Privacy-Preserving Distributed Encrypted Data Storage and Retrieval



Similar documents
Analysis One Code Desc. Transaction Amount. Fiscal Period

SWIFT. Page:1. Openstack Swift. Object Store Cloud built from the grounds up. David Hadas Swift ATC. HRL 2012 IBM Corporation

AT&T Global Network Client for Windows Product Support Matrix January 29, 2015

COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) CHARTERED BANK ADMINISTERED INTEREST RATES - PRIME BUSINESS*

COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) CHARTERED BANK ADMINISTERED INTEREST RATES - PRIME BUSINESS*

Case 2:08-cv ABC-E Document 1-4 Filed 04/15/2008 Page 1 of 138. Exhibit 8

CENTERPOINT ENERGY TEXARKANA SERVICE AREA GAS SUPPLY RATE (GSR) JULY Small Commercial Service (SCS-1) GSR

Enhancing Data Security in Cloud Storage Auditing With Key Abstraction

Enhanced Vessel Traffic Management System Booking Slots Available and Vessels Booked per Day From 12-JAN-2016 To 30-JUN-2017

Top Ten Security and Privacy Challenges for Big Data and Smartgrids. Arnab Roy Fujitsu Laboratories of America

Arnab Roy Fujitsu Laboratories of America and CSA Big Data WG

Alexandria Overview. Sept 4, 2015

Technical Overview Simple, Scalable, Object Storage Software

OpenStack Introduction. November 4, 2015

Learning Management Redefined. Acadox Infrastructure & Architecture

Keywords: - Ring Signature, Homomorphic Authenticable Ring Signature (HARS), Privacy Preserving, Public Auditing, Cloud Computing.

Development of enhanced Third party Auditing Scheme for Secure Cloud Storage

Arnab Roy Fujitsu Laboratories of America and CSA Big Data WG

Secure Data Sharing in Cloud Computing using Hybrid cloud

DATA SECURITY IN CLOUD USING ADVANCED SECURE DE-DUPLICATION

On the features and challenges of security and privacy in distributed internet of things. C. Anurag Varma CpE /24/2016

SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD

Privacy-Preserving Public Auditing for Secure Cloud Storage

ThreatMetrix Persona DB Technical Brief

SECURE AND TRUSTY STORAGE SERVICES IN CLOUD COMPUTING

Secure cloud access system using JAR ABSTRACT:

365 Cloud Storage. Security Brief

SECURE AND EFFICIENT PRIVACY-PRESERVING PUBLIC AUDITING SCHEME FOR CLOUD STORAGE

Data Integrity Check using Hash Functions in Cloud environment

Secure information storage

Scalable and secure sharing of data in cloud computing using attribute based encryption

PRIVACY-PRESERVING PUBLIC AUDITING FOR SECURE CLOUD STORAGE

A Review of Cloud Environment and Recognition of Highly Secure Public Data Verification Architecture using Secure Public Verifier Auditor

Cloud Data Storage Services Considering Public Audit for Security

Balamaruthu Mani. Supervisor: Professor Barak A. Pearlmutter

preliminary experiment conducted on Amazon EC2 instance further demonstrates the fast performance of the design.

Authorize.net modules for oscommerce Online Merchant.

Introduction to OpenStack Swift CloudOpen Japan 2014

Cloud Data Service for Issues in Scalable Data Integration Using Multi Authority Attribute Based Encryption

SECURITY STORAGE MODEL OF DATA IN CLOUD Sonia Arora 1 Pawan Luthra 2 1,2 Department of Computer Science & Engineering, SBSSTC

SGFS: Secure, Flexible, and Policy-based Global File Sharing

Software and Cloud Security

Choosing a Cell Phone Plan-Verizon

Secure web transactions system

MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY

Keywords-- Cloud computing, Encryption, Data integrity, Third Party Auditor (TPA), RC5 Algorithm, privacypreserving,

Ashley Institute of Training Schedule of VET Tuition Fees 2015

Secure Messaging Challenge Technical Demonstration

Aspera Direct-to-Cloud Storage WHITE PAPER

Data Integrity for Secure Dynamic Cloud Storage System Using TPA

A Middleware Strategy to Survive Compute Peak Loads in Cloud

Role Based Encryption with Efficient Access Control in Cloud Storage

Neuroworks / Sleepworks Microsoft Windows Update Guide

Authentication. Authorization. Access Control. Cloud Security Concerns. Trust. Data Integrity. Unsecure Communication

Breen Elementary School

Iron Chef: Bare Metal OpenStack

CernVM Online and Cloud Gateway a uniform interface for CernVM contextualization and deployment

Archiving On-Premise and in the Cloud. March 2015

EMC Software Release and Service Dates for NetWorker and NetWorker Modules Last Updated on August 16, 2012

Cloud Storage and Backup

Microsoft SQL Server Security and Auditing Clay Risenhoover ISACA North Texas April 14,

A Road Map on Security Deliverables for Mobile Cloud Application

Overview of CSS SSL. SSL Cryptography Overview CHAPTER

Storage Made Easy Enterprise File Share and Sync (EFSS) Cloud Control Gateway Architecture

Polish National Data Storage. Norbert Meyer, Maciej Brzeźniak, Maciej Stroiński PSNC

How To Secure Cloud Computing, Public Auditing, Security, And Access Control In A Cloud Storage System

SubmitedBy: Name Reg No Address. Mirza Kashif Abrar T079 kasmir07 (at) student.hh.se

Privacy Preservation and Secure Data Sharing in Cloud Storage

Consumer ID Theft Total Costs

Big Data Use Case. How Rackspace is using Private Cloud for Big Data. Bryan Thompson. May 8th, 2013

Secure Privacy Preserving Public Auditing for Cloud storage

IMPLEMENTATION OF RESPONSIBLE DATA STORAGE IN CONSISTENT CLOUD ENVIRONMENT

Global Soft Solutions JAVA IEEE PROJECT TITLES

Cloud-based Identity and Access Control for Diagnostic Imaging Systems

National Certification Authority Framework in Sri Lanka

APWG. (n.d.). Unifying the global response to cybecrime. Retrieved from

Secure Cloud Transactions by Performance, Accuracy, and Precision

An Implementation of RSA Algorithm in Google Cloud using Cloud SQL

WP4: Cloud Hosting Chapter Object Storage Generic Enabler

A Comprehensive Data Forwarding Technique under Cloud with Dynamic Notification

SECURITY ARCHITECTURE FOR MOBILE CLOUD COMPUTING

SYMMETRIC CRYPTOGRAPHIC KEY MANAGEMENT IN CLOUD PARADIGM

Transcription:

Privacy-Preserving Distributed Encrypted Data Storage and Retrieval Sibi Antony Master Thesis Starting Talk WS12/13 1

Overview Motivation Thesis Goals Methodology Initial Analysis Time Table 2

Motivation Increasing adoption of cloud services Privacy in the data center [ eg : Uniscon ] Storage User db Proxy/Auth Computation Cloud Service 3

Motivation Confidentiality, integrity of data Efficiency and scalability of a cloud system Storage User db Proxy/Auth Computation Cloud Service 4

Thesis Goals 1 Privacy preserving authentication services and user databases Cryptographically securing ACL hierarchy Fully shadowed user data 2 Privacy preserving storage for a distributed system Distributed key generation, encryption and storage 5

By the end of Thesis.. Attempts to answer these questions Key management : Where to store the keys for encryption? Where to perform the encryption operations? Storage Are the user/group, multi-tier information freely accessible? Proof of Storage : Can the user verify the integrity of data? User db Proxy/Auth Computation Are the servers/racks safe from access from an unintended hand? How would it impact the performance and scalability of the system? Cloud Service How to apply my findings on another distributed system? 6

Methodology Study of the Distributed system Understand the security requirements Related work, Compare state-of-the-art Develop prototypes for best-fitting solutions Evaluation in terms of performance and level of security 7

Study: OpenStack storage architecture API Proxy Consistent Hashing Rings Account Object Container Zone1 Zone2 Zone3 n Replicas Storage node storage 1 storage 1 storage 1 Storage servers storage 2 storage 2 storage 2 Consistency servers storage 3 storage 3 storage 3 drive/disk/server storage 4 storage 4 storage 4 8

Initial Analysis : Encryption approaches Proxy-side single point encryption Encryption with a central DB for cryptographic ACL hierarchy Fully distributed encryption Distributed object server encryption Fully Distributed computation Distributed encryption on file chunks Distributed key generation using secure MPC 9

Initial analysis and tests Centralized and Distributed encryption Cost of encryption high in terms of time/performance 10

Time Table A break-up of time alloted for the Thesis work Nov Dec Jan Feb Mar Apr Initial analysis, Design 15th 31st Implementation 1st 15th Tests, Evaluation, Doc 15th Report 15th 11

Thank you! Questions, Discussion. 12

For Your General Interest Www.privacyblog.de Www.idgard.de 13