Cong Wang1, Qian Wang1, Kui Ren1 and Wenjing Lou2

Slides:



Advertisements
Similar presentations
Creating HIPAA-Compliant Medical Data Applications with Amazon Web Services Presented by, Tulika Srivastava Purdue University.
Advertisements

Overview Network security involves protecting a host (or a group of hosts) connected to a network Many of the same problems as with stand-alone computer.
Secure Data Storage in Cloud Computing Submitted by A.Senthil Kumar( ) C.Karthik( ) H.Sheik mohideen( ) S.Lakshmi rajan( )
Secure Multiparty Computations on Bitcoin
Henry C. H. Chen and Patrick P. C. Lee
Efficient Information Retrieval for Ranked Queries in Cost-Effective Cloud Environments Presenter: Qin Liu a,b Joint work with Chiu C. Tan b, Jie Wu b,
Confidentiality and Privacy Controls
Software Certification and Attestation Rajat Moona Director General, C-DAC.
Lect. 18: Cryptographic Protocols. 2 1.Cryptographic Protocols 2.Special Signatures 3.Secret Sharing and Threshold Cryptography 4.Zero-knowledge Proofs.
Implementation of a Two-way Authentication Protocol Using Shared Key with Hash CS265 Sec. 2 David Wang.
SIA: Secure Information Aggregation in Sensor Networks Bartosz Przydatek, Dawn Song, Adrian Perrig Carnegie Mellon University Carl Hartung CSCI 7143: Secure.
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
Establishment of Conference Keys in Heterogeneous Networks Wade Trappe, Yuke Wang, K. J. Ray Liu ICC IEEE International Conference.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Privacy and Integrity Preserving in Distributed Systems Presented for Ph.D. Qualifying Examination Fei Chen Michigan State University August 25 th, 2009.
DSAC (Digital Signature Aggregation and Chaining) Digital Signature Aggregation & Chaining An approach to ensure integrity of outsourced databases.
Privacy-Preserving Computation and Verification of Aggregate Queries on Outsourced Databases Brian Thompson 1, Stuart Haber 2, William G. Horne 2, Tomas.
Chapter 16 Security. 2 Chapter 16 - Objectives u The scope of database security. u Why database security is a serious concern for an organization. u The.
DSAC (Digital Signature Aggregation and Chaining) Digital Signature Aggregation & Chaining An approach to ensure integrity of outsourced databases.
Pay As You Go – Associating Costs with Jini Leases By: Peer Hasselmeyer and Markus Schumacher Presented By: Nathan Balon.
Designing Security In Web Applications Andrew Tomkowiak 10/8/2013 UW-Platteville Software Engineering Department
D ATABASE S ECURITY Proposed by Abdulrahman Aldekhelallah University of Scranton – CS521 Spring2015.
Yin Yang, Dimitris Papadias, Stavros Papadopoulos HKUST, Hong Kong Panos Kalnis KAUST, Saudi Arabia Providence, USA, 2009.
Digital Cash By Gaurav Shetty. Agenda Introduction. Introduction. Working. Working. Desired Properties. Desired Properties. Protocols for Digital Cash.
Construction of efficient PDP scheme for Distributed Cloud Storage. By Manognya Reddy Kondam.
CS555Topic 211 Cryptography CS 555 Topic 21: Digital Schemes (1)
Wireless and Security CSCI 5857: Encoding and Encryption.
A Survey on Secure Cloud Data Storage ZENG, Xi CAI, Peng
DATA DYNAMICS AND PUBLIC VERIFIABILITY CHECKING WITHOUT THIRD PARTY AUDITOR GUIDED BY PROJECT MEMBERS: Ms. V.JAYANTHI M.E Assistant Professor V.KARTHIKEYAN.
1 Optimal Mail Certificates in Mail Payment Applications Leon Pintsov Pitney Bowes 2nd CACR Information Security Workshop 31 March 1999.
Privacy-Preserving Public Auditing for Secure Cloud Storage
SecureMR: A Service Integrity Assurance Framework for MapReduce Author: Wei Wei, Juan Du, Ting Yu, Xiaohui Gu Source: Annual Computer Security Applications.
02/22/2005 Joint Seminer Satoshi Koga Information Technology & Security Lab. Kyushu Univ. A Distributed Online Certificate Status Protocol with Low Communication.
Phosphor A Cloud based DRM Scheme with Sim Card th International Asia-Pacific Web Conference Author : Peng Zou, Chaokun Wang, Zhang Liu, Dalei.
Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems.
Chapter 21 Distributed System Security Copyright © 2008.
Speaker: Meng-Ting Tsai Date:2010/11/16 Toward Publicly Auditable Secure Cloud Data Storage Services Cong Wang and Kui Ren..etc IEEE Communications Society.
Strong Security for Distributed File Systems Group A3 Ka Hou Wong Jahanzeb Faizan Jonathan Sippel.
Presented by: Suparita Parakarn Kinzang Wangdi Research Report Presentation Computer Network Security.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
. 1. Computer Security Concepts 2. The OSI Security Architecture 3. Security Attacks 4. Security Services 5. Security Mechanisms 6. A Model for Network.
Abstract With the advent of cloud computing, data owners are motivated to outsource their complex data management systems from local sites to the commercial.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
14.1/21 Part 5: protection and security Protection mechanisms control access to a system by limiting the types of file access permitted to users. In addition,
Merkle trees Introduced by Ralph Merkle, 1979 An authentication scheme
Multi-user Broadcast Authentication in Wireless Sensor Networks Kui Ren, Wenjing Lou, Yanchao Zhang SECON2007 Manar Mahmoud Abou elwafa.
Data Integrity Proofs in Cloud Storage Author: Sravan Kumar R and Ashutosh Saxena. Source: The Third International Conference on Communication Systems.
Lecture 5.1: Message Authentication Codes, and Key Distribution
The world leader in serving science Overview of Thermo 21 CFR Part 11 tools Overview of software used by multiple business units within the Spectroscopy.
Bloom Cookies: Web Search Personalization without User Tracking Authors: Nitesh Mor, Oriana Riva, Suman Nath, and John Kubiatowicz Presented by Ben Summers.
SACRED REQUIREMENTS DOCUMENT Stephen Farrell, Baltimore Alfred Arsenault, Diversinet.
WHAT IS E-COMMERCE? E-COMMERCE is a online service that helps the seller/buyer complete their transaction through a secure server. Throughout the past.
Presented By Amarjit Datta
Interleaving and Collusion Attacks on a Dynamic Group Key Agreement Scheme for Low-Power Mobile Devices * Junghyun Nam 1, Juryon Paik 2, Jeeyeon Kim 2,
NC-Audit: Auditing for Network Coding Storage Anh Le and Athina Markopoulou University of California, Irvine.
Text TCS INTERNAL Oracle PL/SQL – Introduction. TCS INTERNAL PL SQL Introduction PLSQL means Procedural Language extension of SQL. PLSQL is a database.
9.2 SECURE CHANNELS JEJI RAMCHAND VEDULLAPALLI. Content Introduction Authentication Message Integrity and Confidentiality Secure Group Communications.
Database Laboratory Regular Seminar TaeHoon Kim Article.
SDSM IN MOBILE CLOUD COMPUTING By- ID NO-1069 K.C. SHARMILAADEVI Sethu Institute Of Tech IV year-ECE Department CEC Batch: AUG 2012.
Cryptographic Hash Function. A hash function H accepts a variable-length block of data as input and produces a fixed-size hash value h = H(M). The principal.
Shucheng Yu, Cong Wang, Kui Ren,
Searchable Encryption in Cloud
VIRTUALIZATION & CLOUD COMPUTING
By:- Kan Yang, Xiaohua Jia
Hybrid Cloud Architecture for Software-as-a-Service Provider to Achieve Higher Privacy and Decrease Securiity Concerns about Cloud Computing P. Reinhold.
Chapter 2: System Structures
ONLINE SECURE DATA SERVICE
Slalom: Fast, Verifiable and Private Execution of Neural Networks in Trusted Hardware Kriti shreshtha.
MPC Scenario 1. “Privacy-protected contingency tables”
Presentation transcript:

Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing Cong Wang1, Qian Wang1, Kui Ren1 and Wenjing Lou2 1 Illinois Institute of Technology, 2 Worcester Polytechnic Institute Proceedings of IEEE Infocom 2010 Computer Systems Lab Group Meeting Presented by: Zakhia Abichar February 25, 2010

Cloud Computing With cloud computing, users can remotely store their data into the cloud and use on-demand high-quality applications Using a shared pool of configurable computing resources Data outsourcing: users are relieved from the burden of data storage and maintenance When users put their data (of large size) on the cloud, the data integrity protection is challenging Enabling public audit for cloud data storage security is important Users can ask an external audit party to check the integrity of their outsourced data Cloud network data user External Audit party

Third Party Auditor (TPA) External audit party is called TPA TPA helps the user to audit the data To allow TPA securely: 1) TPA should audit the data from the cloud, not ask for a copy 2) TPA should not create new vulnerability to user data privacy This paper presents a privacy-preserving public auditing system for cloud data storage Cloud network data user External Audit party

Outline Introduction System and threat model Proposed scheme Security analysis & performance evaluation

Introduction Cloud computing gives flexibility to users Users pay as much as they use Users don’t need to set up the large computers But the operation is managed by the Cloud Service Provider (CSP) The user give their data to CSP; CSP has control on the data The user needs to make sure the data is correct on the cloud Internal (some employee at CSP) and external (hackers) threats for data integrity CSP might behave unfaithfully For money reasons, CSP might delete data that’s rarely accessed CSP might hide data loss to protect their reputation

Introduction How to efficiently verify the correctness of outsourced data? Simply downloading the data by the user is not practical TPA can do it and provide an audit report TPA should not read the data content Legal regulations: US Health Insurance Portability and Accountability Act (HIPAA) This paper presents how to enable privacy-preserving third-party auditing protocol First work in the literature to do this

System and Threat Model U: cloud user has a large amount of data files to store in the cloud CS: cloud server which is managed by the CSP and has significant data storage and computing power (CS and CSP are the same in this paper) TPA: third party auditor has expertise and capabilities that U and CSP don’t have. TPA is trusted to assess the CSP’s storage security upon request from U

A note on auditing What’ is auditing? Reference: http://searchcio.techtarget.com/searchCIO/downloads/AuditTheDataOrElse.pdf

A Public Auditing Scheme This is a framework from previous related work. It is adapted to suit the goals of this paper Consists of four algorithms (KeyGen, SigGen, GenProof, VerifyProof) KeyGen: key generation algorithm that is run by the user to setup the scheme SigGen: used by the user to generate verification metadata, which may consist of MAC, signatures or other information used for auditing GenProof: run by the cloud server to generate a proof of data storage correctness VerifyProof: run by the TPA to audit the proof from the cloud server

Verification Metadata Setup user KeyGen SigGen File F Public & Secret parameters Verification Metadata TPA Audit TPA CSP issues an audit message or a challenge to CSP GenProof File F Response message TPA VerifyProof Verification Metadata

File is divided into blocks Basic Scheme 1 Block 1 Block n Block 2 … MAC key File block code File is divided into blocks Cloud user TPA Block 1 Block n … Block 2 code 1 code n code 2 Message Authentication Code (MAC) Audit TPA demands a random number of blocks and their code from CSP TPA uses the key to verify the correctness of the file blocks User computes the MAC of every file block Transfers the file blocks & codes to cloud Shares the key with TPA Drawbacks: -The audit demands retrieval of user’s data; this is not privacy-preserving -Communication and computation complexity are linear with the sample size

Basic Scheme 2 user Cloud Setup Block 1 Block n … Block 2 Key 1 code 1 code n … code 2 Block 1 Block m … Block 2 Key 2 code 1 code n … code 2 … Key s code 1 code n … code 2 Cloud TPA Setup User uses s keys and computes the MAC for blocks User shares the keys and MACs with TPA Audit TPA gives a key (one of the s keys) to CSP and requests MACs for the blocks TPA compares with the MACs at the TPA Improvement from Scheme 1: TPA doesn’t see the data, preserves privacy Drawback: a key can be used once. The TPA has to keep a state; remembering which key has been used Schemes 1 & 2 are good for static data (data doesn’t change at the cloud)

Privacy-Preserving Public Auditing Scheme Proposed scheme Uses homomorphic authenticator Also uses a random mask achieved by a Pseudo Random Function (PRF) Homomorphic authenticator Block 1 Block 2 … Block k Verification Metadata Verification Metadata Verification Metadata Aggregate Verification Metadata A linear combination of data blocks can be verified by looking only at the aggregated authenticator

Privacy-Preserving Public Auditing Scheme - In addition to Aggregate Authenticator, the TPA will receive a linear combination of file blocks: Random Mask by PRF The PRF function masks the data It has a property of not affecting the Verification Metadata vi are random number mi are file blocks If TPA sees many linear combinations of the same blocks, it might be able to infer the file blocks This, we also use a random mask provided by the Pseudo Random Function (PRF) Block 1 Block 1 Block 1 with PRF Mask Verification Metadata Verification Metadata  Equal  r is the mask

σ1 σ2 σn σ1 σn σ2 Setup user KeyGen Public key (sk)& Secret key (pk) SigGen user sk Block 1 Block 2 Block n … σ1 σ2 σn Block 1 Block n … Block 2 σ1 σn σ2 1- User generates public and secret parameters 2- A code is generated for each file block 3- The file blocks and their codes are transmitted to the cloud Audit TPA sends a challenge message to CSP It contains the position of the blocks that will be checked in this audit Selected blocks in challenge -CSP also makes a linear combination of selected blocks and applies a mask. Separate PRF key for each auditing. -CSP send aggregate authenticator & masked combination of blocks to TPA CSP GenProof Aggregate authenticator Masked linear combination of requested blocks TPA Compare the obtained Aggregate authenticator to the one received from CSP VerifyProof Aggregate authenticator

Properties The data sent from CSP to TPA is independent of the data size Linear combination with mask Previous work has shown that if the server is missing 1% of the data We need 300 or 460 blocks to detect that with a probability larger than 95% or 99%, respectively

More Possible Extensions Batch auditing There are K users having K files on the same cloud They have the same TPA Then, the TPA can combine their queries and save in computation time The comparison function that compares the aggregate authenticators has a property that allows checking multiple messages in one equation Instead of 2K operation, K+1 are possible Data dynamics The data on the cloud may change according to applications This is achieved by using the data structure Merkle Hash Tree (MHT) With MHT, data changes in a certain way; new data is added in some places There is more overhead involved ; user sends the tree root to TPA This scheme is not evaluated in the paper

Performance Reference [11] doesn’t have privacy-preserving property TPA can read the information

Batch Auditing Number of auditing tasks increased from 1 to 200 in multiple of 8 Auditing time per task: total auditing time / number of tasks

Performance with Invalid Responses In batch auditing, true means that all of the messages are correct False means at least one is wrong Divide batch in half, repeat for left- and right parts Binary search Wrong 1 2 3 4 5 6 7 8 9 10 Wrong 1 2 3 4 5 6 7 8 9 10 1,2,3 and 9,10 1 2 3 4 5 6 7 8 9 10 3 and 10 1 2 3 4 5 6 7 8 9 10

The more errors that there is, it takes more time to find them