100 likes | 111 Views
Sakurai Lab at Kyushu University in Japan focuses on designing secure protocols and systems, including key-exchange protocols, fair-exchange protocols for e-contracts, secure data mining, privacy of RFID, and more.
E N D
Introduction of Sakurai Lab. Kyushu Univ. JAPAN
ITSLAB (Information Technology & Security Laboratory) Address Department of Computer Science and Communication Engineering, Kyushu University, 6-10-1 Hakozaki, Higashi-ku, Fukuoka, Fukuoka 812-8581, Japan This building Kyushu Univ.
Topics of Researches • Design of Secure Protocols • Key-Exchange Protocol with ID protection (One-time ID) • Fair-Exchange Protocol for E-contract • Secure Data Mining • Design of Secure Systems • Anonymity in Peer-to-Peer Network • Privacy of RFID • Combine ID-based Cryptography to PKI • Anti-SPAM • Tools for Enhanced Computer Security • Software Obfuscation • Secure OS • Tools for Enhanced Network Security • Information Visualization to detect malicious behavior • Detection of Port-Scan
Key-Exchange Protocol • Establish a short-term key to achieve integrity and/or secrecy of following transaction In most existing works, • Leakage of User’s ID, DoS attack • Our approach: introduce One-time ID • Disposable ID used as substitution of (fixed) user's identity How to manage One-time ID ? model privacy and DoS-resiliency ? Shared Secret Shared Secret
Research of Secure RFID(Radio-Frequency Identification) • RFID tag is a small and inexpensive microchip that emits an identifier in response to query from nearby reader • Contactless physical-access cards • Automated toll payment • Inventory tags • Privacy concern (linkability, traceability) • We solve it by usinguniversal re-encryption to change information on RFID tags frequently • Improve a protocol proposed by Golle et al. (2004) to provide location privacy, and integrity of messages price of the suit shoe size ○○ yen in wallet
Privacy Preserving Data Mining • Data Mining • To discover some meaningful predictive information from large volumes of data Technical challenge: • Collaboration of different distributed parties without revealing private data • We have developed accurate model without access to precise information in data records • Privacy-preserving two-party K-mean clustering using cryptographic techniques without trusted third party Large Databases… Valuable knowledge found!!
Collaborations • ISIT, 2nd Laboratory, Japan • Center of Information Security Technology (CIST), Korea Univ., Korea • Chungnam Univ., Korea • Gwangju Institute of Science and Technology (GIST), Korea • Okayama Univ., Japan • Kyushu Institute Univ., Japan • Institute for InfocommResearch (I2R), Singapore • …
SSR Project (http://www.iisf.or.jp/SSR/) • Purpose • Investigation and research of security function of operating system • Member • Sakurai Lab. (Kyushu University) • In cooperation with GIST, Koreahttp://nwcl.gist.ac.kr/~seecure/index.html • Corporation members • Fujitsu, Hitachi, IBM, Toshiba, Toshiba Solution
Invited Researchers (2004-2005) • CIST members • Prof. Jongin Lim, Prof. Donghoon Lee, Yong Ho Kim, Jeong Jae Yu, Tae Hyun Kim, Hwa Yean Lee, … • GIST members • Jongyoul Park, Wook Shin, Hyung Chan Kim, Hyunjin Yoo, Jiho Cho • Prof. Man Young Rhee (Kyung Hee Univ.) • Prof. Mridul Nandi (Indian Statistical Institute) • Prof. Hyang-Sook Lee (Ewha Womans Univ.) • Dr. Guilin Wang (I2R) • …
http://itslab.csce.kyushu-u.ac.jp Website of ITSLAB