/
Ragib Hasan Ragib Hasan

Ragib Hasan - PowerPoint Presentation

phoebe-click
phoebe-click . @phoebe-click
Follow
398 views
Uploaded On 2016-02-24

Ragib Hasan - PPT Presentation

Johns Hopkins University en600412 Spring 2010 Lecture 7 03292010 Security and Privacy in Cloud Computing Provenance Provenance from Latin provenire come from defined as ID: 229073

ragib 2010 412 600 2010 ragib 600 412 spring lecture hasan cloud jhu provenance data user key users access

Share:

Link:

Embed:

Download Presentation from below link

Download Presentation The PPT/PDF document "Ragib Hasan" is the property of its rightful owner. Permission is granted to download and print the materials on this web site for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.


Presentation Transcript

Slide1

Ragib HasanJohns Hopkins Universityen.600.412 Spring 2010

Lecture 703/29/2010

Security and Privacy in Cloud ComputingSlide2

ProvenanceProvenance:

from Latin provenire ‘come from’, defined as “(i) the fact of coming from some particular source or quarter; origin, derivation.

(ii) the history or pedigree of a work of art, manuscript, rare book, etc.; a record of the ultimate derivation and passage of an item through its various owners” (Oxford English Dictionary)In other words, Who owned it, what

was done to it, how was it transferred …

Widely used in arts, archives, and archeology, called the Fundamental Principle of Archival

3/29/2010

en.600.412 Spring 2010 Lecture 7 | JHU | Ragib Hasan

2

http://moma.org/collection/provenance/items/644.67.html

L'artiste

et son

modèle

(1928), at Museum of Modern ArtSlide3

Data Provenance3/29/2010

en.600.412 Spring 2010 Lecture 7 | JHU | Ragib Hasan3

Definition*Description of the origins of data and the process by which it arrived at the database. [Buneman et al.]Information describing materials and transformations applied to derive the data. [Lanter]

Metadata recording the process of experiment workflows, annotations, and notes about experiments. [Greenwood]Information that helps determine the

derivation history of a data product, starting from its original sources. [Simmhan et al.]

*

Simmhan

et al. A Survey of Provenance in E-Science. SIGMOD Record, 2005.Slide4

Forensics and Provenance in CloudsCloud provenance can beData provenance

: Who created, modified, deleted data stored in a cloud (external entities change data)Process provenance: What happened to data once it was inside the cloud (internal entities change data)Cloud provenance should give a record

of who accessed the data at different timesAuditors should be able to trace an entry (and associated modification) back to the creator3/29/2010en.600.412 Spring 2010 Lecture 7 | JHU | Ragib Hasan4Slide5

Privacy questionsShould the cloud provider know the identity of cloud users?Should cloud users know the identity of other users in the same group?

3/29/2010en.600.412 Spring 2010 Lecture 7 | JHU | Ragib Hasan

5Slide6

The “Bread and Butter” paperProblemTo

preserve user privacy and allow anonymous authentication/access in a cloudTo determine

authorship of data, i.e., to bind data versions to user identities in a cloud3/29/2010en.600.412 Spring 2010 Lecture 7 | JHU | Ragib Hasan6

Lu et al., Secure Provenance: The Essential Bread and Butter of Data Forensics in Cloud Computing

, AsiaCCS 2010Slide7

Threat ModelWho are the key players?UsersSM

SPWho trusts who?Users: trust the SM, but not the SPSP: Trust SMSM: ?What attacks can happen?

3/29/2010en.600.412 Spring 2010 Lecture 7 | JHU | Ragib Hasan7Slide8

System ModelSM: Manages the whole system(?), registers cloud users and providers, issues keysSP

: Cloud service provider, manages access to cloud resourcesUsers: A user is part of a group of authorized principals who can access group resources3/29/2010

en.600.412 Spring 2010 Lecture 7 | JHU | Ragib Hasan8Slide9

Secure provenance (according to the paper)By secure provenance, the authors implyUsers

can anonymously authenticate themselves as part of authorized users/groups to the cloud providerUsers can anonymously access and modify resourcesEncrypted data stored by a user can be decrypted by other users from the same groupIf necessary, the SM can

trace a data item to the user who created it3/29/2010en.600.412 Spring 2010 Lecture 7 | JHU | Ragib Hasan9Slide10

SetupInputs: Security parameter kOutput: Master key, public parameters

3/29/2010en.600.412 Spring 2010 Lecture 7 | JHU | Ragib Hasan

10SM

K

Master Key

Param

(Public Parameters)Slide11

User/provider registrationInputs: Master key, public parameters, user identityOutputs: Private key, entry in tracking list

3/29/2010en.600.412 Spring 2010 Lecture 7 | JHU | Ragib Hasan

11

Master Key

Param

(Public Parameters)

User identity U

i

Private key sk

i

Tracking listSlide12

User-cloud interaction (1)User anonymously authenticate herself to the cloud

Cloud provider can check that the signature was made with a key issued by the SM3/29/2010

en.600.412 Spring 2010 Lecture 7 | JHU | Ragib Hasan12

χ

σ

A

=

sign

ski

(Yi

||χ

)

σP

/

ask

iSlide13

User-cloud interaction (2)Provider stores Signatures and authentication information during each access

3/29/2010en.600.412 Spring 2010 Lecture 7 | JHU | Ragib Hasan

13

EncryptedData

: C = encrypt(M)Sig =

sign

aski

(C)

Store C and

σ

A

Slide14

Identifying authorship

3/29/2010en.600.412 Spring 2010 Lecture 7 | JHU | Ragib Hasan14

σ

A

User identity Slide15

Confidentiality preservationEach user gets a different authorized group user access key Any group user access key can be used to decrypt a

ciphertext created by other users in the same group3/29/2010en.600.412 Spring 2010 Lecture 7 | JHU | Ragib Hasan

15Slide16

DiscussionSuppose Amazon S3 implements such a model. What will be the advantages, and what will be the disadvantages?

3/29/2010en.600.412 Spring 2010 Lecture 7 | JHU | Ragib Hasan

16Slide17

What about other provenance in computation clouds?If the data is being manipulated by processes running in the cloud, how will the problem change?

3/29/2010en.600.412 Spring 2010 Lecture 7 | JHU | Ragib Hasan

17Slide18

3/29/2010

18en.600.412 Spring 2010 Lecture 7 | JHU | Ragib Hasan

Further ReadingRagib Hasan, Radu Sion, and Marianne Winslett, Protecting History Forgery with Secure Provenance, ACM Transactions on Storage, December 2009