SlideShare a Scribd company logo
Crypto-Book:
An Architecture for Privacy
Preserving Online Identities
John Maheswaran, David Isaac Wolinsky, Bryan Ford

HotNets ’13 (11/22/2013)
Talk Overview
• The problem
– Cross-site Authentication
– Social network privacy concerns

• Solution
– Overview
– Key assignment
– Conscripting an anonymity set
– Anonymous login

• Conclusions and future work
Talk Overview
• The problem
– Cross-site Authentication
– Social network privacy concerns

• Solution
– Overview
– Key assignment
– Conscripting an anonymity set
– Anonymous login

• Conclusions and future work
Cross-site Authentication
Cross-site Authentication
Cross-site Authentication
Cross-site Authentication
Cross-site Authentication
Talk Overview
• The problem
– Cross-site Authentication
– Social network privacy concerns

• Solution
– Overview
– Key assignment
– Conscripting an anonymity set
– Anonymous login

• Conclusions and future work
Talk Overview
• The problem
– Cross-site Authentication
– Social network privacy concerns

• Solution
– Overview
– Key assignment
– Conscripting an anonymity set
– Anonymous login

• Conclusions and future work
Privacy and Security Concerns
Privacy and Security Concerns
Privacy and Security Concerns
Privacy and Security Concerns
Privacy and Security Concerns
Privacy and Security Concerns
Privacy and Security Concerns
Privacy and Security Concerns
Problem Summary
• Increasingly use of cross-site authentication
– OAuth, OpenID, Facebook/Twitter/Google+ login

• Use social network for online IDs
– Convenient, easy to use

• Using these IDs brings privacy/tracking risks
– Cross-site tracking, browsing history, actions across
different sites
Talk Overview
• The problem
– Cross-site Authentication
– Social network privacy concerns

• Solution
– Overview
– Key assignment
– Conscripting an anonymity set
– Anonymous login

• Conclusions and future work
Talk Overview
• The problem
– Cross-site Authentication
– Social network privacy concerns

• Solution
– Overview
– Key assignment
– Conscripting an anonymity set
– Anonymous login

• Conclusions and future work
Goals
• Crypto-Book aims to
– Allow users to use social network IDs
– Provide better privacy between social network
and third party sides
Crypto-Book

Personally identifiable
social networking ID
Crypto-Book

Personally identifiable
social networking ID
Crypto-Book Layer

Crypto-Book privacy preserving layer

Personally identifiable
social networking ID
Crypto-Book Layer

Crypto-Book privacy preserving layer

Personally identifiable
social networking ID
Crypto-Book Layer

Anonymized IDs – one pseudonym per site

Crypto-Book privacy preserving layer

Personally identifiable
social networking ID
Crypto-Book Layer

Crypto-Book privacy preserving layer
Crypto-Book Layer

Crypto-Book privacy preserving layer

Not linkable by
Facebook, Crypto-Book
or by third party sites
Talk Overview
• The problem
– Cross-site Authentication
– Social network privacy concerns

• Solution
– Overview
– Key assignment
– Conscripting an anonymity set
– Anonymous login

• Conclusions and future work
Talk Overview
• The problem
– Cross-site Authentication
– Social network privacy concerns

• Solution
– Overview
– Key assignment
– Conscripting an anonymity set
– Anonymous login

• Conclusions and future work
Key Assignment
• Cross-site authentication often relies on
OAuth/OpenID
• Crypto-Book fits into OAuth protocol to isolate
third party site from social network
– Protects cross-site privacy
– Assigns key pairs to social network IDs
OAuth
OAuth

Give me a limited
scope OAuth
access token
OAuth

Give me a limited
scope OAuth
access token

Issue me an OAuth
access token with
requested scope
OAuth

Give me a limited
scope OAuth
access token

Issue me an OAuth
access token with
requested scope
OAuth

Give me a limited
scope OAuth
access token

Issue me an OAuth
access token with
requested scope
Key Assignment
• To use privacy preserving cryptographic
techniques
– have to assign public/private keypairs to users

• Cloud of key servers with split trust
• Clients do not provide own key
– Allows us to conscript users into anonymity sets
without their knowledge/permission
OAuth

Give me a limited
scope OAuth
access token

Issue me an OAuth
access token with
requested scope
OAuth
Crypto-Book Workflow
Crypto-Book Workflow
Crypto-Book Workflow
Crypto-Book Workflow
Crypto-Book Workflow
Crypto-Book Workflow
Crypto-Book Workflow

abuse resistant anonymous
1-to-1 mapping
Anytrust key servers
• An anytrust cloud is:
– a decentralized client/server network model
– trust there is at least one honest server

• Anytrust cloud of key servers
– assigns key pairs to each social network user
– Run by various privacy advocates e.g. EFF
Anytrust key servers
Key Server

Key Server
Key Server
Anytrust key servers
Key Server

Key Server
Key Server
Anytrust key servers
Key Server

Key Server
Key Server
Anytrust key servers
Key Server

Key Server
Key Server
Talk Overview
• The problem
– Cross-site Authentication
– Social network privacy concerns

• Solution
– Overview
– Key assignment
– Conscripting an anonymity set
– Anonymous login

• Conclusions and future work
Talk Overview
• The problem
– Cross-site Authentication
– Social network privacy concerns

• Solution
– Overview
– Key assignment
– Conscripting an anonymity set
– Anonymous login

• Conclusions and future work
Anonymity set conscription
Anonymity set conscription
Anonymity set conscription
Anonymity set conscription
Anonymity set conscription
Anonymity set conscription
Talk Overview
• The problem
– Cross-site Authentication
– Social network privacy concerns

• Solution
– Overview
– Key assignment
– Conscripting an anonymity set
– Anonymous login

• Conclusions and future work
Talk Overview
• The problem
– Cross-site Authentication
– Social network privacy concerns

• Solution
– Overview
– Key assignment
– Conscripting an anonymity set
– Anonymous login

• Conclusions and future work
Balancing Anonymity with
Accountability
• Need to balance:
– Supporting free speech, free expression of
opinion
– Improving the quality of public discourse. By
allowing people to fully hide anonymously, they
may do things they would not otherwise
• e.g. Wikipedia sock-puppetry, vandalism
Balancing Anonymity with
Accountability
• Solution needs to provide both
– Anonymity
– Accountability

• Wikipedia would like to allow users to remain
anonymous, but are worried about vandalism
– Users need to be anonymous yet accountable
Digital Signature
Digital Signature
Digital Signature
Digital Signature
Linkable Ring Signature (LRS)
Linkable Ring Signature (LRS)
Linkable Ring Signature (LRS)
Linkable Ring Signature (LRS)
Linkable Ring Signature (LRS)
• Created by member of a group of users (each
have keys)
• Third party can verify:
– Some member of the group signed something
– If two signatures are by same member

• Third party cannot discover
– Which specific user created the signature
Privacy Preserving Crypto Layer
• LRS has linkage tag
– If a client generates two LRSs, they will have the
same linkage tag
– Means LRSs can be linked across time

• Linkage tag provides accountability
– 1-to-1 mapping between Facebook users and
anonymized identities
Crypto-Book Summary
Crypto-Book Summary

abuse resistant anonymous
1-to-1 mapping
Talk Overview
• The problem
– Cross-site Authentication
– Social network privacy concerns

• Solution
– Overview
– Key assignment
– Conscripting an anonymity set
– Anonymous login

• Conclusions and future work
Talk Overview
• The problem
– Cross-site Authentication
– Social network privacy concerns

• Solution
– Overview
– Key assignment
– Conscripting an anonymity set
– Anonymous login

• Conclusions and future work
Future Work
• Provide OAuth/OpenID API
– Integration with more third party sites

• Deploy Crypto-Book key servers at various
host institutions
• Abuse resistant way of using anonymous
systems such as Tor
• Investigation of anonymity set selection
Conclusion
• Crypto-Book provides privacy preserving
online identities
– anonymous
– abuse resistant

• www.crypto-book.com
– Demo video
– More info, SOSP’13 poster, more talk slides
– Link to source code on GitHub
Questions?
www.crypto-book.com

More Related Content

PDF
Crypto-Book SOSP WIP
PDF
Crypto-Book: Document leakage
PDF
Crypto-Book Hotnets
PDF
Crypto-Book slides
PPTX
Security threats in social networks
PPTX
The issues of security and privacy in social network
PPT
Information Gathering With Maltego
PDF
Real-time Tweet Analysis w/ Maltego Carbon 3.5.3
Crypto-Book SOSP WIP
Crypto-Book: Document leakage
Crypto-Book Hotnets
Crypto-Book slides
Security threats in social networks
The issues of security and privacy in social network
Information Gathering With Maltego
Real-time Tweet Analysis w/ Maltego Carbon 3.5.3

What's hot (20)

PDF
Online Social Networks: 5 threats and 5 ways to use them safely
PDF
DEF CON 27 - ZHANG XIANGQIAN AND LIU HULMING - your secret files are mine
ODP
Blognone - Feb 09
PPTX
Hacking Presentation
PPTX
Basics of Maltego
PPT
Social media and Security risks
PPTX
Understanding the basics of web design 2
PPTX
Maltego Radium Mapping Network Ties and Identities across the Internet
PPTX
Hacker tool talk: maltego
PPTX
common online terminologies
PPTX
PPTX
Tools for Open Source Intelligence (OSINT)
PPTX
Computer Ethics
KEY
Enterprise Open Source Intelligence Gathering
PDF
Internet Safety Glossary of Terms
PDF
Empowerment Technologies - Module 2
PPTX
National information security education & awareness program
PPTX
OSINT - Open Soure Intelligence - Webinar on CyberSecurity
PDF
OSINT x UCCU Workshop on Open Source Intelligence
PPTX
Password Cracking
Online Social Networks: 5 threats and 5 ways to use them safely
DEF CON 27 - ZHANG XIANGQIAN AND LIU HULMING - your secret files are mine
Blognone - Feb 09
Hacking Presentation
Basics of Maltego
Social media and Security risks
Understanding the basics of web design 2
Maltego Radium Mapping Network Ties and Identities across the Internet
Hacker tool talk: maltego
common online terminologies
Tools for Open Source Intelligence (OSINT)
Computer Ethics
Enterprise Open Source Intelligence Gathering
Internet Safety Glossary of Terms
Empowerment Technologies - Module 2
National information security education & awareness program
OSINT - Open Soure Intelligence - Webinar on CyberSecurity
OSINT x UCCU Workshop on Open Source Intelligence
Password Cracking
Ad

Similar to Hotnets Slides (20)

PPTX
RSA Europe: Future of Cloud Identity
PDF
My Identiverse: The Evolution of Digital Identity and Openness
PDF
Digital Identity: From Silos To Usercentric
PDF
Don't Ask, Don't Tell - The Virtues of Privacy By Design
PPT
Digital Identity
PDF
D01112030
PDF
OSN: Privacy Preserving Policies
PPT
Proposal Defence
PDF
Detecting and Resolving Privacy Conflicts in Online Social Networks
PPTX
The Role of Web3 in Digital Privacy Protecting User Data in Decentralized Sys...
PDF
Employment Feedback by Securing Data using Anonymous Authentication
PDF
Electronic Document & Electronic Signatures
PDF
Forging Self-Sovereign Identity in the Age of the Blockchain - Christopher Al...
PPTX
Authentication and Privacy in Cloud
DOCX
Outsourcing privacy preserving social networks to a cloud
PDF
Appleseed Project
PPTX
Participatory Sensing through Social Networks: The Tension between Participat...
PPT
Decentralized Social Networking
PPTX
Kerberos-PKI-Federated identity
PDF
Digital ID Protocol - Presentation 2015-12-04
RSA Europe: Future of Cloud Identity
My Identiverse: The Evolution of Digital Identity and Openness
Digital Identity: From Silos To Usercentric
Don't Ask, Don't Tell - The Virtues of Privacy By Design
Digital Identity
D01112030
OSN: Privacy Preserving Policies
Proposal Defence
Detecting and Resolving Privacy Conflicts in Online Social Networks
The Role of Web3 in Digital Privacy Protecting User Data in Decentralized Sys...
Employment Feedback by Securing Data using Anonymous Authentication
Electronic Document & Electronic Signatures
Forging Self-Sovereign Identity in the Age of the Blockchain - Christopher Al...
Authentication and Privacy in Cloud
Outsourcing privacy preserving social networks to a cloud
Appleseed Project
Participatory Sensing through Social Networks: The Tension between Participat...
Decentralized Social Networking
Kerberos-PKI-Federated identity
Digital ID Protocol - Presentation 2015-12-04
Ad

Recently uploaded (20)

PDF
NewMind AI Weekly Chronicles – August ’25 Week III
PDF
Getting started with AI Agents and Multi-Agent Systems
PPTX
TLE Review Electricity (Electricity).pptx
PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
PDF
A novel scalable deep ensemble learning framework for big data classification...
PDF
Architecture types and enterprise applications.pdf
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
Hindi spoken digit analysis for native and non-native speakers
PDF
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
PDF
Zenith AI: Advanced Artificial Intelligence
PPTX
observCloud-Native Containerability and monitoring.pptx
PPTX
1. Introduction to Computer Programming.pptx
PPT
What is a Computer? Input Devices /output devices
PDF
Web App vs Mobile App What Should You Build First.pdf
PPTX
OMC Textile Division Presentation 2021.pptx
PDF
1 - Historical Antecedents, Social Consideration.pdf
PDF
project resource management chapter-09.pdf
PPTX
Chapter 5: Probability Theory and Statistics
PPTX
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
NewMind AI Weekly Chronicles – August ’25 Week III
Getting started with AI Agents and Multi-Agent Systems
TLE Review Electricity (Electricity).pptx
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
A novel scalable deep ensemble learning framework for big data classification...
Architecture types and enterprise applications.pdf
NewMind AI Weekly Chronicles - August'25-Week II
gpt5_lecture_notes_comprehensive_20250812015547.pdf
Hindi spoken digit analysis for native and non-native speakers
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
Zenith AI: Advanced Artificial Intelligence
observCloud-Native Containerability and monitoring.pptx
1. Introduction to Computer Programming.pptx
What is a Computer? Input Devices /output devices
Web App vs Mobile App What Should You Build First.pdf
OMC Textile Division Presentation 2021.pptx
1 - Historical Antecedents, Social Consideration.pdf
project resource management chapter-09.pdf
Chapter 5: Probability Theory and Statistics
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...

Hotnets Slides