CLOUD SECURITY OR: HOW I LEARNED TO STOP WORRYING AND LOVE THE - - PowerPoint PPT Presentation

cloud security
SMART_READER_LITE
LIVE PREVIEW

CLOUD SECURITY OR: HOW I LEARNED TO STOP WORRYING AND LOVE THE - - PowerPoint PPT Presentation

Click to edit Master title style CLOUD SECURITY OR: HOW I LEARNED TO STOP WORRYING AND LOVE THE CLOUD PUBLIC Jakob I. Pagter Alexandra Instituttet A/S 1 About Alexandra Instituttet A/S Click to edit Master title style


slide-1
SLIDE 1

Click to edit Master title style

Jakob I. Pagter Alexandra Instituttet A/S

CLOUD SECURITY

OR: HOW I LEARNED TO STOP WORRYING AND LOVE THE CLOUD

1

PUBLIC

slide-2
SLIDE 2

Click to edit Master title style

  • Non-profit application oriented research institution – focus
  • n IT
  • GTS – Godkendt Teknologisk Service Institut
  • 100+ employees

About ”Alexandra Instituttet A/S”

R&D

  • Researchers
  • Providers
  • Users

generating

Commercial

  • Development
  • Consultancy
  • Ideation
  • Networks
  • Dissemination

inspiration

slide-3
SLIDE 3

Click to edit Master title style

On-demand self-service

  • provision computing capabilities automatically without requiring

human interaction

Broad network access

  • Capabilities are available over the network promote use by

heterogeneous thin or thick client

Measured Service

Resource usage can be monitored, controlled, and reported, providing transparency

Rapid elasticity

  • Capabilities can be rapidly and elastically provisioned,

automatically, to quickly scale out or rapidly scale in

Resource pooling

  • A sense of location independence. customer has no control or

knowledge over the location of the resources

Essential Characteristics of Cloud Computing

slide-4
SLIDE 4

Click to edit Master title style

Cloud Service Models -

slide-5
SLIDE 5

Click to edit Master title style

NIST Visual Model of Cloud Computing Definition

slide-6
SLIDE 6

Click to edit Master title style

6

slide-7
SLIDE 7

Click to edit Master title style

Governance and compliance

  • We have four datacenters in

the US, two in Europe and two in Asia. Even though you choose to store your data in Europe instead of Worldwide, your data will be stored at least three times. Two times on your main location and one time at a secondary data center’

Statement MS Azure:

slide-8
SLIDE 8

Click to edit Master title style

Note: MS first movers on EU standard contract clauses

slide-9
SLIDE 9

Click to edit Master title style

SLA’s

http://aws.amazon.com/message/65648/

slide-10
SLIDE 10

Click to edit Master title style

Multi-Tenancy

Multi-Tenancy ¡

  • one program, need to

serve at the same time the number of consumer

  • rganizations (Tenants) ¡

Separation ¡

  • Solution that supports

Multi-Tenancy, capable of creating separation between the different Tenants ¡

slide-11
SLIDE 11

Click to edit Master title style

Technical attack vectors

  • 1. Outsiders
  • 2. Platform
  • 3. Insiders
  • 4. Neighbours
slide-12
SLIDE 12

Click to edit Master title style

Armbrust et al.: Above The Clouds, Berkeley 2009

Economies

  • f scale

? ? ?

2011

$1500

2000

$150.000

IaaS PaaS SaaS

Built-in Added Total security

Business pros (and cons!)

År1 År2 År3 År4 År5 År6 År7 År8 Cost Innovation

Self service Innovation Fate- sharing Location

Who

  • is on?
  • where?
  • which

data? Complexity Risk profile?

Cost Agility Innovation Location/ Compliance SLA’s Multi-tennancy/ Virtualization

slide-13
SLIDE 13

Click to edit Master title style

Two problems

Technical protection

  • Adress specific problems
  • Part of bigger picture

Compliance

  • Law
  • Regulations (e.g PCI,

HIPAA, data protection)

  • Relies on proper technical

measures

slide-14
SLIDE 14

Click to edit Master title style

SLA’ing

Two approaches

Ide Vurdering Analyse Realisering SLA’ing Security by design

Security by design

  • Adapt to user capabilities
  • Exploit existing protection
  • Divide-and-conquer
slide-15
SLIDE 15

Click to edit Master title style

But first – “go old school”

Probability Impact ($$)

Very low 1 Low 2 Medium 3 High 4 Very high 5 Very low 1 low 2 Medium 3 High 4 Very high 5

“ A c c e p t ”

Risk

R e d u c e / d e l e g a t e R e d u c e c a r e f u l l y

Good security is business driven! Good analysis is knowledge driven!

slide-16
SLIDE 16

Click to edit Master title style

  • Adapt to user capabilities
  • Exploit existing protection

– Understand first!

  • Divide-and-conquer

– Trust, classification, …

  • Understand context

– Protection level <-> key sizes – What does and doesn’t crypto provide – When aren’t data encrypted

  • Don’t DIY
  • Protect the key!

Security by design using cryptography

IaaS PaaS SaaS CSP Security Own Security Total Security

slide-17
SLIDE 17

Click to edit Master title style

Context – key sizes!

Level Protection Symmetric Asymmetric Hash 1 Attacks in "real-time" by individuals Only acceptable for authentication tag size 32

  • 2

Very short-term protection against small organizations Should not be used for confidentiality in new systems 64 816 128 3 Short-term protection against medium organizations, medium- term protection against small organizations 72 1008 144 4 Very short-term protection against agencies, long-term protection against small organizations Smallest general-purpose level, 2-key 3DES restricted to 240 plaintext/ciphertexts, protection from 2009 to 2012 80 1248 160 5 Legacy standard level 2-key 3DES restricted to 106 plaintext/ciphertexts, protection from 2009 to 2020 96 1776 192 6 Medium-term protection 3-key 3DES, protection from 2009 to 2030 112 2432 224 7 Long-term protection Generic application-independent recommendation, protection from 2009 to 2040 128 3248 256 8 "Foreseeable future" Good protection against quantum computers 256 15424 512

Baseret på www.keylength.com

slide-18
SLIDE 18

Click to edit Master title style

Crypto check/wish list

Client-side encryption No trust in third parties Minimal user responsibility Full functionality

slide-19
SLIDE 19

Click to edit Master title style

Dropbox case study

Transparent integration Data hidden to Dropbox

slide-20
SLIDE 20

Click to edit Master title style

Storage-as-a-Service

Solution DYI Boxcryptor Secretsync completely privatefiles Tahoe Service(s) Anything dropbox dropbox box Any storage Client-side encryption yes Yes/ password based! yes yes yes Trust in third parties no no yes yes Divide-and- conquer Minimal user responsibilit y no no (yes) (yes) no Full functionality no no no no no

slide-21
SLIDE 21

Click to edit Master title style

IaaS/PaaS

Solution DYI Porticor CipherCloud Tahoe Service(s) Anything AWS Salesforce etc. Any storage Client-side encryption yes yes yes yes Trust in third parties no Divide-and- conquer no Divide-and- conquer Minimal user responsibility no yes yes no Full functionality no no tokenization no

IaaS PaaS SaaS

Built-in Added Total

slide-22
SLIDE 22

Click to edit Master title style

SaaS

Solution DYI Ciphercloud Voltage Service(s) Nope! Salesforce etc. SaaS eg. PCI Client-side encryption yes yes yes Trust in third parties no no no Minimal user responsibility no yes yes Full functionality no tokenization tokenization

IaaS PaaS SaaS

Built-in Added Total

slide-23
SLIDE 23

Click to edit Master title style

Summary

Client-side encryption No trust in third parties Minimal user responsibility Full functionality

slide-24
SLIDE 24

Click to edit Master title style

Crypto evolution

slide-25
SLIDE 25

Click to edit Master title style

More fancy abbreviations

Alexandra – Sikkerhed og Innovation i Skyen 25

SMC

  • Secure Multiparty Computation
  • Research since ’78
  • “Practical” since 2008

ABC

  • Attribute-Based Credentials
  • Research since at least ’83 (blind signatures)
  • Software “previews” available: U-Prove

(Microsoft) + IdentityMixer (IBM)

slide-26
SLIDE 26

Click to edit Master title style

SMC: Shallow confidentiality

Computation: decrypted! Storage: encrypted Local computation No real confidentiality

?!

web server..

slide-27
SLIDE 27

Click to edit Master title style

SMC: Deep confidentiality

Storage: encrypted web server.. Computation: encrypted!

Security Performance

Divide-and- conquer

slide-28
SLIDE 28

Click to edit Master title style SMC: energiauktion.dk (via partisia.com)

  • 3. Find

winner

  • 4. Make the deal
  • 2. Submit bids
  • 1. Define

auction 10 20 30 40 50 60 70 80 90 100 0-2 2-4 6-8 10-12 14-16 18-20 22-24 2-3 4-6 8-10 12-14 16-18 20-22 Usage Base cost SMC cost (amortized) Elasticity => confidentiality!

slide-29
SLIDE 29

Click to edit Master title style

ABC: Identity in the cloud (simplified)

IdP Jakob:

Shop, Arto, Skat, Love.dk, …

Jakob

Parent Citizen Above 18 Below 14 Unique person

“When you have a hammer…” !!! !!!

slide-30
SLIDE 30

Click to edit Master title style

ABC: properties

Existing properties (digital signatures/IdP)

  • Identification
  • Accountability

New desirable properties

  • Non-traceable/anonymitet

– IdP can’t trace your transactions

  • Unlinkable/pseudonymitet

– Eg. a provider can’t link your profile in a merger with another provider

  • Verified claims

– Eg. age og zipcode

  • Minimal disclosure

Can we have it all? Yes we can!

slide-31
SLIDE 31

Click to edit Master title style

ABC: Credentials

  • 1. “claims”

(attributes) 2. credential(token)

  • 3. Proof of claim

Using credential Claims provider

PKI: ID + pub key PKI: certificate PKI: signatur

slide-32
SLIDE 32

Click to edit Master title style

ABC: IdP vha. credentials (“on-demand”)

  • 3. Request token

+ credentials

  • 4. Signed token
  • 1. Request

access

  • 2. Request

token

  • 5. Signed token

Claims provider

slide-33
SLIDE 33

Click to edit Master title style

ABC: Anonymity

  • 1. “alder = 34”

(attributes) 2. credential(token)

  • 3. Alder > 18

Claims provider

CA can’t recognize user Claim certifed by CP

slide-34
SLIDE 34

Click to edit Master title style

ABC: Pseudonymity

  • 1. Alder = 34

2. credential(token)

  • 3. Alder > 18
  • 3. Alder > 15

Claims provider

slide-35
SLIDE 35

Click to edit Master title style

ABC: Selective disclosure

  • 1. claims:

name= Jakob cpr = 210781-1234 age= 34 zip= 8000

  • 2. Credential {

name= Jakob cpr = 210781-1234 age= 34 zip= 8000} _signed_by_CP

  • 3. Certificate {

navn = Jakob cpr = 210781-1234 age= 34 postnr = 8000} _signed_by_CP > 18

Claims provider

slide-36
SLIDE 36

Click to edit Master title style

ABC: Id-brug vha. credentials

ID=Fister Løgsovs Alder<15

Jakob:

??

Jakob

B ø r n I s k

  • l

e X

Identity Anonymity Unlinkability Verified claim (alder) Accountability

ID provider Kommunen

Credential { name = Jakob cpr = 210781-1234 age = 34} _signed_by_id- provider Credential { Child in school_X, Zipcode = 8230 } _signed_by_munici palityy

slide-37
SLIDE 37

Click to edit Master title style

ABC vs. signatur etc.

Egenskab Signatur ABC Identity ✔ ✔ Accountability ✔ ✔ Anonymity (non-traceability) ✗ ✔ Pseudonymity (unlinkability) ✗ ✔ Selective (minimal) disclosure ✗ ✔

slide-38
SLIDE 38

Click to edit Master title style

ABC and SMC

Solution DYI ABC SMC Service(s) Some Any Any Client-side encryption yes yes yes Trust in third parties no (yes) Divide-and- conquer Minimal user responsibility no (yes) (yes) Full functionality no (yes) yes

IaaS PaaS SaaS

Built-in Added Total

Curious…?

  • SMC: partisia.com
  • ABC: www.abc4trust.eu
slide-39
SLIDE 39

Click to edit Master title style

Jakob I. Pagter jakob.i.pagter@alexandra.dk

Thanks for you attention!