SOME SECURITY CHALLENGES IN CLOUD COMPUTING

57
SOME SECURITY CHALLENGES IN CLOUD COMPUTING Hoang N.V.

Transcript of SOME SECURITY CHALLENGES IN CLOUD COMPUTING

Page 1: SOME SECURITY CHALLENGES  IN CLOUD COMPUTING

SOME SECURITY CHALLENGES IN CLOUD COMPUTING

Hoang N.V.

Page 2: SOME SECURITY CHALLENGES  IN CLOUD COMPUTING

What is cloud computing?

Page 3: SOME SECURITY CHALLENGES  IN CLOUD COMPUTING
Page 4: SOME SECURITY CHALLENGES  IN CLOUD COMPUTING

"pay-per-use model for enabling available,convenient and on-demand network access to ashared pool of configurable computing resources(e.g., networks, servers, storage, applications andservices) that can be rapidly provisioned andreleased with minimal management effort orservice provider interaction.“ by NIST

Cloud computing: Advantages

Page 5: SOME SECURITY CHALLENGES  IN CLOUD COMPUTING

Today

Page 6: SOME SECURITY CHALLENGES  IN CLOUD COMPUTING

Cloud providers bring in $2B in first quarter -- source: Synergy Research Group, May, 2013

The overall cloud market will hit $71 billion in 2015 Source: Gartner Company data, Macquarie Capital (USA), Jan. 2013

Future

Page 7: SOME SECURITY CHALLENGES  IN CLOUD COMPUTING

Cloud computing is the next big thing

Page 8: SOME SECURITY CHALLENGES  IN CLOUD COMPUTING

Challenges for Cloud Computing

Page 9: SOME SECURITY CHALLENGES  IN CLOUD COMPUTING
Page 10: SOME SECURITY CHALLENGES  IN CLOUD COMPUTING

Trust

Page 11: SOME SECURITY CHALLENGES  IN CLOUD COMPUTING

Trust me, please!

Oh, no

Page 12: SOME SECURITY CHALLENGES  IN CLOUD COMPUTING

Broad Attacking Surface

We have everything in the cloud.

Everything is virtual. Loss physical control

Page 13: SOME SECURITY CHALLENGES  IN CLOUD COMPUTING

Broad Attacking Surface

Data breach

Malicious Insider

Insecure Interface or APIs

Page 14: SOME SECURITY CHALLENGES  IN CLOUD COMPUTING

Broad Attacking Surface

Many others yet to be identified ...

4

13

10

9

7

0 2 4 6 8 10 12 14

Before Year 2008

Year 2008

Year 2009

Year 2010

Year 2011

No. of Incidents with Unknown Causes by Year

CSA report 2012 (Revised March 13, 2013)

Page 15: SOME SECURITY CHALLENGES  IN CLOUD COMPUTING

Storage outsourcing

Page 16: SOME SECURITY CHALLENGES  IN CLOUD COMPUTING

Security challenges with storage outsourcing

Data Integrity

Page 17: SOME SECURITY CHALLENGES  IN CLOUD COMPUTING

Security challenges with storage outsourcing

Internal: Byzantine failure, management errors, software bugs, ...

External: malware, economically motivated attacks, ...

(Data Integrity)

Page 18: SOME SECURITY CHALLENGES  IN CLOUD COMPUTING

Security challenges with storage outsourcing

(Data Integrity)

Page 19: SOME SECURITY CHALLENGES  IN CLOUD COMPUTING

Data Integrity

Page 20: SOME SECURITY CHALLENGES  IN CLOUD COMPUTING

Data Integrity

Page 21: SOME SECURITY CHALLENGES  IN CLOUD COMPUTING

Data Integrity

Page 22: SOME SECURITY CHALLENGES  IN CLOUD COMPUTING

Security challenges with storage outsourcing

(Data Integrity)

Cloud currently offers no guarantee

Should we trust the cloud 100 percent

for the storage integrity?

Data owners need a means to ensure

continuous correctnesss of outsourced

cloud data.

Page 23: SOME SECURITY CHALLENGES  IN CLOUD COMPUTING

Security challenges with storage outsourcing

(Data Integrity)

Is my data correctly stored?

Storage correctness proofs

Secure Cloud Storage Auditing

Page 24: SOME SECURITY CHALLENGES  IN CLOUD COMPUTING

Traditional method for data integrity

message m k k

Generate tag:tag S(k, m)

tag

Verify tag:V(k, m’, tag’) = ‘yes’

Def: MAC I = (S,V) defined over (K,M,T) is a pair of algs:

• S(k,m) outputs t in T

• V(k,m,t) outputs yes or no

Message Authentication Code (MAC)

Page 25: SOME SECURITY CHALLENGES  IN CLOUD COMPUTING

Secure Cloud Storage Auditing

Is my data correctly stored(k1)

DATA

DATA’

MAC(k1, DATA’)

MAC(k1,DATA)

Before putting data in the cloud, must calculate and store

MAC(k2,DATA) MAC(kn,DATA)

Page 26: SOME SECURITY CHALLENGES  IN CLOUD COMPUTING

Secure Cloud Storage Auditing

SecurityConvenienceOverhead

Challenges

Have to explore tradeoffs to maintain lowcommunication and compution overheadon both owner and server side.

Page 27: SOME SECURITY CHALLENGES  IN CLOUD COMPUTING

Secure Cloud Storage Auditing

Challenges

Cope with frequent cloud data

changing while ensuring continuousdata auditing

Page 28: SOME SECURITY CHALLENGES  IN CLOUD COMPUTING

Public Private

Privacy-preserving public auditing

Page 29: SOME SECURITY CHALLENGES  IN CLOUD COMPUTING

Batch auditing improves

efficiency and saves computation and communication overhead.

Page 30: SOME SECURITY CHALLENGES  IN CLOUD COMPUTING

Secure Cloud Storage Auditing

Solutions

Cloud

Serverσ1

m1

σ2

m2

σ4

m4

σ1

m1

σ2

m2

σ3

m3

σ4

m4

…σn

mn

σ1

m1

σ2

m2

σ

μ +

.

Page 31: SOME SECURITY CHALLENGES  IN CLOUD COMPUTING

Redundantly stores data in multiple facilities and on multiple devices with each facility.

Can we trust?

Designed to substain the concurrent loss of data two facilities.

Page 32: SOME SECURITY CHALLENGES  IN CLOUD COMPUTING

Security challenges with storage outsourcing

(Data Integrity)

? F file

return F file

Cloud storage provider claims to store three distinct copiesof my file for resillience.

Can we trust? No, if they can’t prove it (Redundancy)?

F

Page 33: SOME SECURITY CHALLENGES  IN CLOUD COMPUTING

Security challenges with storage outsourcing

File F can survive two disk crashes

Disk 2 Disk 3 Disk 4 Disk 5Disk 1Virtual Virtual Virtual Virtual Virtual

FF F

F

A single disk crash can destroy F file

Virtualization is a complication.

We need proofs of data redundancy on the physical layer.

Page 34: SOME SECURITY CHALLENGES  IN CLOUD COMPUTING

Proof of redundancy

Solutions

Eeta Pizza Pi Cheapskate Pizza

“Six pizzas!”

The Pizza Oven Protocol (Juels A. 2011) Network latency

Drive read time

Slides credits to Ari Jules et al.

Page 35: SOME SECURITY CHALLENGES  IN CLOUD COMPUTING

as well as encryption for both secure transit and secure storage at rest.

Page 36: SOME SECURITY CHALLENGES  IN CLOUD COMPUTING
Page 37: SOME SECURITY CHALLENGES  IN CLOUD COMPUTING

Celebrity photo leakage

Page 38: SOME SECURITY CHALLENGES  IN CLOUD COMPUTING

Security challenges with storage outsourcing

(Data leakage)

DATADATA

DATAle

akage

Page 39: SOME SECURITY CHALLENGES  IN CLOUD COMPUTING

Security challenges with storage outsourcing

(Data leakage)

DATA

E( ,DATA)le

akage

E( ,DATA)

Page 40: SOME SECURITY CHALLENGES  IN CLOUD COMPUTING

Services Front End Storage Back End

Security challenges with storage outsourcing

(Data leakage)

DATA leakage

Challenge: Proofs of encrypting data at rest

Page 41: SOME SECURITY CHALLENGES  IN CLOUD COMPUTING

12/2013

9/2014

10/2014

09/201005/2013

Sensitive data must be encrypted before putting on the cloud server

Page 42: SOME SECURITY CHALLENGES  IN CLOUD COMPUTING

Data Ultiliztion

Data Encryption

Page 43: SOME SECURITY CHALLENGES  IN CLOUD COMPUTING
Page 44: SOME SECURITY CHALLENGES  IN CLOUD COMPUTING

Whitten A., Tygar J. D., Why Johnny can’t encrypt: a usability ofevaluation of PGP 5.0, SSYM'99 Proceedings of the 8th conference onUSENIX Security Symposium

Page 46: SOME SECURITY CHALLENGES  IN CLOUD COMPUTING

Data Encryption vs Data UtilizationSolutions

[Goldreich-Ostrovsky92]

[Song-Wagner-Perrig-S&P00][Goh-ePrint-03, Chang-Mitzenmacher-ACNS05] [Curtmola-Garay-Kamara-Ostrovsky-ccs06]

[Boneh et al. EUROCRYPT’04]

Page 47: SOME SECURITY CHALLENGES  IN CLOUD COMPUTING

But, encryption is not always enough.

Access patternscan leak sensitive information.

Challenge: How to hide access patterns

Page 48: SOME SECURITY CHALLENGES  IN CLOUD COMPUTING

The client is able to read a document mi from the remote database without revealing his/her choice i to the server.

The same as PIR; in addition, it is required that the client can only learn mi after protocol execution.

The client is able to read and write the remote database without revealing his/her access pattern to the server.

Access Pattern Problems

Page 49: SOME SECURITY CHALLENGES  IN CLOUD COMPUTING

Từ khoá được các chị em tìm kiếm nhiều nhất năm 2013 là từ đại gia.

Vloger Toàn Shinoda

Page 50: SOME SECURITY CHALLENGES  IN CLOUD COMPUTING

Từ khoá được các chị em tìm kiếm nhiều nhất năm 2013 là từ đại gia.

Vloger Toàn Shinoda

Page 51: SOME SECURITY CHALLENGES  IN CLOUD COMPUTING

Computation Outsourcing vs Security

Page 52: SOME SECURITY CHALLENGES  IN CLOUD COMPUTING

Computation Outsourcing

Page 53: SOME SECURITY CHALLENGES  IN CLOUD COMPUTING

Computation Outsourcing

DATA

f(DATA)

How to protect data

How to protect result (f(DATA))

How to make sure the result is correct

Page 54: SOME SECURITY CHALLENGES  IN CLOUD COMPUTING

Computation OutsourcingSolutions

Gentry C., Fully Homomorphic Encryption Using Ideal Lattices, STOC 2009

Lauter K., Naehrig M., Vaikuntanathan V., Can Homomorphic Encryption be Practical? IACR Cryptology ePrint Archive 2011/405, 2011

Brakerski Z., Vaikuntanathan V., Efficient Fully Homomorphic Encryption from (Standard) LWE. In Proc. of FOCS, 2011, pp. 97-106

Brakerski Z., Gentry C., Vaikuntanathan V., (Leveled) fully homomorphic encryption without bootstrapping. In Proc. of ITCS, 2012, pp. 309-325

Brakerski Z., Fully Homomorphic Encryption without Modulus Switching from Classical GapSVP. IACR Cryptology ePrint Archive 2012/78, 2012

Seny Kamara and Lei Wei, Garbled Circuits via Structured Encryption, in Workshop on Applied Homomorphic Encryption (WAHC '13), April 2013

Seny Kamara and Mariana Raykova, Parallel Homomorphic Encryption, in Workshop on Applied Homomorphic Encryption (WAHC '13), April 2013

Page 55: SOME SECURITY CHALLENGES  IN CLOUD COMPUTING

Computation OutsourcingSolutions

Privacy preserving Datamining/Machine learning

Verykios V. S. et.al, State-of-the-art in privacy preserving data mining, ACM SIGMOD Record Volume 33 Issue 1, March 2004 Pages 50 – 57.

Wang C. et.al, "Secure and Practical Outsourcing of Linear Programming in Cloud Computing,” in Proc. of IEEE INFOCOM, 2011.

Wang C. et.al, OIRS: Outsourced Image Recovery Service from Compressive Sensing with Privacy Assurance, in NDSS Short Talk, 2013.

Page 56: SOME SECURITY CHALLENGES  IN CLOUD COMPUTING

“Trusting trust”

Whom do you trust?

Probability No

Sometimes Yes

Page 57: SOME SECURITY CHALLENGES  IN CLOUD COMPUTING