security and privacy for cloud computing
play

Security and Privacy for Cloud Computing Refik Molva Cloud - PowerPoint PPT Presentation

Security and Privacy for Cloud Computing Refik Molva Cloud Computing Outsourcing Storage Computation High availability No maintenance Decreased Costs Elasticity & Flexibility Security and Privacy for Cloud


  1. Security and Privacy for Cloud Computing Refik Molva

  2. Cloud Computing � Outsourcing � Storage � Computation � High availability � No maintenance � Decreased Costs � Elasticity & Flexibility Security and Privacy for Cloud Computing - R. Molva Slide 2

  3. Security & Privacy Challenges Outsourcing - Potentially untrusted Service Provider - Data storage and computations ⇒ New requirements (PoR, verifiability, . . .) ⇒ Crypto schemes dealing with untrusted partners � PIR � Secure multi-party computation � Computing with encrypted functions � Verifiability: proof of data possession, proof of execution Security and Privacy for Cloud Computing - R. Molva Slide 3

  4. Security & Privacy Challenges Large scale - Data - Computations ⇒ Severely asymmetric scenarios � Customer (verifier) << Service Provider (prover) � “Quantum leap”: classical schemes don’t work, need for new approaches � Example: integrity – customer cannot even keep a hash value per data split ⇒ Joint Crypto & Cloud schemes Security and Privacy for Cloud Computing - R. Molva Slide 4

  5. Security & Privacy Solutions � Privacy � Privacy preserving word search � Multi-user searchable encryption � Integrity � Proof of Retrievability � Message-locked PoR � Verifiability � Verifiable computation � Proof composition Security and Privacy for Cloud Computing - R. Molva Slide 5

  6. Privacy preserving word search Outsourced Backup Service Find Blocks including W � several years’ corporate data � regularly stored in the Cloud � Privacy � Encryption by the customer � Query: only a small portion needs to be restored � How to find it without downloading the entire DB? Requirement for a new solution � to search words in an encrypted DB � with privacy Security and Privacy for Cloud Computing - R. Molva Slide 6

  7. Privacy preserving word search � Existing solutions not scalable � Encrypted keyword search algorithms � Private information retrieval (PIR) � PRISM: Privacy preserving search in MapReduce � Data and query privacy � Idea: PIR on intermediate data maps � Advantage: parallelism with MapReduce Security and Privacy for Cloud Computing - R. Molva Slide 7

  8. PRISM - Upload [PETS’12] File w 0 , w 1 , . . . . w n-1 WordEncrypt E(w 0 ) , E(w 1 ) , . . . . E(w n-1 ) User Upload Cloud E(w i ) , . . . E(w j ) E(w k ) , . . . E(w l ) E(w m ) , . . . E(w n ) E(w u ) , . . . E(w v ) Mapper hash(E(w i )) X,Y, b X Binary Map Y b Security and Privacy for Cloud Computing - R. Molva Slide 8

  9. PRISM – Word Search Query for word w hash(E(w)) X,Y, b PIR query for (X,Y) User Cloud Mapper Binary Map PIR(X,Y) x PIR(X,Y) x PIR(X,Y) x PIR(X,Y) x ∑ homomorphic Reducer User E(result) Security and Privacy for Cloud Computing - R. Molva Slide 9

  10. Multi-user Searchable Encryption (MUSE) Multiple Readers Multiple Writers Security and Privacy for Cloud Computing - R. Molva Slide 10 10

  11. SotA - Access pattern leakage [PETS’17] � Iterative Testing Each encrypted keyword is tested separately in all documents - Similarities between documents & position of the keyword revealed - Collusion (CSP, User) ⇒ Privacy Breach Security and Privacy for Cloud Computing - R. Molva Slide 11

  12. MUSE: Multi-User Searchable Encryption [ISC’15] No collusion between Proxy and CSP Security and Privacy for Cloud Computing - R. Molva Slide 12 12

  13. Cloud Security Research � Privacy � Privacy preserving word search � Multi-user searchable encryption � Integrity � Proof of Retrievability � Message-locked PoR � Verifiability � Verifiable computation � Proof composition Security and Privacy for Cloud Computing - R. Molva Slide 13

  14. Proof of Retrievability � Motivating scenario: outsourced storage Is my data still there? � Requirements � Integrity check by Client � No data stored at Client � No bulk data transfer � Proof of Retrievability (POR) Security and Privacy for Cloud Computing - R. Molva Slide 14

  15. Proof of Retrievability – Related Work � Related work [Deswarte et. al, Filho et. al, ...] � Deterministic � Verification of the entire data ⇒ costly � Probabilistic [Ateniese et. al, Shacham et.al, Juels et al, ...] � Tags for each block + random verification ⇒ cost of homomorphic ops � randomly located sentinels => limited # of verifications � StealthGuard [ESORICS’14] � privacy preserving search of watchdogs � Unbounded # of queries Security and Privacy for Cloud Computing - R. Molva Slide 15

  16. Proof of Retrievability - StealthGuard E n c r w w y p w t Security and Privacy for Cloud Computing - R. Molva Slide 16

  17. Proof of Retrievability – StealthGuard Word Search Query (PRISM) w 1 w 2 w 3 w 4 w n Yes/No Yes/No Yes/No Yes/No Yes/No Missing word Missing data split Security and Privacy for Cloud Computing - R. Molva Slide 17

  18. How many watchdogs to check? or how to detect lack of Setup by Client retrievability? Adversary Model: Error-correction Bernoulli processes � _ ��� ⇒ Error-correction � � � ���, � ��� , �� Retrievability: � ��� � � � Permutation File not retrievable: � ��� � � � � � ���, � � � Detection: Encryption Watchdog insertion W W W W Security and Privacy for Cloud Computing - R. Molva Slide 18

  19. The Integration Problem Cloud Operations Data reduction Availability Computation efficiency Multi-tenancy Low performance or Severe conflict Security & Privacy Data confidentiality Data Integrity Privacy preserving processing Verifiability Security and Privacy for Cloud Computing - R. Molva Slide 19

  20. Conflict between PoR & deduplication � PoR → User specific encoding � Deduplication → Keep a unique copy in storage PoR PoR No Deduplication Security and Privacy for Cloud Computing - R. Molva Slide 20

  21. Message-locked PoR - Idea � PoR setup (Tags and Watchdogs) � PoR can be represented by � �, � � Derive � from file content Convergent Encryption ( K= H(F) ) suffers from dictionary attacks ⇒ Secure Message-Locked Key Generation Security and Privacy for Cloud Computing - R. Molva Slide 21

  22. Message-locked PoR [CCSW’16] � Secure Message-Locked Key Generation � � � ' � � � '( ) � �' Key Server * KS � � ← % & � '( ∗ �, � ← " # � '() � ' Data F Key Server � � ') Owner KS + � Message-locked PoR = PoR using ,- � �, � � StealthGuard – watchdogs � Private Compact PoR - tags [Shacham et al 2008] Security and Privacy for Cloud Computing - R. Molva Slide 22

  23. Cloud Security Research � Privacy � Privacy preserving word search � De-duplication on encrypted data � Integrity � Proof of Retrievability � Verifiability � Verifiable computation � Proof composition Security and Privacy for Cloud Computing - R. Molva Slide 23

  24. Verifiable Computation Setup Problem Generation Computation Verification � ., � . � ? � Compute � . 1 � � . , 0 Compute Proof 0 Verify ., 1, 0 R1: Cost(Verify) ≪ Cost(Compute) R2: Public delegatability [Parno et al. 2012] Anyone can submit a computation request R3: Public verifiability [Parno et al. 2012] Anyone can verify a computation result Security and Privacy for Cloud Computing - R. Molva Slide 24

  25. Verifiability for 3 Operations � ., � . � ? � , 1 � � . , 0 Compute � . and 0 Verify ., 1, 0 High-Degree Large Matrix Conjunctive Polynomial Evaluation Multiplication Keyword Search � � 3 � 4 5 6 3 6 ∈ 8 9 :3; �B� � >. . with @ � > 6A ∈ 8 9 Search(.) 6<= . � . C , . D , … , . � ⟙ ∈ 8 9 � . . ∈ 8 9 Keywords G � HI C , I D , … , I � J 1 � 1 C , 1 D , … , 1 � ⟙ � >. ∈ 8 9 � 1 � � . ∈ 8 9 1 ID of files � 6 such that G ⊂ � 6 Security and Privacy for Cloud Computing - R. Molva Slide 25

  26. [AsiaCCS 2016] Verifiable Polynomial Evaluation – Idea Euclidean Division of Polynomials � � LM N O ��, L� �M, O� ., � . � ? ��, L� 1, 0 Compute 1 � � . 0 � L�.� Verify 1 � 0 M . N O . ? M, O small degree Security and Privacy for Cloud Computing - R. Molva Slide 26

  27. [AsiaCCS 2016] Verifiable Matrix Multiplication – Idea Auxiliary Matrices P � Q> N O O pseudo-random �>, P� ., >. � ? O �>, P� 1, 0 Compute 1 � >. Verify 0 � P. 0 � Q1 N O. ? Projection R ∙ 0 � R ∙ Q1 N R ∙ O. Security and Privacy for Cloud Computing - R. Molva Slide 27

  28. Cloud Security Research � Privacy � Privacy preserving word search � De-duplication on encrypted data � Integrity � Proof of Retrievability � Verifiability � Verifiable computation � Proof composition Security and Privacy for Cloud Computing - R. Molva Slide 28

  29. Proof Composition Problem Verifiability of general program P(x) purpose programs 5 ≔ � . ] ≔ M 5 - Efficient methods for handling ⁞ sequence of operations Pinocchio [Parno et al] ^ ≔ _ 1 - Efficient schemes for a single very complex operation Example: - No technique achieving both program NN2(x) 5 ≔ > C . . x purposes ] ≔ bcde 5 c ≔ M 2 . b Security and Privacy for Cloud Computing - R. Molva Slide 29

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend