Automated Synthesis of Privacy-Preserving Distributed Applications

نویسندگان

  • Michael Backes
  • Matteo Maffei
  • Kim Pecina
چکیده

We introduce a framework for the automated synthesis of security-sensitive distributed applications. The central idea is to provide the programmer with a high-level declarative language for specifying the system and the intended security properties, abstracting away from any cryptographic details. A compiler takes as input such high-level specifications and automatically produces the corresponding cryptographic implementations (i.e., cryptographic library, cryptographic protocols, and F source code). In this work, we focus on two important, and seemingly contradictory, security properties, namely, authorization and privacy. On the one hand, the access to sensitive resources should be granted only to authorized users; on the other hand, these users would like to share as little personal information as possible with third parties. These opposing goals make it challenging to enforce privacy-aware authorization policies in a distributed setting. The high-level declarative language builds on Evidential DKAL, a logic for authorization polices of decentralized systems, which we extend to reason about privacy policies. Specifically, the traditional says modality from authorization logics is accompanied by existential quantification in order to express the secrecy of sensitive information. The cryptographic realization of privacy-aware authorization policies is obtained by a powerful combination of digital signatures and zero-knowledge proofs. This approach is general and can be seen as a privacy-enabling plugin for existing authorization languages and proof-carrying authorization architectures. We proved that the implementations output by the compiler enforce the intended authorization policies and we conducted an experimental evaluation to demonstrate the feasibility of our approach.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications

Smart grid concept is introduced to modify the power grid by utilizing new information and communication technology. Smart grid needs live power consumption monitoring to provide required services and for this issue, bi-directional communication is essential. Security and privacy are the most important requirements that should be provided in the communication. Because of the complex design of s...

متن کامل

Tools for Privacy Preserving Distributed Data Mining

Privacy preserving mining of distributed data has numerous applications. Each application poses different constraints: What is meant by privacy, what are the desired results, how is the data distributed, what are the constraints on collaboration and cooperative computing, etc. We suggest that the solution to this is a toolkit of components that can be combined for specific privacy-preserving da...

متن کامل

An Architecture for Privacy Preserving Collaborative Filtering for Web 2.0 Applications

Collaborative Filtering (CF) is a method to perform Automated Recommendations based upon the assumption that users who had similar interests in past, will have similar interests in future too. Popularity of e-commerce portals such as Amazon and Ebay and Web 2.0 applications such as YouTube and Flickr is resulting in private user data being stored in central servers. This has given rise to a num...

متن کامل

Privacy Preserving Frequency Mining in 2-Part Fully Distributed Setting

Recently, privacy preservation has become one of the key issues in data mining. In many data mining applications, computing frequencies of values or tuples of values in a data set is a fundamental operation repeatedly used. Within the context of privacy preserving data mining, several privacy preserving frequency mining solutions have been proposed. These solutions are crucial steps in many pri...

متن کامل

Multi-objective optimization based privacy preserving distributed data mining in Peer-to-Peer networks

This paper proposes a scalable, local privacy-preserving algorithm for distributed peer-to-peer (P2P) data aggregation useful for many advanced data mining/analysis tasks such as average/sum computation, decision tree induction, feature selection, and more. Unlike most multi-party privacy-preserving data mining algorithms, this approach works in an asynchronous manner through local interactions...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011