Associate Prof. Dr. Victor Onomza Waziri



Similar documents
Computing on Encrypted Data

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

CRYPTOGRAPHY IN NETWORK SECURITY

Lukasz Pater CMMS Administrator and Developer

NEW CRYPTOGRAPHIC CHALLENGES IN CLOUD COMPUTING ERA

CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives

A Fully Homomorphic Encryption Implementation on Cloud Computing

Secure Computation Martin Beck

Cryptography & Digital Signatures

Overview of CSS SSL. SSL Cryptography Overview CHAPTER

Cryptography and Network Security Chapter 9

Fully homomorphic encryption equating to cloud security: An approach

IMPROVED SECURITY MEASURES FOR DATA IN KEY EXCHANGES IN CLOUD ENVIRONMENT

Forward Secrecy: How to Secure SSL from Attacks by Government Agencies

Secure cloud access system using JAR ABSTRACT:

Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University

AN IMPLEMENTATION OF HYBRID ENCRYPTION-DECRYPTION (RSA WITH AES AND SHA256) FOR USE IN DATA EXCHANGE BETWEEN CLIENT APPLICATIONS AND WEB SERVICES

Overview. SSL Cryptography Overview CHAPTER 1

Chapter 7: Network security

Software Tool for Implementing RSA Algorithm

CS 758: Cryptography / Network Security

Information Security

Savitribai Phule Pune University

Notes on Network Security Prof. Hemant K. Soni

An Efficient Data Security in Cloud Computing Using the RSA Encryption Process Algorithm

E-Democracy and e-voting

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

Mathematical Model Based Total Security System with Qualitative and Quantitative Data of Human

Cloud security architecture

Lecture slides by Lawrie Brown for Cryptography and Network Security, 5/e, by William Stallings, Chapter 14 Key Management and Distribution.

A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA

Overview of Public-Key Cryptography

VICTORIA UNIVERSITY OF WELLINGTON Te Whare Wānanga o te Ūpoko o te Ika a Māui

A Secure Decentralized Access Control Scheme for Data stored in Clouds

Soran University Faculty of Science and Engineering Computer Science Department Information Security Module Specification

Client Server Registration Protocol

Big Data - Security and Privacy

7! Cryptographic Techniques! A Brief Introduction

preliminary experiment conducted on Amazon EC2 instance further demonstrates the fast performance of the design.

Chapter 23. Database Security. Security Issues. Database Security

Module 7 Security CS655! 7-1!

MANAGING OF AUTHENTICATING PASSWORD BY MEANS OF NUMEROUS SERVERS

What is network security?

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Computer Networks. Network Security 1. Professor Richard Harris School of Engineering and Advanced Technology

SECURITY IN NETWORKS

Chapter 10. Network Security

An Efficient data storage security algorithm using RSA Algorithm

CS 348: Computer Networks. - Security; 30 th - 31 st Oct Instructor: Sridhar Iyer IIT Bombay

Privacy Patterns in Public Clouds

Network Security Technology Network Management

HYBRID ENCRYPTION FOR CLOUD DATABASE SECURITY

NIST Big Data Public Working Group

Network Security. HIT Shimrit Tzur-David

A Survey on Security Issues and Security Schemes for Cloud and Multi-Cloud Computing

Public Key (asymmetric) Cryptography

CPSC 467b: Cryptography and Computer Security

Secure Collaborative Privacy In Cloud Data With Advanced Symmetric Key Block Algorithm

Providing Data Protection as a Service in Cloud Computing

Lecture 9 - Network Security TDTS (ht1)

The Mathematics of the RSA Public-Key Cryptosystem

Chapter 23. Database Security. Security Issues. Database Security

Homomorphic Encryption Method Applied to Cloud Computing

Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu

Cryptography and Network Security

CSCE 465 Computer & Network Security

MODIFIED RSA ENCRYPTION ALGORITHM IS USED IN CLOUD COMPUTING FOR DATA SECURITY

Final Exam. IT 4823 Information Security Administration. Rescheduling Final Exams. Kerberos. Idea. Ticket

Application Security: Threats and Architecture

Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ MEng. Nguyễn CaoĐạt

Security Sensor Network. Biswajit panja

Sync Security and Privacy Brief

SFWR ENG 4C03 - Computer Networks & Computer Security

NSF Workshop on Big Data Security and Privacy

Lecture 9 - Message Authentication Codes

Arnab Roy Fujitsu Laboratories of America and CSA Big Data WG

IoT Security Platform

Data Grid Privacy and Secure Storage Service in Cloud Computing

CS 356 Lecture 28 Internet Authentication. Spring 2013

Network Security. Gaurav Naik Gus Anderson. College of Engineering. Drexel University, Philadelphia, PA. Drexel University. College of Engineering

SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD

Privacy, Security and Cloud

Top Ten Security and Privacy Challenges for Big Data and Smartgrids. Arnab Roy Fujitsu Laboratories of America

Computer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University

How To Use Pretty Good Privacy (Pgp) For A Secure Communication

Data Refinery with Big Data Aspects

Securing Cloud Infrastructure for High Performance Scientific Computations Using Cryptographic Techniques

Efficient Framework for Deploying Information in Cloud Virtual Datacenters with Cryptography Algorithms

VoteID 2011 Internet Voting System with Cast as Intended Verification

A Security Integrated Data Storage Model for Cloud Environment

K-NN CLASSIFICATION OVER SECURE ENCRYPTED RELATIONAL DATA IN OUTSOURCED ENVIRONMENT

A Secure RFID Ticket System For Public Transport

Using etoken for SSL Web Authentication. SSL V3.0 Overview

Transcription:

BIG DATA ANALYTICS AND DATA SECURITY IN THE CLOUD VIA FULLY HOMOMORPHIC ENCRYPTION Associate Prof. Dr. Victor Onomza Waziri Department of Cyber Security Science, School of ICT, Federal University of Technology, Minna Niger State, Nigeria

Presentation Outline 1. Introduction 2. Some Generic Big Data Definitions 3. Features of Big Data Analytics 4. Issues of Big Data in the Computing Cloud Environment: Confidentiality and Privacy 5. Cryptographic Encryption 6. Challenges Posed by Cloud Computing 7. HOMOMORHIC ENCRYPTION 8. Open Problems with FHE 9. A Road Map 10.FHE and Cloud Computing 11.Summary/ Conclusion

Introduction 1. Problems of Secure Computational Services in the Cloud. 2. Cloud Computing without decrypting to meet issue of Privacy, Confidentiality and Integrity 3. Achievable through Fully Homomorphic Encryption Scheme as developed by C. Gentry (2009) 4. The Presentation is based on high level of theoretic computation based on Ideal circuit that can easily be leveraged in the cloud 5. This Contribution of FHE implementation enhances Big Data Analytics based on Cryptographic Constructs

Some Generic Big Data Definitions Data are collected and analyzed to find patterns and associations (correlations) that may not be that initially found or observed. These observed patterns and correlations can help in decision making to wellorganized business enterprises, and or Government institutions or agencies. This process is called the big data analytics. Big data Analytics is a phrase used to describe the collection of large and complex data sets that are difficult to process using on-hand or current traditional computational Methods Database management tools or traditional data processing applications cannot meet the yearnings of today s analytical aspirations.

Features of Big Data Analytics Big Data is characterized with seven (Vs) dimensions but we discuss four. These include; volume, velocity, variety,veracity, Validity, Value and volatility: Volume: The term Volume explains that data Volume typically ranges from multiple terabytes to zetabytes monthly. This certainly fits the enterprise security model as it is not uncommon for large organizations to collect tens of terabytes of security data on monthly basis Velocity: This term is defined with respect to real-time data analyst requirements. In cybersecurity, velocity can refer to the need for immediate anomaly, or rapid incident response in real-time. Real-time data analysis is critical here to minimize damages associated with cybersecurity attack. Variety: This term explains big data to be made up of multiple data type requirements and feeds that include structured and unstructured data. From a security consideration, data variety could include big files, network flows, IP packets capture external threat/internal threat/vulnerability, intelligence; click streams, network/physical access, and social networking activity, etc. It is therefore not unusual for enterprises to collect hundreds of different types of data for security analysis using various algorithmic models Veracity: The term simply means that big data must be trustworthy and accurate. From the security insight or perspective, this means that trusting the confidentiality and availability of data sources like log files and external feeds.

Confidentiality and Privacy Issues of Big Data in the Computing Cloud Environment This presentation examines the intricate problems of storing Big Data in the Computing Cloud Environment; these have direct security impact on information Technology (IT). These include the following features: 1. Trust and privacy mechanisms; 2. Computing of Encrypted Data in the Computing Cloud environment; and 3. Sustenance of Confidentiality of Information Dataset in the cloud This presentation provides a framework on how security and privacy issues can be achieved through Bootstrapping and Fully Homomorphic Encryption Scheme

The amount of data generated, stored and exponentially year by year, and the related growth is the vulnerability of data; hence the demand of Cryptography has emerged as the most effective At present, cryptographic primitives have provided both the data owners and users efficient means to ensure security of their data and algorithms in terms of confidentiality, integrity, authentication, Cryptographic Encryption Communicated electronically is growing making it secure. data protection solution in Cyber Security application. validation, and verification.

New Challenges Posed by Cloud Computing The emergence of cloud computing where critical customer and enterprise data could be held by third party cloud providers in a public and/or shared (multitenant) computing and storage environments highlights the need to use encryption as a primary security control. Security threats and application of encryption mechanisms are discussed in the context of data at rest, data in transit, and data in use. While the security of data in transit benefits from matured encryption tools such as SSL, protecting data at rest while ensuring its availability presents additional and ongoing challenges.

Encryption of a database should not adversely affect the ability of applications to use this data. Hence, in a cloud computing scenario, encryption solutions must be architectured to achieve the goals of both data protection (confidentiality and integrity) as well as availability of the data, the service, and the capability to collaborate and share data easily. Neither symmetric nor asymmetric encryption methods completely suffice the needs of cloud computing environment. Here, homomorphic encryption comes into picture.

HOMOMORHIC ENCRYPTION By Definition, this is a form of encryption that allows some types of computational Functions to carry out a computational process which generates an encrypted result that when decrypted, matches the result of operations that is performed on the plaintext: Homomorphism is desirable in modern communication systems architectures. It allows the chaining together of different data services without exposing the dataset to each of the services.

Homomorphic Encryption The aim of homomorphic cryptography is to ensure privacy of data in communication, storage or in use by processes with mechanisms similar to conventional cryptography, but with added capabilities of computing over encrypted data, searching an encrypted data, etc. Homomorphism is a property by which a problem in one algebraic system can be converted to a problem in another algebraic system, be solved and the solution later can also be translated back effectively. Thus, homomorphism makes secure delegation of computation to a third party possible. Many conventional encryption schemes possess either multiplicative or additive homomorphic property and are currently in use for respective applications. Yet, a fully homomorphic encryption scheme which could perform any arbitrary computation over encrypted data appeared in 2009 as Gentry s work

Open Problems with FHE Though Gentry s blueprint provides a solution, what remains is developing the basic scheme to have more feasible ones. The major drawback of the schemes based on Gentry s blueprint has been large public key size, many keys, growth of ciphertext per computation in a circuit and accumulation of noise. While a major application of FHE is delegation of computation due to lack of resources at the user-end, majority of schemes are computationally intensive making it practically of no use for such users. Another open problem is of reducing key sizes to a manageable level since the procedure requires at least three keys (encryption, re-encryption or evaluation, decryption). The approach should focus on devising application-specific homomorphisms, like a light weight scheme, a fast scheme, a semantically secure scheme, a multiparty scheme and so on. The schemes which are currently in use for applications like e- voting, enquiries, etc are not fully homomorphic.

Open Problems with FHE They are either SHE (Somewhat Homomorphic encryption) or are homomorphic over a limited number of circuits/operations, hence limited to a few number of applications, cannot be extended or generalized for complete category of applications. Mostly all schemes proposed so far are based on public-key cryptography. It has obvious advantage of being based on hardness problems like Large Integer Factorization, Diffie- Hellman problems or Approximate GCD problem. But there are applications which inherently would require symmetric keys, or perhaps no use of a public key at all (viz a user storing his private data on cloud only for personal purposes would need only a secret key). Further there are applications oriented towards involvement of more than one party, such as multiparty computation. Majority of the proposed schemes have not explored this area.

Open Problems with FHE Given the large amount of data and huge costs of encrypting and decrypting them (also the large number of keys to be distributed due to multiple stakeholders) gave way to hybrid clouds and data classification. Hybrid clouds allow combining private enterprise clouds with on-premise data (perceived security is high) to collaborate with public clouds involving third party storage providers (not so secure). Data classification involves different levels of security depending on criticality of data. Moreover, many data centric applications involve multiple users and can benefit only if the encryption process can involve the hierarchy of data classification. A possible solution to be explored is incremental encryption with homomorphic properties.

Rivest, Shamir, and Adleman Cryptosystem In 1978, Rivest, Shamir, and Adleman published their publickey cryptosystem, which only uses elementary ideas from number theory. It is one of the first homomorphic cryptosystems. It is the most widely used public-key cryptosystem in banking and in other functional public institutions. It may be used to provide both secrecy and digital signatures and its security is based on the intractability of the integer factorization problem. The RSA scheme has a multiplicative homomorphic property. This means it is possible to perform multiplications with the encryptions of messages without losing or tampering with their underlying information. This is possible since the operation "multiplication" in the ciphertext space (Z n, ) can be compared with the operation "multiplication" in the plaintext space (Z n, ).

Problem

A Road Map

FHE and Cloud Computing Scope and promises of homomorphic cryptography in cloud computing environments cannot be ignored. Researchers all over the world are taking great interest in recent years to develop homomorphisms that can be deployed practically. Much of the focus is on imparting homomorphic capabilities to public key cryptosystems, while some applications can as well be handled with a symmetric key scheme. Hence, our efforts have been to propose ideas as to how symmetric keys and simple matrix-based operations could also lead to feasible schemes for cloud computing, specifically for delegation of computation and private data processing in clouds. communication costs involved in cloud computing are often large, to make up for this I emphasize on having low time complexity for cryptographic primitives. The evaluation functions are efficient and simple making it easy to carry out any arbitrary computation on data. We also suggest how to use symmetric encryption with multiple users, which is clearly key efficient as compared to the popular asymmetric approaches for multiple user applications.

FHE and Cloud Computing The scheme can be further optimized in matrix multiplication aspect. Decryption need not carry out complete multiplication of three matrices, rather the aim is to derive only the first element of the product matrix. The scheme can be modified to operate on polynomials instead of working with matrices Application to Private information retrieval, searching index of an encrypted database and e-voting can be useful enough. Designing protocols for the same could be a further contribution. The proposed scheme does not have any scope for targeted malleability or verifiability yet. Improvement in the scheme or introduction of some new primitives for verifiable computation can be appreciable effort.

FHE and the Cloud Computing Fully Homomorphic Encryption combines security with usability. It can help preserve customer privacy while outsourcing various kinds of computation to the cloud, besides storage. Some concrete and valuable applications of FHE numerous. They all considered situations where data streams from multiple sources, is uploaded in encrypted form to the cloud, and processed by the cloud to provide valuable services to the content owner. There are two aspects of the computation considered: the data itself (confidentiality), and the function to be computed on this data (circuit privacy). Depending on whether one or both of these are confidential and hence not to be disclosed to the cloud, proposes three broad kinds of applications:

FHE and the Cloud Computing 1. Medical applications: private data, public functions 2. Financial Applications: private data, private functions 3. Advertising and Pricing: Only results are public

FHE and the Cloud Computing Application of FHE to database querying have been studied systematically. It identifies what fully homomorphic encryption can do and what it cannot do well for supporting general database queries at a conceptual level. The study shows that using a fully homomorphic encryption scheme that supports addition, multiplication, AND and XOR on ciphertexts, it is possible to process a complex selection, range, join or aggregation query on encrypted data on the server side, and to return the encrypted matching answers in a result buffer. For queries without fixed answer sizes, it is however, not guaranteed all matching answers will be correctly constructed from the result buffer, instead the answers can be onstructed from the result buffer with overwhelming probability.

Summary/ Conclusion

THANKS FOR THE OPPORTUNITY Thank You All!!