Slide credits: Ragib Hasan, Johns Hopkins University CS573 Data privacy and security in the cloud.

Slides:



Advertisements
Similar presentations
Trust Management of Services in Cloud Environments:
Advertisements

Lecture 4: Cloud Computing Security: a first look Xiaowei Yang (Duke University)
Ragib Hasan Johns Hopkins University en Spring 2010 Lecture 3 02/15/2010 Security and Privacy in Cloud Computing.
Ragib Hasan University of Alabama at Birmingham CS 491/691/791 Fall 2012 Lecture 2 08/21/2012 Security and Privacy in Cloud Computing.
Ragib Hasan Johns Hopkins University en Spring 2011 Lecture 3 02/14/2010 Security and Privacy in Cloud Computing.
Ragib Hasan Johns Hopkins University en Spring 2010 Lecture 1 01/25/2010 Security and Privacy in Cloud Computing.
Ragib Hasan University of Alabama at Birmingham CS 491/691/791 Fall 2011 Lecture 1 08/16/2011 Security and Privacy in Cloud Computing.
Cloud Computing Brandon Hixon Jonathan Moore. Cloud Computing Brandon Hixon What is Cloud Computing? How does it work? Jonathan Moore What are the key.
Ragib Hasan University of Alabama at Birmingham CS 491/691/791 Fall 2011 Lecture 10 09/15/2011 Security and Privacy in Cloud Computing.
Ragib Hasan Johns Hopkins University en Spring 2011 Lecture 11 04/25/2011 Security and Privacy in Cloud Computing.
Bharat Bhargava Computer Science Purdue University Research in Cloud Computing YounSun Cho Computer Science Purdue.
Ragib Hasan Johns Hopkins University en Spring 2010 Lecture 5 03/08/2010 Security and Privacy in Cloud Computing.
By: Kathleen Walters CLOUD COMPUTING Definition Cloud computing allows multiple computers to connect to one main network. Instead of installing different.
Ragib Hasan Johns Hopkins University en Spring 2011 Lecture 1 01/31/2011 Security and Privacy in Cloud Computing.
CLOUD Demystifying the Jesse Dunietz SASS Talk A Survey of Cloud Computing.
Ragib Hasan Johns Hopkins University en Spring 2011 Lecture 10 04/18/2011 Security and Privacy in Cloud Computing.
CLOUD PRIVACY AND SECURITY CS 595 LECTURE 15 4/15/2015.
By, Casey Riva. The Craze Of The Cloud Why is Cloud Computing becoming so popular? People are always on the move, this drives to a demand for more portable.
Authors: Thomas Ristenpart, et at.
Ragib Hasan University of Alabama at Birmingham CS 491/691/791 Fall 2013 Lecture 3 09/03/2013 Security and Privacy in Cloud Computing.
SaaS, PaaS & TaaS By: Raza Usmani
Plenary Panel: Challenges towards the Global Adoption of Cloud Computing Chair: Vladimir Getov, University of Westminster Panelists: Stephen S. Yau, Arizona.
SPRING 2011 CLOUD COMPUTING Cloud Computing San José State University Computer Architecture (CS 147) Professor Sin-Min Lee Presentation by Vladimir Serdyukov.
Addition to Networking.  There is no unique and standard definition out there  Cloud Computing is a general term used to describe a new class of network.
Security in Cloud Computing Presented by : Ahmed Alalawi.
Cloud Computing – The Cloud Dr. Jie Liu. Definition  Cloud computing is Web-based processing, whereby shared resources, software, and information are.
Threat Modeling for Cloud Computing (some slides are borrowed from Dr. Ragib Hasan) Keke Chen 1.
Lecture 10 Cloud Security
Ragib Hasan Johns Hopkins University en Spring 2010 Lecture 2 02/01/2010 Security and Privacy in Cloud Computing.
Cloud Computing Cloud Security– an overview Keke Chen.
Security and Privacy: Can we trust the cloud?
Cloud Computing Cloud Computing Class-1. Introduction to Cloud Computing In cloud computing, the word cloud (also phrased as "the cloud") is used as a.
Cloud Computing Saneel Bidaye uni-slb2181. What is Cloud Computing? Cloud Computing refers to both the applications delivered as services over the Internet.
Cloud Computing & Security Issues Prepared by: Hamoud Al-Shammari CS 6910 Summer, 2011 University of Colorado at Colorado Springs Engineering & Applied.
Cloud Computing Kwangyun Cho v=8AXk25TUSRQ.
Ragib Hasan Johns Hopkins University en Spring 2010 Lecture 6 03/22/2010 Security and Privacy in Cloud Computing.
Geographic Information Systems Cloud GIS. ► The use of computing resources (hardware and software) that are delivered as a service over the Internet ►
Computer Science and Engineering 1 Cloud ComputingSecurity.
Introduction to Cloud Computing
In the name of God :).
Ragib Hasan University of Alabama at Birmingham CS 491/691/791 Fall 2013 Lecture 1 08/27/2013 Security and Privacy in Cloud Computing.
Ragib Hasan University of Alabama at Birmingham CS 491/691/791 Fall 2012 Lecture 4 09/10/2013 Security and Privacy in Cloud Computing.
Presented by: Mostafa Magdi. Contents Introduction. Cloud Computing Definition. Cloud Computing Characteristics. Cloud Computing Key features. Cost Virtualization.
1 NETE4631 Course Wrap-up and Benefits, Challenges, Risks Lecture Notes #15.
Cloud Computing Security Keep Your Head and Other Data Secure in the Cloud Lynne Pizzini, CISSP, CISM, CIPP Information Systems Security Officer Information.
Kia Manoochehri.  Background  Threat Classification ◦ Traditional Threats ◦ Availability of cloud services ◦ Third-Party Control  The “Notorious Nine”
3/12/2013Computer Engg, IIT(BHU)1 CLOUD COMPUTING-1.
1 TCS Confidential. 2 Objective : In this session we will be able to learn:  What is Cloud Computing?  Characteristics  Cloud Flavors  Cloud Deployment.
KAASHIV INFOTECH – A SOFTWARE CUM RESEARCH COMPANY IN ELECTRONICS, ELECTRICAL, CIVIL AND MECHANICAL AREAS
What is Cloud Computing 1. Cloud computing is a service that helps you to perform the tasks over the Internet. The users can access resources as they.
Mapping/Topology attacks on Virtual Machines
Lecture 6: Cloud Computing
Threat Modeling for Cloud Computing
Lecture 20: Cloud Security
Security in Cloud Computing
By: Raza Usmani SaaS, PaaS & TaaS By: Raza Usmani
Cloud Security– an overview Keke Chen
Written by : Thomas Ristenpart, Eran Tromer, Hovav Shacham,
Cloud Computing Kelley Raines.
CLOUD COMPUTING Presented By:- EduTechlearners
Cloud Testing Shilpi Chugh.
Cloud Computing Cloud computing refers to “a model of computing that provides access to a shared pool of computing resources (computers, storage, applications,
Brandon Hixon Jonathan Moore
Cloud Computing: Concepts
Computer Science and Engineering
Presentation transcript:

Slide credits: Ragib Hasan, Johns Hopkins University CS573 Data privacy and security in the cloud

What is Cloud Computing? 2 Let’s hear from the “experts”

What is Cloud Computing? 3 The infinite wisdom of the crowds (via Google Suggest)

What is Cloud Computing? 4 Larry Ellison, founder of Oracle We’ve redefined Cloud Computing to include everything that we already do.... I don’t understand what we would do differently in the light of Cloud Computing other than change the wording of some of our ads.

What is Cloud Computing? 5 Richard Stallman GNU It’s stupidity. It’s worse than stupidity: it’s a marketing hype campaign

What is Cloud Computing? 6 Ron Rivest The R of RSA Cloud Computing will become a focal point of our work in security. I’m optimistic …

So, What really is Cloud Computing? Cloud computing is a new computing paradigm, involving data and/or computation outsourcing, with – Infinite and elastic resource scalability – On demand “just-in-time” provisioning – No upfront cost … pay-as-you-go 7 That is, use as much or as less you need, use only when you want, and pay only what you use,

The real story “Computing Utility” – holy grail of computer science in the 1960s. Code name: MULTICS 8 Why it failed? Ahead of time … lack of communication tech. (In other words, there was NO (public) Internet) And personal computer became cheaper and stronger

The real story Mid to late ’90s, Grid computing was proposed to link and share computing resources 9

The real story … continued 10 Post-dot-com bust, big companies ended up with large data centers, with low utilization Solution: Throw in virtualization technology, and sell the excess computing power And thus, Cloud Computing was born …

Cloud computing means selling “X as a service” IaaS: Infrastructure as a Service – Selling virtualized hardware PaaS: Platform as a service – Access to a configurable platform/API SaaS: Software as a service – Software that runs on top of a cloud 11

Cloud computing architecture 12 e.g., Web browser SaaS, e.g., Google Docs PaaS, e.g., Google AppEngine IaaS, e.g., Amazon EC2

So, if cloud computing is so great, why aren’t everyone doing it? 13 Clouds are still subject to traditional data confidentiality, integrity, availability, and privacy issues, plus some additional attacks

Companies are still afraid to use clouds 14 [Chow09ccsw]

Anatomy of fear … Confidentiality – Will the sensitive data stored on a cloud remain confidential? Will cloud compromises leak confidential client data (i.e., fear of loss of control over data) – Will the cloud provider itself be honest and won’t peek into the data? 15

Anatomy of fear … Integrity – How do I know that the cloud provider is doing the computations correctly? – How do I ensure that the cloud provider really stored my data without tampering with it? 16

Anatomy of fear … Availability – Will critical systems go down at the client, if the provider is attacked in a Denial of Service attack? – What happens if cloud provider goes out of business? 17

Anatomy of fear … Privacy issues raised via massive data mining – Cloud now stores data from a lot of clients, and can run data mining algorithms to get large amounts of information on clients 18

Anatomy of fear … Increased attack surface – Entity outside the organization now stores and computes data, and so – Attackers can now target the communication link between cloud provider and client – Cloud provider employees can be phished 19

Anatomy of fear … Legal quagmire and transitive trust issues – Who is responsible for complying with regulations (e.g., SOX, HIPAA, GLBA)? – If cloud provider subcontracts to third party clouds, will the data still be secure? 1/31/2011en Spring

What we need is to … Adapt well known techniques for resolving some cloud security issues Perform new research and innovate to make clouds secure 1/31/2011en Spring

Traditional systems security vs Cloud Computing Security Securing a traditional system Securing a cloud 22

Traditional systems security vs Cloud Computing Security Securing a house Securing a motel Owner and user are often the same entity Owner and users are almost invariably distinct entities Analogy 23

Traditional systems security vs Cloud Computing Security Securing a house Securing a motel Biggest user concerns Securing perimeter Checking for intruders Securing assets Biggest user concern Securing room against (the bad guy in next room | hotel owner) 24

Data Privacy and Security in Cloud: Overview Novel attacks Trustworthy cloud architectures Data integrity and availability Computation integrity Data and computation privacy Data forensics Misbehavior detection Malicious use of clouds 25

Co-tenancy in clouds creates new attack vectors A cloud is shared by multiple users Malicious users can now legally be in the same infrastructure Misusing co-tenancy, attackers can launch side channel attacks on victims Example: the Topology attack on Amazon EC2 (“Hey You! Get off of my Cloud …” CCS 2009) Research question: How to prevent attackers from exploiting co-tenancy in attacking the infrastructure and/or other clients? 26

Today’s cloud architectures act like big black boxes 27 Clients have no idea of or control over what is happening inside the cloud Clients are forced to trust cloud providers completely Research Question: How do we design cloud computing architectures that are semi-transparent and provide clients with control over security? Existing Approaches: TCCP (uses TPM), CloudProof

Today’s clouds provide no guarantee about outsourced data Amazon’s Terms of services 28

Today’s clouds provide no guarantee about outsourced data Research Question: How can clients get assurance/proofs that the cloud provider is actually storing data, is not tampering with data, and can make the data available on-demand? Problem: Dishonest cloud providers can throw data away or lose data. Malicious intruders can delete or tamper with data. Clients need reassurance that the outsourced data is available, has not been tampered with, and remains confidential. 29 Example Approaches: Provable Data Possession (PDP), Proof of Retrievability (PoR), HAIL

Ensuring confidentiality of data in outsourced computation is difficult 30 Most type of computations require decrypting data before any computations If the cloud provider is not trusted, this may result in breach of confidentiality Research Question: How can we ensure confidentiality of data and computations in a cloud? Existing Approaches: Homomorphic encryption, TCCP

Clients have no way of verifying computations outsourced to a Cloud 31 Scenario User sends her data processing job to the cloud. Clouds provide dataflow operation as a service (e.g., MapReduce, Hadoop etc.) Problem: Users have no way of evaluating the correctness of results Research question: How can we verify the accuracy of outsourced computation? Existing Approaches: Runtime Attestation, Majority voting, Redundant operations

Clouds can be used for malicious purposes Adversaries can rent clouds temporarily to create a large scale botnet very quickly Clouds can be used for spamming, Denial of service, brute force password breaking, and other attacks Research question: How can we rapidly detect misbehavior of clients in a cloud? Example: WPACracker.com – a password cracking service that claims to test 300,000,000 words in 20 minutes for $17, using a cloud 32

Final quote 33 [Cloud Computing] is a security nightmare and it can't be handled in traditional ways. John Chambers CISCO CEO

Secure Data Outsourcing 34

Homomorphic encryption The ability to perform computations on the ciphertext without decrypting it first A specific algebraic operation performed on the plaintext is equivalent to another (possibly different) algebraic operation performed on the ciphertext 35

A Simple Example Rot-13 is homomorphic with respect to concatenation 36

Homomorphic encryption schemes Multiplicative homomorphic – e.g. RSA Additive homomorphic, e.g. Paillier Fully homomorphic encryption (FHE) (Gentry, 2010) 37

Alternative techniques Search encrypted data Fragmentation Aggregation … 38