Data protection by means of fragmentation Summer school on - - PowerPoint PPT Presentation

data protection by means of fragmentation
SMART_READER_LITE
LIVE PREVIEW

Data protection by means of fragmentation Summer school on - - PowerPoint PPT Presentation

Data protection by means of fragmentation Summer school on real-world crypto and privacy Katarzyna KAPUSTA Self introduction PhD Student at Telecom ParisTech Universite Paris-Saclay Supervisor: Gerard MEMMI Subject: data fragmentation


slide-1
SLIDE 1

Data protection by means of fragmentation

Summer school on real-world crypto and privacy

Katarzyna KAPUSTA

slide-2
SLIDE 2

Self introduction

 PhD Student at Telecom ParisTech Universite Paris-Saclay  Supervisor: Gerard MEMMI  Subject: data fragmentation and dispersal as a way of data

protection

 Education and previous experience:

 M.Eng. Telecom ParisTech Universite Paris-Saclay, Paris, France  M.Sc. AGH University of Science and Technology, Cracow, Poland  Previous work experience :

 Security consultant, E&Y, Paris  Software developer at Thales Communications & Security, Paris  Software developer intern at CERN, Geneva

slide-3
SLIDE 3

Why do we need fragmentation?

 The security of encrypted data depends on the chosen

algorithm, as well as on the strength and the secure storage of its key

 Fragmenting data into multiple fragments and dispersing these

fragments over various locations aims at frustrating an attacker

 Nowadays, fragmentation is enabled by the cloud environment

(large number of servers, multiple data centers) and already used for data resilience purposes (RAID, Hadoop)

slide-4
SLIDE 4

Our division of data fragmentation

 Bitwise: fragmenting data without any consideration for

their structure, their semantics, or their uneven level of confidentiality

  • Techniques: perfect or computational secret sharing,

information dispersal algorithms

 Structurewise: exploiting data structures, multi-level

confidentiality, and machine trustworthiness

  • Techniques: database fragmentation, selective encryption
slide-5
SLIDE 5

Fragmentation in the cloud: issues

 Physical location control vs. virtualization

 How to ensure secure data separation? Bare-metal cloud?

Special agreement? Hybrid cloud? Coarse-grained solution: multi-cloud

 Latency problems: combining fragmentation with

parallelization

 Defining security levels without user interaction for

fragmentation of structured data

slide-6
SLIDE 6

Fragmentation in the cloud: desired architectural traits

slide-7
SLIDE 7

Improving information dispersal

  • Information Dispersal Algorithms (IDAs): a space-efficient keyless way to

fragment and add resilience to data at the same time

  • Used mostly in transmission scenarios
  • Problem: lack of data protection, patterns are preserved inside the

fragments

  • Solution: a dispersal scheme that keeps the main properties of the IDAs

while improving data protection (and also performance)

Original IDA Our algorithm

slide-8
SLIDE 8

Improving information dispersal

 Performance comparison with relevant works in an IoT

scenario

20 40 60 80 100 120

2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20

MB/s

Number of fragments needed for data recovery (K)

Our proposal IDA AONT-RS / RC4 + MD5 AONT-RS / AES-128 + SHA-256 Shamir Secret Sharing

slide-9
SLIDE 9

References:

 K. Kapusta, G. Memmi, and H.Noura, ”POSTER: A Keyless

Efficient Algorithm for Data Protection by Means of Fragmentation”, in ACM CCS 2016, Vienna, 2016.

 K. Kapusta and G. Memmi, ”Data protection by means of

fragmentation in several distributed storage systems”, in CFIP- Notere, Paris, 2015.

 G. Memmi, K.Kapusta, and H.Qiu, ”Data protection by means

  • f fragmentation in several distributed storage systems”, in

Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC), 2015

 G. Memmi, K.Kapusta, and H.Qiu, ”Data Protection: Combining

Fragmentation, Encryption, and Dispersion, an intermediary report”, ITEA2-CAP WP3 Intermediary Report, June 2015.

slide-10
SLIDE 10

Thank you! 