Side channels in cloud services, the case of deduplication in cloud storage



Similar documents
Security of Cloud Storage: - Deduplication vs. Privacy

Side channels in cloud services, the case of deduplication in cloud storage

ISSN: (Online) Volume 2, Issue 1, January 2014 International Journal of Advance Research in Computer Science and Management Studies

Cloud Storage Security

Proof of Ownership in Remote Storage Systems

Data Reduction: Deduplication and Compression. Danny Harnik IBM Haifa Research Labs

Secure Hybrid Cloud Architecture for cloud computing

A Novel Way of Deduplication Approach for Cloud Backup Services Using Block Index Caching Technique

TITLE: Secure Auditing and Deduplicating Data in Cloud(Survey Paper)

A Survey on Deduplication Strategies and Storage Systems

Data Deduplication Scheme for Cloud Storage

Secure Deduplication of Encrypted Data without Additional Independent Servers

M Y S E C U R E B A C K U P S E R V E R E D I T I O N. p r o d u c t o v e r v i e w O N L I N E S E R V E R B A C K U P

Deduplication Demystified: How to determine the right approach for your business

!!!! Memeo C1 Security !!!!!!!!!!! Bret Savage, CTO. October Memeo Inc. All rights reserved Memeo Inc. All rights reserved.

DXi Accent Technical Background

Data In The Cloud: Who Owns It, and How Do You Get it Back?

FOR THE FUTURE OF DATA CENTERS?

DETECTION OF PEER TO PEER APPLICATIONS

preliminary experiment conducted on Amazon EC2 instance further demonstrates the fast performance of the design.

Deduplication has been around for several

Analyzing the Security Schemes of Various Cloud Storage Services

Cumulus: filesystem backup to the Cloud

Demystifying Deduplication for Backup with the Dell DR4000

Security Architecture Whitepaper

SPECIAL REPORT. Data Deduplication. Deep Dive. Put your backups on a diet. Copyright InfoWorld Media Group. All rights reserved.

Privacy and Verifiability for Data Storage in Cloud Computing. Melek Ӧnen August 17, 2015 IFIP Summer School, Edinburgh

Turnkey Deduplication Solution for the Enterprise

Security Issues with Sharing (Cloud Storage Services) Kalyani Haridasyam EECS710: Information Security and Assurance University of Kansas

VANGUARD ONLINE BACKUP

LDA, the new family of Lortu Data Appliances

DiamondStream Data Security Policy Summary

Keyword: Cloud computing, service model, deployment model, network layer security.

Tresorit s DRM. A New Level of Security for Document Collaboration and Sharing

Open Source Data Deduplication

CPSC 467: Cryptography and Computer Security

Storing & Synchronizing Data In The Cloud

Torrage: A Secure BitTorrent based Peer-to-Peer Distributed Storage System

Lecture 11. RFS A Network File System for Mobile Devices and the Cloud

Comparing Box and Egnyte. White Paper

A Survey on Hybrid Cloud with De-Duplication

Confinement Problem. The confinement problem Isolating entities. Example Problem. Server balances bank accounts for clients Server security issues:

Application Design and Development

Installation and Setup: Setup Wizard Account Information

Backing Up Your Files. External Hard Drives

HEY, YOU, GET OFF OF MY CLOUD: EXPLORING INFORMATION LEAKAGE

FAQ. Hosted Data Disaster Protection

Data Deduplication in Tivoli Storage Manager. Andrzej Bugowski Spała

Move from traditional IT Solutions to Cloud Computing. Mauritius Telecom your partner for Cloud services

REMOTE BACKUP-WHY SO VITAL?

Repeater. BrowserStack Local. browserstack.com 1. BrowserStack Local makes a REST call using the user s access key to browserstack.

IaaS. Move from traditional IT Solutions to Cloud Computing. Mauritius Telecom your partner for Cloud services. PaaS

WHITE PAPER Improving Storage Efficiencies with Data Deduplication and Compression

Secure cloud access system using JAR ABSTRACT:

Redefining Microsoft SQL Server Data Management. PAS Specification

Symantec NetBackup 7.5 What s New and Version Comparison Matrix

Talk With Someone Live Now: (760) One Stop Data & Networking Solutions PREVENT DATA LOSS WITH REMOTE ONLINE BACKUP SERVICE

3Gen Data Deduplication Technical

PREVENTIA. Skyhigh Best Practices and Use cases. Table of Contents

Certificate Authorities and Public Keys. How they work and 10+ ways to hack them.

Two-Level Metadata Management for Data Deduplication System

Dynamic Searchable Encryption in Very Large Databases: Data Structures and Implementation

Data De-duplication Methodologies: Comparing ExaGrid s Byte-level Data De-duplication To Block Level Data De-duplication

EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY

How To Get To A Cloud Storage And Byod System

SHIV SHAKTI International Journal of in Multidisciplinary and Academic Research (SSIJMAR) Vol. 4, No. 5, October 2015 (ISSN )

Checklist and Tips to Choosing the Right Backup Strategy

Only 8% of corporate laptop data is actually backed up to corporate servers. Pixius Advantage Outsourcing Managed Services

Cloud Computing and Amazon Web Services

SDFS Overview. By Sam Silverberg

Understanding EMC Avamar with EMC Data Protection Advisor

Top Ten Questions. to Ask Your Primary Storage Provider About Their Data Efficiency. May Copyright 2014 Permabit Technology Corporation

Logz.io See the logz that matter

Transcription:

Side channels in cloud services, the case of deduplication in cloud storage Danny Harnik, Benny Pinkas, Alexandra Shulman-Peleg Presented by Yair Yona Yair Yona (TAU) Side channels in cloud services Advanced Topics in Storage Systems 1 / 18

Outline 1 Introduction 2 Deduplication 3 Security Loophole 4 Solutions 5 Conclusions Yair Yona (TAU) Side channels in cloud services Advanced Topics in Storage Systems 2 / 18

Introduction Cloud storage Fast growth of data volumes: Demand for online storage services Cloud storage services: Low cost, scalable, pay-per-use Service delivered via internet Deduplication: Storing only a single copy of data Provides user a link to the existing copy Reduces storage space of service provider Decreases consumption of bandwidth from client to server Disk and bandwidth savings 90% Yair Yona (TAU) Side channels in cloud services Advanced Topics in Storage Systems 3 / 18

Main Contribution Introduction Pointing out security loopholes due to cross user deduplication Proposing solution that reduces the risk of data leakage Yair Yona (TAU) Side channels in cloud services Advanced Topics in Storage Systems 4 / 18

Deduplication Deduplication Strategies File-level: Stores a single copy of each file Block-level: Segments file to blocks. Stores single copy of each block Approaches Target-Based Approach: Dedup is handled by the storage service User is unaware of dedup Does not save bandwidth Source-Based Approach: User sends hash signature to the server If a copy already exists the file is not sent Saves bandwidth and storage Yair Yona (TAU) Side channels in cloud services Advanced Topics in Storage Systems 5 / 18

Security Loophole The Loophole Settings Source-based approach The client knows whether dedup has occured Cross user dedup Other users can find out whether the file was uploaded Dropbox, Mozy and Memopal apply this setting The server answers the following question by yes/no Did any user previously uploaded a copy of this file? Yair Yona (TAU) Side channels in cloud services Advanced Topics in Storage Systems 6 / 18

Security Loophole Attack 1: Identifying File Assumptions The file is known to the attacker Unlikely to be at the possession of any other user The attacker uploads the file and checks whether dedup was performed Dedup can answer whether the user possess the file Yair Yona (TAU) Side channels in cloud services Advanced Topics in Storage Systems 7 / 18

Security Loophole Attack 2: Finding the Content of a File Assume the number of possibilities is limited The attacker uploads each possible version of the file The deduplicated version is identical to the file Yair Yona (TAU) Side channels in cloud services Advanced Topics in Storage Systems 8 / 18

Security Loophole Attack 3: Covert Channel Assume malicious software installed on the users machine The software establishes a covert channel based on cross users dedup Bypasses the firewall and communicates with its control server Binary example The software saves two files on the users machine The files are uploaded to the users backup service The control server uploads these files to the same backup service The deduplicated file represents the binary value Yair Yona (TAU) Side channels in cloud services Advanced Topics in Storage Systems 9 / 18

Solutions Solution 1: Encryption Encrypting the file using personal key before uploading to the service Different keys for identical files yield different encrypted files Does not allow deduplication This solution is vulnerable to offline dictionary attacks Deduplication reveals the key May indicate that a certain user posses the file Yair Yona (TAU) Side channels in cloud services Advanced Topics in Storage Systems 10 / 18

Solutions Solution 2: Target-Based Approach Deduplication is performed on the server side Eliminates bandwidth saving The cost of transferring 1 GB is proportional to the cost of storing it for 2 month (Amazon S3 service, June 2010) Solution of Mozyhome Relatively small files are uploaded Source based deduplication is performed on larger files Effective when Sensitive data is stored in small files Most bandwidth is consumed by large files Yair Yona (TAU) Side channels in cloud services Advanced Topics in Storage Systems 11 / 18

Solutions Solution 3: Randomization Weakening the correlation between existence of files in the storage system and deduplication Each file is assigned with a random threshold Source based deduplication is performed when the number of copies of different users exceeds this threshold Yair Yona (TAU) Side channels in cloud services Advanced Topics in Storage Systems 12 / 18

Solutions Solution 3: Description For every file X select a threshold t X [2,..., d] d may be public t X is chosen uniformly at random It is known only to the server c X is the number of users that uploaded copies of the file Source based dedup occurs when either c X t X X is uploaded by a client that already uploaded it Otherwise the file is sent and target based dedup occurs Yair Yona (TAU) Side channels in cloud services Advanced Topics in Storage Systems 13 / 18

Solutions Solution 3: Deletions Possible attack Attacker identifies source based dedup after t uploads It then deletes two files and again uploads these copies If source based dedup occurs after only one upload it indicates that some other user uploaded the file Not very practical attack since deleted files are retained by the service for some period of time Solution When c X t X source based dedup is always performed the server must keep a copy of the file even when all files are deleted Yair Yona (TAU) Side channels in cloud services Advanced Topics in Storage Systems 14 / 18

Solutions Solution 3: Security Analysis Examine the case where either A single copy of the file was uploaded No copy was uploaded Seems to be the most relevant for breaching single user privacy The events are as follows Attacker uploads single copy and dedup occurs: Happens only when t X = 2 and a single copy was uploaded Attacker detects that the file was uploaded Attacker uploads d copies before dedup occurs: Happens only when t X = d and no copy was uploaded Attacker detects that the file was not uploaded Yair Yona (TAU) Side channels in cloud services Advanced Topics in Storage Systems 15 / 18

Solutions Solution 3: Security Analysis Attacker uploads 2 < t < d copies before dedup occurs: Either t X = t and no copy was uploaded or t X = t+1 and a copy was uploaded The probability that X was uploaded equals its a-priori probability For a fraction of 1 1 d 1 of the files the solution leaks no information that distinguish between the case where a single copy was uploaded and the case where no copy was uploaded Yair Yona (TAU) Side channels in cloud services Advanced Topics in Storage Systems 16 / 18

Solutions Solution 3: Implications Implications on the service provider No increase in storage For a file X bandwidth increases by t X 1 A new tradeoff is introduced: As d increases The fraction of unprotected files decreases The bandwidth consumption increases The analysis for the covert channel attack is similar to the previous one since the threshold refers to the number of users that uploaded the file Yair Yona (TAU) Side channels in cloud services Advanced Topics in Storage Systems 17 / 18

Conclusions Conclusions This work reveals security loopholes created in cloud storage services, due to deduplication Several solutions were proposed in order to deal with the security risk A randomized solution that decreases the risk for data leakage at moderate cost was proposed Since cloud storage services are becoming increasingly popular, this work may have significant impact on the privacy provided for many users Yair Yona (TAU) Side channels in cloud services Advanced Topics in Storage Systems 18 / 18

Conclusions Thank you for your attention!