SlideShare une entreprise Scribd logo
1  sur  32
Using Timed-Release Cryptography to
  Mitigate The Preservation Risk of
          Embargo Periods


         Rabia Haq, Michael L. Nelson
           Old Dominion University
                 Norfolk VA
         www.cs.odu.edu/~{rhaq,mln}




      2009 ACM/IEEE Joint Conference on Digital Libraries, Austin TX, June 15-19   1
Overview
• Embargo Periods
  – associated preservation risk interval
• Time-Locked Puzzle / Time Release
  Cryptography
• System Evaluation using mod_oai (resource
  harvesting using OAI-PMH)
  – Optimization Using Chunked Encryption
• Future Considerations
• Conclusion


            2009 ACM/IEEE Joint Conference on Digital Libraries, Austin TX, June 15-19   2
Journal Access Models –
                Romeo Colors*

• Red: Traditional subscription-based Access
   – Purchase-own model
• Yellow: Embargoed Access
   – Hybrid of traditional and open access
• Green: Self-authored Open Access
  – e.g., arVix.org, institutional repositories
• Gold: Free and Open Access Journals
  – e.g., PLoS Journals, www.doaj.org

                 * “Old” Romeo Colors, now green/blue/yellow/white;
                 see: http://www.sherpa.ac.uk/romeoinfo.html

              2009 ACM/IEEE Joint Conference on Digital Libraries, Austin TX, June 15-19   3
Embargoed Access
• Paid access (red) for some time interval,
  then the content becomes open (gold)
  – current issue(s) cost $
  – previous issues are free
• We’ll assume: gold >= green > yellow > red
• Note: inverse of typical online newspaper
  model of: current is free, archived content
  costs $.

          2009 ACM/IEEE Joint Conference on Digital Libraries, Austin TX, June 15-19   4
Who Uses Embargoes?
• 24% of PubMed Central (PMC) titles
  embargoed
• The New England Journal of Medicine
  – embargoed for 6 months
• EBMO Journal
  – embargoed for 12 months




         2009 ACM/IEEE Joint Conference on Digital Libraries, Austin TX, June 15-19   5
Preservation Risk Interval:
          (A Hypothetical, Non-Topical Example)

• Journal of UT Football Non-Conference
  Scheduling is embargoed for 6 months
  – sample article “Why scheduling Florida Atlantic, UTEP, Rice &
    Arkansas is not a national championship schedule”
  – previous volumes (e.g., 2008, 2007) are freely available
  – issues 1--6 of current volume are currently for subscribers only
  – 6 month “sliding window”: when issue 7 comes out on July1,
    issue 1 becomes freely available
• Now imagine Mack Brown issues a cease &
  desist order to JUTFNS on June 30
  – what happens to volume 2009, issues 1-6? Will they
    ever be available to non-subscribers?

              2009 ACM/IEEE Joint Conference on Digital Libraries, Austin TX, June 15-19   6
Current Solutions
• LOCKSS (CLOCKSS): www.lockss.org
  – local, cooperating caches between
    subscribers (i.e., libraries)
  – http://www.clockss.org/clockss/Triggered_Content
• Portico: www.portico.org
  – trusted third party archive (i.e., neither library
    nor publisher)
  – http://www.portico.org/news/trigger.html


            2009 ACM/IEEE Joint Conference on Digital Libraries, Austin TX, June 15-19   7
Can We Use Lazy Preservation?
• We’ve already shown by using IA, search
  engine caches, etc. we can reconstruct
  public web sites after they’ve been lost
  (McCown, 2007)
• For embargoed content, we could expose
  encrypted content that is embargoed
  – but how can we prevent bad guys™ from
   using zombie farms to break the encryption
   before the embargo period is up?
          2009 ACM/IEEE Joint Conference on Digital Libraries, Austin TX, June 15-19   8
Timed-Release Cryptology

• Time-Lock Puzzle (TLP) Creation
  – Data decryption non-parallelizable
  – Serial computation required to break puzzle
  – Data locked for predetermined time-period
      • not self-unlocking -- still requires computation to unlock
• Used in MIT/LCS35 Time Lock Puzzle
  – http://people.csail.mit.edu/rivest/lcs35-puzzle-description.txt
  – idea: you could have started in 1999 (with your 1999 computer)
    and worked for 35 years… OR you can wait until 2033, buy a
    new computer and work for 1 year

                           rewards procrastination!
              2009 ACM/IEEE Joint Conference on Digital Libraries, Austin TX, June 15-19   9
“Regular” RSA
Picking values:                                          “Brute Force” Attacks:

•   n=p*q                                                •     need to factor n (which is easier
•   φ(n)=(p-1)(q-1), then                                      than trying all values of d)
    “throw away” p & q                                   •     simple soln: try all primes from 1 .. √n
•   pick e coprime to φ(n)
•   pick d s.t. d*e≡1 mod(φ(n))                          helping the attacker:
                                                            - adding k computers reduces the time
public key = (n,e)                                            to break by 1/k
private key = (n,d)                                         - they might get lucky and get it on their
                                                              first shot!
Encryption
   c = me (mod n)                                        more info:
                                                         http://www.cl.cam.ac.uk/users/rnc1/brute.html
Decryption                                               http://axion.physics.ubc.ca/pgp-attack.html
  m = cd (mod n)

                  2009 ACM/IEEE Joint Conference on Digital Libraries, Austin TX, June 15-19             10
Time Lock Puzzle
Picking values:                                                  Attacking:

•    n=p*q                                                       •      repeated squarings of a is faster than
•    φ(n)=(p-1)(q-1), then                                              factoring n -- also not known to be
     “throw away” p & q                                                 parallelizable! (Rivest, 1996)
• t=TS
                                                                 • demo: n=253 (i.e., p=11,q=23), t=10,
• pick some random key k,                                        w=
  cm = RC5(k,m)                                                        1
                                                                     2(2 ) = 22 = 4 (mod 253)
• pick random a, 1<a<n                                                  2
                                                                     2(2 ) = 42 = 16 (mod 253)
                                                                        3
                                                                     2(2 ) = 162 = 3 (mod 253)
• w= a2t (mod n)                                                        4
                                                                     2(2 ) = 32 = 9 (mod 253)
• ck = k ⊕ w                                                            5
                                                                     2(2 ) = 92 = 81 (mod 253)
                                                                        6
puzzle = (n,a,t,ck,cm)                                               2(2 ) = 812 = 236 (mod 253)
                                                                        7
                                                                     2(2 ) = 2362 = 36 (mod 253)
                                                                        8
actually, in our version we skip step 4                              2(2 ) = 362 = 31 (mod 253)
                                                                        9
and define step 7 as: z = m ⊕ w                                      2(2 ) = 312 = 202 (mod 253)
puzzle = (n,t,z)                                                        10
                                                                     2(2 ) = 2022 = 71 (mod 253)
                          2009 ACM/IEEE Joint Conference on Digital Libraries, Austin TX, June 15-19        11
Implementation: mod_oai, CRATE
• Both based on (Smith, 2008)
• mod_oai
  – an Apache module providing OAI-PMH functionality
    for an entire web site not just, for example, records in
    an institutional repository
• CRATE
  – a model for encoding resource + associated metadata
  – implemented using MPEG-21 DIDL complex object
    format


            2009 ACM/IEEE Joint Conference on Digital Libraries, Austin TX, June 15-19   12
mod_oai mechanics
 Integrate OAI-PMH functionality into the web server itself…
         1.       Use mod_oai
                   •    an Apache 2.0 module
                   •    automatically answers OAI-PMH requests for an http server
                   •    written in C
                   •    respects values in .htaccess, httpd.conf
         2.       Install mod_oai on http://www.foo.edu/
         3.       Define baseURL: http://www.foo.edu/modoai

 →       Result: web harvesting with OAI-PMH semantics (e.g., from, until, sets)



http://www.foo.edu/modoai?verb=ListRecords&metdataPrefix=oai_didl&from=2004-09-15&set=mime:video:mpeg



From site foo,                                                                                dating from 9/15/2004 through today
                                     Give me all resources
                 Using OAI-PMH
                                                            And their preservation metadata                        that are MIME type video-MPEG




                                 2009 ACM/IEEE Joint Conference on Digital Libraries, Austin TX, June 15-19                                13
OAI-PMH Data Model




 2009 ACM/IEEE Joint Conference on Digital Libraries, Austin TX, June 15-19   14
MPEG-21 DIDL Resource Structure




      2009 ACM/IEEE Joint Conference on Digital Libraries, Austin TX, June 15-19   15
An Active Repository




 2009 ACM/IEEE Joint Conference on Digital Libraries, Austin TX, June 15-19   16
A Dying Repository




Records e1, f2, g3 are recoverable; record h is lost.
            2009 ACM/IEEE Joint Conference on Digital Libraries, Austin TX, June 15-19   17
Dynamic Time-Locked Record
        Embargo within mod_oai
• Identification
   – Calculation of remaining record embargo period
• Encryption
   – Calculating record time-lock puzzle complexity
   – Time-Lock Puzzle creation
• Encapsulation
   – exploiting flexibility of MPEG-21 DIDL format to
     encapsulate encrypted resources and related
     information



             2009 ACM/IEEE Joint Conference on Digital Libraries, Austin TX, June 15-19   18
Identification



                                                                             update OAI-PMH datestamp
                                                                             as time lock becomes weaker




2009 ACM/IEEE Joint Conference on Digital Libraries, Austin TX, June 15-19                                 19
Encryption
• Modification of LCS35 Time Capsule Crypto-Puzzle to
  use time lock on entire resource (not just the key)
   – as per code provided at: http://people.csail.mit.edu/rivest/lcs35-
     puzzle-description.txt
• Input: timeUnit (controls puzzle complexity)
• Compute:
   u = 2t mod((p-1)(q-1))
   w = (2u) mod(n)
   z = resource ⊕ w
• Output: n, t, z


               2009 ACM/IEEE Joint Conference on Digital Libraries, Austin TX, June 15-19   20
Encapsulation
This version of the record is 7 of 12 separate encryptions, each of which is
successively easier to break. It will take approximately 3650 hours of
computation to break this time-lock.
The next update will be available on 2008-01-16T20:56:15Z.
Crypto-Puzzle for LCS35 Time Capsule.
Puzzle parameters (all in decimal): n = 398399 t = 264600000.
z =
313239174518025552773909388461801735302388...
893375562056859914777144518879488573607906...
742437030171894184996228671834511813009803...
(many lines deleted for space)
To solve the puzzle, first compute w = 2*2*t (mod n).
Then exclusive-or the result with z.
(Right-justify the two strings first).
The result is the secret message (8 bits per character).




            2009 ACM/IEEE Joint Conference on Digital Libraries, Austin TX, June 15-19   21
Selecting Appropriate Values of t
• Time required to break puzzle dependent on processor
  speed
• Given our projected short embargo period (6-24
  months), we made a simplifying assumption that Moore’s
  law increases linearly (not exponentially)
   – idea: in the next few months, you’re more likely to see something
     like: 2Ghz→2.2Ghz, not 2Ghz→4Ghz
• recall: t = number of squarings
   –   t=T*S
   –   S=3000 squarings/second, T=1800 seconds *tU,
   –   tU = f(machine speed) * embargolength
   –   t=3000*1800*tU


               2009 ACM/IEEE Joint Conference on Digital Libraries, Austin TX, June 15-19   22
Effect of Computation Speed on
                       embargolength

• We broke time lock
  puzzles on four
  class of machines
  (in GHz):
  –   1.8 (5 nodes)
  –   1.6 (26 nodes)
  –   1 (1 node)
  –   0.75 (1 node)




                2009 ACM/IEEE Joint Conference on Digital Libraries, Austin TX, June 15-19   23
Picking t With Empirical Data



using 1Ghz machine as baseline,
projecting for a 2.5 Ghz machine,
and locking for 2 years (63115200 seconds):
   • tU = 63115200 * 2.5 / (1727.61) = 9133
   • t = 3000 * 1800 * 9133
        2009 ACM/IEEE Joint Conference on Digital Libraries, Austin TX, June 15-19   24
Experimental Evaluation
• Embargolength = 365 days
• Embargodecrement = 12
• Test website
  – 525 files
  – 17.3 MB data
  – 63% text files
  – Average file size = 33KB


          2009 ACM/IEEE Joint Conference on Digital Libraries, Austin TX, June 15-19   25
Harvesting Time: Locked & Unlocked




       2009 ACM/IEEE Joint Conference on Digital Libraries, Austin TX, June 15-19   26
O(n2) time to create time-lock puzzle




       2009 ACM/IEEE Joint Conference on Digital Libraries, Austin TX, June 15-19   27
Solution: Break Files Into “Chunks”
• Size of file exponentially increases lock-time
• Idea: break file into series of small chunks
   – still O(n2), but with a much more favorable constant
• Lock-time on a 1.8 GHz machine
     time_to_lock(200 KB) = 13 sec
     time_to_lock(100 KB) = 3 sec

     200 KB = 100 KB + 100 KB
            = 3 sec + 3 sec
            = 6 sec
             2009 ACM/IEEE Joint Conference on Digital Libraries, Austin TX, June 15-19   28
10 KB Chunked Encryption in mod_oai




      2009 ACM/IEEE Joint Conference on Digital Libraries, Austin TX, June 15-19   29
MPEG-21 DIDL document With Chunks




  This record has been split into 10000-byte
  chunks for faster processing.
  This is part 1 of 7 chunks, with unlocked
  chunks to be reassembled in the specified order.




          2009 ACM/IEEE Joint Conference on Digital Libraries, Austin TX, June 15-19   30
Future Considerations
• Chunk size performance dependency
• Other optimization methods:
  – Parallel time-locking of resources
  – Data pre-locking
  – only time-lock encryption key, use other
    encryption methods on the original resource
    (as per original Rivest (1996), not as per
    http://people.csail.mit.edu/rivest/lcs35-puzzle-
    description.txt)


           2009 ACM/IEEE Joint Conference on Digital Libraries, Austin TX, June 15-19   31
Conclusions
• Suggest the use of time lock puzzles for
  dissemination of embargoed records
  – complement to other methods such as LOCKSS,
    Poritco, etc.
• Implemented and evaluated time lock puzzles in
  the mod_oai & CRATE environment
• Full paper:
  – http://doi.acm.org/10.1145/1555400.1555430
  – http://www.cs.odu.edu/~mln/pubs/jcdl09/jcdl09-time-lock.pdf



             2009 ACM/IEEE Joint Conference on Digital Libraries, Austin TX, June 15-19   32

Contenu connexe

Tendances

Homomorphic Encryption
Homomorphic EncryptionHomomorphic Encryption
Homomorphic EncryptionGöktuğ Serez
 
Engineering fast indexes (Deepdive)
Engineering fast indexes (Deepdive)Engineering fast indexes (Deepdive)
Engineering fast indexes (Deepdive)Daniel Lemire
 
To Swift 2...and Beyond!
To Swift 2...and Beyond!To Swift 2...and Beyond!
To Swift 2...and Beyond!Scott Gardner
 
Coscup2021-rust-toturial
Coscup2021-rust-toturialCoscup2021-rust-toturial
Coscup2021-rust-toturialWayne Tsai
 
Partial Homomorphic Encryption
Partial Homomorphic EncryptionPartial Homomorphic Encryption
Partial Homomorphic Encryptionsecurityxploded
 
VRP2013 - Comp Aspects VRP
VRP2013 - Comp Aspects VRPVRP2013 - Comp Aspects VRP
VRP2013 - Comp Aspects VRPVictor Pillac
 
Building a Big Data Machine Learning Platform
Building a Big Data Machine Learning PlatformBuilding a Big Data Machine Learning Platform
Building a Big Data Machine Learning PlatformCliff Click
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to CryptographyDavid Evans
 
Coscup2021 - useful abstractions at rust and it's practical usage
Coscup2021 - useful abstractions at rust and it's practical usageCoscup2021 - useful abstractions at rust and it's practical usage
Coscup2021 - useful abstractions at rust and it's practical usageWayne Tsai
 
ASFWS 2012 - Hash-flooding DoS reloaded: attacks and defenses par Jean-Philip...
ASFWS 2012 - Hash-flooding DoS reloaded: attacks and defenses par Jean-Philip...ASFWS 2012 - Hash-flooding DoS reloaded: attacks and defenses par Jean-Philip...
ASFWS 2012 - Hash-flooding DoS reloaded: attacks and defenses par Jean-Philip...Cyber Security Alliance
 
Intro to Rust from Applicative / NY Meetup
Intro to Rust from Applicative / NY MeetupIntro to Rust from Applicative / NY Meetup
Intro to Rust from Applicative / NY Meetupnikomatsakis
 
The Effect of Hierarchical Memory on the Design of Parallel Algorithms and th...
The Effect of Hierarchical Memory on the Design of Parallel Algorithms and th...The Effect of Hierarchical Memory on the Design of Parallel Algorithms and th...
The Effect of Hierarchical Memory on the Design of Parallel Algorithms and th...David Walker
 
Scala meetup - Intro to spark
Scala meetup - Intro to sparkScala meetup - Intro to spark
Scala meetup - Intro to sparkJavier Arrieta
 
Grand Central Dispatch - iOS Conf SG 2015
Grand Central Dispatch - iOS Conf SG 2015Grand Central Dispatch - iOS Conf SG 2015
Grand Central Dispatch - iOS Conf SG 2015Ben Asher
 
Rust: Reach Further (from QCon Sao Paolo 2018)
Rust: Reach Further (from QCon Sao Paolo 2018)Rust: Reach Further (from QCon Sao Paolo 2018)
Rust: Reach Further (from QCon Sao Paolo 2018)nikomatsakis
 

Tendances (20)

Homomorphic Encryption
Homomorphic EncryptionHomomorphic Encryption
Homomorphic Encryption
 
Proofs of Work
Proofs of WorkProofs of Work
Proofs of Work
 
Bitcoin Script
Bitcoin ScriptBitcoin Script
Bitcoin Script
 
Engineering fast indexes (Deepdive)
Engineering fast indexes (Deepdive)Engineering fast indexes (Deepdive)
Engineering fast indexes (Deepdive)
 
To Swift 2...and Beyond!
To Swift 2...and Beyond!To Swift 2...and Beyond!
To Swift 2...and Beyond!
 
Coscup2021-rust-toturial
Coscup2021-rust-toturialCoscup2021-rust-toturial
Coscup2021-rust-toturial
 
Cryptography
CryptographyCryptography
Cryptography
 
Partial Homomorphic Encryption
Partial Homomorphic EncryptionPartial Homomorphic Encryption
Partial Homomorphic Encryption
 
VRP2013 - Comp Aspects VRP
VRP2013 - Comp Aspects VRPVRP2013 - Comp Aspects VRP
VRP2013 - Comp Aspects VRP
 
Building a Big Data Machine Learning Platform
Building a Big Data Machine Learning PlatformBuilding a Big Data Machine Learning Platform
Building a Big Data Machine Learning Platform
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
Coscup2021 - useful abstractions at rust and it's practical usage
Coscup2021 - useful abstractions at rust and it's practical usageCoscup2021 - useful abstractions at rust and it's practical usage
Coscup2021 - useful abstractions at rust and it's practical usage
 
ASFWS 2012 - Hash-flooding DoS reloaded: attacks and defenses par Jean-Philip...
ASFWS 2012 - Hash-flooding DoS reloaded: attacks and defenses par Jean-Philip...ASFWS 2012 - Hash-flooding DoS reloaded: attacks and defenses par Jean-Philip...
ASFWS 2012 - Hash-flooding DoS reloaded: attacks and defenses par Jean-Philip...
 
同態加密
同態加密同態加密
同態加密
 
Intro to Rust from Applicative / NY Meetup
Intro to Rust from Applicative / NY MeetupIntro to Rust from Applicative / NY Meetup
Intro to Rust from Applicative / NY Meetup
 
The Effect of Hierarchical Memory on the Design of Parallel Algorithms and th...
The Effect of Hierarchical Memory on the Design of Parallel Algorithms and th...The Effect of Hierarchical Memory on the Design of Parallel Algorithms and th...
The Effect of Hierarchical Memory on the Design of Parallel Algorithms and th...
 
Scala meetup - Intro to spark
Scala meetup - Intro to sparkScala meetup - Intro to spark
Scala meetup - Intro to spark
 
Grand Central Dispatch - iOS Conf SG 2015
Grand Central Dispatch - iOS Conf SG 2015Grand Central Dispatch - iOS Conf SG 2015
Grand Central Dispatch - iOS Conf SG 2015
 
Sha3
Sha3Sha3
Sha3
 
Rust: Reach Further (from QCon Sao Paolo 2018)
Rust: Reach Further (from QCon Sao Paolo 2018)Rust: Reach Further (from QCon Sao Paolo 2018)
Rust: Reach Further (from QCon Sao Paolo 2018)
 

En vedette

Can’t Find Your 404s?
Can’t Find Your 404s?Can’t Find Your 404s?
Can’t Find Your 404s?Michael Nelson
 
Memento: TimeGates, TimeBundles, and TimeMaps
Memento: TimeGates, TimeBundles, and TimeMapsMemento: TimeGates, TimeBundles, and TimeMaps
Memento: TimeGates, TimeBundles, and TimeMapsMichael Nelson
 
Memento: Time Travel for the Web
Memento: Time Travel for the WebMemento: Time Travel for the Web
Memento: Time Travel for the WebMichael Nelson
 
Memento: Time Travel for the Web
Memento: Time Travel for the WebMemento: Time Travel for the Web
Memento: Time Travel for the WebMichael Nelson
 
(Re-) Discovering Lost Web Pages
(Re-) Discovering Lost Web Pages(Re-) Discovering Lost Web Pages
(Re-) Discovering Lost Web PagesMichael Nelson
 
Memento: Time Travel for the Web
Memento: Time Travel for the WebMemento: Time Travel for the Web
Memento: Time Travel for the WebMichael Nelson
 
My Point of View: Michael L. Nelson Web Archiving Cooperative
My Point of View: Michael L. Nelson  Web Archiving CooperativeMy Point of View: Michael L. Nelson  Web Archiving Cooperative
My Point of View: Michael L. Nelson Web Archiving CooperativeMichael Nelson
 
Synchronicity: Just-In-Time Discovery of Lost Web Pages
Synchronicity: Just-In-Time Discovery of Lost Web PagesSynchronicity: Just-In-Time Discovery of Lost Web Pages
Synchronicity: Just-In-Time Discovery of Lost Web PagesMichael Nelson
 
Music Video Redundancy and Half-Life in YouTube
Music Video Redundancy and Half-Life in YouTubeMusic Video Redundancy and Half-Life in YouTube
Music Video Redundancy and Half-Life in YouTubeMichael Nelson
 
A Research Agenda for "Obsolete Data or Resources"
A Research Agenda for "Obsolete Data or Resources"A Research Agenda for "Obsolete Data or Resources"
A Research Agenda for "Obsolete Data or Resources"Michael Nelson
 
Review of Web Archiving
Review of Web ArchivingReview of Web Archiving
Review of Web ArchivingMichael Nelson
 
Tools for A Preservation Ready Web
Tools for A Preservation Ready WebTools for A Preservation Ready Web
Tools for A Preservation Ready WebMichael Nelson
 
(Re-)Discovering Lost Web Pages
(Re-)Discovering Lost Web Pages(Re-)Discovering Lost Web Pages
(Re-)Discovering Lost Web PagesMichael Nelson
 
The Open Archives Initiative
The Open Archives InitiativeThe Open Archives Initiative
The Open Archives InitiativeMichael Nelson
 
OAI-ORE: The Open Archives Initiative Object Reuse and Exchange Project
OAI-ORE:  The Open Archives Initiative  Object Reuse and Exchange ProjectOAI-ORE:  The Open Archives Initiative  Object Reuse and Exchange Project
OAI-ORE: The Open Archives Initiative Object Reuse and Exchange ProjectMichael Nelson
 
Why Care About the Past?
Why Care About the Past?Why Care About the Past?
Why Care About the Past?Michael Nelson
 

En vedette (16)

Can’t Find Your 404s?
Can’t Find Your 404s?Can’t Find Your 404s?
Can’t Find Your 404s?
 
Memento: TimeGates, TimeBundles, and TimeMaps
Memento: TimeGates, TimeBundles, and TimeMapsMemento: TimeGates, TimeBundles, and TimeMaps
Memento: TimeGates, TimeBundles, and TimeMaps
 
Memento: Time Travel for the Web
Memento: Time Travel for the WebMemento: Time Travel for the Web
Memento: Time Travel for the Web
 
Memento: Time Travel for the Web
Memento: Time Travel for the WebMemento: Time Travel for the Web
Memento: Time Travel for the Web
 
(Re-) Discovering Lost Web Pages
(Re-) Discovering Lost Web Pages(Re-) Discovering Lost Web Pages
(Re-) Discovering Lost Web Pages
 
Memento: Time Travel for the Web
Memento: Time Travel for the WebMemento: Time Travel for the Web
Memento: Time Travel for the Web
 
My Point of View: Michael L. Nelson Web Archiving Cooperative
My Point of View: Michael L. Nelson  Web Archiving CooperativeMy Point of View: Michael L. Nelson  Web Archiving Cooperative
My Point of View: Michael L. Nelson Web Archiving Cooperative
 
Synchronicity: Just-In-Time Discovery of Lost Web Pages
Synchronicity: Just-In-Time Discovery of Lost Web PagesSynchronicity: Just-In-Time Discovery of Lost Web Pages
Synchronicity: Just-In-Time Discovery of Lost Web Pages
 
Music Video Redundancy and Half-Life in YouTube
Music Video Redundancy and Half-Life in YouTubeMusic Video Redundancy and Half-Life in YouTube
Music Video Redundancy and Half-Life in YouTube
 
A Research Agenda for "Obsolete Data or Resources"
A Research Agenda for "Obsolete Data or Resources"A Research Agenda for "Obsolete Data or Resources"
A Research Agenda for "Obsolete Data or Resources"
 
Review of Web Archiving
Review of Web ArchivingReview of Web Archiving
Review of Web Archiving
 
Tools for A Preservation Ready Web
Tools for A Preservation Ready WebTools for A Preservation Ready Web
Tools for A Preservation Ready Web
 
(Re-)Discovering Lost Web Pages
(Re-)Discovering Lost Web Pages(Re-)Discovering Lost Web Pages
(Re-)Discovering Lost Web Pages
 
The Open Archives Initiative
The Open Archives InitiativeThe Open Archives Initiative
The Open Archives Initiative
 
OAI-ORE: The Open Archives Initiative Object Reuse and Exchange Project
OAI-ORE:  The Open Archives Initiative  Object Reuse and Exchange ProjectOAI-ORE:  The Open Archives Initiative  Object Reuse and Exchange Project
OAI-ORE: The Open Archives Initiative Object Reuse and Exchange Project
 
Why Care About the Past?
Why Care About the Past?Why Care About the Past?
Why Care About the Past?
 

Similaire à Using Timed-Release Cryptography to Mitigate Preservation Risk of Embargo Periods

Coq to Rubyによる証明駆動開発@名古屋ruby会議02
Coq to Rubyによる証明駆動開発@名古屋ruby会議02Coq to Rubyによる証明駆動開発@名古屋ruby会議02
Coq to Rubyによる証明駆動開発@名古屋ruby会議02Hiroki Mizuno
 
On-Homomorphic-Encryption-and-Secure-Computation.ppt
On-Homomorphic-Encryption-and-Secure-Computation.pptOn-Homomorphic-Encryption-and-Secure-Computation.ppt
On-Homomorphic-Encryption-and-Secure-Computation.pptssuser85a33d
 
Elliptic curve cryptography and zero knowledge proof
Elliptic curve cryptography and zero knowledge proofElliptic curve cryptography and zero knowledge proof
Elliptic curve cryptography and zero knowledge proofNimish Joseph
 
Elliptic Curve Cryptography and Zero Knowledge Proof
Elliptic Curve Cryptography and Zero Knowledge ProofElliptic Curve Cryptography and Zero Knowledge Proof
Elliptic Curve Cryptography and Zero Knowledge ProofArunanand Ta
 
Paris data-geeks-2013-03-28
Paris data-geeks-2013-03-28Paris data-geeks-2013-03-28
Paris data-geeks-2013-03-28Ted Dunning
 
TIM: Large-scale Energy Forecasting in Julia
TIM: Large-scale Energy Forecasting in JuliaTIM: Large-scale Energy Forecasting in Julia
TIM: Large-scale Energy Forecasting in JuliaGapData Institute
 
Challenging Web-Scale Graph Analytics with Apache Spark
Challenging Web-Scale Graph Analytics with Apache SparkChallenging Web-Scale Graph Analytics with Apache Spark
Challenging Web-Scale Graph Analytics with Apache SparkDatabricks
 
Challenging Web-Scale Graph Analytics with Apache Spark with Xiangrui Meng
Challenging Web-Scale Graph Analytics with Apache Spark with Xiangrui MengChallenging Web-Scale Graph Analytics with Apache Spark with Xiangrui Meng
Challenging Web-Scale Graph Analytics with Apache Spark with Xiangrui MengDatabricks
 
Fast Single-pass K-means Clusterting at Oxford
Fast Single-pass K-means Clusterting at Oxford Fast Single-pass K-means Clusterting at Oxford
Fast Single-pass K-means Clusterting at Oxford MapR Technologies
 
Python for Chemistry
Python for ChemistryPython for Chemistry
Python for Chemistryguest5929fa7
 
Python for Chemistry
Python for ChemistryPython for Chemistry
Python for Chemistrybaoilleach
 
IOEfficientParalleMatrixMultiplication_present
IOEfficientParalleMatrixMultiplication_presentIOEfficientParalleMatrixMultiplication_present
IOEfficientParalleMatrixMultiplication_presentShubham Joshi
 
Oxford 05-oct-2012
Oxford 05-oct-2012Oxford 05-oct-2012
Oxford 05-oct-2012Ted Dunning
 
Web-Scale Graph Analytics with Apache® Spark™
Web-Scale Graph Analytics with Apache® Spark™Web-Scale Graph Analytics with Apache® Spark™
Web-Scale Graph Analytics with Apache® Spark™Databricks
 

Similaire à Using Timed-Release Cryptography to Mitigate Preservation Risk of Embargo Periods (20)

Class3
Class3Class3
Class3
 
Coq to Rubyによる証明駆動開発@名古屋ruby会議02
Coq to Rubyによる証明駆動開発@名古屋ruby会議02Coq to Rubyによる証明駆動開発@名古屋ruby会議02
Coq to Rubyによる証明駆動開発@名古屋ruby会議02
 
On-Homomorphic-Encryption-and-Secure-Computation.ppt
On-Homomorphic-Encryption-and-Secure-Computation.pptOn-Homomorphic-Encryption-and-Secure-Computation.ppt
On-Homomorphic-Encryption-and-Secure-Computation.ppt
 
Elliptic curve cryptography and zero knowledge proof
Elliptic curve cryptography and zero knowledge proofElliptic curve cryptography and zero knowledge proof
Elliptic curve cryptography and zero knowledge proof
 
Elliptic Curve Cryptography and Zero Knowledge Proof
Elliptic Curve Cryptography and Zero Knowledge ProofElliptic Curve Cryptography and Zero Knowledge Proof
Elliptic Curve Cryptography and Zero Knowledge Proof
 
Paris data-geeks-2013-03-28
Paris data-geeks-2013-03-28Paris data-geeks-2013-03-28
Paris data-geeks-2013-03-28
 
TIM: Large-scale Energy Forecasting in Julia
TIM: Large-scale Energy Forecasting in JuliaTIM: Large-scale Energy Forecasting in Julia
TIM: Large-scale Energy Forecasting in Julia
 
lec16-memory.ppt
lec16-memory.pptlec16-memory.ppt
lec16-memory.ppt
 
Challenging Web-Scale Graph Analytics with Apache Spark
Challenging Web-Scale Graph Analytics with Apache SparkChallenging Web-Scale Graph Analytics with Apache Spark
Challenging Web-Scale Graph Analytics with Apache Spark
 
Challenging Web-Scale Graph Analytics with Apache Spark with Xiangrui Meng
Challenging Web-Scale Graph Analytics with Apache Spark with Xiangrui MengChallenging Web-Scale Graph Analytics with Apache Spark with Xiangrui Meng
Challenging Web-Scale Graph Analytics with Apache Spark with Xiangrui Meng
 
Fast Single-pass K-means Clusterting at Oxford
Fast Single-pass K-means Clusterting at Oxford Fast Single-pass K-means Clusterting at Oxford
Fast Single-pass K-means Clusterting at Oxford
 
Python for Chemistry
Python for ChemistryPython for Chemistry
Python for Chemistry
 
Python for Chemistry
Python for ChemistryPython for Chemistry
Python for Chemistry
 
Lecture6 rsa
Lecture6 rsaLecture6 rsa
Lecture6 rsa
 
IOEfficientParalleMatrixMultiplication_present
IOEfficientParalleMatrixMultiplication_presentIOEfficientParalleMatrixMultiplication_present
IOEfficientParalleMatrixMultiplication_present
 
Oxford 05-oct-2012
Oxford 05-oct-2012Oxford 05-oct-2012
Oxford 05-oct-2012
 
LCS35
LCS35LCS35
LCS35
 
ACM 2013-02-25
ACM 2013-02-25ACM 2013-02-25
ACM 2013-02-25
 
Web-Scale Graph Analytics with Apache® Spark™
Web-Scale Graph Analytics with Apache® Spark™Web-Scale Graph Analytics with Apache® Spark™
Web-Scale Graph Analytics with Apache® Spark™
 
Common Crypto Pitfalls
Common Crypto PitfallsCommon Crypto Pitfalls
Common Crypto Pitfalls
 

Plus de Michael Nelson

Web Archiving in the Year eaee1902f186819154789ee22ca30035
Web Archiving in the Year eaee1902f186819154789ee22ca30035Web Archiving in the Year eaee1902f186819154789ee22ca30035
Web Archiving in the Year eaee1902f186819154789ee22ca30035Michael Nelson
 
Uncertainty in replaying archived Twitter pages
Uncertainty in replaying archived Twitter pagesUncertainty in replaying archived Twitter pages
Uncertainty in replaying archived Twitter pagesMichael Nelson
 
Web Archives at the Nexus of Good Fakes and Flawed Originals
Web Archives at the Nexus of Good Fakes and Flawed OriginalsWeb Archives at the Nexus of Good Fakes and Flawed Originals
Web Archives at the Nexus of Good Fakes and Flawed OriginalsMichael Nelson
 
Web Archives at the Nexus of Good Fakes and Flawed Originals
Web Archives at the Nexus of Good Fakes and Flawed OriginalsWeb Archives at the Nexus of Good Fakes and Flawed Originals
Web Archives at the Nexus of Good Fakes and Flawed OriginalsMichael Nelson
 
Blockchain Can Not Be Used To Verify Replayed Archived Web Pages
Blockchain Can Not Be Used To Verify Replayed Archived Web PagesBlockchain Can Not Be Used To Verify Replayed Archived Web Pages
Blockchain Can Not Be Used To Verify Replayed Archived Web PagesMichael Nelson
 
Blockchain Can Not Be Used To Verify Replayed Archived Web Pages
Blockchain Can Not Be Used To Verify Replayed Archived Web PagesBlockchain Can Not Be Used To Verify Replayed Archived Web Pages
Blockchain Can Not Be Used To Verify Replayed Archived Web PagesMichael Nelson
 
Weaponized Web Archives: Provenance Laundering of Short Order Evidence
Weaponized Web Archives: Provenance Laundering of Short Order Evidence Weaponized Web Archives: Provenance Laundering of Short Order Evidence
Weaponized Web Archives: Provenance Laundering of Short Order Evidence Michael Nelson
 
Weaponized Web Archives: Provenance Laundering of Short Order Evidence
Weaponized Web Archives: Provenance Laundering of Short Order Evidence Weaponized Web Archives: Provenance Laundering of Short Order Evidence
Weaponized Web Archives: Provenance Laundering of Short Order Evidence Michael Nelson
 
Weaponized Web Archives: Provenance Laundering of Short Order Evidence
Weaponized Web Archives: Provenance Laundering of Short Order Evidence Weaponized Web Archives: Provenance Laundering of Short Order Evidence
Weaponized Web Archives: Provenance Laundering of Short Order Evidence Michael Nelson
 
Web Archiving Activities of ODU’s Web Science and Digital Library Research G...
Web Archiving Activities of ODU’s Web Science and Digital Library Research G...Web Archiving Activities of ODU’s Web Science and Digital Library Research G...
Web Archiving Activities of ODU’s Web Science and Digital Library Research G...Michael Nelson
 
Summarizing archival collections using storytelling techniques
Summarizing archival collections using storytelling techniquesSummarizing archival collections using storytelling techniques
Summarizing archival collections using storytelling techniquesMichael Nelson
 
The Memento Protocol and Research Issues With Web Archiving
The Memento Protocol and Research Issues With Web ArchivingThe Memento Protocol and Research Issues With Web Archiving
The Memento Protocol and Research Issues With Web ArchivingMichael Nelson
 
We Need Multiple, Independent Web Archives
We Need Multiple, Independent Web ArchivesWe Need Multiple, Independent Web Archives
We Need Multiple, Independent Web ArchivesMichael Nelson
 
Combining Heritrix and PhantomJS for Better Crawling of Pages with Javascript
Combining Heritrix and PhantomJS for Better Crawling of Pages with JavascriptCombining Heritrix and PhantomJS for Better Crawling of Pages with Javascript
Combining Heritrix and PhantomJS for Better Crawling of Pages with JavascriptMichael Nelson
 
Storytelling for Summarizing Collections in Web Archives
Storytelling for Summarizing Collections in Web ArchivesStorytelling for Summarizing Collections in Web Archives
Storytelling for Summarizing Collections in Web ArchivesMichael Nelson
 
Why We Need Multiple Archives
Why We Need Multiple ArchivesWhy We Need Multiple Archives
Why We Need Multiple ArchivesMichael Nelson
 
Combining Storytelling and Web Archives
Combining Storytelling and Web ArchivesCombining Storytelling and Web Archives
Combining Storytelling and Web ArchivesMichael Nelson
 
@WebSciDL PhD Student Project Reviews August 5&6, 2015
@WebSciDL PhD Student Project Reviews August 5&6, 2015@WebSciDL PhD Student Project Reviews August 5&6, 2015
@WebSciDL PhD Student Project Reviews August 5&6, 2015Michael Nelson
 
Evaluating the Temporal Coherence of Archived Pages
Evaluating the Temporal Coherence of Archived PagesEvaluating the Temporal Coherence of Archived Pages
Evaluating the Temporal Coherence of Archived PagesMichael Nelson
 
When Should I Make Preservation Copies of Myself?
When Should I Make Preservation Copies of Myself?�When Should I Make Preservation Copies of Myself?�
When Should I Make Preservation Copies of Myself?Michael Nelson
 

Plus de Michael Nelson (20)

Web Archiving in the Year eaee1902f186819154789ee22ca30035
Web Archiving in the Year eaee1902f186819154789ee22ca30035Web Archiving in the Year eaee1902f186819154789ee22ca30035
Web Archiving in the Year eaee1902f186819154789ee22ca30035
 
Uncertainty in replaying archived Twitter pages
Uncertainty in replaying archived Twitter pagesUncertainty in replaying archived Twitter pages
Uncertainty in replaying archived Twitter pages
 
Web Archives at the Nexus of Good Fakes and Flawed Originals
Web Archives at the Nexus of Good Fakes and Flawed OriginalsWeb Archives at the Nexus of Good Fakes and Flawed Originals
Web Archives at the Nexus of Good Fakes and Flawed Originals
 
Web Archives at the Nexus of Good Fakes and Flawed Originals
Web Archives at the Nexus of Good Fakes and Flawed OriginalsWeb Archives at the Nexus of Good Fakes and Flawed Originals
Web Archives at the Nexus of Good Fakes and Flawed Originals
 
Blockchain Can Not Be Used To Verify Replayed Archived Web Pages
Blockchain Can Not Be Used To Verify Replayed Archived Web PagesBlockchain Can Not Be Used To Verify Replayed Archived Web Pages
Blockchain Can Not Be Used To Verify Replayed Archived Web Pages
 
Blockchain Can Not Be Used To Verify Replayed Archived Web Pages
Blockchain Can Not Be Used To Verify Replayed Archived Web PagesBlockchain Can Not Be Used To Verify Replayed Archived Web Pages
Blockchain Can Not Be Used To Verify Replayed Archived Web Pages
 
Weaponized Web Archives: Provenance Laundering of Short Order Evidence
Weaponized Web Archives: Provenance Laundering of Short Order Evidence Weaponized Web Archives: Provenance Laundering of Short Order Evidence
Weaponized Web Archives: Provenance Laundering of Short Order Evidence
 
Weaponized Web Archives: Provenance Laundering of Short Order Evidence
Weaponized Web Archives: Provenance Laundering of Short Order Evidence Weaponized Web Archives: Provenance Laundering of Short Order Evidence
Weaponized Web Archives: Provenance Laundering of Short Order Evidence
 
Weaponized Web Archives: Provenance Laundering of Short Order Evidence
Weaponized Web Archives: Provenance Laundering of Short Order Evidence Weaponized Web Archives: Provenance Laundering of Short Order Evidence
Weaponized Web Archives: Provenance Laundering of Short Order Evidence
 
Web Archiving Activities of ODU’s Web Science and Digital Library Research G...
Web Archiving Activities of ODU’s Web Science and Digital Library Research G...Web Archiving Activities of ODU’s Web Science and Digital Library Research G...
Web Archiving Activities of ODU’s Web Science and Digital Library Research G...
 
Summarizing archival collections using storytelling techniques
Summarizing archival collections using storytelling techniquesSummarizing archival collections using storytelling techniques
Summarizing archival collections using storytelling techniques
 
The Memento Protocol and Research Issues With Web Archiving
The Memento Protocol and Research Issues With Web ArchivingThe Memento Protocol and Research Issues With Web Archiving
The Memento Protocol and Research Issues With Web Archiving
 
We Need Multiple, Independent Web Archives
We Need Multiple, Independent Web ArchivesWe Need Multiple, Independent Web Archives
We Need Multiple, Independent Web Archives
 
Combining Heritrix and PhantomJS for Better Crawling of Pages with Javascript
Combining Heritrix and PhantomJS for Better Crawling of Pages with JavascriptCombining Heritrix and PhantomJS for Better Crawling of Pages with Javascript
Combining Heritrix and PhantomJS for Better Crawling of Pages with Javascript
 
Storytelling for Summarizing Collections in Web Archives
Storytelling for Summarizing Collections in Web ArchivesStorytelling for Summarizing Collections in Web Archives
Storytelling for Summarizing Collections in Web Archives
 
Why We Need Multiple Archives
Why We Need Multiple ArchivesWhy We Need Multiple Archives
Why We Need Multiple Archives
 
Combining Storytelling and Web Archives
Combining Storytelling and Web ArchivesCombining Storytelling and Web Archives
Combining Storytelling and Web Archives
 
@WebSciDL PhD Student Project Reviews August 5&6, 2015
@WebSciDL PhD Student Project Reviews August 5&6, 2015@WebSciDL PhD Student Project Reviews August 5&6, 2015
@WebSciDL PhD Student Project Reviews August 5&6, 2015
 
Evaluating the Temporal Coherence of Archived Pages
Evaluating the Temporal Coherence of Archived PagesEvaluating the Temporal Coherence of Archived Pages
Evaluating the Temporal Coherence of Archived Pages
 
When Should I Make Preservation Copies of Myself?
When Should I Make Preservation Copies of Myself?�When Should I Make Preservation Copies of Myself?�
When Should I Make Preservation Copies of Myself?
 

Dernier

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 

Dernier (20)

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 

Using Timed-Release Cryptography to Mitigate Preservation Risk of Embargo Periods

  • 1. Using Timed-Release Cryptography to Mitigate The Preservation Risk of Embargo Periods Rabia Haq, Michael L. Nelson Old Dominion University Norfolk VA www.cs.odu.edu/~{rhaq,mln} 2009 ACM/IEEE Joint Conference on Digital Libraries, Austin TX, June 15-19 1
  • 2. Overview • Embargo Periods – associated preservation risk interval • Time-Locked Puzzle / Time Release Cryptography • System Evaluation using mod_oai (resource harvesting using OAI-PMH) – Optimization Using Chunked Encryption • Future Considerations • Conclusion 2009 ACM/IEEE Joint Conference on Digital Libraries, Austin TX, June 15-19 2
  • 3. Journal Access Models – Romeo Colors* • Red: Traditional subscription-based Access – Purchase-own model • Yellow: Embargoed Access – Hybrid of traditional and open access • Green: Self-authored Open Access – e.g., arVix.org, institutional repositories • Gold: Free and Open Access Journals – e.g., PLoS Journals, www.doaj.org * “Old” Romeo Colors, now green/blue/yellow/white; see: http://www.sherpa.ac.uk/romeoinfo.html 2009 ACM/IEEE Joint Conference on Digital Libraries, Austin TX, June 15-19 3
  • 4. Embargoed Access • Paid access (red) for some time interval, then the content becomes open (gold) – current issue(s) cost $ – previous issues are free • We’ll assume: gold >= green > yellow > red • Note: inverse of typical online newspaper model of: current is free, archived content costs $. 2009 ACM/IEEE Joint Conference on Digital Libraries, Austin TX, June 15-19 4
  • 5. Who Uses Embargoes? • 24% of PubMed Central (PMC) titles embargoed • The New England Journal of Medicine – embargoed for 6 months • EBMO Journal – embargoed for 12 months 2009 ACM/IEEE Joint Conference on Digital Libraries, Austin TX, June 15-19 5
  • 6. Preservation Risk Interval: (A Hypothetical, Non-Topical Example) • Journal of UT Football Non-Conference Scheduling is embargoed for 6 months – sample article “Why scheduling Florida Atlantic, UTEP, Rice & Arkansas is not a national championship schedule” – previous volumes (e.g., 2008, 2007) are freely available – issues 1--6 of current volume are currently for subscribers only – 6 month “sliding window”: when issue 7 comes out on July1, issue 1 becomes freely available • Now imagine Mack Brown issues a cease & desist order to JUTFNS on June 30 – what happens to volume 2009, issues 1-6? Will they ever be available to non-subscribers? 2009 ACM/IEEE Joint Conference on Digital Libraries, Austin TX, June 15-19 6
  • 7. Current Solutions • LOCKSS (CLOCKSS): www.lockss.org – local, cooperating caches between subscribers (i.e., libraries) – http://www.clockss.org/clockss/Triggered_Content • Portico: www.portico.org – trusted third party archive (i.e., neither library nor publisher) – http://www.portico.org/news/trigger.html 2009 ACM/IEEE Joint Conference on Digital Libraries, Austin TX, June 15-19 7
  • 8. Can We Use Lazy Preservation? • We’ve already shown by using IA, search engine caches, etc. we can reconstruct public web sites after they’ve been lost (McCown, 2007) • For embargoed content, we could expose encrypted content that is embargoed – but how can we prevent bad guys™ from using zombie farms to break the encryption before the embargo period is up? 2009 ACM/IEEE Joint Conference on Digital Libraries, Austin TX, June 15-19 8
  • 9. Timed-Release Cryptology • Time-Lock Puzzle (TLP) Creation – Data decryption non-parallelizable – Serial computation required to break puzzle – Data locked for predetermined time-period • not self-unlocking -- still requires computation to unlock • Used in MIT/LCS35 Time Lock Puzzle – http://people.csail.mit.edu/rivest/lcs35-puzzle-description.txt – idea: you could have started in 1999 (with your 1999 computer) and worked for 35 years… OR you can wait until 2033, buy a new computer and work for 1 year rewards procrastination! 2009 ACM/IEEE Joint Conference on Digital Libraries, Austin TX, June 15-19 9
  • 10. “Regular” RSA Picking values: “Brute Force” Attacks: • n=p*q • need to factor n (which is easier • φ(n)=(p-1)(q-1), then than trying all values of d) “throw away” p & q • simple soln: try all primes from 1 .. √n • pick e coprime to φ(n) • pick d s.t. d*e≡1 mod(φ(n)) helping the attacker: - adding k computers reduces the time public key = (n,e) to break by 1/k private key = (n,d) - they might get lucky and get it on their first shot! Encryption c = me (mod n) more info: http://www.cl.cam.ac.uk/users/rnc1/brute.html Decryption http://axion.physics.ubc.ca/pgp-attack.html m = cd (mod n) 2009 ACM/IEEE Joint Conference on Digital Libraries, Austin TX, June 15-19 10
  • 11. Time Lock Puzzle Picking values: Attacking: • n=p*q • repeated squarings of a is faster than • φ(n)=(p-1)(q-1), then factoring n -- also not known to be “throw away” p & q parallelizable! (Rivest, 1996) • t=TS • demo: n=253 (i.e., p=11,q=23), t=10, • pick some random key k, w= cm = RC5(k,m) 1 2(2 ) = 22 = 4 (mod 253) • pick random a, 1<a<n 2 2(2 ) = 42 = 16 (mod 253) 3 2(2 ) = 162 = 3 (mod 253) • w= a2t (mod n) 4 2(2 ) = 32 = 9 (mod 253) • ck = k ⊕ w 5 2(2 ) = 92 = 81 (mod 253) 6 puzzle = (n,a,t,ck,cm) 2(2 ) = 812 = 236 (mod 253) 7 2(2 ) = 2362 = 36 (mod 253) 8 actually, in our version we skip step 4 2(2 ) = 362 = 31 (mod 253) 9 and define step 7 as: z = m ⊕ w 2(2 ) = 312 = 202 (mod 253) puzzle = (n,t,z) 10 2(2 ) = 2022 = 71 (mod 253) 2009 ACM/IEEE Joint Conference on Digital Libraries, Austin TX, June 15-19 11
  • 12. Implementation: mod_oai, CRATE • Both based on (Smith, 2008) • mod_oai – an Apache module providing OAI-PMH functionality for an entire web site not just, for example, records in an institutional repository • CRATE – a model for encoding resource + associated metadata – implemented using MPEG-21 DIDL complex object format 2009 ACM/IEEE Joint Conference on Digital Libraries, Austin TX, June 15-19 12
  • 13. mod_oai mechanics Integrate OAI-PMH functionality into the web server itself… 1. Use mod_oai • an Apache 2.0 module • automatically answers OAI-PMH requests for an http server • written in C • respects values in .htaccess, httpd.conf 2. Install mod_oai on http://www.foo.edu/ 3. Define baseURL: http://www.foo.edu/modoai → Result: web harvesting with OAI-PMH semantics (e.g., from, until, sets) http://www.foo.edu/modoai?verb=ListRecords&metdataPrefix=oai_didl&from=2004-09-15&set=mime:video:mpeg From site foo, dating from 9/15/2004 through today Give me all resources Using OAI-PMH And their preservation metadata that are MIME type video-MPEG 2009 ACM/IEEE Joint Conference on Digital Libraries, Austin TX, June 15-19 13
  • 14. OAI-PMH Data Model 2009 ACM/IEEE Joint Conference on Digital Libraries, Austin TX, June 15-19 14
  • 15. MPEG-21 DIDL Resource Structure 2009 ACM/IEEE Joint Conference on Digital Libraries, Austin TX, June 15-19 15
  • 16. An Active Repository 2009 ACM/IEEE Joint Conference on Digital Libraries, Austin TX, June 15-19 16
  • 17. A Dying Repository Records e1, f2, g3 are recoverable; record h is lost. 2009 ACM/IEEE Joint Conference on Digital Libraries, Austin TX, June 15-19 17
  • 18. Dynamic Time-Locked Record Embargo within mod_oai • Identification – Calculation of remaining record embargo period • Encryption – Calculating record time-lock puzzle complexity – Time-Lock Puzzle creation • Encapsulation – exploiting flexibility of MPEG-21 DIDL format to encapsulate encrypted resources and related information 2009 ACM/IEEE Joint Conference on Digital Libraries, Austin TX, June 15-19 18
  • 19. Identification update OAI-PMH datestamp as time lock becomes weaker 2009 ACM/IEEE Joint Conference on Digital Libraries, Austin TX, June 15-19 19
  • 20. Encryption • Modification of LCS35 Time Capsule Crypto-Puzzle to use time lock on entire resource (not just the key) – as per code provided at: http://people.csail.mit.edu/rivest/lcs35- puzzle-description.txt • Input: timeUnit (controls puzzle complexity) • Compute: u = 2t mod((p-1)(q-1)) w = (2u) mod(n) z = resource ⊕ w • Output: n, t, z 2009 ACM/IEEE Joint Conference on Digital Libraries, Austin TX, June 15-19 20
  • 21. Encapsulation This version of the record is 7 of 12 separate encryptions, each of which is successively easier to break. It will take approximately 3650 hours of computation to break this time-lock. The next update will be available on 2008-01-16T20:56:15Z. Crypto-Puzzle for LCS35 Time Capsule. Puzzle parameters (all in decimal): n = 398399 t = 264600000. z = 313239174518025552773909388461801735302388... 893375562056859914777144518879488573607906... 742437030171894184996228671834511813009803... (many lines deleted for space) To solve the puzzle, first compute w = 2*2*t (mod n). Then exclusive-or the result with z. (Right-justify the two strings first). The result is the secret message (8 bits per character). 2009 ACM/IEEE Joint Conference on Digital Libraries, Austin TX, June 15-19 21
  • 22. Selecting Appropriate Values of t • Time required to break puzzle dependent on processor speed • Given our projected short embargo period (6-24 months), we made a simplifying assumption that Moore’s law increases linearly (not exponentially) – idea: in the next few months, you’re more likely to see something like: 2Ghz→2.2Ghz, not 2Ghz→4Ghz • recall: t = number of squarings – t=T*S – S=3000 squarings/second, T=1800 seconds *tU, – tU = f(machine speed) * embargolength – t=3000*1800*tU 2009 ACM/IEEE Joint Conference on Digital Libraries, Austin TX, June 15-19 22
  • 23. Effect of Computation Speed on embargolength • We broke time lock puzzles on four class of machines (in GHz): – 1.8 (5 nodes) – 1.6 (26 nodes) – 1 (1 node) – 0.75 (1 node) 2009 ACM/IEEE Joint Conference on Digital Libraries, Austin TX, June 15-19 23
  • 24. Picking t With Empirical Data using 1Ghz machine as baseline, projecting for a 2.5 Ghz machine, and locking for 2 years (63115200 seconds): • tU = 63115200 * 2.5 / (1727.61) = 9133 • t = 3000 * 1800 * 9133 2009 ACM/IEEE Joint Conference on Digital Libraries, Austin TX, June 15-19 24
  • 25. Experimental Evaluation • Embargolength = 365 days • Embargodecrement = 12 • Test website – 525 files – 17.3 MB data – 63% text files – Average file size = 33KB 2009 ACM/IEEE Joint Conference on Digital Libraries, Austin TX, June 15-19 25
  • 26. Harvesting Time: Locked & Unlocked 2009 ACM/IEEE Joint Conference on Digital Libraries, Austin TX, June 15-19 26
  • 27. O(n2) time to create time-lock puzzle 2009 ACM/IEEE Joint Conference on Digital Libraries, Austin TX, June 15-19 27
  • 28. Solution: Break Files Into “Chunks” • Size of file exponentially increases lock-time • Idea: break file into series of small chunks – still O(n2), but with a much more favorable constant • Lock-time on a 1.8 GHz machine time_to_lock(200 KB) = 13 sec time_to_lock(100 KB) = 3 sec 200 KB = 100 KB + 100 KB = 3 sec + 3 sec = 6 sec 2009 ACM/IEEE Joint Conference on Digital Libraries, Austin TX, June 15-19 28
  • 29. 10 KB Chunked Encryption in mod_oai 2009 ACM/IEEE Joint Conference on Digital Libraries, Austin TX, June 15-19 29
  • 30. MPEG-21 DIDL document With Chunks This record has been split into 10000-byte chunks for faster processing. This is part 1 of 7 chunks, with unlocked chunks to be reassembled in the specified order. 2009 ACM/IEEE Joint Conference on Digital Libraries, Austin TX, June 15-19 30
  • 31. Future Considerations • Chunk size performance dependency • Other optimization methods: – Parallel time-locking of resources – Data pre-locking – only time-lock encryption key, use other encryption methods on the original resource (as per original Rivest (1996), not as per http://people.csail.mit.edu/rivest/lcs35-puzzle- description.txt) 2009 ACM/IEEE Joint Conference on Digital Libraries, Austin TX, June 15-19 31
  • 32. Conclusions • Suggest the use of time lock puzzles for dissemination of embargoed records – complement to other methods such as LOCKSS, Poritco, etc. • Implemented and evaluated time lock puzzles in the mod_oai & CRATE environment • Full paper: – http://doi.acm.org/10.1145/1555400.1555430 – http://www.cs.odu.edu/~mln/pubs/jcdl09/jcdl09-time-lock.pdf 2009 ACM/IEEE Joint Conference on Digital Libraries, Austin TX, June 15-19 32