IRIS Cryptographic Data Protection Module Overview

iris plenary meeting cryptotool and dpa n.w
1 / 29
Embed
Share

Explore the IRIS project's Cryptographic Data Protection Module, funded by the European Union's Horizon 2020 programme. This module provides auditing functions for incident response, ensures accountability, and offers secure, immutable, and distributed logging for incident response workflows. It includes sub-modules for confidentiality, integrity, availability, encryption of activity logs, automatic key generation, secret sharing, control access to off-chain databases, and more.

  • Cryptographic Data Protection
  • IRIS Project
  • European Union
  • Horizon 2020
  • Data Security

Uploaded on | 1 Views


Download Presentation

Please find below an Image/Link to download the presentation.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author. If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.

You are allowed to download the files provided on this website for personal or commercial use, subject to the condition that they are used lawfully. All files are the property of their respective owners.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.

E N D

Presentation Transcript


  1. IRIS - Plenary Meeting Cryptotool and DPA (INOV & TUD) 1 This project has received funding from the European Union s Horizon 2020 research and innovation programme under grant agreementno 101021727. This material reflects only the authors view and European Commission is not responsible for any use that may be made of the information it contains. IRIS Project confidential

  2. Data Protection and Accountability Module Data Protection and Accountability Module Provides auditing functions for incident response, ensuring accountability Enables secure, immutable and distributed logging for incident response workflows Sub-Modules Confidentiality Integrity Availability Encryption of activity Logs Automatic Key Generation method. From any data, it auto-encrypts and generates a decription key. Self Encryption More difficult to recover audit log decryption key No single point of failure Splits a key into smaller chunks. To recalculate the key, one must collect almost all the chunks. Secret Sharing Activity log consistency Read/write access control No single point of failure Maintain consistency and auditability of data. Control Access to off-chain database (smart Contract) Hyperledger Fabric Activity log stored outside of blockchain Maintains blockchain scalability Database storing the encrypted data. Off-chain Database This project has received funding from the European Union s Horizon 2020 research and innovation programme under grant agreementno 101021727. This material reflects only the authors view and European Commission is not responsible for any use that may be made of the information it contains. IRIS Project confidential

  3. Iris Tool View Architecture IRIS Architecture (Detailed View) External Threat Intelligence Data Vulnerability sources CWE External DBs CVE CTI data Enhanced MeliCERTesEcosystem (EME) Enhanced MeliCERTesEcosystem (EME) Collaborative Threat Intelligence (CTI) Automated Threat Analytics (ATA) Data Protection and Accountability (DPA) Cryptographic Services Distributed Ledger - Access Control Framework (TUD&INOV) DLT Self- encryption Tool (TUD) Vulnerability Manager (ATOS) BINSEC (CEA) Vulnerability reports Threat Intelligence Sharing and Storage (CERTH) Real-time threat events Network traffic, telemetry Sivi (SID) NIGHTWATCH (CLS) AI-Threat Detection (CEA) CTI Audit Log Off-Chain cloud DB CTI Activity Logs Execution Requests Optimized Response Actions Threat & vulnerabilities Repositories Virtual Cyber Range (VCR) Response & Recovery Requests NIGHTWATCH (CLS) CTI Data Vulnerability reports CyberTraP (KEMEA) CTI Audit Log (smart contracts) Optimized response actions CTI Audit Log Requests Advanced Threat Intelligence Orchestrator (ICCS) Cybersecurity exercises, IRIS Lab Pods MeliCERTes PKI, OAUTH and SAML AAA services Telemetry & Predictive Analytics SiHoneyPots (SID) Cyber Range Platform (THALES) CTI data Predictive Analytics & visualization Response & self-recovery Policies Optimized response actions Kafka Broker / APIs Execution Audit Dashboard(s) End-user (CERT/CSIRT) End-user (Security Operators) Interface This project has received funding from the European Union s Horizon 2020 research and innovation programme under grant agreementno 101021727. This material reflects only the authors view and European Commission is not responsible for any use that may be made of the information it contains. IRIS Project confidential

  4. DPA Within the Iris Project Collaborative Threat Intelligence Module Data Protection and Accountability Module CTI CERT/CSIRT A CTI Activity Log 1 Advanced Threat Intelligence Orchestrator CTI Activity Log 2 CERT/CSIRT B CTI CTI Activity Logs ... ... CTI Repository of Threats and Vulnerabilities Auditors This project has received funding from the European Union s Horizon 2020 research and innovation programme under grant agreementno 101021727. This material reflects only the authors view and European Commission is not responsible for any use that may be made of the information it contains. IRIS Project confidential

  5. DPA Within the Iris Project Collaborative Threat Intelligence Module Data Protection and Accountability Module CTI CERT/CSIRT A Advanced Threat Intelligence Orchestrator CERT/CSIRT B CTI CTI Activity Logs Off-chain database ... CTI Repository of Threats and Vulnerabilities CTI Activity Log 1 CTI Activity Log 2 ... Auditors This project has received funding from the European Union s Horizon 2020 research and innovation programme under grant agreementno 101021727. This material reflects only the authors view and European Commission is not responsible for any use that may be made of the information it contains. IRIS Project confidential

  6. DPA Within the Iris Project Collaborative Threat Intelligence Module Data Protection and Accountability Module Cryptographic Tool CTI CERT/CSIRT A CTI Activity Log 2 Advanced Threat Intelligence Orchestrator CERT/CSIRT B CTI CTI Activity Logs Off-chain database ... CTI Repository of Threats and Vulnerabilities CTI Activity Log 1 CTI Activity Log 2 ... Auditors This project has received funding from the European Union s Horizon 2020 research and innovation programme under grant agreementno 101021727. This material reflects only the authors view and European Commission is not responsible for any use that may be made of the information it contains. IRIS Project confidential

  7. DPA Within the Iris Project Collaborative Threat Intelligence Module Data Protection and Accountability Module Cryptographic Tool Hyperledger Fabric Network CTI CERT/CSIRT A CTI Activity Log 2 Advanced Threat Intelligence Orchestrator CERT/CSIRT B CTI CTI Activity Logs Off-chain database ... CTI Repository of Threats and Vulnerabilities CTI Activity Log 1 CTI Activity Log 2 ... Auditors This project has received funding from the European Union s Horizon 2020 research and innovation programme under grant agreementno 101021727. This material reflects only the authors view and European Commission is not responsible for any use that may be made of the information it contains. IRIS Project confidential

  8. Video DPA-Encryption.mp4 DPA-Decryption.mp4 This project has received funding from the European Union s Horizon 2020 research and innovation programme under grant agreementno 101021727. This material reflects only the authors view and European Commission is not responsible for any use that may be made of the information it contains. IRIS Project confidential

  9. Decrypts data with right decryption key Secret Sharing Divides decryption keys into key shares and distributes it among peers Reconstitutes original keys with sufficient amount of the right key shares Conclusions Blockchain Manages references and integrity of activity logs Manages read/write accesses to the off-chain database Off-chain Database Maintains encrypted activity logs Blockchain scalability This project has received funding from the European Union s Horizon 2020 research and innovation programme under grant agreementno 101021727. This material reflects only the authors view and European Commission is not responsible for any use that may be made of the information it contains. IRIS Project confidential

  10. Appendix This project has received funding from the European Union s Horizon 2020 research and innovation programme under grant agreementno 101021727. This material reflects only the authors view and European Commission is not responsible for any use that may be made of the information it contains. IRIS Project confidential

  11. Blockchain in IRIS Project This project has received funding from the European Union s Horizon 2020 research and innovation programme under grant agreementno 101021727. This material reflects only the authors view and European Commission is not responsible for any use that may be made of the information it contains. IRIS Project confidential

  12. DPA Development Phases This project has received funding from the European Union s Horizon 2020 research and innovation programme under grant agreementno 101021727. This material reflects only the authors view and European Commission is not responsible for any use that may be made of the information it contains. IRIS Project confidential

  13. 1stPhase DPA Virtual Machine Other Virtual Machines Docker Containers Security Practitioners Auditors This project has received funding from the European Union s Horizon 2020 research and innovation programme under grant agreementno 101021727. This material reflects only the authors view and European Commission is not responsible for any use that may be made of the information it contains. IRIS Project confidential

  14. 2ndPhase DPA Virtual Machines Other Virtual Machines Security Practitioners Auditors This project has received funding from the European Union s Horizon 2020 research and innovation programme under grant agreementno 101021727. This material reflects only the authors view and European Commission is not responsible for any use that may be made of the information it contains. IRIS Project confidential

  15. 3rdPhase Other Components Computers/Servers Different computers/servers Different computers/servers Security Practitioners Auditors This project has received funding from the European Union s Horizon 2020 research and innovation programme under grant agreementno 101021727. This material reflects only the authors view and European Commission is not responsible for any use that may be made of the information it contains. IRIS Project confidential

  16. Brief Introduction to Blockchain This project has received funding from the European Union s Horizon 2020 research and innovation programme under grant agreementno 101021727. This material reflects only the authors view and European Commission is not responsible for any use that may be made of the information it contains. IRIS Project confidential

  17. What is Blockchain Technology What is Blockchain Technology Distributed Ledger (DLT) Peer-to-Peer Network Peer Agreement - Consensus Ledger composed of : Assets state (world State) List of transactions (requests for changes in assets states) organized as blockchain Nodes (e.g., servers, computers) have same privileges Ledger is distributed among the P2P network Smart Contracts - Business Logic programmed and run by peers. Generates transactions Transactions validation are agreed among the peer nodes Peer nodes agree on transactions: order execution outcome validity Peer Peer Ledger Ledger Peer Peer Peer Peer Peer Peer World State World State World State World State World State World State World State World State World State World State Peer Peer Peer Peer World State World State World State World State Asset Asset Blockchain Blockchain Blockchain Blockchain Blockchain Blockchain Blockchain Blockchain t x n t x n t x n t x n t x n t x n Blockchain Blockchain Asset State Blockchain Blockchain Blockchain Blockchain t x n t x n t x n t x n t x n t x n tx txn txn txn t x n t x n t x n t x n t x n t x n tx tx Integrity Blockchain integrity maintained cryptographically by hash function This project has received funding from the European Union s Horizon 2020 research and innovation programme under grant agreementno 101021727. This material reflects only the authors view and European Commission is not responsible for any use that may be made of the information it contains. IRIS Project confidential

  18. What is Blockchain Technology What is Blockchain Technology Distributed Ledger (DLT) Peer-to-Peer Network Peer Agreement - Consensus Ledger composed of : Assets state (world State) List of transactions (requests for changes in assets states) organized as blockchain Nodes (e.g., servers, computers) have same privileges Ledger is distributed among the P2P network Smart Contracts - Business Logic programmed and run by peers. Generates transactions Transactions validation are agreed among the peer nodes Peer nodes agree on transactions: order execution outcome validity Blockchain Technology Features Programmable Business Logic Consensus Integrity Business Logic can be programmed and run by peers of the network Smart Contracts Program output verified and agreed by peers with consensus mechanism Peer nodes agree on transactions: validity order execution outcome Information is immutable: Ledger integrity maintained cryptographically by hash function Decentralized ledger, distributedamong a peer-to- peer network Properties Immutability Transparency Desintermediation Auditability This project has received funding from the European Union s Horizon 2020 research and innovation programme under grant agreementno 101021727. This material reflects only the authors view and European Commission is not responsible for any use that may be made of the information it contains. IRIS Project confidential

  19. Self-Encryption This project has received funding from the European Union s Horizon 2020 research and innovation programme under grant agreementno 101021727. This material reflects only the authors view and European Commission is not responsible for any use that may be made of the information it contains. IRIS Project confidential

  20. Self Encryption ?3 ?1 ?2 Encryption ? ?3 ? ?1 ? ?2 ??? ?2 ? ?2 ??? ?1 ? ?3 ??? ?2 ? ?1 ??3 ??1 ??2 ? ?3 ? ?1 ? ?2 Decryption ??? 1 ? ?2 ??? 1 ??? 1 ? ?3 ? ?1 ?3 ?1 ?2 This project has received funding from the European Union s Horizon 2020 research and innovation programme under grant agreementno 101021727. This material reflects only the authors view and European Commission is not responsible for any use that may be made of the information it contains. IRIS Project confidential

  21. Shamir Secret Sharing This project has received funding from the European Union s Horizon 2020 research and innovation programme under grant agreementno 101021727. This material reflects only the authors view and European Commission is not responsible for any use that may be made of the information it contains. IRIS Project confidential

  22. Shamirs Secret Key Sharing Parties Requester Dealer ? ??? Secret ? 1 ???? ? ? = ? + ?=1 Polynomial coefficients Lagrange Interpolation ?? ??? ?1 Formula Party 1 ? 1 ? ? = ? ???? ?1= ? 1 = ? + ?1 ?=1 Shared Secret Key Party j ?? ? 1 ???? ??= ? ? = ? + ?? ?=1 ? 1 ???? ??= ? ? = ? + Party n ?=1 ?? Lagrange Interpolation Formula ? ? ? 1 ? ? ? ?= ? + ????? ? ? = ? ? ?=1 ?=1 ?=1,? ? This project has received funding from the European Union s Horizon 2020 research and innovation programme under grant agreementno 101021727. This material reflects only the authors view and European Commission is not responsible for any use that may be made of the information it contains. IRIS Project confidential

  23. DPA sub-module gradual explanation This project has received funding from the European Union s Horizon 2020 research and innovation programme under grant agreementno 101021727. This material reflects only the authors view and European Commission is not responsible for any use that may be made of the information it contains. IRIS Project confidential

  24. Self Encryption Off-chain database (audit logs) ???????? Self Encryption ????? ??= ? ????? ??1????1 ??2????2 ?? ???????? Self Encryption ????? This project has received funding from the European Union s Horizon 2020 research and innovation programme under grant agreementno 101021727. This material reflects only the authors view and European Commission is not responsible for any use that may be made of the information it contains. IRIS Project confidential

  25. Secret Sharing Scheme Sharing Keys Off-chain database (audit logs) ???????? Self Encryption ????? ??= ? ????? KH 1 ??1????1 ??2????2 Secrete Sharing KH 2 Secrete Sharing KH 3 ?? ???????? Self Encryption ????? This project has received funding from the European Union s Horizon 2020 research and innovation programme under grant agreementno 101021727. This material reflects only the authors view and European Commission is not responsible for any use that may be made of the information it contains. IRIS Project confidential

  26. Secret Sharing Scheme Decrypting Off-chain database (audit logs) ???????? Self Encryption ????? ??= ? ????? KH 1 ??1????1 ??2????2 Secrete Sharing KH 2 Secrete Sharing KH 3 ?? ???????? Self Encryption ????? This project has received funding from the European Union s Horizon 2020 research and innovation programme under grant agreementno 101021727. This material reflects only the authors view and European Commission is not responsible for any use that may be made of the information it contains. IRIS Project confidential

  27. Secret Sharing Scheme Off-chain database (audit logs) ???????? Self Encryption ????? ??= ? ????? KH 1 ??1????1 ??2????2 Secrete Sharing KH 2 Secrete Sharing KH 3 ?? ???????? Self Encryption ????? This project has received funding from the European Union s Horizon 2020 research and innovation programme under grant agreementno 101021727. This material reflects only the authors view and European Commission is not responsible for any use that may be made of the information it contains. IRIS Project confidential

  28. Hyperledger Fabric Blockchain within the path to encrypted log files DPA Data Protection and Accountability Off-chain database (audit logs) ???????? Self Encryption ????? Blockchain ??= ? ????? World State World State Peer 1 gRPC (too much mayb e) ??1????1 ??2????2 Secrete Sharing Blockchain Blockchain t x n t x n t x n World State World State Peer 2 Secrete Sharing Blockchain Blockchain World State World State Peer 3 t x n t x n t x n ?? Blockchain Blockchain t x n t x n t x n ???????? Self Encryption ????? This project has received funding from the European Union s Horizon 2020 research and innovation programme under grant agreementno 101021727. This material reflects only the authors view and European Commission is not responsible for any use that may be made of the information it contains. IRIS Project confidential

  29. DPA Simplified View DPA Data Protection and Accountability Off-chain database ????? Hyperledger Fabric network Ledger Ledger ????? ??1????? Blockchain Blockchain t x n t x n t x n Access Control Enforcement Smart Contract (Audit Log) CTI data reference Secret Sharing Scheme Encryption / decryption World State World State DB location Additional data info. data hash Data Ref. Distributed Key Shares ????? This project has received funding from the European Union s Horizon 2020 research and innovation programme under grant agreementno 101021727. This material reflects only the authors view and European Commission is not responsible for any use that may be made of the information it contains. IRIS Project confidential

More Related Content