ESPRESSO: An Encryption as a Service for Cloud Storage Systems



Similar documents
msuite5 & mdesign Installation Prerequisites

Ahsay Online Backup Suite v5.0. Whitepaper Backup speed

preliminary experiment conducted on Amazon EC2 instance further demonstrates the fast performance of the design.

Cloud Computing and Amazon Web Services

Lecture 11. RFS A Network File System for Mobile Devices and the Cloud

Secure cloud access system using JAR ABSTRACT:

Hardware/Software Guidelines

Cloud for PC SOFT applications Pricing

Implementing the Application Control Engine Service Module

Distributed File System. MCSN N. Tonellotto Complements of Distributed Enabling Platforms

Cloud Courses Description

Administering Windows Server 2012

Cloud Courses Description

SQL Server Hybrid Features. Luis Vargas, Senior Program Manager Lead Xin Jin, Program Microsoft

Symantec Endpoint Protection 11.0 Architecture, Sizing, and Performance Recommendations

Office 365 Migration Performance & Server Requirements

Comparing major cloud-service providers: virtual processor performance. A Cloud Report by Danny Gee, and Kenny Li

Cloud Federation to Elastically Increase MapReduce Processing Resources

QUALITY OF SERVICE FOR CLOUD-BASED MOBILE APPS: Aruba Networks AP-135 and Cisco AP3602i

Infor Web UI Sizing and Deployment for a Thin Client Solution

Technology and Cost Considerations for Cloud Deployment: Amazon Elastic Compute Cloud (EC2) Case Study

EWeb: Highly Scalable Client Transparent Fault Tolerant System for Cloud based Web Applications

Features Security. File Versioning. Intuitive User Interface. Fast and efficient Backups

Server Installation Manual 4.4.1

Microsoft Exchange Server 2003 Deployment Considerations


LabStats 5 System Requirements

Contents Introduction... 5 Deployment Considerations... 9 Deployment Architectures... 11

DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014

Minimum System Requirements

Performance Analysis of Client Side Encryption Tools

Public Versus Private Cloud Services

Tertiary Backup objective is automated offsite backup of critical data

Interact Intranet Version 7. Technical Requirements. August Interact

INTRODUCTION TO WINDOWS 7

High speed Ethernet WAN: Is encryption compromising your network?

The State of Cloud Storage

Secure Data transfer in Cloud Storage Systems using Dynamic Tokens.

Cloud JPL Science Data Systems

Distributed Network Monitoring. netbeez.net Booth #2344

How To Set Up Foglight Nms For A Proof Of Concept

Softline VIP Payroll System Requirements v2.9a January 2010

Chapter 5. Data Communication And Internet Technology

Aspera Direct-to-Cloud Storage WHITE PAPER

Hardware and Software Requirements for Sage 50 v15 to v22

ANDREW HERTENSTEIN Manager Microsoft Modern Datacenter and Azure Solutions En Pointe Technologies Phone

Rights Management Services

Sage Grant Management System Requirements

NEFSIS DEDICATED SERVER

Archiving On-Premise and in the Cloud. March 2015


Verifying Correctness of Trusted data in Clouds

efolder BDR for Veeam Cloud Connection Guide

Table of Contents. Using the plug- in Pure Storage Flash Array Home Page... 11

Symantec Backup Exec.cloud

HC900 Hybrid Controller When you need more than just discrete control

Hadoop Architecture. Part 1

PRIVACY-PRESERVING PUBLIC AUDITING FOR SECURE CLOUD STORAGE

MaaS360 Mobile Enterprise Gateway

Getting Started with Attunity CloudBeam for Azure SQL Data Warehouse BYOL

Microsoft Windows Server Update Services Questions & Answers About The Product

Adapt Support Managed Service Programs

Online Backup by Mozy. Common Questions

Network Administrator s Guide

System requirements for MuseumPlus and emuseumplus

Usage of OPNET IT tool to Simulate and Test the Security of Cloud under varying Firewall conditions

Lindenbaum Web Conference

Ensuring Enterprise Data Security with Secure Mobile File Sharing.

An Oracle White Paper July Oracle Primavera Contract Management, Business Intelligence Publisher Edition-Sizing Guide

Turnkey Deduplication Solution for the Enterprise

BENCHMARKING CLOUD DATABASES CASE STUDY on HBASE, HADOOP and CASSANDRA USING YCSB

GadgetTrak Mobile Security Android & BlackBerry Installation & Operation Manual

QHR Accuro EMR IT Hardware Requirements

Cloud Sync White Paper. Based on DSM 6.0

DISTRIBUTED SYSTEMS [COMP9243] Lecture 9a: Cloud Computing WHAT IS CLOUD COMPUTING? 2

Understanding the Benefits of IBM SPSS Statistics Server

Performance Optimization Guide

The Porticor Virtual Private Data solution includes two or three major components:

DIR Contract Number DIR-SDD-2513 Appendix C Pricing Index

Minimum Hardware Configurations for EMC Documentum Archive Services for SAP Practical Sizing Guide

VANGUARD ONLINE BACKUP

Scaling in a Hypervisor Environment

Understanding VPN Technology Choices

Use of Hadoop File System for Nuclear Physics Analyses in STAR

Investigating Private Cloud Storage Deployment using Cumulus, Walrus, and OpenStack/Swift

Index Terms Cloud Storage Services, data integrity, dependable distributed storage, data dynamics, Cloud Computing.

IBM Platform Computing Cloud Service Ready to use Platform LSF & Symphony clusters in the SoftLayer cloud

THE SIMPLEST WAY TO BACKUP AND RECOVER DATA ON ALL LAPTOPS AND DESKTOPS IN YOUR BUSINESS.

Transcription:

8th International Conference on Autonomous Infrastructure, Management and Security ESPRESSO: An Encryption as a Service for Cloud Storage Systems Kang Seungmin 30 th Jun., 2014

Outline Introduction and motivation Main contribution Detailed proposed solution Cloud storage system models Overall architecture of ESPRESSO Implementation of ESPRESSO Integration of ESPRESSO into Swift and Cumulus Experiments and performance evaluation Conclusion and future work. 2

Introduction and Motivation Cloud storage systems provide high data availability and the flexibility in data management, and they become the primary storage space for cloud users data. Data privacy is one of the most important challenges to be solved due to the shared storage space characteristic of cloud storage systems. Data encryption emerged as one of the most effective means to protect sensitive data. Among existing CSPs, only Google Cloud Storage and Amazon S3 provide such encryption service. Many other CSPs do not have yet this service. 3

Main Contribution Proposing a solid encryption service which allows any CSP to integrate it Designing and implementing an encryption service, called ESPRESSO (Encryption as a Service for Cloud Storage Systems). ESPRESSO is a standalone service is configurable and flexible service for both CSPs and cloud users CSPs can choose the encryption algorithm based on their preference Users can specify the critical level of their data is easily integrated. 4

Outline Introduction and motivation Main contribution Detailed proposed solution Cloud storage system models Overall architecture of ESPRESSO Implementation of ESPRESSO Integration of ESPRESSO into Swift and Cumulus Experiments and performance evaluation Conclusion and future work. 5

Cloud Storage System Models Cloud users deploy the encryption software on their local machine or on a remote machine in their trusted domain. Cloud users rely on a third party who deploys the encryption software and provides it to users as a service. CSPs deploy the encryption software on a server in its trusted domain as one of its components. Users Internet Storage server Cloud Service Provider Encryption server Storage server 6

Overall Architecture of ESPRESSO Universal API submitted Encryption/ Decryption Requests requests data encryption/ decryption Key Generator Encryption as a Service Keys Management Master Key Data Encryptor requests algorithm Encryption Algorithms Data Encryption Management requests keys Encrypted Key Storage Encrypted Key Replicator requests/stores encrypted keys replicates encrypted keys updates DB requests key encryption/ decryption updates DB Primary Keys DB Key Encryptor requests master key Backup Keys DB Two main components Data encryption management. Key management. Supporting flexibility in ESPRESSO AES and Blowfish algorithms. Three critical levels with three key lengths: 128, 192 and 256 bits. 7

Implementation of ESPRESSO - dataencryptor UniversalAPI + encrypt_data(user_id, critical_level, data) + decrypt_data(user_id, encrypted_data) WSGIAPI + encrypt_data(user_id, critical_level, data) + decrypt_data(user_id, encrypted_data) - keygenerator - algorithm DataEncryptor + encrypt_data(user_id, critical_level, data) + decrypt_data(user_id, encrypted_data) Algorithm - keyencryptor - keystorage KeyGenerator + getuserkey(user_id, critical_level) espresso.keymnt MasterKey + getmasterkey() + encrypt_data(key_string, data) + decrypt_data(key_string, encrypted_data) - keyreplicator KeyStorage AESAlgorithm + encrypt_data(key_string, data) + decrypt_data(key_string, encrypted_data) BlowfishAlgorithm + encrypt_data(key_string, data) + decrypt_data(key_string, encrypted_data) espresso.enmnt + getuserkey(user_id, critical_level) + storeuserkey(user_id, critical_level, encrypted_key) KeyReplicator + replicatekey(key_id, encrypted_key) - masterkey KeyEncryptor + encryptuserkey(user_key) + decryptuserkey(encrypted_key) Implementing the abstract Universal API class to allow multiple CSPs to integrate ESPRESSO, e.g., SwiftAPI. Implementing the abstract Algorithm class to support different encryption algorithms. 8

Integration of ESPRESSO into Swift Users ESPRESSO server CSP trusted domain Swift ESPRESSO is deployed on a separate server. The proxy server initializes encryption on ESPRESSO. REST requests Proxy server Storage server All modification were made in swift/proxy/controller/obj.py. Internet switch Keystone server switch Storage server... Storage server Less than 50 code lines were added for encryption and decryption requests in Swift. Parameters of requests: Input data User identification Critical level of data 9

Integration of ESPRESSO into Cumulus Internet CSP trusted domain Cumulus interfaces S3 Cumulus Redirection ESPRESSO is deployed on a separate server. The Cumulus interface initializes encryption on ESPRESSO. S3 requests Cumulus API Cumulus Service Implementation Authz DB All modification were made in cumulus/cb/pycb/cbrequest.py. Users ESPRESSO server Cumulus Storage API Cumulus interfaces POSIX HDFS Cumulus Less than 50 code lines were added for encryption and decryption requests in Cumulus. --add-header critical level: A. 10

Outline Introduction and motivation Main contribution Detailed proposed solution Cloud storage system models Overall architecture of ESPRESSO Implementation of ESPRESSO Integration of ESPRESSO into Swift and Cumulus Experiments and performance evaluation Conclusion and future work. 11

Experiments and Performance Evaluation Experiment setup Deploying the integrated Swift/Cumulus storage system on two dedicated physical servers of the same rack PowerEdge C6220 with Intel(R) Xeon(R) Processor E5-2640 2.50GHz, 24GB RAM Using real data files which are downloaded from the Wikipedia archive. Data size varies from 100MB to 4000MB (~4GB). Performance metrics Latency of encryption algorithms Latency of the storage system with and without ESPRESSO Impact of network bandwidth Comparison of Swift and Cumulus. 12

Experiments and Performance Evaluation Latency of encryption algorithm Encryption time (s) 100 90 80 70 60 50 40 30 20 10 0 256-bit key length 192-bit key length 128-bit key length 0 500 1000 1500 2000 2500 3000 3500 4000 4500 Data size (MB) With the same key length, the larger data volume, the longer time needed to complete the encryption. The longer key provides higher security level, however, needs longer time to complete the encryption. 13

Experiments and Performance Evaluation Overall latency with and without ESPRESSO Operation time (s) 600 500 400 300 200 100 0 With encryption service Without encryption service 0 500 1000 1500 2000 2500 3000 3500 4000 4500 Data size (MB) Without ESPRESSO The total time is considered the data transfer time from the client to the Swift server. With ESPRESSO Additional overhead includes the encryption time and the data transfer time between the Swift and ESPRESSO servers. 14

Experiments and Performance Evaluation Impact of network bandwidth Operation time (s) 2500 2000 1500 1000 500 0 WiFi connection Wired connection Total encryption time 0 500 1000 1500 2000 2500 3000 3500 4000 4500 Data size (MB) The client machine is 3kms far from the Swift server. The data transfer time dominates in both cases: WiFi (~2 Mbps) Wired connection (~10 Mbps). The observed encryption time overhead is negligible (2.75 mins) compared to the total uploading time (37.45 mins) with the WiFi connection. 15

Experiments and Performance Evaluation Swift vs. Cumulus performance The operation times of both systems are almost the same. Swift needs longer time for replicating data with three copies. Cumulus does not provide the replication service. The overhead on Swift is compromised by the fluctuation of data transfer time. 16

Conclusion and Future Work We provided ESPRESSO, an encryption service which is Standalone Transparent Flexible Real experiments assess the performance and effectiveness of ESPRESSO. Any CSP can integrate ESPRESSO into its infrastructure without heavy modification. Future Work: integrate ESPRESSO with Homomorphic encryption (HE). 17

Thank you for your attention! Q & A 18