KEMBAR78
SOME SECURITY CHALLENGES IN CLOUD COMPUTING | PDF
SOME SECURITY CHALLENGES 
IN CLOUD COMPUTING 
Hoang N.V.
What is cloud computing?
"pay-per-usemodelforenablingavailable, convenientandon-demandnetworkaccesstoasharedpoolofconfigurablecomputingresources(e.g.,networks,servers,storage,applicationsandservices)thatcanberapidlyprovisionedandreleasedwithminimalmanagementeffortorserviceproviderinteraction.“byNIST 
Cloud computing: Advantages
Today
Cloud providers bring in $2B in first quarter --source: Synergy Research Group, May, 2013 
The overall cloud market will hit $71 billion in 2015 Source: Gartner Company data, Macquarie Capital (USA), Jan. 2013 
Future
Cloud computing is the next big thing
Challenges for Cloud Computing
Trust
Trust me, please! 
Oh, no
BroadAttacking Surface 
We have everything in the cloud.  Everything is virtual. Loss physical control 
BroadAttacking Surface 
Data breach 
Malicious Insider 
Insecure Interface or APIs
BroadAttacking SurfaceManyothersyettobeidentified... 
4 
13 
10 
9 
7 
0 
2 
4 
6 
8 
10 
12 
14 
Before Year 2008 
Year 2008 
Year 2009 
Year 2010 
Year 2011 
No. of Incidents with Unknown Causes by Year 
CSA report 2012 (Revised March 13, 2013)
Storage outsourcing
Security challenges with storage outsourcing 
Data Integrity
Security challenges with storage outsourcing 
Internal: Byzantine failure, management errors, software bugs, ... 
External: malware, economically motivated attacks, ... (Data Integrity)
Security challenges with storage outsourcing(Data Integrity)
Data Integrity
Data Integrity
Data Integrity
Security challenges with storage outsourcing(Data Integrity) Cloud currently offers no guarantee 
Shouldwetrustthecloud100percentforthestorageintegrity? 
Dataownersneedameanstoensurecontinuouscorrectnesssofoutsourcedclouddata.
Security challenges with storage outsourcing(Data Integrity) 
Is my data correctly stored? 
Storage correctness proofs 
Secure Cloud Storage Auditing
Traditionalmethod for data integrity 
message m 
k 
k 
Generate tag: 
tag S(k, m) 
tag 
Verify tag: 
V(k, m’, tag’) = ‘yes’ 
Def:MACI = (S,V) defined over (K,M,T) is a pair of algs: 
•S(k,m) outputs t in T 
•V(k,m,t) outputs yes or no 
Message Authentication Code (MAC)
Secure Cloud Storage Auditing 
Is my data correctly stored(k1) 
DATA 
DATA’ 
MAC(k1, DATA’) 
MAC(k1,DATA) 
Before putting data in the cloud, must calculate and store 
MAC(k2,DATA) 
MAC(kn,DATA)
Secure Cloud Storage Auditing 
Security 
Convenience 
OverheadChallenges 
Havetoexploretradeoffstomaintainlowcommunicationandcomputionoverheadonbothownerandserverside.
Secure Cloud Storage AuditingChallenges 
Copewithfrequentclouddatachangingwhileensuringcontinuousdataauditing
Public 
Private 
Privacy-preservingpublicauditing
Batch auditing improves efficiency and saves computation and communication overhead.
Secure Cloud Storage AuditingSolutions 
Cloud Server 
σ1 
m1 
σ2 
m2 
σ4 
m4 
σ1 
m1 
σ2 
m2 
σ3 
m3 
σ4 
m4 
… 
… 
σn 
mn 
σ1 
m1 
σ2 
m2 
σ 
μ 
+ 
.
Redundantly stores data in multiple facilities and on multiple devices with each facility. Can we trust? 
Designed to substain the concurrent loss of data two facilities.
Security challenges with storage outsourcing(Data Integrity) 
? F file 
return F file 
Cloudstorageproviderclaimstostorethreedistinctcopiesofmyfileforresillience. 
Can we trust? No, if they can’t prove it (Redundancy)? 
F
Security challenges with storage outsourcing 
File F can survive two disk crashes 
Disk 2 
Disk 3 
Disk 4 
Disk 5 
Disk 1 
Virtual 
Virtual 
Virtual 
Virtual 
Virtual 
F 
F 
F 
F 
A single disk crash can destroy F file 
Virtualization is a complication. 
We need proofs of data redundancy on the physical layer.
Proof of redundancy 
Solutions 
Eeta Pizza Pi Cheapskate Pizza 
“Six pizzas!” 
The Pizza Oven Protocol (Juels A. 2011) Network latency 
Drive read time 
Slides credits to Ari Jules et al.
as well as encryption for both secure transit and secure storage at rest.
Celebrity photo leakage
Security challenges with storage outsourcing(Data leakage) 
DATA 
DATA 
DATA 
leakage
Security challenges with storage outsourcing(Data leakage) 
DATA 
E( ,DATA) 
leakage 
E( ,DATA)
Services Front End 
Storage Back End 
Security challenges with storage outsourcing(Data leakage) 
DATA 
leakage 
Challenge: Proofs of encrypting data at rest
12/2013 
9/2014 
10/2014 
09/2010 
05/2013 
Sensitive data must be encrypted before putting on the cloud server
Data UltiliztionData Encryption
WhittenA.,TygarJ.D.,WhyJohnnycan’tencrypt:ausabilityofevaluationofPGP5.0,SSYM'99Proceedingsofthe8thconferenceonUSENIXSecuritySymposium
Jakob Nielsen
Data Encryption vs Data UtilizationSolutions 
[Goldreich-Ostrovsky92] 
[Song-Wagner-Perrig-S&P00][Goh-ePrint-03, Chang-Mitzenmacher-ACNS05] [Curtmola-Garay-Kamara-Ostrovsky-ccs06] 
[Boneh et al. EUROCRYPT’04]
But, encryption is not always enough. 
Access patternscan leak sensitive information. 
Challenge: How to hide access patterns
The client is able to read a document mifrom the remote database without revealing his/her choice ito the server. 
The same as PIR; in addition, it is required that the client can onlylearn miafter protocol execution. 
The client is able to read and write the remote database without revealing his/her access pattern to the server. 
Access Pattern Problems
Từ khoá được các chị em tìm kiếm nhiều nhất năm 2013 là từ đại gia. 
Vloger Toàn Shinoda
Từ khoá được các chị em tìm kiếm nhiều nhất năm 2013 là từ đại gia. 
Vloger Toàn Shinoda
Computation Outsourcing vs Security
Computation Outsourcing
Computation Outsourcing 
DATA 
f(DATA) 
How to protect data 
How to protect result (f(DATA)) 
How to make sure the result is correct
Computation OutsourcingSolutions 
Gentry C., Fully Homomorphic Encryption Using Ideal Lattices, STOC 2009LauterK., NaehrigM., VaikuntanathanV., Can Homomorphic Encryption be Practical? IACR Cryptology ePrint Archive 2011/405, 2011 
BrakerskiZ., VaikuntanathanV., Efficient Fully Homomorphic Encryption from (Standard) LWE. In Proc. of FOCS, 2011, pp. 97-106 
BrakerskiZ., GentryC., VaikuntanathanV., (Leveled) fully homomorphic encryption without bootstrapping. In Proc. of ITCS, 2012, pp. 309-325 
BrakerskiZ., Fully Homomorphic Encryption without Modulus Switching from Classical GapSVP. IACR Cryptology ePrint Archive 2012/78, 2012 
Seny Kamara and Lei Wei, Garbled Circuits via Structured Encryption, in Workshop on Applied Homomorphic Encryption (WAHC '13), April 2013 
Seny Kamara and Mariana Raykova, Parallel Homomorphic Encryption, in Workshop on Applied Homomorphic Encryption (WAHC '13), April 2013
Computation OutsourcingSolutions 
Privacy preserving Datamining/Machine learning 
Verykios V. S. et.al, State-of-the-art in privacy preserving data mining, ACM SIGMOD Record Volume 33 Issue 1, March 2004 Pages 50 –57. 
Wang C. et.al, "Secure and Practical Outsourcing of Linear Programming in Cloud Computing,” in Proc. of IEEE INFOCOM, 2011. 
Wang C. et.al, OIRS: Outsourced Image Recovery Service from Compressive Sensing with Privacy Assurance, in NDSS Short Talk, 2013.
“Trusting trust” 
Whomdoyoutrust? 
Probability No 
Sometimes Yes
SOME SECURITY CHALLENGES  IN CLOUD COMPUTING

SOME SECURITY CHALLENGES IN CLOUD COMPUTING