Peter R. Pietzuch Ioannis Papagiannis Peter Pietzuch Large-Scale Distributed Systems Group ACM Cloud Computing.

Slides:



Advertisements
Similar presentations
Enabling Secure Internet Access with ISA Server
Advertisements

Cookies, Sessions. Server Side Includes You can insert the content of one file into another file before the server executes it, with the require() function.
Avoid data leakage, espionage, sabotage and other reputation and business risks without losing employee performance and mobility.
Introduction to PHP MIS 3501, Fall 2014 Jeremy Shafer
Introducing WatchGuard Dimension. Oceans of Log Data The 3 Dimensions of Big Data Volume –“Log Everything - Storage is Cheap” –Becomes too much data –
Sophos / Utimaco Data Loss Prevention Peter Szendröi, SOPHOS Nordics Jan 20, 2010.
The Most Dangerous Code in the Browser Stefan Heule, Devon Rifkin, Alejandro Russo, Deian Stefan Stanford University, Chalmers University of Technology.
An integrated system for handling restricted use data Felicia LeClere, Ph.D. IASSIST 2009 Tampere, Finland.
What is it? CLOUD COMPUTING.  Connects to the cloud via the Internet  Does computing tasks, or  Runs applications, or  Stores Data THE AVERAGE CLOUD.
Mgt 240 Lecture Website Construction: Software and Language Alternatives March 29, 2005.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
Lecture 16 Page 1 CS 236 Online Cross-Site Scripting XSS Many sites allow users to upload information –Blogs, photo sharing, Facebook, etc. –Which gets.
Pro Exchange SPAM Filter An Exchange 2000 based spam filtering solution.
Mobility Methods for document access while away from the office.
© 2011 Autodesk Securing AutoCAD IP in the era of WikiLeaks Presenter: Rahul Kopikar Co-Founder, Seclore Technology.
Company/Product Overview. You have lots of files all over the place.
Chapter 9 Collecting Data with Forms. A form on a web page consists of form objects such as text boxes or radio buttons into which users type information.
A Seminar on Securities In Cloud Computing Presented by Sanjib Kumar Raul Mtech(ICT) Roll-10IT61B09 IIT Kharagpur Under the supervision of Prof. Indranil.
1 Networks, advantages & types of What is a network? Two or more computers that are interconnected so they can exchange data, information & resources.
A Scalable Application Architecture for composing News Portals on the Internet Serpil TOK, Zeki BAYRAM. Eastern MediterraneanUniversity Famagusta Famagusta.
Dropbox is a tool the CSME will set up for its participants upon request so that participants do not have to upload podcasts to CSME servers via FTP (file.
Web Application Access to Databases. Logistics Test 2: May 1 st (24 hours) Extra office hours: Friday 2:30 – 4:00 pm Tuesday May 5 th – you can review.
C Copyright © 2009, Oracle. All rights reserved. Appendix C: Service-Oriented Architectures.
Green Computing Sharing files to reduce printing.
Web Application Firewall (WAF) RSA ® Conference 2013.
1 Internet Browsing Vulnerabilities and Security ECE4112 Final Lab Ye Yan Frank Park Scott Kim Neil Joshi.
Perimeters and Unicorns: Two Things That Only Exist in IT Fairyland Gary Paluch, CISSP, Sr. Sales Engineer.
Computer Emergency Notification System (CENS)
Security Scanners Mark Shtern. Popular attack targets Web – Web platform – Web application Windows OS Mac OS Linux OS Smartphone.
Client Call Back Client Call Back is useful for multiple clients to keep up to date about changes on the server Example: One auction server and several.
1 MSCS 237 Overview of web technologies (A specific type of distributed systems)
Workshop site:
Legal Issues Legal issues include copyright / intellectual property infringements, libel / defamation, disability discrimination and data protection. Any.
Module 8 : Configuration II Jong S. Bok
Company small business cloud solution Client UNIVERSITY OF BEDFORDSHIRE.
What is it? CLOUD COMPUTING.  Connects to the cloud via the Internet  Does computing tasks, or  Runs applications, or  Stores Data THE AVERAGE CLOUD.
Module: Software Engineering of Web Applications Chapter 2: Technologies 1.
What’s New Data Loss Prevention 14. Information is Everywhere Brings Productivity, Agility, Convenience ……and Problems Copyright © 2015 Symantec Corporation.
Session 11: Cookies, Sessions ans Security iNET Academy Open Source Web Development.
© 2015 Adobe Systems Incorporated. All Rights Reserved. Adobe Confidential. About this Presentation  How to use this deck:  This is the Global Channel.
By Collin Donaldson. Hacking is only legal under the following circumstances: 1.You hack (penetration test) a device/network you own. 2.You gain explicit,
Your data, protected and under control wherever they go SealPath Enterprise – IRM
Google Apps for Education Account Overview for Staff.
Complete Cloud Security Anyone, anywhere, any app, any device.
ArcGIS for Server Security: Advanced
BUILD SECURE PRODUCTS AND SERVICES
Transforming PowerPoints with Google Docs
A Seminar on Securities In Cloud Computing
Secure your complete data lifecycle using Azure Information Protection
TMG Client Protection 6NPS – Session 7.
BEST CLOUD COMPUTING PLATFORM Skype : mukesh.k.bansal.
About Dropbox Dropbox is a tool the CSME will set up for its participants upon request so that participants do not have to upload podcasts to CSME servers.
Cloud Computing I hear this question often. It is not easy to explain, because it means different things depending on who you talk to. Today’s Webinar.
Amazon Storage- S3 and Glacier
E-commerce | WWW World Wide Web - Concepts
E-commerce | WWW World Wide Web - Concepts
Web Caching? Web Caching:.
Secure your complete data lifecycle using Azure Information Protection
Threat Landscape for Data Security
A Seminar on Securities In Cloud Computing
File Sharing Training – Drop box and office 365
Encryption in Office 365 Shobhit Sahay Technical Product Manager
PHP and Forms.
Unit# 5: Internet and Worldwide Web
AbbottLink™ - IP Address Overview
PHP Forms and Databases.
Comodo Dome Data Protection
Cross Site Request Forgery (CSRF)
Presentation transcript:

Peter R. Pietzuch Ioannis Papagiannis Peter Pietzuch Large-Scale Distributed Systems Group ACM Cloud Computing Security Workshop (CCSW), October 19, 2012 Department of Computing CloudFilter Practical Control of Sensitive Data Propagation to the Cloud

Can an employee store files online? 2

Can an employee store files online? Not really… Hi Yiannis, Can you send me that file from my Dropbox? Sure, here it is! Why?! 3

Can an employee store files online? Not really… Why?! Policy 1: Employees should not waste time online on personal matters! Policy 2: Employees should not be able to send company files to arbitrary recipients! 4

Can an employee store files online? Not really… Why?! Dropbox enables large scale data disclosure It’s very easy for employees to misunderstand and violate the data propagation policy of the bank The bank wants to be able to blame employees if a leak occurs 5

Current solution: network-level blocking Network-level blocking of cloud services is not perfect: Why prevent workflows that involve non-sensitive data? Employees are more likely to bypass company policy completely by using personal devices 6

Threat Model Users are not malicious: Employees are trusted to decide whether data are sensitive or not Employees are accountable for their actions The cloud provider: Is trusted to collaborate with organisations and help them control access to their data 7

Objectives and Ideas CloudFilter’s objectives: Support (most) cloud storage providers help employees comply with data propagation policy log attempts to disclose sensitive data control how data are accessed after they have been uploaded 8 Important ideas: Three different types of data (confidential, public and protected) Most cloud storage providers support HTTP for file transfers Data propagation is controlled via labels embedded inside files

Cloud Storage Provider Policy CloudFilter File Upload Client Proxy Browser plugin Service Proxy 1 1 HTTP 2 2 File 3 3 label File label 4 4 Policy 5 5 9

Cloud Storage Provider CloudFilter File Download Client Proxy Browser plugin Service Proxy 1 1 HTTP Policy 2 2 File label

File Embedding labels inside files <rdf:Description rdf:about="" xmlns:cf0=" cf.doc.ic.ac.uk protected user ip108, prp policy id proxy addr parameters Labels can be embedded inside specific file types using Adobe’s eXtensible Metadata Platform (XMP) 11

Policy 1: Prevent all file uploads to Dropbox Client Proxy Browser plugin HTTP File Event {out} {put post} {(.*\.)*dropbox.com(/.*)* } Condition (none) Action return(“403”) 12

Policy 2: Only allow uploading public documents Client Proxy Browser plugin HTTP File Event {out} {put post} {(.*\.)*dropbox.com(/.*)* } Condition (none) Action form=createHTMLForm() resp=ask(form) if resp==“public”: log() return(issue()) else: return(“403”) 13

Cloud Storage Provider Policy 3: Only share documents across university staff Client ProxyService Proxy Policy (DN) Policy (DN) File UConfidential File Policy (UP) Policy (UP) University Student University Employee File UConfidential 14

CloudFilter++ 15

CloudFilter Limitations Limitations: No provenance » too irritating for the user User input is required to classify each file in a security category User input is required again after a file has been edited Restrictive data model » most web applications do not use files Web applications typically use a relational database and a custom data model Online document editors expose file export/import functionality but this does not preserve labels User files are typically stored online, edited locally 16

How will the future enterprise desktop look like? 17 start

The End 18 Ioannis Papagiannis DoC, Imperial College London

Policy specification: Event-Condition-Action (ECA) Data propagation policies they specify the actions of CloudFilter proxies when file transfers are detected have 3 parts (Event-Condition-Action) may be sent across proxies at runtime Part 1: Event the event that triggers an ECA policy is the invocation of an HTTP method Match HTTP requests according to (1) direction of data flow, (2) HTTP method, (3) target URL 19 Part 2: Condition The condition that must be satisfied is the existence of labeled files inside the HTTP request/response Two type of conditions (service-agnostic, service-specific) Part 3: Action A python script that a proxy executes to handle the file transfer The script can access the file and the HTTP request/response