Middleware Support for Tunable Encryption

More and more effort is being spent on security improvements in today's computer environments, with the aim to achieve an appropriate level of security. However, for small computing devices it might be necessary to reduce the computational cost imposed by security in order to gain reasonable performance and/or energy consumption. To accomplish this selective encryption can be used, which provides confidentiality by only encrypting chosen parts of the information. Previous work on selective encryption has chiefly focused on how to reduce the computational cost while still making the information perceptually secure, but not on how computationally secure the selectively encrypted information is. Despite the efforts made and due to the harsh nature of computer security, good quantitative assessment methods for computer security are still lacking. Inventing new ways of measuring security are therefore needed in order to better understand, assess, and improve the security of computer environments. Two proposed probabilistic quantitative security measures are entropy and guesswork. Entropy gives the average number of guesses in an optimal binary search attack, and guesswork gives the average number of guesses in an optimal linear search attack. In information theory, a considerable amount of research has been carried out on entropy and on entropy-based metrics. However, the same does not hold for guesswork.In this thesis, we evaluate the performance improvement when using the proposed generic selective encryption scheme. We also examine the confidentiality strength of selectively encrypted information by using and adopting entropy and guesswork. Moreover, since guesswork has been less theoretical investigated compared to entropy, we extend guesswork in several ways and investigate some of its behaviors.

[1]  E. Bruce Lee,et al.  Ciphers and their products: group theory in private key cryptography , 1999 .

[2]  Frank Gadegast Securitymechanisms for Multimedia-Data with the Example MPEG-I-Video , 1998 .

[3]  Marc Van Droogenbroeck,et al.  Techniques for a selective encryption of uncompressed and compressed images , 2002 .

[4]  Douglas C. Sicker,et al.  Selective encryption for consumer applications , 2004, First IEEE Consumer Communications and Networking Conference, 2004. CCNC 2004..

[5]  Uwe Horn,et al.  Video Encryption Based on Data Partitioning and Scalable Coding - A Comparison , 1998, IDMS.

[6]  Ralf Steinmetz,et al.  Protecting VoD the easier way , 1998, MULTIMEDIA '98.

[7]  K. Schwan,et al.  Dynamic authentication for high-performance networked applications , 1998, 1998 Sixth International Workshop on Quality of Service (IWQoS'98) (Cat. No.98EX136).

[8]  Cynthia E. Irvine,et al.  IPsec Modulation for Quality of Security Service , 2002 .

[9]  Tracy Bradley Maples,et al.  Performance Study of a Selective Encryption Scheme for the Security of Networked, Real-Time Video , 1995, Proceedings of Fourth International Conference on Computer Communications and Networks - IC3N'95.

[10]  Juan Carlos De Martin,et al.  Perception-based selective encryption of G.729 speech , 2002, 2002 IEEE International Conference on Acoustics, Speech, and Signal Processing.

[11]  Yongcheng Li,et al.  Security enhanced MPEG player , 1996, Proceedings International Workshop on Multimedia Software Development.

[12]  Henric Johnson,et al.  Toward Adjustable Lightweight Authentication for Network Access Control , 2005 .

[13]  Randall R. Stewart,et al.  Stream Control Transmission Protocol , 2000, RFC.

[14]  Xiaobo Li,et al.  Partial encryption of compressed images and videos , 2000, IEEE Trans. Signal Process..

[15]  Stefan Lindskog,et al.  Using Guesswork as a Measure for Confidentiality of Selectively Encrypted Messages , 2006, Quality of Protection.

[16]  Henning Schulzrinne,et al.  RTP: A Transport Protocol for Real-Time Applications , 1996, RFC.

[17]  Lei Tang,et al.  Methods for encrypting and decrypting MPEG video data efficiently , 1997, MULTIMEDIA '96.

[18]  Erland Jonsson,et al.  Dynamic Data Protection Services for Network Transfers: Concepts and Taxonomy , 2004 .

[19]  Anantha Chandrakasan,et al.  Low power scalable encryption for wireless systems , 1998, Wirel. Networks.

[20]  Hesham H. Ali,et al.  Impact of Employing Different Security Levels on QoS Parameters in Virtual Private Networks , 2006, Parallel and Distributed Computing and Networks.

[21]  Bharat K. Bhargava,et al.  An efficient MPEG video encryption algorithm , 1998, Proceedings Seventeenth IEEE Symposium on Reliable Distributed Systems (Cat. No.98CB36281).

[22]  Charles P. Pfleeger,et al.  Security in computing , 1988 .

[23]  Andreas Uhl,et al.  SELECTIVE BITPLANE ENCRYPTION FOR SECURE TRANSMISSION OF IMAGE DATA IN MOBILE ENVIRONMENTS , 2002 .

[24]  A. Brunstrom,et al.  Design and implementation of a tunable encryption service for networked applications , 2005, Workshop of the 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks, 2005..

[25]  R. Stephenson A and V , 1962, The British journal of ophthalmology.