Resea earch I Institut ute e for
- r Se
Secure Sy Systems
Security on cloud storage and IaaS at Taiwan-Japan Workshop - - PowerPoint PPT Presentation
Resea earch I Institut ute e for or Se Secure Sy Systems Security on cloud storage and IaaS at Taiwan-Japan Workshop 2012/Nov/27 http://www.jst.go.jp/sicp/ws2012_nsc.html Kuniyasu Suzaki Research Institute for Secure Systems (RISEC)
Resea earch I Institut ute e for
Secure Sy Systems
Resea earch I Institut ute e for
Secure Sy Systems
Data Management
Client User
management
Security update Software Vulnerability ・Hypervisor ・Management Host OS Security Guideline
Auditing Standard
OS1 App1 OS2 App2 OS3 App3 Mem CPU Mem CPU Mem CPU Memory CPU Virtual Machine Monitor (hypervisor)
Auditing
Internet (Secure communication)
man in the middle attack Vulnerable safe (un-mature) Formal Verification To take high level EAL (Evaluation Assurance Level)
Resea earch I Institut ute e for
Secure Sy Systems
Resea earch I Institut ute e for
Secure Sy Systems
Resea earch I Institut ute e for
Secure Sy Systems
VM1 VM2 VM(n)
Real Physical Memory Guest Pseudo Memory
Resea earch I Institut ute e for
Secure Sy Systems
Resea earch I Institut ute e for
Secure Sy Systems
Resea earch I Institut ute e for
Secure Sy Systems
Resea earch I Institut ute e for
Secure Sy Systems
Resea earch I Institut ute e for
Secure Sy Systems
Resea earch I Institut ute e for
Secure Sy Systems
VM1 (victim) VM2 (attacker)
Real Physical Memory Guest Pseudo Memory
Write Access Re-created page cases access time difference VM1 (victim) VM2 (attacker) Attacker can guess existence of same contents on other VM.
Resea earch I Institut ute e for
Secure Sy Systems
Resea earch I Institut ute e for
Secure Sy Systems
Resea earch I Institut ute e for
Secure Sy Systems
Resea earch I Institut ute e for
Secure Sy Systems
Resea earch I Institut ute e for
Secure Sy Systems
User Admin
Mis-config
Uploader Secure Comm
Resea earch I Institut ute e for
Secure Sy Systems
Uploader Admin
Mis-config
User
Resea earch I Institut ute e for
Secure Sy Systems
NonCopy
Printer
VJSS (Jail Storage)
Provider A Provider B Provider C
Tally
Sever Side Client Side Encryption
AONT: All or Nothing Transform
Original Encoding
Read Solomon (3:4)
Decoding Decryption
+
Provider D
Network Cut&Paste Storage
Tally
Split tally
Small part of encrypted file is cut and stored in a client.
Resea earch I Institut ute e for
Secure Sy Systems
Okinawa Hokkaido (Sapporo) Tsukuba Taiwan
Resea earch I Institut ute e for
Secure Sy Systems
Resea earch I Institut ute e for
Secure Sy Systems
Resea earch I Institut ute e for
Secure Sy Systems