Cryptographic Security Mechanisms for Cloud Computing
|
|
|
- Brianna Strickland
- 10 years ago
- Views:
Transcription
1 IBM Research Zurich Christian Cachin June 2014 Cryptographic Security Mechanisms for Cloud Computing 2009 IBM Corporation
2 Cloud computing Compute Network Storage 2
3 Cloud computing 3 Cloud computing = IT outsourcing Resources are virtual (SDx = software-defined x) Infrastructure shared among many clients (= tentants) Automated and self-managed Standardized interfaces and solutions Providers amortize cost over many clients Clients rent services instead of owning equipment
4 Hardware becomes a commodity Servers... 4
5 Physical location becomes irrelevant Data center, Luleå (SE), near the Arctic circle 5
6 Benefits and challenges 6 Cloud services are convenient No investment cost Pay only for consumption Scalable No skills needed Access from everywhere Only standardized services Clouds pose threats Unknown exposure Inherent risk of outsourcing No established contracts Loss of control Fast and reliable network needed Customization not possible
7 Security concerns in cloud computing 7 Distinguish between traditional security concerns and cloud-specific issues Authentication (not only users, also services) Authorization (users and services) Data confidentiality Data integrity Data removal Monitoring Audits Forensics Isolation between tenants Protection of infrastructure (TCB - trusted computing platform)
8 Cloud security from two viewpoints Alice 8 Bob Charlie
9 Cloud-security concerns of the provider 9 Isolate different clients in the service platform Enforcement Verification Protect the infrastructure Trusted computing base (TCB) Integrity of hypervisors, kernels, and applications Strong enforcement with trusted hardware Prevent insider attacks Operators have reduced privileges
10 Multi-tenancy in cloud computing Client Application Middleware/JVM VM/Partition/OS Instance/Hypervisor Hardware Software-aaS 10 Platform-aaS Infrastructure-aaS Servers-aaS One application instance per client, using the same DB engine One DB engine or OS-process per client on the same OS kernel A dedicated OS instance per client, on the same machine instance Dedicated CPU and hypervisor per client, on the same shared hardware GMail, Dropbox, Facebook... Shared webhosting, Salesforce... Rackspace, Amazon EC2... IBM SoftLayer, Internap...
11 Cloud-security concerns of clients 11 Prevention of abuse by provider Restriction of administrative privileges Physical location, legal aspects ("jurisdiction attacks") Loss of control and audit mechanisms Physical direct access, log files Confidentiality of data? Client "encrypts" all data and computations in the cloud Integrity of data? Cloud proves the correctness of responses Who manages the keys and how? Cryptography is a powerful technology but merely shifts power to those who control the keys How to destroy data in the cloud? Control information proliferation
12 Computing on encrypted data 12 How can one manipulate encrypted data? How can a computer run an encrypted program without knowledge of what it does? Celebrated research topic in cryptography Formulated in 1978 Millionaires problem (Yao 1986) Secure two-party computation Garbled circuits Quite practical today for limited functions Fully Homomorphic Encryption Breakthrough result (Gentry 2009) but very far from practical Secret program P() and secret input y P( E(x), y ) E( x ) Secret data x Client E( P(x), y ) P(x,y)
13 Three projects addressing cloud security at IBM Research - Zurich 13
14 Key management in the cloud 14
15 Key management a solved problem? 15 Windows Azure storage service disruption (Feb. 2013) Expired SSL certificate Global outage of Azure cloud-storage service Created a cascading series of failures in Azure, eventually bringing down Xbox Live and other services Repaired after about 12 hours
16 Key management today 16 Proprietary solutions Every system requires its own format Often an afterthought to a secure system Life-cycle management operations are cumbersome Yet a cryptographic solution is only as secure as its key manager
17 Key management with secure hardware Smartcards nethsm (Thales) IBM 4765 Infineon TPM
18 Towards standardized key management Enterprise cryptographic environments Portals Production Database Collaboration & File Server Content Mgmt Systems LAN VPN WAN Disk Arrays Backup System Replica CRM Backup Disk ecommerce Applications Enterprise Applications Business Analytics Staging Dev/Test Obfuscation Backup Tape Key Management Interoperability Protocol Enterprise key management
19 Key management as a service Key management becomes a service Centralized control Lifecycle management Automate deployment Policy driven Focus on data-storage keys Tape, disks, filesystems Cloud storage OASIS Key Management Interoperability Protocol (KMIP) Vendor-neutral format for accessing key server in enterprise KMIP 1.0 (2010) IBM TKLM v2.0 (2011) Contributions from IBM Research - Zurich [BCH+10] 19 Key Management Interoperability Protocol (KMIP) IBM Security Key Lifecycle Manager (SKLM)
20 OASIS Key Management Interoperability Protocol (KMIP) OASIS XML? No! Client-server protocol Defines objects with attributes, plus operations Objects: symmetric keys, public/private keys, certificates, threshold key-shares... Attributes: identifiers, type, length, lifecycle-state, lifecycle dates, links to other objects... Operations: create, register, attribute handling Supported by multiple products today Mostly specific to storage-encryption market
21 Key management as a cloud service 21 Secure cloud computing requires key material in the cloud Key managers will become cloud services (keys-as-a-service) Standardization of protocols OASIS KMIP PKCS #11 Control access to keys Policy- and role-based
22 Stateless cryptographic hardware-security modules 22 IBM Enterprise PKCS#11 introduces virtualized cloud-key managers [VDO14] Hardware-security module (HSM) for cryptographic operations in trusted execution environment Keys stored in a HSM are physically bound to hardware (sic) Difficult to integrate with cloud platform Virtualization layer for HSMs Controlled by a master key in multiple worker HSMs Stateless hardware tokens Scalable throughput Bulk cryptographic operations and key management
23 Integrity and consistency of remote data 23
24 Cloud storage - data integrity? Kernel.org Linux repository was compromised in Aug Linux kernel sources exposed, but public open-source anyway Thanks to cryptographic integrity protection in revision control system (git), kernel code modifications could be detected Who determines the "true" kernel sources? What if cloud service is subverted or client data are modified? 24
25 System model Alice 25 Bob Charlie Server S Normally correct Sometimes faulty (untrusted, potentially malicious... Byzantine) Clients: A, B, C... Correct, may crash Invoke operations on server Disconnected Small trusted memory Asynchronous No client-to-client communication
26 Operations should be atomic or "linearizable" Alice Bob 1 2 A B C 26 write(1,x) write(1,u) read(1) u write(2,w) read(1) u read(2) w
27 Server violates integrity with a replay attack Alice Bob 1 2 A B C 27 write(1,x) write(1,u) write(2,v) write(1,t) read(1) x write(2,w) read(1) u read(2) w
28 Fork-linearizability as a solution 28 Server may replay old state and present different views to clients Fork their views of history Cannot be detected by clients without communicating Run a protocol to impose fork linearizability Ensures that if server forks the views of two clients once, then their views are forked ever after they never again see each others updates or violation is exposed Maintains causality for all operations Every consistency or integrity violation results in a fork Best achievable guarantee for storage on untrusted server Forks can be exposed via a cheap external channel with low security Synchronized clocks Periodic operations/gossip
29 Fork-linearizability graphically A write(1,x) write(1,u) B write(2,v) write(1,t) read(1) x write(2,w) read(1) u C read(2) w w(1,t) View of A r(2) w View of C w(1,u) r(1) u w(1,x) w(2,v) r(1) x w(2,w) 29 View of B
30 Fork-linearizable services for cloud integrity verification 30 Goal If server is correct, then clients see linearizable service In any case (= even when server corrupted and violates spec), the clients respect fork-linearizability Makes it easy to detect consistency violations Storage systems SUNDR [MS02][LKMS04] Secure untrusted data repository CSVN [CG09] Integrity-protecting Subversion revision-control system FAUST: Fail-aware untrusted storage [CKS11] Never blocks, uses sporadic client-to-client messages Venus [SCCKMS10] Integrity-protecting cloud object storage Depot: Cloud storage with minimal trust [MSLCADW11] Generic collaboration services Blind Stone Tablet [WSS09] runs a relational database SPORC: Group Collaboration using Untrusted Cloud Resources [FZFF10] presents an editor for shared documents Services with commuting operations [CO13] uses authenticated data types for complex operations
31 Policy-based secure deletion 31
32 Data needs to be erased 32 Destroying data can be as critical as retaining it It all depends... Deletion is in interest of Clients and/or Providers Required by law European Data Protection Directive UK Data Protection Act US Fair Debt Collection Practices Act
33 Data can no longer be erased 33 Modern storage systems cannot erase data Common storage systems Remove directory pointers Mark space as free Data remains accessible on a lower-level API Storage interfaces have no operation for "really erase" Virtualized storage systems make deletion impossible Many layers of abstraction Software-defined storage (SDS), cloud storage Every storage layer repackages and caches data, this leaves traces
34 Approaches to securely delete data 34 Magnetic media must be overwritten many times Solid-state storage requires low-level access to controller No suitable interfaces exposed Encryption as a solution [BL96, TLLP10] Encrypt data Keep key(s) in controlled and erasable memory Destroying key(s) makes data inaccessible This work extend encryption-based approach with retention policy Caveat: Advances in cryptanalysis
35 System model User Secure deletion layer Implemented through encryption Small, controlled erasable memory M Stores key(s) Large, permanent memory Cannot be erased Contains protected data D Auxiliary state S Deletion operation Reads/writes/erases keys in M Writes to S Never touches bulk data D Secure deletion layer M S D 35
36 Secure deletion schemes with encryption Use a separate key for every protected item [P07, GKLL09, RCB12] To delete an item, destroy its key Huge master key, difficult to manage Deletion cost is constant k1 k2 k3 k4 k5 k6 k7 k8 k9 f1 36 One key encrypts multiple protected items Secure delete of one item rekey operation Choose fresh key Re-encrypt surviving items with new key Destroy old key Small master key Deletion cost is linear f2 f3 f4 f5 f6 f7 f8 f9 f6 f7 f8 f9 k f1 f2 f3 f4 f5
37 Secure deletion schemes with encryption Tree of keys [DFIJ99] For every tree node, super-key encrypts sub-keys Items protected by keys at leaves Delete one item rekey along path from root to deleted item Small master key Deletion cost is logarithmic k f1 37 f2 f3 f4 f5 f6 f7 f8 f9
38 Flexible deletion policies modeled by graph 38 Scheme supports arbitrary policies that are modeled as a monotone circuit AND, OR, and threshold gates Master key contains one key per attribute Deletion operations are fast Simply erase the keys of the deleted attributes May trigger rekey of recursively protected keys Implementation in secret-key setting Modular specification through composition Provably secure constructions (in a cryptographic model) Generalizes all existing schemes for cryptographic secure deletion
39 Policy graph for secure deletion Alice Bob Project_X OR OR AND p2 p3 p4 p1 OR 39 Exp_2014 Exp_2015 p5 Attributes at input nodes (Alice, Bob, Project_X ) Initially, all are viewed as FALSE Protection classes p1, p2, p3,... value according to Boolean expression Deletion operation specifies attribute(s), for example, Delete(Exp_2014) p2, p5 securely erased Delete(Alice) p2, p3 securely erased Delete(Bob) no effect; Delete(Project_X) p4, p5 securely erased
40 Prototype implementation Encrypting virtual file system in Linux (FUSE) System policy in a global configuration file Per-file policy and metadata in extended attributes Initialization delfs --secure_dir=/secure /raw_dir /delfs_dir /delfs_dir delfs FUSE \ Delete files according to attributes delfsctl delete /delfs_dir attribute... User /secure Periodic cleanup of unused raw storage delfsctl cleanup /delfs_dir /raw_dir 40
41 Secure deletion summary 41 Encryption-based approach suitable for any storage system Networked storage Cloud storage Secure deletion layer Similar to compression/encryption/deduplication... layers Current work on extension to cloud storage systems
42 Conclusion 42 Cloud computing is here to stay Commodity web services take over customized solutions Physical infrastructure becomes virtual Software-defined environments (SDx) Security remains a hot topic for cloud computing Cryptography remains the key technology realize security in the cloud Cryptography addresses multiple security needs Security for provider Security for clients
43 Questions? 43 Christian Cachin Security research IBM Research - Zurich
44 Literature (Key management) [BCH+10] M. Björkqvist, C. Cachin, R. Haas, X.-Y. Hu, A. Kurmus, R. Pawlitzek, and M. Vukolic, "Design and implementation of a key-lifecycle management system," Proc. Financial Cryptography, [VDO14] T. Visegrady, S. Dragone, M. Osborne, "Stateless cryptography for virtual environments," IBM J. Res. & Dev.,
45 Literature (Integrity and consistency) [CO13] C. Cachin and O. Ohrimenko, "On verifying the consistency of remote untrusted services," Research Report RZ 3841, IBM Research, [C11] C. Cachin, "Integrity and consistency for untrusted services," in Proc. Current Trends in Theory and Practice of Computer Science (SOFSEM 2011) (I. Cerna et al., eds.), LNCS 6543, [CG09] C. Cachin and M. Geisler, "Integrity protection for revision control," in Proc. ACNS, LNCS 5536, [CKS11] C. Cachin, I. Keidar, and A. Shraer, "Fail-aware untrusted storage," SIAM Journal on Computing, vol. 40, Apr [CSS07] C. Cachin, A. Shelat, and A. Shraer, "Efficient fork-linearizable access to untrusted shared memory," in Proc. PODC, [SCCKMS10] A. Shraer, C. Cachin, A. Cidon, I. Keidar, Y. Michalevsky, and D. Shaket, "Venus: Verification for untrusted cloud storage," in Proc. ACM Workshop on Cloud Computing Security (CCSW 2010),
46 Literature (Integrity and consistency, cont.) [FZFF10] A. Feldman, P. Zeller, M. Freedman, E. Felten, "SPORC: Group Collaboration using Untrusted Cloud Resources", Proc. OSDI, [LKMS04] J. Li, M. Krohn, D. Mazieres, and D. Shasha, "Secure untrusted data repository (SUNDR)," in Proc. OSDI, [MS02] D. Mazieres and D. Shasha, "Building secure file systems out of Byzantine storage," in Proc. PODC, [MSLCADW11] P. Mahajan et al., "Depot: Cloud Storage with Minimal Trust", ACM TOCS,
47 Literature (Secure deletion) [CHHS13] C. Cachin, K. Haralambiev, H.-C. Hsiao, A. Sorniotti, "Policy-based secure deletion," in Proc. ACM Conference on Computer and Communications Security (CCS 2013), [BL96] D. Boneh and R. Lipton, "A revocable backup system," in Proc. 6th USENIX Security Symposium, [DFIJ99] G. Di Crescenzo, N. Ferguson, R. Impagliazzo, M. Jakobsson, "How to forget a secret," in Proc. 16th Symposium on Theoretical Aspects of Computer Science (STACS), LNCS 1563, [GKLL09] R. Geambasu, T. Kohno, A. Levy, H. Levy, "Vanish: Increasing data privacy with self-destructing data," in Proc. 18th USENIX Security Symposium, [P07] R. Perlman, "File system design with assured delete," in Proc. Network and Distributed Systems Security Symposium (NDSS), [TLLP10] Y. Tang, P. Lee, J. Lui, R. Perlman, "FADE: Secure overlay cloud storage with file assured deletion," in Proc. Securecomm,
16 April 2015. Cloud Security. Dr. Andreas Wespi. 2015 IBM Corporation
16 April 2015 Cloud Security Dr. Andreas Wespi The Roots of Cloud Computing Malcolm McLean, one of the founders of Cloud Computing, back in 1956 Born on Nov. 14, 1913, in Maxton, North Carolina Malcolm
Protocols for Secure Cloud Computing
IBM Research Zurich Christian Cachin April 2011 Protocols for Secure Cloud Computing 2009 IBM Corporation Where is my data? 1986 2011 Who runs my computation? 1986 2011 Overview 1.Cloud computing and its
Protocols for Secure Cloud Computing
IBM Research Zurich Christian Cachin 28 September 2010 Protocols for Secure Cloud Computing 2009 IBM Corporation Where is my data? 1985 2010 Who runs my computation? 1985 2010 IBM Research - Zurich Overview
ProtectV. Securing Sensitive Data in Virtual and Cloud Environments. Executive Summary
VISIBILITY DATA GOVERNANCE SYSTEM OS PARTITION UNIFIED MANAGEMENT CENTRAL AUDIT POINT ACCESS MONITORING ENCRYPTION STORAGE VOLUME POLICY ENFORCEMENT ProtectV SECURITY SNAPSHOT (backup) DATA PROTECTION
Key Management Interoperability Protocol (KMIP)
www.oasis-open.org Management Interoperability Protocol (KMIP) Storage Developer s Introduction SNIA Fall 2009 Gordon Arnold, [email protected] Chair, Storage Security Industry Forum 1 2009 Insert Copyright
Applying Cryptography as a Service to Mobile Applications
Applying Cryptography as a Service to Mobile Applications SESSION ID: CSV-F02 Peter Robinson Senior Engineering Manager RSA, The Security Division of EMC Introduction This presentation proposes a Cryptography
A SECURE CLOUD WITH ADDITIONAL LAYER OF PROTECTION AND USER AUTHENTICATION
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 2, Issue. 6, June 2013, pg.307
Securing sensitive data at Rest ProtectFile, ProtectDb and ProtectV. Nadav Elkabets Presale Consultant
Securing sensitive data at Rest ProtectFile, ProtectDb and ProtectV Nadav Elkabets Presale Consultant Protecting Your Data Encrypt Your Data 1 ProtectFile StorageSecure ProtectDB ProtectV Databases File
Improving data integrity on cloud storage services
International Journal of Engineering Science Invention ISSN (Online): 2319 6734, ISSN (Print): 2319 6726 Volume 2 Issue 2 ǁ February. 2013 ǁ PP.49-55 Improving data integrity on cloud storage services
Secure Cloud Transactions by Performance, Accuracy, and Precision
Secure Cloud Transactions by Performance, Accuracy, and Precision Patil Vaibhav Nivrutti M.Tech Student, ABSTRACT: In distributed transactional database systems deployed over cloud servers, entities cooperate
Alliance Key Manager Solution Brief
Alliance Key Manager Solution Brief KEY MANAGEMENT Enterprise Encryption Key Management On the road to protecting sensitive data assets, data encryption remains one of the most difficult goals. A major
Security in Storage Networks A Current Perspective
Security in Storage Networks A Current Perspective Christian Cachin ZISC Colloquium www.zurich.ibm.com Overview Networked storage systems NAS, SAN, OBS Design options for security
A Secure Cloud Backup System with Assured Deletion and Version Control
A Secure Cloud Backup System with Assured Deletion and Version Control Arthur Rahumed, Henry C. H. Chen, Yang Tang, Patrick P. C. Lee, and John C. S. Lui The Chinese University of Hong Kong, Hong Kong
Crittografia e Enterprise Key Management una sfida possibile da affrontare
Crittografia e Enterprise Key Management una sfida possibile da affrontare Giuseppe Russo Oracle Chief Technologist [email protected] Simone Mola SafeNet Sales Engineer [email protected]
Data Protection: From PKI to Virtualization & Cloud
Data Protection: From PKI to Virtualization & Cloud Raymond Yeung CISSP, CISA Senior Regional Director, HK/TW, ASEAN & A/NZ SafeNet Inc. Agenda What is PKI? And Value? Traditional PKI Usage Cloud Security
SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD
SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD S.REVATHI B.HASEENA M.NOORUL IZZATH PG Student PG Student PG Student II- ME CSE II- ME CSE II- ME CSE Al-Ameen Engineering
Data Storage Security in Cloud Computing for Ensuring Effective and Flexible Distributed System
Data Storage Security in Cloud Computing for Ensuring Effective and Flexible Distributed System 1 K.Valli Madhavi A.P [email protected] Mobile: 9866034900 2 R.Tamilkodi A.P [email protected] Mobile:
Data Centers and Cloud Computing
Data Centers and Cloud Computing CS377 Guest Lecture Tian Guo 1 Data Centers and Cloud Computing Intro. to Data centers Virtualization Basics Intro. to Cloud Computing Case Study: Amazon EC2 2 Data Centers
Sharing Of Multi Owner Data in Dynamic Groups Securely In Cloud Environment
Sharing Of Multi Owner Data in Dynamic Groups Securely In Cloud Environment Deepa Noorandevarmath 1, Rameshkumar H.K 2, C M Parameshwarappa 3 1 PG Student, Dept of CS&E, STJIT, Ranebennur. Karnataka, India
Managed Encryption Service
Amethyst Cryptographic Services Ltd Managed Encryption Service An Overview Chris Greengrass March 2011 Encryption and Cryptography The use of encryption/decryption is as old as the art of communication.
Integrity Protection for Revision Control
Integrity Protection for Revision Control Christian Cachin 1 and Martin Geisler 2 1 IBM Research, Zurich Research Laboratory, Switzerland, [email protected] 2 Department of Computer Science, University
Verifying Correctness of Trusted data in Clouds
Volume-3, Issue-6, December-2013, ISSN No.: 2250-0758 International Journal of Engineering and Management Research Available at: www.ijemr.net Page Number: 21-25 Verifying Correctness of Trusted data in
IoT Security Platform
IoT Security Platform 2 Introduction Wars begin when the costs of attack are low, the benefits for a victor are high, and there is an inability to enforce law. The same is true in cyberwars. Today there
Secure Framework for Data Storage from Single to Multi clouds in Cloud Networking
Secure Framework for Data Storage from Single to Multi clouds in Cloud Networking B.Sujana 1, P.Tejaswini 2, G.Srinivasulu 3, Sk.Karimulla 4 1,2,3,4 QUBA COLLEGE OF ENGINEERING & TECH, NELLORE Abstract:
Data Centers and Cloud Computing. Data Centers. MGHPCC Data Center. Inside a Data Center
Data Centers and Cloud Computing Intro. to Data centers Virtualization Basics Intro. to Cloud Computing Data Centers Large server and storage farms 1000s of servers Many TBs or PBs of data Used by Enterprises
A Secure Decentralized Access Control Scheme for Data stored in Clouds
A Secure Decentralized Access Control Scheme for Data stored in Clouds Priyanka Palekar 1, Abhijeet Bharate 2, Nisar Anjum 3 1 SKNSITS, University of Pune 2 SKNSITS, University of Pune 3 SKNSITS, University
Efficient Key Management for Oracle Database 11g Release 2 Using Hardware Security Modules
Efficient Key Management for Oracle Database 11g Release 2 Using Hardware Security Modules WHITE PAPER Thales e-security www.thalesesec.com/oracle TABLE OF CONTENT Introduction...3 Oracle Database 11g
Cloud Security Overview
UT DALLAS Erik Jonsson School of Engineering & Computer Science Cloud Security Overview Murat Kantarcioglu Outline Current cloud security techniques Amazon Web services Microsoft Azure Cloud Security Challengers
VICTORIA UNIVERSITY OF WELLINGTON Te Whare Wānanga o te Ūpoko o te Ika a Māui
VICTORIA UNIVERSITY OF WELLINGTON Te Whare Wānanga o te Ūpoko o te Ika a Māui School of Engineering and Computer Science Te Kura Mātai Pūkaha, Pūrorohiko PO Box 600 Wellington New Zealand Tel: +64 4 463
Module 7 Security CS655! 7-1!
Module 7 Security CS655! 7-1! Issues Separation of! Security policies! Precise definition of which entities in the system can take what actions! Security mechanism! Means of enforcing that policy! Distributed
Secure cloud access system using JAR ABSTRACT:
Secure cloud access system using JAR ABSTRACT: Cloud computing enables highly scalable services to be easily consumed over the Internet on an as-needed basis. A major feature of the cloud services is that
Key Management Interoperability Protocol (KMIP)
(KMIP) Addressing the Need for Standardization in Enterprise Key Management Version 1.0, May 20, 2009 Copyright 2009 by the Organization for the Advancement of Structured Information Standards (OASIS).
SGFS: Secure, Flexible, and Policy-based Global File Sharing
SGFS: Secure, Flexible, and Policy-based Global File Sharing Vishal Kher Eric Seppanen Cory Leach Yongdae Kim {vkher,seppanen,leach,kyd}@cs.umn.edu University of Minnesota Motivation for Network attached
International Journal of Research in Advent Technology Available Online at: http://www.ijrat.org
DYNAMIC ACCESS CONTROL AND FILE ASSURED DELETION FOR SECURED CLOUD STORAGE ABSTARCT: Mrs. Priyanka Nagtilak, Prof. Archana Lomte Department of Computer Engineering Bhivarabai Sawant Institute of Technology
Cloud Security: Evaluating Risks within IAAS/PAAS/SAAS
Cloud Security: Evaluating Risks within IAAS/PAAS/SAAS Char Sample Security Engineer, Carnegie Mellon University CERT Information Security Decisions TechTarget Disclaimer Standard Disclaimer - This talk
Identifying Data Integrity in the Cloud Storage
www.ijcsi.org 403 Identifying Data Integrity in the Cloud Storage Saranya Eswaran 1 and Dr.Sunitha Abburu 2 1 Adhiyamaan College of Engineering, Department of Computer Application, Hosur. 2 Professor and
Data Centers and Cloud Computing. Data Centers
Data Centers and Cloud Computing Intro. to Data centers Virtualization Basics Intro. to Cloud Computing 1 Data Centers Large server and storage farms 1000s of servers Many TBs or PBs of data Used by Enterprises
IaaS Cloud Architectures: Virtualized Data Centers to Federated Cloud Infrastructures
IaaS Cloud Architectures: Virtualized Data Centers to Federated Cloud Infrastructures Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF Introduction
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK REVIEW ON MOBILE APPLICATION IN A CLOUD COMPUTING SECURE AND SCALABLE USING CLOUD
CIT 668: System Architecture
CIT 668: System Architecture Cloud Security Topics 1. The Same Old Security Problems 2. Virtualization Security 3. New Security Issues and Threat Model 4. Data Security 5. Amazon Cloud Security Data Loss
Security Management of Cloud-Native Applications. Presented By: Rohit Sharma MSc in Dependable Software Systems (DESEM)
Security Management of Cloud-Native Applications Presented By: Rohit Sharma MSc in Dependable Software Systems (DESEM) 1 Outline Context State-of-the-Art Design Patterns Threats to cloud systems Security
Tufts University. Department of Computer Science. COMP 116 Introduction to Computer Security Fall 2014 Final Project. Guocui Gao Guocui.gao@tufts.
Tufts University Department of Computer Science COMP 116 Introduction to Computer Security Fall 2014 Final Project Investigating Security Issues in Cloud Computing Guocui Gao [email protected] Mentor:
Data Centers and Cloud Computing. Data Centers
Data Centers and Cloud Computing Slides courtesy of Tim Wood 1 Data Centers Large server and storage farms 1000s of servers Many TBs or PBs of data Used by Enterprises for server applications Internet
Meeting Technology Risk Management (TRM) Guidelines from the Monetary Authority of Singapore (MAS)
Meeting Technology Risk Management (TRM) Guidelines from the Monetary Authority of Singapore (MAS) How Financial Institutions Can Comply to Data Security Best Practices Vormetric, Inc. 2545 N. 1st Street,
Key Management Issues in the Cloud Infrastructure
Key Management Issues in the Cloud Infrastructure Dr. R. Chandramouli (Mouli) [email protected] Dr. Michaela Iorga [email protected] (Information Technology Lab, NIST, USA) ARO Workshop on Cloud Computing
Index Terms Cloud Storage Services, data integrity, dependable distributed storage, data dynamics, Cloud Computing.
Volume 3, Issue 5, May 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Privacy - Preserving
Efficient and Secure Dynamic Auditing Protocol for Integrity Verification In Cloud Storage
Efficient and Secure Dynamic Auditing Protocol for Integrity Verification In Cloud Storage Priyanga.R 1, Maheswari.B 2, Karthik.S 3 PG Scholar, Department of CSE, SNS College of technology, Coimbatore-35,
Role Based Encryption with Efficient Access Control in Cloud Storage
Role Based Encryption with Efficient Access Control in Cloud Storage G. V. Bandewar 1, R. H. Borhade 2 1 Department of Information Technology, Sinhgad Technical Education Society s SKNCOE, Pune, India
Managing for the Long Term: Keys to Securing, Troubleshooting and Monitoring a Private Cloud
Deploying and Managing Private Clouds The Essentials Series Managing for the Long Term: Keys to Securing, Troubleshooting and Monitoring a Private Cloud sponsored by Managing for the Long Term: Keys to
Chapter 1: Introduction
Chapter 1 Introduction 1 Chapter 1: Introduction 1.1 Inspiration Cloud Computing Inspired by the cloud computing characteristics like pay per use, rapid elasticity, scalable, on demand self service, secure
Security Considerations for Public Mobile Cloud Computing
Security Considerations for Public Mobile Cloud Computing Ronnie D. Caytiles 1 and Sunguk Lee 2* 1 Society of Science and Engineering Research Support, Korea [email protected] 2 Research Institute of
Chapter 3: Operating-System Structures. Common System Components
Chapter 3: Operating-System Structures System Components Operating System Services System Calls System Programs System Structure Virtual Machines System Design and Implementation System Generation 3.1
Solution Brief for ISO 27002: 2013 Audit Standard ISO 27002. Publication Date: Feb 6, 2015. EventTracker 8815 Centre Park Drive, Columbia MD 21045
Solution Brief for ISO 27002: 2013 Audit Standard Publication Date: Feb 6, 2015 8815 Centre Park Drive, Columbia MD 21045 ISO 27002 About delivers business critical software and services that transform
EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY
EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY Siliveru Ashok kumar* S.G. Nawaz ## and M.Harathi # * Student of M.Tech, Sri Krishna Devaraya Engineering College, Gooty # Department
IBM Cloud Security Draft for Discussion September 12, 2011. 2011 IBM Corporation
IBM Cloud Security Draft for Discussion September 12, 2011 IBM Point of View: Cloud can be made secure for business As with most new technology paradigms, security concerns surrounding cloud computing
DATA SECURITY MODEL FOR CLOUD COMPUTING
DATA SECURITY MODEL FOR CLOUD COMPUTING POOJA DHAWAN Assistant Professor, Deptt of Computer Application and Science Hindu Girls College, Jagadhri 135 001 [email protected] ABSTRACT Cloud Computing
Key & Data Storage on Mobile Devices
Key & Data Storage on Mobile Devices Advanced Computer Networks 2015/2016 Johannes Feichtner [email protected] Outline Why is this topic so delicate? Keys & Key Management High-Level Cryptography
Patterns for Secure Boot and Secure Storage in Computer Systems
Patterns for Secure Boot and Secure Storage in Computer Systems Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy Horst Görtz Institute for IT Security, Ruhr-University Bochum, Germany {hans.loehr,ahmad.sadeghi,marcel.winandy}@trust.rub.de
Effective End-to-End Cloud Security
Effective End-to-End Cloud Security Securing Your Journey to the Cloud Trend Micro SecureCloud A Trend Micro & VMware White Paper August 2011 I. EXECUTIVE SUMMARY This is the first paper of a series of
SECURITY AND PRIVACY ISSUES IN A KNOWLEDGE MANAGEMENT SYSTEM
SECURITY AND PRIVACY ISSUES IN A KNOWLEDGE MANAGEMENT SYSTEM Chandramohan Muniraman, Meledath Damodaran, Amanda Ryan University of Houston-Victoria Abstract As in any information management system security
CSE543 Computer and Network Security Module: Cloud Computing
CSE543 Computer and Network Security Module: Computing Professor Trent Jaeger 1 Computing Is Here Systems and Internet Infrastructure Security (SIIS) Laboratory 2 Computing Is Here Systems and Internet
Cloud S ecurity Security Processes & Practices Jinesh Varia
Cloud Security Processes & Practices Jinesh Varia Overview Certifications Physical Security Backups EC2 Security S3 Security SimpleDB Security SQS Security Best Practices AWS Security White Paper Available
Secure Way of Storing Data in Cloud Using Third Party Auditor
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 12, Issue 4 (Jul. - Aug. 2013), PP 69-74 Secure Way of Storing Data in Cloud Using Third Party Auditor 1 Miss.
Lecture 02a Cloud Computing I
Mobile Cloud Computing Lecture 02a Cloud Computing I 吳 秀 陽 Shiow-yang Wu What is Cloud Computing? Computing with cloud? Mobile Cloud Computing Cloud Computing I 2 Note 1 What is Cloud Computing? Walking
Using BroadSAFE TM Technology 07/18/05
Using BroadSAFE TM Technology 07/18/05 Layers of a Security System Security System Data Encryption Key Negotiation Authentication Identity Root Key Once root is compromised, all subsequent layers of security
IBM Tivoli Storage Manager Version 7.1.4. Introduction to Data Protection Solutions IBM
IBM Tivoli Storage Manager Version 7.1.4 Introduction to Data Protection Solutions IBM IBM Tivoli Storage Manager Version 7.1.4 Introduction to Data Protection Solutions IBM Note: Before you use this
An Efficient Security Based Multi Owner Data Sharing for Un-Trusted Groups Using Broadcast Encryption Techniques in Cloud
An Efficient Security Based Multi Owner Data Sharing for Un-Trusted Groups Using Broadcast Encryption Techniques in Cloud T.Vijayalakshmi 1, Balika J Chelliah 2,S.Alagumani 3 and Dr.J.Jagadeesan 4 1 PG
Data Storage in Clouds
Data Storage in Clouds Jan Stender Zuse Institute Berlin contrail is co-funded by the EC 7th Framework Programme 1 Overview Introduction Motivation Challenges Requirements Cloud Storage Systems XtreemFS
High Availability and Disaster Recovery Solutions for Perforce
High Availability and Disaster Recovery Solutions for Perforce This paper provides strategies for achieving high Perforce server availability and minimizing data loss in the event of a disaster. Perforce
SP 800-130 A Framework for Designing Cryptographic Key Management Systems. 5/25/2012 Lunch and Learn Scott Shorter
SP 800-130 A Framework for Designing Cryptographic Key Management Systems 5/25/2012 Lunch and Learn Scott Shorter Topics Follows the Sections of SP 800-130 draft 2: Introduction Framework Basics Goals
A Survey of Different Encryption Techniques for Secure Cloud Storage
Journal homepage: www.mjret.in ISSN: 2348-6953 Rutuja R. Sadul KJCOEMR,Pune, India. Asawari Rankhambe KJCOEMR,Pune, India. Neha Subhekar KJCOEMR,Pune, India. A Survey of Different Encryption Techniques
WHITE PAPER www.tresorit.com
WHITE PAPER tresor [tʀeˈzoːɐ ] noun (German) 1. lockable, armoured cabinet THE CLOUD IS UNTRUSTED The cloud has huge potential when it comes to storing, sharing and exchanging files, but the security provided
Lab 1: Security Audit
Lab 1: Security Audit Mark Gius October 10, 2014 1 System Description The system is a low-powered Atom PC, small form factor (it is less than 12 on each side, and about 3 tall), with a 320GB hard drive
Building Secure Cloud Applications. On the Microsoft Windows Azure platform
Building Secure Cloud Applications On the Microsoft Windows Azure platform Contents 1 Security and the cloud 3 1.1 General considerations 3 1.2 Questions to ask 3 2 The Windows Azure platform 4 2.1 Inside
Cloud Database Storage Model by Using Key-as-a-Service (KaaS)
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 7 July 2015, Page No. 13284-13288 Cloud Database Storage Model by Using Key-as-a-Service (KaaS) J.Sivaiah
Solaris For The Modern Data Center. Taking Advantage of Solaris 11 Features
Solaris For The Modern Data Center Taking Advantage of Solaris 11 Features JANUARY 2013 Contents Introduction... 2 Patching and Maintenance... 2 IPS Packages... 2 Boot Environments... 2 Fast Reboot...
Keywords: - Ring Signature, Homomorphic Authenticable Ring Signature (HARS), Privacy Preserving, Public Auditing, Cloud Computing.
Survey on Privacy Preserving Public Auditing Techniques for Shared Data in the Cloud Kedar Jayesh Rasal 1, Dr. S.V.Gumaste 2, Sandip A. Kahate 3 Computer Engineering, Pune University, SPCOE, Otur, Pune,
A Proxy-Based Data Security Solution in Mobile Cloud
, pp. 77-84 http://dx.doi.org/10.14257/ijsia.2015.9.5.08 A Proxy-Based Data Security Solution in Mobile Cloud Xiaojun Yu 1,2 and Qiaoyan Wen 1 1 State Key Laboratory of Networking and Switching Technology,
2. From a control perspective, the PRIMARY objective of classifying information assets is to:
MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected
preliminary experiment conducted on Amazon EC2 instance further demonstrates the fast performance of the design.
Privacy-Preserving Public Auditing For Secure Cloud Storage ABSTRACT: Using cloud storage, users can remotely store their data and enjoy the on-demand high-quality applications and services from a shared
Evaluation of different Open Source Identity management Systems
Evaluation of different Open Source Identity management Systems Ghasan Bhatti, Syed Yasir Imtiaz Linkoping s universitetet, Sweden [ghabh683, syeim642]@student.liu.se 1. Abstract Identity management systems
SECURE AND TRUSTY STORAGE SERVICES IN CLOUD COMPUTING
SECURE AND TRUSTY STORAGE SERVICES IN CLOUD COMPUTING Saranya.V 1, Suganthi.J 2, R.G. Suresh Kumar 3 1,2 Master of Technology, Department of Computer Science and Engineering, Rajiv Gandhi College of Engineering
DepSky Dependable and Secure Storage in a Cloud-of-Clouds Alysson Bessani, Miguel Correia, Bruno Quaresma, Fernando André, Paulo Sousa
epsky ependable and Secure Storage in a Cloud-of-Clouds Alysson Bessani, Miguel Correia, Bruno Quaresma, Fernando André, Paulo Sousa University of Lisbon, Faculty of Sciences 1 Moving to Clouds ata is
Software Execution Protection in the Cloud
Software Execution Protection in the Cloud Miguel Correia 1st European Workshop on Dependable Cloud Computing Sibiu, Romania, May 8 th 2012 Motivation clouds fail 2 1 Motivation accidental arbitrary faults
Technical Brief Distributed Trusted Computing
Technical Brief Distributed Trusted Computing Josh Wood Look inside to learn about Distributed Trusted Computing in Tectonic Enterprise, an industry-first set of technologies that cryptographically verify,
Windows Web Based VPN Connectivity Details & Instructions
VPN Client Overview UMDNJ s Web based VPN utilizes an SSL (Secure Socket Layer) Based Cisco Application that provides VPN functionality without having to install a full client for end users running Microsoft
CS252 Project An Encrypted File System using TPM
CS252 Project An Encrypted File System using TPM Steven Houston: [email protected] Thomas Kho: [email protected] May 14, 2007 Abstract We implement an encrypted file system that uses a Trusted
Residual risk. 3 Compliance challenges (i.e. right to examine, exit clause, privacy acy etc.)
Organizational risks 1 Lock-in Risk of not being able to migrate easily from one provider to another 2 Loss of Governance Control and influence on the cloud providers, and conflicts between customer hardening
Virtualization and Cloud: Orchestration, Automation, and Security Gaps
Virtualization and Cloud: Orchestration, Automation, and Security Gaps SESSION ID: CSV-R02 Dave Shackleford Founder & Principal Consultant Voodoo Security @daveshackleford Introduction Private cloud implementations
