Security Infrastructure for Trusted Offloading in Mobile Cloud Computing



Similar documents
Ch. 4 - Topics of Discussion

Top Ten Security and Privacy Challenges for Big Data and Smartgrids. Arnab Roy Fujitsu Laboratories of America

Big-Data Computing with Smart Clouds and IoT Sensing

Arnab Roy Fujitsu Laboratories of America and CSA Big Data WG

NIST Big Data Public Working Group

A Study on Security and Privacy in Big Data Processing

Cloud Computing Trends

1.1.1 Introduction to Cloud Computing

Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services

Some IT Trends. The Big Switch in Early 21 st Century. Core Technologies for Cloud Computing and Future Internet

Cloudlet Mesh for Securing Mobile Clouds from Intrusions and Network Attacks*

COM 444 Cloud Computing

Mobile Cloud Computing: Paradigms and Challenges 移 动 云 计 算 : 模 式 与 挑 战

Lecture 02b Cloud Computing II

Mobile Cloud Computing: Survey & Discussion. Jianting Yue Sep 27, 2013

Cloud Database Storage Model by Using Key-as-a-Service (KaaS)

A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining Privacy in Multi-Cloud Environments

On the features and challenges of security and privacy in distributed internet of things. C. Anurag Varma CpE /24/2016

Security Considerations for Public Mobile Cloud Computing

International Journal of Scientific & Engineering Research, Volume 6, Issue 5, May ISSN

Arnab Roy Fujitsu Laboratories of America and CSA Big Data WG

NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015

A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network Abstract

A NOVEL APPROACH FOR PROTECTING EXPOSED INTRANET FROM INTRUSIONS

Internet of Things (IoT): A vision, architectural elements, and future directions

Introduction to Cloud Computing

The Cisco Powered Network Cloud: An Exciting Managed Services Opportunity

City of Coral Gables

Authentication. Authorization. Access Control. Cloud Security Concerns. Trust. Data Integrity. Unsecure Communication

White Paper on CLOUD COMPUTING

RE Think. IT & Business. Invent. IBM SmartCloud Security. Dr. Khaled Negm, SMIEEE, ACM Fellow IBM SW Global Competency Center Leader GCC

RIOT CONTROL The Art of Managing Risk for Internet of Things

Participatory Cloud Computing and the Privacy and Security of Medical Information Applied to A Wireless Smart Board Network

A HELPING HAND TO PROTECT YOUR REPUTATION

How To Understand Cloud Computing

Architecting and Building a Secure and Compliant Virtual Infrastructure and Private Cloud

Horizontal IoT Application Development using Semantic Web Technologies

Chapter 19 Cloud Computing for Multimedia Services

What Is It? Business Architecture Research Challenges Bibliography. Cloud Computing. Research Challenges Overview. Carlos Eduardo Moreira dos Santos

Ayla Networks, Inc. SOC 3 SysTrust 2015

3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC-2016) March 10-11, 2016 VIT University, Chennai, India

SafeNet Network Encryption Solutions Safenet High-Speed Network Encryptors Combine the Highest Performance With the Easiest Integration and

Clouds on the Horizon Cloud Security in Today s DoD Environment. Bill Musson Security Analyst

Cloud and Data Center Security

THE FUTURE OF SMART GRID COMMUNICATIONS

Introduction to Cloud Computing

Network Security Solution. Arktos Lam

CPET 581 Cloud Computing: Technologies and Enterprise IT Strategies. Virtualization of Clusters and Data Centers

International Journal for Research in Applied Science & Engineering Technology (IJRASET) A Review on Big Data Cloud Computing

IEEE JAVA Project 2012

Endpoint protection for physical and virtual desktops

SPACK FIREWALL RESTRICTION WITH SECURITY IN CLOUD OVER THE VIRTUAL ENVIRONMENT

Game changing Technology für Ihre Kunden. Thomas Bürgis System Engineering Manager CEE

OVERVIEW. Enterprise Security Solutions

Cloud Computing Simulation Using CloudSim

Trend Micro. Secure virtual, cloud, physical, and hybrid environments easily and effectively INTRODUCTION

Ø Teaching Evaluations. q Open March 3 through 16. Ø Final Exam. q Thursday, March 19, 4-7PM. Ø 2 flavors: q Public Cloud, available to public

Driving Success in 2013: Enabling a Smart Protection Strategy in the age of Consumerization, Cloud and new Cyber Threats. Eva Chen CEO and Co-Founder

Application Defined E2E Security for Network Slices. Linda Dunbar Diego Lopez

A Security Integrated Data Storage Model for Cloud Environment

Cloud Courses Description

management solutions

Protecting the Irreplacable. November 2013 Athens Ian Whiteside, F-Secure

End-to-end Secure Cloud Services a Pertino whitepaper

Seminar: Security Metrics in Cloud Computing ( se)

Big Data on AWS. Services Overview. Bernie Nallamotu Principle Solutions Architect

Fortigate Features & Demo

Marko Hännikäinen Tampere University of Technology IoT week CLOUD-BASED SERVICE PLATFORM FOR WIRELESS SENSOR NETWORKS

Protecting the un-protectable Addressing Virtualisation Security Challenges

Infrastructure for more security and flexibility to deliver the Next-Generation Data Center

Big Data Trust and Reputation, Privacy Cyber Threat Intelligence

DUBEX CUSTOMER MEETING

Ensuring Security in Cloud with Multi-Level IDS and Log Management System

STRATEGIC WHITE PAPER. Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview

Intrusion Detection for Mobile Ad Hoc Networks

Web Foundations Series Internet Business Associate

Cloud Computing Architecture: A Survey

Services. Cybersecurity. Capgemini & Sogeti. Guiding enterprises and government through digital transformation while keeping them secure

Keith Luck, CISSP, CCSK Security & Compliance Specialist, VMware, Inc. kluck@vmware.com

Applying System Thinking Concepts in Cyber Security Architectural Design of Enterprise Network Systems

Journey to the Private Cloud. Key Enabling Technologies

Cloud computing: benefits, risks and recommendations for information security

Architectural Implications of Cloud Computing

A Review of Anomaly Detection Techniques in Network Intrusion Detection System

Cloud Design and Implementation. Cheng Li MPI-SWS Nov 9 th, 2010

Transcription:

Security Infrastructure for Trusted Offloading in Mobile Cloud Computing Professor Kai Hwang University of Southern California Presentation at Huawei Forum, Santa Clara, Nov. 8, 2014 Mobile Cloud Security and Big Data Privacy Issues and their plausible Solutions Convergence of Five Emerging Technologies: Big Data Science, Cloud Computing, Social Networks, Mobile Systems, and the IoT. Cloud-based Radio Access Networks (C-RAN) for building the 5G Mobile Core Networks. New Solutions from Academia and Industry: WiFi cloudlets, mobile clouds, Data Coloring, PowerTrust Reputation System, Network Worm Containment, Hybrid IDS, Spam Filtering, and Security Analytics. Point of Contact: kaihwang@usc.edu 1

Privacy and Security Enforcement Infrastructure security Data Privacy Data Management Integrity/ Reactive Security Secure Computations in Distributed Programming Frameworks Security Best Practices for Nonrelational Data Stores Privacy Preserving Data Mining and Analytics Cryptographically Enforced Data Centric Security Granular Access Control Secure Data Storage and Transaction Logs Granular Audits Data Provenance End-point validation and filtering Real time Security Monitoring Source: K. Hwang, G. Fox, and J. Dongarra, Distributed and Cloud Computing : from Parallel Processing to The Internet of Things, Morgan Kaufmann, Oct. 2011 2

Security and Trust Barriers in Mobile Cloud Computing Protecting datacenters must first secure cloud resources and uphold user privacy and data integrity. We suggested the use of a trust overlay network to build reputation systems for trusted cloud computing A watermarking technique is suggested to protect shared data objects and massively distributed software modules. These techniques safeguard user authentication and tighten the data access-control control in public clouds. The new approach could be more cost-effective than using the traditional encryption and firewalls Prof. Kai Hwang, USC

Cloudlets- A trusted portal for Mobile Devices with cognitive abilities and pervasive capacity to access distance cloud to catch special events, check security alerts, and make intelligent decision making, etc. Source: Satyanarayana, et al, The Case of VM-based Cloudlets in Mobile Computing, IEEE Pervasive Computing, April 2009 Prof. Kai Hwang, USC, Huawei Forum, Nov.8, 2014 9-4

Fast VM synthesis makes it possible to build VM overlay in transient cloudlets, that is customized to bind cloud resources in distance to satisfy the user need. Trust and security issues are major factors in Cloudlet deployment. Prof. Kai Hwang, USC, Huawei Forum, Nov.8, 2014 9-5

Basic Concept of Extending the Cloudlets into A Mobile Mesh

Mobile Cloud Offloading Environment Cloudlet Mesh Remote Cloud Cloudlet Cloudlet The Internet Cloudlet Mobile Devices Remote Cloud Source: Y. Shi, S. Abhilash and K. Hwang, Cloudlet Mesh for Securing Mobile Clouds: Security Infrastructure and Protocols, IEEE Int l Conf. Mobile Cloud Computing, March 2015 (submitted in Nov. 2014)

Two approaches for Cloudlet: VM migration (~8GB) Dynamic VM synthesis (100 ~ 200MB) Performance is determined by local recourses: Bandwidth Compute power 8

For 100 Mbps links: VM overlay is 100~200MB Synthesizing a VM takes around 60 ~ 90s Other New Wireless Technologies 802.11n: 300~600Mbps UWB: 100~480 Mbps 60-GHz radio: 1~5 Gbps Some Design Considerations by Satyanarayana, et al, (2009): 9

Mobility Support and Security Measures for Mobile Cloud Computing Prof. Kai Hwang, USC, Huawei Forum, Nov.8, 2014 9-10

Security Mechanisms in Cloudlet Mesh Prof. Kai Hwang, USC, Huawei Forum, Nov.8, 2014 9-11

Security Protocols Developed at USC for Mobile Cloud Computing Prof. Kai Hwang, USC, Huawei Forum, Nov.8, 2014 9-12

Collective Intrusion Detection Results by Multiple Cloudlets in the Mesh Prof. Kai Hwang, USC, Huawei Forum, Nov.8, 2014 9-13

Cloud Service Models and Their Security Demands Source: K. Hwang and D. Li, Trusted Cloud Computing with Secure Resources and Data Coloring, IEEE Internet Computing, Vol.14, Sept. 2010. Prof. Kai Hwang, USC

An DHT-based Trust Overlay Network for Developing Reputation Systems to Secure Cloud Resources over Datacenters Sources: (1). M. Cai, K. Hwang, Y. K. Kwok, S. Song, and Y. Chen, Collaborative Internet Worm Containment, IEEE Security and Privacy, May/June 2005, pp.25-33. (2) Y. Chen, K. Hwang, and W. S. Ku, Collaborative Detection of DDoS Attacks over Multiple Network Domains, IEEE Trans. on Parallel and Distributed Systems, Dec. 2007.

Cloud and Data Security and Copyright Protection Source: S. Song, K. Hwang, R Zhou, and Y.K. Kwok, Trusted P2P Transactions with Fuzzy Reputation Aggregation, IEEE Internet Computing, Special Issue on Security for P2P and AD Hoc Networks, Vol.9, Nov/Dec. 2004.

Data Coloring for Privacy Protection on The Cloud Source: K. Hwang and D. Li, Trusted Cloud Computing with Secure Resources and Data Coloring, IEEE Internet Computing, Vol.14, Sept. 2010.

Data Color Matching for owner/user authentication and authorization purposes in a cloud environment

This work were cited 511 times by Google Scholar Citations as of today 19

HIDS for Automated Intrusion Response generation Source: K. Hwang, M. Cai, Y. Chen, and M. Qin, Hybrid Intrusion Detection with Weighted Signature Generation over Anomalous Internet Episodes, IEEE Trans. on Dependable and Secure Computing, Vol.4, No.1, Jan-March, 2007.

CSA Top 10 Data Security and Privacy Challenges 1. Secure computations 2. Secure non-relational datastores 3. Secure data storage and logs 4. End-point input validation/filtering 5. Real time security monitoring 6. Privacy- preserving data mining and analytics 7. Cryptographic access control 8. Granular access control 9. Granular audits 10. Data provenance 2 1

BYOD (Bring your Own Device) vs. BYOC (Bring Your Own Cloud) The BYOD has already posed an increased risk to many business organizations. With BYOC, employees are installing public cloud services such as Dropbox and icloud on their corporate desktops and mobile devices. BYOC introduces additional security threats to the organizations by blurring the boundaries between personal data and business confidential data. This makes the organizations to deman more control on their security policy for access and distribution of corporate information. BYOC Demands More Security Enforcement 2 2 Prof. Kai Hwang, USC, May 28, 2014

Building Accountability Systems To Establish SLA Compliance Between Users and Providers 23

From 3G and 4G to 5 G Mobile Core Networks Prof. Kai Hwang, USC, Huawei Forum, Nov.8, 2014 9-24

Virtual Base Station Pool and C-RAN Bear Network (3)

Trusted Cloud Mashup for Big Data Apps Prof. Kai Hwang, USC, 2014

MapReduce Filtering of Twitter Spams on The AWS EC2 Platform Prof. Kai Hwang, USC, 2014

MapReduce Filtering Results of Spam Detection in Twitter Blogs over The Amazon EC2 Cloud Source: Y. Shi, S. Abhilash and K. Hwang, Cloudlet Mesh for Securing Mobile Clouds: Security Architecture and Protocols, IEEE Int l Conf. Mobile Cloud Computing, March 2015 Prof. Kai Hwang, USC, Huawei Forum, Nov.8, 2014 9-28

Architecture of The Internet of Things Application Layer Merchandise Tracking Environment Protection Intelligent Search Telemedicine Intelligent Traffic Smart Home Cloud Computing Platform Network Layer Mobile Telecom Network The Internet Information Network RFID Sensor Network GPS Sensing Layer RFID Label Sensor Nodes Road Mapper Source: K. Hwang, G. Fox, and J. Dongarra, Distributed and Cloud Computing : from Parallel Processing to The Internet of Things, Morgan Kaufmann Publisher, Oct. 2011 Prof. Kai Hwang, USC, Huawei Forum, Nov.8, 2014 9-29

Cloud Support of the Internet of Things and Social Network Applications 1. Smart and pervasive cloud applications for individuals, homes, communities, companies, and governments, etc. 2. Coordinated calendar, itinerary, job management, events, and consumer record management (CRM) services 3. Coordinated word processing, on-line presentations, web-based desktops, sharing on-line documents, datasets, photos, video, and databases, content distribution, etc. 4. Deploy conventional cluster, grid, P2P, social networking applications in the cloud environments, more cost-effectively. 5. Earthbound applications that demand elasticity and parallelism to avoid large data movement and reduce the storage costs Prof. Kai Hwang, USC, Huawei Forum, Nov.8, 2014 9-30

Big Data Security in Clouds 3 1 Prof. Kai Hwang, USC, Nov. 8, 2014

Concluding Remarks : Mobile cloud security and big data privacy are facing a trust dilemma by the general public. Without security assurance, most users will be reluctant to accept clouds, P2P, social networks, and IoT apps in the future. Due to the economies of scale, the cloud providers must have dedicated teams of security professionals or specialists. Cloud datacenters must have stronger protection in par of the military standards. SMACT technologies (Social, Mobile, Analytics, Clouds, and IoT) are changing our world, reshaping the human relations, promoting the global economy, and triggering even some societal and political reforms in different regions of the world like it or not. Contact: kaihwang@usc.edu