Arnab Roy Fujitsu Laboratories of America and CSA Big Data WG



Similar documents
Arnab Roy Fujitsu Laboratories of America and CSA Big Data WG

Top Ten Security and Privacy Challenges for Big Data and Smartgrids. Arnab Roy Fujitsu Laboratories of America

NIST Big Data Public Working Group

Moderator: Panelists: Panel #2 Big Data: Application Security and Privacy. Keith Swenson, VP of Research and Development, Fujitsu America, Inc.

Top Ten Big Data Security and Privacy Challenges

NEW CRYPTOGRAPHIC CHALLENGES IN CLOUD COMPUTING ERA

Secure Group Oriented Data Access Model with Keyword Search Property in Cloud Computing Environment

A Study on Security and Privacy in Big Data Processing

An Efficient Security Based Multi Owner Data Sharing for Un-Trusted Groups Using Broadcast Encryption Techniques in Cloud

A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA

Secure Computation Martin Beck

EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY

Big Data - Security and Privacy

How To Ensure Data Integrity In Clouds

Associate Prof. Dr. Victor Onomza Waziri

Enabling Public Auditability, Dynamic Storage Security and Integrity Verification in Cloud Storage

Secure cloud access system using JAR ABSTRACT:

Cloud Data Security. Sol Cates

Information Security Basic Concepts

Digital Identity Management

Privacy Patterns in Public Clouds

Analysis on Secure Data sharing using ELGamal s Cryptosystem in Cloud

Development of enhanced Third party Auditing Scheme for Secure Cloud Storage

Cloud Data Service for Issues in Scalable Data Integration Using Multi Authority Attribute Based Encryption

Security Infrastructure for Trusted Offloading in Mobile Cloud Computing

Secure and Efficient Data Retrieval Process based on Hilbert Space Filling Curve

New Constructions and Practical Applications for Private Stream Searching (Extended Abstract)

A Secure & Efficient Data Integrity Model to establish trust in cloud computing using TPA

A Novel Re-Authentication Scheme on Cloud Based Storage Services T.G.V.V.Srinivas 1, P.Suresh Babu 2 1 Final M.Tech Student, 2 Associate professor

SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD

Cloud Data Storage Services Considering Public Audit for Security

Organizational Impact of Big Data on Privacy & Security

Information Security in Big Data using Encryption and Decryption

preliminary experiment conducted on Amazon EC2 instance further demonstrates the fast performance of the design.

IMPLEMENTATION OF RESPONSIBLE DATA STORAGE IN CONSISTENT CLOUD ENVIRONMENT

Information Security

CPSC 467: Cryptography and Computer Security

Verifying Correctness of Trusted data in Clouds

Data Storage Security in Cloud Computing for Ensuring Effective and Flexible Distributed System

CLOUD STORAGE SECURITY INTRODUCTION. Gordon Arnold, IBM

Improving data integrity on cloud storage services

Privacy and Security in Cloud Computing

CONSIDERATION OF DYNAMIC STORAGE ATTRIBUTES IN CLOUD

BlackRidge Technology Transport Access Control: Overview

Distributed auditing mechanism in order to strengthen user s control over data in Cloud computing Environment

NSF Workshop on Big Data Security and Privacy

SECURE AND EFFICIENT PRIVACY-PRESERVING PUBLIC AUDITING SCHEME FOR CLOUD STORAGE

G.J. E.D.T.,Vol.3(1):43-47 (January-February, 2014) ISSN: SUODY-Preserving Privacy in Sharing Data with Multi-Vendor for Dynamic Groups

Security/Privacy Models for "Internet of things": What should be studied from RFID schemes? Daisuke Moriyama and Shin ichiro Matsuo NICT, Japan

Survey on Efficient Information Retrieval for Ranked Query in Cost-Efficient Clouds

User Authentication Guidance for IT Systems

A Survey on Secure Storage Services in Cloud Computing

RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM

Cloud security architecture

CRYPTOGRAPHY AS A SERVICE

Identifying Data Integrity in the Cloud Storage

Copyright 2013, Oracle and/or its affiliates. All rights reserved.

EFFICIENT AND SECURE ATTRIBUTE REVOCATION OF DATA IN MULTI-AUTHORITY CLOUD STORAGE

STORAGE SECURITY TUTORIAL With a focus on Cloud Storage. Gordon Arnold, IBM

Data-Centric Security vs. Database-Level Security

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

3-6 Toward Realizing Privacy-Preserving IP-Traceback

SECURE AND TRUSTY STORAGE SERVICES IN CLOUD COMPUTING

Enabling Public Auditing for Secured Data Storage in Cloud Computing

05.0 Application Development

USB Portable Storage Device: Security Problem Definition Summary

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

A COMPARATIVE STUDY OF SECURE SEARCH PROTOCOLS IN PAY- AS-YOU-GO CLOUDS

International Journal of Infinite Innovations in Engineering and Technology. ISSN (Online): , ISSN (Print):

A Draft Framework for Designing Cryptographic Key Management Systems

Privacy and Verifiability for Data Storage in Cloud Computing. Melek Ӧnen August 17, 2015 IFIP Summer School, Edinburgh

Data Storage Security in Cloud Computing

Secrecy Maintaining Public Inspecting For Secure Cloud Storage

E-Democracy and e-voting

Brainloop Cloud Security

February. ISSN:

How To Create A Multi-Keyword Ranked Search Over Encrypted Cloud Data (Mrse)

Practical Yet Universally Composable Two-Server Password-Authenticated Secret Sharing

Privacy-Preserving Distributed Encrypted Data Storage and Retrieval

Secure Data Sharing in Cloud Computing using Hybrid cloud

9.Web Based Customer Favorite vehicle Search Engine. 10.Step by Step Monitoring for Product Purchasing System

Transcription:

Arnab Roy Fujitsu Laboratories of America and CSA Big Data WG 1

Security Analytics Crypto and Privacy Technologies Infrastructure Security 60+ members Framework and Taxonomy Chair - Sree Rajan, Fujitsu Co-chair - Neel Sundaresan, Ebay Co-Chair - Wilco van Ginkel, Verizon Privacy, Policy, Governance, and Legal Issues

The Big Data Working Group (BDWG) will be identifying scalable techniques for datacentric security and privacy problems: https://cloudsecurityalliance.org/research/big-data/ BDWG s investigation is expected to lead to Crystallization of best practices for security and privacy in big data, Help industry and government on adoption of best practices, Establish liaisons with SDOs to influence big data security and privacy standards Accelerate the adoption of novel research aimed to address security and privacy issues. Publish report on top 10 security and privacy challenges Publish report on taxonomy and attack surface Publish best practices on the top 10 issues May 2013 Mar 2014 Publish report on security analytics Publish top 10 crypto issues Establish Big Data benchmarkin g platform in collaboration with NIST

1) Secure computations in distributed programming frameworks 2) Security best practices for nonrelational datastores 3) Secure data storage and transactions logs 4) End-point input validation/filtering 5) Real time security monitoring 6) Scalable and composable privacypreserving data mining and analytics 7) Cryptographically enforced access control and secure communication 8) Granular access control 9) Granular audits 10) Data provenance 4

Infrastructure security Data Privacy Data Management Integrity and Reactive Security Secure Computations in Distributed Programming Frameworks Privacy Preserving Data Mining and Analytics Secure Data Storage and Transaction Logs End-point validation and filtering Security Best Practices for Non-Relational Data Stores Cryptographically Enforced Data Centric Security Granular Audits Real time Security Monitoring Granular Access Control Data Provenance 5

Smartgrid Scenario: Threats/Challenges: Current Mitigations: Malfunctioning compute worker nodes Trust establishment: initiation, periodic trust update Application Computation Infrastructure Access to sensitive data Mandatory access control Privacy of output information Privacy preserving transformations 6

Smartgrid Scenario: Threats/Challenges: Current Mitigations: Data from Diverse Appliances and Sensors Lack of stringent authentication and authorization mechanisms Enforcement through middleware layer Passwords should never be held in clear Encrypted data at rest Lack of secure communication between compute nodes Protect communication using SSL/TLS 7

Smartgrid Scenario: Threats/Challenges: Current Mitigations: Consumer Data Archive Data Confidentiality and Integrity Availability Consistency Collusion Encryption and Signatures Proof of data possession Periodic audit and hash chains Policy based encryption 8

Smartgrid Scenario: Threats/Challenges: Current Mitigations: Adversary may tamper with device or software Tamper-proof Software Data Poisoning Adversary may clone fake devices Adversary may directly control source of data Trust Certificate and Trusted Devices Analytics to detect outliers Adversary may compromise data in transmission Cryptographic Protocols 9

Smartgrid Scenario: Threats/Challenges: Current Mitigations: Fraud Detection Security of the infrastructure Security of the monitoring code itself Security of the input sources Adversary may cause data poisoning Discussed before Secure coding practices Discussed before Analytics to detect outliers 10

Smartgrid Scenario: Threats/Challenges: Current Mitigations: Exploiting vulnerability at host Encryption of data at rest, access control and authorization mechanisms Consumer Data Privacy Insider threat Outsourcing analytics to untrusted partners Unintended leakage through sharing of data Separation of duty principles, clear policy for logging access to datasets Awareness of re-identification issues, differential privacy 11

Smartgrid Scenario: Threats/Challenges: Current Mitigations: Enforcing access control Identity and Attribute-based encryptions Data Integrity and Privacy Search and filter Outsourcing of computation Encryption techniques supporting search and filter Fully Homomorphic Encryption Integrity of data and preservation of anonymity Group signatures with trusted third parties 12

Smartgrid Scenario: Threats/Challenges: Current Mitigations: Keeping track of secrecy requirements of individual data elements Pick right level of granularity: row level, column level, cell level Data Privacy Maintaining access labels across analytical transformations At the minimum, conform to lattice of access restrictions. More sophisticated data transforms are being considered in active research Keeping track of roles and authorities of users Authentication, authorization, mandatory access control 13

Smartgrid Scenario: Threats/Challenges: Current Mitigations: Completeness of audit information Audit of usage, pricing, billing Timely access to audit information Integrity of audit information Authorized access to audit information Infrastructure solutions as discussed before. Scaling of SIEM tools. 14

Smartgrid Scenario: Threats/Challenges: Current Mitigations: Secure collection of data Authentication techniques Keeping track of ownership of data pricing, audit Consistency of data and metadata Message digests Insider threats Access Control through systems and cryptography 15

Communication protocols in progress Access policy based encryption Big data privacy in progress Key management first draft completed [Roy P. D Souza, AlephCloud Systems] Data integrity and poisoning concerns Searching / filtering encrypted data Secure data collection/aggregation Secure collaboration Proof of data storage Secure outsourcing of computation in progress

PK Filtering Token SK Encrypter Decrypter Conjunctive, subset, and range queries on encrypted data by Dan Boneh and Brent Waters, 2007

How to make collection of data private as well as authenticated? Can verify signature came from a group member Cannot infer which member In case of dispute, a trusted third party can trace the signature to an individual

The technical problem is to make group signatures efficient and short Short Group Signatures by Boneh, Boyen and Shacham, 2004

Private Searching on Streaming Data Ostrovsky and Skeith, CRYPTO 2005 Problem Scenario: The intelligence gathering community needs to collect a useful subset of huge streaming sources of data The criteria for being useful may be classified private criteria Most of the streaming data is useless and storing it all may be impractical filter at source How de we keep the filtering criteria secret even if it is executing at the source? Solution: Obfuscate the filtration code Even if the source falls into enemy hands, it cannot figure out the criteria

Blogs Net Traffic Garbled Filter Secret Criteria Obfuscate Garbled Filter Cloud News Feed Encrypted Filtered Data Decrypt Filtered Data

Computing on Authenticated Data A signature scheme such that it is possible to derive signatures on related data from a signature on the original document For example, deriving signatures on a redacted version of a document, without knowing the signing key Computing on Authenticated Data by Jae Hyun Ahn, Dan Boneh, Jan Camenisch, Susan Hohenberger, abhi shelat and Brent Waters.

N = pq f = F mod φ(n) File F; N random g F g F mod N Check if g f = g F mod N PORs: Proofs of Retrievability for Large Files by Juels and Kaliski Compact Proofs of Retrievability by Shacham and Waters

Functional Encryption Identitybased encryption Attributebased encryption Richer policies Disjunction, Conjunction Polynomials Threshold Predicates Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products - Jonathan Katz, Amit Sahai and Brent Waters.

Looking for contributors Please send a mail to: Arnab Roy aroy@us.fujitsu.com Fujitsu Laboratories of America

Interact https://interact.cloudsecurityalliance.org/ Transparency and accessibility to the Big Data Working Group allowing all to view and comment on the latest research - Live working documents during development - Seeking your contribution - Your contribution will be acknowledged Choose your Initiative» Submit Feedback» Make a Difference!

CSA Big Data Working Group Site https://cloudsecurityalliance.org/research/big-data/ CSA, Big Data LinkedIn http://www.linkedin.com/groups?home=&gid=4458215&trk=anet_ug_hm Basecamp Project Collaboration Site Request Form https://cloudsecurityalliance.org/research/basecamp/ For any questions/remarks/feedback, please contact either: Who Sreeranga (Sree) Rajan (Fujitsu) Neel Sundaresan (ebay) Wilco van Ginkel (Verizon) How sree@us.fujitsu.com nsundaresan@ebay.com wilco.vanginkel@verizon.com

Thank You 28