PICADOR: End-to-end encrypted Publish-Subscribe information distribution with proxy re-encryption

Abstract This article presents PICADOR, a system for end-to-end encrypted Publish–Subscribe information distribution with proxy re-encryption. PICADOR is designed for topic-based Pub/Sub systems and provides end-to-end payload confidentiality. The main novelty of PICADOR is that it provides an information distribution service with end-to-end encryption where publishers and subscribers do not need to establish shared encryption and decryption keys. Multiple publishers post encrypted information to a Pub/Sub broker which uses Proxy Re-Encryption (PRE) to convert this information into a representation that can only be decrypted by approved subscribers. The broker is unable to decrypt the information. To support PICADOR, we design and implement a novel PRE scheme that leverages a general lattice encryption software library. We prototype our system using a scalable Java-based information substrate that supports topic-based Pub/Sub operations. We experimentally evaluate performance and scalability tradeoffs in the context of enterprise and mobile applications. We discuss design tradeoffs and application-specific customizations.

[1]  Miguel Castro,et al.  SCRIBE: The Design of a Large-Scale Event Notification Infrastructure , 2001, Networked Group Communication.

[2]  J. Cheon,et al.  An algorithm for NTRU problems and cryptanalysis of the GGH multilinear map without a low-level encoding of zero , 2016, LMS J. Comput. Math..

[3]  Craig Gentry,et al.  Homomorphic Evaluation of the AES Circuit , 2012, IACR Cryptol. ePrint Arch..

[4]  Enuma Orakwue Private Clouds: Secure Managed Services , 2010, Inf. Secur. J. A Glob. Perspect..

[5]  Javier López,et al.  NTRUReEncrypt: An Efficient Proxy Re-Encryption Scheme Based on NTRU , 2015, AsiaCCS.

[6]  Steve Warren,et al.  An open test bed for medical device integration and coordination , 2009, 2009 31st International Conference on Software Engineering - Companion Volume.

[7]  Bruno Crispo,et al.  Providing confidentiality in content-based publish/subscribe systems , 2010, 2010 International Conference on Security and Cryptography (SECRYPT).

[8]  Joud Khoury,et al.  P3S: A Privacy Preserving Publish-Subscribe Middleware , 2012, Middleware.

[9]  Michael Naehrig,et al.  A Comparison of the Homomorphic Encryption Schemes FV and YASHE , 2014, AFRICACRYPT.

[10]  Elena Kirshanova,et al.  Proxy Re-encryption from Lattices , 2014, Public Key Cryptography.

[11]  Aniruddha S. Gokhale,et al.  A QoS policy configuration modeling language for publish/subscribe middleware platforms , 2007, DEBS '07.

[12]  Elisa Bertino,et al.  Efficient privacy preserving content based publish subscribe systems , 2012, SACMAT '12.

[13]  Oded Regev,et al.  Lattice-Based Cryptography , 2006, CRYPTO.

[14]  Steve Warren,et al.  A publish-subscribe architecture and component-based programming model for medical device interoperability , 2009, SIGBED.

[15]  Mark Linderman,et al.  Jini-based publish and subscribe capability , 2002, SPIE ITCom.

[16]  Brent Waters,et al.  Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.

[17]  Vinod Vaikuntanathan,et al.  On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption , 2012, STOC '12.

[18]  M. Girish Chandra,et al.  Security and Privacy for Real Time Video Streaming Using Hierarchical Inner Product Encryption Based Publish-Subscribe Architecture , 2016, 2016 30th International Conference on Advanced Information Networking and Applications Workshops (WAINA).

[19]  David M. Eyers,et al.  Role-based access control for publish/subscribe middleware architectures , 2003, DEBS '03.

[20]  Geoffrey C. Fox,et al.  A Framework for Secure End-to-End Delivery of Messages in Publish/Subscribe Systems , 2006, 2006 7th IEEE/ACM International Conference on Grid Computing.

[21]  Pascal Felber,et al.  Thrifty privacy: efficient support for privacy-preserving publish/subscribe , 2012, DEBS.

[22]  Vinod Vaikuntanathan,et al.  Fast Proxy Re-Encryption for Publish/Subscribe Systems , 2017, IACR Cryptol. ePrint Arch..

[23]  Brent Waters,et al.  Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).

[24]  Anne-Marie Kermarrec,et al.  The many faces of publish/subscribe , 2003, CSUR.

[25]  Chris Peikert,et al.  A Toolkit for Ring-LWE Cryptography , 2013, IACR Cryptol. ePrint Arch..

[26]  Ron Steinfeld,et al.  Making NTRU as Secure as Worst-Case Problems over Ideal Lattices , 2011, EUROCRYPT.

[27]  Yi Mu,et al.  Towards a Cryptographic Treatment of Publish/Subscribe Systems , 2010, CANS.

[28]  Feng-Hao Liu,et al.  Various Proxy Re-Encryption Schemes from Lattices , 2016, IACR Cryptol. ePrint Arch..

[29]  Giannis F. Marias,et al.  Towards Understanding Pure Publish/Subscribe Cryptographic Protocols , 2008, Security Protocols Workshop.

[30]  Xavier Boyen,et al.  Key-Private Proxy Re-encryption under LWE , 2013, INDOCRYPT.

[31]  Matt Blaze,et al.  Divertible Protocols and Atomic Proxy Cryptography , 1998, EUROCRYPT.

[32]  Ran Canetti,et al.  Chosen-ciphertext secure proxy re-encryption , 2007, CCS '07.

[33]  Pascal Felber,et al.  Efficient Key Updates through Subscription Re-encryption for Privacy-Preserving Publish/Subscribe , 2015, Middleware.

[34]  Werner Vogels,et al.  Dynamo: amazon's highly available key-value store , 2007, SOSP.

[35]  Chris Peikert,et al.  A Decade of Lattice Cryptography , 2016, Found. Trends Theor. Comput. Sci..

[36]  Yevgeniy Dodis,et al.  Proxy cryptography revisted , 2003 .

[37]  Matthew Green,et al.  Improved proxy re-encryption schemes with applications to secure distributed storage , 2006, TSEC.

[38]  Mudhakar Srivatsa,et al.  EventGuard: A System Architecture for Securing Publish-Subscribe Networks , 2011, TOCS.

[39]  Frederik Vercauteren,et al.  Somewhat Practical Fully Homomorphic Encryption , 2012, IACR Cryptol. ePrint Arch..

[40]  Himanshu Khurana,et al.  Scalable security and accounting services for content-based publish/subscribe systems , 2005, SAC '05.

[41]  Phong Q. Nguyen,et al.  BKZ 2.0: Better Lattice Security Estimates , 2011, ASIACRYPT.

[42]  P ? ? ? ? ? ? ? % ? ? ? ? , 1991 .

[43]  Douglas C. Schmidt,et al.  QoS enabled dissemination of managed information objects in a publish-subscribe-query information broker , 2009, Defense + Commercial Sensing.

[44]  Oded Regev Quantum Computation and Lattice Problems , 2004, SIAM J. Comput..

[45]  Zoltán Miklós Towards an access control mechanism for wide-area publish/subscribe systems , 2002, Proceedings 22nd International Conference on Distributed Computing Systems Workshops.