Cloud Computing Security Monir Azraoui, Kaoutar Elkhiyaoui, Refik Molva, Melek Ӧ nen, Pasquale Puzio December 18, 2013 – Sophia-Antipolis, France.

Slides:



Advertisements
Similar presentations
Securing Passwords against Dictionary Attacks
Advertisements

Chapter 10 Encryption: A Matter of Trust. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic Algorithm.
Slide 1 Insert your own content. Slide 2 Insert your own content.
Accountability and Resource Management A discussion of issues for peer-to-peer systems Roger Dingledine Reputation Technologies Michael.
Secure Naming structure and p2p application interaction IETF - PPSP WG July 2010 Christian Dannewitz, Teemu Rautio and Ove Strandberg.
Tunis, Tunisia, June 2012 Privacy in Cloud Computing Vijay Mauree, Programme Coordinator, TSB, ITU ITU Workshop on Cloud Computing.
0 - 0.
1 Identification Who are you? How do I know you are who you say you are?
Secure Virtual Machine Execution Under an Untrusted Management OS Chunxiao Li Anand Raghunathan Niraj K. Jha.
Trusted Data Sharing over Untrusted Cloud Storage Provider Gansen Zhao, Chunming Rong, Jin Li, Feng Zhang, and Yong Tang Cloud Computing Technology and.
Technische Universität Ilmenau CCSW 2013 Sander Wozniak
Copyright Critical Software S.A All Rights Reserved. COTS based approach for the Multilevel Security Problem Bernardo Patrão.
Hi – 5 Marcus Hogue Chris Jacobson Alexandra Korol Mark Ordonez Jinjia Xi Security of Cloud Computing.
Luca Maria Aiello, Università degli Studi di Torino, Computer Science department 1 Tempering Kademlia with a robust identity based system.
1 Do I Know You? Efficient, Privacy-Preserving Protocols for Finding Common Friends Marcin Nagy, Aalto University (joint work with Emiliano De Cristofaro,
Security by Design A Prequel for COMPSCI 702. Perspective “Any fool can know. The point is to understand.” - Albert Einstein “Sometimes it's not enough.
Rennes, 24/10/2014 Cristina Onete CIDRE/ INRIA Privacy in signatures. Hiding in rings, hiding in groups.
Probabilistic Public Key Encryption with Equality Test Duncan S. Wong Department of Computer Science City University of Hong Kong Joint work with Guomin.
Cobalt: Separating content distribution from authorization in distributed file systems Kaushik Veeraraghavan Andrew Myrick Jason Flinn University of Michigan.
Henry C. H. Chen and Patrick P. C. Lee
Efficient Information Retrieval for Ranked Queries in Cost-Effective Cloud Environments Presenter: Qin Liu a,b Joint work with Chiu C. Tan b, Jie Wu b,
SPORC: Group Collaboration using Untrusted Cloud Resources Ariel J. Feldman, William P. Zeller, Michael J. Freedman, Edward W. Felten Published in OSDI’2010.
Ragib Hasan Johns Hopkins University en Spring 2011 Lecture 8 04/04/2011 Security and Privacy in Cloud Computing.
Data Integrity Proofs in Cloud Storage Sravan Kumar R, Ashutosh Saxena Communication Systems and Networks (COMSNETS), 2011 Third International Conference.
Ragib Hasan University of Alabama at Birmingham CS 491/691/791 Fall 2012 Lecture 2 08/21/2012 Security and Privacy in Cloud Computing.
Security Issues and Challenges in Cloud Computing
On-The-Fly Verification of Rateless Erasure Codes Max Krohn (MIT CSAIL) Michael Freedman and David Mazières (NYU)
Securing Data Storage Protecting Data at Rest Advanced Systems Group Dell Computer Asia Ltd.
Privacy-Preserving Computation and Verification of Aggregate Queries on Outsourced Databases Brian Thompson 1, Stuart Haber 2, William G. Horne 2, Tomas.
PRIAM: PRivate Information Access Management on Outsourced Storage Service Providers Mark Shaneck Karthikeyan Mahadevan Jeff Yongdae Kim.
DATABASE SECURITY By Oscar Suciadi CS 157B Prof. Sin-Min Lee.
Wolfgang Schneider NSI: A Client-Server-Model for PKI Services.
Tunis, Tunisia, 28 April 2014 Security Issues for Cloud and Future Networks Noureddine Boudriga, Director CN&S, University of Carthage
Cloud Computing Cloud Security– an overview Keke Chen.
Cong Wang1, Qian Wang1, Kui Ren1 and Wenjing Lou2
Construction of efficient PDP scheme for Distributed Cloud Storage. By Manognya Reddy Kondam.
1 Convergent Dispersal: Toward Storage-Efficient Security in a Cloud-of-Clouds Mingqiang Li 1, Chuan Qin 1, Patrick P. C. Lee 1, Jin Li 2 1 The Chinese.
Privacy Preserving Query Processing in Cloud Computing Wen Jie
Overview of Privacy Preserving Techniques.  This is a high-level summary of the state-of-the-art privacy preserving techniques and research areas  Focus.
Ragib Hasan University of Alabama at Birmingham CS 491/691/791 Fall 2011 Lecture 16 10/11/2011 Security and Privacy in Cloud Computing.
A Survey on Secure Cloud Data Storage ZENG, Xi CAI, Peng
Yongzhi Wang, Jinpeng Wei VIAF: Verification-based Integrity Assurance Framework for MapReduce.
SecureMR: A Service Integrity Assurance Framework for MapReduce Author: Wei Wei, Juan Du, Ting Yu, Xiaohui Gu Source: Annual Computer Security Applications.
HPCC 2015, August , New York, USA Wei Chang c Joint work with Qin Liu a, Guojun Wang b, and Jie Wu c a. Hunan University, P. R. China b. Central.
Privacy Communication Privacy Confidentiality Access Policies Systems Crypto Enforced Computing on Encrypted Data Searching and Reporting Fully Homomorphic.
Top Threats WG Co-Chair Jon-Michael Brook. Agenda About our Top Threats Polling the industry Call for participation Categorizing our Top Threats.
Kia Manoochehri.  Background  Threat Classification ◦ Traditional Threats ◦ Availability of cloud services ◦ Third-Party Control  The “Notorious Nine”
Merkle trees Introduced by Ralph Merkle, 1979 An authentication scheme
Yair Grindlinger, CEO and Co-Founder Do you know who your employees are sharing their credentials with? Do they?
Wei-Shinn Ku Slide 1 Auburn University Computer Science and Software Engineering Query Integrity Assurance of Location-based Services Accessing Outsourced.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Chap1: Is there a Security Problem in Computing?.
Current Security Threats and Prevention Measures Relating to Cloud Services, Hadoop Concurrent Processing, and Big Data ATHER SHARIF, SARAH COONEY, SHENGQI.
Data Integrity Proofs in Cloud Storage Author: Sravan Kumar R and Ashutosh Saxena. Source: The Third International Conference on Communication Systems.
Database Security Cmpe 226 Fall 2015 By Akanksha Jain Jerry Mengyuan Zheng.
Secure Data Outsourcing
What does it mean for Records and Information Management.
Database Laboratory Regular Seminar TaeHoon Kim Article.
Big Data Security Issues in Cloud Management. BDWG Big Data Working Group Researchers 1: Data analytics for security 2: Privacy preserving 3: Big data-scale.
FIREWALLS An Important Component in Computer Systems Security By: Bao Ming Soh.
BY S.S.SUDHEER VARMA (13NT1D5816)
Searchable Encryption in Cloud
Efficient Multi-User Indexing for Secure Keyword Search
Cloud Security– an overview Keke Chen
Secure Software Confidentiality Integrity Data Security Authentication
Hybrid Cloud Architecture for Software-as-a-Service Provider to Achieve Higher Privacy and Decrease Securiity Concerns about Cloud Computing P. Reinhold.
563.10: Bloom Cookies Web Search Personalization without User Tracking
Cloud Security 李芮,蒋希坤,崔男 2018年4月.
Towards an Archival Intermemory
Presentation transcript:

Cloud Computing Security Monir Azraoui, Kaoutar Elkhiyaoui, Refik Molva, Melek Ӧ nen, Pasquale Puzio December 18, 2013 – Sophia-Antipolis, France

Cloud Computing – Outsourcing storage & computation  High availability  No IT maintenance cost  Decreased Costs  Elasticity & Flexibility Cloud Computing Security – December 18, 2013 Sophia-Antipolis, France Slide 2

Data breaches  Unauthorized access to client data Data Loss  Accidental or malicious destruction Account hijacking  Stolen credentials Insecure APIs  Adversary steals data from cloud Denial of Service  Intolerable system slowdown Malicious insiders  More powerful attackers Abuse of cloud services  Adversary rents the cloud Insufficient due diligence  Mismatched expectations Shared technology issues  Adversary breaks out of the hypervisor CSA’s Notorious Nine – From 2010 to 2013 Cloud Computing Security – December 18, 2013 Sophia-Antipolis, France Slide 3

 Security Models & Requirements  Honest but curious  Confidentiality & Privacy Data privacy Computation privacy  Malicious  Privacy + Integrity & Transparency Verifiability  Challenge Clouds as Adversaries To trust or how to trust? Do not cancel cloud advantages Lightweight operations at client side Cloud Security Big Data Cloud Computing Security – December 18, 2013 Sophia-Antipolis, France Slide 4

 Honest-but-curious cloud  Privacy preserving word search  Privacy preserving de-duplication  Malicious cloud  Proof of Retrievability Cloud Security Research at EURECOM [PETS’12, Tclouds’13] [CloudCom’13] [Under submission] Cloud Computing Security – December 18, 2013 Sophia-Antipolis, France Slide 5

 Challenge  No more physical possession of data  Lack of resources at the client side  Related work  Deterministic  Verification of the entire data  costly  Probabilistic  Tags for each block + random verification  Costly generation of tags  randomly located sentinels => limited verification  Our solution - StealthGuard  Randomly generated watchdogs  privacy preserving search of watchdogs Proof of Retrievability - Overview Cloud Computing Security – December 18, 2013 Sophia-Antipolis, France Slide 6 [Under submission] [Ateniese et. al., Juels et. al., Shacham et.al...] [Deswarte et. al, Filho et. al,..]

 Honest but curious cloud  Privacy preserving word search  Privacy preserving de-duplication  Malicious cloud  Proof of Retrievability Cloud Security Research at EURECOM [PETS’12, Tclouds’13] [CloudCom’13] [Under submission] Cloud Computing Security – December 18, 2013 Sophia-Antipolis, France Slide 7

 A concrete Scenario: Data retention  Internet Service Provider retains customers’ log/access data (for 6 years…!)  Example: DNS logs (time, IP, hostname)  Save money: Outsource to cloud  Challenge  Protect customer Privacy against prying clouds  Privacy: Encrypt log entries  Support queries: “Has x accessed y (at time z)?”  Word Search  Efficiency: Leverage clouds’ massive parallelism  MapReduce Privacy preserving word search Pri S M Logs 8Cloud Computing Security – December 18, 2013 Sophia-Antipolis, France Slide 8

 Contribution  Data privacy: No (non trivial) data analysis  Computation privacy: query privacy, query unlinkability  Parallelism with MapReduce  Evaluation: privacy proofs and implementation (11% overhead)  Main idea  Word search transformed to PIR problems (single bit)  Map: Evaluate small PIR problem on each InputSplit  Reduce: combine mapper output with simple addition  User decodes output, decides existence PRIvacy preserving Search in MapReduce 9Cloud Computing Security – December 18, 2013 Sophia-Antipolis, France Slide 9

PRISM - Overview Mapper InputSplit Reducer “PIR Matrix” E(1) E(0) E(1) ∑ User Result Cloud File Encrypt & Upload Q(word) Query for “word” Q(word) E( ) homomorphic Idea: Transform search for “word” into PIR query word? 10Cloud Computing Security – December 18, 2013 Sophia-Antipolis, France Slide 10 [PETS’12]

 Scenario  Auditing  Additional privacy requirement  Authorized access with revocation  Initial solution based on  One-time key for search  Attribute based encryption for key retrieval Further work - Delegated word search Cloud Computing Security – December 18, 2013 Sophia-Antipolis, France Slide 11 [Tclouds’13]

 Honest but curious cloud  Privacy preserving word search  Privacy preserving de-duplication  Malicious cloud  Proof of Retrievability Cloud Security Research at EURECOM [PETS’12, Tclouds’13] [CloudCom’13] [Under submission] Cloud Computing Security – December 18, 2013 Sophia-Antipolis, France Slide 12

Privacy preserving deduplication  Deduplication  Duplicated data stored only once  90-95% space saving  Conflict with privacy  Encryption prevents detection  Initial solution  Convergent encryption  Key = hash(data)  Vulnerable to dictionary attacks Cloud Computing Security – December 18, 2013 Sophia-Antipolis, France Slide 13

ClouDedup - Overview  Confidentiality & block-level deduplication  Countermeasure against CE vulnerability  Negligible performance impact  Transparent to the storage provider Cloud Computing Security – December 18, 2013 Sophia-Antipolis, France Slide 14 [CloudCom’13]

 Privacy preserving storage & computation  Suitable data encryption  Privacy preserving primitives  Word search  statistics: sum, average, etc. ..  Privacy preserving deduplication  Verifiable storage & computation  Verifiable word search  Proof of retrievability  Data integrity Conclusion Do not cancel cloud advantages Lightweight operations at client side Big Data Cloud Computing Security – December 18, 2013 Sophia-Antipolis, France Slide 15

THANK YOU