cloud privacy in a
play

Cloud Privacy in a PervasivE Monitoring t Landscape pt - PowerPoint PPT Presentation

44 pt Cloud Privacy in a PervasivE Monitoring t Landscape pt JOHN MATTSSON


  1. 44 pt Cloud Privacy in a PervasivE Monitoring t Landscape pt ΆΈΉΊΌΎΏΐΑΒΓΕΖΗΘΙΚΛΜΝΞΟΠΡΣΤΥΦΧΨΪΫΆΈΉΊΰαβγ JOHN MATTSSON δεζηθικλνξορςΣΤΥΦΧΨΩΪΫΌΎΏ ЁЂЃЄЅІЇЈЉЊЋЌЎЏАБВГДЕЖЗИЙКЛМНОПРСТУФХЦЧШЩ ЪЫЬЭЮЯАБВГДЕЖЗИЙКЛМНОПРСТУФХЦЧШЩЪЫ ЬЭЮЯЁЂЃЄЅІЇЈЉЊЋЌЎЏѢѢѲѲѴѴҐҐәǽ № STEFAN HÅKANSSSON ERICSSON RESEARCH Ericsson | 2014-09-11 | Page 1

  2. INTRODUCTION 44 pt • Ongoing transformation towards third-party cloud services for storing and managing information. t • This has many benefits (cost, flexibility, ease of use). pt • Data aggregated in global data centers are natural targets for pervasive surveillance. • Also active attacks, e.g. celebrity image theft. • The market potential for enterprise and government cloud services and web applications are held back ΆΈΉΊΌΎΏΐΑΒΓΕΖΗΘΙΚΛΜΝΞΟΠΡΣΤΥΦΧΨΪΫΆΈΉΊΰαβγ by privacy and security concerns. δεζηθικλνξορςΣΤΥΦΧΨΩΪΫΌΎΏ ЁЂЃЄЅІЇЈЉЊЋЌЎЏАБВГДЕЖЗИЙКЛМНОПРСТУФХЦЧШЩ ЪЫЬЭЮЯАБВГДЕЖЗИЙКЛМНОПРСТУФХЦЧШЩЪЫ ЬЭЮЯЁЂЃЄЅІЇЈЉЊЋЌЎЏѢѢѲѲѴѴҐҐәǽ № • Problematic with servers in other countries and vendors from other countries. Ericsson | 2014-09-11 | Page 2

  3. SECURITY MODEL 44 pt • WebCrypto uses so called host-based security where the security depends on the security of the host. t • This alone is not enough in a pervasive monitoring landscape pt • Need to protect against service provider, data breaches, and government demands. • Need to shield not just encryption keys, but also plaintext data from the hosting application. • Similar thoughts have been pursued in WebRTC, Isolated Media Streams, and Encrypted Media Extensions. ΆΈΉΊΌΎΏΐΑΒΓΕΖΗΘΙΚΛΜΝΞΟΠΡΣΤΥΦΧΨΪΫΆΈΉΊΰαβγ δεζηθικλνξορςΣΤΥΦΧΨΩΪΫΌΎΏ ЁЂЃЄЅІЇЈЉЊЋЌЎЏАБВГДЕЖЗИЙКЛМНОПРСТУФХЦЧШЩ ЪЫЬЭЮЯАБВГДЕЖЗИЙКЛМНОПРСТУФХЦЧШЩЪЫ ЬЭЮЯЁЂЃЄЅІЇЈЉЊЋЌЎЏѢѢѲѲѴѴҐҐәǽ № Browser Web Server Ericsson | 2014-09-11 | Page 3

  4. EXAMPLES 44 pt Cloud storage • There is currently no easy way to use cloud storage in a way that ensures privacy. t • Needed: Secure File Input / File Download where pt cleartext is not accessible by the web application / JavaScript runtime environment. HTML forms • Data entered in forms is available to the web ΆΈΉΊΌΎΏΐΑΒΓΕΖΗΘΙΚΛΜΝΞΟΠΡΣΤΥΦΧΨΪΫΆΈΉΊΰαβγ δεζηθικλνξορςΣΤΥΦΧΨΩΪΫΌΎΏ application in cleartext. ЁЂЃЄЅІЇЈЉЊЋЌЎЏАБВГДЕЖЗИЙКЛМНОПРСТУФХЦЧШЩ ЪЫЬЭЮЯАБВГДЕЖЗИЙКЛМНОПРСТУФХЦЧШЩЪЫ ЬЭЮЯЁЂЃЄЅІЇЈЉЊЋЌЎЏѢѢѲѲѴѴҐҐәǽ № • Needed: secure forms where the data is not accessible to the application in any other form than encrypted. • Example: Google Chrome extension End-to-End. Ericsson | 2014-09-11 | Page 4

  5. SUMMARY 44 pt • Sensitive data should be protected in such a way that the service provider cannot access keys nor cleartext. t • In this way, cleartext data is only accessible by the individual or enterprise that protected it in the first place, or someone pt selectively given authorization to access the data. • Protects data against service provider, data breaches, and government demands. ΆΈΉΊΌΎΏΐΑΒΓΕΖΗΘΙΚΛΜΝΞΟΠΡΣΤΥΦΧΨΪΫΆΈΉΊΰαβγ δεζηθικλνξορςΣΤΥΦΧΨΩΪΫΌΎΏ ЁЂЃЄЅІЇЈЉЊЋЌЎЏАБВГДЕЖЗИЙКЛМНОПРСТУФХЦЧШЩ ЪЫЬЭЮЯАБВГДЕЖЗИЙКЛМНОПРСТУФХЦЧШЩЪЫ ЬЭЮЯЁЂЃЄЅІЇЈЉЊЋЌЎЏѢѢѲѲѴѴҐҐәǽ № Ericsson | 2014-09-11 | Page 5

  6. REFERENCES 44 pt The presented paper: “Cloud Service Privacy in a Pervasive W3C, “WebRTC 1.0: Real-time Communication Between Browse Monitoring Landscape” http://www.w3.org/TR/webrtc/ http://www.w3.org/2012/webcrypto/webcrypto-next-workshop/ papers/webcrypto2014_submission_9.pdf IETF, “Real-Time Communication in WEB-browser t http://tools.ietf.org/wg/rtcweb/ TRINT - A W3C/IAB workshop on Strengthening the Internet Against Pervasive Monitoring W3C, “Media Capture and Streams” pt http://www.w3.org/TR/WebCryptoAPI/ http://www.w3.org/TR/mediacapture-streams/#isolated-media-streams Barnes et al. “Pervasive Attack: A Threat Model and Problem W3C, “Encrypted Media Extensions” Statement” http://www.w3.org/TR/encrypted-media/ http://tools.ietf.org/html/draft-barnes-pervasive-problem Google, “End-To-End” Cooper, Jennings, “The Trust-to-Trust Model of Cloud Services” https://code.google.com/p/end-to-end/ https://www.w3.org/2014/strint/papers/30.pdf ΆΈΉΊΌΎΏΐΑΒΓΕΖΗΘΙΚΛΜΝΞΟΠΡΣΤΥΦΧΨΪΫΆΈΉΊΰαβγ Halpin, “The W3C Web Cryptography API: Design and Issues”, 2014 δεζηθικλνξορςΣΤΥΦΧΨΩΪΫΌΎΏ ЁЂЃЄЅІЇЈЉЊЋЌЎЏАБВГДЕЖЗИЙКЛМНОПРСТУФХЦЧШЩ Farrell, Tschofenig, IETF RFC 7258, “Pervasive Monitoring Is an ЪЫЬЭЮЯАБВГДЕЖЗИЙКЛМНОПРСТУФХЦЧШЩЪЫ http://ws-rest.org/2014/sites/default/files/wsrest2014_submission_11.pdf ЬЭЮЯЁЂЃЄЅІЇЈЉЊЋЌЎЏѢѢѲѲѴѴҐҐәǽ № Attack” https://tools.ietf.org/html/rfc7258 W3C, “Web Cryptography API” http://www.w3.org/TR/WebCryptoAPI/ Ericsson | 2014-09-11 | Page 6

  7. 44 pt t pt ΆΈΉΊΌΎΏΐΑΒΓΕΖΗΘΙΚΛΜΝΞΟΠΡΣΤΥΦΧΨΪΫΆΈΉΊΰαβγ δεζηθικλνξορςΣΤΥΦΧΨΩΪΫΌΎΏ ЁЂЃЄЅІЇЈЉЊЋЌЎЏАБВГДЕЖЗИЙКЛМНОПРСТУФХЦЧШЩ ЪЫЬЭЮЯАБВГДЕЖЗИЙКЛМНОПРСТУФХЦЧШЩЪЫ ЬЭЮЯЁЂЃЄЅІЇЈЉЊЋЌЎЏѢѢѲѲѴѴҐҐәǽ № Ericsson | 2014-09-11 | Page 7

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend