Xiaohua Jia Shen Zhen Graduate School Harbin Institute of Technology Data Security for Cloud Storage Systems 1.

Slides:



Advertisements
Similar presentations
Secure Naming structure and p2p application interaction IETF - PPSP WG July 2010 Christian Dannewitz, Teemu Rautio and Ove Strandberg.
Advertisements

Trusted Data Sharing over Untrusted Cloud Storage Provider Gansen Zhao, Chunming Rong, Jin Li, Feng Zhang, and Yong Tang Cloud Computing Technology and.
Secure Data Storage in Cloud Computing Submitted by A.Senthil Kumar( ) C.Karthik( ) H.Sheik mohideen( ) S.Lakshmi rajan( )
An Introduction to Pairing Based Cryptography Dustin Moody October 31, 2008.
Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
1 Introduction CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell.
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (4) Information Security.
Authentication Cristian Solano. Cryptography is the science of using mathematics to encrypt and decrypt data. Public Key Cryptography –Problems with key.
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
Lecture III : Communication Security, Services & Mechanisms Internet Security: Principles & Practices John K. Zao, PhD SMIEEE National Chiao-Tung University.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Cryptography (continued). Enabling Alice and Bob to Communicate Securely m m m Alice Eve Bob m.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Scalable Secure Bidirectional Group Communication Yitao Duan and John Canny Berkeley Institute of Design Computer Science.
Spring 2003CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
PRIAM: PRivate Information Access Management on Outsourced Storage Service Providers Mark Shaneck Karthikeyan Mahadevan Jeff Yongdae Kim.
1 CS 194: Distributed Systems Security Scott Shenker and Ion Stoica Computer Science Division Department of Electrical Engineering and Computer Sciences.
Cloud Usability Framework
TrustPort Public Key Infrastructure. Keep It Secure Table of contents  Security of electronic communications  Using asymmetric cryptography.
Key Management in Cryptography
Ciphertext-Policy, Attribute-Based Encryption Brent Waters SRI International John Bethencourt CMU Amit Sahai UCLA.
C HAPTER 13 Asymmetric Key Cryptography Slides adapted from "Foundations of Security: What Every Programmer Needs To Know" by Neil Daswani, Christoph Kern,
Alexander Potapov.  Authentication definition  Protocol architectures  Cryptographic properties  Freshness  Types of attack on protocols  Two-way.
Computer Science Public Key Management Lecture 5.
Computer Security Tran, Van Hoai Department of Systems & Networking Faculty of Computer Science & Engineering HCMC University of Technology.
Cong Wang1, Qian Wang1, Kui Ren1 and Wenjing Lou2
Construction of efficient PDP scheme for Distributed Cloud Storage. By Manognya Reddy Kondam.
Privacy Preserving Query Processing in Cloud Computing Wen Jie
Functional Encryption: An Introduction and Survey Brent Waters.
Fine-Grained Access Control (FGAC) in the Cloud Robert Barton.
Functional Encryption: Beyond Public Key Cryptography
A Survey on Secure Cloud Data Storage ZENG, Xi CAI, Peng
DATA DYNAMICS AND PUBLIC VERIFIABILITY CHECKING WITHOUT THIRD PARTY AUDITOR GUIDED BY PROJECT MEMBERS: Ms. V.JAYANTHI M.E Assistant Professor V.KARTHIKEYAN.
M i SMob i S Mob i Store - Mobile i nternet File Storage Platform Chetna Kaur.
An Ad Hoc Group Signature Scheme for Accountable and Anonymous Access to Outsourced Data Chuang Wang a,b and Wensheng Zhang a a Department of Computer.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Cryptography, Authentication and Digital Signatures
1 Attribute-Based Encryption Brent Waters SRI International.
1 Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data Vipul Goyal Omkant Pandey Amit Sahai Brent Waters UCLA SRI.
Attribute-Based Encryption with Non-Monotonic Access Structures
Fall, Privacy&Security - Virginia Tech – Computer Science Click to edit Master title style Collusion-Resistant Group Key Management Using Attribute-
Privacy Communication Privacy Confidentiality Access Policies Systems Crypto Enforced Computing on Encrypted Data Searching and Reporting Fully Homomorphic.
Public Key Encryption with keyword Search Author: Dan Boneh Rafail Ostroversity Giovanni Di Crescenzo Giuseppe Persiano Presenter: 陳昱圻.
Fall, Privacy&Security - Virginia Tech – Computer Science Click to edit Master title style Key-Policy Attribute-Based Encryption Present by Xiaokui.
Digital Signatures, Message Digest and Authentication Week-9.
Identity based signature schemes by using pairings Parshuram Budhathoki Department of Mathematical Science FAU 02/21/2013 Cyber Security Seminar, FAU.
Data Integrity Proofs in Cloud Storage Author: Sravan Kumar R and Ashutosh Saxena. Source: The Third International Conference on Communication Systems.
Attribute-Based Encryption
Attribute-Based Encryption With Verifiable Outsourced Decryption.
Presented By Amarjit Datta
Security Analysis of a Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption Scheme.
2011 IEEE TrustCom-11 Sushmita Ruj Amiya Nayak and Ivan Stojmenovic Regular Seminar Tae Hoon Kim.
EE 122: Lecture 24 (Security) Ion Stoica December 4, 2001.
Encryption Extensions Model based on Hidden Attribute Certificate LI Yu 1,2,3, ZHAO Yong 1,2,3, GONG Bei 1 1 College of Computer Science and Technology,
SAT: Situation Aware Trust Architecture for Vehicular Networks Xiaoyan Hong, Univ of Alabama Dijiang Huang, Arizona State Univ Mario Gerla, UCLA Zhen Cao,
Online/Offline Attribute-Based Encryption Brent WatersSusan Hohenberger Presented by Shai Halevi.
SDSM IN MOBILE CLOUD COMPUTING By- ID NO-1069 K.C. SHARMILAADEVI Sethu Institute Of Tech IV year-ECE Department CEC Batch: AUG 2012.
Privacy Preserving Cloud Data Access With Multi-Authorities Taeho Jung 1, Xiang-Yang Li 1, Zhiguo Wan 2, Meng Wan 3 Illinois Institute of Technology, Chicago.
@Yuan Xue Case Study (Mid-term question) Bob sells BatLab Software License Alice buys BatLab Credit card information Number of.
Shucheng Yu, Cong Wang, Kui Ren,
Searchable Encryption in Cloud
Security Outline Encryption Algorithms Authentication Protocols
By:- Kan Yang, Xiaohua Jia
Efficient CRT-Based RSA Cryptosystems
Introduction to Symmetric-key and Public-key Cryptography
Functional Encryption: An Introduction and Survey
Verifiable Attribute Based Keyword Search with Fine-Grained Owner-Enforced Search Authorization in the Cloud They really need a shorter title.
Secure Diffie-Hellman Algorithm
Presentation transcript:

Xiaohua Jia Shen Zhen Graduate School Harbin Institute of Technology Data Security for Cloud Storage Systems 1

Outline Dept. of Computer Science City University of Hong Kong 2  Cloud Storage Systems  Auditing as a Service  Access Control as a Service

Cloud Storage Systems Dept. of Computer Science City University of Hong Kong 3

Cloud Storage Systems – data owners  A model of online storage Dept. of Computer Science City University of Hong Kong 4 Cloud Service Providers Operate large data centers Virtualize storage pools Data Owners Buy or rent storage in a pay-as-you-go model Data stored in virtual storage

Cloud Storage Systems - users Dept. of Computer Science City University of Hong Kong 5 Owners Users  Separation of data ownership and service provider Users can access data from anywhere and at anytime

Security Challenges Cloud Servers are not fully trustable:  Data Integrity Data could be corrupted or even deleted in the cloud.  Data Access control Data may be given access to unauthorized users. Dept. of Computer Science City University of Hong Kong 6

Data Integrity Auditing as a Service Dept. of Computer Science City University of Hong Kong 7

Auditing as a Service Checking On Retrieval is not adequate:  Not sufficient: random sampling cannot cover large size of data  Not convenient: overhead is too high Dept. of Computer Science City University of Hong Kong 8 Auditing as a Service  A service to check the cloud data integrity  Conducted by a Third Party Auditor

Why Third Party Auditing? Dept. of Computer Science City University of Hong Kong 9 A third party auditor can  Provide unbiased auditing results  Benefit for both data owners and service providers  Data Owners – be ensured data integrity  Service Providers – Build good reputation  Able to do a good job efficiently  Professional Expertise  Computing Capabilities

Research Issues  Privacy Preservation  Keep the data confidential against the auditor  Dynamic Auditing  Allow dynamic updates of data in the cloud  Batch Auditing  Combine multiple auditing tasks together to improve efficiency Dept. of Computer Science City University of Hong Kong 10

Architecture of 3 rd Party Auditing Initialization: Data owner sends 1) encrypted data & verification tags to server, and 2) data index to auditor  Challenge: Auditor sends Challenge to cloud server  Proof: Server responses with Proof  Verification: Auditor verifies correctness of the Proof Dept. of Computer Science City University of Hong Kong 11 Auditor Owners Cloud Servers

An Auditing Algorithm  Initialization  Data Segmentation – Improve Efficiency  Homomorphic Tag – Batch Auditing Dept. of Computer Science City University of Hong Kong 12 m m1m1 mimi mnmn mimi m i1 m ij …… m il …… Divide m into n blocks Split m i into l sectors System Parameters: G 1, G 2, G T : multiplicative groups with the same prime order p e: pairing operation maps a pair of points from G 1 and G 2 to a point in G T g 1 : generator of G 1 ; g 2 : generator of G 2

Initialization (cont’d) Dept. of Computer Science City University of Hong Kong 13 m m1m1 mimi mnmn mimi m i1 m ij …… m il …… abstract information of m: FID, # of blocks, index table, etc. Cloud Servers Auditor t i = (h(sk h, FID||i)Π j=1->l g 1 x j m ij ) sk t sk t : secret tag key kept by owner sk h : secret hash key shared with auditor g 2 skt : public tag key shared with auditor g 1 xj : random key shared with the cloud

Sampling Auditing  Challenge from auditor: C = ({i, v i } i  Q, R = (g 2 sk t ) r )  Proof by Cloud: P = (DP, TP)  Data Proof: DP = Π j=1->l e(g 1 x j, R) MP j where MP j = Σ i  Q v i m ij  Tag Proof: TP = Π i  Q t i v i Dept. of Computer Science City University of Hong Kong 14 m1m1 m 11 m 1j m1lm1l …… mimi m i1 m ij m il …… mqmq m q1 m qj m ql …… MP 1 MP j MP l

Sampling Auditing  Challenge from auditor : C = ({i, v i } i  Q, R = (g 2 sk t ) r )  Proof by Cloud: P = (DP, TP)  Data Proof: DP = Π j=1->l e(g 1 x j, R) MP j where MP j = Σ i  Q v i m ij  Tag Proof: TP = Π i  Q t i v i  Verification by auditor: H chal = Σ i  Q h(sk h, FID||i) rv i DP·e(H chal, g 2 sk t ) = e(TP, g 2 r ) Dept. of Computer Science City University of Hong Kong 15 ?

References  Kan Yang and Xiaohua Jia. “Security for Cloud Storage Systems”, Springer 2014, ISBN  Kan Yang and Xiaohua Jia. “An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing”. IEEE Trans. on Parallel and Distributed Systems (TPDS), Vol 24, Issue 9, September  Kan Yang and Xiaohua Jia. “Data Storage Auditing Service in Cloud Computing: Challenges, Methods and Opportunities”. World Wide Web, Vol 15, Issue 4, July Dept. of Computer Science City University of Hong Kong 16

Data Access Control Access Control as a Service Dept. of Computer Science City University of Hong Kong 17

Dept. of Computer Science City University of Hong Kong 18 Access Control as a Service Data stored in server is encrypted.  Encryption-based Access Control  Each authorized user receives a secret key  Users can decrypt ciphertext by their secret keys SK User Owner

Dept. of Computer Science City University of Hong Kong 19 Difficulties in Key Distribution  Asymmetric Key Encryption (users pub-key for encryption)  Multi-copies of encrypted data for difference users  Symmetric Key Encryption  Difficulties in key distribution

A Wish-list for Encryption-based Access Control  Key management is scalable  No need of online trusted server for access control  Expressive access control polices Dept. of Computer Science City University of Hong Kong 20 Attribute-Based Encryption (ABE) is a promising direction to go!

Ciphertext-Policy Attribute-Based Encryption (CP-ABE)  Data are encrypted by the access policy  Secret keys are associated with attributes  Attributes are mathematically incorporated into the key Dept. of Computer Science City University of Hong Kong 21 (CS AND PhD) OR Prof OR AND CS PhD Prof {EE, Prof} Alice SK Bob {CS, PhD}

 Ciphertext can be decrypted iff attributes in the key satisfy the access policy Dept. of Computer Science City University of Hong Kong 22 Ciphertext-Policy Attribute-Based Encryption (CP-ABE) No 3 rd party evaluates the policy and makes access decision (server is excluded) Policy checking is embedded in cryptography {EE, Prof} (CS AND PhD) OR Prof Satisfies Alice

Attribute-Based Access Control (ABAC) Dept. of Computer Science City University of Hong Kong 23 PK MSK SK Bob : “CS Dept.” “Professor” SK Kevin : “CS Dept.” “Master” OR Professor AND CS Dept.PhD     Authority Owner

Advantages of ABAC  Access policy is defined by owners  Access policy is enforced by the cryptography  nobody explicitly evaluates the policies and makes an access decision  Only one copy of ciphertext is generated for each file Dept. of Computer Science City University of Hong Kong 24

Basic Construction  G: multiplicative group of prime order p.  Intuitive Hardness Discrete Log: Given: g, g a Hard to find: a  Bilinear map e: G  G  G T Def: An admissible bilinear map e: G  G  G T is: – Non-degenerate: g generates G  e(g, g) generates G T. – Bilinear: e(g a, g b ) = (e(g,g)) ab  a,b  Z p, g  G – Efficiently computable Dept. of Computer Science City University of Hong Kong 25

CP-ABE Algorithms Dept. of Computer Science City University of Hong Kong 26 Setup(λ) -> MSK, PK PK MSK Encrypt(PK,M, Access policy) -> CT KeyGen(MSK, Attrs.) -> SK “CS Dept.” “PhD” SK Decrypt(SK, CT) -> M “CS Dept.” “PhD” SK OR Professor AND CS Dept. PhD OR Professor AND CS Dept. PhD

System Setup Dept. of Computer Science City University of Hong Kong 27 PK = ( g, g b, e(g, g) a, H: {0,1} *  G ) MSK = a MSK Public Key Authority a, b  R Z P

Secret Key Generation Dept. of Computer Science City University of Hong Kong 28 Authority Authority issues secret keys for users who have attributes Bob Alice Charlie “CS Dept.” “Professor” “CS Dept.” “Master” “EE Dept.” “PhD”

Collusion Attack Dept. of Computer Science City University of Hong Kong 29  Users may collude to decrypt data by combining their attributes “EE Dept.” “PhD” Charlie Bob “CS Dept.” “Master” OR AND CS Dept. PhD Prof 

Prevent Collusion Attack Dept. of Computer Science City University of Hong Kong 30 SK = ( g a+bt, g t, H(“Master”) t, H(“CS Dept.”) t, H(“TA”) t ) t: random number in Z p. It ties components in SK together Authority MSK = a Bob has attributes: {“Master”, “CS Dept.”, “TA”} Personalization! Collusion Resistance

Key Personalization Dept. of Computer Science City University of Hong Kong 31 Bob: “CS Dept.” … Charlie: “PhD” … Random t Random t’ Components are incompatible g a+bt, g t, H(“CS Dept.”) t, g a+bt’, g t’, H(“PhD”) t’ SK

Data Encryption Dept. of Computer Science City University of Hong Kong 32 M Given M and policy, owner generates a random secret s OR AND CS Dept. PhD Prof s s s 3 =rs 2 =s-r s 1 =s Data Owner OR Professor AND CS Dept. PhD Ciphertext: CT = ( M e(g,g) as, g s, C 1 = (g bs 1 H(“Prof”) r 1, g r 1 ), C 2 = (g bs 2 H(“PhD”) r 2, C 3 = (g bs 3 H(“CS Dept.”) r 3, g r 3 ) ). PK = ( g, g b, e(g, g) a, H: {0,1} *  G )

Data Decryption Dept. of Computer Science City University of Hong Kong 33 Ciphertext CT Secret Key SK CT = ( M  e(g,g) as, g s, C 1 = (g bs 1 H(“Prof”) r 1, g r 1 ), C 2 = (g bs 2 H(“PhD”) r 2, g r 2 ), C 3 = (g bs 3 H(“CS Dept.”) r 3, g r 3 ) ) SK = ( g a+bt, g t, H(“Prof”) t, H(“PhD”) t, H(“CS Dept.”) t ) e(g,g) bts = e(g bs 1 H(“Prof”) r 1, g t ) e(g r 1, H(“Prof”) t ) e(g a+bt, g s ) = e(g,g) as e(g,g) bts “ Prof ” “PhD” AND “CS Dept.” OR = e(g,g) bts 2 e(g,g) bts 3 = e(g,g) bts e(g bs 2 H(“PhD”) r 2, g t ) e(g r 2, H(“PhD”) t ) e(g bs 3 H(“CS Dept.”) r3, g t ) e(g r 3, H(“CS Dept.”) t ).

Research Challenges Dept. of Computer Science City University of Hong Kong 34  Multiple Authorities Bob: “CS dept.” Kevin: “manager” AND CS dept. OR managermarketing Authority in CityU Authority in Google

Research Challenges Dept. of Computer Science City University of Hong Kong 35  Attribution Revocation  Prevent revoked users from decrypting new ciphertexts  Guarantee new users to decrypt previous ciphertexts  Decryption Efficiency  Mobile Devices  Policy Hidden K Yang, X Jia, K Ren, R Xie and L Huang. “Enabling Efficient Access Control with Dynamic Policy Updating for Big Data in the Cloud”, INFOCOM’14. K Yang, X Jia, K Ren and B Zhang. “DAC-MACS: Effective Data Access Control for Multi- Authority Cloud Storage Systems”, INFOCOM’13, extended version in IEEE Trans on Information Forensics and Security 8(11), K Yang and X Jia. “Attributed-based Access Control for Multi-authority Systems in Cloud Storage,” ICDCS’12.

Summary  Cloud server is not fully trusted by data owners  Data Integrity  Auditing as a Service  Data Access Control  Access Control as a Service Dept. of Computer Science City University of Hong Kong 36

Q&A Thank You! Dept. of Computer Science City University of Hong Kong 37