SlideShare una empresa de Scribd logo
1 de 21
Security and Privacy inCloud Computing: A High-level View Ragib HasanNSF/CRA Computing Innovation Fellow Johns Hopkins University www.ragibhasan.com NSF Cloud PI Meeting, March 17, 2011
If cloud computing is so great, whyisn’t everyone using it? 2 Clouds are still subject to traditional data confidentiality, integrity, availability, and privacy issues, plus some additional attacks 3/17/11 Ragib Hasan | NSF Cloud PI Meeting 2011 | Cloud Security Panel
What the “experts” are saying? 3 [Cloud Computing] is a security nightmare and it can't be handled in traditional ways. John Chambers CISCO CEO It’s stupidity. It’s worse than stupidity Richard Stallman GNU 3/17/11 Ragib Hasan | NSF Cloud PI Meeting 2011 | Cloud Security Panel
Businesses don’t trust clouds (yet) Almost 75% of business CFOs are still afraid to use clouds for sensitive data due to lack of security 3/17/11 4 Ragib Hasan | NSF Cloud PI Meeting 2011 | Cloud Security Panel
Traditional systems security vsCloud Computing Security Securing a cloud Securing a traditional system 3/17/11 5 Ragib Hasan | NSF Cloud PI Meeting 2011 | Cloud Security Panel
Traditional systems security vsCloud Computing Security Analogy Securing a motel Securing a house Owner and user are often the same entity  Owner and users are almost invariably distinct entities 3/17/11 6 Ragib Hasan | NSF Cloud PI Meeting 2011 | Cloud Security Panel
Traditional systems security vsCloud Computing Security Securing a motel Securing a house Biggest user concerns Securing perimeter Checking for intruders Securing assets Biggest user concern Securing room against (the bad guy in next room | hotel owner) 3/17/11 7 Ragib Hasan | NSF Cloud PI Meeting 2011 | Cloud Security Panel
Research on Cloud Computing Security: A High Level View Novel attacks Trustworthy cloud architectures Data integrity and availability Computation integrity Data and computation privacy Data forensics Misbehavior detection Malicious use of clouds 3/17/11 8 Ragib Hasan | NSF Cloud PI Meeting 2011 | Cloud Security Panel
Co-tenancy in clouds creates new attack vectors A cloud is shared by multiple users Malicious users can now legally be in the same infrastructure Misusing co-tenancy, attackers can launch side channel attacks on victims Research question: How to prevent attackers from exploiting co-tenancy in attacking the infrastructure and/or other clients? Example: the Topology attack on Amazon EC2 (“Hey You! Get off of my Cloud …” CCS 2009) 3/17/11 9 Ragib Hasan | NSF Cloud PI Meeting 2011 | Cloud Security Panel
Today’s cloud architectures act like big black boxes 3/17/11 Ragib Hasan | NSF Cloud PI Meeting 2011 | Cloud Security Panel 10 Clients have no idea of or control over what is happening inside the cloud Clients are forced to trust cloud providers completely Research Question: How do we design cloud computing architectures that are semi-transparent and provide clients with control over security? Existing Approaches: TCCP (uses TPM), CloudProof
Today’s clouds provide no guarantee about outsourced data Amazon’s Terms of services 3/17/11 11 Ragib Hasan | NSF Cloud PI Meeting 2011 | Cloud Security Panel
Today’s clouds provide no guarantee about outsourced data Problem:  Dishonest cloud providers can throw data away or lose data. Malicious intruders can delete or tamper with data. Clients need reassurance that the outsourced data is available, has not been tampered with, and remains confidential. Research Question: How can clients get assurance/proofs that the cloud provider is actually storing data, is not tampering with data, and can make the data available on-demand? 3/17/11 12 Ragib Hasan | NSF Cloud PI Meeting 2011 | Cloud Security Panel Example Approaches: Provable Data Possession (PDP), Proof of Retrievability (PoR), HAIL
Ensuring confidentiality of data in outsourced computation is difficult 3/17/11 Ragib Hasan | NSF Cloud PI Meeting 2011 | Cloud Security Panel 13 Most type of computations require decrypting data before any computations If the cloud provider is not trusted, this may result in breach of confidentiality Research Question: How can we ensure confidentiality of data and computations in a cloud? Existing Approaches: Homomorphic encryption, TCCP
Clients have no way of verifying computations outsourced toa Cloud 14 Scenario    User sends her data processing job to the cloud.    Clouds provide dataflow operation as a service (e.g., MapReduce, Hadoop etc.) Problem: Users have no way of evaluating the correctness of results Research question: How can we verify the accuracy of outsourced computation? 3/17/11 Ragib Hasan | NSF Cloud PI Meeting 2011 | Cloud Security Panel Existing Approaches: Runtime Attestation, Majority voting, Redundant operations
Data Forensics in Clouds is difficult Certain Government regulations mandate the ability to audit and run forensic analysis on critical business or healthcare data Clouds complicate forensic analysis, since the same storage infrastructure is shared by many clients Cloud providers are not willing to open up their entire storage for forensic investigations.  Research question: How can we augment cloud infrastructures to allow forensic investigations? 3/17/11 15 Ragib Hasan | NSF Cloud PI Meeting 2011 | Cloud Security Panel
Clouds can be used for malicious purposes Adversaries can rent clouds temporarily to create a large scale botnet very quickly Clouds can be used for spamming, Denial of service, brute force password breaking, and other attacks Example:WPACracker.com – Claims to break WPA passwords for $17 in under 20 minutes, using a cloud Research question: How can we rapidly detect misbehavior of clients in a cloud? 3/17/11 16 Ragib Hasan | NSF Cloud PI Meeting 2011 | Cloud Security Panel
(Largely) Unexplored Areas Legal/policy issues and regulatory compliance: How does cloud computing fit in with data security laws and regulations such as SOX, HIPAA? For example,  If I store my data in Amazon, can the Govt. subpoena Amazon to access my data without violating 4th amendment? Will a cloud based storage system comply with SOX? 3/17/11 Ragib Hasan | NSF Cloud PI Meeting 2011 | Cloud Security Panel 17
My Research Agenda 3/17/11 Ragib Hasan | NSF Cloud PI Meeting 2011 | Cloud Security Panel 18 Question: How can we make clouds more accountable? Approach: By maintaining secure and verifiable provenance chains for all data and computations outsourced to a cloud, clients can get more accountability. Provenance of data  What happened to the data object while it was inside the cloud? (i.e., entire history of the data object) Provenance of computations How was a particular result computed inside a cloud? Challenges: How to ensure correct collection of provenance inside a cloud, even when the cloud provider may not be trustworthy?
Observations: What’s wrong with today’s cloud security research Failure to look at reality Many security schemes impose unrealistic overheads (e.g., >35%!!) – no one will use them in real life clouds Failure to consider economy Security schemes would cause significant changes to existing cloud infrastructures Many attacks simply don’t make any economic sense Lack of realistic threat models Many papers present unrealistic threat models, (“Solutions in search of a problem”)  3/17/11 19 Ragib Hasan | NSF Cloud PI Meeting 2011 | Cloud Security Panel
Summary 3/17/11 Ragib Hasan | NSF Cloud PI Meeting 2011 | Cloud Security Panel 20 The nature of clouds introduce new security challenges Today’s clouds are not secure, accountable, or trustworthy  Many open problems need to be resolved before major users will adopt clouds for sensitive data and computations
Thank You Check outmy Cloud Computing Security and Privacy course at Johns Hopkins University http://bit.ly/jhucloudsec Questions? Comments? Email: rhasan7@jhu.edu Web: http://www.ragibhasan.com

Más contenido relacionado

La actualidad más candente

06 Computer Image Verification and Authentication - Notes
06 Computer Image Verification and Authentication - Notes06 Computer Image Verification and Authentication - Notes
06 Computer Image Verification and Authentication - NotesKranthi
 
Computer forensics
Computer  forensicsComputer  forensics
Computer forensicsLalit Garg
 
Ch 4: Footprinting and Social Engineering
Ch 4: Footprinting and Social EngineeringCh 4: Footprinting and Social Engineering
Ch 4: Footprinting and Social EngineeringSam Bowne
 
Encryption and Decryption
Encryption and DecryptionEncryption and Decryption
Encryption and DecryptionRajaKrishnan M
 
Legal aspects of digital forensics
Legal aspects of digital forensics Legal aspects of digital forensics
Legal aspects of digital forensics KakshaPatel3
 
The CIA Triad - Assurance on Information Security
The CIA Triad - Assurance on Information SecurityThe CIA Triad - Assurance on Information Security
The CIA Triad - Assurance on Information SecurityBharath Rao
 
Network forensics and investigating logs
Network forensics and investigating logsNetwork forensics and investigating logs
Network forensics and investigating logsanilinvns
 
04 Evidence Collection and Data Seizure - Notes
04 Evidence Collection and Data Seizure - Notes04 Evidence Collection and Data Seizure - Notes
04 Evidence Collection and Data Seizure - NotesKranthi
 
Brief introduction to digital forensics
Brief introduction to digital forensicsBrief introduction to digital forensics
Brief introduction to digital forensicsMarco Alamanni
 
Cyber Security - Unit - 5 - Introduction to Cyber Crime Investigation
Cyber Security - Unit - 5 - Introduction to Cyber Crime InvestigationCyber Security - Unit - 5 - Introduction to Cyber Crime Investigation
Cyber Security - Unit - 5 - Introduction to Cyber Crime InvestigationGyanmanjari Institute Of Technology
 
05 Duplication and Preservation of Digital evidence - Notes
05 Duplication and Preservation of Digital evidence - Notes05 Duplication and Preservation of Digital evidence - Notes
05 Duplication and Preservation of Digital evidence - NotesKranthi
 
3 public key cryptography
3 public key cryptography3 public key cryptography
3 public key cryptographyRutvik Mehta
 
Mobile Phone Seizure Guide by Raghu Khimani
Mobile Phone Seizure Guide by Raghu KhimaniMobile Phone Seizure Guide by Raghu Khimani
Mobile Phone Seizure Guide by Raghu KhimaniDr Raghu Khimani
 
Application Security
Application SecurityApplication Security
Application Securityflorinc
 

La actualidad más candente (20)

06 Computer Image Verification and Authentication - Notes
06 Computer Image Verification and Authentication - Notes06 Computer Image Verification and Authentication - Notes
06 Computer Image Verification and Authentication - Notes
 
Software security
Software securitySoftware security
Software security
 
Computer forensics
Computer  forensicsComputer  forensics
Computer forensics
 
Cyber Forensics Module 2
Cyber Forensics Module 2Cyber Forensics Module 2
Cyber Forensics Module 2
 
Network Forensics
Network ForensicsNetwork Forensics
Network Forensics
 
Ch 4: Footprinting and Social Engineering
Ch 4: Footprinting and Social EngineeringCh 4: Footprinting and Social Engineering
Ch 4: Footprinting and Social Engineering
 
Encryption and Decryption
Encryption and DecryptionEncryption and Decryption
Encryption and Decryption
 
9780840024220 ppt ch09
9780840024220 ppt ch099780840024220 ppt ch09
9780840024220 ppt ch09
 
Legal aspects of digital forensics
Legal aspects of digital forensics Legal aspects of digital forensics
Legal aspects of digital forensics
 
The CIA Triad - Assurance on Information Security
The CIA Triad - Assurance on Information SecurityThe CIA Triad - Assurance on Information Security
The CIA Triad - Assurance on Information Security
 
Network forensics and investigating logs
Network forensics and investigating logsNetwork forensics and investigating logs
Network forensics and investigating logs
 
04 Evidence Collection and Data Seizure - Notes
04 Evidence Collection and Data Seizure - Notes04 Evidence Collection and Data Seizure - Notes
04 Evidence Collection and Data Seizure - Notes
 
Brief introduction to digital forensics
Brief introduction to digital forensicsBrief introduction to digital forensics
Brief introduction to digital forensics
 
Cryptography
CryptographyCryptography
Cryptography
 
Cyber Security - Unit - 5 - Introduction to Cyber Crime Investigation
Cyber Security - Unit - 5 - Introduction to Cyber Crime InvestigationCyber Security - Unit - 5 - Introduction to Cyber Crime Investigation
Cyber Security - Unit - 5 - Introduction to Cyber Crime Investigation
 
05 Duplication and Preservation of Digital evidence - Notes
05 Duplication and Preservation of Digital evidence - Notes05 Duplication and Preservation of Digital evidence - Notes
05 Duplication and Preservation of Digital evidence - Notes
 
3 public key cryptography
3 public key cryptography3 public key cryptography
3 public key cryptography
 
Mobile Phone Seizure Guide by Raghu Khimani
Mobile Phone Seizure Guide by Raghu KhimaniMobile Phone Seizure Guide by Raghu Khimani
Mobile Phone Seizure Guide by Raghu Khimani
 
Application Security
Application SecurityApplication Security
Application Security
 
Data Acquisition
Data AcquisitionData Acquisition
Data Acquisition
 

Destacado

Security & Privacy In Cloud Computing
Security & Privacy In Cloud ComputingSecurity & Privacy In Cloud Computing
Security & Privacy In Cloud Computingsaurabh soni
 
Lecture01: Introduction to Security and Privacy in Cloud Computing
Lecture01: Introduction to Security and Privacy in Cloud ComputingLecture01: Introduction to Security and Privacy in Cloud Computing
Lecture01: Introduction to Security and Privacy in Cloud Computingragibhasan
 
Cloud Computing : Top to Bottom
Cloud Computing : Top to BottomCloud Computing : Top to Bottom
Cloud Computing : Top to BottomIstiyak Siddiquee
 
Addictive manufacturing
Addictive manufacturingAddictive manufacturing
Addictive manufacturingRudi Pivetta
 
Privacy Concerns and Cloud Computing
Privacy Concerns and Cloud ComputingPrivacy Concerns and Cloud Computing
Privacy Concerns and Cloud ComputingAIIM International
 
Addictive printing or 3d printing
Addictive printing or 3d printingAddictive printing or 3d printing
Addictive printing or 3d printingSHUBHAM MORGAONKAR
 
Grow your business by shaping the human impacts of technology
Grow your business by shaping the human impacts of technologyGrow your business by shaping the human impacts of technology
Grow your business by shaping the human impacts of technologyMichael Siepmann, Ph.D.
 
Security & Privacy in Cloud Computing
Security & Privacy in Cloud ComputingSecurity & Privacy in Cloud Computing
Security & Privacy in Cloud ComputingJohn D. Johnson
 
Privacy and security in the cloud Challenges and solutions for our future inf...
Privacy and security in the cloud Challenges and solutions for our future inf...Privacy and security in the cloud Challenges and solutions for our future inf...
Privacy and security in the cloud Challenges and solutions for our future inf...PRISMACLOUD Project
 
The Security and Privacy Threats to Cloud Computing
The Security and Privacy Threats to Cloud ComputingThe Security and Privacy Threats to Cloud Computing
The Security and Privacy Threats to Cloud ComputingAnkit Singh
 
Cloud Security And Privacy
Cloud Security And PrivacyCloud Security And Privacy
Cloud Security And Privacytmather
 
Cloud computing simple ppt
Cloud computing simple pptCloud computing simple ppt
Cloud computing simple pptAgarwaljay
 
Business ethics and Corporate Governance
Business ethics and Corporate GovernanceBusiness ethics and Corporate Governance
Business ethics and Corporate Governancesaadiakh
 

Destacado (20)

Security & Privacy In Cloud Computing
Security & Privacy In Cloud ComputingSecurity & Privacy In Cloud Computing
Security & Privacy In Cloud Computing
 
Lecture01: Introduction to Security and Privacy in Cloud Computing
Lecture01: Introduction to Security and Privacy in Cloud ComputingLecture01: Introduction to Security and Privacy in Cloud Computing
Lecture01: Introduction to Security and Privacy in Cloud Computing
 
Cloud Computing : Top to Bottom
Cloud Computing : Top to BottomCloud Computing : Top to Bottom
Cloud Computing : Top to Bottom
 
Addictive manufacturing
Addictive manufacturingAddictive manufacturing
Addictive manufacturing
 
Privacy Concerns and Cloud Computing
Privacy Concerns and Cloud ComputingPrivacy Concerns and Cloud Computing
Privacy Concerns and Cloud Computing
 
Addictive printing or 3d printing
Addictive printing or 3d printingAddictive printing or 3d printing
Addictive printing or 3d printing
 
Grow your business by shaping the human impacts of technology
Grow your business by shaping the human impacts of technologyGrow your business by shaping the human impacts of technology
Grow your business by shaping the human impacts of technology
 
Cloud primer
Cloud primerCloud primer
Cloud primer
 
Cloud Computing & Security Concerns
Cloud Computing & Security ConcernsCloud Computing & Security Concerns
Cloud Computing & Security Concerns
 
Security & Privacy in Cloud Computing
Security & Privacy in Cloud ComputingSecurity & Privacy in Cloud Computing
Security & Privacy in Cloud Computing
 
Privacy and security in the cloud Challenges and solutions for our future inf...
Privacy and security in the cloud Challenges and solutions for our future inf...Privacy and security in the cloud Challenges and solutions for our future inf...
Privacy and security in the cloud Challenges and solutions for our future inf...
 
The Security and Privacy Threats to Cloud Computing
The Security and Privacy Threats to Cloud ComputingThe Security and Privacy Threats to Cloud Computing
The Security and Privacy Threats to Cloud Computing
 
Business Ethics
Business EthicsBusiness Ethics
Business Ethics
 
Cloud security ppt
Cloud security pptCloud security ppt
Cloud security ppt
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud Security And Privacy
Cloud Security And PrivacyCloud Security And Privacy
Cloud Security And Privacy
 
Business ethics
Business ethicsBusiness ethics
Business ethics
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
 
Cloud computing simple ppt
Cloud computing simple pptCloud computing simple ppt
Cloud computing simple ppt
 
Business ethics and Corporate Governance
Business ethics and Corporate GovernanceBusiness ethics and Corporate Governance
Business ethics and Corporate Governance
 

Similar a Security and Privacy in Cloud Computing - a High-level view

Iirdem a novel approach for enhancing security in multi cloud environment
Iirdem a novel approach for enhancing security in multi  cloud environmentIirdem a novel approach for enhancing security in multi  cloud environment
Iirdem a novel approach for enhancing security in multi cloud environmentIaetsd Iaetsd
 
Exploring Cloud Encryption
Exploring Cloud EncryptionExploring Cloud Encryption
Exploring Cloud EncryptionSamuel Borthwick
 
fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloudpriyanka reddy
 
A Novel privacy preserving public auditing for shared data in cloud
A Novel privacy preserving public auditing for shared data in cloudA Novel privacy preserving public auditing for shared data in cloud
A Novel privacy preserving public auditing for shared data in cloudJAVVAJI VENKATA RAO
 
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A SurveyTowards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A SurveyIRJET Journal
 
Research, the Cloud, and the IRB
Research, the Cloud, and the IRBResearch, the Cloud, and the IRB
Research, the Cloud, and the IRBMichael Zimmer
 
Security for Effective Data Storage in Multi Clouds
Security for Effective Data Storage in Multi CloudsSecurity for Effective Data Storage in Multi Clouds
Security for Effective Data Storage in Multi CloudsEditor IJCATR
 
Fog computing document
Fog computing documentFog computing document
Fog computing documentsravya raju
 
Cloud computing security
Cloud computing securityCloud computing security
Cloud computing securityPratik Sharma
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...
A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...
A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...IJSRED
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishekEr. rahul abhishek
 
Data Security Model Enhancement in Cloud Environment
Data Security Model Enhancement in Cloud EnvironmentData Security Model Enhancement in Cloud Environment
Data Security Model Enhancement in Cloud Environmentijsrd.com
 
Whose Cloud Is It Anyway? Exploring Data Security, Ownership and Control
Whose Cloud Is It Anyway? Exploring Data Security, Ownership and ControlWhose Cloud Is It Anyway? Exploring Data Security, Ownership and Control
Whose Cloud Is It Anyway? Exploring Data Security, Ownership and ControlDavid Etue
 

Similar a Security and Privacy in Cloud Computing - a High-level view (20)

Iirdem a novel approach for enhancing security in multi cloud environment
Iirdem a novel approach for enhancing security in multi  cloud environmentIirdem a novel approach for enhancing security in multi  cloud environment
Iirdem a novel approach for enhancing security in multi cloud environment
 
Exploring Cloud Encryption
Exploring Cloud EncryptionExploring Cloud Encryption
Exploring Cloud Encryption
 
fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloud
 
Fog doc
Fog doc Fog doc
Fog doc
 
B018211016
B018211016B018211016
B018211016
 
A Novel privacy preserving public auditing for shared data in cloud
A Novel privacy preserving public auditing for shared data in cloudA Novel privacy preserving public auditing for shared data in cloud
A Novel privacy preserving public auditing for shared data in cloud
 
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A SurveyTowards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
 
journal paper
journal paperjournal paper
journal paper
 
Research, the Cloud, and the IRB
Research, the Cloud, and the IRBResearch, the Cloud, and the IRB
Research, the Cloud, and the IRB
 
Security for Effective Data Storage in Multi Clouds
Security for Effective Data Storage in Multi CloudsSecurity for Effective Data Storage in Multi Clouds
Security for Effective Data Storage in Multi Clouds
 
Practical Security for the Cloud
Practical Security for the CloudPractical Security for the Cloud
Practical Security for the Cloud
 
Fog computing document
Fog computing documentFog computing document
Fog computing document
 
Cloud computing security
Cloud computing securityCloud computing security
Cloud computing security
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...
A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...
A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishek
 
Data Security Model Enhancement in Cloud Environment
Data Security Model Enhancement in Cloud EnvironmentData Security Model Enhancement in Cloud Environment
Data Security Model Enhancement in Cloud Environment
 
Project 3
Project 3Project 3
Project 3
 
Whose Cloud Is It Anyway? Exploring Data Security, Ownership and Control
Whose Cloud Is It Anyway? Exploring Data Security, Ownership and ControlWhose Cloud Is It Anyway? Exploring Data Security, Ownership and Control
Whose Cloud Is It Anyway? Exploring Data Security, Ownership and Control
 

Más de ragibhasan

Dw bobs-shikkhok
Dw bobs-shikkhokDw bobs-shikkhok
Dw bobs-shikkhokragibhasan
 
600.412.Lecture02
600.412.Lecture02600.412.Lecture02
600.412.Lecture02ragibhasan
 
600.412.Lecture03
600.412.Lecture03600.412.Lecture03
600.412.Lecture03ragibhasan
 
600.412.Lecture05
600.412.Lecture05600.412.Lecture05
600.412.Lecture05ragibhasan
 
600.412.Lecture07
600.412.Lecture07600.412.Lecture07
600.412.Lecture07ragibhasan
 
600.412.Lecture06
600.412.Lecture06600.412.Lecture06
600.412.Lecture06ragibhasan
 
600.412.Lecture08
600.412.Lecture08600.412.Lecture08
600.412.Lecture08ragibhasan
 
Fake Picassos, Tampered History, and Digital Forgery: Protecting the Genealog...
Fake Picassos, Tampered History, and Digital Forgery: Protecting the Genealog...Fake Picassos, Tampered History, and Digital Forgery: Protecting the Genealog...
Fake Picassos, Tampered History, and Digital Forgery: Protecting the Genealog...ragibhasan
 

Más de ragibhasan (8)

Dw bobs-shikkhok
Dw bobs-shikkhokDw bobs-shikkhok
Dw bobs-shikkhok
 
600.412.Lecture02
600.412.Lecture02600.412.Lecture02
600.412.Lecture02
 
600.412.Lecture03
600.412.Lecture03600.412.Lecture03
600.412.Lecture03
 
600.412.Lecture05
600.412.Lecture05600.412.Lecture05
600.412.Lecture05
 
600.412.Lecture07
600.412.Lecture07600.412.Lecture07
600.412.Lecture07
 
600.412.Lecture06
600.412.Lecture06600.412.Lecture06
600.412.Lecture06
 
600.412.Lecture08
600.412.Lecture08600.412.Lecture08
600.412.Lecture08
 
Fake Picassos, Tampered History, and Digital Forgery: Protecting the Genealog...
Fake Picassos, Tampered History, and Digital Forgery: Protecting the Genealog...Fake Picassos, Tampered History, and Digital Forgery: Protecting the Genealog...
Fake Picassos, Tampered History, and Digital Forgery: Protecting the Genealog...
 

Último

DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 

Último (20)

DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 

Security and Privacy in Cloud Computing - a High-level view

  • 1. Security and Privacy inCloud Computing: A High-level View Ragib HasanNSF/CRA Computing Innovation Fellow Johns Hopkins University www.ragibhasan.com NSF Cloud PI Meeting, March 17, 2011
  • 2. If cloud computing is so great, whyisn’t everyone using it? 2 Clouds are still subject to traditional data confidentiality, integrity, availability, and privacy issues, plus some additional attacks 3/17/11 Ragib Hasan | NSF Cloud PI Meeting 2011 | Cloud Security Panel
  • 3. What the “experts” are saying? 3 [Cloud Computing] is a security nightmare and it can't be handled in traditional ways. John Chambers CISCO CEO It’s stupidity. It’s worse than stupidity Richard Stallman GNU 3/17/11 Ragib Hasan | NSF Cloud PI Meeting 2011 | Cloud Security Panel
  • 4. Businesses don’t trust clouds (yet) Almost 75% of business CFOs are still afraid to use clouds for sensitive data due to lack of security 3/17/11 4 Ragib Hasan | NSF Cloud PI Meeting 2011 | Cloud Security Panel
  • 5. Traditional systems security vsCloud Computing Security Securing a cloud Securing a traditional system 3/17/11 5 Ragib Hasan | NSF Cloud PI Meeting 2011 | Cloud Security Panel
  • 6. Traditional systems security vsCloud Computing Security Analogy Securing a motel Securing a house Owner and user are often the same entity Owner and users are almost invariably distinct entities 3/17/11 6 Ragib Hasan | NSF Cloud PI Meeting 2011 | Cloud Security Panel
  • 7. Traditional systems security vsCloud Computing Security Securing a motel Securing a house Biggest user concerns Securing perimeter Checking for intruders Securing assets Biggest user concern Securing room against (the bad guy in next room | hotel owner) 3/17/11 7 Ragib Hasan | NSF Cloud PI Meeting 2011 | Cloud Security Panel
  • 8. Research on Cloud Computing Security: A High Level View Novel attacks Trustworthy cloud architectures Data integrity and availability Computation integrity Data and computation privacy Data forensics Misbehavior detection Malicious use of clouds 3/17/11 8 Ragib Hasan | NSF Cloud PI Meeting 2011 | Cloud Security Panel
  • 9. Co-tenancy in clouds creates new attack vectors A cloud is shared by multiple users Malicious users can now legally be in the same infrastructure Misusing co-tenancy, attackers can launch side channel attacks on victims Research question: How to prevent attackers from exploiting co-tenancy in attacking the infrastructure and/or other clients? Example: the Topology attack on Amazon EC2 (“Hey You! Get off of my Cloud …” CCS 2009) 3/17/11 9 Ragib Hasan | NSF Cloud PI Meeting 2011 | Cloud Security Panel
  • 10. Today’s cloud architectures act like big black boxes 3/17/11 Ragib Hasan | NSF Cloud PI Meeting 2011 | Cloud Security Panel 10 Clients have no idea of or control over what is happening inside the cloud Clients are forced to trust cloud providers completely Research Question: How do we design cloud computing architectures that are semi-transparent and provide clients with control over security? Existing Approaches: TCCP (uses TPM), CloudProof
  • 11. Today’s clouds provide no guarantee about outsourced data Amazon’s Terms of services 3/17/11 11 Ragib Hasan | NSF Cloud PI Meeting 2011 | Cloud Security Panel
  • 12. Today’s clouds provide no guarantee about outsourced data Problem: Dishonest cloud providers can throw data away or lose data. Malicious intruders can delete or tamper with data. Clients need reassurance that the outsourced data is available, has not been tampered with, and remains confidential. Research Question: How can clients get assurance/proofs that the cloud provider is actually storing data, is not tampering with data, and can make the data available on-demand? 3/17/11 12 Ragib Hasan | NSF Cloud PI Meeting 2011 | Cloud Security Panel Example Approaches: Provable Data Possession (PDP), Proof of Retrievability (PoR), HAIL
  • 13. Ensuring confidentiality of data in outsourced computation is difficult 3/17/11 Ragib Hasan | NSF Cloud PI Meeting 2011 | Cloud Security Panel 13 Most type of computations require decrypting data before any computations If the cloud provider is not trusted, this may result in breach of confidentiality Research Question: How can we ensure confidentiality of data and computations in a cloud? Existing Approaches: Homomorphic encryption, TCCP
  • 14. Clients have no way of verifying computations outsourced toa Cloud 14 Scenario User sends her data processing job to the cloud. Clouds provide dataflow operation as a service (e.g., MapReduce, Hadoop etc.) Problem: Users have no way of evaluating the correctness of results Research question: How can we verify the accuracy of outsourced computation? 3/17/11 Ragib Hasan | NSF Cloud PI Meeting 2011 | Cloud Security Panel Existing Approaches: Runtime Attestation, Majority voting, Redundant operations
  • 15. Data Forensics in Clouds is difficult Certain Government regulations mandate the ability to audit and run forensic analysis on critical business or healthcare data Clouds complicate forensic analysis, since the same storage infrastructure is shared by many clients Cloud providers are not willing to open up their entire storage for forensic investigations. Research question: How can we augment cloud infrastructures to allow forensic investigations? 3/17/11 15 Ragib Hasan | NSF Cloud PI Meeting 2011 | Cloud Security Panel
  • 16. Clouds can be used for malicious purposes Adversaries can rent clouds temporarily to create a large scale botnet very quickly Clouds can be used for spamming, Denial of service, brute force password breaking, and other attacks Example:WPACracker.com – Claims to break WPA passwords for $17 in under 20 minutes, using a cloud Research question: How can we rapidly detect misbehavior of clients in a cloud? 3/17/11 16 Ragib Hasan | NSF Cloud PI Meeting 2011 | Cloud Security Panel
  • 17. (Largely) Unexplored Areas Legal/policy issues and regulatory compliance: How does cloud computing fit in with data security laws and regulations such as SOX, HIPAA? For example, If I store my data in Amazon, can the Govt. subpoena Amazon to access my data without violating 4th amendment? Will a cloud based storage system comply with SOX? 3/17/11 Ragib Hasan | NSF Cloud PI Meeting 2011 | Cloud Security Panel 17
  • 18. My Research Agenda 3/17/11 Ragib Hasan | NSF Cloud PI Meeting 2011 | Cloud Security Panel 18 Question: How can we make clouds more accountable? Approach: By maintaining secure and verifiable provenance chains for all data and computations outsourced to a cloud, clients can get more accountability. Provenance of data What happened to the data object while it was inside the cloud? (i.e., entire history of the data object) Provenance of computations How was a particular result computed inside a cloud? Challenges: How to ensure correct collection of provenance inside a cloud, even when the cloud provider may not be trustworthy?
  • 19. Observations: What’s wrong with today’s cloud security research Failure to look at reality Many security schemes impose unrealistic overheads (e.g., >35%!!) – no one will use them in real life clouds Failure to consider economy Security schemes would cause significant changes to existing cloud infrastructures Many attacks simply don’t make any economic sense Lack of realistic threat models Many papers present unrealistic threat models, (“Solutions in search of a problem”) 3/17/11 19 Ragib Hasan | NSF Cloud PI Meeting 2011 | Cloud Security Panel
  • 20. Summary 3/17/11 Ragib Hasan | NSF Cloud PI Meeting 2011 | Cloud Security Panel 20 The nature of clouds introduce new security challenges Today’s clouds are not secure, accountable, or trustworthy Many open problems need to be resolved before major users will adopt clouds for sensitive data and computations
  • 21. Thank You Check outmy Cloud Computing Security and Privacy course at Johns Hopkins University http://bit.ly/jhucloudsec Questions? Comments? Email: rhasan7@jhu.edu Web: http://www.ragibhasan.com