CLOUD PRIVACY AND SECURITY CS 595 LECTURE 16 4/19/2015.

Slides:



Advertisements
Similar presentations
Security by Design A Prequel for COMPSCI 702. Perspective “Any fool can know. The point is to understand.” - Albert Einstein “Sometimes it's not enough.
Advertisements

Guide to Network Defense and Countermeasures Second Edition
FIREWALLS Chapter 11.
Firewalls Dr.P.V.Lakshmi Information Technology GIT,GITAM University
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
FIREWALLS The function of a strong position is to make the forces holding it practically unassailable —On War, Carl Von Clausewitz On the day that you.
Security Issues and Challenges in Cloud Computing
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
System and Network Security Practices COEN 351 E-Commerce Security.
6/4/2015National Digital Certification Agency1 Security Engineering and PKI Applications in Modern Enterprises Mohamed HAMDI National.
Firewalls and Intrusion Detection Systems
Chapter 12 Network Security.
1 An Overview of Computer Security computer security.
Chapter 10 Firewalls. Introduction seen evolution of information systems now everyone want to be on the Internet and to interconnect networks has persistent.
An Overview of Cloud Security and Privacy CS 590, Fall 2010 Presenter: YounSun Cho Sep. 9, 2010.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Security Management IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
Lecture 11 Reliability and Security in IT infrastructure.
Web server security Dr Jim Briggs WEBP security1.
Bharat Bhargava Computer Science Purdue University Research in Cloud Computing YounSun Cho Computer Science Purdue.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
D ATABASE S ECURITY Proposed by Abdulrahman Aldekhelallah University of Scranton – CS521 Spring2015.
8-1 Chapter 8 Security Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on the use of these.
APA of Isfahan University of Technology In the name of God.
Cloud Computing Cloud Security– an overview Keke Chen.
Securing Information Systems
SEC835 Database and Web application security Information Security Architecture.
8: Network Security8-1 Security in the layers. 8: Network Security8-2 Secure sockets layer (SSL) r Transport layer security to any TCP- based app using.
Intranet, Extranet, Firewall. Intranet and Extranet.
FIREWALL Mạng máy tính nâng cao-V1.
1 Deployment of Computer Security in an Organization CE-408 Sir Syed University of Engineering & Technology 99-CE-282, 257 & 260.
1 Chapter 9 E- Security. Main security risks 2 (a) Transaction or credit card details stolen in transit. (b) Customer’s credit card details stolen from.
Firewalls A note on the use of these ppt slides:
C8- Securing Information Systems
Security considerations for mobile devices in GoRTT
1 CISCO SAFE: VALIDATED SECURITY REFERENCE ARCHITECTURE What It Is Business Transformation Top Questions To Ask To Initiate The Sale Where It Fits KEY.
FIREWALLS Vivek Srinivasan. Contents Introduction Need for firewalls Different types of firewalls Conclusion.
Ragib Hasan University of Alabama at Birmingham CS 491/691/791 Fall 2012 Lecture 4 09/10/2013 Security and Privacy in Cloud Computing.
Intrusion Detection Prepared by: Mohammed Hussein Supervised by: Dr. Lo’ai Tawalbeh NYIT- winter 2007.
1 CHAPTER 2 LAWS OF SECURITY. 2 What Are the Laws of Security Client side security doesn’t work Client side security doesn’t work You can’t exchange encryption.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
1 Topic 2: Lesson 3 Intro to Firewalls Summary. 2 Basic questions What is a firewall? What is a firewall? What can a firewall do? What can a firewall.
Cloud Computing Security Keep Your Head and Other Data Secure in the Cloud Lynne Pizzini, CISSP, CISM, CIPP Information Systems Security Officer Information.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
SECURITY Professor Mona Mursi. ENVIRONMENT IT infrastructures are made up of many components, abstractly: IT infrastructures are made up of many components,
Cloud Security and Privacy (Part 2). Security and Privacy Issues in Cloud Computing - Big Picture Infrastructure Security Data Security and Storage Identity.
Network Security & Accounting
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Chap1: Is there a Security Problem in Computing?.
Tamra Pawloski Jeff Miller. The views, information, and content expressed herein are those of the authors and do not necessarily represent the views of.
Csci5233 computer security & integrity 1 An Overview of Computer Security.
Security and Assurance in IT organization Name: Mai Hoang Nguyen Class: INFO 609 Professor: T. Rohm.
Chapter 8 Network Security Thanks and enjoy! JFK/KWR All material copyright J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking:
Computer Security By Duncan Hall.
References: “Hey, You, Get Off My Cloud: Exploring Information Leakage in Third-Party Compute Clouds” by Thomas Ristenpart, Eran Tromer – UC San Diego;
Role Of Network IDS in Network Perimeter Defense.
Cloud Security and Privacy. Outline Part I: Introduction Part II: Security and Privacy Issues in Cloud Computing 2.
IS3220 Information Technology Infrastructure Security
Cryptography and Network Security
Securing Access to Data Using IPsec Josh Jones Cosc352.
@Yuan Xue CS 285 Network Security Fall 2012 Yuan Xue.
Lecture 12 Page 1 CS 136, Spring 2009 Network Security: Firewalls CS 136 Computer Security Peter Reiher May 12, 2009.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Lecture 9 Page 1 CS 236 Online Firewalls What is a firewall? A machine to protect a network from malicious external attacks Typically a machine that sits.
CS457 Introduction to Information Security Systems
Security in Networking
IS4680 Security Auditing for Compliance
How to Mitigate the Consequences What are the Countermeasures?
Session 20 INST 346 Technologies, Infrastructure and Architecture
Presentation transcript:

CLOUD PRIVACY AND SECURITY CS 595 LECTURE 16 4/19/2015

OBJECTIVES A high-level discussion of the fundamental challenges and issues/characteristics of cloud computing Identify a few security and privacy issues within the framework of cloud computing Propose some approaches to addressing these issues Preliminary ideas to think about

LOCAL HOST SECURITY Are local host machines part of the cloud infrastructure? Outside the security perimeter While cloud consumers worry about the security on the cloud provider’s site, they may easily forget to harden their own machines The lack of security of local devices can Provide a way for malicious services on the cloud to attack local networks through these devices Compromise the cloud and its resources for other users

LOCAL HOST SECURITY (CONT.) With mobile devices, the threat may be even stronger Users misplace or have the device stolen from them Security mechanisms on handheld gadgets are often times insufficient compared to say, a desktop computer Provides a potential attacker an easy avenue into a cloud system. If a user relies mainly on a mobile device to access cloud data, the threat to availability is also increased as mobile devices malfunction or are lost Devices that access the cloud should have: Strong authentication mechanisms Strong isolation between applications Methods to trust the OS Cryptographic functionality when traffic confidentiality is required

APPLICATION LEVEL SECURITY Prevention of DoS Prevention of EDoS(Economic Denial of Sustainability) An attack against the billing model that underlies the cost of providing a service with the goal of bankrupting the service itself. Who is responsible for Web application security in the cloud? SaaS/PaaS/IaaS application security Customer-deployed application security

DATA SECURITY AND STORAGE Several aspects of data security, including: Data-in-transit Confidentiality + integrity using secured protocol Confidentiality with non-secured protocol and encryption Data-at-rest Generally, not encrypted, since data is combined with other users’ data Encryption if it is not associated with applications? But how about indexing and searching? Processing of data, including multitenancy For any application to process data, not encrypted

DATA SECURITY AND STORAGE Data remanence Inadvertent disclosure of sensitive information is possible Data security mitigation? Do not place any sensitive data in a public cloud Provider data and its security: storage Moreover, the physical security of the data center and the trustworthiness of system administrators take on new importance.

WHY IDENTITY AND ACCESS MANAGEMENT (IAM)? Manage access for diverse user populations (employees, contractors, partners, etc.) Increased demand for authentication personal, financial, medical data will now be hosted in the cloud S/W applications hosted in the cloud requires access control Need for higher-assurance authentication authentication in the cloud may mean authentication outside firewall Limits of password authentication Need for authentication from mobile devices

IAM CONSIDERATIONS The strength of authentication system should be reasonably balanced with the need to protect the privacy of the users of the system The system should allow strong claims to be transmitted and verified w/o revealing more information than is necessary for any given transaction or connection within the service Case Study: S3 outage authentication service overload leading to unavailability 2 hours 2/15/08 9

WHAT IS PRIVACY? The concept of privacy varies widely among (and sometimes within) countries, cultures, and jurisdictions. It is shaped by public expectations and legal interpretations; as such, a concise definition is elusive if not impossible. Privacy rights or obligations are related to the collection, use, disclosure, storage, and destruction of personal data. At the end of the day, privacy is about the accountability of organizations

WHAT IS THE DATA LIFE CYCLE? Personal information should be managed as part of the data used by the organization Protection of personal information should consider the impact of the cloud on each phase

WHAT ARE THE KEY PRIVACY CONCERNS? Typically mix security and privacy Some considerations to be aware of: Storage Retention Destruction Auditing, monitoring and risk management Privacy breaches Who is responsible for protecting privacy?

STORAGE The aggregation of data raises new privacy issues Some governments may decide to search through data without necessarily notifying the data owner, depending on where the data resides Whether the cloud provider itself has any right to see and access customer data? Some services today track user behaviour for a range of purposes, from sending targeted advertising to improving services

RETENTION How long is personal information (that is transferred to the cloud) retained? Which retention policy governs the data? Does the organization own the data, or the CSP? Who enforces the retention policy in the cloud, and how are exceptions to this policy (such as litigation holds) managed?

DESTRUCTION How does the cloud provider destroy private info at the end of the retention period? How do organizations ensure that their private info is destroyed by the CSP at the right point and is not available to other cloud users? Cloud storage providers usually replicate the data across multiple systems and sites— increased availability is one of the benefits they provide. How do you know that the CSP didn’t retain additional copies? Did the CSP really destroy the data, or just make it inaccessible? Is the CSP keeping the information longer than necessary so that it can mine the data for its own use?

AUDITING, MONITORING AND RISK MANAGEMENT How can organizations monitor their CSP and provide assurance that privacy requirements are met when their private info is in the cloud? Are they regularly audited? Who audits the CSP? What happens in the event of an incident? If business-critical processes are migrated to a cloud computing model, internal security processes need to evolve to allow multiple cloud providers to participate in those processes, as needed. These include processes such as security monitoring, auditing, forensics, incident response, and business continuity

PRIVACY BREACHES How do you know that a breach has occurred? How do you ensure that the CSP notifies you when a breach occurs? Who is responsible for managing the breach notification process (and costs associated with the process)? If contracts include liability for breaches resulting from negligence of the CSP? How is the contract enforced? How is it determined who is at fault?

WHO IS RESPONSIBLE FOR PROTECTING PRIVACY? Data breaches have a cascading effect Full reliance on a third party to protect personal data? In-depth understanding of responsible data stewardship Risk assessment and mitigation throughout the data life cycle is critical. Many new risks and unknowns The overall complexity of privacy protection in the cloud represents a bigger challenge. e.g., Suppose a hacker breaks into Cloud Provider A and steals data from Company X. Assume that the compromised server also contained data from Companies Y and Z. Who investigates this crime? Is it the Cloud Provider, even though Company X may fear that the provider will try to absolve itself from responsibility? Is it Company X and, if so, does it have the right to see other data on that server, including logs that may show access to the data of Companies Y and Z?

PART III. POSSIBLE SOLUTIONS Minimize Lack of Trust Policy Language Certification Minimize Loss of Control Monitoring Utilizing different clouds Access control management Identity Management (IDM) 19

SECURITY ISSUES IN THE CLOUD In theory, minimizing any of the issues would help: Third Party Cloud Computing Loss of Control Take back control Data and apps may still need to be on the cloud But can they be managed in some way by the consumer? Lack of trust Increase trust (mechanisms) Technology Policy, regulation Contracts (incentives): topic of a future talk

Confidentiality issues Malicious behavior by cloud provider Provider and its infrastructure has to be trusted KNOWN ISSUES: ALREADY EXIST

Threats can come from other consumers Due to the subtleties of how physical resources can be shared between VMs Such attacks are based on placement and extraction A customer VM and its adversary can be assigned to the same physical server Adversary can penetrate the VM and violate customer confidentiality NEW VULNERABILITIES & ATTACKS

Collaborative attacks Mapping of internal cloud infrastructure Identifying likely residence of a target VM Instantiating new VMs until one gets co-resident with the target Cross-VM side-channel attacks Extract information from target VM on the same machine MORE ON ATTACKS…

Can one determine where in the cloud infrastructure an instance is located? Can one easily determine if two instances are co-resident on the same physical machine? Can an adversary launch instances that will be co-resident with other user instances? Can an adversary exploit cross-VM information leakage once co- resident? Answer: Yes to all MORE ON ATTACKS…

- POLICY LANGUAGE - CERTIFICATION MINIMIZE LACK OF TRUST

MINIMIZE LACK OF TRUST: POLICY LANGUAGE Consumers have specific security needs but don’t have a say-so in how they are handled What the heck is the provider doing for me? Currently consumers cannot dictate their requirements to the provider (SLAs are one- sided) Standard language to convey one’s policies and expectations Agreed upon and upheld by both parties Standard language for representing SLAs Can be used in a intra-cloud environment to realize overarching security posture

MINIMIZE LACK OF TRUST: POLICY LANGUAGE (CONT.) Create policy language with the following characteristics: Machine-understandable (or at least processable), Easy to combine/merge and compare Examples of policy statements are, “requires isolation between VMs”, “requires geographical isolation between VMs”, “requires physical separation between other communities/tenants that are in the same industry,” etc.

MINIMIZE LACK OF TRUST: CERTIFICATION Certification Some form of reputable, independent, comparable assessment and description of security features and assurance Risk assessment Performed by certified third parties Provides consumers with additional assurance

FIREWALLS: WHY Prevent denial of service attacks: Packet flooding: Attacker establishes many bogus TCP connections, no resources left for “real” connections Prevent illegal modification/access of internal data Ex: attacker replaces CIA’s homepage with something else Allow only authorized access to inside network Set of authenticated users/hosts

LIMITATIONS OF FIREWALLS, GATEWAYS IP spoofing: router can’t know if data “really” comes from claimed source Filters often use all or nothing policy for UDP Tradeoff: degree of communication with outside world, level of security Many highly protected sites still suffer from attacks

INTRUSION DETECTION SYSTEMS IDS: Intrusion Detection System Deep packet inspection: look at packet contents Check character strings in packet against database of known virus, attack strings) Examine correlation among multiple packets Port scanning Network mapping DoS attack

Web server FTP server DNS server Internet firewall IDS sensors INTRUSION DETECTION SYSTEMS Multiple IDSs: Different types of checking at different locations internal network

CLOUD NETWORK SECURITY (SUMMARY) Basic techniques: Cryptography Message integrity End-point authentication Used in many different security scenarios Secure Client authentication Secure transport (SSL) Operational security: firewalls and IDS