SlideShare a Scribd company logo
1 of 28
PRShare: A Framework For
Privacy-Preserving,
Interorganizational
Data Sharing
Lihi Idan
Yale University
(Joint work with Joan Feigenbaum)
Interorganizational data sharing
Owner organization (“data owner”), client organization (“data client”).
Data record: data+metadata attributes. Stored on a Cloud server (CSP).
Attribute=<label,value>
Each record is linked to a certain individual, the data subject.
Data users employees of a data client, may need access to owner’s data records in
order to to perform their assigned tasks.
Intermediary organizations enrich shared data with additional information that is
needed for the client’s tasks
Interorganizational data sharing – cont.
Employees are assigned a list of time-limited tasks. This list is dynamic.
An employee is only allowed to access shared data records that are needed in order to
execute a task in her tasks list.
“Needed in order to perform a task”?**
Each organization uses its own set of intraorganizational attributes to query and process the
shared data. This set is called VOCABULARY.
We assume that the intersection between different vocabularies is not empty.
Privacy preserving Interorganizational data sharing
Privacy of data subjects: sharing of data must be kept to the minimum
required in order to perform a task.
Privacy of each organization: maintaining a proprietary view of the
shared data.
• Preventing unauthorized employees from accessing the shared data.
• Protecting the confidentiality of each organization’s proprietary metadata
attributes
Each organization does not want to expose its internal structure and role
hierarchy to other organizations.
Attribute-based encryption (Key-Policy ABE )
Each ciphertext is encrypted by an encryptor under a set of attributes.
Users’ private keys reflect decryption policies (access policies). Keys are
issued offline by a trusted authority.
Interorganizational data sharing using ABE
Each data record includes a payload h (data) and a set of attributes S.
Each payload h is encrypted by the owner under its corresponding S and the resulting
data record is stored on the CSP.
A user is issued an attribute-based secret key. Keys are issued by a group of trusted
authorities.
The user can then send data requests to the CSP.
Pros
Flexibility ciphertext not necessarily encrypted to one particular user
Expressive, fine-grained access policies
Eliminates the need to rely on the CSP for preventing unauthorized data
access
Using existing ABE schemes
Underlying assumption: the attributes in the key and in the ciphertext must belong to the
same vocabulary.
Real-world interorganizational setting: organizations often belong to different professional
domains.
Challenge: attributes in the ciphertext used by the encryptor (owner) and attributes in
keys used by users (client employees) may belong to different vocabularies .
Using existing ABE schemes-cont.
Underlying assumption: attributes’ values can always be updated by the owner, at any
time.
Real-world interorganizational setting: some attributes’ true values can only be
determined when a user sends a data request. This update may require client’s or
intermediary’s proprietary auxiliary information that can not be shared with the owner.
Challenge: in many cases, the encryptor (owner) can not update ciphertexts’ attributes
on its own.
Payload:
email message
Auxiliary information:
watchlist
efg@gmail.com
uyi@gmail.com
lml@gmail.com
Attributes:
SENDER=abc@gmail.com,
DATE=11/9/2020,
SUBJECT_LINE=important,
IS_FILE_ATTACHED=yes
ON_WATCHLIST=TRUE DATE=112020
∨
Payload:
email message
Attributes:
SENDER=abc@gmail.com,
DATE=11/9/2020,
SUBJECT_LINE=important,
IS_FILE_ATTACHED=yes
Auxiliary information:
watchlist
ON_WATCHLIST=TRUE DATE=112020
abc@gmail.com
uyi@gmail.com
Two hours later…
∨
Payload:
Credit report
Attributes:
CREDIT-UTILIZATION-RATIO=0.35,
CREDIT-SCORE=650,
DLN=xyz ,
DATE=11/9/2020
Auxiliary information
AVERAGE_CREDIT_UTILIZATION_RATIO
=0.4
CREDIT_SCORE>600 ∧ #ACCIDENTS<2 ∧
IS-CREDIT-RATIO-LESS-THAN-AVERAGE=TRUE
Auxiliary information
Driving records
DLN -> #ACCIDENTS
DLN(xyz)=0
Payload:
Credit report
Attributes:
CREDIT-UTILIZATION-RATIO=0.35,
CREDIT-SCORE=650,
DLN=xyz ,
DATE=11/9/2020
Auxiliary information
AVERAGE_CREDIT_UTILIZATION_RATIO
= 0.4 0.3
CREDIT_SCORE>600 ∧ #ACCIDENTS<2 ∧
IS-CREDIT-RATIO-LESS-THAN-AVERAGE=TRUE
Auxiliary information
Driving records (MVR)
DLN -> #ACCIDENTS
DLN(xyz)=0 1
A week later...
Goals
Design an interorganizational data-sharing framework with the following features:
Privacy preserving with respect to payloads, attributes and auxiliary information.
Multi-vocabulary: Each organization can use its own set of attributes to describe both the
shared data and access policies to the shared data.
Dynamically reconfigurable attributes: Ciphertext’s attributes are updated dynamically
according to up-to-date auxiliary information. Such updates do not require re-encryption
of the ciphertext.
Offline delegation: The owner does not to need to authorize or serve clients’ data-access
queries.
Key-abuse prevention, direct revocation
Attribute based encryption with oblivious
attribute translation
Solution: attribute translation
Let uowner be the owner’s attribute universe (owner’s vocabulary) and uclient be the
client’s attribute universe (client’s vocabulary)
A translation algorithm Translate() takes as input a ciphertext ct , ct=[h]S s.t. S ⊆ uowner
and outputs a new ciphertext, ct’=[h]S’ s.t. S’ ⊆ uclient .
Payload: h Payload: h
Att1
Att2
Att3
Att1’
Att2’
Att3
Translate()
CT CT’
S S’
Requirements from Translate()
Translate() can be computed dynamically based on up to date auxiliary information held by
the client or an intermediary.
Payload privacy: Translate() can be computed such that only authorized users can learn h.
Attribute privacy: Translate() can be computed such that attributes in S are not revealed to
the client and attributes in S’ are not revealed to the owner
Is this really necessary?
Attribute privacy: Translate() can be computed such that sensitive attributes in S are not
reveled to the client and sensitive attributes in S’ are not revealed to the owner (formal
definition in the paper)
Each organization can choose which attributes are considered sensitive to it.
Pros:
Each organization can use its own vocabulary, and yet the attributes in the ciphertext and
key will match
Each organization’s sensitive attributes as well as auxiliary information are not exposed to
other organizations.
How is att1’ computed?
-Numerical comparison (att1>auxiliary)
-Equality check between att1 and(att1=auxiliary)
-List membership test(att1 ∈ auxiliary)
-Keyword search of att1 in auxiliary
-Using pre-configured look up tables
And more…
Who performs attribute translation?
Data owner?
Goals:
Division of trust: translation can not be done by a single entity.
Delegation: saving resources by delegating translation operations.
Mediated cryptography
Designed by Boneh, Ding and Tsudik (2001) as a method to allow immediate revocation.
Particularly useful in government or corporate environments.
Use an on-line mediator for every transaction, SEM (SEcurity Mediator).
Semi-trusted Mediator
• Delegate translation
• Semi trusted server (proxy) will perform the translation.
• Conceptually, one proxy for each intermediary, and one for the client.
• Each proxy may translate a pre-defined subset of attributes . Different proxies’ subsets
may overlap.
• Each proxy prj uses both a generic translation algorithm and an organization-specific
translation function and auxiliary information
Oblivious Attribute
Translation
If needed, auxiliary information may also remain hidden from the proxy
Att1=<a,b>
Att2=<c,d>
Att3=<e,f>
Att1=<a,b>
Att2=<c,d>
Att3=<x,y>
M M
Q_j={Att3}
S S’
Translate(ct,j)
CT’
CT
Payload:
email message
Auxiliary information:
watchlist
abc@gmail.com
Payload:
email message
Attributes:
SENDER=abc@gmail.com,
DATE=11/9/2020,
SUBJECT_LINE=important,
IS_FILE_ATTACHED=yes
abc@gmail.com ∈ watchlist?
ON_WATCHLIST=TRUE
Attributes:
SENDER=abc@gmail.com,
DATE=11/9/2020,
SUBJECT_LINE=important,
IS_FILE_ATTACHED=yes
ON_WATCHLIST=TRUE DATE=1092020
∨
Payload:
Credit report
Attributes:
CREDIT-UTILIZATION-RATIO=0.35,
CREDIT-SCORE=650,
DLN=xyz ,
DATE=11/9/2020
Auxiliary information
AVERAGE_CREDIT_UTILIZATION_RATIO
=0.4
CREDIT_SCORE>600 ∧ #ACCIDENTS<2 ∧
IS-CREDIT-RATIO-LESS-THAN-AVERAGE=TRUE
Auxiliary information
Driving records (DRs)
DLN -> #ACCIDENTS
DLN(xyz)=0
DR[xyz]=?
0.35<AVERAGE_CREDIT_UTILIZATION_RATIO?
Attributes:
CREDIT-UTILIZATION-RATIO=0.35,
CREDIT-SCORE=650,
DLN=xyz ,
DATE=11/9/2020
Attributes:
CREDIT-UTILIZATION-RATIO=0.35,
CREDIT-SCORE=650,
#ACCIDENTS=0,
DATE=11/9/2020
Payload:
Credit report
Payload:
Credit report
#ACCIDENTS=0
IS-CREDIT-RATIO-LESS-THAN-AVERAGE=TRUE
What else can we do with translation?
• Key abuse
An authorized user is able to share his secret key with unauthorized users and abuse his
access privilege.
• Revocation
Efficient revocation.
Direct revocation mechanism: revoking the keys of a set U of users does not affect the
keys of users not in U.
Our techniques
• Use secret sharing to break the binder term into |translators|+1 shares. Each partial
ciphertext contains only one share of the binder term.
• For each mutable attribute, the ciphertext does not contain the actual attribute.
Instead, the ciphertext contains the output of a given transformation that is applied to
the attribute.
• A second uniformly randomly chosen term, lk , is used to double blind each partial
ciphertext, using dk = fk ∗ lk as a blinding factor.
Conclusion
We have designed PRShare, an interorganizational data-sharing framework
Privacy preserving
Multi-vocabulary
Dynamically reconfigurable attributes
Offline delegation
Key-abuse prevention, direct revocation
We have introduced the novel concept of Attribute-Based Encryption With Oblivious
Attribute Translation
More details in ?:
System flows
Security
Construction
Benchmarks
Questions?

More Related Content

What's hot

Opportunistic Linked Data Querying through Approximate Membership Metadata
Opportunistic Linked Data Querying through Approximate Membership MetadataOpportunistic Linked Data Querying through Approximate Membership Metadata
Opportunistic Linked Data Querying through Approximate Membership MetadataMiel Vander Sande
 
An efficient, secure deduplication data storing in cloud storage environment
An efficient, secure deduplication data storing in cloud storage environmentAn efficient, secure deduplication data storing in cloud storage environment
An efficient, secure deduplication data storing in cloud storage environmenteSAT Journals
 
cloud computing- service operator aware trust scheme
cloud computing- service operator aware trust schemecloud computing- service operator aware trust scheme
cloud computing- service operator aware trust schemejisa joy
 
Identifying the Performance Efficiency Of Attribute Based Encryption With Sec...
Identifying the Performance Efficiency Of Attribute Based Encryption With Sec...Identifying the Performance Efficiency Of Attribute Based Encryption With Sec...
Identifying the Performance Efficiency Of Attribute Based Encryption With Sec...IJSRD
 
Service operator aware trust scheme for resource
Service operator aware trust scheme for resourceService operator aware trust scheme for resource
Service operator aware trust scheme for resourcePvrtechnologies Nellore
 
Architecting IoT Systems with Vortex
Architecting IoT Systems with VortexArchitecting IoT Systems with Vortex
Architecting IoT Systems with VortexAngelo Corsaro
 
DDS and OPC UA Explained
DDS and OPC UA ExplainedDDS and OPC UA Explained
DDS and OPC UA ExplainedAngelo Corsaro
 
Looking at SDN with DDS Glasses
Looking at SDN with DDS GlassesLooking at SDN with DDS Glasses
Looking at SDN with DDS GlassesAngelo Corsaro
 
Service operator aware trust scheme for resource matchmaking across multiple ...
Service operator aware trust scheme for resource matchmaking across multiple ...Service operator aware trust scheme for resource matchmaking across multiple ...
Service operator aware trust scheme for resource matchmaking across multiple ...ieeepondy
 
An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud ...
An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud ...An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud ...
An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud ...IJMER
 
PROVABLE DATA PROCESSING (PDP) A MODEL FOR CLIENT'S SECURED DATA ON CLOUD
PROVABLE DATA PROCESSING (PDP) A MODEL FOR CLIENT'S SECURED DATA ON CLOUDPROVABLE DATA PROCESSING (PDP) A MODEL FOR CLIENT'S SECURED DATA ON CLOUD
PROVABLE DATA PROCESSING (PDP) A MODEL FOR CLIENT'S SECURED DATA ON CLOUDJournal For Research
 
Secure Access to Outsourced Databases
Secure Access to Outsourced DatabasesSecure Access to Outsourced Databases
Secure Access to Outsourced DatabasesIOSR Journals
 
Reactive Stream Processing for Data-centric Publish/Subscribe
Reactive Stream Processing for Data-centric Publish/SubscribeReactive Stream Processing for Data-centric Publish/Subscribe
Reactive Stream Processing for Data-centric Publish/SubscribeSumant Tambe
 
Ieeepro techno solutions 2014 ieee java project - query services in cost ef...
Ieeepro techno solutions   2014 ieee java project - query services in cost ef...Ieeepro techno solutions   2014 ieee java project - query services in cost ef...
Ieeepro techno solutions 2014 ieee java project - query services in cost ef...hemanthbbc
 
A Survey on Efficient Privacy-Preserving Ranked Keyword Search Method
A Survey on Efficient Privacy-Preserving Ranked Keyword Search MethodA Survey on Efficient Privacy-Preserving Ranked Keyword Search Method
A Survey on Efficient Privacy-Preserving Ranked Keyword Search MethodIRJET Journal
 
IRJET- Privacy Preserving Encrypted Keyword Search Schemes
IRJET-  	  Privacy Preserving Encrypted Keyword Search SchemesIRJET-  	  Privacy Preserving Encrypted Keyword Search Schemes
IRJET- Privacy Preserving Encrypted Keyword Search SchemesIRJET Journal
 
Improving Cloud Security Using Data Mining
Improving Cloud Security Using Data MiningImproving Cloud Security Using Data Mining
Improving Cloud Security Using Data MiningIOSR Journals
 
IRJET- Extended Cloud Security for Trust-Based Cloud Service Providers
IRJET- Extended Cloud Security for Trust-Based Cloud Service ProvidersIRJET- Extended Cloud Security for Trust-Based Cloud Service Providers
IRJET- Extended Cloud Security for Trust-Based Cloud Service ProvidersIRJET Journal
 

What's hot (20)

Opportunistic Linked Data Querying through Approximate Membership Metadata
Opportunistic Linked Data Querying through Approximate Membership MetadataOpportunistic Linked Data Querying through Approximate Membership Metadata
Opportunistic Linked Data Querying through Approximate Membership Metadata
 
An efficient, secure deduplication data storing in cloud storage environment
An efficient, secure deduplication data storing in cloud storage environmentAn efficient, secure deduplication data storing in cloud storage environment
An efficient, secure deduplication data storing in cloud storage environment
 
cloud computing- service operator aware trust scheme
cloud computing- service operator aware trust schemecloud computing- service operator aware trust scheme
cloud computing- service operator aware trust scheme
 
Identifying the Performance Efficiency Of Attribute Based Encryption With Sec...
Identifying the Performance Efficiency Of Attribute Based Encryption With Sec...Identifying the Performance Efficiency Of Attribute Based Encryption With Sec...
Identifying the Performance Efficiency Of Attribute Based Encryption With Sec...
 
Service operator aware trust scheme for resource
Service operator aware trust scheme for resourceService operator aware trust scheme for resource
Service operator aware trust scheme for resource
 
Architecting IoT Systems with Vortex
Architecting IoT Systems with VortexArchitecting IoT Systems with Vortex
Architecting IoT Systems with Vortex
 
DDS and OPC UA Explained
DDS and OPC UA ExplainedDDS and OPC UA Explained
DDS and OPC UA Explained
 
Looking at SDN with DDS Glasses
Looking at SDN with DDS GlassesLooking at SDN with DDS Glasses
Looking at SDN with DDS Glasses
 
Service operator aware trust scheme for resource matchmaking across multiple ...
Service operator aware trust scheme for resource matchmaking across multiple ...Service operator aware trust scheme for resource matchmaking across multiple ...
Service operator aware trust scheme for resource matchmaking across multiple ...
 
An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud ...
An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud ...An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud ...
An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud ...
 
PROVABLE DATA PROCESSING (PDP) A MODEL FOR CLIENT'S SECURED DATA ON CLOUD
PROVABLE DATA PROCESSING (PDP) A MODEL FOR CLIENT'S SECURED DATA ON CLOUDPROVABLE DATA PROCESSING (PDP) A MODEL FOR CLIENT'S SECURED DATA ON CLOUD
PROVABLE DATA PROCESSING (PDP) A MODEL FOR CLIENT'S SECURED DATA ON CLOUD
 
El35782786
El35782786El35782786
El35782786
 
Secure Access to Outsourced Databases
Secure Access to Outsourced DatabasesSecure Access to Outsourced Databases
Secure Access to Outsourced Databases
 
Arunkumar_Resume
Arunkumar_ResumeArunkumar_Resume
Arunkumar_Resume
 
Reactive Stream Processing for Data-centric Publish/Subscribe
Reactive Stream Processing for Data-centric Publish/SubscribeReactive Stream Processing for Data-centric Publish/Subscribe
Reactive Stream Processing for Data-centric Publish/Subscribe
 
Ieeepro techno solutions 2014 ieee java project - query services in cost ef...
Ieeepro techno solutions   2014 ieee java project - query services in cost ef...Ieeepro techno solutions   2014 ieee java project - query services in cost ef...
Ieeepro techno solutions 2014 ieee java project - query services in cost ef...
 
A Survey on Efficient Privacy-Preserving Ranked Keyword Search Method
A Survey on Efficient Privacy-Preserving Ranked Keyword Search MethodA Survey on Efficient Privacy-Preserving Ranked Keyword Search Method
A Survey on Efficient Privacy-Preserving Ranked Keyword Search Method
 
IRJET- Privacy Preserving Encrypted Keyword Search Schemes
IRJET-  	  Privacy Preserving Encrypted Keyword Search SchemesIRJET-  	  Privacy Preserving Encrypted Keyword Search Schemes
IRJET- Privacy Preserving Encrypted Keyword Search Schemes
 
Improving Cloud Security Using Data Mining
Improving Cloud Security Using Data MiningImproving Cloud Security Using Data Mining
Improving Cloud Security Using Data Mining
 
IRJET- Extended Cloud Security for Trust-Based Cloud Service Providers
IRJET- Extended Cloud Security for Trust-Based Cloud Service ProvidersIRJET- Extended Cloud Security for Trust-Based Cloud Service Providers
IRJET- Extended Cloud Security for Trust-Based Cloud Service Providers
 

Similar to PRShare: a framework for privacy-preserving, interorganizational data sharing.

Attribute-Based Encryption for Cloud Security
Attribute-Based Encryption for Cloud SecurityAttribute-Based Encryption for Cloud Security
Attribute-Based Encryption for Cloud SecurityMphasis
 
A Survey on Cross-License Cloud Storage Environment of Revelatory, Proficient...
A Survey on Cross-License Cloud Storage Environment of Revelatory, Proficient...A Survey on Cross-License Cloud Storage Environment of Revelatory, Proficient...
A Survey on Cross-License Cloud Storage Environment of Revelatory, Proficient...IRJET Journal
 
Investigation on Revocable Fine-grained Access Control Scheme for Multi-Autho...
Investigation on Revocable Fine-grained Access Control Scheme for Multi-Autho...Investigation on Revocable Fine-grained Access Control Scheme for Multi-Autho...
Investigation on Revocable Fine-grained Access Control Scheme for Multi-Autho...IJCERT JOURNAL
 
Improving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-CloudImproving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-CloudIJTET Journal
 
IRJET- A Key-Policy Attribute based Temporary Keyword Search Scheme for S...
IRJET-  	  A Key-Policy Attribute based Temporary Keyword Search Scheme for S...IRJET-  	  A Key-Policy Attribute based Temporary Keyword Search Scheme for S...
IRJET- A Key-Policy Attribute based Temporary Keyword Search Scheme for S...IRJET Journal
 
MongoDB World 2018: Evolving your Data Access with MongoDB Stitch
MongoDB World 2018: Evolving your Data Access with MongoDB StitchMongoDB World 2018: Evolving your Data Access with MongoDB Stitch
MongoDB World 2018: Evolving your Data Access with MongoDB StitchMongoDB
 
Construire une « data fabric » pour les environnements edge
Construire une « data fabric » pour les environnements edgeConstruire une « data fabric » pour les environnements edge
Construire une « data fabric » pour les environnements edgeOpen Source Experience
 
Evolving your Data Access with MongoDB Stitch - Drew Di Palma
Evolving your Data Access with MongoDB Stitch - Drew Di PalmaEvolving your Data Access with MongoDB Stitch - Drew Di Palma
Evolving your Data Access with MongoDB Stitch - Drew Di PalmaMongoDB
 
Attributes based encryption with verifiable outsourced decryption
Attributes based encryption with verifiable outsourced decryptionAttributes based encryption with verifiable outsourced decryption
Attributes based encryption with verifiable outsourced decryptionKaashivInfoTech Company
 
IRJET- Anchoring of Cloud Information under Key Presentation
IRJET- Anchoring of Cloud Information under Key PresentationIRJET- Anchoring of Cloud Information under Key Presentation
IRJET- Anchoring of Cloud Information under Key PresentationIRJET Journal
 
An Improved Integrated Hash and Attributed based Encryption Model on High Dim...
An Improved Integrated Hash and Attributed based Encryption Model on High Dim...An Improved Integrated Hash and Attributed based Encryption Model on High Dim...
An Improved Integrated Hash and Attributed based Encryption Model on High Dim...IJECEIAES
 
Data sharing with accountability in cloud
Data sharing with accountability in cloudData sharing with accountability in cloud
Data sharing with accountability in cloudSusheenthiran Sujith
 
Comptia security+ (sy0-601) exam dumps 2022
Comptia security+ (sy0-601) exam dumps 2022Comptia security+ (sy0-601) exam dumps 2022
Comptia security+ (sy0-601) exam dumps 2022SkillCertProExams
 
documentation for identity based secure distrbuted data storage schemes
documentation for identity based secure distrbuted data storage schemesdocumentation for identity based secure distrbuted data storage schemes
documentation for identity based secure distrbuted data storage schemesSahithi Naraparaju
 
Secured Authorized Deduplication Based Hybrid Cloud
Secured Authorized Deduplication Based Hybrid CloudSecured Authorized Deduplication Based Hybrid Cloud
Secured Authorized Deduplication Based Hybrid Cloudtheijes
 
E031102034039
E031102034039E031102034039
E031102034039theijes
 
Service operator aware trust scheme for resource
Service operator aware trust scheme for resourceService operator aware trust scheme for resource
Service operator aware trust scheme for resourcejayaramb
 
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS Securing brokerless publish subs...
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS Securing brokerless publish subs...IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS Securing brokerless publish subs...
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS Securing brokerless publish subs...IEEEMEMTECHSTUDENTPROJECTS
 

Similar to PRShare: a framework for privacy-preserving, interorganizational data sharing. (20)

Attribute-Based Encryption for Cloud Security
Attribute-Based Encryption for Cloud SecurityAttribute-Based Encryption for Cloud Security
Attribute-Based Encryption for Cloud Security
 
A Survey on Cross-License Cloud Storage Environment of Revelatory, Proficient...
A Survey on Cross-License Cloud Storage Environment of Revelatory, Proficient...A Survey on Cross-License Cloud Storage Environment of Revelatory, Proficient...
A Survey on Cross-License Cloud Storage Environment of Revelatory, Proficient...
 
Investigation on Revocable Fine-grained Access Control Scheme for Multi-Autho...
Investigation on Revocable Fine-grained Access Control Scheme for Multi-Autho...Investigation on Revocable Fine-grained Access Control Scheme for Multi-Autho...
Investigation on Revocable Fine-grained Access Control Scheme for Multi-Autho...
 
Improving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-CloudImproving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-Cloud
 
IRJET- A Key-Policy Attribute based Temporary Keyword Search Scheme for S...
IRJET-  	  A Key-Policy Attribute based Temporary Keyword Search Scheme for S...IRJET-  	  A Key-Policy Attribute based Temporary Keyword Search Scheme for S...
IRJET- A Key-Policy Attribute based Temporary Keyword Search Scheme for S...
 
MongoDB World 2018: Evolving your Data Access with MongoDB Stitch
MongoDB World 2018: Evolving your Data Access with MongoDB StitchMongoDB World 2018: Evolving your Data Access with MongoDB Stitch
MongoDB World 2018: Evolving your Data Access with MongoDB Stitch
 
Construire une « data fabric » pour les environnements edge
Construire une « data fabric » pour les environnements edgeConstruire une « data fabric » pour les environnements edge
Construire une « data fabric » pour les environnements edge
 
Evolving your Data Access with MongoDB Stitch - Drew Di Palma
Evolving your Data Access with MongoDB Stitch - Drew Di PalmaEvolving your Data Access with MongoDB Stitch - Drew Di Palma
Evolving your Data Access with MongoDB Stitch - Drew Di Palma
 
Ijcatr04051007
Ijcatr04051007Ijcatr04051007
Ijcatr04051007
 
Attributes based encryption with verifiable outsourced decryption
Attributes based encryption with verifiable outsourced decryptionAttributes based encryption with verifiable outsourced decryption
Attributes based encryption with verifiable outsourced decryption
 
IRJET- Anchoring of Cloud Information under Key Presentation
IRJET- Anchoring of Cloud Information under Key PresentationIRJET- Anchoring of Cloud Information under Key Presentation
IRJET- Anchoring of Cloud Information under Key Presentation
 
An Improved Integrated Hash and Attributed based Encryption Model on High Dim...
An Improved Integrated Hash and Attributed based Encryption Model on High Dim...An Improved Integrated Hash and Attributed based Encryption Model on High Dim...
An Improved Integrated Hash and Attributed based Encryption Model on High Dim...
 
Data sharing with accountability in cloud
Data sharing with accountability in cloudData sharing with accountability in cloud
Data sharing with accountability in cloud
 
Comptia security+ (sy0-601) exam dumps 2022
Comptia security+ (sy0-601) exam dumps 2022Comptia security+ (sy0-601) exam dumps 2022
Comptia security+ (sy0-601) exam dumps 2022
 
documentation for identity based secure distrbuted data storage schemes
documentation for identity based secure distrbuted data storage schemesdocumentation for identity based secure distrbuted data storage schemes
documentation for identity based secure distrbuted data storage schemes
 
Keystone Federation
Keystone Federation Keystone Federation
Keystone Federation
 
Secured Authorized Deduplication Based Hybrid Cloud
Secured Authorized Deduplication Based Hybrid CloudSecured Authorized Deduplication Based Hybrid Cloud
Secured Authorized Deduplication Based Hybrid Cloud
 
E031102034039
E031102034039E031102034039
E031102034039
 
Service operator aware trust scheme for resource
Service operator aware trust scheme for resourceService operator aware trust scheme for resource
Service operator aware trust scheme for resource
 
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS Securing brokerless publish subs...
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS Securing brokerless publish subs...IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS Securing brokerless publish subs...
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS Securing brokerless publish subs...
 

Recently uploaded

STERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCE
STERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCESTERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCE
STERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCEPRINCE C P
 
Pests of cotton_Sucking_Pests_Dr.UPR.pdf
Pests of cotton_Sucking_Pests_Dr.UPR.pdfPests of cotton_Sucking_Pests_Dr.UPR.pdf
Pests of cotton_Sucking_Pests_Dr.UPR.pdfPirithiRaju
 
Recombination DNA Technology (Nucleic Acid Hybridization )
Recombination DNA Technology (Nucleic Acid Hybridization )Recombination DNA Technology (Nucleic Acid Hybridization )
Recombination DNA Technology (Nucleic Acid Hybridization )aarthirajkumar25
 
Biological Classification BioHack (3).pdf
Biological Classification BioHack (3).pdfBiological Classification BioHack (3).pdf
Biological Classification BioHack (3).pdfmuntazimhurra
 
Botany krishna series 2nd semester Only Mcq type questions
Botany krishna series 2nd semester Only Mcq type questionsBotany krishna series 2nd semester Only Mcq type questions
Botany krishna series 2nd semester Only Mcq type questionsSumit Kumar yadav
 
Formation of low mass protostars and their circumstellar disks
Formation of low mass protostars and their circumstellar disksFormation of low mass protostars and their circumstellar disks
Formation of low mass protostars and their circumstellar disksSérgio Sacani
 
Green chemistry and Sustainable development.pptx
Green chemistry  and Sustainable development.pptxGreen chemistry  and Sustainable development.pptx
Green chemistry and Sustainable development.pptxRajatChauhan518211
 
Boyles law module in the grade 10 science
Boyles law module in the grade 10 scienceBoyles law module in the grade 10 science
Boyles law module in the grade 10 sciencefloriejanemacaya1
 
Unlocking the Potential: Deep dive into ocean of Ceramic Magnets.pptx
Unlocking  the Potential: Deep dive into ocean of Ceramic Magnets.pptxUnlocking  the Potential: Deep dive into ocean of Ceramic Magnets.pptx
Unlocking the Potential: Deep dive into ocean of Ceramic Magnets.pptxanandsmhk
 
Botany 4th semester series (krishna).pdf
Botany 4th semester series (krishna).pdfBotany 4th semester series (krishna).pdf
Botany 4th semester series (krishna).pdfSumit Kumar yadav
 
GFP in rDNA Technology (Biotechnology).pptx
GFP in rDNA Technology (Biotechnology).pptxGFP in rDNA Technology (Biotechnology).pptx
GFP in rDNA Technology (Biotechnology).pptxAleenaTreesaSaji
 
Raman spectroscopy.pptx M Pharm, M Sc, Advanced Spectral Analysis
Raman spectroscopy.pptx M Pharm, M Sc, Advanced Spectral AnalysisRaman spectroscopy.pptx M Pharm, M Sc, Advanced Spectral Analysis
Raman spectroscopy.pptx M Pharm, M Sc, Advanced Spectral AnalysisDiwakar Mishra
 
Spermiogenesis or Spermateleosis or metamorphosis of spermatid
Spermiogenesis or Spermateleosis or metamorphosis of spermatidSpermiogenesis or Spermateleosis or metamorphosis of spermatid
Spermiogenesis or Spermateleosis or metamorphosis of spermatidSarthak Sekhar Mondal
 
Grafana in space: Monitoring Japan's SLIM moon lander in real time
Grafana in space: Monitoring Japan's SLIM moon lander  in real timeGrafana in space: Monitoring Japan's SLIM moon lander  in real time
Grafana in space: Monitoring Japan's SLIM moon lander in real timeSatoshi NAKAHIRA
 
Biopesticide (2).pptx .This slides helps to know the different types of biop...
Biopesticide (2).pptx  .This slides helps to know the different types of biop...Biopesticide (2).pptx  .This slides helps to know the different types of biop...
Biopesticide (2).pptx .This slides helps to know the different types of biop...RohitNehra6
 
Presentation Vikram Lander by Vedansh Gupta.pptx
Presentation Vikram Lander by Vedansh Gupta.pptxPresentation Vikram Lander by Vedansh Gupta.pptx
Presentation Vikram Lander by Vedansh Gupta.pptxgindu3009
 
Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |
Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |
Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |aasikanpl
 
A relative description on Sonoporation.pdf
A relative description on Sonoporation.pdfA relative description on Sonoporation.pdf
A relative description on Sonoporation.pdfnehabiju2046
 

Recently uploaded (20)

STERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCE
STERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCESTERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCE
STERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCE
 
Engler and Prantl system of classification in plant taxonomy
Engler and Prantl system of classification in plant taxonomyEngler and Prantl system of classification in plant taxonomy
Engler and Prantl system of classification in plant taxonomy
 
Pests of cotton_Sucking_Pests_Dr.UPR.pdf
Pests of cotton_Sucking_Pests_Dr.UPR.pdfPests of cotton_Sucking_Pests_Dr.UPR.pdf
Pests of cotton_Sucking_Pests_Dr.UPR.pdf
 
Recombination DNA Technology (Nucleic Acid Hybridization )
Recombination DNA Technology (Nucleic Acid Hybridization )Recombination DNA Technology (Nucleic Acid Hybridization )
Recombination DNA Technology (Nucleic Acid Hybridization )
 
Biological Classification BioHack (3).pdf
Biological Classification BioHack (3).pdfBiological Classification BioHack (3).pdf
Biological Classification BioHack (3).pdf
 
Botany krishna series 2nd semester Only Mcq type questions
Botany krishna series 2nd semester Only Mcq type questionsBotany krishna series 2nd semester Only Mcq type questions
Botany krishna series 2nd semester Only Mcq type questions
 
Formation of low mass protostars and their circumstellar disks
Formation of low mass protostars and their circumstellar disksFormation of low mass protostars and their circumstellar disks
Formation of low mass protostars and their circumstellar disks
 
Green chemistry and Sustainable development.pptx
Green chemistry  and Sustainable development.pptxGreen chemistry  and Sustainable development.pptx
Green chemistry and Sustainable development.pptx
 
Boyles law module in the grade 10 science
Boyles law module in the grade 10 scienceBoyles law module in the grade 10 science
Boyles law module in the grade 10 science
 
Unlocking the Potential: Deep dive into ocean of Ceramic Magnets.pptx
Unlocking  the Potential: Deep dive into ocean of Ceramic Magnets.pptxUnlocking  the Potential: Deep dive into ocean of Ceramic Magnets.pptx
Unlocking the Potential: Deep dive into ocean of Ceramic Magnets.pptx
 
Botany 4th semester series (krishna).pdf
Botany 4th semester series (krishna).pdfBotany 4th semester series (krishna).pdf
Botany 4th semester series (krishna).pdf
 
GFP in rDNA Technology (Biotechnology).pptx
GFP in rDNA Technology (Biotechnology).pptxGFP in rDNA Technology (Biotechnology).pptx
GFP in rDNA Technology (Biotechnology).pptx
 
CELL -Structural and Functional unit of life.pdf
CELL -Structural and Functional unit of life.pdfCELL -Structural and Functional unit of life.pdf
CELL -Structural and Functional unit of life.pdf
 
Raman spectroscopy.pptx M Pharm, M Sc, Advanced Spectral Analysis
Raman spectroscopy.pptx M Pharm, M Sc, Advanced Spectral AnalysisRaman spectroscopy.pptx M Pharm, M Sc, Advanced Spectral Analysis
Raman spectroscopy.pptx M Pharm, M Sc, Advanced Spectral Analysis
 
Spermiogenesis or Spermateleosis or metamorphosis of spermatid
Spermiogenesis or Spermateleosis or metamorphosis of spermatidSpermiogenesis or Spermateleosis or metamorphosis of spermatid
Spermiogenesis or Spermateleosis or metamorphosis of spermatid
 
Grafana in space: Monitoring Japan's SLIM moon lander in real time
Grafana in space: Monitoring Japan's SLIM moon lander  in real timeGrafana in space: Monitoring Japan's SLIM moon lander  in real time
Grafana in space: Monitoring Japan's SLIM moon lander in real time
 
Biopesticide (2).pptx .This slides helps to know the different types of biop...
Biopesticide (2).pptx  .This slides helps to know the different types of biop...Biopesticide (2).pptx  .This slides helps to know the different types of biop...
Biopesticide (2).pptx .This slides helps to know the different types of biop...
 
Presentation Vikram Lander by Vedansh Gupta.pptx
Presentation Vikram Lander by Vedansh Gupta.pptxPresentation Vikram Lander by Vedansh Gupta.pptx
Presentation Vikram Lander by Vedansh Gupta.pptx
 
Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |
Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |
Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |
 
A relative description on Sonoporation.pdf
A relative description on Sonoporation.pdfA relative description on Sonoporation.pdf
A relative description on Sonoporation.pdf
 

PRShare: a framework for privacy-preserving, interorganizational data sharing.

  • 1. PRShare: A Framework For Privacy-Preserving, Interorganizational Data Sharing Lihi Idan Yale University (Joint work with Joan Feigenbaum)
  • 2. Interorganizational data sharing Owner organization (“data owner”), client organization (“data client”). Data record: data+metadata attributes. Stored on a Cloud server (CSP). Attribute=<label,value> Each record is linked to a certain individual, the data subject. Data users employees of a data client, may need access to owner’s data records in order to to perform their assigned tasks. Intermediary organizations enrich shared data with additional information that is needed for the client’s tasks
  • 3. Interorganizational data sharing – cont. Employees are assigned a list of time-limited tasks. This list is dynamic. An employee is only allowed to access shared data records that are needed in order to execute a task in her tasks list. “Needed in order to perform a task”?** Each organization uses its own set of intraorganizational attributes to query and process the shared data. This set is called VOCABULARY. We assume that the intersection between different vocabularies is not empty.
  • 4. Privacy preserving Interorganizational data sharing Privacy of data subjects: sharing of data must be kept to the minimum required in order to perform a task. Privacy of each organization: maintaining a proprietary view of the shared data. • Preventing unauthorized employees from accessing the shared data. • Protecting the confidentiality of each organization’s proprietary metadata attributes Each organization does not want to expose its internal structure and role hierarchy to other organizations.
  • 5. Attribute-based encryption (Key-Policy ABE ) Each ciphertext is encrypted by an encryptor under a set of attributes. Users’ private keys reflect decryption policies (access policies). Keys are issued offline by a trusted authority.
  • 6. Interorganizational data sharing using ABE Each data record includes a payload h (data) and a set of attributes S. Each payload h is encrypted by the owner under its corresponding S and the resulting data record is stored on the CSP. A user is issued an attribute-based secret key. Keys are issued by a group of trusted authorities. The user can then send data requests to the CSP.
  • 7. Pros Flexibility ciphertext not necessarily encrypted to one particular user Expressive, fine-grained access policies Eliminates the need to rely on the CSP for preventing unauthorized data access
  • 8. Using existing ABE schemes Underlying assumption: the attributes in the key and in the ciphertext must belong to the same vocabulary. Real-world interorganizational setting: organizations often belong to different professional domains. Challenge: attributes in the ciphertext used by the encryptor (owner) and attributes in keys used by users (client employees) may belong to different vocabularies .
  • 9. Using existing ABE schemes-cont. Underlying assumption: attributes’ values can always be updated by the owner, at any time. Real-world interorganizational setting: some attributes’ true values can only be determined when a user sends a data request. This update may require client’s or intermediary’s proprietary auxiliary information that can not be shared with the owner. Challenge: in many cases, the encryptor (owner) can not update ciphertexts’ attributes on its own.
  • 12. Payload: Credit report Attributes: CREDIT-UTILIZATION-RATIO=0.35, CREDIT-SCORE=650, DLN=xyz , DATE=11/9/2020 Auxiliary information AVERAGE_CREDIT_UTILIZATION_RATIO =0.4 CREDIT_SCORE>600 ∧ #ACCIDENTS<2 ∧ IS-CREDIT-RATIO-LESS-THAN-AVERAGE=TRUE Auxiliary information Driving records DLN -> #ACCIDENTS DLN(xyz)=0
  • 13. Payload: Credit report Attributes: CREDIT-UTILIZATION-RATIO=0.35, CREDIT-SCORE=650, DLN=xyz , DATE=11/9/2020 Auxiliary information AVERAGE_CREDIT_UTILIZATION_RATIO = 0.4 0.3 CREDIT_SCORE>600 ∧ #ACCIDENTS<2 ∧ IS-CREDIT-RATIO-LESS-THAN-AVERAGE=TRUE Auxiliary information Driving records (MVR) DLN -> #ACCIDENTS DLN(xyz)=0 1 A week later...
  • 14. Goals Design an interorganizational data-sharing framework with the following features: Privacy preserving with respect to payloads, attributes and auxiliary information. Multi-vocabulary: Each organization can use its own set of attributes to describe both the shared data and access policies to the shared data. Dynamically reconfigurable attributes: Ciphertext’s attributes are updated dynamically according to up-to-date auxiliary information. Such updates do not require re-encryption of the ciphertext. Offline delegation: The owner does not to need to authorize or serve clients’ data-access queries. Key-abuse prevention, direct revocation
  • 15. Attribute based encryption with oblivious attribute translation
  • 16. Solution: attribute translation Let uowner be the owner’s attribute universe (owner’s vocabulary) and uclient be the client’s attribute universe (client’s vocabulary) A translation algorithm Translate() takes as input a ciphertext ct , ct=[h]S s.t. S ⊆ uowner and outputs a new ciphertext, ct’=[h]S’ s.t. S’ ⊆ uclient . Payload: h Payload: h Att1 Att2 Att3 Att1’ Att2’ Att3 Translate() CT CT’ S S’
  • 17. Requirements from Translate() Translate() can be computed dynamically based on up to date auxiliary information held by the client or an intermediary. Payload privacy: Translate() can be computed such that only authorized users can learn h. Attribute privacy: Translate() can be computed such that attributes in S are not revealed to the client and attributes in S’ are not revealed to the owner Is this really necessary? Attribute privacy: Translate() can be computed such that sensitive attributes in S are not reveled to the client and sensitive attributes in S’ are not revealed to the owner (formal definition in the paper) Each organization can choose which attributes are considered sensitive to it.
  • 18. Pros: Each organization can use its own vocabulary, and yet the attributes in the ciphertext and key will match Each organization’s sensitive attributes as well as auxiliary information are not exposed to other organizations. How is att1’ computed? -Numerical comparison (att1>auxiliary) -Equality check between att1 and(att1=auxiliary) -List membership test(att1 ∈ auxiliary) -Keyword search of att1 in auxiliary -Using pre-configured look up tables And more…
  • 19. Who performs attribute translation? Data owner? Goals: Division of trust: translation can not be done by a single entity. Delegation: saving resources by delegating translation operations.
  • 20. Mediated cryptography Designed by Boneh, Ding and Tsudik (2001) as a method to allow immediate revocation. Particularly useful in government or corporate environments. Use an on-line mediator for every transaction, SEM (SEcurity Mediator).
  • 21. Semi-trusted Mediator • Delegate translation • Semi trusted server (proxy) will perform the translation. • Conceptually, one proxy for each intermediary, and one for the client. • Each proxy may translate a pre-defined subset of attributes . Different proxies’ subsets may overlap. • Each proxy prj uses both a generic translation algorithm and an organization-specific translation function and auxiliary information
  • 22. Oblivious Attribute Translation If needed, auxiliary information may also remain hidden from the proxy Att1=<a,b> Att2=<c,d> Att3=<e,f> Att1=<a,b> Att2=<c,d> Att3=<x,y> M M Q_j={Att3} S S’ Translate(ct,j) CT’ CT
  • 23. Payload: email message Auxiliary information: watchlist abc@gmail.com Payload: email message Attributes: SENDER=abc@gmail.com, DATE=11/9/2020, SUBJECT_LINE=important, IS_FILE_ATTACHED=yes abc@gmail.com ∈ watchlist? ON_WATCHLIST=TRUE Attributes: SENDER=abc@gmail.com, DATE=11/9/2020, SUBJECT_LINE=important, IS_FILE_ATTACHED=yes ON_WATCHLIST=TRUE DATE=1092020 ∨
  • 24. Payload: Credit report Attributes: CREDIT-UTILIZATION-RATIO=0.35, CREDIT-SCORE=650, DLN=xyz , DATE=11/9/2020 Auxiliary information AVERAGE_CREDIT_UTILIZATION_RATIO =0.4 CREDIT_SCORE>600 ∧ #ACCIDENTS<2 ∧ IS-CREDIT-RATIO-LESS-THAN-AVERAGE=TRUE Auxiliary information Driving records (DRs) DLN -> #ACCIDENTS DLN(xyz)=0 DR[xyz]=? 0.35<AVERAGE_CREDIT_UTILIZATION_RATIO? Attributes: CREDIT-UTILIZATION-RATIO=0.35, CREDIT-SCORE=650, DLN=xyz , DATE=11/9/2020 Attributes: CREDIT-UTILIZATION-RATIO=0.35, CREDIT-SCORE=650, #ACCIDENTS=0, DATE=11/9/2020 Payload: Credit report Payload: Credit report #ACCIDENTS=0 IS-CREDIT-RATIO-LESS-THAN-AVERAGE=TRUE
  • 25. What else can we do with translation? • Key abuse An authorized user is able to share his secret key with unauthorized users and abuse his access privilege. • Revocation Efficient revocation. Direct revocation mechanism: revoking the keys of a set U of users does not affect the keys of users not in U.
  • 26. Our techniques • Use secret sharing to break the binder term into |translators|+1 shares. Each partial ciphertext contains only one share of the binder term. • For each mutable attribute, the ciphertext does not contain the actual attribute. Instead, the ciphertext contains the output of a given transformation that is applied to the attribute. • A second uniformly randomly chosen term, lk , is used to double blind each partial ciphertext, using dk = fk ∗ lk as a blinding factor.
  • 27. Conclusion We have designed PRShare, an interorganizational data-sharing framework Privacy preserving Multi-vocabulary Dynamically reconfigurable attributes Offline delegation Key-abuse prevention, direct revocation We have introduced the novel concept of Attribute-Based Encryption With Oblivious Attribute Translation More details in ?: System flows Security Construction Benchmarks

Editor's Notes

  1. So what is attribute translation?
  2. .