Title: Introduction of Sakurai Lab.
1Introduction of Sakurai Lab.
2ITSLAB (Information Technology Security
Laboratory)
Address Department of Computer Science and
Communication Engineering, Kyushu University,
6-10-1 Hakozaki, Higashi-ku, Fukuoka, Fukuoka
812-8581, Japan
This building
Kyushu Univ.
3Topics of Researches
- Design of Secure Protocols
- Key-Exchange Protocol with ID protection
(One-time ID) - Fair-Exchange Protocol for E-contract
- Secure Data Mining
- Design of Secure Systems
- Anonymity in Peer-to-Peer Network
- Privacy of RFID
- Combine ID-based Cryptography to PKI
- Anti-SPAM
- Tools for Enhanced Computer Security
- Software Obfuscation
- Secure OS
- Tools for Enhanced Network Security
- Information Visualization to detect malicious
behavior - Detection of Port-Scan
4Key-Exchange Protocol
- Establish a short-term key to achieve integrity
and/or secrecy of following transaction
In most existing works,
- Leakage of Users ID, DoS attack
- Our approach introduce One-time ID
- Disposable ID used as substitution of (fixed)
user's identity
How to manage One-time ID ? model privacy and
DoS-resiliency ?
Shared Secret
Shared Secret
5Research of Secure RFID(Radio-Frequency
Identification)
- RFID tag is a small and inexpensive microchip
that emits an identifier in response to query
from nearby reader - Contactless physical-access cards
- Automated toll payment
- Inventory tags
- Privacy concern (linkability, traceability)
- We solve it by using universal re-encryption to
change information on RFID tags frequently - Improve a protocol proposed by Golle et al.
(2004) to provide location privacy, and integrity
of messages
price of the suit
shoe size
?? yen in wallet
6Privacy Preserving Data Mining
- Data Mining
- To discover some meaningful predictive
information from large volumes of data - Technical challenge
- Collaboration of different distributed parties
without revealing private data - We have developed accurate model without access
to precise information in data records - Privacy-preserving two-party K-mean clustering
using cryptographic techniques without trusted
third party
Large Databases
Valuable knowledge found!!
7Collaborations
- ISIT, 2nd Laboratory, Japan
- Center of Information Security Technology (CIST),
Korea Univ., Korea - Chungnam Univ., Korea
- Gwangju Institute of Science and Technology
(GIST), Korea - Okayama Univ., Japan
- Kyushu Institute Univ., Japan
- Institute for InfocommResearch (I2R), Singapore
8SSR Project (http//www.iisf.or.jp/SSR/)
- Purpose
- Investigation and research of security function
of operating system - Member
- Sakurai Lab. (Kyushu University)
- In cooperation with GIST, Korea
http//nwcl.gist.ac.kr/seecure/index.html - Corporation members
- Fujitsu, Hitachi, IBM, Toshiba, Toshiba Solution
9Invited Researchers (2004-2005)
- CIST members
- Prof. Jongin Lim, Prof. Donghoon Lee, Yong Ho
Kim, Jeong Jae Yu, Tae Hyun Kim, Hwa Yean Lee, - GIST members
- Jongyoul Park, Wook Shin, Hyung Chan Kim, Hyunjin
Yoo, Jiho Cho - Prof. Man Young Rhee (Kyung Hee Univ.)
- Prof. Mridul Nandi (Indian Statistical Institute)
- Prof. Hyang-Sook Lee (Ewha Womans Univ.)
- Dr. Guilin Wang (I2R)
10http//itslab.csce.kyushu-u.ac.jp
Website of ITSLAB