- PUBLIC …costic1206.uvigo.es/sites/default/files/Meetings... · PRIVACY(PRESERVING-PHOTO-SHARING-BASED-ON-A-PUBLIC-KEY-INFRASTRUCTURE

SystemDesign

§ OP3  – Protect  and  Share  a  Photo– Protect  photo  with  JPEG  Scrambling or  Transmorphing– Encrypt  secure  key  with  CP-­ABE

Privacy-­Preserving  Photo  Sharing  based  on  a  Public  Key  Infrastructure 11

ImageProtection

CP-­ABEEncryption

Sender  operation Server

ProtectedImage

EncryptedSecretKey

SenderAPK

Image

SecretKey

AccessPolicy

KeyGenerator

Scramble

SystemDesign

§ OP4  – Access  a  Photo– Decrypt  ABE  private  key  with  PKC– Decrypt  image  secret  key  with  CP-­ABE– Descramble  image  

Privacy-­Preserving  Photo  Sharing  based  on  a  Public  Key  Infrastructure 12

ImageRecovery

CP-­ABEDecryption

Recipient  operationServer

ProtectedImage

EncryptedSecretKey

SenderAPK

Image

RecipientASK

SecretKey

Descramble

Page 7: PRIVACY(PRESERVING-PHOTO-SHARING-BASED-ON-A- PUBLIC …costic1206.uvigo.es/sites/default/files/Meetings... · PRIVACY(PRESERVING-PHOTO-SHARING-BASED-ON-A-PUBLIC-KEY-INFRASTRUCTURE

SystemDesign

§ Revocation– Assumption: Users  do  not  keep  viewed  photo  data,  image  secret  keys  and  ABE  private  keys  on  client-­side.  

– Re-­generate friends ABE private keys, newattributes set• (‘Bob’, ‘Close Friend’, ‘Co-­worker’)à (‘Bob’, ‘Co-­worker’)

– Re-­encrypt image secret keys, newaccess policy• (‘Family’  OR  ‘Close  Friend’  OR  ‘Carol’)à (‘Family’  OR  ‘Close  Friend’)

§ Operation summary– OP2 (add  a  friend):

• One  ABE   KenGen operation à One  PKC  Encryption   operation– OP3  (share  a  photo,  n different  privacy  areas):

• n JPEG  Scrambling  operations à n  ABE   Encryption   operations– OP4  (access  a  photo,  n different  privacy  areas):

• One PKC Decryption à n ABE Decryption à n JPEG Descrambling– Revocation:

• One OP2   or  one   OP3

Privacy-­Preserving  Photo  Sharing  based  on  a  Public  Key  Infrastructure 13

Conclusion

§ A  privacy-­preserving  photo  sharing  architecture  applicable  to  JPEG  coded  images  

§ Protected  photos  compatible  with  JPEG  coding  § CP-­ABE along  with  conventional  PKC:

– Secure distribution of secret keys– Fine-­grained access control

§ Prototype application:ProShare

§ Future  work– Context-­aware privacy protection– Further evaluation

Privacy-­Preserving  Photo  Sharing  based  on  a  Public  Key  Infrastructure 14

Page 8: PRIVACY(PRESERVING-PHOTO-SHARING-BASED-ON-A- PUBLIC …costic1206.uvigo.es/sites/default/files/Meetings... · PRIVACY(PRESERVING-PHOTO-SHARING-BASED-ON-A-PUBLIC-KEY-INFRASTRUCTURE

Thank  you  for  your  attention!

Privacy-­Preserving  Photo  Sharing  based  on  a  Public  Key  Infrastructure 15


Top Related