Securing Big Data in the Cloud: Towards a More Focused and Data Driven Approach. Ragib Hasan, UAB Anthony Skjellum, Auburn 2014 NSF Big Data Workshop



Similar documents
CS573 Data privacy and security in the cloud. Slide credits: Ragib Hasan, Johns Hopkins University

Security and Privacy in Cloud Computing

Cloud Security Who do you trust?

Business Cloud Systems Challenges and Uncertainty

Lecture 10 Cloud Security. modified from slides of Lawrie Brown, Ragib Hasan, YounSun Cho, Anya Kim

Requirements of Secure Storage Systems for Healthcare Records

Cloud Computing Trends, Examples & What s Ahead

HIPAA: MANAGING ACCESS TO SYSTEMS STORING ephi WITH SECRET SERVER

PROTECTING DATA IN MULTI-TENANT CLOUDS

Secure cloud access system using JAR ABSTRACT:

Cloud Security Who do you trust?

Cloud Forensic Investigation using Digital Provenance Scheme

The problem of cloud data governance

Everything You Always Wanted to Know About Log Management But Were Afraid to Ask. August 21, 2013

Cyber Security and Cloud Computing. Dr Daniel Prince Course Director MSc in Cyber Security

Sarbanes-Oxley Act. Solution Brief. Sarbanes-Oxley Act. Publication Date: March 17, EventTracker 8815 Centre Park Drive, Columbia MD 21045

MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE

Security within a development lifecycle. Enhancing product security through development process improvement

SMS. Cloud Computing. Systems Management Specialists. Grupo SMS option 3 for sales

Data Protection: From PKI to Virtualization & Cloud

SOC on Amazon Web Services (AWS) What You Need To Know Understanding the regulatory roadmap for SOC on AWS

VMware vcloud Architecture Toolkit Public VMware vcloud Service Definition

Understanding Enterprise Cloud Governance

ISO COMPLIANCE WITH OBSERVEIT

Control your corner of the cloud.

ViPNet EDI. drive your collaboration secure

Cloud Computing An Auditor s Perspective

How To Manage Cloud Data Safely

Appendix to; Assessing Systemic Risk to Cloud Computing Technology as Complex Interconnected Systems of Systems

Consor;um (partners) ARES conference Toulouse, 24 August 2015

VMware vcloud Service Definition for a Public Cloud. Version 1.6

Who Am I? Mark Cusack Chief Architect 9 years@rainstor Founding developer Ex UK Ministry of Defence Research InfoSec projects

ALERT LOGIC FOR HIPAA COMPLIANCE

Cloud Computing: Outsourcing Computation without Outsourcing Control

A Guide to. Cloud Services for production workloads

Top 10 Cloud Risks That Will Keep You Awake at Night

Balancing Security Investment Against Today's Threat Environment

Efficient Integrity Checking Technique for Securing Client Data in Cloud Computing

The Trusted Cloud: Addressing Security and Compliance

FECloud: A Trustworthy Forensics-Enabled Cloud Architecture

Systems of Discovery The Perfect Storm of Big Data, Cloud and Internet-of-Things

John Essner, CISO Office of Information Technology State of New Jersey

Research Challenges in Virtualization. Steven Hand Senior Architect, Citrix R&D Reader in Computer Systems, U. Cambridge

Cloud Courses Description

whitepaper Ten Essential Steps for Achieving Continuous Compliance: A Complete Strategy for Compliance

Executive Summary. Architectural Overview WHITE PAPER

Build (develop) and document Acceptance Transition to production (installation) Operations and maintenance support (postinstallation)

Whitepaper. What You Need to Know About Infrastructure as a Service (IaaS) Encryption

Understanding the Significance of SOX Compliance.

Solving data residency and privacy compliance challenges Delivering business agility, regulatory compliance and risk reduction

IBM InfoSphere Guardium Data Activity Monitor for Hadoop-based systems

Data Security In The Cloud

How DataSunrise Helps to Comply with SOX, PCI DSS and HIPAA Requirements

4 Essential Steps to a Successful HIPAA Audit. by Roman Diaz, Touchstone Compliance President. Assessment & solutions for meeting HIPAA standards

Solution Brief for HIPAA HIPAA. Publication Date: Jan 27, EventTracker 8815 Centre Park Drive, Columbia MD 21045

Keeping watch over your best business interests.

Cloud Computing Security Considerations

Paxata Security Overview

Index Terms Cloud Storage Services, data integrity, dependable distributed storage, data dynamics, Cloud Computing.

Clinical Trials in the Cloud: A New Paradigm?

Logging and Alerting for the Cloud

Cisco SAFE: A Security Reference Architecture

Cloud security architecture

CLOUD STORAGE SECURITY INTRODUCTION. Gordon Arnold, IBM

Security Information Lifecycle

Brainloop Cloud Security

Auditing Cloud Computing. A Security and Privacy Guide. Wiley Corporate F&A

Security and Privacy in Cloud Computing

Effective Software Security Management

Is your business prepared for Cyber Risks in 2016

Building Secure Cloud Applications. On the Microsoft Windows Azure platform

IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE

Protecting Your Data On The Network, Cloud And Virtual Servers

MASSIVE NETWORKS Online Backup Compliance Guidelines Sarbanes-Oxley (SOX) SOX Requirements... 2

Compliance in 5 Steps

The Race to Secure the Cloud 2.0

MANAGED FILE TRANSFER: 10 STEPS TO HIPAA/HITECH COMPLIANCE

Cyber Security Pr o t e c t i n g y o u r b a n k a g a i n s t d a t a b r e a c h e s

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE


APPLICATION COMPLIANCE AUDIT & ENFORCEMENT

Ensuring Security in Cloud with Multi-Level IDS and Log Management System

The Business Benefits of Logging

Enterprise Key Management: A Strategic Approach ENTERPRISE KEY MANAGEMENT A SRATEGIC APPROACH. White Paper February

Cloud Security Standards. Aziza Al Rashdi Director, Cyber Security Professional Services Oman National CERT Information Technology Authority

Using Data Encryption to Achieve HIPAA Safe Harbor in the Cloud

CONTROLLING DATA IN THE CLOUD: OUTSOURCING COMPUTATION WITHOUT OUTSOURCING CONTROL

INSTANT MESSAGING SECURITY

Cloud Computing. Cloud Computing An insight in the Governance & Security aspects

Results Oriented Change Management

How To Secure Cloud Infrastructure

Surviving an Identity Audit

2.2 The Security of Electronic Medical Records (EMR) DOH, the Executive Yuan August 19, 2009

Managing Privileged Identities in the Cloud. How Privileged Identity Management Evolved to a Service Platform

International Journal of Advanced Research in Computer Science and Software Engineering

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

Why Encryption is Essential to the Safety of Your Business

Cloud Computing Governance & Security. Security Risks in the Cloud

White Paper Achieving SOX Compliance through Security Information Management. White Paper / SOX

Transcription:

Securing Big Data in the Cloud: Towards a More Focused and Data Driven Approach Ragib Hasan, UAB Anthony Skjellum, Auburn 2014 NSF Big Data Workshop

[Cloud Computing] is a security nightmare and it can't be handled in traditional ways. John Chambers CISCO CEO 2

The Age of Big Data and Clouds The global market for clouds is growing 30% Compound Annual Growth Rate (CAGR) reaching $270 billion in 2020 (Market Research Media) Growth happening both in private and government sectors (US Federal government s spending on the cloud is approx. $792 million in 2013 (INPUT) Big Data is also becoming ubiquitous, going mainstream from academic and research usage A 4300% growth predicted by 2020. Clouds are the most suitable platform to make any sense of big data

So, if cloud computing is so effective in dealing with Big Data, why isn t everyone doing it? Clouds are still subject to traditional data confidentiality, integrity, availability, and privacy issues, plus some additional attacks 4

Why are Big Data and cloud security different from traditional security? Multi-tenancy Same hardware/network shared by many users Trust asymmetry Users have to completely trust the cloud provider for everything Lack of accountability There is a lack of accountability in part of the cloud service provider Securing a house Owner and user are often the same entity Securing a motel Owner and users are almost invariably distinct entities 5

Many major challenges remain in securing clouds and Big Data Novel attacks Trustworthy cloud architectures Data integrity and availability Computation integrity Data and computation privacy Data forensics Misbehavior detection Malicious use of clouds 6

Co-tenancy in clouds creates new attack vectors A cloud is shared by multiple users Malicious users can now legally be in the same infrastructure Misusing co-tenancy, attackers can launch side channel attacks on victims Research question: How to prevent attackers from exploiting co-tenancy in attacking the infrastructure and/or other clients?

Today s cloud architectures act like big black boxes Clients have no idea of or control over what is happening inside the cloud Clients are forced to trust cloud providers completely Research Question: How do we design cloud computing architectures that are semi-transparent and provide clients with control over security? 8

Today s clouds provide no guarantee about outsourced data Problem: Dishonest cloud providers can throw data away or lose data. Malicious intruders can delete or tamper with data. Clients need reassurance that the outsourced data is available, has not been tampered with, and remains confidential. Amazon s Terms of services Research Question: How can clients get assurance/proofs that the cloud provider is actually storing data, is not tampering with data, and can make the data available ondemand? 9

Ensuring confidentiality of data in outsourced computation is difficult Most type of computations require decrypting data before any computations If the cloud provider is not trusted, this may result in breach of confidentiality Research Question: How can we ensure confidentiality of data and computations in a cloud? 10

Clients have no way of verifying computations outsourced to a Cloud Scenario User sends her data processing job to the cloud. Clouds provide dataflow operation as a service (e.g., MapReduce, Hadoop etc.) Problem: Users have no way of evaluating the correctness of results Research question: How can we verify the accuracy of outsourced computation? 11

Data Forensics in Clouds is difficult Certain Government regulations mandate the ability to audit and run forensic analysis on critical business or healthcare data Clouds complicate forensic analysis, since the same storage infrastructure is shared by many clients Cloud providers are not willing to open up their entire storage for forensic investigations. Research question: How can we augment cloud infrastructures to allow forensic investigations? 12

(Largely) Unexplored Areas Legal/policy issues and regulatory compliance: Cloud based storage is still subject to regulatory compliance and legal orders. Implementing things such as litigation hold in a cloud is very difficult. Proving a cloud is fully compliant with pre-cloud law is challenging Research question: How does cloud computing fit in with data security laws and regulations such as SOX, HIPAA, or with Litigation holds? 13

Making Big Data and Clouds Secure focus on the data! Our solution: Take a data driven approach Focus on data, it s location, generation, and transmission the provenance of data Look at the lifecycle of data and Ensure trustworthy computation and attribution Make Provenance a fundamental part of clouds

Why aren t today s clouds accountable? Users do not know What happened to their data inside the cloud? What applications generated their data? How did the state of the cloud change? Cloud providers act like black boxes Clouds do not provide any information about internal operation to users Since they are in full control, any evidence/forensic investigation must go through them, making that less transparent 15

Cloud Provenance is Key to Solving Cloud Security Data provenance: The modification and movement history of data objects as they enter/leave the cloud and are modified Application provenance: The history and activities of applications and users State provenance: The state history of the cloud computing system itself 16

Challenges in Cloud Provenance Provenance collection: How do we efficiently collect it? Provenance storage: Where do we store it? What structures do we use? Securing provenance: How do we prevent attacks and forgery? Access to provenance: How can we give access to provenance while preserving cloud s/other users privacy? 17

How to provide accountability to users using Provenance-based Proofs? Proof of past data possession Proof of data possession Proof of data deletion Proof of capability Proof of work/task completion and Correctness 18

Current Results PPDP: Proof of past data possession (Zawoad and Hasan, CyberSec 2012, journal 2012) PPDP attests that a User U possessed a File F at a given past time. An Auditor can use PPDP to check the Past Data Possession. File can be deleted but PPDP can still preserve the proof of data possession. 19

Current Results SecLaaS: Secure Log Access as a Service (Zawoad and Hasan, ASIACCS 2013) Ext VM VM VM NC Attacker Attack Communication Log DB Proof DB API Web Server Investigator 20

Ongoing projects Provenance Aware Cloud (PAC) We are building a provenance-capable cloud using the openstack platform A small scale testbed has been developed for cloud security research. 21

John Chambers CISCO CEO [Cloud Computing] is a security nightmare and it can't be handled in traditional ways can be handled using Trustworthy provenance Details? Visit http://secret.cis.uab.edu or Email ragib@cis.uab.edu 22