“Ensuring distributed accountability for data sharing in the cloud”

Slides:



Advertisements
Similar presentations
Thomas S. Messerges, Ezzat A. Dabbish Motorola Labs Shin Seung Uk.
Advertisements

Security by Design A Prequel for COMPSCI 702. Perspective “Any fool can know. The point is to understand.” - Albert Einstein “Sometimes it's not enough.
Chapter 23 Database Security and Authorization Copyright © 2004 Pearson Education, Inc.
Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
Confidentiality and Privacy Controls
DICOM INTERNATIONAL DICOM INTERNATIONAL CONFERENCE & SEMINAR April 8-10, 2008 Chengdu, China DICOM Security Eric Pan Agfa HealthCare.
Database Management System
DESIGNING A PUBLIC KEY INFRASTRUCTURE
WAP Public Key Infrastructure CSCI – Independent Study Fall 2002 Jaleel Syed Presentation No 5.
16.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Cambodia-India Entrepreneurship Development Centre - : :.... :-:-
Security Management.
1 Chapter Overview Managing Compression Managing Disk Quotas Increasing Security with EFS Using Disk Defragmenter, Check Disk, and Disk Cleanup.
Alexander Potapov.  Authentication definition  Protocol architectures  Cryptographic properties  Freshness  Types of attack on protocols  Two-way.
11 CERTIFICATE SERVICES AND SECURE AUTHENTICATION Chapter 10.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
D ATABASE S ECURITY Proposed by Abdulrahman Aldekhelallah University of Scranton – CS521 Spring2015.
Key Management Lifecycle. Cryptographic key management encompasses the entire lifecycle of cryptographic keys and other keying material. Basic key management.
Computer Security Tran, Van Hoai Department of Systems & Networking Faculty of Computer Science & Engineering HCMC University of Technology.
Engineering Security Requirement
Cong Wang1, Qian Wang1, Kui Ren1 and Wenjing Lou2
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
Secure Electronic Transaction (SET)
Cryptography and Network Security
Eng. Wafaa Kanakri Second Semester 1435 CRYPTOGRAPHY & NETWORK SECURITY Chapter 1:Introduction Eng. Wafaa Kanakri UMM AL-QURA UNIVERSITY
Security Security is a measure of the system’s ability to protect data and information from unauthorized access while still providing access to people.
Trusted Computing BY: Sam Ranjbari Billy J. Garcia.
DATA DYNAMICS AND PUBLIC VERIFIABILITY CHECKING WITHOUT THIRD PARTY AUDITOR GUIDED BY PROJECT MEMBERS: Ms. V.JAYANTHI M.E Assistant Professor V.KARTHIKEYAN.
Security in Virtual Laboratory System Jan Meizner Supervisor: dr inż. Marian Bubak Consultancy: dr inż. Maciej Malawski Master of Science Thesis.
General Key Management Guidance. Key Management Policy  Governs the lifecycle for the keying material  Hope to minimize additional required documentation.
Cryptography, Authentication and Digital Signatures
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
© Oxford University Press 2011 DISTRIBUTED COMPUTING Sunita Mahajan Sunita Mahajan, Principal, Institute of Computer Science, MET League of Colleges, Mumbai.
System Security Chapter no 16. Computer Security Computer security is concerned with taking care of hardware, Software and data The cost of creating data.
Cryptography and Network Security (CS435) Part Fourteen (Web Security)
10. Key Management. Contents Key Management  Public-key distribution  Secret-key distribution via public-key cryptography.
Chapter 21 Distributed System Security Copyright © 2008.
1 SSL - Secure Sockets Layer The Internet Engineering Task Force (IETF) standard called Transport Layer Security (TLS) is based on SSL.
Evoting using collaborative clustering Justin Gray Osama Khaleel Joey LaConte Frank Watson.
What security is about in general? Security is about protection of assets –D. Gollmann, Computer Security, Wiley Prevention –take measures that prevent.
. 1. Computer Security Concepts 2. The OSI Security Architecture 3. Security Attacks 4. Security Services 5. Security Mechanisms 6. A Model for Network.
Database Security Tampere University of Technology, Introduction to Databases. Oleg Esin.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
Java Security Session 19. Java Security / 2 of 23 Objectives Discuss Java cryptography Explain the Java Security Model Discuss each of the components.
Under The Guidance of Smt. Ch.Ratna Kumari Asst.Professor Submitted by M Ravi Kumar Roll No:10021F0006 M.C.A.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Creating and Managing Digital Certificates Chapter Eleven.
Deck 10 Accounting Information Systems Romney and Steinbart Linda Batch March 2012.
© Copyright 2009 SSLPost 01. © Copyright 2009 SSLPost 02 a recipient is sent an encrypted that contains data specific to that recipient the data.
Private key
Cryptography and Network Security Chapter 1. Background  Information Security requirements have changed in recent times  traditionally provided by physical.
Guided By: Prof. Rajarshree Karande JSPM’S IMPERIAL COLLEGE OF ENGINEERING & RESEARCH WAGHOLI, PUNE Group MemberRoll No. Abhijeet Aralgundkar03.
Prof. Reuven Aviv, Nov 2013 Public Key Infrastructure1 Prof. Reuven Aviv Tel Hai Academic College Department of Computer Science Public Key Infrastructure.
Network Security Overview
© 2015 Digital Rights Management in a 3G Mobile Phone and Beyond Thomas S.Messerges, Ezzat A. Dabbish ILKOO LEE.
IEEE SoutheastCon 2016 Norfolk, Virginia, USA
Confidentiality and Privacy Controls
Chapter 2: Operating-System Structures
ONLINE SECURE DATA SERVICE
Security in SDR & cognitive radio
Chapter 2: Operating-System Structures
Presentation transcript:

“Ensuring distributed accountability for data sharing in the cloud” Smitha Sundareswaran, Anna C. Squicciarini and Dan Lin

Contents Cloud computing Introduction to CIA framework Problem statement Information accountability Automated logging mechanism End-to-end auditing mechanism Security discussion Performance study Conclusion References

Cloud computing

Introduction to CIA framework Security of user data in cloud computing Cloud computing & its services User’s data processed in remote machine Fear of losing data & other security concerns Cloud Information Accountability(CIA) framework Highly decentralized We leverage JAR programmable capabilities Also use distributed auditing mechanisms

Problem statement Cloud user send his/her data & access control policies to the service provider The service provider will have granted access rights If the rights are granted using conventional access control mechanisms, data will be fully available at the service provider We use new logging and auditing techniques to track the actual usage of data

Requirements The logging technique must satisfy: Logging should be decentralized Every access to user’s data should be automatically logged Log files should be reliable and tamper proof Recovery mechanisms are also desirable Log files should sent back to data owners periodically

Information accountability Accountability helps to Trace the user’s data Protect sensitive & confidential information Enhance user’s trust in cloud computing A cloud is accountable if: Faults can be reliably detected Each fault can be linked to one party (customer or provider)

Accountable clouds

Major components of CIA framework Logger Have logging access to a particular instance of user data Encrypt log record using the public key of the content owner Periodically send the log record to log harmonizer Ensure access & usage control policies associated with data are honored Generate the error correction information for each log record Log harmonizer Responsible for auditing: Two strategies: Push strategy Pull strategy Responsible for handling log file corruption

Accountability mechanism

Data flow

Automated logging mechanism

Logger structure Outer JAR Inner JAR Contain more than one inner JARs Handle authentication of entities to access the data Selecting the correct inner JAR Checking the JVM’s validity Managing the Graphical User interface Inner JAR Encrypted data, retrieval of log files, display enclosed data Two options Pure log Access log

Log record generation The log records(Lr) are generated as Lr = r1, r2, r3, r4... Rk rk = ( id, action, T, loc, h((id, action, T, loc)ri-1…r1), sig ) rk = log record id = user identification action = perform on user's data T = Time at location loc loc = Location h((id, action, T, loc)ri-1…r1) = checksum component sig = Signature of record by server Checksum is computed using hash function, H[i] = f(H[i − 1] ,m[i])

Ensuring log correctness Verify the access time, locations & actions JAR can perform an IP lookup to find the location of the cloud service provider Actions to user’s data has to be logged Mainly four types of actions used: View Download Timed access Location-based access.

Dependabililty of logs JARs Availability Log harmonizer deals with Copies of JARs and logger components Recovering of corrupted logs Stores error correction information Decrypt the log records & handle duplicate records Log Correctness JRE of the system must remain unmodified Verify the integrity of the logger component by: Repair the JRE before logger is launched Insert hash codes to detect modifications of the JRE

End-to-end auditing mechanism Push and Pull Mode Push mode: The logs are periodically pushed to the data owner by the harmonizer: Ensures size of the log files does not explode Enables timely detection and correction of any loss or damage to log files Pull mode auditors may retrieve the logs anytime Pull message contains FTP pull command

End-to-end auditing mechanism Algorithms: Pushing strategy Pull strategy Hybrid strategy

Security discussion The attacker copies entire JAR files. Copying Attack The attacker copies entire JAR files. Disassembling Attack Disassemble the JAR file & attempt to extract useful information Man-in-the-Middle Attack Attacker intercept messages during authentication of service provider with certificate authority, and reply messages Compromised JVM Attack Attacker try to compromise the JVM

Performance study Experimental Settings By setting up a small cloud, using the Emulab testbed On OpenSSL-enabled servers Servers are installed with Eucalyptus Used Linux-based servers running Fedora 10 OS a 64-bit Intel Quad Core Xeon E5530 processor 4 GB RAM 500 GB Hard Drive

Performance study Experimental Results Log Creation Time

Performance study Authentication Time Time Taken to Perform Logging Not too much overhead is added Performance can be further improved by caching the certificates Time Taken to Perform Logging Time for executing the action is negligible

Performance study Log Merging Time

Performance study Size of the Data JAR Files

Conclusion CIA performs automatic authentication of users Data owner can confirm that his data is safe in the cloud by using auditing mechanism Able to distribute applications to many different mobile devices Information gathering capabilities is high High portability

References [1] Smitha Sundareswaran, Anna C. Squicciarini and Dan Lin, "Ensuring Distributed Accountability for Data Sharing in the Cloud,", IEEE Transaction on dependable a secure computing, VOL. 9, NO. 4, pg 556-568, 2012. [2] S. Pearson and A. Charlesworth, "Accountability as a Way Forward for Privacy Protection in the Cloud, " Proc First Int'l conf. Cloud Computing, 2009. [3] B. Chun and A. C. Bavier ,"Decentralized Trust Management and Accountability in Federated System," Proc. Ann. Hawaii Int'l Conf. System Science (HICSS), 2004. [4] B. Crispo and G. Ruffo, “Reasoning about Accountability within Delegation,” Proc. Third Int’l Conf. Information and Comm. Security (ICICS), pp. 251-260, 2001 26

Thank you! 