Hourglass Schemes: How to Prove that Cloud Files Are Encrypted

Slides:



Advertisements
Similar presentations
Trusted Data Sharing over Untrusted Cloud Storage Provider Gansen Zhao, Chunming Rong, Jin Li, Feng Zhang, and Yong Tang Cloud Computing Technology and.
Advertisements

Creating HIPAA-Compliant Medical Data Applications with Amazon Web Services Presented by, Tulika Srivastava Purdue University.
Ivan Pleština Amazon Simple Storage Service (S3) Amazon Elastic Block Storage (EBS) Amazon Elastic Compute Cloud (EC2)
Key distribution and certification In the case of public key encryption model the authenticity of the public key of each partner in the communication must.
ECE454/CS594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2011.
HAIL (High-Availability and Integrity Layer) for Cloud Storage
Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Distribution and Revocation of Cryptographic Keys in Sensor Networks Amrinder Singh Dept. of Computer Science Virginia Tech.
Data Integrity Proofs in Cloud Storage Sravan Kumar R, Ashutosh Saxena Communication Systems and Networks (COMSNETS), 2011 Third International Conference.
CMSC 414 Computer (and Network) Security Lecture 4 Jonathan Katz.
Digital Signatures and Hash Functions. Digital Signatures.
1 Introduction CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell.
INTRODUCTION TO CLOUD COMPUTING CS 595 LECTURE 6 2/13/2015.
CS555Spring 2012/Topic 161 Cryptography CS 555 Topic 16: Key Management and The Need for Public Key Cryptography.
SMUCSE 5349/73491 Authentication Protocols. SMUCSE 5349/73492 The Premise How do we use perfect cryptographic mechanisms (signatures, public-key and symmetric.
Security Chapters 14,15. The Security Environment Threats Security goals and threats.
Class on Security Raghu. Current state of Security Cracks appear all the time Band Aid solutions Applications are not designed properly OS designs are.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Apr 22, 2003Mårten Trolin1 Agenda Course high-lights – Symmetric and asymmetric cryptography – Digital signatures and MACs – Certificates – Protocols Interactive.
Parallel Mixing Philippe Golle, PARC Ari Juels, RSA Labs.
CMSC 414 Computer and Network Security Lecture 22 Jonathan Katz.
How cryptography is used to secure web services Josh Benaloh Cryptographer Microsoft Research.
Spring 2003CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Nikolay Tomitov Technical Trainer SoftAcad.bg.  What are Amazon Web services (AWS) ?  What’s cool when developing with AWS ?  Architecture of AWS 
1 CS 194: Distributed Systems Security Scott Shenker and Ion Stoica Computer Science Division Department of Electrical Engineering and Computer Sciences.
CMSC 414 Computer and Network Security Lecture 13 Jonathan Katz.
Web-based Document Management System By Group 3 Xinyi Dong Matthew Downs Joshua Ferguson Sriram Gopinath Sayan Kole.
SSH Secure Login Connections over the Internet
CS5204 – Fall Cryptographic Security Presenter: Hamid Al-Hamadi October 13, 2009.
Tonga Institute of Higher Education Design and Analysis of Algorithms IT 254 Lecture 9: Cryptography.
Construction of efficient PDP scheme for Distributed Cloud Storage. By Manognya Reddy Kondam.
Lecture 18 Page 1 CS 111 Online Design Principles for Secure Systems Economy Complete mediation Open design Separation of privileges Least privilege Least.
Fine-Grained Access Control (FGAC) in the Cloud Robert Barton.
A Survey on Secure Cloud Data Storage ZENG, Xi CAI, Peng
The Steganographic File System Ross Anderson, Roger Needlham, Adi Shamir Presented by: Pan Meng Presented by: Pan Meng.
EMBEDDED SECURITY EEN 417 Fall /6/13, Dr. Eric Rozier, V1.0, ECE Thanks to Edward Lee and Sanjit Seshia of UC Berkeley.
Amazon Web Services BY, RAJESH KANDEPU. Introduction  Amazon Web Services is a collection of remote computing services that together make up a cloud.
Cloud Computing & Amazon Web Services – EC2 Arpita Patel Software Engineer.
Public Key Encryption and the RSA Public Key Algorithm CSCI 5857: Encoding and Encryption.
| nectar.org.au NECTAR TRAINING Module 5 The Research Cloud Lifecycle.
Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems.
By: Ashish Gohel 8 th sem ISE.. Why Cloud Computing ? Cloud Computing platforms provides easy access to a company’s high-performance computing and storage.
Digital Signatures, Message Digest and Authentication Week-9.
1 KERBEROS: AN AUTHENTICATION SERVICE FOR OPEN NETWORK SYSTEMS J. G. Steiner, C. Neuman, J. I. Schiller MIT.
DIGITAL SIGNATURE.
On Simulation-Sound Trapdoor Commitments Phil MacKenzie, Bell Labs Ke Yang, CMU.
Presented by Sharan Dhanala
Data Integrity Proofs in Cloud Storage Author: Sravan Kumar R and Ashutosh Saxena. Source: The Third International Conference on Communication Systems.
When DRM Meets Restricted Multicast A Content Encryption Key Scheme for Restricted Multicast and DRM Min FENG and Bin ZHU Microsoft Research Asia.
PROACTIVE SECRET SHARING Or: How to Cope With Perpetual Leakage Herzberg et al. Presented by: Avinash Ravi Kevin Skapinetz.
CLOUD COMPUTING. What is cloud computing ??? What is cloud computing ??? Cloud computing is a general term for anything that involves delivering hosted.
Attribute-Based Encryption With Verifiable Outsourced Decryption.
© Copyright 2009 SSLPost 01. © Copyright 2009 SSLPost 02 a recipient is sent an encrypted that contains data specific to that recipient the data.
Private key
LOGO Cloud Storage Oriented Cipher-text Search Protocol.
IS Infrastructure Managing Infrastructure and Services Copyright © 2016 Curt Hill.
Dos and Don’ts of Client Authentication on the Web Kevin Fu, Emil Sit, Kendra Smith, Nick Feamster Presented: Jesus F. Morales.
EE 122: Lecture 24 (Security) Ion Stoica December 4, 2001.
Cloud Archive By: Kimberly Nolan. What it is?  The goal of a cloud archiving service is to provide a data storage (ex. Google drive and SkyDrive) as.
9.2 SECURE CHANNELS JEJI RAMCHAND VEDULLAPALLI. Content Introduction Authentication Message Integrity and Confidentiality Secure Group Communications.
Database Laboratory Regular Seminar TaeHoon Kim Article.
[FUNCTIONALITY AND SAFETY OF A MODERN TECHNOLOGY] [CLOUD COMPUTING FOR INDIVIDUAL CONSUMERS]
How can we prove that cloud files are encrypted.?
Attacks on Public Key Encryption Algorithms
Security Outline Encryption Algorithms Authentication Protocols
Fundamental Concepts in Security and its Application Cloud Computing
SSH: SECURE LOGIN CONNECTIONS OVER THE INTERNET
ONLINE SECURE DATA SERVICE
Chapter 29 Cryptography and Network Security
Presentation transcript:

Hourglass Schemes: How to Prove that Cloud Files Are Encrypted Emil Stefanov UC Berkeley emil@cs.berkeley.edu Joint work with: Marten van Dijk Ari Juels Alina Oprea RSA Labs marten.vandijk@rsa.com ari.juels@rsa.com alina.oprea@rsa.com Ronald Rivest Nikos Triandopoulos MIT RSA Labs rivest@mit.edu nikolaos.triandopoulos@rsa.com

Public Cloud Computing Enterprise Enterprise User Pool of shared resources Available on demand Highly scalable 2

A Major Drawback Large attack surface Thousands of computers Dozens of storage systems and interfaces Amazon alone: S3, EBS, Instance Storage, Glacier, Storage Gateway, CloudFront, RDS, DynamoDB, ElastiCache, CloudSearch, SQS Shared resources among thousands of tenants Many possibilities for accidental data leakage.

Defending Against Accidental Data Leakage ??? leakage Simple view: Just encrypt your data in the cloud. Problem solved?

Defending Against Accidental Data Leakage ??? leakage More realistic view: Often want to use the cloud for more than just raw storage. Why? Want to outsource storage AND computation (services). In that case, the cloud needs access to your decrypted data.

Encrypt at Rest & Decrypt on the Fly ??? leakage Services Front End Storage Back End Split the cloud into computation front-end and storage back-end Already the case in many clouds (e.g., Amazon, Azure) Storage backend only sees encrypted data. Computation front-end decrypts data on the fly Only accesses the data it really needs at any one time Can be combined with tight access control and logging. Key servers

Encrypt at Rest & Decrypt on the Fly ??? leakage  complies with government regulations Services Front End Storage Back End Protects against data leakage by the storage back-end infrastructure. Limits the amount of data leakage by the front-end at any one time. Common practice. Much better than no encryption.

Plaintext is simpler for the cloud to manage. The Problem How can we be reasonably sure that the cloud is encrypting data at rest? Plaintext is simpler for the cloud to manage. Lack of visibility Users only see results (e.g., web pages) from the front-end. What is happening internally? Download data and check encryption? The cloud can always just encrypt on the fly. Seems impossible!

Our Solution Economically motivate the cloud to encrypt data at rest. Impose financial penalties on misbehaving cloud providers. We ensure that an economically rational cloud provider, encrypts data at rest. Misbehaving cloud must use double storage. Must store both decrypted and encrypted file.

Our Solution: Hourglass Schemes encryption hourglass Original File Encrypted File Encapsulated File client verifies encryption client assists client verifies by periodically challenging random file blocks client uploads file The client never needs to permanently store and manage keys.

Intuition Hourglass property: costly to compute “on the fly” encryption hourglass Original File Encrypted File Encapsulated File Hourglass property: costly to compute “on the fly” client checks adversarial cloud wants to only store So an adversarial cloud must store both files. Double the storage!

Hourglass Framework: More than a Scheme Modular Components Encodings: Hourglass functions: Encryption Butterfly Watermarking Permutation File Bindings RSA

Encodings Encryption: 𝑮=𝑬 𝑭 Watermarking: 𝑮=𝑭||Tag Embed a tag into the file Tag says that the file is stored on a specific cloud Tag signed by the cloud Evidence of data leakage origin. File Binding: 𝑮= 𝑭 𝟏 | 𝑭 𝟐 |…|| 𝑭 𝒎 Combine multiple files into one encoding. E.g., embedded license.

encoding (e.g., encryption) Hourglass Functions Costly to apply “on the fly” Impose a resource lower bound on the cloud to compute: 𝑮→𝑯, and hence 𝑭→𝑯 𝑯 𝑭 𝑮 encoding (e.g., encryption) hourglass Original File Encrypted File Encapsulated File

Hourglass Function: RSA … 𝑭: 𝑭 𝟏 𝑭 𝟐 𝑭 𝟑 𝑭 𝟒 𝑭 𝒏 Apply encoding (encryption, watermarking, file binding) … 𝑮: 𝑮 𝟏 𝑮 𝟐 𝑮 𝟑 𝑮 𝟒 𝑮 𝒏 Client computes 𝑯 𝒊 =RSA−Sign 𝑮 𝒊 using random RSA private key. … 𝑯: 𝑯 𝟏 𝑯 𝟐 𝑯 𝟑 𝑯 𝟒 𝑯 𝒏 Cloud can always recover the plaintext 𝐹: 𝐺 𝑖 =RSA−RecoverMessage 𝐻 𝑖 (using client’s public RSA key) 𝐹 𝑖 =Decode 𝐺 𝑖 Resource bound: computation Completely infeasible for cloud: 𝐹→𝐻 It doesn’t have the RSA signing key to do 𝐺→𝐻

Hourglass Function: Permutation … 𝑭: 𝑭 𝟏 𝑭 𝟐 𝑭 𝟑 𝑭 𝟒 𝑭 𝒏 Apply encoding (encryption, watermarking, file binding) … 𝑮: 𝑮 𝟏 𝑮 𝟐 𝑮 𝟑 𝑮 𝟒 𝑮 𝒏 Randomly permute the blocks of 𝐺 to form 𝐻. No cryptographic operations. Operates on tiny blocks. … 𝑯: 𝑯 𝟏 𝑯 𝟐 𝑯 𝟑 𝑯 𝟒 𝑯 𝒏 Client later challenges the cloud for sequential ranges of 𝐻. Sequential range in 𝑯  Random blocks in 𝑭 Resource bound: disk seeks A misbehaving cloud (that only stores 𝐹) will need to do many random accesses to respond to a challenge.

Hourglass Function: Butterfly w = a known key PRP over a pair of file blocks 𝑮 𝟏 𝑮 𝟐 𝑮 𝟑 𝑮 𝟒 𝑮 𝟓 𝑮 𝟔 𝑮 𝟕 𝑮 𝟖 𝑯 𝟏 𝑯 𝟐 𝑯 𝟑 𝑯 𝟒 𝑯 𝟓 𝑯 𝟔 𝑯 𝟕 𝑯 𝟖

Comparison of Hourglass Functions 𝑶 𝒏 RSA exponentiations 𝑶 𝒏 𝐥𝐨𝐠 𝒏 AES operations 𝑶 𝒏 random memory accesses less practical more practical RSA Butterfly Permutation less assumptions more assumptions RSA assumptions storage speed seek inefficiency in rotational drives

Comparison of Hourglass Functions Ran on Amazon EC2 (using a quadruple-extra-large high-memory instance and EBS Storage).

Challenge-Response Protocol The client challenges the cloud for blocks of the encapsulated file 𝐻. At random unpredictable times Few challenges, e.g., 𝑂 log 𝑛 Cloud must respond quickly. Doable by an external auditor. Auditor doesn’t see the plaintext 𝐹. … 𝑯: 𝑯 𝟏 𝑯 𝟐 𝑯 𝟒 𝑯 𝟒 𝑯 𝒏

Limitations Assume files are not accessed to often. Great for archiving files. File updates are costly. RSA hourglass function allows for updates. Other hourglass functions must be re-applied to the entire file. Works mainly for large files.

Conclusions Able to motivate the cloud to encrypt files are rest. Several techniques Encryption, watermarking, file binding. Different hourglass functions with performance-assumption tradeoffs. Economic models sometimes prevail where traditional cryptographic techniques cannot.