Timed-Release of Self-Emerging Data Using Distributed Hash Tables

Releasing private data to the future is a challenging problem. Making private data accessible at a future point in time requires mechanisms to keep data secure and undiscovered so that protected data is not available prior to the legitimate release time and the data appears automatically at the expected release time. In this paper, we develop new mechanisms to support self-emerging data storage that securely hide keys of encrypted data in a Distributed Hash Table (DHT) network that makes the encryption keys automatically appear at the predetermined release time so that the protected encrypted private data can be decrypted at the release time. We show that a straight-forward approach of privately storing keys in a DHT is prone to a number of attacks that could either make the hidden data appear before the prescribed release time (release-ahead attack) or destroy the hidden data altogether (drop attack). We develop a suite of self-emerging key routing mechanisms for securely storing and routing encryption keys in the DHT. We show that the proposed scheme is resilient to both release-ahead attack and drop attack as well as to attacks that arise due to traditional churn issues in DHT networks. Our experimental evaluation demonstrates the performance of the proposed schemes in terms of attack resilience and churn resilience.

[1]  Peng Ning,et al.  Self-sustaining, efficient and forward-secure cryptographic constructions for Unattended Wireless Sensor Networks , 2012, Ad Hoc Networks.

[2]  Jörg Schwenk,et al.  Modelling Time for Authenticated Key Exchange Protocols , 2014, ESORICS.

[3]  Atsushi Fujioka,et al.  Strong Security Notions for Timed-Release Public-Key Encryption Revisited , 2011, ICISC.

[4]  Daniel Stutzbach,et al.  Understanding churn in peer-to-peer networks , 2006, IMC '06.

[5]  David R. Karger,et al.  Chord: A scalable peer-to-peer lookup service for internet applications , 2001, SIGCOMM '01.

[6]  David Moore,et al.  Replication Strategies for Highly Available Peer-to-Peer Storage , 2002, Future Directions in Distributed Computing.

[7]  Sunoo Park On Time and Order in Multiparty Computation , 2015 .

[8]  Brent Waters,et al.  Defeating Vanish with Low-Cost Sybil Attacks Against Large DHTs , 2010, NDSS.

[9]  George J. Pappas,et al.  Gradually Releasing Private Data under Differential Privacy , 2015 .

[10]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[11]  Dan Feng,et al.  SafeVanish: An Improved Data Self-Destruction for Protecting Data Privacy , 2010, 2010 IEEE Second International Conference on Cloud Computing Technology and Science.

[12]  Hideki Imai,et al.  Time-Specific Encryption from Forward-Secure Encryption , 2012, SCN.

[13]  Markus Dürmuth,et al.  Timed revocation of user data: long expiration times from existing infrastructure , 2012, WPES '12.

[14]  Tibor Jager,et al.  How to build time-lock encryption , 2018, Designs, Codes and Cryptography.

[15]  Ian F. Blake,et al.  Scalable, Server-Passive, User-Anonymous Timed Release Public Key Encryption from Bilinear Pairing , 2004, IACR Cryptol. ePrint Arch..

[16]  Markus Jakobsson,et al.  Timed Release of Standard Digital Signatures , 2002, Financial Cryptography.

[17]  Apostolis Zarras,et al.  Neuralyzer: Flexible Expiration Times for the Revocation of Online Data , 2016, CODASPY.

[18]  Jung Hee Cheon,et al.  Provably Secure Timed-Release Public Key Encryption , 2008, TSEC.

[19]  Amit A. Levy,et al.  Vanish: Increasing Data Privacy with Self-Destructing Data , 2009, USENIX Security Symposium.

[20]  Ronald L. Rivest,et al.  Time-lock Puzzles and Timed-release Crypto , 1996 .

[21]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[22]  Paul F. Syverson,et al.  Anonymous connections and onion routing , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).

[23]  Marco Casassa Mont,et al.  The HP time vault service: exploiting IBE for timed release of confidential information , 2003, WWW '03.