Privacy and security in the cloud



Similar documents
PRISMACLOUD. Privacy and Security Maintaining Services in the Cloud Thomas Loruenser AIT Austrian Institute of Technology GmbH

Perspectives on Moving to the Cloud Paradigm and the Need for Standards. Peter Mell, Tim Grance NIST, Information Technology Laboratory

CHAPTER 8 CLOUD COMPUTING

CLOUD COMPUTING. A Primer

Why Private Cloud? Nenad BUNCIC VPSI 29-JUNE-2015 EPFL, SI-EXHEB


Cloud Computing and Government Services August 2013 Serdar Yümlü SAMPAŞ Information & Communication Systems

Cloud Computing in the Enterprise An Overview. For INF 5890 IT & Management Ben Eaton 24/04/2013

Office of the Government Chief Information Officer The Government of the Hong Kong Special Administrative Region

IS PRIVATE CLOUD A UNICORN?

Security Considerations for Public Mobile Cloud Computing

AskAvanade: Answering the Burning Questions around Cloud Computing

Cloud Security Introduction and Overview

Cloud Computing in the Czech Republic

Security Issues in Cloud Computing

Cloud computing: the state of the art and challenges. Jānis Kampars Riga Technical University

Cloud definitions you've been pretending to understand. Jack Daniel, Reluctant CISSP, MVP Community Development Manager, Astaro

Clinical Trials in the Cloud: A New Paradigm?

Essential Characteristics of Cloud Computing: On-Demand Self-Service Rapid Elasticity Location Independence Resource Pooling Measured Service

Perspectives on Cloud Computing and Standards. Peter Mell, Tim Grance NIST, Information Technology Laboratory

The NIST Definition of Cloud Computing (Draft)

Strategic approach to cloud computing deployment

Daren Kinser Auditor, UCSD Jennifer McDonald Auditor, UCSD

Cloud Computing; What is it, How long has it been here, and Where is it going?

East African Information Conference th August, 2013, Kampala, Uganda. Security and Privacy: Can we trust the cloud?

Cloud Computing Guide & Handbook. SAI USA Madhav Panwar

Cloud-Security: Show-Stopper or Enabling Technology?

Private Cloud Database Consolidation with Exadata. Nitin Vengurlekar Technical Director/Cloud Evangelist

The Magical Cloud. Lennart Franked. Department for Information and Communicationsystems (ICS), Mid Sweden University, Sundsvall.

Cloud Computing For Distributed University Campus: A Prototype Suggestion

The Cloud Computing Revolution: Beyond the Hype

See Appendix A for the complete definition which includes the five essential characteristics, three service models, and four deployment models.

CLOUD COMPUTING SECURITY ISSUES

Cloud Computing An Elephant In The Dark

ITL BULLETIN FOR JUNE 2012 CLOUD COMPUTING: A REVIEW OF FEATURES, BENEFITS, AND RISKS, AND RECOMMENDATIONS FOR SECURE, EFFICIENT IMPLEMENTATIONS

White Paper on CLOUD COMPUTING

Storage Clouds. Karthik Ramarao. Director of Strategy and Technology and CTO Asia Pacific, NetApp Board Director SNIA South Asia

A Hotel in the Cloud. Bruno Albietz

SCADA Cloud Computing

NATO s Journey to the Cloud Vision and Progress

Orchestrating the New Paradigm Cloud Assurance

Future of Cloud Computing. Irena Bojanova, Ph.D. UMUC, NIST

Cloud Computing. Chapter 1 Introducing Cloud Computing

Cloud Based Architectures in Ground Systems of Space Missions

How cloud computing can transform your business landscape

Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab

HP S POINT OF VIEW TO CLOUD

Cloud Computing Technology

Cloud Computing: Contracting and Compliance Issues for In-House Counsel

Cloud Computing. Course: Designing and Implementing Service Oriented Business Processes

Cloud Computing. Chapter 1 Introducing Cloud Computing

CLOUD COMPUTING GUIDELINES FOR LAWYERS

MarketsandMarkets. Publisher Sample

Hybrid Cloud Identity and Access Management Challenges

Cloud Computing in the Enterprise: A Question of Control.. And who has it. INF5210 Ben Eaton 12/11/2013

A Secure System Development Framework for SaaS Applications in Cloud Computing

Cloud Computing Submitted By : Fahim Ilyas ( ) Submitted To : Martin Johnson Submitted On: 31 st May, 2009

Storage Clouds. Enterprise Architecture and the Cloud. Author and Presenter: Marty Stogsdill, Oracle

Finding the right cloud solutions for your organization

CSO Cloud Computing Study. January 2012

What Cloud computing means in real life

A Study on Analysis and Implementation of a Cloud Computing Framework for Multimedia Convergence Services

Architecting the Cloud

Seeing Though the Clouds

Cloud Computing. What is Cloud Computing?

Managing your Information Assets in the Cloud

Private & Hybrid Cloud: Risk, Security and Audit. Scott Lowry, Hassan Javed VMware, Inc. March 2012

Private Cloud 201 How to Build a Private Cloud

Cloud Computing. Bringing the Cloud into Focus

Security & Trust in the Cloud

Cloud Computing in Higher Education: A Guide to Evaluation and Adoption

Kent State University s Cloud Strategy

Leveraging the Private Cloud for Competitive Advantage

CLOUD COMPUTING ARCHITECTURE FOR HIGHER EDUCATION IN THE THIRD WORLD COUNTRIES (REPUBLIC OF THE SUDAN AS MODEL)

Software Systems Architecture in a World of Cloud Computing. Christine Miyachi SDM Entering Class 2000

Figure 1 Cloud Computing. 1.What is Cloud: Clouds are of specific commercial interest not just on the acquiring tendency to outsource IT

Business Intelligence (BI) Cloud. Prepared By: Pavan Inabathini

Hybrid Cloud Computing

Cloud Computing. Karan Saxena * & Kritika Agarwal**

BUSINESS MANAGEMENT SUPPORT

OVERVIEW Cloud Deployment Services

Future of Cloud Computing in India

CLOUD COMPUTING DEMYSTIFIED

Trends in Business Intelligence

INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS

Transcription:

Privacy and security in the cloud Challenges and solutions for our future information society Panel Building trust the technical challenges World Summit on the Information Society Forum 25-29 May 2015 ITU, UNESCO, UNDP and UNCTAD Thomas Länger thomas.laenger@unil.ch Swiss Cybersecurity Advisory & Research Group Université de Lausanne 28 May 2015 15:00-16:30 Thomas Länger (Université de Lausanne) Privacy and security in the cloud 28 May 2015 15:00-16:30 1 / 17

Talk outline Cloud computing is currently a big thing in ICT it is a huge interdisciplinary arena with many stakeholders. Following the ITU workshop aims, I will address: cloud computing as a phenomenon and its environment its relation to the information infrastructure identification of stakeholders its future between technical evolution and regulation current situation in clouds standardisation These issues are currently addressed in H2020 project PrismaCloud, which has just started in Feb. 2015 Thomas Länger (Université de Lausanne) Privacy and security in the cloud 28 May 2015 15:00-16:30 2 / 17

Definition of cloud computing There are no unique features or great novelties in cloud computing. It is a collective term for, in the broadest sense, modern internet information systems. Widely accepted definition by the NIST (Special Publication SP800-145, 7 pages; emph. by me): Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. This cloud model is composed of five essential characteristics, three service models, and four deployment models. Thomas Länger (Université de Lausanne) Privacy and security in the cloud 28 May 2015 15:00-16:30 3 / 17

This cloud model is composed of... five essential characteristics: On-demand self-service, Broad network access Resource pooling, Rapid elasticity, Measured service three service models: Software as a Service (SaaS) Platform as a Service (PaaS) Infrastructure as a Service (IaaS) four deployment models: Private cloud, Community cloud Public cloud, Hybrid cloud (all SP800-145) Thomas Länger (Université de Lausanne) Privacy and security in the cloud 28 May 2015 15:00-16:30 4 / 17

Cloud computing and information infrastructure One could argue whether the term cloud computing refers more to a new paradigm, or a clever marketing strategy? Cloud computing is possible and common, because of high level of computer availability facilitating ubiquity available wireless communication infrastructures with high bandwidth, especially also upstream Applications on top of advanced information infrastructures are often referred to as being cloud computing Cloud computing is currently a huge market (magnitude 3-digit billion USD), with influential market participants and stakeholders Thomas Länger (Université de Lausanne) Privacy and security in the cloud 28 May 2015 15:00-16:30 5 / 17

Cloud market: A few figures Management consulter Accenture sees 46% of the IT spending for cloud-related platforms and applications by 2016 A Cloud Computing Forecast Summary for 2013-2017 from IDC, Gartner and KPMG; online: www. prweb. com/ releases/ 2013/ 11/ prweb11341594. htm, citing a study by Accenture (2013) The cloud computing market is by 2015 estimated to be in the region of USD 150 billion, and will probably grow by the year 2018 to around USD 200 billion Transparency Market Research: Cloud Computing Services Market - Global Industry Size, Share, Trends, Analysis And Forecasts 2012-2018, online: www. transparencymarketresearch. com/ cloud-computing-services-market. html Amazon Web Services is a $5 billion business and still growing fast Amazon quaterly earnings report Q1/2015 phx. corporate-ir. net/ phoenix. zhtml? c= 97664& p= irol-newsarticle& ID= 20395989 Thomas Länger (Université de Lausanne) Privacy and security in the cloud 28 May 2015 15:00-16:30 6 / 17

Stakeholder groups with different interests Thomas Länger (Université de Lausanne) Privacy and security in the cloud 28 May 2015 15:00-16:30 7 / 17

1: Cloud users Individuals - Administrations - Companies individuals use cloud storage with smart phones and the huge computing clouds of social and comm. networks administrations use cloud-based e-government services businesses outsource their processing and services We/They want to profit from convenience of ubiquitous cloud access get rid of backups and hardware management, consume a self-service which is: rapid, on-demand, elastic, pay-per-use they want privacy, integrity they had before the cloud Thomas Länger (Université de Lausanne) Privacy and security in the cloud 28 May 2015 15:00-16:30 8 / 17

2. Corporations Cloud service providers want to offer and sell cloud services: Google-Android-YouTube: (bought 181 companies 2001-2015) Facebook (bought 53 companies 2005-2015) Microsoft-Azure-Skype, Amazon AWS etc. etc. Some of them also want to get a grip on the data or at least on the meta-data. Most public clouds reserve themselves access to who communicates with whom, and when, and where from (all these are metadata); establish detailed profiles of millions of individuals and dragnet or mine them for valuable information, identify potential targets for marketing Thomas Länger (Université de Lausanne) Privacy and security in the cloud 28 May 2015 15:00-16:30 9 / 17

3: Regulation For sensitive data, like data in critical infrastructures, or private personal data (e.g. health data), European legislation does not only reserve ultimate control of the data to its owner (which is in the case of the health case the patient), but also requires data confidentiality for extended periods of time (like 80 years into the future). On the other hands, companies move data between jurisdictions and such prevent the enforcement of legal rights. Big corporations use loop-holes in legal systems and influence policy processes by extensive lobbying. Thomas Länger (Université de Lausanne) Privacy and security in the cloud 28 May 2015 15:00-16:30 10 / 17

More pending risks in cloud computing As the cloud metaphor already indicates, you put your data into a cloud you can t see it any longer. But that s just what you wanted to do: Give it to somebody else who should take care of it. This may be practical (see all the advantages), but leads to a series of information risks: Policy and organisational risks lack of control lack of information on processing loss of governance (data moved to another legislation) vendor lock in Technical risks isolation failure diverse data protection risks data loss abuse, malicious outsider and insider etc. Thomas Länger (Université de Lausanne) Privacy and security in the cloud 28 May 2015 15:00-16:30 11 / 17

Diagnosis Confidentiality of user data is one of the most crucial problems in current cloud offerings. Confidentiality is often only guaranteed on a contractual basis between cloud customer and the service provider. The customer of the cloud has insufficient means in hands, to cryptographically protect the data, whereas the cloud provider cannot plausibly deny that the entrusted data was modified or illegally copied. This is why individuals, companies and public administration hesitate to entrust valuable data to cloud services Thomas Länger (Université de Lausanne) Privacy and security in the cloud 28 May 2015 15:00-16:30 12 / 17

Horizon 2020 project: PrismaCloud approach A 3.5 year project with the goal to enable end-to-end security for cloud users, and to provide tools to protect their privacy with the best technical means by cryptography Advance cryptography to support dynamicity and agility of cloud computing Provide means to protect the results of computations Protect privacy of users Protect data at rest Infrastructure attestation Make cryptography available, usable and economically relevant for clouds Evaluate its capabilities in real-life scenarios Put a focus on usability, policy, and standardisation Thomas Länger (Université de Lausanne) Privacy and security in the cloud 28 May 2015 15:00-16:30 13 / 17

Standardisation in cloud computing The standardisation landscape of cloud computing reflects the fast-growing, gold-rush style market, with a lagging behind technical capability and an uneven regulation: Probably more than 20 standards organisations and consortia are active in the field (see e.g. http://cloud-standards.org) Probably hundreds of publications are available, among them standards for portability, interoperability, security, accessibility and performance The European Commission s Cloud Computing Strategy identifies as Key Action 1 Cutting through the Jungle of Standards (European Commission: European cloud computing strategy Unleashing the potential of cloud computing in Europe (2012), ec.europa.eu/digital-agenda/en/european-cloud-computing-strategy) Thomas Länger (Université de Lausanne) Privacy and security in the cloud 28 May 2015 15:00-16:30 14 / 17

H2020 Project PrismaCloud Call: H2020-ICT-2014-1 Acronym: PRISMACLOUD Type of Action: RIA Number: 644962 Partners: 16 Duration: 42 months Start Date: 2015-02-01 Estimated Project Cost: 8.5MAC Requested EU Contrib.: 8MAC Coordinator: Austrian Institute of Technology GmbH url: www.prismacloud.eu Thomas Länger (Université de Lausanne) Privacy and security in the cloud 28 May 2015 15:00-16:30 15 / 17

Thomas Länger (Université de Lausanne) Privacy and security in the cloud 28 May 2015 15:00-16:30 16 / 17

About: Thomas Länger Hello! I m post-doc researcher at the Swiss Cybersecurity Advisory & Research Group of the Institute of Information Systems, Faculty of Business and Economics, University of Lausanne. Currently active in H2020 Project PrismaCloud 1 Feb 2015 + 42 month; 16 Partners, Project cost approx. 8.5MAC Develop next-generation cryptographically secured services for the cloud. My tasks: cloud computing (cc) generic use cases; cc standardisation; impact analysis of cc. v03a (=presented version v03 + extended title page + slide 12: removed the not before modified + 1 minor correction) Thomas Länger (Université de Lausanne) Privacy and security in the cloud 28 May 2015 15:00-16:30 17 / 17