The present disclosure relates to data and information security and particularly to a system and method for proximity-based collaborative information security.
The past few decades have witnessed information explosion in human history. The advent of Internet of Things (IoT) and connected devices further contribute to the data deluge: data are being generated at an accelerated pace. More and more companies have started relying on “big data” to extract value and improve business performance. With customer data increasingly accessible online and frequent reports of data breaches, customers are more concerned about protecting their privacy and personal data than ever before.
Despite advances in cryptography, data or information security remains a big challenge in modern computing and people's daily lives. Data breaches and theft that happened to large corporations made national or international headlines dozens of times in the past couple of years, not to mention countless hacks and computer intrusions that are happening every day towards ordinary consumers. Even encrypted data is not bullet-proof and can be eventually breached in a finite amount of time with sufficient computing power.
Each trusted device 20 that receives its respective encrypted data subset then digitally signs the data subset now in its possession, and packages it with its meta data (i.e., data subset sequence number, the public key or the digital certificate of the person who signed the encrypted data subset, and the digest of the data subset), and stores the packaged data subset locally, as shown in blocks 32-38. The original data set is now split into N packages and resides in N trusted devices, where N is the number of devices that jointly hold all the encrypted data subsets.
It should be noted that the data-owner device 18 may optionally retain one of the encrypted data subsets itself, as shown in block 40. If that is the case, the data set should be divided into N+1 subsets, rather than just N subsets. There are multiple methods to partition a data set. One method is to simply divide the data set sequentially into N+1 subsets of various sizes. Another method is to divide the data set into blocks of fixed number of bytes (e.g. blocks of 4 bytes) and assign these data blocks to N+1 devices in a round-robin fashion until all the data blocks are assigned. Finally, the data-owner device 18 records the identities of the trusted devices that retain the data subsets paired with the associated sequence numbers of the data subsets, as shown in block 42.
In the reverse direction, illustrated in
Because the breach of all but one subset of data will not result in the compromise of the entire original data set, a malicious entity must obtain ALL the data stored in multiple trusted devices 20 in order to obtain the entire data set, which is a much more difficult task. For added security, access to data stored in other devices can only happen when all the devices are in close proximity of one another.
Accordingly, a cryptographic application can be developed to perform the data split, merger, distribution, and digital signing operations, in addition to the conventional encryption and decryption operations. This application is considered a proximity-based collaborative software because it requires all the involved devices to be physically close to one another in a fog network and collaborate in order for this approach to work.
It should be noted that not just the data-owner device 18, but any one of the trusted devices 20 that possess a data subset can recall all the data packages to merge and decrypt the data set as long as all the necessary authentications with involved parties can be successfully performed.
It should also be noted that the proximity-based collaborative information security system and method described herein can work with any encryption and authentication (digital signature) algorithms now known or to be developed, including Advanced Encryption Suite (AES), Rivest-Shamir-Adleman (RSA), etc., and that it may be implemented in many different scenarios and is not limited to IoT applications and fog networks.
This proximity-based collaborative information security idea can be extended to secure data transmission against eavesdropping. In order to transmit a set of data to a remote site, the entire data set can be first encrypted and split into multiple pieces, which are then transmitted to the destination over multiple, and possibly physically separated, communication channels. The transmitted data are merged back together at the receiving end before decryption. Eavesdropping of all but one communication channel will not result in the compromise of transmitted data.
Another area where this idea can be applied is proximity-based authentication, in which authentication can take place only when the authenticating devices are in close proximity with the devices to be authenticated. An example of the applicable domains is resource (e.g. systems, building, device) access.
Requiring all the trusted devices to be in close proximity of the data-owner device 18 to recover the protected data could limit data availability to certain extent. To achieve a balance between data availability and data confidentiality, the idea can be further generalized by introducing a level of redundancy to an original data set such that it can be partitioned among N nodes (N≧2) with at least P nodes (P is an integer between 2 and N) present, of which at least Q nodes (Q is an integer between 2 and P) must be in close proximity of one another, in order to recover the original data set. The N nodes can be a combination of clouds, IoT nodes, and devices in fog networks. The P nodes represent the minimal quorum needed to recover the original data set when a subset of them (Q nodes) are physically close to one another. The physical barrier among these Q nodes is what makes the information security mechanism more enhanced over the traditional approach.
An even stronger scheme would be to partition not only the data set but also the keys used for encryption and/or decryption among N nodes.
The inventive concepts described herein can be used in the following application domains:
Collaborative fog computing: a task cannot be performed unless all the parties each holding a partial data set are present in a fog network.
Secure data storage: data is encrypted and stored across multiple storage devices such as a smartphone, a PC, and a watch, and decryption can take place only when all these devices are in close proximity of one another.
Secure data transmission: data is first encrypted and split into multiple portions, which are then transmitted over multiple communication channels, and merged before decryption.
Data integrity check and validation: decryption operation is performed against a data set that is merged from encrypted data sets stored on multiple devices.
Order delivery and mobile payment: when an order is placed online, a confirmation code is sent to a user's mobile device. When the order is actually delivered, the delivery person must obtain and verify the confirmation from the device the user specified earlier to make sure the order is delivered to the right person at the right place.
Authentication: authentication can take place only when the authenticating devices are in close proximity with the devices to be authenticated.
Authorization: encrypted data sets are stored on multiple devices. Authorization can be achieved by giving access to a data set that a user controls.
Resource access (e.g., badge, garage, lock) and object and data matching (e.g., label, parked car finder, image matching): data sets to be matched are encrypted, digitally signed, and physically separated. When ready to match data sets, physically separated devices must be close to one another and merged data must be decrypted. If decryption fails, no match is found and no access shall be given.
The features of the present invention which are believed to be novel are set forth below with particularity in the appended claims. However, modifications, variations, and changes to the exemplary embodiments described above will be apparent to those skilled in the art, and the proximity-based collaborative information security system and method described herein thus encompasses such modifications, variations, and changes and are not limited to the specific embodiments described herein.
This patent application claims the benefit of U.S. Provisional Patent Application No. 62/308,211 filed on Mar. 14, 2016.
Number | Date | Country | |
---|---|---|---|
62308211 | Mar 2016 | US |