Introduction of Kyusyu Univ. Sakurai Lab.
Download
Report
Transcript Introduction of Kyusyu Univ. Sakurai Lab.
K
Y
U
S
H
U
U
N
I
V
E
R
S
I
T
Y
S
A
K
U
R
A
I
L
A
B
O
R
A
T
O
R
Y
Introduction of Sakurai Lab.
Kyushu Univ. JAPAN
1
ITSLAB
(Information Technology & Security Laboratory)
Address
K
Y
U
S
H
U
U
N
I
V
E
R
S
I
T
Y
S
A
K
U
R
A
I
Department of Computer Science and Communication Engineering,
Kyushu University,
6-10-1 Hakozaki, Higashi-ku, Fukuoka, Fukuoka 812-8581, Japan
L
A
B
O
R
A
T
O
R
Y
This building
Kyushu Univ.
2
Topics of Researches
• Design of Secure Protocols
K
Y
U
S
H
U
U
N
I
V
E
R
S
I
T
Y
S
A
K
U
R
A
I
L
A
B
O
R
A
T
O
R
Y
– Key-Exchange Protocol with ID protection (One-time ID)
– Fair-Exchange Protocol for E-contract
– Secure Data Mining
• Design of Secure Systems
–
–
–
–
Anonymity in Peer-to-Peer Network
Privacy of RFID
Combine ID-based Cryptography to PKI
Anti-SPAM
• Tools for Enhanced Computer Security
– Software Obfuscation
– Secure OS
• Tools for Enhanced Network Security
– Information Visualization to detect malicious behavior
– Detection of Port-Scan
3
Key-Exchange Protocol
K
Y
U
S
H
U
U
N
I
V
E
R
S
I
T
Y
• Establish a short-term key to achieve integrity
and/or secrecy of following transaction
S
A
K
U
R
A
I
L
A
B
O
R
A
T
O
R
Y
In most existing works,
Leakage of User’s ID, DoS attack
• Our approach: introduce One-time ID
– Disposable ID used as substitution of (fixed) user's identity
How to manage One-time ID ?
model privacy and DoS-resiliency ?
Shared
Secret
Shared
Secret
4
Research of Secure RFID
(Radio-Frequency Identification)
K
Y
U
S
H
U
U
N
I
V
E
R
S
I
T
Y
• RFID tag is a small and inexpensive microchip that emits
an identifier in response to query from nearby reader
S
A
K
U
R
A
I
L
A
B
O
R
A
T
O
R
Y
– Contactless physical-access cards
– Automated toll payment
– Inventory tags
• Privacy concern (linkability, traceability)
– We solve it by using universal re-encryption to change information
on RFID tags frequently
• Improve a protocol proposed by Golle et al. (2004) to provide location
privacy, and integrity of messages
price of
the suit
○○ yen
in wallet
shoe
size
5
Privacy Preserving Data Mining
Data Mining
K
Y
U
S
H
U
U
N
I
V
E
R
S
I
T
Y
S
A
K
U
R
A
I
L
A
B
O
R
A
T
O
R
Y
– To discover some meaningful predictive information
from large volumes of data
Technical challenge:
– Collaboration of different distributed parties without
revealing private data
• We have developed accurate model without
access to precise information in data records
– Privacy-preserving two-party K-mean clustering using
cryptographic techniques without trusted third party
6
Large Databases…
Valuable knowledge found!!
Collaborations
K
Y
U
S
H
U
U
N
I
V
E
R
S
I
T
Y
S
A
K
U
R
A
I
L
A
B
O
R
A
T
O
R
Y
• ISIT, 2nd Laboratory, Japan
• Center of Information Security Technology
(CIST), Korea Univ., Korea
• Chungnam Univ., Korea
• Gwangju Institute of Science and Technology
(GIST), Korea
• Okayama Univ., Japan
• Kyushu Institute Univ., Japan
• Institute for InfocommResearch (I2R), Singapore
• …
7
SSR Project (http://www.iisf.or.jp/SSR/)
K
Y
U
S
H
U
U
N
I
V
E
R
S
I
T
Y
S
A
K
U
R
A
I
L
A
B
O
R
A
T
O
R
Y
• Purpose
– Investigation and research of security function
of operating system
• Member
– Sakurai Lab. (Kyushu University)
– In cooperation with GIST, Korea
http://nwcl.gist.ac.kr/~seecure/index.html
– Corporation members
• Fujitsu, Hitachi, IBM, Toshiba, Toshiba Solution
8
Invited Researchers (2004-2005)
• CIST members
K
Y
U
S
H
U
U
N
I
V
E
R
S
I
T
Y
S
A
K
U
R
A
I
L
A
B
O
R
A
T
O
R
Y
– Prof. Jongin Lim, Prof. Donghoon Lee, Yong Ho Kim,
Jeong Jae Yu, Tae Hyun Kim, Hwa Yean Lee, …
• GIST members
– Jongyoul Park, Wook Shin, Hyung Chan Kim, Hyunjin
Yoo, Jiho Cho
•
•
•
•
•
Prof. Man Young Rhee (Kyung Hee Univ.)
Prof. Mridul Nandi (Indian Statistical Institute)
Prof. Hyang-Sook Lee (Ewha Womans Univ.)
Dr. Guilin Wang (I2R)
…
9
http://itslab.csce.kyushu-u.ac.jp
Website of ITSLAB
K
Y
U
S
H
U
U
N
I
V
E
R
S
I
T
Y
S
A
K
U
R
A
I
L
A
B
O
R
A
T
O
R
Y
10