WWRF Cloud Implications to Security, Privacy, and Trust



Similar documents
Cloud-Security: Show-Stopper or Enabling Technology?

Cloud Computing Security Considerations

How to ensure control and security when moving to SaaS/cloud applications

Security Issues in Cloud Computing

Data Storage Security, Cloud Computing and Virtualization

Auditing Cloud Computing. A Security and Privacy Guide. Wiley Corporate F&A

Cloud Security & Standardization. Markku Siltanen Tietoturvakonsultti CISA, CGEIT, CRISC

CLOUD STORAGE SECURITY INTRODUCTION. Gordon Arnold, IBM

CLOUD COMPUTING SECURITY

Trust areas: a security paradigm for the Future Internet

Security Framework for Cloud Computing Environment: A Review Ayesha Malik, Muhammad Mohsin Nazir

Cloud Security Introduction and Overview

Cloud Computing Governance & Security. Security Risks in the Cloud

Security Issues in Cloud Computing

External Supplier Control Requirements

Chapter 1: Introduction

Ensuring Cloud Security Using Cloud Control Matrix

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab

CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST618 Designing and Implementing Cloud Security CAST

ITU- T Focus Group Cloud Compu2ng

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist,

Cloud security architecture

EU Threat Landscape Threat Analysis in Research ENISA Workshop Brussels 24th February 2015

Tufts University. Department of Computer Science. COMP 116 Introduction to Computer Security Fall 2014 Final Project. Guocui Gao

Securing The Cloud. Foundational Best Practices For Securing Cloud Computing. Scott Clark. Insert presenter logo here on slide master

Data Protection: From PKI to Virtualization & Cloud

SECURITY CONCERNS AND SOLUTIONS FOR CLOUD COMPUTING

Cloud Infrastructure Security

A Review: Data Security Approach in Cloud computing by using RSA Algorithm

Is it Time to Trust the Cloud? Unpacking the Notorious Nine

How To Secure Cloud Computing

Cloud Security. Let s Open the Box. Abu Shohel Ahmed ahmed.shohel@ericsson.com NomadicLab, Ericsson Research

Current and Future Research into Network Security Prof. Madjid Merabti

VENDOR RISK MANAGEMENT UPDATE- ARE YOU AT RISK? Larry L. Llirán, CISA, CISM December 10, 2015 ISACA Puerto Rico Symposium

Big Data, Big Risk, Big Rewards. Hussein Syed

Virginia Government Finance Officers Association Spring Conference May 28, Cloud Security 101

Chapter 6: Fundamental Cloud Security

SECURITY PRACTICES FOR ADVANCED METERING INFRASTRUCTURE Elif Üstündağ Soykan, Seda Demirağ Ersöz , ICSG 2014

Cloud Computing Standards: Overview and ITU-T positioning

STORAGE SECURITY TUTORIAL With a focus on Cloud Storage. Gordon Arnold, IBM

CLOUD COMPUTING SECURITY ISSUES

WEB APPLICATION FIREWALLS: DO WE NEED THEM?

The Next Generation of Security Leaders

Management of Security Information and Events in Future Internet

Attacks from the Inside

CSA Virtualisation Working Group Best Practices for Mitigating Risks in Virtualized Environments

Open Data Center Alliance Usage: Provider Assurance Rev. 1.1

Trust and Reputation Management in Distributed Systems

SECURITY INFRASTRUCTURE Standards and implementation practices for protecting the privacy and security of shared genomic and clinical data

Kangas Cybersecurity strategy

D. L. Corbet & Assoc., LLC

Assessing Risks in the Cloud

SDN/NFV Position Paper

TNC is an open architecture for network access control. If you re not sure what NAC is, we ll cover that in a second. For now, the main point here is

Cloud Security Trust Cisco to Protect Your Data

Overview. What are operational policies? Development, adoption, implementation

Compliance in Clouds A cloud computing security perspective

How To Protect Your Cloud Computing Resources From Attack

A Secure System Development Framework for SaaS Applications in Cloud Computing

Opinion and recommendations on challenges raised by biometric developments

Security and Compliance in Clouds: Challenges and Solutions

Adopting Cloud Computing with a RISK Mitigation Strategy

Threat Modeling. Frank Piessens ) KATHOLIEKE UNIVERSITEIT LEUVEN

A Marketplace Broker for Platform-as-a-Service Portability

PRISMACLOUD. Privacy and Security Maintaining Services in the Cloud Thomas Loruenser AIT Austrian Institute of Technology GmbH

Security Management of Cloud-Native Applications. Presented By: Rohit Sharma MSc in Dependable Software Systems (DESEM)

A Secure Authenticate Framework for Cloud Computing Environment

Requirements Engineering for SaaS Application Security in Cloud Using SQUARE Methodology

Security Challenges in the Cloud

Expert Group on Cloud Computing Services and Standards ( EGCCSS ) Formation of Working Groups

Certified Secure Computer User

Public Cloud Security: Surviving in a Hostile Multitenant Environment

Arnab Roy Fujitsu Laboratories of America and CSA Big Data WG

How To Secure Cloud Computing

Transcription:

ITU-T Workshop on Addressing security challenges on a global scale 06.+07.12.2010, Geneva WWRF Cloud Implications to Security, Privacy, and Trust Mario Hoffmann Chair WWRF Working Group 7 Security & Trust Fraunhofer Institute for Secure Information Technology Head of Department Secure Services & Quality Testing Darmstadt/Munich, Germany

WWRF http://www.wireless-world-research.org Founded 2001, 100 members Global pre-standardisation platform to initiate global cooperation towards future wireless world Vision from user perspective requirements for the enabling technologies Unique way of active cooperation within and between industry and academia Reduce risk for investment in research Ease future standardisation by globally harmonising views Proven history of creating large scale research cooperation and facilitating funding Open to all actors

WG7 Privacy, Security & Trust Approach (1/2) Integration of Privacy, Security and Trust into... Integration Layers Protection Goals Source: EU-IST Project, 2001 Application Layer Platforms/Middleware Mobile Devices Infrastructure Availability Confidentiality Integrity Accountability Authenticity

WG7 Privacy, Security & Trust Approach (2/2) How to Source: WWRF... specify, negotiate, enforce and monitor a certain level of Privacy, Security & Trust between cooperation and communication partners in ambient environments?... implement and integrate security enablers by design?... tackle attacking strategies such as spy out, deny, tamper, misuse, misinform?... fulfill user empowerment, user awareness, enforcing security policies, establishing context security?... ensure transparency, usable security?

Cloud Computing Deployment Models low Economy of Scales high private Cloud hybrid Cloud public Cloud strong Control weak

Cloud Computing Service Models high low Economy of Scales high low Software as a Service Abstraction private Cloud hybrid Cloud Platform as a Service Infrastructure as a Service public Cloud Flexibility low strong Control weak high

Cloud - Transparency Feature Resources and data are just somewhere in the Cloud and can be accessed on demand from everywhere at any time. Challenge Where is my data? Who has access to it? How can a Cloud service consumer monitor and control access to his resources? How can I guarantee compliance with national law, certified processes, and company s security policies? Which jurisdiction is applicable?

Cloud - Identity Management An integral part of Cloud services is identity and access management. Identity as a Service: From simple user provisioning to identity federation Identification of a unique object within an ambiguous environment and its identity lifecycle Single-sign-on and usability

Cloud - Interoperability Distinguish Public, Private, Hybrid Clouds (plus Community, Virtual Private Clouds) Challenge: Complexity, interoperability, and the ability to change the cloud service provider easily are major issues as standardization is only in an early phase. For service providers as well as service consumers it is most important to identify the individual protection goals and risks appropriately following a comprehensive taxonomy

Cloud - Mobility From a research perspective the Cloud approach can be extended to restricted resources which are only temporarily available, such as mobile devices in a meeting room. Devices could share single features and dedicated resources for a specific time period taking advantage of additional features from the direct environment. Here, the term Cloud has to be re-defined for mobile application scenarios (see [KaFi2010]) 10

Cloud - Encryption A promising candidate to solve the issue that encrypted data in the Cloud has to be decrypted first before it can be processed is full homomorphic encryption. Here operations such as multiplication and addition can be realized on encrypted data which would eventually reach a much higher security level (see [SmVe2009])

Cloud - Trustworthy Virtualisation Next generation Trusted Platform Modules (TPMs) are able to support virtualization on hardware layer. Since virtualization is a very important enabler of Cloud Computing this addresses issues related to untrustworthy transactions between Cloud entities on infrastructure, platform as well as software level. In environments with high security requirements TPMs might serve as trust anchors (see for example [HKH2009])

Cloud - Top Threats Abuse of Cloud Computing Resources Shared Technology Vulnerabilities Data Loss or Leakage Insecure Application Programmer Interface Account, Service & Traffic Hijacking Malicious Insiders Unknown Risk Profile

cloud computing systems and their lower level security risks. The structure is made up of 4 main domains: infrastructure, application and platform, administration, and compliance. Each of these main areas and the associated security risks are discussed in detail in the following sections with a checklist of specified questions which a cloud consumer would be well advised to ask a cloud vendor. Cloud - Security Taxonomy e of g!"#$%$&'($)(*+,(-,./01*'("-2,.*-($)(.3$/4(.$&2/5%6(-'-*,&-( 9%)0"-*0/.*/0,( 72231."5$%("%4( 74&1%1-*0"5$%( :$&231"%.,( 23"8$0&( A+'-1."3( -,./01*'( C$-*( D10*/"31E"5$%( F,*>$0?( ;"*"(-,./01*'( 72231."5$%( -,./01*'( A3"8$0&(-,./01*'( G,./01*'("-("( -,0<1.,( A+"-,-($)(-,0<1.,( /-,( 7/41*( 94,%5*'("%4(016+*-( &"%"6,&,%*( B,'(&"%"6,&,%*( 9%*,0$2,0"I131*'("%4( 2$0*"I131*'( ;"*"(201<".'( H1-??( &"%"6,&,%*( =,6"3( )0"&,>$0?( @$<,0%"%.,( The interdependencies between each of these areas are analyzed in greater de-

Cloud - DOs & DONTs (1) Use a holistic security concept (2) Integrate the services in an existing security concept (3) Build a relationship of trust between the cloud consumer and the cloud vendor (4) Protect the network infrastructure (5) Use innovative security solutions for cloud computing systems (6) Reuse basic services (7) Pay attention to lock-in effects (8) Request security certificates (9) Don t forgo security concepts for purely financial reasons (10) Use service level agreements

Cloud - Innovation Areas Public - Community - Private - Hybrid Application Areas Broadcast/Media Collaboration ACD, CRM, IAM Online-Services egovernment emobility Logistics Trusted Cloud Innovation Areas Governance, Risk, Compliance Monitoring, Risk Analysis Identity Lifecycle Management Security Services Virtualisation & Interoperability Infrastructure - Platform - Software

Cloud - Funding Companies Cloud-Consumers: What does Cloud Computing mean to my processes, business, and infrastructures? Cloud-Providers: How will Cloud Computing affect Future Internet and vice versa? European Union, FP7, Call 8 (Jan 2012) Germany, Trusted Cloud Call (30 M, Jan 2011)

Cloud - References [CSA2009] [CSA2010] [ENISA2009] [HKH2009] [KaFi2010] [Kantara2010] [OASIS2010] [StRu2010] [SmVe2009] Cloud Security Alliance: Security Guidance for Critical Areas of Focus in Cloud Computing V2.1Dd, http://www.cloudsecurityalliance.org/csaguide.pdf Cloud Security Alliance: Guidance for Identity & Access Management V2.1 http:// www.cloudsecurityalliance.org/guidance/csaguide-dom12-v2.10.pdf Enisa: Cloud Computing Risk Assessment, http://www.enisa.europa.eu/act/rm/files/deliverables/ cloud-computing-risk-assessment/at_download/fullreport Kai Hwang, Sameer Kulkareni, Yue Hu, Cloud Security with Virtualized Defense and Reputation- Based Trust Mangement, Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing, Chengdu, China, 2009 M.Katz and F. Fitzek, Mobile Clouds: Challenges and Potentials, WWRF#24, Penang, Malaysia, April 2010, http://www.wireless-world-research.org Kantara Initiative, Kantara Federation Interoperability Workgroup (FIWG), http:// kantarainitiative.org/confluence/display/fiwg/home OASIS: Identity in the Clouds Tech. committee, OASIS Identity & Trusted infrastructure, http:// xml.coverpages.org/identity-clouds-proposal.html Werner Streitberger, Angelika Ruppel, Cloud Computing Security Protection Goals, Taxonomy, Market Review, http://www.sit.fraunhofer.de/en/pressedownloads/artikel/bestellung_ccs.jsp N.P. Smart, F. Vercauteren, Fully Homomorphic Encryption with Relatively Small Key and Ciphertext Sizes, http://eprint.iacr.org/2009/571.pdf

WG7 Privacy, Security & Trust Contact Join WWRF and WG7 Website: www.wireless-world-research.org/ Subscribe to our mailing list! Contact: Mario Hoffmann (Chair) mario.hoffmann@sit.fraunhofer.de Marcus Wong (Vice Chair) wong@huawei.com Source: WWRF