CS573 Data privacy and security in the cloud
Slide credits: Ragib Hasan, Johns Hopkins University
CS573 Data privacy and security in the cloud in the cloud Slide - - PowerPoint PPT Presentation
CS573 Data privacy and security in the cloud in the cloud Slide credits: Ragib Hasan, Johns Hopkins University What is Cloud Computing ? Lets hear from the experts 2 What is Cloud Computing ? The infinite wisdom of the crowds (via
Slide credits: Ragib Hasan, Johns Hopkins University
2
3
The infinite wisdom of the crowds (via Google Suggest)
We’ve redefined Cloud Computing to include everything that we already do. . . . I don’t understand what we would do differently in the light of Cloud Computing other than
4
Larry Ellison, founder of Oracle light of Cloud Computing other than change the wording of some of our ads.
5
Richard Stallman GNU
6
Ron Rivest The R of RSA
7
That is, use as much or as less you need, use only when you want, and pay only what you use,
8
Ahead of time … lack of communication tech.
(In other words, there was NO (public) Internet)
And personal computer became cheaper and stronger
9
10
11
e.g., Web browser SaaS , e.g., Google Docs PaaS, e.g., Google AppEngine
12
PaaS, e.g., Google AppEngine IaaS, e.g., Amazon EC2
Clouds are still subject to traditional data confidentiality, integrity, availability, and privacy issues, plus some additional attacks
13
additional attacks
14
[Chow09ccsw]
15
16
17
18
19
1/31/2011 en.600.412 Spring 2011
20
1/31/2011 en.600.412 Spring 2011
21
Securing a traditional system Securing a cloud
22
Analogy Securing a house Securing a motel Owner and user are
Owner and users are almost invariably distinct entities
23
Securing a house Securing a motel Biggest user concerns Securing perimeter Checking for intruders Securing assets Biggest user concern Securing room against (the bad guy in next room | hotel owner)
24
25
A cloud is shared by multiple users Malicious users can now legally be in the same infrastructure Misusing co-tenancy, attackers can launch side channel attacks on victims
Example: the Topology attack on Amazon EC2 (“Hey You! Get
Research question: How to prevent attackers from exploiting co-tenancy in attacking the infrastructure and/or other clients?
26
Clients have no idea of or control over what is happening inside the cloud Clients are forced to trust cloud providers completely
27
Research Question: How do we design cloud computing architectures that are semi-transparent and provide clients with control over security?
Existing Approaches: TCCP (uses TPM), CloudProof
28
Problem: Dishonest cloud providers can throw data away or lose data. Malicious intruders can delete or tamper with data. Clients need reassurance that the outsourced data is available, has not been tampered with, and remains confidential. Research Question: How can clients get assurance/proofs that the cloud provider is actually storing data, is not tampering with data, and can make the data available on-demand? has not been tampered with, and remains confidential.
29
Example Approaches: Provable Data Possession (PDP), Proof of Retrievability (PoR), HAIL
Most type of computations require decrypting data before any computations If the cloud provider is not trusted, this may result in breach of confidentiality
30
breach of confidentiality Research Question: How can we ensure confidentiality of data and computations in a cloud?
Existing Approaches: Homomorphic encryption, TCCP
Scenario User sends her data processing job to the cloud. Clouds provide dataflow operation as a service (e.g., MapReduce, Hadoop etc.) Problem: Users have no way of evaluating the correctness of results
31
Research question: How can we verify the accuracy of outsourced computation?
Existing Approaches: Runtime Attestation, Majority voting, Redundant operations
Adversaries can rent clouds temporarily to create a large scale botnet very quickly Clouds can be used for spamming, Clouds can be used for spamming, Denial of service, brute force password breaking, and other attacks Research question: How can we rapidly detect misbehavior
Example: WPACracker.com – a password cracking service that claims to test 300,000,000 words in 20 minutes for $17, using a cloud
32
33
John Chambers CISCO CEO
34
35
36
37
38