Client Privacy Preservation through Secured DNS - Feisty Forwarders

 
C
l
i
e
n
t
 
P
r
i
v
a
c
y
 
P
r
e
s
e
r
v
a
t
i
o
n
v
i
a
 
S
e
c
u
r
e
d
 
D
N
S
Team Lead –
 
Nidhish Bhimrajka
Team Members –
 
Daksh Agarwal
 
Harshita Gupta
 
Presented By: Feisty Forwarders
 
Y
o
u
 
a
r
e
 
o
n
l
i
n
e
,
 
s
o
 
a
r
e
 
t
h
e
b
a
d
 
g
u
y
s
!
 
 
Mentor
 – Dr. Amrita Mishra
 
Team Capability
 
N
i
d
h
i
s
h
 
B
h
i
m
r
a
j
k
a
 
Summer Research Intern under Prof. Srinivas Vivek
Worked on optimizing AES (Advanced Encryption Standard) circuit, learnt about Multi-party
protocol and various other cryptographic algorithms
S
k
i
l
l
-
s
e
t
 
-
Programming (C/C++, Python, Java, Go, Shell-scripting)
Cryptography, Networking and cyber security
 
 
 
 
 
 
 
W
h
y
 
w
e
 
a
r
e
 
G
r
e
a
t
 
a
s
 
a
 
t
e
a
m
?
 
Worked together on various projects
Our coordination is well timed
Always eager to learn about new technologies
Always try to improve upon our mistakes
 
 
D
a
k
s
h
 
A
g
a
r
w
a
l
 
Summer Development Project Intern with Prof. T K Srikanth
Successfully implemented a Patient Portal (Full-Stack).
S
k
i
l
l
-
s
e
t
 
-
Good grip on Data Science and Machine Learning
Data structures and Algorithms (Java/C++/Python)
 
H
a
r
s
h
i
t
a
 
G
u
p
t
a
 
-
Research Intern under Prof. Srinivas Vivek
Created an Authentication App for MOSIP organization
Created Digital Logbook under Prof. AS Jawanda
S
k
i
l
l
-
s
e
t
 
-
Full-Stack Development / App Development (MERN Stack)
Networking, Cryptography and Cyber Security
Socket Programming
 
Motivation
 
Looming threat of scrutiny on the
Internet by a potential spy!!
 
Can we design a Protocol which
 -
Hides your IP
Encrypts all the incoming and outgoing traffic.
Project idea based on providing a secure environment to
users for surfing the Internet.
CLIENT
RESOLVER
Hey! I am 
103.232.112.80
. What is the IP address of www.xyz.com?
Hey! The IP address of www.xyz.com is 
12.12.1.13
 
IP address of the client is exposed!
 
What generally happens!!
CLIENT
RESOLVER
RELAY
Hey! I am 
103.232.112.80
aahsfjhjasdhfjdajsfhjaj
Hey! I am 
202.134.135.32
aahsfjhjasdhfjdajsfhjaj
Hey! kjfghjhgjhfdsjghjasdfg
Hey! kjfghjhgjhfdsjghjasdfg
 
Original client query is – What is
the IP address of www.xyz.com?
 
Relay receiving the
encrypted query
 
Resolver sending encrypted
resolution of the query
 
Client received encrypted
response. It decrypts using the
symmetric key.
 
Decrypts the query
using the symmetric key
 
Proposed Solution - DNSTAR
 
Implementation Details
 
How Our Idea Stands Out
 
The state-of-the-art implementation lacks data integrity and
protection against one or the other kind of attacks
 
Future Impact of Our Research
Minimized privacy threat
for a user surfing the
Internet.
  The protocol can have its
applications in the sectors
where client data is being
logged by the service
providers.
 
Milestones
 
Thank You
Slide Note
Embed
Share

Feisty Forwarders, led by Dr. Amrita Mishra, is a team dedicated to client privacy preservation via secured DNS. They focus on developing protocols that hide IP addresses and encrypt all incoming and outgoing traffic to protect users from potential spies on the internet. With expertise in programming, cryptography, networking, and cybersecurity, the team aims to provide a secure environment for internet surfing. Their proposed solution, DNSTAR, ensures encrypted queries and responses, enhancing user privacy and security.

  • Client Privacy
  • Secured DNS
  • Feisty Forwarders
  • Cybersecurity
  • Encryption

Uploaded on Sep 22, 2024 | 0 Views


Download Presentation

Please find below an Image/Link to download the presentation.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author. Download presentation by click this link. If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.

E N D

Presentation Transcript


  1. Client Privacy Preservation via Secured DNS Presented By: Feisty Forwarders Mentor Dr. Amrita Mishra You are online, so are the bad guys! Team Lead Nidhish Bhimrajka Team Members Daksh Agarwal Harshita Gupta

  2. Team Capability Why we are Great as a team? Worked together on various projects Our coordination is well timed Always eager to learn about new technologies Always try to improve upon our mistakes Nidhish Bhimrajka Summer Research Intern under Prof. Srinivas Vivek Worked on optimizing AES (Advanced Encryption Standard) circuit, learnt about Multi-party protocol and various other cryptographic algorithms Skill-set - Programming (C/C++, Python, Java, Go, Shell-scripting) Cryptography, Networking and cyber security

  3. Daksh Agarwal Summer Development Project Intern with Prof. T K Srikanth Successfully implemented a Patient Portal (Full-Stack). Skill-set - Good grip on Data Science and Machine Learning Data structures and Algorithms (Java/C++/Python) Harshita Gupta - Research Intern under Prof. Srinivas Vivek Created an Authentication App for MOSIP organization Created Digital Logbook under Prof. AS Jawanda Skill-set - Full-Stack Development / App Development (MERN Stack) Networking, Cryptography and Cyber Security Socket Programming

  4. Motivation Looming threat of scrutiny on the Internet by a potential spy!! Can we design a Protocol which - Hides your IP Encrypts all the incoming and outgoing traffic. Project idea based on providing a secure environment to users for surfing the Internet.

  5. What generally happens!! Hey! I am 103.232.112.80. What is the IP address of www.xyz.com? CLIENT RESOLVER Hey! The IP address of www.xyz.com is 12.12.1.13 IP address of the client is exposed!

  6. Proposed Solution - DNSTAR Decrypts the query using the symmetric key Relay receiving the encrypted query Original client query is What is the IP address of www.xyz.com? Hey! I am 202.134.135.32 aahsfjhjasdhfjdajsfhjaj Hey! I am 103.232.112.80 aahsfjhjasdhfjdajsfhjaj RELAY CLIENT RESOLVER Hey! kjfghjhgjhfdsjghjasdfg Hey! kjfghjhgjhfdsjghjasdfg Client received encrypted response. It decrypts using the symmetric key. Resolver sending encrypted resolution of the query

  7. Implementation Details

  8. How Our Idea Stands Out The state-of-the-art implementation lacks data integrity and protection against one or the other kind of attacks

  9. Future Impact of Our Research The protocol can have its applications in the sectors Minimized privacy threat where client data is being for a user surfing the logged by the service Internet. providers.

  10. Milestones

  11. Thank You

More Related Content

giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#