cryptographic cloud storage

49
Cryptographic Cloud Storage Seny Kamara & Kristin Lauter senyk@microsoft .com [email protected] Micorsoft Reaserch B99705013 廖廖廖 B99705025 廖廖廖

Upload: darryl

Post on 23-Feb-2016

47 views

Category:

Documents


0 download

DESCRIPTION

Cryptographic Cloud Storage. Seny Kamara & Kristin Lauter senyk@microsoft .com [email protected] Micorsoft Reaserch. B99705013 廖以圻 B99705025 陳育旋. outline. Introduction of the cloud storage service The basic concept of cryptography Architecture of a cryptographic storage service - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Cryptographic Cloud Storage

Cryptographic Cloud Storage

Seny Kamara & Kristin Lautersenyk@microsoft .com [email protected]

Micorsoft ReaserchB99705013 廖以圻B99705025 陳育旋

Page 2: Cryptographic Cloud Storage

Introduction of the cloud storage service The basic concept of cryptography Architecture of a cryptographic storage

service Benefit of a cryptographic storage service The core component of a cryptographic

storage service Summary

outline

Page 3: Cryptographic Cloud Storage

Introduction of the cloud storage service The basic concept of cryptography Architecture of a cryptographic storage

service Benefit of a cryptographic storage service The core component of a cryptographic

storage service Summary

outline

Page 4: Cryptographic Cloud Storage

Cloud infrastructure can be categorized as private or public Benefit of public storage service : availability reliability efficient retrieval data sharing

Introduction of the cloud storage service

Page 5: Cryptographic Cloud Storage

Main concern for a public storage service : 1. confidentiality 2. integrity

Introduction of the cloud storage service

we argue for designing a virtual private storage service based on recently cryptographic techniques.

Page 6: Cryptographic Cloud Storage

Introduction of the cloud storage service The basic concept of cryptography Architecture of a cryptographic storage

service Benefit of a cryptographic storage service The core component of a cryptographic

storage service Summary

outline

Page 7: Cryptographic Cloud Storage

symmetric & asymmetric encryption Symmetric encryption

cryptography

Page 8: Cryptographic Cloud Storage

Asymmetric encryption

cryptography

Page 9: Cryptographic Cloud Storage

Asymmetric encryption

cryptography

Page 10: Cryptographic Cloud Storage

Introduction of the cloud storage service The basic concept of cryptography Architecture of a cryptographic storage

service Benefit of a cryptographic storage service The core component of a cryptographic

storage service Summary

outline

Page 11: Cryptographic Cloud Storage

Architecture of a Cryptographic Storage

Service

Page 12: Cryptographic Cloud Storage

Data processor (aka. DP): process data before it is sent to cloud.

Data verifier(aka. DV): checks whether the data in the cloud has been tempered with.

Token generator(aka. TG): generate tokens that enable the cloud storage to retrieve segments of customer data.

credential generator(CG): implements an access control policy by issuing credentials (憑據 ) to the various parties in the system

Basic Components

Page 13: Cryptographic Cloud Storage

A CUMSTOMER ARCHITECTURE

AN ENTERPRISE ARCHITECTURE

2 kinds of architecture

Page 14: Cryptographic Cloud Storage

A customer architecture

Page 15: Cryptographic Cloud Storage

A story begin with three party: Alice, Bob and storage provider.

Alice wants to share data with Bob. HOW TO DO THAT??

A customer architecture

Page 16: Cryptographic Cloud Storage

First, Alice and Bob using the same DP, DV, TG.

Alice generate a cryptography key (master key), which is kept in local.

A customer architecture

Page 17: Cryptographic Cloud Storage

When Alice wants to upload files. Using DP: Attaches metadata and encrypt and encode. Using DV: Verifying the integrity of data. Using TG: Wants to retrieve data. Send token to the cloud storage to search

the appropriate encrypted file.

A customer architecture

Page 18: Cryptographic Cloud Storage

When Bob wants to retrieve some file. Alice uses TG to make a token to Bob, and

also uses a CG to make a credential to Bob. After Bob receive token and credential, he

uses the token to retrieve data, and decrypt it with credential.

A customer architecture

Page 19: Cryptographic Cloud Storage

A customer architecture

Page 20: Cryptographic Cloud Storage

A CUMSTOMER ARCHITECTURE

AN ENTERPRISE ARCHITECTURE

2 kinds of architecture

Page 21: Cryptographic Cloud Storage

A customer architecture

Page 22: Cryptographic Cloud Storage

An Enterprise Architecture

Page 23: Cryptographic Cloud Storage

MegaCorp wants to share data with PartnerCorp, MegaCorp store data in cloud storage provider.

Depending on the particular scenario, dedicated machines will run various core components.

An Enterprise Architecture

Page 24: Cryptographic Cloud Storage

each MegaCorp and PartnerCorp employee receives a credential from the credential generator.

所有人的 credential都不同,依職位劃分。 Whenever a MegaCorp employee generates

data that needs to be stored in the cloud, it sends the data together with an associated decryption policy to the dedicated machine for processing.

An Enterprise Architecture

Page 25: Cryptographic Cloud Storage

To retrieve data from the cloud, an employee requests an appropriate token from the dedicated machine.

Different TOKENS can access different information.

Usage of DV is the same as before.

An Enterprise Architecture

Page 26: Cryptographic Cloud Storage

A PartnerCorp employee needs access to MegaCorp's data, he authenticates itself to MegaCorp's dedicated machine and sends it a keyword.

The dedicated machine returns an appropriate token which the employee uses to recover the appropriate files.

An Enterprise Architecture

Page 27: Cryptographic Cloud Storage

In the case that MegaCorp is a very large organization, Data processor may have great loading.

An Enterprise Architecture

v

Page 28: Cryptographic Cloud Storage

Another case the dedicated machines only run data verifiers, token generators and credential generators while the data processing is distributed to each employee.

An Enterprise Architecture

Page 29: Cryptographic Cloud Storage

An Enterprise Architecture

Page 30: Cryptographic Cloud Storage

Introduction of the cloud storage service The basic concept of cryptography Architecture of a cryptographic storage

service Benefit of a cryptographic storage service The core component of a cryptographic

storage service Summary

outline

Page 31: Cryptographic Cloud Storage

Benefits of a Cryptographic Storage Service

Page 32: Cryptographic Cloud Storage

Control of the data is maintained by the customer.

the security properties are derived from cryptography.

Core Properties

Page 33: Cryptographic Cloud Storage

Regulatory compliance Geographic restrictions Subpoenas Security breaches Electronic discovery Data retention and destruction

Concerns

Page 34: Cryptographic Cloud Storage

Regulatory compliance (保護資料 ) Laws for protecting data. Sol: Data processor and encryption may help.

Geographic restrictions It can be difficult to ascertain exactly where

one's data is being stored once it is sent to the cloud. some customers may be reluctant to use a public cloud for fear of increasing their legal exposure.

Sol: All data are stored in encrypted form.

Concerns

Page 35: Cryptographic Cloud Storage

Subpoenas If the data is stored in a public cloud, the request

may be made to the cloud provider and the latter could even be prevented from notifying the customer.

Sol: data is stored in encrypted form and since the customer retains possession of all the keys.

Security breaches(漏洞 ) There is always the possibility of a security breach. Sol: data integrity can be verified at any time.

Concerns

Page 36: Cryptographic Cloud Storage

Electronic discovery organizations are required to preserve and produce

records for litigation. Organizations with high levels of litigation may need to keep a copy of large amounts of data.

Sol: a customer can verify the integrity of its data at any point in time.

Data retention and destruction(資料保留或刪除 ) It can be difficult for a customer to ascertain the integrity

of the data or to verify whether it was properly discarded. Sol: Secure data erasure can be electively achieved by

just erasing the master key

Concerns

Page 37: Cryptographic Cloud Storage

Anyway, it’s all about the point:

Encrypted data and Data Verifier.

Benefits of a Cryptographic Storage Service

Page 38: Cryptographic Cloud Storage

Introduction of the cloud storage service The basic concept of cryptography Architecture of a cryptographic storage

service Benefit of a cryptographic storage service The core component of a cryptographic

storage service Summary

outline

Page 39: Cryptographic Cloud Storage

The drawback of the cryptographic storage service :

We have to download all the data , decrypt it and search locally.

The organization have to retrieve all the data to verify the integrity

The core component of a cryptographic storage service

Page 40: Cryptographic Cloud Storage

Improvement : 1.DP index the data and encrypt it under a unique key 2.Encrypt the index using searchable encryption 3.encrypt the unique key with attribute- based encryption 4.data verifier can verify their integrity using

a proof of storage

The core component of a cryptographic storage service

Page 41: Cryptographic Cloud Storage

A way to encrypt a search index Given a token for a keyword , one can

retrieve pointers to the encrypted files But sometimes the searching may leak

some information to service provider SSE /ASE /ESE /mSSE

Searchable encryption

Page 42: Cryptographic Cloud Storage

Symmetric searchable encryption (SSE) Single writer /single reader (SWSR) based on symmetric primitives Without any token the server learn nothing

about the data except its length Given a token with keyword w , the provider

learn which document contain w without learn w

Searchable encryption (SSE)

Disadvantage : search time / update

Page 43: Cryptographic Cloud Storage

Asymmetric searchable encryption (ASE) Many writer /single reader (MWSR) based on symmetric primitives Without any token the server learn nothing

about the data except its length Given a token with keyword w , the provider

learn which document contain w

Searchable encryption (ASE)

Disadvantage : the token w can be learned

Page 44: Cryptographic Cloud Storage

Efficient ASE (ESE) Search time is more efficient than ASE

Searchable encryption (ESE)

Disadvantage : the token w can be learned

Page 45: Cryptographic Cloud Storage

Multi-user SSE Single writer /many reader (SWMR) The owner can add and revoke users’

search privilege over his data

Searchable encryption (mSSE)

Page 46: Cryptographic Cloud Storage

Improvement : 1.DP index the data and encrypt it under a unique key 2.Encrypt the index using searchable encryption 3.encrypt the unique key with attribute- based encryption 4.data verifier can verify their integrity using

a proof of storage

The core component of a cryptographic storage service

Page 47: Cryptographic Cloud Storage

Each user in the system is provided with a decryption key that has a set of attribute with it (credentials)

Decryption will only work if the attribute associated with the decryption key match the policy used to encrypt the massage

attribute-based encryption

Page 48: Cryptographic Cloud Storage

Improvement : 1.DP index the data and encrypt it under a unique key 2.Encrypt the index using searchable encryption 3.encrypt the unique key with attribute- based encryption 4.data verifier can verify their integrity using

a proof of storage

The core component of a cryptographic storage service

Page 49: Cryptographic Cloud Storage

Which the server can prove to the client that it did not tamper with the data

The protocol can be executed an arbitray number of times

The amount of information exchanged is independent of the size of the data

Private /public verifiable

Proof of storage protocol