Security and Privacy for Cloud Computing Refik Molva Cloud - - PowerPoint PPT Presentation

security and privacy for cloud computing
SMART_READER_LITE
LIVE PREVIEW

Security and Privacy for Cloud Computing Refik Molva Cloud - - PowerPoint PPT Presentation

Security and Privacy for Cloud Computing Refik Molva Cloud Computing Outsourcing Storage Computation High availability No maintenance Decreased Costs Elasticity & Flexibility Security and Privacy for Cloud


slide-1
SLIDE 1

Refik Molva

Security and Privacy for Cloud Computing

slide-2
SLIDE 2

High availability No maintenance Decreased Costs Elasticity & Flexibility

Cloud Computing

Security and Privacy for Cloud Computing - R. Molva

Outsourcing

Storage Computation

Slide 2

slide-3
SLIDE 3

Outsourcing

  • Potentially untrusted Service Provider
  • Data storage and computations

⇒ New requirements (PoR, verifiability, . . .) ⇒ Crypto schemes dealing with untrusted partners

PIR Secure multi-party computation Computing with encrypted functions Verifiability: proof of data possession, proof of execution

Security & Privacy Challenges

Security and Privacy for Cloud Computing - R. Molva Slide 3

slide-4
SLIDE 4

Large scale

  • Data
  • Computations

⇒ Severely asymmetric scenarios

Customer (verifier) << Service Provider (prover) “Quantum leap”: classical schemes don’t work, need for new approaches Example: integrity – customer cannot even keep a hash value per data split

⇒ Joint Crypto & Cloud schemes

Security & Privacy Challenges

Security and Privacy for Cloud Computing - R. Molva Slide 4

slide-5
SLIDE 5

Privacy

Privacy preserving word search Multi-user searchable encryption

Integrity

Proof of Retrievability Message-locked PoR

Verifiability

Verifiable computation Proof composition

Security & Privacy Solutions

Security and Privacy for Cloud Computing - R. Molva Slide 5

slide-6
SLIDE 6

Outsourced Backup Service several years’ corporate data regularly stored in the Cloud Privacy Encryption by the customer Query: only a small portion needs to be restored How to find it without downloading the entire DB? Requirement for a new solution to search words in an encrypted DB with privacy

Privacy preserving word search

Find Blocks including W

Security and Privacy for Cloud Computing - R. Molva Slide 6

slide-7
SLIDE 7

Existing solutions not scalable

Encrypted keyword search algorithms Private information retrieval (PIR)

PRISM: Privacy preserving search in MapReduce

Data and query privacy Idea: PIR on intermediate data maps Advantage: parallelism with MapReduce

Privacy preserving word search

Security and Privacy for Cloud Computing - R. Molva Slide 7

slide-8
SLIDE 8

PRISM - Upload

Mapper Binary Map

User Cloud

File Upload WordEncrypt

E(w0) , E(w1) , . . . . E(wn-1) w0, w1, . . . . wn-1

E(wi) , . . . E(wj) E(wk) , . . . E(wl) E(wu) , . . . E(wv) E(wm) , . . . E(wn)

hash(E(wi)) X,Y, b X Y b

[PETS’12]

Security and Privacy for Cloud Computing - R. Molva Slide 8

slide-9
SLIDE 9

PRISM – Word Search

Mapper Reducer

E(result) Query for word w homomorphic

User Cloud

PIR query for (X,Y)

hash(E(w)) X,Y, b

PIR(X,Y) x PIR(X,Y) x PIR(X,Y) x PIR(X,Y) x

User

Binary Map

Security and Privacy for Cloud Computing - R. Molva Slide 9

slide-10
SLIDE 10

Slide 10

Multi-user Searchable Encryption (MUSE)

Security and Privacy for Cloud Computing - R. Molva 10

Multiple Readers Multiple Writers

slide-11
SLIDE 11

Iterative Testing Collusion (CSP, User) ⇒ Privacy Breach

SotA - Access pattern leakage [PETS’17]

Security and Privacy for Cloud Computing - R. Molva

  • Each encrypted keyword is tested separately in all documents
  • Similarities between documents & position of the keyword revealed

Slide 11

slide-12
SLIDE 12

Slide 12

MUSE: Multi-User Searchable Encryption

[ISC’15]

Security and Privacy for Cloud Computing - R. Molva 12

No collusion between Proxy and CSP

slide-13
SLIDE 13

Privacy

Privacy preserving word search Multi-user searchable encryption

Integrity

Proof of Retrievability Message-locked PoR

Verifiability

Verifiable computation Proof composition

Cloud Security Research

Security and Privacy for Cloud Computing - R. Molva Slide 13

slide-14
SLIDE 14

Motivating scenario: outsourced storage

Proof of Retrievability

Requirements

Integrity check by Client No data stored at Client No bulk data transfer Is my data still there?

Proof of Retrievability (POR)

Security and Privacy for Cloud Computing - R. Molva Slide 14

slide-15
SLIDE 15

Related work

Deterministic

Verification of the entire data ⇒ costly

Probabilistic Tags for each block + random verification ⇒ cost of homomorphic ops

randomly located sentinels => limited # of verifications

StealthGuard

privacy preserving search of watchdogs Unbounded # of queries

Proof of Retrievability – Related Work

[Ateniese et. al, Shacham et.al, Juels et al, ...] [Deswarte et. al, Filho et. al, ...]

[ESORICS’14]

Security and Privacy for Cloud Computing - R. Molva Slide 15

slide-16
SLIDE 16

Proof of Retrievability - StealthGuard

E n c r y p t

w w w

Security and Privacy for Cloud Computing - R. Molva Slide 16

slide-17
SLIDE 17

Yes/No Yes/No Yes/No Yes/No

Proof of Retrievability – StealthGuard

Word Search Query (PRISM)

wn w4 w3 w2 w1

Missing word Missing data split

Yes/No

Security and Privacy for Cloud Computing - R. Molva Slide 17

slide-18
SLIDE 18

How many watchdogs to check?

  • r how to detect lack of

retrievability?

Adversary Model: Bernoulli processes _ ⇒ Error-correction , , Retrievability: File not retrievable: Detection:

,

W W W W

Error-correction Permutation Encryption Watchdog insertion

Setup by Client

Security and Privacy for Cloud Computing - R. Molva Slide 18

slide-19
SLIDE 19

The Integration Problem

Security and Privacy for Cloud Computing - R. Molva

Low performance

  • r

Severe conflict Cloud Operations

Data reduction Availability Computation efficiency Multi-tenancy

Security & Privacy

Data confidentiality Data Integrity Privacy preserving processing Verifiability

Slide 19

slide-20
SLIDE 20

Conflict between PoR & deduplication

PoR → User specific encoding Deduplication → Keep a unique copy in storage

No Deduplication PoR PoR

Security and Privacy for Cloud Computing - R. Molva Slide 20

slide-21
SLIDE 21

Message-locked PoR - Idea

PoR setup (Tags and Watchdogs) PoR can be represented by , Derive from file content

Convergent Encryption ( K= H(F) ) suffers from dictionary attacks

⇒ Secure Message-Locked Key Generation

Security and Privacy for Cloud Computing - R. Molva Slide 21

slide-22
SLIDE 22

Message-locked PoR [CCSW’16]

Data Owner F

Secure Message-Locked Key Generation

Key Server KS

  • ,

← "#

← % & '

' '( '()

'( ) ')

'

*

Key Server KS+

Message-locked PoR = PoR using ,- ,

StealthGuard – watchdogs Private Compact PoR - tags [Shacham et al 2008]

Security and Privacy for Cloud Computing - R. Molva Slide 22

slide-23
SLIDE 23

Privacy

Privacy preserving word search De-duplication on encrypted data

Integrity

Proof of Retrievability

Verifiability

Verifiable computation Proof composition

Cloud Security Research

Security and Privacy for Cloud Computing - R. Molva Slide 23

slide-24
SLIDE 24

Verifiable Computation

., . ?

Compute . Compute Proof 0

1 . , 0

Verify ., 1, 0

  • Setup

Problem Generation Verification Computation

R3: Public verifiability

Anyone can verify a computation result

R2: Public delegatability

Anyone can submit a computation request

R1: Cost(Verify) ≪ Cost(Compute)

[Parno et al. 2012] [Parno et al. 2012]

Security and Privacy for Cloud Computing - R. Molva Slide 24

slide-25
SLIDE 25

Verifiability for 3 Operations

High-Degree Polynomial Evaluation Large Matrix Multiplication Conjunctive Keyword Search

  • .

1 3 4 5636 ∈ 89:3;

  • 6<=

. ∈ 89 1 . ∈ 89 >. . with @ >6A ∈ 89

B

. .C, .D, … , . ⟙ ∈ 89

  • 1 1C, 1D, … , 1 ⟙ >. ∈ 89
  • ., . ?

Compute . and 0 Verify ., 1, 0 1 . , 0 Search(.) Keywords G HIC, ID, … , IJ ID of files 6 such that G ⊂ 6

,

Security and Privacy for Cloud Computing - R. Molva Slide 25

slide-26
SLIDE 26

Verifiable Polynomial Evaluation – Idea

Euclidean Division of Polynomials

LM N O

., . ? 1, 0

Compute 1 . 0 L.

Verify 1 0 M . N O . ?

M, O , L , L

[AsiaCCS 2016]

M, O small degree

Security and Privacy for Cloud Computing - R. Molva Slide 26

slide-27
SLIDE 27

Verifiable Matrix Multiplication – Idea

Auxiliary Matrices

P Q> N O

O pseudo-random

., >. ? 1, 0

Compute 1 >. 0 P.

Verify 0 Q1 N O. ?

O >, P

Projection R ∙ 0 R ∙ Q1 N R ∙ O.

>, P

[AsiaCCS 2016]

Security and Privacy for Cloud Computing - R. Molva Slide 27

slide-28
SLIDE 28

Privacy

Privacy preserving word search De-duplication on encrypted data

Integrity

Proof of Retrievability

Verifiability

Verifiable computation Proof composition

Cloud Security Research

Security and Privacy for Cloud Computing - R. Molva Slide 28

slide-29
SLIDE 29

Verifiability of general purpose programs

  • Efficient methods for handling

sequence of operations Pinocchio [Parno et al]

  • Efficient schemes for a single

very complex operation

  • No technique achieving both

purposes

Proof Composition Problem

Security and Privacy for Cloud Computing - R. Molva

program P(x) 5 ≔ . ] ≔ M 5

^ ≔ _ 1

Slide 29

Example: program NN2(x) 5 ≔ >C. . x ] ≔ bcde 5 c ≔ M2 . b

slide-30
SLIDE 30

program P(x) 5 ≔ . ] ≔ h 5 f : high complexity g : low complexity GV : verifiability for a sequence of operations (Pinocchio) SV : verifiability for a complex function (product of very large matrices)

Proof Composition - Problem

Security and Privacy for Cloud Computing - R. Molva Slide 30

slide-31
SLIDE 31

Outsourced proof generation

Proof Composition - Idea

Security and Privacy for Cloud Computing - R. Molva

fx SV Verify ∏SVfx gfx GV ∏SVfx ∏GVPx

PROVER

Slide 31

slide-32
SLIDE 32

Privacy Integrity Verifiability Outlook

Efficient & practical Integration - S&P with Cloud, DB “New topics”

Secure deletion Proof of reliability Verifiability / location, physical memory

Conclusion

Outsourcing Big Data

Security and Privacy for Cloud Computing - R. Molva Slide 32

slide-33
SLIDE 33

EU Projects Collaborators

Julien Keuffer, Iraklis Leontiadis, Pasquale Puzio, Cédric Van Rompay, Dimitrios Vasilopoulos Monir Azraoui, Erik Blass, Roberto Di Pietro, Kaoutar Elkhiyaoui, Melek Önen

Acknowledgments

Security and Privacy for Cloud Computing - R. Molva Slide 33

slide-34
SLIDE 34
  • A leakage-abuse attack against multi-user searchable encryption, C. Van Rompay, R.

Molva, M. Önen, PETS 2017

  • Reconciling security and functional requirements in multi-tenant clouds, G. Karame, M.

Neugschwandtner, M. Önen, H. Ritzdorf, SCC 2017

  • Message-locked proofs of retrievability with secure deduplication, D. Vasilopoulos, M.

Önen, Melek; K. Elkhiyaoui, R. Molva, CCSW 2016

  • Efficient Techniques for Publicly Verifiable Delegation of Computation, M. Azraoui, K.

Elkhiyaoui, M. Önen, R. Molva, ASIACCS 2016

  • PUDA- Privacy and Unforgeability for Data Aggregation, I. Leontiadis, K. Elkhiyaoui, M.

Önen, R. Molva, in CANS 2015

  • Publicly verifiable conjunctive keyword search in outsourcing databases, M. Azraoui, K.

Elkhiyaoui, M. Önen, R. Molva, SPC 2015,

  • Multi-user searchable encryption in the cloud, C. Van Rompay, R. Molva, M. Önen, ISC’15
  • PerfectDedup, P. Puzio, R. Molva, M. Önen, S. Loureiro, DPM 2015
  • StealthGuard: Proofs of Retrievability with hidden watchdogs, M. Azraoui, K. Elkhiyaoui,
  • R. Molva, M Önen, ESORICS 2014

Papers

Security and Privacy for Cloud Computing - R. Molva Slide 34

slide-35
SLIDE 35
  • Privacy preserving delegated word search, K. Elkhiyaoui, M. Önen, R. Molva, SECRYPT

2014

  • A-PPL: An accountability policy language, M. Azraoui, K. Elkhiyaoui, M. Önen, K.

Bernsmed, A. Santana de Oliveira, J. Sendor, DPM 2014

  • Private and dynamic time-series data aggregation with trust relaxation, I. Leontiadis, K.

Elkhiyaoui, R. Molva, CANS 2014

  • Privacy preserving statistics in the smart grid, I. Leontiadis, R. Molva, M. Önen, DASEC

2014

  • ClouDedup:Secure deduplication with encrypted data for cloud storage, P. Puzio, R.

Molva, M. Ӧnen, S. Loureiro, CLOUDCOM 2013

  • Privacy preserving delegated word-search in the cloud, K. Elkhiyaoui, M. Ӧnen, R. Molva,

TCLOUDS 2013

  • PRISM- Privacy preserving Search in Map Reduce, E.-O. Blass, R. Di Pietro, R. Molva, M.

Önen, PETS 2012

Papers (cont’d)

Security and Privacy for Cloud Computing - R. Molva Slide 35

slide-36
SLIDE 36

THANK YOU