DocumentCode :
632664
Title :
Security and Privacy by Declarative Design
Author :
Maffei, Matteo ; Pecina, Kim ; Reinert, Manuel
Author_Institution :
Saarland Univ., Saarbrucken, Germany
fYear :
2013
fDate :
26-28 June 2013
Firstpage :
81
Lastpage :
96
Abstract :
The privacy of users has rapidly become one of the most pervasive and stringent requirements in distributed computing. Designing and implementing privacy-preserving distributed systems, however, is challenging since these systems also have to fulfill seemingly conflicting security properties and system requirements: e.g., authorization and accountability require some form of user authentication and session management necessarily involves some form of user tracking. In this work, we present a solution based on declarative design. The core component of our framework is a logic-based declarative API for data processing that exports methods to conveniently specify the system architecture and the intended security properties, and conceals the cryptographic realization. Invisible to the programmer, the implementation of this API relies on a powerful combination of digital signatures, non-interactive zero-knowledge proofs of knowledge, pseudonyms, and reputation lists. We formally proved that the cryptographic implementation enforces the security properties expressed in the declarative specification. The systems produced by our framework enjoy interoperability and open-endedness: they can easily be extended to offer new services and cryptographic data can be shared and processed by different services, without requiring any extra bootstrapping phase or interaction among parties. We implemented the API in Java and conducted an experimental evaluation to demonstrate the practicality of our approach.
Keywords :
Java; application program interfaces; cryptography; data privacy; digital signatures; formal specification; open systems; Java; cryptographic realization; data processing; declarative design; declarative specification; digital signatures; distributed computing; interoperability; logic-based declarative API; noninteractive zero-knowledge proof; open-endedness; privacy-preserving distributed systems; pseudonym; reputation lists; security properties; session management; system requirements; user authentication; user tracking; Authorization; Cryptography; Data privacy; Data processing; Medical services; Privacy;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computer Security Foundations Symposium (CSF), 2013 IEEE 26th
Conference_Location :
New Orleans, LA
Type :
conf
DOI :
10.1109/CSF.2013.13
Filename :
6595822
Link To Document :
بازگشت