Sinaia, Romania August, 2014 14 TH Workshop “Software Engineering Education and Reverse Engineering” Dhuratë Hyseni, Betim Çiço South East European University.

Slides:



Advertisements
Similar presentations
Trusted Data Sharing over Untrusted Cloud Storage Provider Gansen Zhao, Chunming Rong, Jin Li, Feng Zhang, and Yong Tang Cloud Computing Technology and.
Advertisements

IS 302: Information Security and Trust Week 4: Asymmetric Encryption
Internet and Intranet Protocols and Applications Lecture 9a: Secure Sockets Layer (SSL) March, 2004 Arthur Goldberg Computer Science Department New York.
Security of Things Kelly Jagers op Akkerhuis
Hardware Cryptographic Coprocessor Peter R. Wihl Security in Software.
Cryptography. 2 Objectives Explain common terms used in the field of cryptography Outline what mechanisms constitute a strong cryptosystem Demonstrate.
Using Cryptography to Protect Data in Computer Networks: case study Vsevolod Ievgiienko National Taras Shevchenko University of Kiev Faculty of Cybernetics.
Security Issues and Challenges in Cloud Computing
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Principles of Information Security, 2nd edition1 Cryptography.
Security Overview Hofstra University University College for Continuing Education - Advanced Java Programming Lecturer: Engin Yalt May 24, 2006.
Real-Time Authentication Using Digital Signature Schema Marissa Hollingsworth BOISECRYPT ‘09.
A PASS Scheme in Clouding Computing - Protecting Data Privacy by Authentication and Secret Sharing Jyh-haw Yeh Dept. of Computer Science Boise State University.
Lesson Title: Introduction to Cryptography Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
Dr Alejandra Flores-Mosri Message Authentication Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to:
Cryptography Basic (cont)
Wireless Security In wireless networks. Security and Assurance - Goals Integrity Modified only in acceptable ways Modified only by authorized people Modified.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Symmetric Key Distribution Protocol with Hybrid Crypto Systems Tony Nguyen.
Cryptographic Technologies
Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.
SSH : The Secure Shell By Rachana Maheswari CS265 Spring 2003.
Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.
Cryptography April 20, 2010 MIS 4600 – MBA © Abdou Illia.
Dr Alejandra Flores-Mosri Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the.
TrustPort Public Key Infrastructure. Keep It Secure Table of contents  Security of electronic communications  Using asymmetric cryptography.
Lecture 4 Cryptographic Tools (cont) modified from slides of Lawrie Brown.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
Public Key Infrastructure Ammar Hasayen ….
1 Cryptography Basics. 2 Cryptography Basic terminologies Symmetric key encryption Asymmetric key encryption Public Key Infrastructure Digital Certificates.
Computer Security Tran, Van Hoai Department of Systems & Networking Faculty of Computer Science & Engineering HCMC University of Technology.
1 Chapter 8: Security in Electronic Commerce IT357 Electronic Commerce.
Cloud Computing & Security Issues Prepared by: Hamoud Al-Shammari CS 6910 Summer, 2011 University of Colorado at Colorado Springs Engineering & Applied.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
SODA Archiving October 2013
Network Security. Security Threats 8Intercept 8Interrupt 8Modification 8Fabrication.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 11 Basic Cryptography.
HPCC 2015, August , New York, USA Wei Chang c Joint work with Qin Liu a, Guojun Wang b, and Jie Wu c a. Hunan University, P. R. China b. Central.
CHAPTER 6 Cryptography. An Overview It is origin from the Greek word kruptos which means hidden. The objective is to hide information so that only the.
Cryptography, Authentication and Digital Signatures
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
CSCE 201 Introduction to Information Security Fall 2010 Data Protection.
LOGO Hardware side of Cryptography Anestis Bechtsoudis Patra 2010.
Identity-Based Secure Distributed Data Storage Schemes.
Encryption.
11-Basic Cryptography Dr. John P. Abraham Professor UTPA.
Symmetric Cryptography, Asymmetric Cryptography, and Digital Signatures.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Encryption Questions answered in this lecture: How does encryption provide privacy? How does encryption provide authentication? What is public key encryption?
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED.
Lecture 2: Introduction to Cryptography
Security fundamentals Topic 4 Encryption. Agenda Using encryption Cryptography Symmetric encryption Hash functions Public key encryption Applying cryptography.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Secure Messenger Protocol using AES (Rijndael) Sang won, Lee
©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential outline What is a VPN? What is a VPN?  Types of VPN.
CSI-09 COMMUNICATION TECHNOLOGY SECURITY MECHANISMS IN A NETWORK AUTHOR - V. V. SUBRAHMANYAM.
Network Security Celia Li Computer Science and Engineering York University.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Encryption Encryption: Transforms Message so that Interceptor Cannot Read it –Plaintext (original message) Not necessarily text; Can be graphics, etc.
Paper On Cryptography CS300 Technical Paper Review Avinash Chambhare Abdus Samad.
Guided By: Prof. Rajarshree Karande JSPM’S IMPERIAL COLLEGE OF ENGINEERING & RESEARCH WAGHOLI, PUNE Group MemberRoll No. Abhijeet Aralgundkar03.
Secure Instant Messenger in Android Name: Shamik Roy Chowdhury.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Security Using Armstrong Numbers and Authentication using Colors
Hybrid Cloud Architecture for Software-as-a-Service Provider to Achieve Higher Privacy and Decrease Securiity Concerns about Cloud Computing P. Reinhold.
Cloud Testing Shilpi Chugh.
Presentation transcript:

Sinaia, Romania August, TH Workshop “Software Engineering Education and Reverse Engineering” Dhuratë Hyseni, Betim Çiço South East European University - Tetovo, Macedonia

Introduction Problem statement Cloud security The objectives for security in the cloud C-A-I Data security in cloud The proposed model for data security in cloud Conclusion 2 14 TH Workshop “Software Engineering Education and Reverse Engineering” Sinaia, Romania, August 2014

Cloud computing Security in the cloud Increased security Cloud service provider 3 14 TH Workshop “Software Engineering Education and Reverse Engineering” Sinaia, Romania, August 2014

4 The issue of security in cloud has discouraged businesses to run in cloud computing 14 TH Workshop “Software Engineering Education and Reverse Engineering” Sinaia, Romania, August 2014 Results of IDC survey ranking security challenges, 2012 (Source:

When we use cloud technology we should consider the higher security level because now our data and services should be trusted to a third party. Important role in providing safe data in cloud offers cryptography We propose a solution for cloud security architecture grounded elements in cryptography 5 14 TH Workshop “Software Engineering Education and Reverse Engineering” Sinaia, Romania, August 2014

During transfer of data - we proposed to use a model for encrypting the data In our future work we will propose an algorithm which is used for data encryption The other part of the model will include the part that the user of cloud is notified for each and every attack that occurs for data 6 14 TH Workshop “Software Engineering Education and Reverse Engineering” Sinaia, Romania, August 2014

Some of the main reasons of fails on cloud are as follows: – One of the reasons could can be hardware, on cloud computing is known as IaaS. – Another reason could be mistakes or better say possible fails of software, on cloud computing known as SaaS. – Disagreements of client and provider could be another reason of fail etc TH Workshop “Software Engineering Education and Reverse Engineering” Sinaia, Romania, August 2014

– Multi-tenancy - possibility to use common resources which are offered by the provider – Escalation - possibility of escalating services and hardware that are offered on cloud – Elasticity - possibility to use resources based on the needs, when there’s a need to increase resources, if there’s no need to remove them – Pay-as-you-go- the possibility that all costumers pay as they use it 8 14 TH Workshop “Software Engineering Education and Reverse Engineering” Sinaia, Romania, August 2014

Confidentiality - protection private data of client. Availability- the possibility to use applications on cloud computing. Integrity- understand the client awareness that his data is placed on the cloud and unauthorized persons cannot gain access and this data is available any time we need it TH Workshop “Software Engineering Education and Reverse Engineering” Sinaia, Romania, August 2014

Sensitive rating of data SR[i] = ( C[i] + (1/A[i] * 10 + I[i] ) ) / 4 Source (A Framework to Enhance Cryptographic Parameter for Data In Cloud, R.Sivaranjani, R.Radhika, 2014) SR[i] = Sensitive Rating, C[i]= Confidentiality, A[i]= Availability, I[i]= Integrity TH Workshop “Software Engineering Education and Reverse Engineering” Sinaia, Romania, August 2014

11 Data security in cloud computing 14 TH Workshop “Software Engineering Education and Reverse Engineering” Sinaia, Romania, August 2014 Data security Data transfer o Provider o End users of the system o The manager of auditing

Role of cryptography in cloud Cryptography- increase the reliability for the customers – symmetric cryptography – asymmetric cryptography Communication between sender and receiver of the information TH Workshop “Software Engineering Education and Reverse Engineering” Sinaia, Romania, August 2014

Features of cryptography 13 Simetrical cryptography Asymetrical cryptography Information sender Key encryptionPrivate key and Public key Informacionit reciever Key decryptionPrivate key and Public key Representer  DES (Data Encryption Standard),  3DES,  RC5,  RC6,  Blowfish,  Two-Fish  AES (Advanced Encryption Standard)  RSA (Rivest Shamir Adleman)  ECC (Elliptic Curve Cryptosystem) (Source: Identity-Based Cryptography for Cloud Security, Hongwei Li1, Yuanshun Dai2, Bo Yang3) 14 TH Workshop “Software Engineering Education and Reverse Engineering” Sinaia, Romania, August 2014

Security challenges in major areas of cloud and role of cryptography There are some challenges that are part of the cryptography and that we will focus for propose new algorithm: o Proof of retrievability o Secure deletion in cloud o Storage security o Communication security o Virtualization security TH Workshop “Software Engineering Education and Reverse Engineering” Sinaia, Romania, August 2014

The proposed model for data security Propose model for the data security on cloud – is based on the data communication channel – data is encrypted before uploading to the server storage – users can decrypt it using button stored on the mail server at the time of encryption TH Workshop “Software Engineering Education and Reverse Engineering” Sinaia, Romania, August 2014

Model proposal of data encryption brings convenient way to store files approaches of: – secure the confidentiality, – integrity and – authentication of tests 16

Determined to propose the Information Dispersal Algorithm for data encrypting We are working to propose in the future a new algorithm that can be much more reliable for the cloud computing TH Workshop “Software Engineering Education and Reverse Engineering” Sinaia, Romania, August 2014

18 Making our data more secure and reliable Building mechanisms of cryptography for the protection of data both: – during transfer and – saving in database We proposed the model for security in the cloud based in cryptography that uses Information Dispersal Algorithm for encrypting data All the propositions will be provided by practical examples

19 ?