Browse

Secure and Efficient Access to Outsourced Data

Principal Investigator(s): Bharat Bhargava

Providing secure and efficient access to large scale outsourced data is an important component of cloud computing. In this paper we propose a mechanism to solve this problem in owner-write-users-read applications. We propose to encrypt every data block with a different key so that flexible cryptography-based access control can be achieved. Through the adoption of key derivation method, the owner needs to maintain only a few secrets. Analysis shows that the key derivation procedure using hash functions will introduce very limited computation overhead. We propose to use over-encryption and/or lazy revocation to prevent revoked users from getting access to updated data blocks. We design mechanisms to handle both updates to outsourced data and changes in user access rights. We investigate the computation overhead and safety of the proposed approach, and study mechanisms to improve data access efficiency.

Secure Collaborative Services for Wireless Mesh Networks

Principal Investigator(s): Cristina Nita-Rotaru

Group-oriented services are envisioned to be an important class of application in the environment of wireless mesh networks. This project focuses on developing scalable, robust, and secure group communication protocols for wireless mesh networks. In particular, we will: · Build a wireless mesh test-bed for experiments and protocol validation · Develop distributed protocols for efficient group communication (multicast, broadcast) in wireless mesh networks · Investigate and develop efficient and robust group key management protocol in wireless mesh networks · Study the viability and limitations of cross-layer design as a new paradigm of building secure network services

Secure Group Communication Over wired/wireless networks

Principal Investigator(s): Xukai Zou

Secure group communications (SGC) refers to a setting in which a group of participants can send and receive messages (sent to the group members), in a way that outsiders are unable to glean information even if they are able to intercept the messages. SGC is important because several prevalent applications require it. These applications include teleconferencing, tele-medicine, real-time information services, distributed interactive simulations, collaborative work, interactive games and the deployment of VPN (Virtual Private Networks). The goals for this project are four-fold: 1. study various issues enabling SGC which include, but are not limited to, group key management, burst behavior and efficient burst operations, membership management, group member admission control, authentication and non-repudiation; 2. study and provide solutions for specific SGC scenarios such as dynamic conferencing and SGC with hierarchical access control; 3. investigate research challenges for SGC over wireless/mobile environments; 4. integrate research results into the curriculum and perform public dissemination of findings and software.

Secure Networking Using Network Coding

Principal Investigator(s): Cristina Nita-Rotaru

This project determines the fundamental limits of network secrecy from a network coding perspective, and then applies this theory to improve security guarantees in peer-to-peer and wireless networks. As network coding gains prominence as an important strategy for both wired and wireless networks, the project identifies both the advantages and vulnerabilities from using network coding.

Subsequently, the effort develops a design methodology that exploits the advantages while carefully compensating for the vulnerabilities. This project analyzes networks under both outsider and insider attacks. Specifically, coding mechanisms are developed to combat an external eavesdropper. Also, a combination of cryptographic and information-theoretic tools are used to combat internal modification attacks on the network. The results are then used in two case studies: eavesdropper attacks on wireless mesh networks and pollution attacks on P2P content distribution systems.

Secure Semantic Information Grid for NCES and Border Security Applications

Principal Investigator(s): Elisa Bertino; Lorenzo Martino

Secure Supply-Chain Protocols

Principal Investigator(s): Mikhail Atallah; Leroy Schwarz; Vinayak Deshpande

One of the major sources of inefficiency in supply-chain management is information asymmetry; i.e., information that is available to one or more organizations in the chain (e.g., manufacturer, retailer) is not available to others. Information asymmetry is known to create inefficiencies in managing supply chains, among them under-investment in capacity, leading to shortages, misallocation of inventory and transportation, increased prices, and reduced customer service. It can also lead to increased use of premium shipping, increased penalties resulting from line shutdowns, and lost future business contracts. There are several causes of information asymmetry, among them fear that a powerful buyer or supplier will take advantage of private information, that information will leak to a competitor, etc.

The Secure Supply-Chain Collaboration (SSCC) protocols we propose will enable supply-chain partners to cooperatively achieve desired system-wide goals without revealing any private information, even though the jointly-computed decisions depend on the private information of all the parties..

This project will create new research tools in supply-chain management and foster the development of new techniques in computer science. SSCC also has the potential to profoundly impact supply-chain management practice; and, thereby, improve productivity and stimulate economic growth.

Secure Video Stream Framework for Dynamic and Anonymous Subscriber Groups

Principal Investigator(s): Xukai Zou

Secure video content distribution is a key aspect in the deployment of Telepresence Services and Video on Demand, two critical applications for the ecosystem targeted by Cisco products. Efficient mechanisms and systems need to be developed to guarantee confidentiality and controlled access to a broad range of broadcast video streams. At the same time, an effective framework for secure video content distribution should also guarantee subscribers’ privileges to access video streams matching their respective subscription and on-demand requirements.

In this project, we will build, by employing an innovative approach called Access Control Polynomial (ACP), a Secure Video Stream Framework for dynamic and anonymous subscriber groups. The framework will effectively address the underlying challenges of secure video stream broadcasting and guaranteed access, anonymity, dynamicity, granularity, and scalability.

Secure, Composable, & Scalable Framework for Trusted Collaborative Computing

Principal Investigator(s): Xukai Zou

Collaborative Computing (CC) is a critical application domain within the Internet environment. A few examples of CC are multi-party computation, collaborative defense, tele-medicine and collaborative decision making. Participants in CC demand confidentiality, privacy, integrity, and controlled sharing of sensitive information. Also, CC environments involve many entities, which are dynamic, heterogeneous, distributed, and can be hostile. Currently, CC uses the Internet as the underlying infrastructure, which by design is not secure and suffers from incessant attacks ranging from eavesdropping to vulnerability exploitation. Hence, it is imperative for the success of CC to require a reliable and secure framework built on top of the Internet to remedy some of its limitations. CC, based on such an underlying framework, can be termed as Trusted Collaborative Computing (TCC). Thus, the long term objective of this research is to develop a framework that will enable TCC. This framework consists of: (1) (group-oriented) secure and anonymous communication, (2) finely-controlled data sharing and (3) secure, composable and scalable integration. The framework will effectively address the underlying challenges of secure communication and guaranteed access, anonymity, composability, interoperability, and scalability.

The core technique in the proposed TCC framework is Access Control Polynomial (ACP) which was just presented at and published in the proceedings of INFOCOM’08, one of the highest international conferences in the networking and security field. The short term yet intensive summer work is to implement and evaluate such an innovative ACP mechanism and related security modules. This work will significantly help the accomplishment of the long term objective and secure the application for external funding.

Security Issues for Indiana GIS Data

Principal Investigator(s): Eugene Spafford

The State of Indiana is the repository for (and collector of) a significant amount of spatial data. There is a growing need for well-articulated government policy about the public release of such data as a method for communicating government data and information. Much of the related discussion to-date has focused on the data at the individual layer level and whether the data should be sold or not. Additional discussion should be focused on the protection of personal identifiers contained in such data and the potential for exposing both Indiana citizens and corporations to privacy violations. Purdue proposes a study of the services provided by the use of spatial data and, in particular, of the security implications when multiple data layers are joined as a method for advanced communication of geospatial data. This study will lead to policy recommendations for the State of Indiana that will promote the appropriate balance between public information benefits and personal privacy risks. It will also advance the state of the art and practice of information security in general.

Security of Large Scale Systems

Principal Investigator(s): Ed Coyle