Secret Sharing and Reliable Cloud Computing



Similar documents
Using Adversary Structures to Analyze Network Models,

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

CPSC 467b: Cryptography and Computer Security

Capture Resilient ElGamal Signature Protocols

Mitigating Server Breaches with Secure Computation. Yehuda Lindell Bar-Ilan University and Dyadic Security

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

cipher: the algorithm or function used for encryption and decryption

EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY

preliminary experiment conducted on Amazon EC2 instance further demonstrates the fast performance of the design.

Paillier Threshold Encryption Toolbox

MANAGING OF AUTHENTICATING PASSWORD BY MEANS OF NUMEROUS SERVERS

CRYPTOGRAPHY IN NETWORK SECURITY

Associate Prof. Dr. Victor Onomza Waziri

Why Johnny Can t Encrypt: A Usability Evaluation of PGP 5.0

Cryptography & Network Security. Introduction. Chester Rebeiro IIT Madras

Sharing Of Multi Owner Data in Dynamic Groups Securely In Cloud Environment

White Paper: Librestream Security Overview

The Feasibility and Application of using a Zero-knowledge Protocol Authentication Systems

Efficient Framework for Deploying Information in Cloud Virtual Datacenters with Cryptography Algorithms

Information Security

Cloud Storage Security

Kroll Ontrack VMware Forum. Survey and Report

Thales e-security Key Isolation for Enterprises and Managed Service Providers

Leveraging Public Clouds to Ensure Data Availability

Cloud Data Storage Services Considering Public Audit for Security

IoT Security Platform

A Draft Framework for Designing Cryptographic Key Management Systems

The next generation of knowledge and expertise Wireless Security Basics

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Introduction to Security

SFWR ENG 4C03 - Computer Networks & Computer Security

Virtual Infrastructure Security

Protecting Your Data On The Network, Cloud And Virtual Servers

Verifiable Outsourced Computations Outsourcing Computations to Untrusted Servers

FACT SHEET: Ransomware and HIPAA

Chapter 9 Key Management 9.1 Distribution of Public Keys Public Announcement of Public Keys Publicly Available Directory

Computer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University

Review On Incremental Encrypted Backup For Cloud

Message Authentication Code

A Survey on Security Issues and Security Schemes for Cloud and Multi-Cloud Computing

Security of Cloud Storage: - Deduplication vs. Privacy

An Overview of Common Adversary Models

Secret Sharing based on XOR for Efficient Data Recovery in Cloud

Data Grid Privacy and Secure Storage Service in Cloud Computing

Building Secure Cloud Applications. On the Microsoft Windows Azure platform

Security Policy JUNE 1, SalesNOW. Security Policy v v

Arnab Roy Fujitsu Laboratories of America and CSA Big Data WG

Simple Storage Service (S3)

1.2 Using the GPG Gen key Command

Table of Contents. Introduction. Audience. At Course Completion

Content Teaching Academy at James Madison University

Why cloud backup? Top 10 reasons

DRAFT Standard Statement Encryption

Scientific Journal Impact Factor (SJIF): 1.711

A Secure Decentralized Access Control Scheme for Data stored in Clouds

Website Disaster Recovery

Two Factor Zero Knowledge Proof Authentication System

Strengthen RFID Tags Security Using New Data Structure

Lecture 6 - Cryptography

Data Storage Security in Cloud Computing for Ensuring Effective and Flexible Distributed System

Common security requirements Basic security tools. Example. Secret-key cryptography Public-key cryptography. Online shopping with Amazon

NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015

3/25/ /25/2014 Sensor Network Security (Simon S. Lam) 1

Properties of Secure Network Communication

E-Democracy and e-voting

Overview of Public-Key Cryptography

Newcastle University Information Security Procedures Version 3

Network Security CS 5490/6490 Fall 2015 Lecture Notes 8/26/2015

AN ENHANCED ATTRIBUTE BASED ENCRYPTION WITH MULTI PARTIES ACCESS IN CLOUD AREA

Service Overview CloudCare Online Backup

Securing Card-Not-Present Transactions through EMV Authentication. Matthew Carter and Brienne Douglas December 18, 2015

5 Critical Considerations for. Enterprise Cloud Backup

How To Encrypt Data With Encryption

U.S. Federal Information Processing Standard (FIPS) and Secure File Transfer

Chapter 7 Information System Security and Control

Webrecs IT infrastructure. The Webrecs IT backend explained and how we store, backup, protect and deliver your documents to you

PRIVACY PRESERVING PUBLIC AUDITING FOR SECURED DATA STORAGE IN CLOUD USING BLOCK AUTHENTICATION CODE

IMPROVED SECURITY MEASURES FOR DATA IN KEY EXCHANGES IN CLOUD ENVIRONMENT

CESG Certification of Cyber Security Training Courses

ELECTRONIC COMMERCE OBJECTIVE QUESTIONS

Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi

5054A: Designing a High Availability Messaging Solution Using Microsoft Exchange Server 2007

Verifying Correctness of Trusted data in Clouds

Cloud Backup And Disaster Recovery Meets Next-Generation Database Demands Public Cloud Can Lower Cost, Improve SLAs And Deliver On- Demand Scale

Transcription:

Secret Sharing and Reliable Cloud Computing Yvo Desmedt University College London, UK November, 2011 Yvo c Desmedt

OVERVIEW 1. Clouds: examples of deployment 2. Clouds: a security nightmare? 3. Secret sharing: a brief introduction 4. Threshold adversary: sometimes unrealistic 5. Secure multiparty computation: a quick survey 6. Other applications of secret sharing 7. Why is a standard needed? 8. Secret sharing: the way forward c Yvo Desmedt 1

1. CLOUDS: EXAMPLES OF DEPLOYMENT Examples are: Washington Post (April 17, 2011): The [US] government is also getting ready to move about 75 agency-identified programs to cloud or Web-based computing to comply with the new cloud-first policy.... Note: cloud-first policy was announced in November 2010, see Washington Post (November 22, 2010) At several universities worldwide student e-mails are in reality stored at cloud mail servers. Motivation: savings by making employees redundant. The new generation saves pictures on... and text documents on.... However, for the moment, they keep music stored locally. Yvo c Desmedt 2

The customer s impression is that there is no need to back up data. IT industry has failed to make backup user-friendly! c Yvo Desmedt 3

2. CLOUDS: A SECURITY NIGHTMARE? Recently a few newspapers/magazines have commented on the vulnerabilities of such cloud computing. For example, On February 2, IT Business (Canada) wrote: The countrywide Internet blackout Egypt is experiencing may resonate with a lot of Canadian small and medium sized businesses especially as more and more companies adopt cloud-based applications services. On Sunday 6 February 2011, the Guardian wrote: The speed with which Amazon and PayPal dropped WikiLeaks should be a wake-up call to anyone who thinks that Cloud Computing services can be trusted to protect the interests of their customers when the government cuts up rough. Yvo c Desmedt 4

On August 21, 2011 (as corrected on August 23) the New York Times in their article on Federal Push for Cloud Technology Faces Skepticism wrote: Several disruptions of online cloud systems made headlines this spring, including in April, when technical problems with Amazons cloud service disrupted an undisclosed number of private sector Web sites. Amazon, which manages several federal Web sites, including the Treasurys main site, introduced a cloud service last week specifically for government clients. On October 21, 2011, Computing wrote: The entire world, consumers and businesses, are moving most, if not all, their data, applications and services to the cloud... However, the recent outage that denied up to 70 million Yvo c Desmedt 5

BlackBerry users access to their email for four days earlier this month highlights the perils of trusting any hosted IT service models that rely so heavily on a distributed network to function. Besides above problem, we need to realize that there is no guarantee that companies involved in this storage will still exist in a few years. Indeed, DEC used to be the 2nd largest computer manufacturer in the world, but vanished after being bought by Compaq, which merged with HP. What are the potential problems: Privacy: your data is in hands of an untrusted party, Availability: above examples illustrate the problems, Authenticity: your data could be modified by an untrusted party. Yvo c Desmedt 6

3. SECRET SHARING: A QUICK INTRODUCTION Secret sharing is a technology existing for more than 30 years (1979: Blakley, Shamir). Shamir 2nd most cited paper. Still not widely implemented, except in RAIDs. Main concepts: Secret: the private document Parties: computers (or safety deposit box, or memory sticks,... ) each storing a: Share (or shares), satisfying properties explained further on. c Yvo Desmedt 7

When P is the set of parties, an access structure Γ P is a list of subsets of P such that each such subset is trusted. In a monotone access structure Γ P we have that if A Γ P and A B, then B Γ P. We call the complement of Γ P an adversary structure. Formally, the adversary structure is A P = 2 P \ Γ P. A secret sharing scheme satisfies two conditions: 1. Any trusted subset B of parties, i.e., B Γ P could recover the secret from their shares. 2. Any untrusted subset A of parties, i.e., A A P, can not find any information about the secret better than guessing (their shares are independent of the secret). c Yvo Desmedt 8

A popular access structure is a t + 1-out-of-n secret sharing scheme, in which P = n and any t + 1 parties in P can recover the secret, while any t cannot. Such schemes are called threshold schemes. Shamir s secret sharing scheme is a threshold scheme. Note: the Karnin-Greene-Hellman variant is optimal. c Yvo Desmedt 9

4. THRESHOLD ADVERSARY: SOMETIMES UNREALISTIC As pointed out by Burmester-Desmedt (Comm. ACM 2004), see also Desmedt-Wang-Burmester (ISAAC 2005) the threshold adversary model is unrealistic. Indeed, modern attacks can be replicated. This concept was generalized to critical infrastructures by Burmester-Desmedt-Wang (IASTED 2003). Some motivating examples: the Hengchun earthquake on Tuesday December 26, 2006 caused several underwater internet cables to fail in Asia, Fukushima nuclear disaster after the Friday, 11 March 2011 Tohoku earthquake: same design, at same location with same vulnerabilities: 4 failures. c Yvo Desmedt 10

Adversary structure proposed: each party s platform is indicated by a color. Formally, Definition 1. A k-color adversary structure over P consists of a tuple (P, C, f), where is C the set of colors, and f a map from P onto C and the adversary structure Z C,k = {Z Z P and f(z) k}. So, when a platform fails (or is attacked) all parties with the color corresponding to that platform are considered untrusted. It is easy to make a secret sharing scheme for color-based adversary structures. Indeed, give all parties that have the same color the same share (i.e., replicate these shares)! c Yvo Desmedt 11

. SECURE MULTIPARTY COMPUTATION: A BRIEF SURVEY Goal: Suppose we have parties in P = {P 1, P 2,..., P n } who have, respectively, as private input: x 1, x 2,..., x n and one would like to compute f(x 1, x 2,..., x n ) in such a way that nothing leaks more than what follows from the output. Today it uses secret sharing. The focus has been on the case the adversary is threshold based. Terminology (brief): Passive adversary: execute specified program, while that restriction is removed in case the adversary is active. Static adversary: subset of P remains static during protocol. Most protocols require synchrony. Note: fully homomorphic encryption seems best suited in the case c Yvo Desmedt 12

of a single file server. Moreover, it is extremely slow. c Yvo Desmedt 13

6. OTHER APPLICATIONS OF SECRET SHARING Secret sharing is also the key technology behind: Key escrow: NIST standard; did not take redundancy into account. Threshold cryptography: in threshold decryption, no single entity can decrypt. One needs a trusted subset of the parties. Note: this trusted subset does not recover the secret, only the plaintext. Threshold signatures are similar: one needs a trusted subset of the parties to be able to sign. Perfectly Secure Message Transmission: when a sender and a receiver do not share keys, they can still privately communicate over a point-to-point network, provided the number of nodes the adversary can control is limited and the network is connected c Yvo Desmedt 14

enough. Additionally, one can achieve protection against an adversary that tries to block the communication or attempts to modify the message. Some variants have been proposed. c Yvo Desmedt 15

7. WHY IS A STANDARD NEEDED? When a user wants to use several cloud servers, shares could be stored instead of documents. These cloud servers could be from different organizations. This last approach is essential to achieve longevity (see DEC s demise). Since the US Government is moving towards the cloud and since longevity is crucial, a standard addressing the privacy and reliability (longevity) of storage is obviously important. c Yvo Desmedt 16

8. SECRET SHARING: THE WAY FORWARD We just explained the motivation for a standard on secret sharing. What should be considered include: Optimality issues, Speed Access structure (threshold is a first logical choice). Longer term standards on: Perfectly Secure Message Transmission, threshold schemes for Threshold Cryptography, VSS (verifiable secret sharing), Secure Multiparty Computation, c Yvo Desmedt 17

should be a possibility, depending on the demand. It is best that the secret sharing scheme chosen allows for above applications. c Yvo Desmedt 18