data sovereignty
play

Data Sovereignty The importance of geolocating data in the cloud - PowerPoint PPT Presentation

HotCloud 2011 Data Sovereignty The importance of geolocating data in the cloud Zachary N J Peterson Mark Gondree Rob Beverly Your Data is Here But, maybe it should be here Or Here? Breaking the Abstraction Is data within some political


  1. HotCloud 2011 Data Sovereignty The importance of geolocating data in the cloud Zachary N J Peterson Mark Gondree Rob Beverly

  2. Your Data is Here

  3. But, maybe it should be here

  4. Or Here?

  5. Breaking the Abstraction Is data within some political boundary Privacy protections Intellectual property protections Regulatory compliance Has data been replicated

  6. Existing Notions of Location in the Cloud Regions of service Content-distribution networks Location guaranteed only by service-level agreements and quality of service metrics No interfaces or external techniques for establishing the location of remote data

  7. Data Sovereignty

  8. Data Sovereignty Protocols for establishing the location and authenticity of data in the cloud In scope : Efficiently positioning some copy of data within some geopolitical boundary Not in scope : the location of any copy of data

  9. State of the Art

  10. Geolocation Geolocation of hosts (NICs) Evidence gathering (whois, extrinsic evidence) Delay-based measurements Wang et al. NSDI ‘10: Street-level geolocation

  11. Possession of Data Provable Data Possession (PDP) & Proofs of Retrievability (POR) Probabilistic challenge & response protocols Designed to minimize storage, computation, communication complexity Techniques: Homomorphic signatures, PRFs, BLS signatures, MACs

  12. Naïve Composition Naïvely composing geolocation & PDP ( e.g. serially) provides limited assurance Data exists somewhere , and the responder is within some physical bound (Not: the data exists within some physical bound)

  13. Adversaries DS considers a more powerful adversary One who may actively fool the challenger e.g. act as proxy for remote storage, cache subsets of data, manipulate delay measurements Adding delay increases perceived distance

  14. An Initial Approach

  15. An Initial Approach Leverage MAC-PDP: Tag : t i = HMAC k (D i ) Store : <D i , t i > Challenge : <D c , t c > for c indices Verify : HMAC k (D c ) =? t c

  16. An Initial Approach Augment MAC-PDP with network delay measurements Query blocks one at a time, randomly Measure the response time Single response verifies data authenticity and calculates distance

  17. ? 68ms ? Single Challenger

  18. 68ms Multiple Challengers

  19. An Initial Approach Requires no server-side computation Can be implemented on existing infrastructure, as part of an SLA compliance tool But, at a high communication cost And, susceptible to honest, variable overheads

  20. Future Directions Evaluation of our initial idea Landmark placement and operation More efficient and less adversarial DS schemes Given existing infrastructure Given some future infrastructure Ways to bind computation to a location

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend