Privacy, Security and Cloud
|
|
|
- Deirdre Kelly
- 10 years ago
- Views:
Transcription
1 Privacy, Security and Cloud Giuseppe Di Luna July 2, 2012 Giuseppe Di Luna
2 July 2, 2012 Giuseppe Di Luna
3 July 2, 2012 Giuseppe Di Luna
4 Security Concerns: Data leakage Data handling on the provider (Correct storage procedure, correct deletion) Correct Computation Legal issue Attackers: Outsider Insider (Within Cloud Provider) July 2, 2012 Giuseppe Di Luna
5 (Ristenpart et Al ) Ristenpart et Al. studied data leakage on Amazon EC2. Threat model: There is a single trusted cloud maintainer that manage a public multi-tenant cloud. The attacker is a normal. The goal is to obtain sensitive information from a target service hosted on the p.c. July 2, 2012 Giuseppe Di Luna
6 EC2 Internals EC2 uses Xen hyp. Domain0, it manages guest image, physical resources accesses ecc In EC2 Dom0 route packets to VMs and reports itself as hop in traceroute. Ec2 offers five instances: small, medium, large, (small is a single virtual core ) Network: availability zones do not share the same ph.inf. July 2, 2012 Giuseppe Di Luna
7 Different VM share the same Ph.Inf. It is possible for an attacker to achieve coresidence: Since Dom0 appears in trace-route there is a free and deterministic co-residence check. There are some bias in VM assignment [RTSS09]: Different instance from the same account will by assigned to different Ph. Mac. Strong Placement locality from diff. accounts July 2, 2012 Giuseppe Di Luna
8 The strong placement locality can be exploited by an attacker to achieve coresidence. Cross-VM information leakage: The contention on buffers may be used as: Covert Channel: [Xu et Al-2011] carefully studies the achievable bitrate of L2 cache contention using different protocols. Estimate the load on the target VM-machine July 2, 2012 Giuseppe Di Luna
9 [RTSS09] teach us that blind trust in not the best option. We assume that cloud provider/s is/are not trusted: Two adversaries: Honest-but-curious Malicious (byzantine) Case study: Avoid data leakage (Homomorphic Enc.) Enforce correct data handling (PDS- PDD) Anonymous assignment of resources July 2, 2012 Giuseppe Di Luna
10 Avoid data leakage The only way to ensure privacy of outsourced data is to encrypt them but: The naïve encryption rule out any form of computation over data. Over the years have been developed many techniques to overcome that: Partial-Homomorphic: RSA (multiplicative), Paillier (additive). Specific computation only: Searchable data encryption, Order preserving ecc General Computation: Secure Function Evaluation, fully-homomorphic encryption. July 2, 2012 Giuseppe Di Luna
11 Homomorphic Encryption Breakthrough in Cryptography: Gentry STOC-09 shows how to achieve fullyhomomorphic encryption using ideal latticesbootstrap theorem. In June 2010 D.G.H.V. shows how to achieve Fully-H.E. over integers In January 2012 B.G.V. shows how to achieve (levelled) Fully-H.E. without use bootstrap. July 2, 2012 Giuseppe Di Luna
12 Fully H.E. over the Integers We have a circuit C \in Ce and a function evaluate, a scheme (Dec,Enc,Evaluate) is homomorphic (w.r.t Ce) if given a tuple of Ciphertexts c=(c1,..cn) we have: Dec[sk,Evaluate(pk,C,c)]=C(m1, mn) To rule out trivial scheme there is the compactness property: There exist a fixed polynomial bound b(n) so that for any condition (sk,pk, C, c) the size of Eval[pk,C,c] < b(n). July 2, 2012 Giuseppe Di Luna
13 Steps to achieve a non trivial Fully-H.E: Find a somewhat homomorphic private encryption scheme that respect some conditions. Turn the scheme in circular secure public key scheme Use the bootstrap theorem [Gentry-09] on the basic public scheme. July 2, 2012 Giuseppe Di Luna
14 Let us start with a simple private key encryption scheme: KeyGen: Encrypt(p,m): Decrypt: July 2, 2012 Giuseppe Di Luna
15 Somewhat Homomorphic July 2, 2012 Giuseppe Di Luna
16 Problems For each call to Evaluate we have: Ciphertext Grows: double the bit each multiplication violate compactness Noise Grows: for each addition and multiplication the terms that are not multiple of p grows. Noise > p/2 violate correctness. How do we handle this problems? July 2, 2012 Giuseppe Di Luna
17 Public Key Encrypt: July 2, 2012 Giuseppe Di Luna
18 Approximated-GCD problem Given an oracle chosen p output p. for a randomly Given an adversary A that breaks the presented scheme in p.t. with advantage e it is possible to build an adversary A that breaks A-GCD in p.t. with probability p(e). July 2, 2012 Giuseppe Di Luna
19 Win == get p D(p) Pk:{x0,x1, x,_n} z1=zq1p+zr1 z2=zq2p+zr2 Q LSB Oracle m <- {0,1} zb Binary GCD S<-{0,1}^{n} c=(m+zb+s*pk) A (z=qp+r,q) LSB(zq1) = a xor parity(z1) xor m a A A is able to break the chipper so if we give A E(a) it return us a D(p) Oracle in A-GCD July 2, 2012 Giuseppe Di Luna
20 Bootstrap - intuition If the scheme is able to evaluate is own decryption procedure C_d then it is possible to use C_d to decript a E(m,Pk1) while it is encrypted under key Pk1 using the E(k1,Pk1). July 2, 2012 Giuseppe Di Luna
21 Performance is (but for how long? Nobootstrap Result-2012) the main drawback of Fully-H.E. (To achieve circuit privacy we need garbled circuits) Other problem can be solved in a more efficient way (or only using) other techniques July 2, 2012 Giuseppe Di Luna
22 Yao Garbled Circuit (1986) Good introduction: fa09/cs598man/slides/ac-f09-lect16-yao.pdf Using Garbled Circuit it is possible to achieve circuit privacy and secure two party computation. Fairplay Pinkas and Lindel (2007) [Malicious Adv.] July 2, 2012 Giuseppe Di Luna
23 Data Handling Many services offer the capability to store data on cloud (Amazon S3, SkyDrive, Dropbox ), how we can ensure that the cloud maintainer handle this data properly? Two issues: Check integrity of dataset Ensure data deletion July 2, 2012 Giuseppe Di Luna
24 Integrity We have a huge dataset (>10 TB) and we want to outsource it. Since we do not trust the maintainer we want to devise an integrity mechanism. Naïve: compute MAC on dataset, drawbacks? Solution: Remote Data Checking using Provable Data Possession - Ateniese et Al. May 2011 July 2, 2012 Giuseppe Di Luna
25 Init Phase < F={b1,b2,..,bf}, T > Client sends F and T to S Client Server Verification Phase Request: O(1) Client Server Client Time: O( c) c <= f Client Space: O(1)!! Response: O(1) Server Time: O( c) July 2, 2012 Giuseppe Di Luna
26 Init July 2, 2012 Giuseppe Di Luna
27 July 2, 2012 Giuseppe Di Luna
28 MR-PDP In order to have fault tolerance we need: July 2, 2012 Giuseppe Di Luna
29 It is possible to extend PDP to k-replicas : Naïve way 1: use the same PDP k times. Vulnerable to coalition Naïve way 2: use different PDP using k different enconding. Expensive O(nk*Tagtime) A slight modification makes the previous scheme correct for multiple colluding replicas without increase the computational cost. July 2, 2012 Giuseppe Di Luna
30 Idea create k different file that are related and securely obfuscated. For each replica we pick a random u. Using a PRF F for each original block b_i we create b _i=b_i+f(u i) The tags are the same. July 2, 2012 Giuseppe Di Luna
31 Data deletion Law impose to securely delete sensitive information. (Medical Records- Credit Card Number) A way to do that is to securely wipe (overwrite) data. This is not viable on cloud storage: There is no deletion proof! No proof is bad (We are paranoid) July 2, 2012 Giuseppe Di Luna
32 This issue has been addressed recently: FADE (Tang et Al. 2010) FadeVersion (Rahumed et Al 2011). ADEC (Tezuka et Al. March 2012) The rationale behind all this system is simple July 2, 2012 Giuseppe Di Luna
33 ADEC E(F1,k1) E(F2,k2) E(F3,k3) E(F4,k4) V1 Cloud: S3, SkyDrive, icloud,... E(F4,k4) E(F5,k5) E(F6,k6) V2 V1 metadata E(<k1,k2,k3,k4>,kv1) h1,h2,h3,h4 V2 metadata E(<k4,k5,k6>,kv2) h1,h2,h3,h4 hash hash hash Seed m kv1 kv2 kv3 Deletion July 2, 2012 Giuseppe Di Luna
34 Oblivious m-assignment Assignment Algorithm are fundamental in many field: Resource Sharing, Channel Assignment. Cloud maintainers know the assignment of resource to clients: Is it possible to coordinate concurrent entities such that each one knows is resource but do not know the other assignments? fairness? What kind of obliviousness is possible to ensure? July 2, 2012 Giuseppe Di Luna
35 Model -The system is synchronous most of the time. -No faults July 2, 2012 Giuseppe Di Luna
36 Problem Definition Oblivious assignment with m Slots (O-mA) is specified by the following properties: Unique Assignment (Safety) Lockout Avoidance (Liveness) Oblivious Assignment (Obliviousness): if a slot r_j is assigned to an honest process p_j no other process is deterministically aware of this assignment Strong O-mA: Strong Oblivious Assignment: Fixed a process p_j no one knows if p_j has got a resource. July 2, 2012 Giuseppe Di Luna
37 Solvability Issues Permission algorithms are not suitable for solve O-mA In permission algorithms a process ask if it is safe to access CS Perpetual Circulating Token: The trivial algorithm do not solve SO-mA if C>=2. July 2, 2012 Giuseppe Di Luna
38 Ensure Fairness: Rotating Leader can enter in CS. The other processes must have a non zero probability to gain CS. Must be not possible to distinguish (in p.t.) between two different assignment. July 2, 2012 Giuseppe Di Luna
39 Assignment Phase E(t1,PPk) E(t2,PPk)... E(t_{n-1},PPk) 1 2 n 3 4 July 2, 2012 Giuseppe Di Luna
40 1 E(tx,PPk) 2 (pm,ppk) E(t1,PPk-2)... E(t_{x-1},PPk-2) E(t_{x+1},PPk-2)... E(t_{n-1},PPk-2) n 3 4 July 2, 2012 Giuseppe Di Luna
41 E(tx,PPk) 1 2 (p_2,pk2) (p_3,pk3)... (p_{n-1},pk_{n-1}) n 3 4 E(ty,PPk-3) July 2, 2012 Giuseppe Di Luna
42 tx (p_2,pk2) E(tx,PPk) (p_3,pk3) (p_{n-1},pk_{n-1}) n 3 4 E(ty,PPk-3) July 2, 2012 Giuseppe Di Luna
43 Rel. Phase b= released? E(0,PPk-2) xor E(b,PPk-2) tx E(0,PPk-2)... E(b,PPk-2) E(0,PPk-2) n 3 4 July 2, 2012 Giuseppe Di Luna
44 0... b... 0 Knows released tickets 1 2 n 3 4 July 2, 2012 Giuseppe Di Luna
45 What is the number of winner ticket assigned to waiting processes? July 2, 2012 Giuseppe Di Luna
46 40 30 w=10 w=20 20 w=30 10 w= b July 2, 2012 Giuseppe Di Luna
47 w= w=20 w= w= w= r July 2, 2012 Giuseppe Di Luna
48 w=10 w= w=30 w= w=50 p= p= r July 2, 2012 Giuseppe Di Luna
49 July 2, 2012 Giuseppe Di Luna
NEW CRYPTOGRAPHIC CHALLENGES IN CLOUD COMPUTING ERA
THE PUBLISHING HOUSE PROCEEDINGS OF THE ROMANIAN ACADEMY, Series A, OF THE ROMANIAN ACADEMY Volume 14, Number 1/2013, pp. 72 77 NEW CRYPTOGRAPHIC CHALLENGES IN CLOUD COMPUTING ERA Laurenţiu BURDUŞEL Politehnica
Information Security Theory vs. Reality
Information Security Theory vs. Reality 0368-4474-01, Winter 2011 Lecture 14: More on vulnerability and exploits, Fully homomorphic encryption Eran Tromer Slides credit: Vinod Vaikuntanathan (U. Toronto)
Index Terms Cloud Storage Services, data integrity, dependable distributed storage, data dynamics, Cloud Computing.
Volume 3, Issue 5, May 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Privacy - Preserving
Cloud security CS642: Computer Security Professor Ristenpart h9p://www.cs.wisc.edu/~rist/ rist at cs dot wisc dot edu University of Wisconsin CS 642
Cloud security CS642: Computer Security Professor Ristenpart h9p://www.cs.wisc.edu/~rist/ rist at cs dot wisc dot edu University of Wisconsin CS 642 Announcements Take- home final versus in- class Homework
Associate Prof. Dr. Victor Onomza Waziri
BIG DATA ANALYTICS AND DATA SECURITY IN THE CLOUD VIA FULLY HOMOMORPHIC ENCRYPTION Associate Prof. Dr. Victor Onomza Waziri Department of Cyber Security Science, School of ICT, Federal University of Technology,
Hey, You, Get Off of My Cloud! Exploring Information Leakage in Third-Party Clouds. Thomas Ristenpart, Eran Tromer, Hovav Shacham, Stefan Savage
Hey, You, Get Off of My Cloud! Exploring Information Leakage in Third-Party Clouds Thomas Ristenpart, Eran Tromer, Hovav Shacham, Stefan Savage UCSD MIT UCSD UCSD Today s talk in one slide Third-party
SECURE AND TRUSTY STORAGE SERVICES IN CLOUD COMPUTING
SECURE AND TRUSTY STORAGE SERVICES IN CLOUD COMPUTING Saranya.V 1, Suganthi.J 2, R.G. Suresh Kumar 3 1,2 Master of Technology, Department of Computer Science and Engineering, Rajiv Gandhi College of Engineering
Lecture 10: CPA Encryption, MACs, Hash Functions. 2 Recap of last lecture - PRGs for one time pads
CS 7880 Graduate Cryptography October 15, 2015 Lecture 10: CPA Encryption, MACs, Hash Functions Lecturer: Daniel Wichs Scribe: Matthew Dippel 1 Topic Covered Chosen plaintext attack model of security MACs
Computing on Encrypted Data
Computing on Encrypted Data Secure Internet of Things Seminar David Wu January, 2015 Smart Homes New Applications in the Internet of Things aggregation + analytics usage statistics and reports report energy
Are Cache Attacks on Public Clouds Practical?
Are Cache Attacks on Public Clouds Practical? Thomas Eisenbarth Joint work with Gorka Irazoqui, Mehmet Sinan Inci, Berk Gulmezoglu and Berk Sunar WPI - 10/19/2015 Outline Cloud Computing and Isolation
HEY, YOU, GET OFF OF MY CLOUD: EXPLORING INFORMATION LEAKAGE
HEY, YOU, GET OFF OF MY CLOUD: EXPLORING INFORMATION LEAKAGE IN THIRD-PARTY COMPUTE CLOUDS T. Ristenpart, H. Shacham, S. Savage UC San Diego E. Tromer MIT CPCS 722: Advanced Systems Seminar Ewa Syta GET
preliminary experiment conducted on Amazon EC2 instance further demonstrates the fast performance of the design.
Privacy-Preserving Public Auditing For Secure Cloud Storage ABSTRACT: Using cloud storage, users can remotely store their data and enjoy the on-demand high-quality applications and services from a shared
Cloud computing security
Cloud computing security Exploring information leakage in third-party compute clouds Yangchun Fu November 18 th, 2011 Outline 1 Introduction 2 EC2 cloud cartography 3 Co-residence 4 side-channel cross-vm
Data Storage Security in Cloud Computing
Data Storage Security in Cloud Computing Manoj Kokane 1, Premkumar Jain 2, Poonam Sarangdhar 3 1, 2, 3 Government College of Engineering and Research, Awasari, Pune, India Abstract: Cloud computing is
A Survey on Secure Auditing and Deduplicating Data in Cloud
A Survey on Secure Auditing and Deduplicating Data in Cloud Tejaswini Jaybhaye 1 ; D. H. Kulkarni 2 PG Student, Dept. of Computer Engineering, SKNCOE, Pune, India 1 Assistant Professor, Dept. of Computer
Boosting Linearly-Homomorphic Encryption to Evaluate Degree-2 Functions on Encrypted Data
Boosting Linearly-Homomorphic Encryption to Evaluate Degree-2 Functions on Encrypted Data Dario Catalano 1 and Dario Fiore 2 1 Dipartimento di Matematica e Informatica, Università di Catania, Italy. [email protected]
How To Ensure Data Integrity In Cloud Computing
A Novel Approach for public exploration Data with Effective user Denial in the cloud Mahankali Anitha PG Scholar Department of CSE J.Vijayasree Assistant professor Department of CSE Dr.M.V.Siva Prasad
Analysis of Secure Cloud Data Sharing Within a Group
Analysis of Secure Cloud Data Sharing Within a Group Ms. uri Pande* Department of CSE, GHRAET Nagpur (M.S), India, Prof. Vikrant Chole Dept of Computer Science & Engg Nagpur (M.S.), India Abstract In this
SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD
SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD S.REVATHI B.HASEENA M.NOORUL IZZATH PG Student PG Student PG Student II- ME CSE II- ME CSE II- ME CSE Al-Ameen Engineering
Security Aspects of. Database Outsourcing. Vahid Khodabakhshi Hadi Halvachi. Dec, 2012
Security Aspects of Database Outsourcing Dec, 2012 Vahid Khodabakhshi Hadi Halvachi Security Aspects of Database Outsourcing Security Aspects of Database Outsourcing 2 Outline Introduction to Database
Improving data integrity on cloud storage services
International Journal of Engineering Science Invention ISSN (Online): 2319 6734, ISSN (Print): 2319 6726 Volume 2 Issue 2 ǁ February. 2013 ǁ PP.49-55 Improving data integrity on cloud storage services
Entangled Encodings and Data Entanglement
An extended abstract of this paper is published in the proceedings of the 3rd International Workshop on Security in Cloud Computing SCC@AsiaCCS 2015. This is the full version. Entangled Encodings and Data
PRIVACY-PRESERVING PUBLIC AUDITING FOR SECURE CLOUD STORAGE
PRIVACY-PRESERVING PUBLIC AUDITING FOR SECURE CLOUD STORAGE Abstract: Using Cloud Storage, users can remotely store their data and enjoy the on-demand high quality applications and services from a shared
Secure Deduplication of Encrypted Data without Additional Independent Servers
Secure Deduplication of Encrypted Data without Additional Independent Servers Jian Liu Aalto University [email protected] N. Asokan Aalto University and University of Helsinki [email protected] Benny Pinkas
Towards a compliance audit of SLAs for data replication in Cloud storage
Towards a compliance audit of SLAs for data replication in Cloud storage J. Leneutre B. Djebaili, C. Kiennert, J. Leneutre, L. Chen, Data Integrity and Availability Verification Game in Untrusted Cloud
Near Sheltered and Loyal storage Space Navigating in Cloud
IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719 Vol. 3, Issue 8 (August. 2013), V2 PP 01-05 Near Sheltered and Loyal storage Space Navigating in Cloud N.Venkata Krishna, M.Venkata
Secure Way of Storing Data in Cloud Using Third Party Auditor
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 12, Issue 4 (Jul. - Aug. 2013), PP 69-74 Secure Way of Storing Data in Cloud Using Third Party Auditor 1 Miss.
Index Terms: Cloud Computing, Third Party Auditor, Threats In Cloud Computing, Dynamic Encryption.
Secure Privacy-Preserving Cloud Services. Abhaya Ghatkar, Reena Jadhav, Renju Georgekutty, Avriel William, Amita Jajoo DYPCOE, Akurdi, Pune [email protected], [email protected], [email protected],
Top Ten Security and Privacy Challenges for Big Data and Smartgrids. Arnab Roy Fujitsu Laboratories of America
1 Top Ten Security and Privacy Challenges for Big Data and Smartgrids Arnab Roy Fujitsu Laboratories of America 2 User Roles and Security Concerns [SKCP11] Users and Security Concerns [SKCP10] Utilities:
PRIVACY ASSURED IMAGE STACK MANAGEMENT SERVICE IN CLOUD
PRIVACY ASSURED IMAGE STACK MANAGEMENT SERVICE IN CLOUD Ms. Shubhangi Edake 1, Prof. Sunil Rathod 2 1 PG Student, Computer Engineering, Dr.D.Y.Patil School of Engineering, Lohgaon,Pune,India 2 Assistant
Arnab Roy Fujitsu Laboratories of America and CSA Big Data WG
Arnab Roy Fujitsu Laboratories of America and CSA Big Data WG 1 Security Analytics Crypto and Privacy Technologies Infrastructure Security 60+ members Framework and Taxonomy Chair - Sree Rajan, Fujitsu
Efficient Remote Data Possession Checking In Critical Information Infrastructures Ensuring Data Storage Security In Cloud Computing
Efficient Remote Data Possession Checking In Critical Information Infrastructures Ensuring Data Storage Security In Cloud Computing Dr. T.Nalini 1, Dr.K.Manivannan 2,Vaishnavi Moorthy 3 1 Professor, Department
CLOUD computing systems, in which the clients
IEEE TRANSACTIONS ON CLOUD COMPUTING, VOL. X, NO. X, JANUARY 20XX 1 A Practical, Secure, and Verifiable Cloud Computing for Mobile Systems Sriram N. Premnath, Zygmunt J. Haas, Fellow, IEEE arxiv:1410.1389v1
EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY
EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY Siliveru Ashok kumar* S.G. Nawaz ## and M.Harathi # * Student of M.Tech, Sri Krishna Devaraya Engineering College, Gooty # Department
Verifiable Outsourced Computations Outsourcing Computations to Untrusted Servers
Outsourcing Computations to Untrusted Servers Security of Symmetric Ciphers in Network Protocols ICMS, May 26, 2015, Edinburgh Problem Motivation Problem Motivation Problem Motivation Problem Motivation
Lecture 5 - CPA security, Pseudorandom functions
Lecture 5 - CPA security, Pseudorandom functions Boaz Barak October 2, 2007 Reading Pages 82 93 and 221 225 of KL (sections 3.5, 3.6.1, 3.6.2 and 6.5). See also Goldreich (Vol I) for proof of PRF construction.
Enhancing Data Security in Cloud Storage Auditing With Key Abstraction
Enhancing Data Security in Cloud Storage Auditing With Key Abstraction 1 Priyadharshni.A, 2 Geo Jenefer.G 1 Master of engineering in computer science, Ponjesly College of Engineering 2 Assistant Professor,
Paillier Threshold Encryption Toolbox
Paillier Threshold Encryption Toolbox October 23, 2010 1 Introduction Following a desire for secure (encrypted) multiparty computation, the University of Texas at Dallas Data Security and Privacy Lab created
Lecture 9 - Message Authentication Codes
Lecture 9 - Message Authentication Codes Boaz Barak March 1, 2010 Reading: Boneh-Shoup chapter 6, Sections 9.1 9.3. Data integrity Until now we ve only been interested in protecting secrecy of data. However,
CSC474/574 - Information Systems Security: Homework1 Solutions Sketch
CSC474/574 - Information Systems Security: Homework1 Solutions Sketch February 20, 2005 1. Consider slide 12 in the handout for topic 2.2. Prove that the decryption process of a one-round Feistel cipher
Talk announcement please consider attending!
Talk announcement please consider attending! Where: Maurer School of Law, Room 335 When: Thursday, Feb 5, 12PM 1:30PM Speaker: Rafael Pass, Associate Professor, Cornell University, Topic: Reasoning Cryptographically
Secure Data transfer in Cloud Storage Systems using Dynamic Tokens.
Secure Data transfer in Cloud Storage Systems using Dynamic Tokens. P.Srinivas *,K. Rajesh Kumar # M.Tech Student (CSE), Assoc. Professor *Department of Computer Science (CSE), Swarnandhra College of Engineering
Virtualization and Cloud Computing. The Threat of Covert Channels. Related Work. Zhenyu Wu, Zhang Xu, and Haining Wang 1
Virtualization and Cloud Computing Zhenyu Wu, Zhang Xu, Haining Wang William and Mary Now affiliated with NEC Laboratories America Inc. Server Virtualization Consolidates workload Simplifies resource management
3-6 Toward Realizing Privacy-Preserving IP-Traceback
3-6 Toward Realizing Privacy-Preserving IP-Traceback The IP-traceback technology enables us to trace widely spread illegal users on Internet. However, to deploy this attractive technology, some problems
Whitewash: Securely Outsourcing Garbled Circuit Generation
Whitewash: Securely Outsourcing Garbled Circuit Generation MSR Workshop on Applied Multi-Party Computation February 2014 Henry Hank Carter, Charles Lever, Patrick Traynor SMC on mobile devices Mobile devices
A Secure and Dependable Cloud Storage Service in Cloud Computing
A Secure and Dependable Cloud Storage Service in Cloud Computing Yalla Ram Charan MTech Student Department of CSE Sri Venkateswra College of Engineering & Technology Abstract: Cloud storage is a model
A Survey on Data Integrity of Cloud Storage in Cloud Computing
A Survey on Data Integrity of Cloud Storage in Cloud Computing A B S T R A C T Mr.Vitthal Raut, Prof. Suhasini Itkar Department Computer Engineering, PES Modern College of Engineering, Pune, India. [email protected],
SECURE AND EFFICIENT PRIVACY-PRESERVING PUBLIC AUDITING SCHEME FOR CLOUD STORAGE
International Journal of Computer Network and Security(IJCNS) Vol 7. No.1 2015 Pp. 1-8 gopalax Journals, Singapore available at : www.ijcns.com ISSN: 0975-8283 ----------------------------------------------------------------------------------------------------------------------------------------------------------
Data Integrity for Secure Dynamic Cloud Storage System Using TPA
International Journal of Electronic and Electrical Engineering. ISSN 0974-2174, Volume 7, Number 1 (2014), pp. 7-12 International Research Publication House http://www.irphouse.com Data Integrity for Secure
Lecture 13: Message Authentication Codes
Lecture 13: Message Authentication Codes Last modified 2015/02/02 In CCA security, the distinguisher can ask the library to decrypt arbitrary ciphertexts of its choosing. Now in addition to the ciphertexts
1 Message Authentication
Theoretical Foundations of Cryptography Lecture Georgia Tech, Spring 200 Message Authentication Message Authentication Instructor: Chris Peikert Scribe: Daniel Dadush We start with some simple questions
Cloud Data Storage Services Considering Public Audit for Security
Global Journal of Computer Science and Technology Cloud and Distributed Volume 13 Issue 1 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
Enabling Public Auditability, Dynamic Storage Security and Integrity Verification in Cloud Storage
Enabling Public Auditability, Dynamic Storage Security and Integrity Verification in Cloud Storage Pranita Bakka 1, Dr. Jayashree Agarkhed 2 1 P.G.Student, Department of Computer Science & Engineering,
MACs Message authentication and integrity. Table of contents
MACs Message authentication and integrity Foundations of Cryptography Computer Science Department Wellesley College Table of contents Introduction MACs Constructing Secure MACs Secure communication and
Computer Science. About PaaS Security. Donghoon Kim Henry E. Schaffer Mladen A. Vouk
About PaaS Security Donghoon Kim Henry E. Schaffer Mladen A. Vouk North Carolina State University, USA May 21, 2015 @ ICACON 2015 Outline Introduction Background Contribution PaaS Vulnerabilities and Countermeasures
Enabling Public Auditing for Secured Data Storage in Cloud Computing
IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719 Vol. 3, Issue 5 (May. 2013), V3 PP 01-05 Enabling Public Auditing for Secured Data Storage in Cloud Computing 1 Er.Amandeep Kaur,
CS 393 Network Security. Nasir Memon Polytechnic University Module 11 Secure Email
CS 393 Network Security Nasir Memon Polytechnic University Module 11 Secure Email Course Logistics HW 5 due Thursday Graded exams returned and discussed. Read Chapter 5 of text 4/2/02 Module 11 - Secure
Message Authentication Code
Message Authentication Code Ali El Kaafarani Mathematical Institute Oxford University 1 of 44 Outline 1 CBC-MAC 2 Authenticated Encryption 3 Padding Oracle Attacks 4 Information Theoretic MACs 2 of 44
Side channels in cloud services, the case of deduplication in cloud storage
Side channels in cloud services, the case of deduplication in cloud storage Danny Harnik, Benny Pinkas, Alexandra Shulman-Peleg Presented by Yair Yona Yair Yona (TAU) Side channels in cloud services Advanced
CS573 Data privacy and security in the cloud. Slide credits: Ragib Hasan, Johns Hopkins University
CS573 Data privacy and security in the cloud Slide credits: Ragib Hasan, Johns Hopkins University What is Cloud Computing? Let s hear from the experts 2 What is Cloud Computing? The infinite wisdom of
Security of Cloud Storage: - Deduplication vs. Privacy
Security of Cloud Storage: - Deduplication vs. Privacy Benny Pinkas - Bar Ilan University Shai Halevi, Danny Harnik, Alexandra Shulman-Peleg - IBM Research Haifa 1 Remote storage and security Easy to encrypt
Currency and Correctness of Content in Object Storage Networks
Currency and Correctness of Content in Object Storage Networks Organization: The Johns Hopkins University 3400 N. Charles St. Baltimore, MD USA 21218 Technical Contacts: Randal Burns 224 New Engineering
Research Paper on Data Integrity Checking In Cloud Computing
Research Paper on Data Integrity Checking In Cloud Computing Indu Bala 1, Savita Bishnoi 2 1 Department of Computer Science & Engineering, Rohtak Institute of Engineering& Management Rohtak, Haryana, India
A Secure Decentralized Access Control Scheme for Data stored in Clouds
A Secure Decentralized Access Control Scheme for Data stored in Clouds Priyanka Palekar 1, Abhijeet Bharate 2, Nisar Anjum 3 1 SKNSITS, University of Pune 2 SKNSITS, University of Pune 3 SKNSITS, University
Final Exam. IT 4823 Information Security Administration. Rescheduling Final Exams. Kerberos. Idea. Ticket
IT 4823 Information Security Administration Public Key Encryption Revisited April 5 Notice: This session is being recorded. Lecture slides prepared by Dr Lawrie Brown for Computer Security: Principles
VoteID 2011 Internet Voting System with Cast as Intended Verification
VoteID 2011 Internet Voting System with Cast as Intended Verification September 2011 VP R&D Jordi [email protected] Index Introduction Proposal Security Conclusions 2. Introduction Client computers could
Arnab Roy Fujitsu Laboratories of America and CSA Big Data WG
Arnab Roy Fujitsu Laboratories of America and CSA Big Data WG 1 The Big Data Working Group (BDWG) will be identifying scalable techniques for data-centric security and privacy problems. BDWG s investigation
159.334 Computer Networks. Network Security 1. Professor Richard Harris School of Engineering and Advanced Technology
Network Security 1 Professor Richard Harris School of Engineering and Advanced Technology Presentation Outline Overview of Identification and Authentication The importance of identification and Authentication
ISSN 2278-3091. Index Terms Cloud computing, outsourcing data, cloud storage security, public auditability
Outsourcing and Discovering Storage Inconsistencies in Cloud Through TPA Sumathi Karanam 1, GL Varaprasad 2 Student, Department of CSE, QIS College of Engineering and Technology, Ongole, AndhraPradesh,India
PRIVACY PRESERVING PUBLIC AUDITING FOR SECURED DATA STORAGE IN CLOUD USING BLOCK AUTHENTICATION CODE
PRIVACY PRESERVING PUBLIC AUDITING FOR SECURED DATA STORAGE IN CLOUD USING BLOCK AUTHENTICATION CODE R.REVATHI # PG Scholar #, Bharathiyar Institute Of Engineering for Women, Deviyakurichi, Salem(DT) India
Lecture 3: One-Way Encryption, RSA Example
ICS 180: Introduction to Cryptography April 13, 2004 Lecturer: Stanislaw Jarecki Lecture 3: One-Way Encryption, RSA Example 1 LECTURE SUMMARY We look at a different security property one might require
Authentication and Encryption: How to order them? Motivation
Authentication and Encryption: How to order them? Debdeep Muhopadhyay IIT Kharagpur Motivation Wide spread use of internet requires establishment of a secure channel. Typical implementations operate in
Verifying Correctness of Trusted data in Clouds
Volume-3, Issue-6, December-2013, ISSN No.: 2250-0758 International Journal of Engineering and Management Research Available at: www.ijemr.net Page Number: 21-25 Verifying Correctness of Trusted data in
Advanced Cryptography
Family Name:... First Name:... Section:... Advanced Cryptography Final Exam July 18 th, 2006 Start at 9:15, End at 12:00 This document consists of 12 pages. Instructions Electronic devices are not allowed.
Remote Data Checking for Network Coding-based Distributed Storage Systems
Remote Data Checking for Network Coding-based Distributed Storage Systems Bo Chen, Reza Curtmola Department of Computer Science New Jersey Institute of Technology {bc47,crix}@njit.edu Giuseppe Ateniese,
Secure Computation Martin Beck
Institute of Systems Architecture, Chair of Privacy and Data Security Secure Computation Martin Beck Dresden, 05.02.2015 Index Homomorphic Encryption The Cloud problem (overview & example) System properties
Authenticated encryption
Authenticated encryption Dr. Enigma Department of Electrical Engineering & Computer Science University of Central Florida [email protected] October 16th, 2013 Active attacks on CPA-secure encryption
RSA BASED CPDP WITH ENCHANCED CLUSTER FOR DISTRUBED CLOUD STORAGE SERVICES
RSA BASED CPDP WITH ENCHANCED CLUSTER FOR DISTRUBED CLOUD STORAGE SERVICES 1 MD ISMAIL Z, 2 ASHFAQUE AHAMED K. 1 PG Scholar,Department of Computer Science, C.Abdul Hakeem College Of Arts and Science,Melvisharam.
QUANTUM COMPUTERS AND CRYPTOGRAPHY. Mark Zhandry Stanford University
QUANTUM COMPUTERS AND CRYPTOGRAPHY Mark Zhandry Stanford University Classical Encryption pk m c = E(pk,m) sk m = D(sk,c) m??? Quantum Computing Attack pk m aka Post-quantum Crypto c = E(pk,m) sk m = D(sk,c)
DATA SECURITY IN CLOUD USING ADVANCED SECURE DE-DUPLICATION
DATA SECURITY IN CLOUD USING ADVANCED SECURE DE-DUPLICATION Hasna.R 1, S.Sangeetha 2 1 PG Scholar, Dhanalakshmi Srinivasan College of Engineering, Coimbatore. 2 Assistant Professor, Dhanalakshmi Srinivasan
Security System in Cloud Computing for Medical Data Usage
, pp.27-31 http://dx.doi.org/10.14257/astl.2013.38.06 Security System in Cloud Computing for Medical Data Usage Maya Louk 1, Hyotaek Lim 2, Hoon Jae Lee 3 1 Department of Ubiquitous IT, Graduate School
SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTING SECURITY ENVIRONMENT
SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTING SECURITY ENVIRONMENT K.karthika 1, M. Daya kanimozhi Rani 2 1 K.karthika, Assistant professor, Department of IT, Adhiyamaan College of Engineering, Hosur
