102.12.25 中正大學資管系古政元教授 屏東科技大學演講(2013-12-25)

36
A Novel Infrastructure for Data Sanitization in Cloud Computing Dr. Cheng-Yuan Ku Department of Information Management, National Chung Cheng University, Taiwan, R.O.C. Date Dec. 25, 2013

Upload: -

Post on 02-Aug-2015

288 views

Category:

Documents


3 download

TRANSCRIPT

Page 1: 102.12.25 中正大學資管系古政元教授 屏東科技大學演講(2013-12-25)

A Novel Infrastructure for Data Sanitization

in Cloud Computing

Dr. Cheng-Yuan KuDepartment of Information Management, National Chung Cheng University, Taiwan, R.O.C.Date : Dec. 25, 2013

Page 2: 102.12.25 中正大學資管系古政元教授 屏東科技大學演講(2013-12-25)

C. V.

• NCTU, Control Engineering, B.S. in 1987

• Northwestern University, EECS M.S. in 1993

• Northwestern University, EECS Ph.D. in 1995

• Purdue University, Visiting Professor in 2009

• Specialties: Computer and Communication Network, Information Security, Information Security Management, E- and M-commerce, Cloud Computing Security

Page 3: 102.12.25 中正大學資管系古政元教授 屏東科技大學演講(2013-12-25)

Outline

1. Introduction1. Introduction

2. Related Technology and Works2. Related Technology and Works

3. Proposed Mechanism3. Proposed Mechanism

4. Experimental Results and Future Work4. Experimental Results and Future Work

1. Introduction1. Introduction

Page 4: 102.12.25 中正大學資管系古政元教授 屏東科技大學演講(2013-12-25)

Background

Cloud computing service (Mell & Grance, 2011): IaaS , PaaS , SaaS

Cloud Security (Subashini & Kavitha, 2011): Data security

Personal Data Protection Act in Taiwan (Chang, 2012): Collecting, processing and using personal data A party will be fined up to NT 200 million for violation. Government agencies and non-governmental organizations

must provide evidence for handling personal data with due care in the court. It is not the customer’s responsibility.

Page 5: 102.12.25 中正大學資管系古政元教授 屏東科技大學演講(2013-12-25)

Motivations Data Remanence:

Comply with PDPA:

• What is data remanence ?– Data sanitization (Kissel et al., 2006)

– One of the most important security issues for cloud computing

• Solutions for cloud computing– To provide evidence– To audit data security

Page 6: 102.12.25 中正大學資管系古政元教授 屏東科技大學演講(2013-12-25)

Outline

1. Introduction1. Introduction

2. Related Works2. Related Works

3. Proposed Mechanism3. Proposed Mechanism

4. Experimental Results and Future Work4. Experimental Results and Future Work

2. Related Technology and Works2. Related Technology and Works

Page 7: 102.12.25 中正大學資管系古政元教授 屏東科技大學演講(2013-12-25)

Cloud Computing Operating System

VMware vSphere architecture Source : Modified from the VMware (2011)

• Windows Azure

• Google Apps

• VMware vSphere

• Amazon WebService

Page 8: 102.12.25 中正大學資管系古政元教授 屏東科技大學演講(2013-12-25)

Big Data Platform-Hadoop

Hadoop cluster operating Source : White (2012)

• Hadoop Distributed File System (HDFS)

• MapReduce

Page 9: 102.12.25 中正大學資管系古政元教授 屏東科技大學演講(2013-12-25)

Public-Key Infrastructure

Public-key infrastructure model Source : Stallings (2012)

Page 10: 102.12.25 中正大學資管系古政元教授 屏東科技大學演講(2013-12-25)

Monitoring mode (CSA, 2011)

• Database Activity Monitoring (DAM)

• File Activity Monitoring (FAM)

Page 11: 102.12.25 中正大學資管系古政元教授 屏東科技大學演講(2013-12-25)

Monitoring Approach for Cloud

McAfee database activity monitoring architecture Source : McAfee (2012)

Page 12: 102.12.25 中正大學資管系古政元教授 屏東科技大學演講(2013-12-25)

Data Security Lifecycle

Source : Modified from the CSA (2011)

Page 13: 102.12.25 中正大學資管系古政元教授 屏東科技大學演講(2013-12-25)

Data Sanitization (1/2)

Definition (Kissel, Scholl, Skolochenko, & Li, 2006) :• The data sanitization refers to removing remnant

data from storage media.

• Type– Clearing : Overwriting– Purging : Degaussing– Destroying : Disintegration, incineration,

pulverizing, shredding, and melting.

Page 14: 102.12.25 中正大學資管系古政元教授 屏東科技大學演講(2013-12-25)

Data Sanitization (2/2)

Overwriting methods :

• Gutmann

• Schneier

• US DoD 5220-22.M

• VSITR

Overwrite Algorithm

Pass 1-35: Writes a random character

• Gutmann

Source : Gutmann (1996)

• Schneier Pass 1: Writes a onePass 2: Writes a zeroPass 3: Writes a random characterPass 4: Writes a random characterPass 5: Writes a random characterPass 6: Writes a random characterPass 7: Writes a random character

Source : Schneier (2004)

• US DoD 5220-22.M

Pass 1: Writes a zero and verifiesPass 2: Writes a one and verifiesPass 3: Writes a random character and verifies the write

Source : DoD and CIA (1995)

• VSITR

Pass 1: Writes a zeroPass 2: Writes a onePass 3: Writes a zeroPass 4: Writes a onePass 5: Writes a zeroPass 6: Writes a onePass 7: Writes a random character

Source : Hintemann and Faßnacht (2008)

Page 15: 102.12.25 中正大學資管系古政元教授 屏東科技大學演講(2013-12-25)

Outline

1. Introduction1. Introduction

2. Related Technology and Works2. Related Technology and Works

3. Proposed Mechanism3. Proposed Mechanism

4. Experimental Results and Future Work4. Experimental Results and Future Work

3. Proposed Mechanism3. Proposed Mechanism

Page 16: 102.12.25 中正大學資管系古政元教授 屏東科技大學演講(2013-12-25)

Mechanism process

Trust ModelTrust Model

Data Sanitization SchemeData Sanitization Scheme

Monitoring Framework DesignMonitoring Framework Design

Page 17: 102.12.25 中正大學資管系古政元教授 屏東科技大學演講(2013-12-25)

Trust Model

Page 18: 102.12.25 中正大學資管系古政元教授 屏東科技大學演講(2013-12-25)

Concerns of data sanitization

1) We must know where the data are stored and which data should be cleared.

2) We need to monitor the clearing process.

Page 19: 102.12.25 中正大學資管系古政元教授 屏東科技大學演講(2013-12-25)

Design of Monitoring Framework

Page 20: 102.12.25 中正大學資管系古政元教授 屏東科技大學演講(2013-12-25)

Monitoring Center

• Monitoring Data

Page 21: 102.12.25 中正大學資管系古政元教授 屏東科技大學演講(2013-12-25)

Data Sanitization Scheme (1/2) Data Sanitization Process

Page 22: 102.12.25 中正大學資管系古政元教授 屏東科技大學演講(2013-12-25)

Data Sanitization Scheme (2/2) Data Sanitization by Overwriting

• Customer interface and procedure

– Interface provides customer two choices whether the data sanitization should be monitored or not.

– Select the number of overwrites, and confirm the service.

– Customers choose whether the recovery test report is necessary.

Page 23: 102.12.25 中正大學資管系古政元教授 屏東科技大學演講(2013-12-25)

Outline

1. Introduction1. Introduction

2. Related Technology and Works2. Related Technology and Works

3. Proposed Mechanism3. Proposed Mechanism

4. Current Status and Future Work4. Current Status and Future Work4. Experimental Results and Future Work4. Experimental Results and Future Work

Page 24: 102.12.25 中正大學資管系古政元教授 屏東科技大學演講(2013-12-25)

Implementation and performance evaluation

• Overwriting program– To propose an efficient overwriting scheme in cloud

• Monitoring center– Provide big data to the monitoring center to test

• Monitoring agent– DAM (Database activity monitoring) captures the

metadata packet– FAM (File activity monitoring) captures the log files

Page 25: 102.12.25 中正大學資管系古政元教授 屏東科技大學演講(2013-12-25)

Gutmann sanitization performance

Gutmann sanitization performance

Page 26: 102.12.25 中正大學資管系古政元教授 屏東科技大學演講(2013-12-25)

Schneier sanitization performance

Schneier sanitization performance

Page 27: 102.12.25 中正大學資管系古政元教授 屏東科技大學演講(2013-12-25)

US DoD 5220-22.M sanitization performance

US DoD 5220-22.M sanitization performance

Page 28: 102.12.25 中正大學資管系古政元教授 屏東科技大學演講(2013-12-25)

VSITR sanitization performance

VSITR sanitization performance

Page 29: 102.12.25 中正大學資管系古政元教授 屏東科技大學演講(2013-12-25)

Performance Analysis of Data Sanitization

Sanitization method Time CPU load

Gutmann 31 min 12

Schneier 6 min 2

US DoD 5220-22.M 3 min 1

VSITR 6 min 2

Page 30: 102.12.25 中正大學資管系古政元教授 屏東科技大學演講(2013-12-25)

System Simulation and Implementation

Page 31: 102.12.25 中正大學資管系古政元教授 屏東科技大學演講(2013-12-25)

System Simulation and Implementation

Page 32: 102.12.25 中正大學資管系古政元教授 屏東科技大學演講(2013-12-25)

Cloud Environment - DNS & iSCSI

Page 33: 102.12.25 中正大學資管系古政元教授 屏東科技大學演講(2013-12-25)

System Establishment - Conversion Interface

Page 34: 102.12.25 中正大學資管系古政元教授 屏東科技大學演講(2013-12-25)

Data Security Lifecycle Report

Page 35: 102.12.25 中正大學資管系古政元教授 屏東科技大學演講(2013-12-25)

Future Work

• Further Performance Evaluation

• Cloud Data Lifecycle Auditing Criteria for ISACA

• Other Cloud Security Issues

Page 36: 102.12.25 中正大學資管系古政元教授 屏東科技大學演講(2013-12-25)

Thank you for your attention