100 likes | 207 Vues
Sakurai Lab at Kyushu University, Japan, specializes in cutting-edge research in information technology and security. Located in Fukuoka, the lab focuses on the design of secure protocols, key-exchange mechanisms, privacy-preserving data mining, and enhanced security tools. Key initiatives include developing one-time IDs for user anonymity, improving RFID privacy, and collaboration with various institutions worldwide. By addressing critical issues like data leakage and DoS attacks, the lab strives to innovate systems for a more secure digital environment.
E N D
Introduction of Sakurai Lab. Kyushu Univ. JAPAN
ITSLAB (Information Technology & Security Laboratory) Address Department of Computer Science and Communication Engineering, Kyushu University, 6-10-1 Hakozaki, Higashi-ku, Fukuoka, Fukuoka 812-8581, Japan This building Kyushu Univ.
Topics of Researches • Design of Secure Protocols • Key-Exchange Protocol with ID protection (One-time ID) • Fair-Exchange Protocol for E-contract • Secure Data Mining • Design of Secure Systems • Anonymity in Peer-to-Peer Network • Privacy of RFID • Combine ID-based Cryptography to PKI • Anti-SPAM • Tools for Enhanced Computer Security • Software Obfuscation • Secure OS • Tools for Enhanced Network Security • Information Visualization to detect malicious behavior • Detection of Port-Scan
Key-Exchange Protocol • Establish a short-term key to achieve integrity and/or secrecy of following transaction In most existing works, • Leakage of User’s ID, DoS attack • Our approach: introduce One-time ID • Disposable ID used as substitution of (fixed) user's identity How to manage One-time ID ? model privacy and DoS-resiliency ? Shared Secret Shared Secret
Research of Secure RFID(Radio-Frequency Identification) • RFID tag is a small and inexpensive microchip that emits an identifier in response to query from nearby reader • Contactless physical-access cards • Automated toll payment • Inventory tags • Privacy concern (linkability, traceability) • We solve it by usinguniversal re-encryption to change information on RFID tags frequently • Improve a protocol proposed by Golle et al. (2004) to provide location privacy, and integrity of messages price of the suit shoe size ○○ yen in wallet
Privacy Preserving Data Mining • Data Mining • To discover some meaningful predictive information from large volumes of data Technical challenge: • Collaboration of different distributed parties without revealing private data • We have developed accurate model without access to precise information in data records • Privacy-preserving two-party K-mean clustering using cryptographic techniques without trusted third party Large Databases… Valuable knowledge found!!
Collaborations • ISIT, 2nd Laboratory, Japan • Center of Information Security Technology (CIST), Korea Univ., Korea • Chungnam Univ., Korea • Gwangju Institute of Science and Technology (GIST), Korea • Okayama Univ., Japan • Kyushu Institute Univ., Japan • Institute for InfocommResearch (I2R), Singapore • …
SSR Project (http://www.iisf.or.jp/SSR/) • Purpose • Investigation and research of security function of operating system • Member • Sakurai Lab. (Kyushu University) • In cooperation with GIST, Koreahttp://nwcl.gist.ac.kr/~seecure/index.html • Corporation members • Fujitsu, Hitachi, IBM, Toshiba, Toshiba Solution
Invited Researchers (2004-2005) • CIST members • Prof. Jongin Lim, Prof. Donghoon Lee, Yong Ho Kim, Jeong Jae Yu, Tae Hyun Kim, Hwa Yean Lee, … • GIST members • Jongyoul Park, Wook Shin, Hyung Chan Kim, Hyunjin Yoo, Jiho Cho • Prof. Man Young Rhee (Kyung Hee Univ.) • Prof. Mridul Nandi (Indian Statistical Institute) • Prof. Hyang-Sook Lee (Ewha Womans Univ.) • Dr. Guilin Wang (I2R) • …
http://itslab.csce.kyushu-u.ac.jp Website of ITSLAB