Current Research- Cloud Computing and E-Government



Similar documents
THE PUBLIC CLOUD FOR E-GOVERNMENT

The Public Cloud for e-government

A Privacy-Preserving eid based Single Sign-On Solution

Topics. Images courtesy of Majd F. Sakr or from Wikipedia unless otherwise noted.

Secure Cloud Identity Wallet

The increasing popularity of mobile devices is rapidly changing how and where we

Cloud Computing; What is it, How long has it been here, and Where is it going?

Perspectives on Cloud Computing and Standards. Peter Mell, Tim Grance NIST, Information Technology Laboratory

Cloud Computing in E-Government across Europe

Cloud Security considerations for business adoption. Ricci IEONG CSA-HK&M Chapter

Why Private Cloud? Nenad BUNCIC VPSI 29-JUNE-2015 EPFL, SI-EXHEB

Identity & Access Management The Cloud Perspective. Andrea Themistou 08 October 2015

Daren Kinser Auditor, UCSD Jennifer McDonald Auditor, UCSD

Security Considerations for Public Mobile Cloud Computing

OWASP Chapter Meeting June Presented by: Brayton Rider, SecureState Chief Architect

See Appendix A for the complete definition which includes the five essential characteristics, three service models, and four deployment models.

Cloud & Security. Dr Debabrata Nayak Debu.nayak@huawei.com

Security Issues in Cloud Computing

Security & Trust in the Cloud

Data Protection: From PKI to Virtualization & Cloud

Clinical Trials in the Cloud: A New Paradigm?

NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015

CHAPTER 8 CLOUD COMPUTING

Hybrid Cloud Identity and Access Management Challenges

A Survey on Cloud Security Issues and Techniques

INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS

An Overview of Cloud Identity Management-Models

The NIST Definition of Cloud Computing

Perspectives on Moving to the Cloud Paradigm and the Need for Standards. Peter Mell, Tim Grance NIST, Information Technology Laboratory

Cloud Computing An Introduction

The Top 5 Federated Single Sign-On Scenarios

CLOUD COMPUTING. A Primer

Security Issues In Cloud Computing and Countermeasures

Blending Embedded Hardware OTP, SSO, and Out of Band Auth for Secure Cloud Access

Cloud Computing. Bringing the Cloud into Focus

A Study on Analysis and Implementation of a Cloud Computing Framework for Multimedia Convergence Services

Cloud Security Introduction and Overview

The Hybrid Cloud: Bringing Cloud-Based IT Services to State Government

CLOUD TECHNOLOGY IMPLEMENTATION/SECURITY

How To Protect Your Cloud Computing Resources From Attack

This chapter describes how to use the Junos Pulse Secure Access Service in a SAML single sign-on deployment. It includes the following sections:

1 The intersection of IAM and the cloud

Agenda. How to configure

Cloud Computing For Distributed University Campus: A Prototype Suggestion

Fundamentals of Cloud Computing

Chapter 1: Introduction

From the Intranet to Mobile. By Divya Mehra and Stian Thorgersen

IT Risk and Security Cloud Computing Mike Thomas Erie Insurance May 2011

Future of Cloud Computing. Irena Bojanova, Ph.D. UMUC, NIST

How To Understand Cloud Usability

What Cloud computing means in real life

Cloud Computing and Government Services August 2013 Serdar Yümlü SAMPAŞ Information & Communication Systems

Cloud Computing Technology

EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES

Architectural Implications of Cloud Computing

Fundamental Concepts and Models


SAML SSO Configuration

A Survey on Security Issues and Security Schemes for Cloud and Multi-Cloud Computing

Fundamental Concepts and Models

Kent State University s Cloud Strategy

Running head: TAKING A DEEPER LOOK AT THE CLOUD: SOLUTION OR 1

AK IT-Security 1. E-Government Introduction, Motivation, Demonstration (VO) (KU)

Protect Everything: Networks, Applications and Cloud Services

The Magical Cloud. Lennart Franked. Department for Information and Communicationsystems (ICS), Mid Sweden University, Sundsvall.

Computer Systems Security 2013/2014. Single Sign-On. Bruno Maia Pedro Borges

Evaluation of different Open Source Identity management Systems

Virginia Government Finance Officers Association Spring Conference May 28, Cloud Security 101

ITL BULLETIN FOR JUNE 2012 CLOUD COMPUTING: A REVIEW OF FEATURES, BENEFITS, AND RISKS, AND RECOMMENDATIONS FOR SECURE, EFFICIENT IMPLEMENTATIONS

Adding Stronger Authentication to your Portal and Cloud Apps

Table of Content Cloud Computing Tutorial... 2 Audience... 2 Prerequisites... 2 Copyright & Disclaimer Notice... 2 Cloud Computing - Overview...

Leveraging SAML for Federated Single Sign-on:

SaaS at Pfizer. Challenges, Solutions, Recommendations. Worldwide Business Technology

Keyword: Cloud computing, service model, deployment model, network layer security.

Security & Cloud Services IAN KAYNE

An Overview of Cloud Identity Management-Models

Deploying a Geospatial Cloud

Figure 1 Cloud Computing. 1.What is Cloud: Clouds are of specific commercial interest not just on the acquiring tendency to outsource IT

WIPRO IDENTITY CLOUD UNLEASHING THE NEXT GENERATION OF IDENTITY AND ACCESS MANAGEMENT (IAM)

CLOUD TECH SOLUTION AT INTEL INFORMATION TECHNOLOGY ICApp Platform as a Service

TrustedX - PKI Authentication. Whitepaper

Commercial Software Licensing

API-Security Gateway Dirk Krafzig

Copyright: WhosOnLocation Limited

Top 10 Cloud Risks That Will Keep You Awake at Night

Cloud Computing. IST 501 Fall Dongwon Lee, Ph.D.

Strategic Compliance & Securing the Cloud. Annalea Sharack-Ilg, CISSP, AMBCI Technical Director of Information Security

How To Use Saml 2.0 Single Sign On With Qualysguard

Sharing Of Multi Owner Data in Dynamic Groups Securely In Cloud Environment

Transcription:

AK IT-Security 1 Current Research- Cloud Computing and E-Government Graz, 12.11.2014 Das E-Government Innovationszentrum ist eine gemeinsame Einrichtung des Bundeskanzleramtes und der TU Graz

Overview» What is Cloud Computing?» Definition» Models» Cloud Computing in E-Government» Benefits/Drawbacks» Secure Storage in the Public Cloud» Using the Austrian citizen card» Cloud and eid» Cloud Identity Models» eid Authentication at Public Clouds» A new Identity as a Service Model Graz, 12.11.2014 2

Overview» What is Cloud Computing?» Definition» Models» Cloud Computing in E-Government» Benefits/Drawbacks» Secure Storage in the Public Cloud» Using the Austrian citizen card» Cloud and eid» Cloud Identity Models» eid Authentication at Public Clouds» A new Identity as a Service Model Graz, 12.11.2014 3

What is Cloud Computing?» Definition of the NIST:» Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. (Mell & Grance, 2010)» Features On-Demand Self Service Broad Network Access Resource Pooling Rapid Elasticity Measured Services Graz, 12.11.2014 4

Characteristics» On-Demand Self-Service / Self-provisioning of resources: Management of resources by the user/customer Resources can be requested on demand and can be provided immediately» Broad Network Access: All resources are broadband connected via the Internet or Intranet» Resource Pooling: Computing resources are pooled in one place and made available to several users» Massive Scalability: Resources can be made available to the appropriate extent depending on requirements» Rapid Elasticity: Resources can be allocated in real-time and (partly) automated according to the changing needs of the user» Measured Service / Pay as you go: Consumption-oriented payment or settlement model» Multitenancy: Resources and services are shared dynamically between all users Graz, 12.11.2014 5

Overview» What is Cloud Computing?» Definition» Models» Cloud Computing in E-Government» Benefits/Drawbacks» Secure Storage in the Public Cloud» Using the Austrian citizen card» Cloud and eid» Cloud Identity Models» eid Authentication at Public Clouds» A new Identity as a Service Model Graz, 12.11.2014 6

Deployment Models» Models based on operational and organizational aspects Graz, 12.11.2014 7

Evaluation Public Clouds Public Clouds Strengths Weaknesses High availability Reliability High elasticity Facilitated patch management Distribution for failure safety Low costs Compliance with legal regulations Isolation issues due to multitenancy Less detailed logging capabilities Proprietary interfaces Graz, 12.11.2014 8

Evaluation Private Clouds Private Clouds Strengths Weaknesses Strong control Detailed logging/auditing Compliance with legal regulations Higher costs Specific point to attack Lack of elasticity Graz, 12.11.2014 9

Evaluation Community Clouds Community Clouds Strengths Weaknesses Lower costs than private cloud Elasticity Compliance with legal regulations Competition between consumers Specific point to attack Consensus between involved parties required No accurate prediction on required resources Who is the legal entity in case of liability Graz, 12.11.2014 10

Evaluation Hybrid Clouds Hybrid Clouds Strengths Weaknesses Flexibility Stronger control Complexity Compatibility issues due to different interfaces Classification of data (sensitive data should not be stored in public cloud) Graz, 12.11.2014 11

Service Models» Models based on technical and service aspects Everything as a Service (XaaS) as a Service Software as a Service (SaaS) Plattform as a Service (PaaS) Infrastructure as a Service (IaaS) Graz, 12.11.2014 12

Evaluation Infrastructure as a Service Infrastructure as a Service (IaaS) Strengths Operating systems or application runtime can be chosen by the customer Full control over operating system and runtime Weaknesses Increase of administrative complexity Customers have to maintain updates on their own Infrastructure as a Service (IaaS) Graz, 12.11.2014 13

Evaluation Platform as a Service Platform as a Service (PaaS) Strengths Weaknesses Focus on application development instead of infrastructure Less administrative effort Existing applications must be amended to provided interfaces Vendor lock-in Plattform as a Service (PaaS) Graz, 12.11.2014 14

Evaluation Software as a Service Software as a Service (SaaS) Strengths Weaknesses Minimum administrative effort Quick adoption Very generic and not easily extendable Cost intensive Software as a Service (SaaS) Graz, 12.11.2014 15

Overview» What is Cloud Computing?» Definition» Models» Cloud Computing in E-Government» Benefits/Drawbacks» Secure Storage in the Public Cloud» Using the Austrian citizen card» Cloud and eid» Cloud Identity Models» eid Authentication at Public Clouds» A new Identity as a Service Model Graz, 12.11.2014 16

Cloud Computing for the Public Sector» Benefits» Cost Savings» [ ] over a 13-year life cycle, the total cost of implementing and sustaining a cloud environment may be as much as two-thirds lower than maintaining a traditional, non-virtualized IT data center. (Alford, 2009)» Market Potential» Growth rate of 26% for the upcoming years (Deloitte, 2009)» Concentration of core business (Khan et al., 2011)» Already on the agendas of European Bodies» ENISA (Priorities for Research on Current and Emerging Network Trends)» European Commission» Digital Agenda for 2020:» [ ] an EU-wide strategy on cloud computing notably for government and science.» European Cloud Computing Strategy.» Unleashing the Potential of Cloud Computing in Europe» Cloud for Europe (C4E)» Public sector requirements and usage scenarios for cloud computing Graz, 12.11.2014 17

Benefits for the Public Sector» Scalability» High load close to deadlines (e.g. elections, tenderings etc.)» Payment model» Pay-as-you-go» Easy implementation» No in-house infrastructure, APIs» Less maintanance efforts» Automatic updates and patches» Availability» Spread and multiple computing centers of the cloud provider Graz, 12.11.2014 18

Chances and Risks for the Public Sector» Legal» Data Protection and Privacy» Influence only via contracts(sla)» Structural» Vendor Lock-In» Economic» Costs for functional adaptions» Operational costs vs. Investment costs» Technical» Standardisation» Security Graz, 12.11.2014 19

Cloud Computing in Europe» Austria» Emphasize cost savings but struggle with security and data protection» Favours private and community clouds over public clouds» Denmark» Decrease cost of IT services» Moved services of Danish procurement authority into the cloud (2011)» Ireland» Cloud computing is part of Irish technological action plan» Expects 10.000 high value jobs in this area» United Kingdom» G-Cloud installation (Private or community cloud covering all service layers) Graz, 12.11.2014 20

Overview» What is Cloud Computing?» Definition» Models» Cloud Computing in E-Government» Benefits/Drawbacks» Secure Storage in the Public Cloud» Using the Austrian citizen card» Cloud and eid» Cloud Identity Models» eid Authentication at Public Clouds» A new Identity as a Service Model Graz, 12.11.2014 21

Motivation» Public Cloud Storage Graz, 12.11.2014 22

Motivation» Secure Public Cloud Storage Graz, 12.11.2014 23

Motivation» Secure Public Cloud Storage using Smart Cards Graz, 12.11.2014 24

The Software CCE (Citizen Card Encrypted)» Platform-independent Open Source- Tool» Encryption and decryption based on software and hardware keys» Supports Austrian Citizen Card» S/MIME as container format» Uses local file-system as a data storage Graz, 12.11.2014 25

Implementation LDAP directory Austrian Citizens Graz, 12.11.2014 26

Implementation» Inclusion of Cloud Storage Services» DropBox» Google Drive» Mapping between Cloud-Credentials and Smart Card» Login to cloud automatically» Connection with the file system» By moving a file into a specific cloud folder the file is encrypted automatically Graz, 12.11.2014 27

Screenshots - Encryption Graz, 12.11.2014 28

Screenshots - Decryption Graz, 12.11.2014 29

Evaluation - Advantages» Usage of external PKI Infrastructure» LDAP directory enables encryption for arbitrary Austrian citizens» User-Management separated from cloud provider» Vendor Lock-In Prevention» Keys are managed by a trusted external party, not CCE» Substitution of cloud provider is easier» Secure hardware-based decryption» Private key cannot be read out of hardware» 2-Factor Authentication» Open Source Implementation» Easy to extend» Additional cloud providers, different container format, PKI, etc. Graz, 12.11.2014 30

Evaluation - Disadvantages» Web interface and mobile version is missing» Use of smart cards with mobile phones difficult» Storing private key securely is difficult» Two way sync with cloud storage» First encrypted locally, then upload» Smart card reader necessary» Reducing the systems to be used Graz, 12.11.2014 31

Overview» What is Cloud Computing?» Definition» Models» Cloud Computing in E-Government» Benefits/Drawbacks» Secure Storage in the Public Cloud» Using the Austrian citizen card» Cloud and eid» Cloud Identity Models» eid Authentication at Public Clouds» A new Identity as a Service Model Graz, 12.11.2014 32

Identity in the Cloud-Model Identity Cloud Service User Identity data Cloud Application Identity data process flow» Similar to isolated model» Identity data are managed by the same cloud provider that hosts the application» No effort or costs for user management» User management of cloud provider is used» e.g., Google [Zwattendorfer et al., 2014 (WEBIST)] Graz, 12.11.2014 33

Identity to the Cloud-Model Identity data Identity User [Zwattendorfer et al., 2014 (WEBIST)] Cloud Service Cloud Application Identity data process flow» Similar to central model» Identity data are managed by external identity provider» IdP hosted by external organization» Existing infrastructure can be re-used» Higher control on identity data» e.g., Google Apps, Salesforce.com Graz, 12.11.2014 34

Identity from the Cloud-Model Identity data Identity data Cloud Service Identity User [Zwattendorfer et al., 2014 (WEBIST)] Cloud Service Cloud Application Identity data process flow» Identity as a Service» Identity data are provided from external cloud provider» Hybrid cloud model» Choose desired provider» Outsourcing of user management to cloud» e.g., Intel Cloud SSO, SkIDentity Graz, 12.11.2014 35

Overview» What is Cloud Computing?» Definition» Models» Cloud Computing in E-Government» Benefits/Drawbacks» Secure Storage in the Public Cloud» Using the Austrian citizen card» Cloud and eid» Cloud Identity Models» eid Authentication at Public Clouds» A new Identity as a Service Model Graz, 12.11.2014 36

Current Situtation Cloud Service 1 Cloud Service 2 Cloud Application Identity Identity Cloud Application username1/ password1 username2/ password2» Main Issues:» Username/Password authentication» Two separate authentication processes» Usually two different credentials Graz, 12.11.2014 37

STORK Authentication to the Public Cloud Cloud Service 1 Cloud Application Identity SAML SSO STORK (VIDP) Identity SAML Cloud Service 2 Cloud Application» Identity to the Cloud Model» Google Apps und Salesforce.com» Strong authentication (national eids) instead of username/password» Support of 18 MS eids» Single Sign-On Graz, 12.11.2014 38

Screenshots https:// docs.google.com/a/ xyz.com/ Graz, 12.11.2014 39

Overview» What is Cloud Computing?» Definition» Models» Cloud Computing in E-Government» Benefits/Drawbacks» Secure Storage in the Public Cloud» Using the Austrian citizen card» Cloud and eid» Cloud Identity Models» eid Authentication at Public Clouds» A new Identity as a Service Model Graz, 12.11.2014 40

Motivation Current Deployment Graz, 12.11.2014 41

Motivation Current Deployment Scalable, but many instances of MOA-ID! Graz, 12.11.2014 42

Motivation Central Deployment Graz, 12.11.2014 43

Motivation Central Deployment» Advantages» Users only need to trust one specific Identity» Possibility of Single Sign-On (SSO)» No separate Identity installation at the Service (Save Costs)» Support of different identity protocols» Disadvantage» Single Point of Failure/Attack» Scalability Graz, 12.11.2014 44

Motivation Central CLOUD Deployment Graz, 12.11.2014 45

Motivation Central CLOUD Deployment of an Identity» Advantages» Users only need to trust one specific Identity» Possibility of Single Sign-On (SSO)» No separate Identity installation at the Service (Save Costs)» Support of different protocols» Scalability» Disadvantage» Single Point of Failure/Attack» Privacy (Cloud acts honest but curious) Graz, 12.11.2014 46

Authentication Registration New Model» A user-centric and privacy-preserving Identity as a Service Model for eids Identity 4.) 5.) Service Identity and/or Attribute 2.) 3.) Authentication 3.) 2.) Client 1.) & 6.) Encrypted Attributes User Control Registration Authority (RA) Encrypted Attributes Registration Authority (RA) User Us User Control (a) Client-side model (b) Serv Graz, 12.11.2014 47

Requirements» Qualified and authentic identity data» High quality attributes applicable for eids» Semi-trusted identity providers» E.g., public clouds» Integration effort and complexity» Easy integration into existing infrastructures» Privacy» Identity data/attributes must be preserved wrt. to the identity provider» User-centricity» User always remains in full control over her identity data» Selective Disclosure» User can disclose only parts of her identity data Graz, 12.11.2014 48

Cryptographic Preliminaries» Redactable Signatures» Allow for replacement or removal of (specified) parts of a message after signature creation such that the original signature stays valid (and no interaction with the original signer is required). Graz, 12.11.2014 49

Redectable Signatures m This text contains private data m 1 This m 2 text m 3 contains m 4 private m 4 * m 5 data h 1 H(m 1 ) h 2 H(m 2 ) h 3 H(m 3 ) h 4 H(m 4 ) H(m 4 ) h 5 H(m 5 ) Hash TOTAL Total Hashvalue Hash TOTAL = h 1 h 2 h 3 h 4 h 5 Receiver of a conventional signature gets: Signature S= Sign(Hash TOTAL ) Receiver of a redactable signature gets: Signature Message Signature Message S This text contains private data S This text contains private data Hashvalue H(m 4 ) Graz, 12.11.2014 50

Cryptographic Preliminaries» Proxy Re-Encryption» A semi-trusted proxy can alter a ciphertext, which has been encrypted for one party A, so that it may be decrypted by another party B» The proxy thereby gains neither access to the plaintext of the data nor to the decryption key. Graz, 12.11.2014 51

Proxy Re-Encryption Plaintext Encrypt C A Proxy C B Decrypt Plaintext A s Public Key Re-Encryption Key A B B s Private Key A s Private Key B s Public Key Graz, 12.11.2014 52

Authentication The Model - Registration 3.) 2.) Clien Registration Authority (RA)» Identity data are issued by a trusted third party» Registration process depends on the underlying eid approach» Identity data are encrypted for the user by the registration authority and signed by a redactable signature scheme User (a) Clien Graz, 12.11.2014 53

Authentication Registration The Model - Authentication Identity 4.) 5.) Service Identity and/or Attribute 2.) 3.) Authentica 3.) 1.) & 6.) Encrypted Attributes 2.) Client User Control Registration Authority (RA) User Encrypted Attributes User Control (a) Client-side model Registration Authority (RA) 1.) User wants to access protected resource Graz, 12.11.2014 54

Authentication Registration The Model - Authentication Identity 4.) 5.) Service Identity and/or Attribute 2.) 3.) Authentica Registration Authority (RA) 3.) 2.) User Client Encrypted Attributes User Control (a) Client-side model 1.) & 6.) Encrypted Attributes User Control 2.) User redacts all Registration attributes Authority which should (RA) not be disclosed to the service provider + Re-encryption key generation for SP Graz, 12.11.2014 55

Authentication Registration The Model - Authentication Identity 4.) 5.) Service Identity and/or Attribute 2.) 3.) Authentica 3.) 1.) & 6.) Encrypted Attributes 2.) Client User Control Registration Authority (RA) User Encrypted Attributes User Control (a) Client-side model Registration Authority (RA) 3.) Redacted identity data and re-encryption key are sent to IdP in the cloud Graz, 12.11.2014 56

Authentication Registration The Model - Authentication Identity 4.) 5.) Service Identity and/or Attribute 2.) 3.) Authentica Registration Authority (RA) 3.) 2.) Client Encrypted Attributes 1.) & 6.) Encrypted Attributes 4.) User Control IdP verifies identity data and re-encrypts it for the SP Registration Authority (RA) User User Control (a) Client-side model Graz, 12.11.2014 57

Authentication Registration The Model - Authentication Identity 4.) 5.) Service Identity and/or Attribute 2.) 3.) Authentica Registration Authority (RA) 3.) 2.) Client Encrypted Attributes 1.) & 6.) Encrypted Attributes 5.) User Control Transfer identity data to SP based on existing protocol (e.g. SAML) Registration Authority (RA) User User Control (a) Client-side model Graz, 12.11.2014 58

Authentication Registration The Model - Authentication Identity 4.) 5.) Service Identity and/or Attribute 2.) 3.) Authentica Registration Authority (RA) 3.) 2.) Client Encrypted Attributes 1.) & 6.) Encrypted Attributes 6.) Verify and decrypt attributes and provide resource Registration Authority (RA) User Control User User Control (a) Client-side model Graz, 12.11.2014 59

Requirements» Qualified and authentic identity data» High quality attributes applicable for eids» Semi-trusted identity providers» E.g., public clouds» Integration effort and complexity» Easy integration into existing infrastructures» Privacy» Identity data/attributes must be preserved wrt. to the identity provider» User-centricity» User always remains in full control over her identity data» Selective Disclosure» user can disclose only parts of her identity data Graz, 12.11.2014 60

Security Layer Identification and Authentication in Austria Identity (MOA-ID) Service Application sspin Citizen Card +... <saml:subjectconfirmationdata> <pr:person xsi:type="pr:physical <pr:identification> <pr:value>123456789012</pr:v <pr:type>http://reference.e-g </pr:identification> <pr:name> <pr:givenname>john</pr:given <pr:familyname>doe</pr:fami </pr:name>... <saml:attribute AttributeName="CitizenPublicKey"... <dsig:rsakeyvalue> <dsig:modulus>snw8olcq49qnefems Identity Link Certificate SourcePIN Citizen is uniquely identified (Identity Link) and authenticated by verifying a qualified electronic signature Graz, 12.11.2014 61

Process Flow - Current Situation 4. 7. Verify 5. Identity Signature Generate sspin Link Identity (MOA-ID) Service 3. Read Identity Link 6. Create Signature 8. SAML Assertion (sspin) 2. SAML AuthnRequest 9. Provide Resource 1. Request Authentication Client Middleware Graz, 12.11.2014 62

Identity Link Current Situation» SourcePIN and personal data» Conventionally signed by trusted authority... <saml:subjectconfirmationdata> <pr:person xsi:type="pr:physical <pr:identification> <pr:value>123456789012</pr:v <pr:type>http://reference.e-g </pr:identification> <pr:name> <pr:givenname>john</pr:given <pr:familyname>doe</pr:fami </pr:name>... <saml:attribute AttributeName="CitizenPublicKey"... <dsig:rsakeyvalue> <dsig:modulus>snw8olcq49qnefems Graz, 12.11.2014 63 New Model» Personal data are encrypted» All sspins (encrypted) instead of sourcepin» Signed by trusted authority using a redactable signature scheme

Process Flow New Model 5. Verify redacted Identity Link + reencrypt attributes Identity (MOA-ID) Service 7. Decrypt attributes 3. Read Identity Link 4. Return redacted Identity Link and reencryption key 6. SAML Assertion (reencrypted 2. SAML AuthnRequest attributes) 8. Provide Resource 1. Request Authentication Client Middleware 4. Redact 5. Create Identity reencryption creation Link + Signature key Graz, 12.11.2014 64

Conclusions» Cloud computing can be advantageous for the public sector» Cost savings, scalability, etc.» But: privacy and security issues» Use of eids and cryptographic technologies can help» Want to support us?» Seminars/Projects:» http://www.iaik.tugraz.at/content/teaching/ master_courses/seminar_project/ Graz, 12.11.2014 65

References» P. Mell, T. Grance, - The NIST definition of cloud computing NIST 2010» C. Baun, M. Kunze, J. Nimis, S. Tai Cloud computing: Web-basierte dynamische IT-Services - 2011» T. Alford - The Economics of cloud computing - Booz Allen Hamilton 2009» F. Khan, B. Zhang, S. Khan, S. Chen - Technological leap frogging e-government through cloud computing - 2011-4th IEEE International Conference on Broadband Network and Multimedia Technology», Arne Tauber - "The Public Cloud for E-Government" - IADIS International Conferences Web Based Communities and Social Media and Collaborative Technologies 2012», Klaus Stranacher, Arne Tauber, Peter Reichstädter - "Cloud Computing in E-Government across Europe" - Technology-Enabled Innovation for Democracy, Government and Governance 2013», Bojan Suzic, Peter Teufl, Andreas Derler - "Sicheres Speichern in der Public Cloud mittels Smart Cards" - D-A-CH Security 2013», Bojan Suzic, Peter Teufl, Andreas Derler - "Secure Hardware-Based Public Cloud Storage" - Open Identity Summit 2013», Klaus Stranacher, Arne Tauber - "Bürgerkarten-Authentifizierung zur Public Cloud" - D-A-CH Security 2012», Arne Tauber - "Secure Cloud Authentication using eids" - Proceedings of IEEE CCIS2012», Daniel Slamanig - "On Privacy-Preserving Ways to Porting the Austrian eid System to the Public Cloud" - 28th IFIP TC-11 International Information Security and Privacy Conference (SEC 2013)» Daniel Slamanig, Klaus Stranacher, - "User-Centric Identity as a Service-Architecture for eids with Selective Attribute Disclosure" - 19th ACM Symposium on Access Control Models and Technologies (SACMAT 2014)», Thomas Zefferer, Klaus Stranacher - "An Overview of Cloud Identity Management-Models" - Proceedings of the 10th International Conference on Web Information Systems and Technologies Graz, 12.11.2014 66

Thank you for the attention! bernd.zwattendorfer@egiz.gv.at www.egiz.gv.at