studi dan implementasi keamanan user privacy menggunakan cp-abe

11
Studi & Implementasi Keamanan User Privacy menggunakan CP-ABE Samsul Huda, Amang Sudarsono and Tri Harsono Politeknik Elektronika Negeri Surabaya

Upload: idsecconf

Post on 15-Apr-2017

412 views

Category:

Technology


0 download

TRANSCRIPT

Page 1: Studi dan Implementasi Keamanan User Privacy menggunakan CP-ABE

Studi & Implementasi Keamanan User Privacy menggunakan CP-ABESamsul Huda, Amang Sudarsono and Tri Harsono

Politeknik Elektronika Negeri Surabaya

Page 2: Studi dan Implementasi Keamanan User Privacy menggunakan CP-ABE

Profil

Name : Samsul HudaInstitution : Politeknik Elektronika Negeri Surabaya

Achievements :• Potential Paper on National Cryptography

Competition in Sekolah Tinggi Sandi Negara (2014)

• Samsul huda, amang sudarsono and mike yuliana, “Implementasi sistem pengamanan e-commerce,” in Indonesia Security Conference 2014 (IDSECCONF2014), 2014.

• Sritrusta sukaridhoto, yahya adi setiawan, edi wahyu widodo, samsul huda and nurul fahmi, “Development of MiniPhooBot for small medium business,” in Knowledge Creation and Intelligent Computing 2015 (KCIC2015), 2015, pp. 84-89.

Page 3: Studi dan Implementasi Keamanan User Privacy menggunakan CP-ABE

Road map

Background and Problems

Overview CP-ABE

System Overview

Implementation

Conclusion

Page 4: Studi dan Implementasi Keamanan User Privacy menggunakan CP-ABE

Background and Problems

Low Cost Long Distance

Fast Enough

unsecure from

interception.Cryptography • User----------- one to one

• Strength on complexity of algorithm and confidentiality of key

Page 5: Studi dan Implementasi Keamanan User Privacy menggunakan CP-ABE

Ciphertext-Policy Attribute-Based Encryption (CP-ABE)

CP-ABE was designed by Bethencourt, Waters, and Sahai as a means of allowing expressive and controlled access to encrypted files by defining a user’s key as a set of attributes, and authorizing decryption if these attributes satisfy an access tree.

Private key assigned to Attributes Chipertext assosiated with access policy Can decrypt only when attributes satisfy policy

Page 6: Studi dan Implementasi Keamanan User Privacy menggunakan CP-ABE

Overview CP-ABE

Setup

Decrypt

Keygen Encrypt

Delegate

Page 7: Studi dan Implementasi Keamanan User Privacy menggunakan CP-ABE

PKMSK

SKSamsul :“manager”“IT dept.”

SKHuda :“manager”“sales”

OR

IT dept. AND

manager marketing

Illustration

Page 8: Studi dan Implementasi Keamanan User Privacy menggunakan CP-ABE

OR

ANDIT Dept

Manager Marketing

Message

Enc

Access Policy

Message

DecCiphertext PK

SK

PK

Page 9: Studi dan Implementasi Keamanan User Privacy menggunakan CP-ABE

Specification of H/W

Specifiction RemarksSoftware GCC-4.7, gmp-5.1.1, pbc-lib-0.5.14,

glib2.34, openssl-1.0.1c

O/S Debian Linux kernel-3.5.0-17

CPU Intel core i3-370M 2.4 GHz

RAM 4GB DDR3

WiFi Acer InviLink™ Nplify™ 802.11b/g/n

Page 10: Studi dan Implementasi Keamanan User Privacy menggunakan CP-ABE

Results

Pre-processing phase

Processing phase

Process Time (ms)Setup 32.34KeyGen 26.02

 Process

Time(ms)

Sender Encryption 80.04Medium Transmission 99.64Receiver Decryption 100.12

Total time process 279,8

Page 11: Studi dan Implementasi Keamanan User Privacy menggunakan CP-ABE

Thank You

[email protected]