nc-audit: auditing for network coding storage

22
NC-Audit: Auditing for Network Coding Storage Anh Le and Athina Markopoulou University of California, Irvine

Upload: mare

Post on 24-Feb-2016

114 views

Category:

Documents


1 download

DESCRIPTION

NC-Audit: Auditing for Network Coding Storage. Anh Le and Athina Markopoulou University of California, Irvine. Outline. Background Related Work Key Techniques NC-Audit Evaluation Conclusion. NC-Based Distributed Storage. Key ideas: - Sub- packetization - Mixing when repair. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: NC-Audit: Auditing for  Network Coding Storage

NC-Audit: Auditing for Network Coding Storage

Anh Le and Athina MarkopoulouUniversity of California, Irvine

Page 2: NC-Audit: Auditing for  Network Coding Storage

NC-Audit: Auditing for NC Storage 2

Outline

1. Background

2. Related Work

3. Key Techniques

4. NC-Audit

5. Evaluation

6. Conclusion

Le and Markopoulou (UC Irvine)

Page 3: NC-Audit: Auditing for  Network Coding Storage

NC-Audit: Auditing for NC Storage 3

• Key ideas:- Sub-packetization- Mixing when repair

NC-Based Distributed Storage

Le and Markopoulou (UC Irvine)

[Dimakis, 2011]

Page 4: NC-Audit: Auditing for  Network Coding Storage

NC-Audit: Auditing for NC Storage 4

The Auditing Problem

Data

AuditAudit

Security Message

Le and Markopoulou (UC Irvine)

Page 5: NC-Audit: Auditing for  Network Coding Storage

NC-Audit: Auditing for NC Storage 5

• Storage node hides data corruption

Threat Model

• TPA acquires data from the auditing

Le and Markopoulou (UC Irvine)

Page 6: NC-Audit: Auditing for  Network Coding Storage

NC-Audit: Auditing for NC Storage 6

Desired Properties of NC-Audit

• Data correctness guarantee

• Privacy-preserving auditing

• Support for repair and data dynamics

• Low overhead

Le and Markopoulou (UC Irvine)

Page 7: NC-Audit: Auditing for  Network Coding Storage

NC-Audit: Auditing for NC Storage 7

Related Work

Integrity Checking for Remote Data

• Proof of Retrievability[Juels ’07], [Shacham ’08]

• Proof of Data Posession[Ateniese ’07]

• Support for Data Dynamics[Ateniese ’08], [Erway ’09][Wang ’09]

• Privacy Preserving Auditing[Shah ’06], [Wang ’10]

Le and Markopoulou (UC Irvine)

For NC Storage

• Error Detection[Dikaliotis ’10]

• Proof of Retrievability[Chen ’10]

Page 8: NC-Audit: Auditing for  Network Coding Storage

NC-Audit: Auditing for NC Storage 8

Outline

1. Background

2. Related Work

3. Key Techniques

4. NC-Audit

5. Evaluation

6. Conclusion

Le and Markopoulou (UC Irvine)

Page 9: NC-Audit: Auditing for  Network Coding Storage

9

ei ti

The Naïve Scheme

t1e1

tMeM

… tkek

k

tkek

Le and Markopoulou (UC Irvine) NC-Audit: Auditing for NC Storage

HMAC HMAC

• Inefficient

• Does not support repair

• Violate privacy

Page 10: NC-Audit: Auditing for  Network Coding Storage

c t

• SpaceMac- Homomorphic MAC

• NCrypt- CPA-secure encryption

tkekc t tΣαiei

10

ei ti

Key Techniques of NC-Audit

t1e1

tMeM

…k1, .., kn

tkek

Le and Markopoulou (UC Irvine) NC-Audit: Auditing for NC Storage

HMAC HMACSpaceMac SpaceMac

k

Σαiei cNCrypt

tΣαiei

Page 11: NC-Audit: Auditing for  Network Coding Storage

NC-Audit: Auditing for NC Storage 11

SpaceMac [Le, NetCod 10]

Homomorphic Message Authentication Codes

Le and Markopoulou (UC Irvine)

Page 12: NC-Audit: Auditing for  Network Coding Storage

NC-Audit: Auditing for NC Storage 12

NCryptRandom Linear CPA-Secure Encryption

Le and Markopoulou (UC Irvine)

Page 13: NC-Audit: Auditing for  Network Coding Storage

NC-Audit: Auditing for NC Storage 13

Outline

1. Background

2. Related Work

3. Key Techniques

4. NC-Audit

5. Evaluation

6. Conclusion

Le and Markopoulou (UC Irvine)

Page 14: NC-Audit: Auditing for  Network Coding Storage

1. Homomorphic MAC: SpaceMac

2. Random Linear Encryption: NCrypt

e t

14

c t

e

e t

c c t

e t

NC-Audit: Auditing for NC StorageLe and Markopoulou (UC Irvine)

NC-Audit = SpaceMac + NCrypt

Page 15: NC-Audit: Auditing for  Network Coding Storage

NC-Audit: Auditing for NC Storage 15Le and Markopoulou

Repairing with Regular Schemet1e1

t3e3

t4e4

t2e2

t5e5

t6e6

Node 1

Node 2

Node 3

t7e7

t8e8

Node 4 Node 4

α5e5 + α6e6

α3e3 + α4e4

α1e1 + α2e2

t'7e’7

t'8e'8

t'7e’7

t'8e'8

High cost

Page 16: NC-Audit: Auditing for  Network Coding Storage

NC-Audit: Auditing for NC Storage 16Le and Markopoulou

Repairing with NC-Auditt1e1

t3e3

t4e4

t2e2

t5e5

t6e6

Node 1

Node 2

Node 3

t7e7

t8e8

Node 4 Node 4

α5 t5 + α6 t6α5e5 + α6e6

α3 t3 + α4 t4α3e3 + α4e4

α1 t1 + α2 t2α1e1 + α2e2

t'7e’7

t'8e'8

Page 17: NC-Audit: Auditing for  Network Coding Storage

17NC-Audit: Auditing for NC StorageLe and Markopoulou (UC Irvine)

Security Guarantees of NC-Audit

Data Posession

Privacy

Page 18: NC-Audit: Auditing for  Network Coding Storage

NC-Audit: Auditing for NC Storage 18

Outline

1. Background

2. Related Work

3. Key Techniques

4. NC-Audit

5. Evaluation

6. Conclusion

Le and Markopoulou (UC Irvine)

Page 19: NC-Audit: Auditing for  Network Coding Storage

NC-Audit: Auditing for NC Storage 19

Performance Evaluation

Le and Markopoulou (UC Irvine)

Implementation:• Java:

- javax.crypto

• 80-bit security:

- q = 28, l = 10- 4 KB block

Comparisons:

• [Wang et al., ESORICS ’09]

• [Wang et al., INFOCOM ’10]

• [Chen et al., CCSW ’10]

Page 20: NC-Audit: Auditing for  Network Coding Storage

NC-Audit: Auditing for NC Storage 20

Performance Evaluation

Le and Markopoulou (UC Irvine)

Page 21: NC-Audit: Auditing for  Network Coding Storage

NC-Audit: Auditing for NC Storage 21

Conclusion

Le and Markopoulou (UC Irvine)

NC-Audit: Auditing scheme for NC storage

• Data correctness guarantee- SpaceMac

• Privacy-preserving auditing- NCrypt

• Support for repair and data dynamics

• Low overhead

Page 22: NC-Audit: Auditing for  Network Coding Storage

This work is supported by NSF and AFOSR

http://www.ics.uci.edu/~anhml/software.html