The Implementation of Secure and Efficient Digital Goods Trading Systems Using Bilinear Pairing Yun-Yu Shu, Wei-Ting Lu, Jheng-Jia Huang Hsiao-Chun Huang and Wen-Shenq Juang Department of Information Management National Kaohsiung First University of Science and Technology Kaohsiung, Taiwan [email protected], [email protected], [email protected], [email protected], [email protected]

Abstract. For providing a secure and privacy protection digital goods trading system in cloud computing environment, we proposed a secure and efficient scheme using bilinear pairing last year. In our proposed system, a seller can save her/his digital goods in a cloud server, and then sell them when a buyer needs. For the sake of protecting the digital content’s privacy, the seller should store her/his digital goods in an encrypted form before storing them in a cloud. However, the method of directly encrypting digital goods should be not work well if buyers and sellers trade with the digital goods in this environment. The reason is that the cloud server could not determine which digital goods contain certain keywords requested by a buyer if the meta data of the encrypted digital goods is not searchable. In this paper, we briefly introduce our proposed digital goods trading scheme, and then describe the implementation of our proposed scheme using the open source java pairing based cryptography library. Also, we plan to build a Microsoft private cloud and then port our implemented system to this cloud. Keywords: bilinear pairing, cloud computing, digital goods, keyword search, searchable encryption, authenticated key agreement

1

Introduction

In 2010, we proposed an efficient trading scheme [9] in cloud computing environments [1][7][4]. The major contributions of our proposed scheme are the followings: 1. This scheme can do the keyword search in encrypted digital goods. A cloud server can make a decision that some digital goods contain specific keywords assigned by the buyer, but can not know any information about the queried keywords and the encrypted digital goods. It preserves the privacy of the seller’s digital goods and the buyer’s query during the searching phase.

2. If the cloud server finds the digital goods in according with the keywords requested by the buyer, the buyer and the seller can do authentication for each other. 3. After the seller confirms the buyer’s identity, the buyer can do the trading with the seller, even if the buyer does not have the account in this cloud. In this paper, we implement our proposed scheme [9] using bilinear pairing [3] to establish a secure and efficient digital goods trading system. The remainder of this paper is organized as follows. In Section 2, our proposed trading scheme is reviewed briefly. In Section 3, we introduce the environments of our implementation system. In Section 4, a demonstration of our implemented trading system is given. Finally, we make a conclusion in Section 5.

2

Our proposed scheme

In our scheme, there are four participants. One is a seller, and the other three parties are a cloud computing server, the bank, and a buyer. Suppose Bob be a seller and Alice be a buyer, and this scheme consists of five phases: (1) the setup phase, (2) the initializing phase, (3) the searching phase, (4) the session key authentication phase, and (5) the trading phase. We show the architecture of the scheme in Fig. 1, and shortly describe our proposed scheme in the following. In the setup phase, Bob uses digital pseudonyms [2] as the public keys and then he keeps the corresponding private keys for his digital goods. Each digital goods has its corresponding ID and secret key. In the initializing phase, Bob sends the trapdoor for keywords of each digital goods, the digital goods encrypted by its secret key, and the public key to the cloud computing server. In the searching phase, Alice uses the MPEKS algorithm to produce her ciphertext S which is a searchable encryption of the keywords. Then she sends S to the cloud computing server. The cloud computing server uses the Test algorithm to identify the same keyword between S and the trapdoor. If the cloud computing server identifies the same keyword, she/he will notify Alice that she/he finds the keyword that she needs and inform Bob that someone wants to buy the matched digital goods. In the authentication phase, Alice and Bob authenticate each other and generate a session key. In the trading phase, Alice sends her payment to the bank. The bank then notifies Bob that Alice has already finished the payment process. Bob sends the secret key encrypted by the session key and the cloud computing server sends the encrypted digital goods to Alice respectively. Then Alice decrypts the secret key by using the session key. Finally she uses the secret key to decrypt the matched digital goods.

3

The environments of our implementation system

In this section, we describe the environments of our implementation system as follows.

Fig. 1. The architecture of our proposed scheme

Architecture: Client-server model Language: JAVA SE Runtime Environment (JRE), version 7 Integrated development environment: Eclipse IDE for Java EE Developers version Framework: SpringSource Tool Suite (STS), version 2.5.1 Web service: Apache CXF, version 2.3.1 Project management: Apache Manven, version 2.0.7 Database: HyperSQL Database Engine (HSQLDB), version 1.8.0.10 Object relational mapping (ORM): Hibernate, version 3.6.2 Application programming interfaces (APIs): The Bouncy Castle Crypto APIs for the Java Cryptography Extension (JCE) and the Java Cryptography Architecture (JCA) Library:

The Java Pairing Based Cryptography Library (jPBC) Operating system and hardware: Table 1. Operating system and hardware

Equipment Description Operating system Windows 7 Professional 6.1.7600 (32 bit) Main board Acer EG 31 MR 01-B 4 L Processor Intel (R) Core (TM) 2 Duo CPU E 8400@ 3.00 GHz Physical Memory Single-Channel DDR 2@ 399 MHz Hard Disk Hitachi (233 GB) Related cost: Table 2. Related cost based on bilinear pairing

Notations ECA ECP KS

Run time and key size 213523/nanoseconds 63715054/nanoseconds 152/bits

ECA The run time of two points addition operation in elliptic curve based on bilinear pairing ECP : The run time for bilinear pairing operation on elliptic curve based on bilinear pairing KS : The public/private key size based on bilinear pairing

4

The demonstration of our implemented trading system

In our scheme, we have a seller, a buyer, a bank, and a cloud computing server. For simplifying the implementation, we make some slight modifications on our scheme. Since these are four participants needed to use private/public key pairs in our scheme, they generate their key pairs respectively before the beginning of the scheme.

4.1

The setup phase

In the setup phase, Bob has to classify his digital goods. Hence, in our demonstration, we classify our digital goods into three categories including cryptography, cloud computing, RFID. Each category has its private key, the corresponding public key, and digital goods. Each digital goods encrypted with the AES key has its related keywords. We show the process in Fig. 2.

Fig. 2. The demonstration of the setup phase

4.2

The initializing phase

After setting up the digital goods and the corresponding data, Bob sends the information including the encrypted digital goods, the trapdoors related to the keywords of the digital goods, the outlines about the digital goods, etc. to the cloud server. If the cloud server receives the information successfully, it will response Bob that it has already accepted the data as shown in Fig. 3.

Fig. 3. The demonstration of the initializing phase

4.3

The searching phase

Assume that Alice wants to buy a piece of digital goods matched her keyword. First, she needs to ask the cloud server if it owns the category she searches. If

yes, the cloud server will send the public key of the category, or the cloud server will reply that category is not found. Suppose Alice finds the matched category, and then she produces the MPEKS ciphertext corresponding the keyword by using the public key of the category. If Alice does not find the same keyword, the cloud server will send a message of ”Keyword not found”. She will accept the related information of the matched digital goods, and look at the abstract of the digital goods otherwise. The process is shown in Fig. 4.

Fig. 4. The demonstration of the searching phase

4.4

The session key authentication phase

After reading the abstract of the digital goods, if Alice is interesting in the digital goods, she computes a public key TA , and sends TA to Bob. Upon receiving TA , Bob will send his public key TB as a response. If Alice accepts Bob’s public key TB , she can compute her session key by using TB , and check

if the authentication code is valid. If yes, he will compute the session key and send the authentication code to Alice. After receiving the authentication code, Bob checks if it is valid. If yes, the authentication is successful as shown in Fig. 5.

Fig. 5. The demonstration of the session key authentication phase

4.5

The trading phase

After Alice and Bob authenticate each other, Alice makes a payment to the bank via a SSL channel. If the bank receives the payment from Alice, it will send a message to notify Alice. Then Bob queries the bank if the payment has been made from Alice. If yes, the bank will notify Bob, and tell Bob which digital goods that Alice wants to buy. Next, Bob encrypts the AES key with his session key and the public key of the cloud server, and transmits the encrypted AES

key to the cloud server. If the cloud server accepts the message, it will send a response to inform Bob. Then Alice asks the cloud server if Bob accepts her payment. If the cloud server confirms that Bob has already received the payment Alice made. Then the cloud server decrypts the AES key by using her/his private key and encrypts the digital goods and the AES key by using Alice’s public key, and send them to Alice. Upon receiving the information, Alice decrypts the AES key and digital goods by using her private key. Then she decrypts the AES key with her session key, and then uses the AES key to obtain the digital goods as shown in Fig. 6.

Fig. 6. The demonstration of the trading phase

5

Conclusions

In this paper, we show the implementation of our proposed scheme [9] using the open source java pairing library. In the near future, we will build a private cloud using Microsoft’s Windows Server Hyper-V [8], and related cloud packages or Hadoop[5][6] and then port our implemented system to our private cloud to test the efficiency and high availability.

References 1. A. Weiss, ”Computing in the Clouds,” netWorker, Vol. 11, No. 4, pp. 16-25, 2007. 2. D. L. Chaum, ”Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms,” Communications of the ACM, Vol. 24, No. 2, pp. 84-88, 1981. 3. D. Meffert, Bilinear Pairings in Cryptography,” Master thesis, 2009. 4. G. Boss, P. Malladi, D. Quan, L. Legregni, and H. Hall, ”Cloud Computing,” IBM, 2007. 5. J. Guijarro, S. Loughran, and P. Castagna, ”Hadoop and beyond,” HP Labs, Bristol (UK), 2008. 6. The Apache Software Foundation, ”Hadoop Map-Reduce Tutorial,” 2007. 7. W. A. Warr, ”Cloud Computing,” Wendy Warr and Associates, 2009. 8. Wallisellen, ”Microsoft Hyper-V,” 2008. 9. W. Juang and Y. Shue, ”A Secure and Privacy Protection Digital Goods Trading Scheme in Cloud Computing,” International Computer Symposium (ICS 2010), pp. 288-293, IEEE Press, Taiwan, December 2010.

The Implementation of Secure and Efficient Digital ...

A cloud server can make a decision that some digital goods contain specific keywords assigned by the buyer, but can not know any information about the ...

654KB Sizes 4 Downloads 241 Views

Recommend Documents

Secure and Efficient Data Transmission.pdf
Page 1 of 5. Secure and Efficient Data Transmission for Cluster-Based. Wireless Sensor Networks. ABSTRACT: Secure data transmission is a critical issue for wireless sensor networks. (WSNs). Clustering is an effective and practical way to enhance the

Design of secure and energy-efficient cooperative video distribution ...
In a real-time video broadcast where multiple users are interested in the same content, mobile-to- mobile cooperation can be utilized to improve delivery efficiency and reduce network utilization. Under such cooperation, however, real-time video tran

Design of secure and energy-efficient cooperative video distribution ...
www.ijrit.com. ISSN 2001-5569. Design of secure and energy-efficient cooperative video distribution over wireless networks. 1 Divya J Alapatt, 2 Prof.Gayathri N.

Efficient Repeated Implementation ... - Faculty of Economics
Consider regime ̂R defined in Section 4.2 of LS. ..... Define ¯g = (M,ψ) as the following mechanism: Mi = .... strategy bi except that at (ht,θt) it reports z + 1.

Efficient Repeated Implementation
the Office of the Econometric Society (contact information may be found at the website ... 79, No. 6 (November, 2011), 1967–1994. EFFICIENT REPEATED .... hind the virtual implementation literature to demonstrate that in a continuous.

Efficient Repeated Implementation: Supplementary Material
strategy bi except that at (ht,θt) it reports z + 1. Note from the definition of mechanism g∗ and the transition rules of R∗ that such a deviation at (ht,θt) does not ...

Efficient Repeated Implementation
‡Faculty of Economics, Cambridge, CB3 9DD, United Kingdom; Hamid. ... A number of applications naturally fit this description. In repeated voting or .... behind the virtual implementation literature to demonstrate that, in a continuous time,.

Efficient Repeated Implementation
[email protected] ..... at,θ ∈ A is the outcome implemented in period t and state θ. Let A∞ denote the set ... t=1Ht. A typical history of mechanisms and.

Enabling And Secure Efficient Ranked Keyword Search Over ...
... searchable encryption, order-preserving mapping, confidential data, cloud computing. ✦ ... management, universal data access with independent ..... Enabling And Secure Efficient Ranked Keyword Search Over Outsourced Cloud Data.pdf.

Enabling Secure and Efficient Ranked Keyword ... - IJRIT
Abstract—Cloud computing economically enables the paradigm of data service outsourcing. However, to protect data privacy, sensitive cloud data has to be ...

An Efficient and Secure User Revocation Scheme in ...
a set of custom simulations built in Java. In the following, we detail .... fine-grained data access control in cloud computing,” in INFOCOM,. 2010, pp. 534–542.

Efficient Adaptively Secure IBBE from the SXDH ... - CSE IIT Kgp
The ABE scheme can be specialised to obtain an IBBE system with constant sized ... product encryption have been omitted due to reasons explained earlier.

Enabling Secure and Efficient Ranked Keyword ... - IJRIT
the problem of secure ranked keyword search over encrypted cloud data. Ranked search greatly enhances system usability by enabling search result relevance ...

Secure and Efficient Route Discovery by selecting ...
*[email protected]. ** [email protected] ... networks are expected to play vital role in future civilian and military settings, being useful to provide communication support where no fixed .... The aim of the message exchange is collect infor

Digital Marketing: Strategy, Implementation and ...
These are the essential ingredients of a digital marketing strategy and they will help you plan manage .... Simply Sign Up to one of our plans and start browsing.

Efficient Adaptively Secure IBBE from the SXDH ... - CSE IIT Kgp
applications including pay-TV, copyright protection of digital content and encrypted file systems. At a broad level, there are two settings for BE. In symmetric key ...