The Information-Theoretic Approach to Security/Privacy

The Information-Theoretic Approach to
Security/Privacy
Eirik Rosnes
Simula@UiB, N-5020 Bergen, Norway
Cyber Symposium
May 23, 2017
Information theory
Case study: Distributed storage systems (DSSs)
Outline
1. Information theory
2. Case study: Distributed storage systems (DSSs)
IT and Security
|
E. Rosnes
1 / 16
Information theory
Case study: Distributed storage systems (DSSs)
Introduction
• When we talk about security/privacy, people usually think about
cryptographic tools.
• An alternative approach is based on information theory which provides
unconditional secrecy.
• This talk is about the information-theoretic approach.
IT and Security
|
E. Rosnes
2 / 16
Information theory
Case study: Distributed storage systems (DSSs)
Introduction
• When we talk about security/privacy, people usually think about
cryptographic tools.
• An alternative approach is based on information theory which provides
unconditional secrecy.
• This talk is about the information-theoretic approach.
IT and Security
|
E. Rosnes
2 / 16
Information theory
Case study: Distributed storage systems (DSSs)
Introduction
• When we talk about security/privacy, people usually think about
cryptographic tools.
• An alternative approach is based on information theory which provides
unconditional secrecy.
• This talk is about the information-theoretic approach.
IT and Security
|
E. Rosnes
2 / 16
Information theory
Case study: Distributed storage systems (DSSs)
Information theory (Shannon 1948)
Alice
Bob
Message M
Alice’s
Encoder
An
Noisy communication
channel
P ( b|a )
Bn
Bob’s
decoder
Estimate MB
What is the maximum communication rate?
IT and Security
|
E. Rosnes
3 / 16
Information theory
Case study: Distributed storage systems (DSSs)
Information theory (Shannon 1948)
Alice
Bob
Message M
Alice’s
Encoder
An
Noisy communication
channel
P ( b|a )
Bn
Bob’s
decoder
Estimate MB
What is the maximum communication rate?
IT and Security
|
E. Rosnes
3 / 16
Information theory
Case study: Distributed storage systems (DSSs)
Wiretap channel model
Alice
Eve’s
decoder
Estimate ME
Eve
Bob
En
Message M
Alice’s
Encoder
A
n
Communication
channel
P ( b,e|a )
Bn
Bob’s
decoder
Estimate MB
What is the maximum communication rate such that Eve learns nothing about
the message?
Assumption: Eve has a worse channel.
IT and Security
|
E. Rosnes
4 / 16
Information theory
Case study: Distributed storage systems (DSSs)
Wiretap channel model
Alice
Eve’s
decoder
Estimate ME
Eve
Bob
En
Message M
Alice’s
Encoder
A
n
Communication
channel
P ( b,e|a )
Bn
Bob’s
decoder
Estimate MB
What is the maximum communication rate such that Eve learns nothing about
the message?
Assumption: Eve has a worse channel.
IT and Security
|
E. Rosnes
4 / 16
Information theory
Case study: Distributed storage systems (DSSs)
Wiretap channel model
Alice
Eve’s
decoder
Estimate ME
Eve
Bob
En
Message M
Alice’s
Encoder
A
n
Communication
channel
P ( b,e|a )
Bn
Bob’s
decoder
Estimate MB
What is the maximum communication rate such that Eve learns nothing about
the message?
Assumption: Eve has a worse channel.
IT and Security
|
E. Rosnes
4 / 16
Information theory
Case study: Distributed storage systems (DSSs)
Covert communication
Alice
Willie
Transmission
status T
Bob
Message M
Willie’s
observation
Alice’s
Encoder
Estimate TW
Wn
A
n
Communication
channel
P ( w,b|a )
Bn
Bob’s
decoder
Estimate MB
What is the maximum communication rate such that Willie will not detect
whether communication takes place or not?
Assumption: Willie has a worse channel.
IT and Security
|
E. Rosnes
5 / 16
Information theory
Case study: Distributed storage systems (DSSs)
Covert communication
Alice
Willie
Transmission
status T
Bob
Message M
Willie’s
observation
Alice’s
Encoder
Estimate TW
Wn
A
n
Communication
channel
P ( w,b|a )
Bn
Bob’s
decoder
Estimate MB
What is the maximum communication rate such that Willie will not detect
whether communication takes place or not?
Assumption: Willie has a worse channel.
IT and Security
|
E. Rosnes
5 / 16
Information theory
Case study: Distributed storage systems (DSSs)
Covert communication
Alice
Willie
Transmission
status T
Bob
Message M
Willie’s
observation
Alice’s
Encoder
Estimate TW
Wn
A
n
Communication
channel
P ( w,b|a )
Bn
Bob’s
decoder
Estimate MB
What is the maximum communication rate such that Willie will not detect
whether communication takes place or not?
Assumption: Willie has a worse channel.
IT and Security
|
E. Rosnes
5 / 16
Information theory
Case study: Distributed storage systems (DSSs)
Case study: Distributed storage systems
IT and Security
|
E. Rosnes
6 / 16
Information theory
Case study: Distributed storage systems (DSSs)
Case study: Distributed storage systems
• The amount of digital data generated grows 40% per year.
IT and Security
|
E. Rosnes
6 / 16
Information theory
Case study: Distributed storage systems (DSSs)
Case study: Distributed storage systems
• The amount of digital data generated grows 40% per year.
• 40 ZB (1 ZB= 1021 bytes) of data will be generated yearly by 2020.
IT and Security
|
E. Rosnes
6 / 16
Information theory
Case study: Distributed storage systems (DSSs)
Case study: Distributed storage systems
• The amount of digital data generated grows 40% per year.
• 40 ZB (1 ZB= 1021 bytes) of data will be generated yearly by 2020.
(1.8 ZB was generated in 2011.)
IT and Security
|
E. Rosnes
6 / 16
Information theory
Case study: Distributed storage systems (DSSs)
Case study: Distributed storage systems
• The amount of digital data generated grows 40% per year.
• 40 ZB (1 ZB= 1021 bytes) of data will be generated yearly by 2020.
(1.8 ZB was generated in 2011.)
Need to store, process, and deliver massive amounts of data.
IT and Security
|
E. Rosnes
6 / 16
Information theory
Case study: Distributed storage systems (DSSs)
Case study: Distributed storage systems
• The amount of digital data generated grows 40% per year.
• 40 ZB (1 ZB= 1021 bytes) of data will be generated yearly by 2020.
(1.8 ZB was generated in 2011.)
Need to store, process, and deliver massive amounts of data.
• Inexpensively
IT and Security
|
E. Rosnes
6 / 16
Information theory
Case study: Distributed storage systems (DSSs)
Case study: Distributed storage systems
• The amount of digital data generated grows 40% per year.
• 40 ZB (1 ZB= 1021 bytes) of data will be generated yearly by 2020.
(1.8 ZB was generated in 2011.)
Need to store, process, and deliver massive amounts of data.
• Inexpensively
• Reliably
IT and Security
|
E. Rosnes
6 / 16
Information theory
Case study: Distributed storage systems (DSSs)
Case study: Distributed storage systems
• The amount of digital data generated grows 40% per year.
• 40 ZB (1 ZB= 1021 bytes) of data will be generated yearly by 2020.
(1.8 ZB was generated in 2011.)
Need to store, process, and deliver massive amounts of data.
• Inexpensively
• Reliably
IT and Security
|
E. Rosnes
6 / 16
Information theory
Case study: Distributed storage systems (DSSs)
Motivation
4
·10
Exabytes (1018 bytes)
4
3
2
1
0
2005
2009
2013
2020
Year
IT and Security
|
E. Rosnes
7 / 16
Information theory
Case study: Distributed storage systems (DSSs)
Motivation
4
·10
Exabytes (1018 bytes)
4
3
2
1
0
2005
2009
2013
2020
Year
IT and Security
|
E. Rosnes
7 / 16
Information theory
Case study: Distributed storage systems (DSSs)
Data storage in the old times
In the old times...
• Single pieces of very reliable hardware
IT and Security
|
E. Rosnes
8 / 16
Information theory
Case study: Distributed storage systems (DSSs)
Data storage in the old times
In the old times...
• Single pieces of very reliable hardware → very expensive!
IT and Security
|
E. Rosnes
8 / 16
Information theory
Case study: Distributed storage systems (DSSs)
Distributed storage
Distributed storage
• Data is stored across multiple interconnected inexpensive storage units in a
distributed fashion.
IT and Security
|
E. Rosnes
9 / 16
Information theory
Case study: Distributed storage systems (DSSs)
Distributed storage
Distributed storage
• Data is stored across multiple interconnected inexpensive storage units in a
distributed fashion.
• Individual storage units (storage nodes) are unreliable, but reliability is
provided globally.
IT and Security
|
E. Rosnes
9 / 16
Information theory
Case study: Distributed storage systems (DSSs)
Distributed storage
• Individual storage nodes are prone to failures → need to provide resilience
to node failures (fault tolerance).
IT and Security
|
E. Rosnes
10 / 16
Information theory
Case study: Distributed storage systems (DSSs)
Distributed storage
• Individual storage nodes are prone to failures → need to provide resilience
to node failures (fault tolerance).
IT and Security
|
E. Rosnes
10 / 16
Information theory
Case study: Distributed storage systems (DSSs)
Distributed storage
• Individual storage nodes are prone to failures → need to provide resilience
to node failures (fault tolerance).
IT and Security
|
E. Rosnes
10 / 16
Information theory
Case study: Distributed storage systems (DSSs)
Distributed storage
• Individual storage nodes are prone to failures → need to provide resilience
to node failures (fault tolerance).
IT and Security
|
E. Rosnes
10 / 16
Information theory
Case study: Distributed storage systems (DSSs)
Distributed storage
• Individual storage nodes are prone to failures → need to provide resilience
to node failures (fault tolerance).
IT and Security
|
E. Rosnes
10 / 16
Information theory
Case study: Distributed storage systems (DSSs)
Distributed storage
• Individual storage nodes are prone to failures → need to provide resilience
to node failures (fault tolerance).
IT and Security
|
E. Rosnes
10 / 16
Information theory
Case study: Distributed storage systems (DSSs)
Distributed storage
• Individual storage nodes are prone to failures → need to provide resilience
to node failures (fault tolerance).
• Basic approach: Replication.
IT and Security
|
E. Rosnes
10 / 16
Information theory
Case study: Distributed storage systems (DSSs)
Distributed storage
• Individual storage nodes are prone to failures → need to provide resilience
to node failures (fault tolerance).
• Basic approach: Replication.
IT and Security
|
E. Rosnes
10 / 16
Information theory
Case study: Distributed storage systems (DSSs)
Distributed storage
• Individual storage nodes are prone to failures → need to provide resilience
to node failures (fault tolerance).
• Basic approach: Replication.
IT and Security
|
E. Rosnes
10 / 16
Information theory
Case study: Distributed storage systems (DSSs)
Distributed storage
• Individual storage nodes are prone to failures → need to provide resilience
to node failures (fault tolerance).
• Basic approach: Replication.
IT and Security
|
E. Rosnes
10 / 16
Information theory
Case study: Distributed storage systems (DSSs)
Distributed storage
• Individual storage nodes are prone to failures → need to provide resilience
to node failures (fault tolerance).
• Basic approach: Replication.
IT and Security
|
E. Rosnes
10 / 16
Information theory
Case study: Distributed storage systems (DSSs)
Distributed storage
• Individual storage nodes are prone to failures → need to provide resilience
to node failures (fault tolerance).
• Basic approach: Replication.
• Data is stored in a distributed fashion across three storage nodes.
IT and Security
|
E. Rosnes
10 / 16
Information theory
Case study: Distributed storage systems (DSSs)
Distributed storage
• Individual storage nodes are prone to failures → need to provide resilience
to node failures (fault tolerance).
• Basic approach: Replication.
• Data is stored in a distributed fashion across three storage nodes.
• Individual nodes are unreliable, but the system provides reliability globally.
IT and Security
|
E. Rosnes
10 / 16
Information theory
Case study: Distributed storage systems (DSSs)
Replication
Replication: Replicate the data n times
• Simple, but...
IT and Security
|
E. Rosnes
11 / 16
Information theory
Case study: Distributed storage systems (DSSs)
Replication
Replication: Replicate the data n times
• Simple, but... high storage overhead
IT and Security
|
E. Rosnes
11 / 16
Information theory
Case study: Distributed storage systems (DSSs)
Replication
Replication: Replicate the data n times
• Simple, but... high storage overhead
IT and Security
|
E. Rosnes
11 / 16
Information theory
Case study: Distributed storage systems (DSSs)
Replication
Replication: Replicate the data n times
• Simple, but... high storage overhead
IT and Security
|
E. Rosnes
11 / 16
Information theory
Case study: Distributed storage systems (DSSs)
Replication
Replication: Replicate the data n times
• Simple, but... high storage overhead
IT and Security
|
E. Rosnes
11 / 16
Information theory
Case study: Distributed storage systems (DSSs)
Replication
Replication: Replicate the data n times
• Simple, but... high storage overhead → very costly in terms of hardware,
real-state, maintenance (cooling)...
IT and Security
|
E. Rosnes
11 / 16
Information theory
Case study: Distributed storage systems (DSSs)
Replication
Replication: Replicate the data n times
• Simple, but... high storage overhead → very costly in terms of hardware,
real-state, maintenance (cooling)...
• Need to reduce the storage overhead!
IT and Security
|
E. Rosnes
11 / 16
Information theory
Case study: Distributed storage systems (DSSs)
Replication
Replication: Replicate the data n times
• Simple, but... high storage overhead → very costly in terms of hardware,
real-state, maintenance (cooling)...
• Need to reduce the storage overhead!
Can we do better?
IT and Security
|
E. Rosnes
11 / 16
Information theory
Case study: Distributed storage systems (DSSs)
Distributed storage using erasure correcting codes
Example: (9, 7) maximum distance separable (MDS) code. t = 2
IT and Security
|
E. Rosnes
12 / 16
Information theory
Case study: Distributed storage systems (DSSs)
Distributed storage using erasure correcting codes
Example: (9, 7) maximum distance separable (MDS) code. t = 2
• A piece of data is divided into k = 7 symbols,
IT and Security
|
E. Rosnes
12 / 16
Information theory
Case study: Distributed storage systems (DSSs)
Distributed storage using erasure correcting codes
Example: (9, 7) maximum distance separable (MDS) code. t = 2
• A piece of data is divided into k = 7 symbols, and encoded into n = 9
symbols. (We add n − k = 2 symbols of redundancy.)
IT and Security
|
E. Rosnes
12 / 16
Information theory
Case study: Distributed storage systems (DSSs)
Distributed storage using erasure correcting codes
Example: (9, 7) maximum distance separable (MDS) code. t = 2
• A piece of data is divided into k = 7 symbols, and encoded into n = 9
symbols. (We add n − k = 2 symbols of redundancy.)
• 7 nodes store the plain data,
IT and Security
|
E. Rosnes
12 / 16
Information theory
Case study: Distributed storage systems (DSSs)
Distributed storage using erasure correcting codes
Example: (9, 7) maximum distance separable (MDS) code. t = 2
• A piece of data is divided into k = 7 symbols, and encoded into n = 9
symbols. (We add n − k = 2 symbols of redundancy.)
• 7 nodes store the plain data, 2 nodes store redundancy.
IT and Security
|
E. Rosnes
12 / 16
Information theory
Case study: Distributed storage systems (DSSs)
Distributed storage using erasure correcting codes
Example: (9, 7) maximum distance separable (MDS) code. t = 2
• A piece of data is divided into k = 7 symbols, and encoded into n = 9
symbols. (We add n − k = 2 symbols of redundancy.)
• 7 nodes store the plain data, 2 nodes store redundancy.
• The data can be retrieved from any subset of 7 storage nodes.
IT and Security
|
E. Rosnes
12 / 16
Information theory
Case study: Distributed storage systems (DSSs)
Distributed storage using erasure correcting codes
Example: (9, 7) maximum distance separable (MDS) code. t = 2
• A piece of data is divided into k = 7 symbols, and encoded into n = 9
symbols. (We add n − k = 2 symbols of redundancy.)
• 7 nodes store the plain data, 2 nodes store redundancy.
• The data can be retrieved from any subset of 7 storage nodes.
IT and Security
|
E. Rosnes
12 / 16
Information theory
Case study: Distributed storage systems (DSSs)
Distributed storage using erasure correcting codes
Example: (9, 7) maximum distance separable (MDS) code. t = 2
• A piece of data is divided into k = 7 symbols, and encoded into n = 9
symbols. (We add n − k = 2 symbols of redundancy.)
• 7 nodes store the plain data, 2 nodes store redundancy.
• The data can be retrieved from any subset of 7 storage nodes.
IT and Security
|
E. Rosnes
12 / 16
Information theory
Case study: Distributed storage systems (DSSs)
Distributed storage using erasure correcting codes
Example: (9, 7) maximum distance separable (MDS) code. t = 2
• A piece of data is divided into k = 7 symbols, and encoded into n = 9
symbols. (We add n − k = 2 symbols of redundancy.)
• 7 nodes store the plain data, 2 nodes store redundancy.
• The data can be retrieved from any subset of 7 storage nodes.
• Storage overhead n/k = 1.28 (n/k = 3 for 3-replication).
IT and Security
|
E. Rosnes
12 / 16
Information theory
Case study: Distributed storage systems (DSSs)
Distributed storage
Distributed storage systems come in many flavors:
IT and Security
|
E. Rosnes
13 / 16
Information theory
Case study: Distributed storage systems (DSSs)
Distributed storage
Distributed storage systems come in many flavors:
• Data centers,
IT and Security
|
E. Rosnes
.
13 / 16
Information theory
Case study: Distributed storage systems (DSSs)
Distributed storage
Distributed storage systems come in many flavors:
• Data centers, cloud storage networks,
IT and Security
|
E. Rosnes
.
13 / 16
Information theory
Case study: Distributed storage systems (DSSs)
Distributed storage
Distributed storage systems come in many flavors:
• Data centers, cloud storage networks, and P2P storage/backup systems.
IT and Security
|
E. Rosnes
13 / 16
Information theory
Case study: Distributed storage systems (DSSs)
Distributed storage
Distributed storage systems come in many flavors:
• Data centers, cloud storage networks, and P2P storage/backup systems.
• Google File System, Facebook’s Hadoop distributed file system, and
Microsoft’s Windows Azure cloud system.
IT and Security
|
E. Rosnes
13 / 16
Information theory
Case study: Distributed storage systems (DSSs)
Distributed storage
γBS
F
µ
Mλ
hα
α
γD2D
α
α
α
µ
Distributed storage systems come in many flavors:
• Data centers, cloud storage networks, and P2P storage/backup systems.
• Google File System, Facebook’s Hadoop distributed file system, and
Microsoft’s Windows Azure cloud system.
• Wireless distributed storage for content delivery.
IT and Security
|
E. Rosnes
13 / 16
Information theory
Case study: Distributed storage systems (DSSs)
What about security?
Types
Two ways to look at it:
• Security against passive attacks.
• Security against active attacks.
Solution
• Cryptographic approach:
Easy to implement.
Complex key management.
• Information-theoretic approach.
IT and Security
|
E. Rosnes
14 / 16
Information theory
Case study: Distributed storage systems (DSSs)
What about security?
Types
Two ways to look at it:
• Security against passive attacks.
• Security against active attacks.
Solution
• Cryptographic approach:
Easy to implement.
Complex key management.
• Information-theoretic approach.
IT and Security
|
E. Rosnes
14 / 16
Information theory
Case study: Distributed storage systems (DSSs)
What about security?
Types
Two ways to look at it:
• Security against passive attacks.
• Security against active attacks.
Solution
• Cryptographic approach:
Easy to implement.
Complex key management.
• Information-theoretic approach.
IT and Security
|
E. Rosnes
14 / 16
Information theory
Case study: Distributed storage systems (DSSs)
What about security?
Types
Two ways to look at it:
• Security against passive attacks.
• Security against active attacks.
Solution
• Cryptographic approach:
Easy to implement.
Complex key management.
• Information-theoretic approach.
IT and Security
|
E. Rosnes
14 / 16
Information theory
Case study: Distributed storage systems (DSSs)
Security against passive attacks: An intuition
Objective (strong secrecy)
To achieve I (m; e) = 0.
The main principle is to append random data to the file. This achieves security
at the expense of a higher storage overhead!!!
IT and Security
|
E. Rosnes
15 / 16
Information theory
Case study: Distributed storage systems (DSSs)
Security against passive attacks: An intuition
m1
m2
m1 + m2
m1 + 2m2
Objective (strong secrecy)
To achieve I (m; e) = 0.
The main principle is to append random data to the file. This achieves security
at the expense of a higher storage overhead!!!
IT and Security
|
E. Rosnes
15 / 16
Information theory
Case study: Distributed storage systems (DSSs)
Security against passive attacks: An intuition
m1 + r
r
m1 + 2r
m1 + 3r
Objective (strong secrecy)
To achieve I (m; e) = 0.
The main principle is to append random data to the file. This achieves security
at the expense of a higher storage overhead!!!
IT and Security
|
E. Rosnes
15 / 16
Information theory
Case study: Distributed storage systems (DSSs)
Security against passive attacks: An intuition
m1 + r
r
m1 + 2r
m1 + 3r
Objective (strong secrecy)
To achieve I (m; e) = 0.
The main principle is to append random data to the file. This achieves security
at the expense of a higher storage overhead!!!
IT and Security
|
E. Rosnes
15 / 16
Information theory
Case study: Distributed storage systems (DSSs)
Security against passive attacks: An intuition
m1 + r
r
m1 + 2r
m1 + 3r
Objective (strong secrecy)
To achieve I (m; e) = 0.
The main principle is to append random data to the file. This achieves security
at the expense of a higher storage overhead!!!
IT and Security
|
E. Rosnes
15 / 16
Information theory
Case study: Distributed storage systems (DSSs)
Security against passive attacks: An intuition
m1 + r
r
m1 + 2r
m1 + 3r
Objective (strong secrecy)
To achieve I (m; e) = 0.
The main principle is to append random data to the file. This achieves security
at the expense of a higher storage overhead!!!
IT and Security
|
E. Rosnes
15 / 16
Information theory
Case study: Distributed storage systems (DSSs)
Security against passive attacks: An intuition
m1 + r
r
m1 + 2r
m1 + 3r
Objective (strong secrecy)
To achieve I (m; e) = 0.
The main principle is to append random data to the file. This achieves security
at the expense of a higher storage overhead!!!
IT and Security
|
E. Rosnes
15 / 16
Information theory
Case study: Distributed storage systems (DSSs)
Private information retrieval
• In data storage applications, besides resilience against disk failures and
data protection against illegitimate users, the privacy of the data retrieval
query may also be of concern.
• For instance, one may be interested in designing a storage system in which
a file can be downloaded without revealing any information of which file is
actually downloaded to the servers storing it.
The fundamental question is how much it costs in terms of download.
IT and Security
|
E. Rosnes
16 / 16
Information theory
Case study: Distributed storage systems (DSSs)
Private information retrieval
• In data storage applications, besides resilience against disk failures and
data protection against illegitimate users, the privacy of the data retrieval
query may also be of concern.
• For instance, one may be interested in designing a storage system in which
a file can be downloaded without revealing any information of which file is
actually downloaded to the servers storing it.
The fundamental question is how much it costs in terms of download.
IT and Security
|
E. Rosnes
16 / 16
Information theory
Case study: Distributed storage systems (DSSs)
Private information retrieval
• In data storage applications, besides resilience against disk failures and
data protection against illegitimate users, the privacy of the data retrieval
query may also be of concern.
• For instance, one may be interested in designing a storage system in which
a file can be downloaded without revealing any information of which file is
actually downloaded to the servers storing it.
The fundamental question is how much it costs in terms of download.
IT and Security
|
E. Rosnes
16 / 16