Data Confidentiality on Clouds Sharad Mehrotra University of California, Irvine.

Slides:



Advertisements
Similar presentations
Querying Encrypted Data using Fully Homomorphic Encryption Murali Mani, UMFlint Talk given at CIDR, Jan 7,
Advertisements

Prepared for [xxxx] – Commercial in Confidence connect transform protect A Cloudy Cyberspace? Tony Roadknight – Technical Architect.
Trust Management of Services in Cloud Environments:
Operating System Security
A Privacy Preserving Index for Range Queries
Efficient Information Retrieval for Ranked Queries in Cost-Effective Cloud Environments Presenter: Qin Liu a,b Joint work with Chiu C. Tan b, Jie Wu b,
NIST Big Data Public Working Group Security and Privacy Subgroup Presentation September 30, 2013 Arnab Roy, Fujitsu Akhil Manchanda, GE Nancy Landreville,
Towards a dynamic multi-cloud computing universe Divy Agrawal & Amr El Abbadi UC Santa Barbara
Introduction to Practical Cryptography Lecture 9 Searchable Encryption.
2 Your data is anywhere but not in your control Security breaches are recurrent – Weakest link: hardware, software, technicians, … You may trust the science.
CryptDB: A Practical Encrypted Relational DBMS Raluca Ada Popa, Nickolai Zeldovich, and Hari Balakrishnan MIT CSAIL New England Database Summit 2011.
UT DALLAS Erik Jonsson School of Engineering & Computer Science FEARLESS engineering BigSecret: A Secure Data Management Framework for Key-Value Stores.
Security Issues and Challenges in Cloud Computing
Supervisor : Mr. Hadi Salimi Advanced Topics in Information Systems Mazandaran University of Science and Technology February 4, 2011 Survey on Cloud Computing.
Future Work Needed Kenneth Wade Najim Yaqubie. Outline 1.Model is simple 2.Too many assumptions 3.Conflicting internal architectures 4.Security Challenges.
1 Efficient Conjunctive Keyword Search on Encrypted Data Storage System Author : Jin Wook Byun Dong Hoon Lee Jongin Lim Presentered by Chia Jui Hsu Date.
 Relational Cloud: A Database-as-a-Service for the Cloud Carlo Curino, Evan Jones, Raluca Ada Popa, Nirmesh Malaviya, Eugene Wu, Sam Madden, Hari Balakrishnan,
Research interest: Secure database outsourcing Presented by Alla Lanovenko Thesis Adviser: Professor Huiping Guo 599 A 11 December 2006.
Engineering the Cloud Andrew McCombs March 10th, 2011.
Cloud Computing Stuart Dillon-Roberts. “In the simplest terms, cloud computing means storing & accessing data & programs over the Internet instead of.
Cloud Computing ity-notre-dame-logo.jpg Matthew Cunningham Selina Sambar Maria Skorcz.
© 2012 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual.
Plan Introduction What is Cloud Computing?
Cloud Computing Cloud Security– an overview Keke Chen.
CLOUD COMPUTING & COST MANAGEMENT S. Gurubalasubramaniyan, MSc IT, MTech Presented by.
Page  1 SaaS – BUSINESS MODEL Debmalya Khan DEBMALYA KHAN.
MIGRATING INTO A CLOUD P. Sai Kiran. 2 Cloud Computing Definition “It is a techno-business disruptive model of using distributed large-scale data centers.
Cloud Enabled Healthcare Presented by: Ron Parker and Stanley Ratajczak Emerging Technology Group Canada Health Infoway Inc. May 28, 2013Copyright © 2013.
Regular Expression Search over Encrypted Big Data in the Cloud Mohsen Amini Salehi Visiting Assistant Professor CACS Department Spring ‘15 1.
Cloud Computing Kwangyun Cho v=8AXk25TUSRQ.
Computer Science and Engineering 1 Cloud ComputingSecurity.
Risk Management & Legal Issues in Cloud Practice Christopher Dodorico Director, PricewaterhouseCoopers Wednesday, October 10, 2012.
2-Oct-15 1 Introduction to Software Engineering Softwares Importance of SWE Basic SWE Concepts ICS Software Engineering.
2-Oct-15 Introduction to SWE1 Introduction to Software Engineering Softwares Importance of SWE Basic SWE Concepts.
HPCC 2015, August , New York, USA Wei Chang c Joint work with Qin Liu a, Guojun Wang b, and Jie Wu c a. Hunan University, P. R. China b. Central.
Varunya Attasena Nouria Harbi Jérôme Darmont fVSS: A New Secure and Cost-Efficient Scheme for Cloud Data Warehouses.
Privacy Communication Privacy Confidentiality Access Policies Systems Crypto Enforced Computing on Encrypted Data Searching and Reporting Fully Homomorphic.
Plan  Introduction  What is Cloud Computing?  Why is it called ‘’Cloud Computing’’?  Characteristics of Cloud Computing  Advantages of Cloud Computing.
NIST Big Data Public Working Group Security and Privacy Subgroup Presentation September 30, 2013 Arnab Roy, Fujitsu Akhil Manchanda, GE Nancy Landreville,
What is the cloud ? IT as a service Cloud allows access to services without user technical knowledge or control of supporting infrastructure Best described.
1 NETE4631 Course Wrap-up and Benefits, Challenges, Risks Lecture Notes #15.
1 Common Secure Index for Conjunctive Keyword-Based Retrieval over Encrypted Data Peishun Wang, Huaxiong Wang, and Josef Pieprzyk: SDM LNCS, vol.
Protection of outsourced data MARIA ANGEL MARQUEZ ANDRADE.
CLOUDS. Online applications What is cloud computing Common, Location-independent, Online Utility on Demand Common implies multi-tenancy, not single or.
CS525: Big Data Analytics MapReduce Computing Paradigm & Apache Hadoop Open Source Fall 2013 Elke A. Rundensteiner 1.
Computer System Design Lab 1 Inverted Index Based Multi-Keyword Public-key Searchable Encryption with Strong Privacy Guarantee Bing Wang * Wei Song *†
Searching Over Encrypted Data Charalampos Papamanthou ECE and UMIACS University of Maryland, College Park Research Supported By.
Secure Data Outsourcing
Keyword search on encrypted data. Keyword search problem  Linux utility: grep  Information retrieval Basic operation Advanced operations – relevance.
PRESENTED BY– IRAM KHAN ISHITA TRIPATHI GAURAV AGRAWAL GAURAV SINGH HIMANSHU AWASTHI JAISWAR VIJAY KUMAR JITENDRA KUMAR VERMA JITENDRA SINGH KAMAL KUMAR.
Agenda © 2015 | Tel: (980) | Big Data: Types of data and benefits Implementation Challenges / Risks Tools & Platforms.
PREPARED BY: MS. ANGELA R.ICO & MS. AILEEN E. QUITNO (MSE-COE) COURSE TITLE: OPERATING SYSTEM PROF. GISELA MAY A. ALBANO PREPARED BY: MS. ANGELA R.ICO.
4a. Aula 2o. Período de Livro texto Copyright © 2012, Elsevier Inc. All rights reserved March 5, 2012 Prof. Kai Hwang, USC Cloud Roles in.
An Introduction to SaaS and Cloud Computing Ross Cooney.
Practical Private Range Search Revisited
Chapter 1 Characterization of Distributed Systems
Searchable Encryption in Cloud
Efficient Multi-User Indexing for Secure Keyword Search
Cloud Security– an overview Keke Chen
Using cryptography in databases and web applications
IS4680 Security Auditing for Compliance
Cloud Security 李芮,蒋希坤,崔男 2018年4月.
Cloud Computing: Concepts
Computer Science and Engineering
Data Warehousing Data Mining Privacy
Dark Data Are we at risk?.
Final exam question format
Final exam question format
Presentation transcript:

Data Confidentiality on Clouds Sharad Mehrotra University of California, Irvine

Cloud Computing X as a service, where X is: X as a service, where X is: –Infrastructure, platforms, Software, – Storage, Application, test environments… Characteristics: Characteristics: –Elastic-- Use as much as your needs –Pay for only what you use –Don’t worry about: –system management headaches –Failures –loss of data due to failures –.. –Cheaper due to economy of scale –Better control over IT investments Challenges Challenges –scalability, elasticity, consistency, big data management, interoperability, migration, multi-tenancy, pricing … 2 Utility model

Cloud Computing X as a service, where X is: X as a service, where X is: –Infrastructure, platforms, Software, – Storage, Application, test environments… Characteristics: Characteristics: –Elastic -- Use as much as your needs –Pay for only what you use –Don’t worry about –No system management headaches –, loss of data due to failures –Cheaper due to economy of scale –Better control over IT investment Infrastructure Challenges: Infrastructure Challenges: –Scale, multi-tenancy, elasticity, consistency, big data management, interoperability, migration, pricing … 3 Utility model

Implications of Loss of Control 4 End Users Cloud Integrity Integrity Will the CSP serve my data correctly? Will the CSP serve my data correctly? Can my data get corrupted? Can my data get corrupted? Availability Availability Will I have access to my data and services at all times? Will I have access to my data and services at all times? Security Security Will the CSP implement its own security policies appropriately? Will the CSP implement its own security policies appropriately? Privacy & confidentiality Privacy & confidentiality Will sensitive data remain confidential? Will sensitive data remain confidential? Will my data be vulnerable to misuse? By other tenants? By the service provider? Will my data be vulnerable to misuse? By other tenants? By the service provider?

So will Crypto Researchers Solve the Problem? 5 Large body of research in applied crypto over 2 decades Generality, Efficiency, Security Binary notion of security Semantic security, Perfect Secrecy Great for some user- communities (military, government, trade-secrets) Overprotection if user- community is common users of the cloud. -How much are we willing to pay to prevent leakage of “Mom’s secret recipe” Encrypte d search / computati on Queries over encrypted (semi- )structure d data Bucketizatio n (Hacigumus, Sigmod 2002, Hore, VLDB 2004, VLDBJ 2012) OPE (Agraw al Sigmod 2004) Range queries on encrypted data (Shi, S&P 2007) Onion encryption (Popa et al., Sosp ‘11) Fully homomorph ic encryption (Gentry, STOC 2009) Keyword search over encrypted text Symmetri c key based schemes Searchable document encryption (Song, S&P 2000) Encrypted bloom filters (Goh, 2003) Encrypted inverted lists (Curtmola, CCS 2006) Public- key based schemes Bilinear maps (Boneh,Eu rocrypt 2003) Conjuncti ve keyword search (Golle, ACNS 2004) Other schemes (informati on hiding) Coloring based document indexing (Hore, SDM 2012) Classification of Research on Encrypted Search [ Hacigumus, et. al. Survey, 2007, Bagherzandi et al., Encyclopedia entry 2011 ]

Risk Based Data Processing in Clouds Risk Based Approach Data (R) Workload (Q) Sensitivity Disclosure Performance Cost Usability Each point represents a different representation of data User Specific constraints on disclosure, costs, etc. Multi Criteria Optimization Data, Workload Partitions (R Cli, R Serv, Q Cli, Q Serv ) and Workload Execution Plan Challenges: Modeling risks – function of trust, security, data representation, sensitivity, exposure duration, usefulness to adversary, … Modeling risks – function of trust, security, data representation, sensitivity, exposure duration, usefulness to adversary, … Mechanism to trace “sensitivity/risk provenance” Mechanism to trace “sensitivity/risk provenance” Mechanisms to Partition Computation & data -- Robust, adaptive, efficient, general,.. Mechanisms to Partition Computation & data -- Robust, adaptive, efficient, general,.. Systems we are building (RADICLE Project at UCI) CloudProtect – (usability versus confidentiality tradeoff) CloudProtect – (usability versus confidentiality tradeoff) –empowers end-users to control loss of data in using web applications such as Box, Google Drive, picasa, shutterfly, etc. Hybridizer – (Cost, performance, confidentiality tradeoffs) Hybridizer – (Cost, performance, confidentiality tradeoffs) – partitioning Hive & map reduce jobs across hybrid clouds to control information leakage Empower owners to strike a balance between risk, performance, and costs by steering data & computation appropriately in mixed trust environments