data protection by means of fragmentation fosad 2016

26
Data protection by means of fragmentation FOSAD 2016 Katarzyna KAPUSTA Telecom ParisTech [email protected] September 1, 2016 Katarzyna KAPUSTA Telecom ParisTech Data protection by means of fragmentation September 1, 2016 1 / 26

Upload: others

Post on 13-Jun-2022

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Data protection by means of fragmentation FOSAD 2016

Data protection by means of fragmentationFOSAD 2016

Katarzyna KAPUSTATelecom ParisTech

[email protected]

September 1, 2016

Katarzyna KAPUSTA Telecom ParisTech [email protected] protection by means of fragmentation FOSAD 2016September 1, 2016 1 / 26

Page 2: Data protection by means of fragmentation FOSAD 2016

Self introduction

PhD Student at Telecom ParisTech Universite Paris-SaclaySupervisor: Gerard MEMMI, Funded by the ITEA2 CAP project

Education :

M.Eng. Telecom ParisTech Universite Paris-Saclay, Paris, France

M.Sc. AGH University of Science and Technology, Cracow, Poland

Previous work experience :

Security consultant, E&Y, Paris

Software developer intern at Thales Communications & Security, Paris

Software developer intern at CERN, Geneva

Katarzyna KAPUSTA Telecom ParisTech [email protected] protection by means of fragmentation FOSAD 2016September 1, 2016 2 / 26

Page 3: Data protection by means of fragmentation FOSAD 2016

Outline of the presentation

1 Introduction: Why do we need fragmentation?

2 State of the art

Data fragmentation techniquesAcademic and commercial systems using data fragmentation

3 Proposed keyless efficient algorithm for data fragmentation

Algorithm descriptionSecurity analysisPerformance results

4 Ongoing and future works

Katarzyna KAPUSTA Telecom ParisTech [email protected] protection by means of fragmentation FOSAD 2016September 1, 2016 3 / 26

Page 4: Data protection by means of fragmentation FOSAD 2016

INTRODUCTION

Introduction: Why do we need fragmentation?

The security of encrypted data depends on the chosen algorithm, aswell as on the strength and the secure storage of its key

Fragmenting data into multiple fragments and dispersing thesefragments over various locations aims at frustrating an attacker

Nowadays, fragmentation is enabled by the cloud environment (largenumber of servers, multiple data centers)

Katarzyna KAPUSTA Telecom ParisTech [email protected] protection by means of fragmentation FOSAD 2016September 1, 2016 4 / 26

Page 5: Data protection by means of fragmentation FOSAD 2016

INTRODUCTION

Part 1: State of the art

Katarzyna KAPUSTA Telecom ParisTech [email protected] protection by means of fragmentation FOSAD 2016September 1, 2016 5 / 26

Page 6: Data protection by means of fragmentation FOSAD 2016

STATE OF THE ART

Our division of data fragmentation techniques

1 Bitwise: fragmenting data without any consideration for theirstructure, their semantics, or their uneven level of confidentiality

2 Structurewise: exploiting data structures, multi-level confidentiality,and machine trustworthiness

Katarzyna KAPUSTA Telecom ParisTech [email protected] protection by means of fragmentation FOSAD 2016September 1, 2016 6 / 26

Page 7: Data protection by means of fragmentation FOSAD 2016

STATE OF THE ART

Bitwise fragmentation techniques and systems

Three levels of security:

Perfect or information-theoretic security: (i.e. Shamir’s secret sharing)Computational security: standard encryption (i.e. AES)Incremental security: Information Dispersal Algorithms (i.e. Rabin’s)

Challenge: balancing memory and performance with security

Systems using bitwise fragmentation:Academic, i.e. PASIS, POTSHARDS, GridSharing, DepSkyCommercial, i.e. Cleversafe (IBM), SecureParser (Unisys), Symform

Katarzyna KAPUSTA Telecom ParisTech [email protected] protection by means of fragmentation FOSAD 2016September 1, 2016 7 / 26

Page 8: Data protection by means of fragmentation FOSAD 2016

STATE OF THE ART

Structurewise fragmentation techniques

Object-oriented

Fragmentation-Redundancy-Scattering

Breaking data into non-confidential fragments

Sensitive information encrypted and stored on trusted workstations,remaining pieces distributed over untrusted sites

Database-oriented

Protecting relationships between relations

Preserving data unlinkability while executing queries

Searchable or partial encryption

Katarzyna KAPUSTA Telecom ParisTech [email protected] protection by means of fragmentation FOSAD 2016September 1, 2016 8 / 26

Page 9: Data protection by means of fragmentation FOSAD 2016

STATE OF THE ART

Fragmentation in the cloud: issues and recommendations

1 Location control vs. virtualization

How to ensure secure data separation? Bare-metal clouds?Coarse-grained solution: multi-cloud

2 Latency problems: combining fragmentation with parallelization

3 Defining security levels without user interaction for fragmentation ofstructured data

Katarzyna KAPUSTA Telecom ParisTech [email protected] protection by means of fragmentation FOSAD 2016September 1, 2016 9 / 26

Page 10: Data protection by means of fragmentation FOSAD 2016

STATE OF THE ART

Fragmentation in the cloud: desired architectural traits

Katarzyna KAPUSTA Telecom ParisTech [email protected] protection by means of fragmentation FOSAD 2016September 1, 2016 10 / 26

Page 11: Data protection by means of fragmentation FOSAD 2016

OUR FRAGMENTATION ALGORITHM

Part 2: Proposed fragmentation algorithm

Katarzyna KAPUSTA Telecom ParisTech [email protected] protection by means of fragmentation FOSAD 2016September 1, 2016 11 / 26

Page 12: Data protection by means of fragmentation FOSAD 2016

OUR FRAGMENTATION ALGORITHM

Brief description of the idea

Problem Perfectly secure fragmentation schemes increase memory,information dispersal algorithms have low security

Goal: a fragmentation scheme balancing memory use andperformance with security

Proposal of a keyless computationally secure (k,n)-thresholdalgorithm:

1st step: (k,k)-threshold fragmentation for security2st step: adding redundant fragments to obtain a (k,n)-thresholdscheme

Katarzyna KAPUSTA Telecom ParisTech [email protected] protection by means of fragmentation FOSAD 2016September 1, 2016 12 / 26

Page 13: Data protection by means of fragmentation FOSAD 2016

OUR FRAGMENTATION ALGORITHM

Principle of the fragmentation scheme (1)

Initial data is divided into sets of k smaller data chunks

Encoding done set by set in a Shamir like fashion

Perfect security traded for memory: reusing encoding results

A random seed of k values serves as the first set

Katarzyna KAPUSTA Telecom ParisTech [email protected] protection by means of fragmentation FOSAD 2016September 1, 2016 13 / 26

Page 14: Data protection by means of fragmentation FOSAD 2016

OUR FRAGMENTATION ALGORITHM

Principle of the fragmentation scheme (2)

Data fragmentation: encoded data are separated into k fragments

All or nothing: all k fragments are needed for data recovery

n − k redundant fragments are added if needed

Katarzyna KAPUSTA Telecom ParisTech [email protected] protection by means of fragmentation FOSAD 2016September 1, 2016 14 / 26

Page 15: Data protection by means of fragmentation FOSAD 2016

OUR FRAGMENTATION ALGORITHM

Characteristics

Memory use: total overhead is of k bytes for one block of data, afragment size is close to optimal value Dsize

k

Performance:

Fragmentation: O(k) complexity, partially parallelizableDefragmentation: complexity depends on the fragments used forrecovery, highly parallelizable

Katarzyna KAPUSTA Telecom ParisTech [email protected] protection by means of fragmentation FOSAD 2016September 1, 2016 15 / 26

Page 16: Data protection by means of fragmentation FOSAD 2016

OUR FRAGMENTATION ALGORITHM

Implementation

Matlab: used for security analysis

JAVA: single and 4-threaded version, multiple lookup tables, onlylogical operations (use of GF (28)), used for performance tests

Katarzyna KAPUSTA Telecom ParisTech [email protected] protection by means of fragmentation FOSAD 2016September 1, 2016 16 / 26

Page 17: Data protection by means of fragmentation FOSAD 2016

OUR FRAGMENTATION ALGORITHM

Security analyses: fragments uniformity and independence

Analyzing fragmentation results, comparing fragments to initial data

Uniformity: chi-square test, data entropy, probability density function

Independence: recurrence, correlation

Seed sensitivity: same data fragmented using similar seeds

(a) (b)

Figure: Original data (a) and one of its fragment (b)

Katarzyna KAPUSTA Telecom ParisTech [email protected] protection by means of fragmentation FOSAD 2016September 1, 2016 17 / 26

Page 18: Data protection by means of fragmentation FOSAD 2016

OUR FRAGMENTATION ALGORITHM

Security analyses: uniformity (1)

(a) (b)

Figure: Chi-square test (a); Entropy comparison (b) (k = 8, for 1000 times)

Katarzyna KAPUSTA Telecom ParisTech [email protected] protection by means of fragmentation FOSAD 2016September 1, 2016 18 / 26

Page 19: Data protection by means of fragmentation FOSAD 2016

OUR FRAGMENTATION ALGORITHM

Security analyses: uniformity (2)

(a) (b)

Figure: Probability Density Function of original data (a) and one of its fragment (b) (k = 8)

Katarzyna KAPUSTA Telecom ParisTech [email protected] protection by means of fragmentation FOSAD 2016September 1, 2016 19 / 26

Page 20: Data protection by means of fragmentation FOSAD 2016

OUR FRAGMENTATION ALGORITHM

Security analyses: independence (1)

(a) (b)

Figure: Recurrence plot of original data (a) and one of its fragment (b) (k = 8)

Katarzyna KAPUSTA Telecom ParisTech [email protected] protection by means of fragmentation FOSAD 2016September 1, 2016 20 / 26

Page 21: Data protection by means of fragmentation FOSAD 2016

OUR FRAGMENTATION ALGORITHM

Security analyses: independence (2)

(a) (b)

Figure: Correlation coefficients between original data and its fragmentation(k = 8, for 1000 times) (a) and among fragments (b)

Katarzyna KAPUSTA Telecom ParisTech [email protected] protection by means of fragmentation FOSAD 2016September 1, 2016 21 / 26

Page 22: Data protection by means of fragmentation FOSAD 2016

OUR FRAGMENTATION ALGORITHM

Security analyses: seed sensitivity

(a) (b)

Figure: Correlations (a) and differences (b) between fragments of the same datafragmented with different seeds (k = 8)

Katarzyna KAPUSTA Telecom ParisTech [email protected] protection by means of fragmentation FOSAD 2016September 1, 2016 22 / 26

Page 23: Data protection by means of fragmentation FOSAD 2016

OUR FRAGMENTATION ALGORITHM

Performance results

Figure: Time vs. number of fragments k (a), Time vs. data size (b).

Katarzyna KAPUSTA Telecom ParisTech [email protected] protection by means of fragmentation FOSAD 2016September 1, 2016 23 / 26

Page 24: Data protection by means of fragmentation FOSAD 2016

FUTURE WORKS

Ongoing and future works

Make our code open-source

Benchmark the fragmentation scheme

Refine the security analysis toolbox

Adapt the fragmentation scheme to concrete use cases:cloud environment, unattended wireless sensor networks

Katarzyna KAPUSTA Telecom ParisTech [email protected] protection by means of fragmentation FOSAD 2016September 1, 2016 24 / 26

Page 25: Data protection by means of fragmentation FOSAD 2016

FUTURE WORKS

Publications

K. Kapusta, G. Memmi, and H.Noura, ”POSTER: A Keyless EfficientAlgorithm for Data Protection by Means of Fragmentation”, in ACMCCS 2016, Vienna, 2016.

K. Kapusta, P. Lambein, and G. Memmi, ”POSTER: Data protectionby means of fragmentation”, in RAID 2016, Paris, 2016.

K. Kapusta and G. Memmi, ”Data protection by means offragmentation in several distributed storage systems”, inCFIP-Notere, Paris, 2015.

G. Memmi, K.Kapusta, and H.Qiu, ”Data protection by means offragmentation in several distributed storage systems”, in CyberSecurity of Smart Cities, Industrial Control System andCommunications (SSIC), 2015

G. Memmi, K.Kapusta, and H.Qiu, ”Data Protection: CombiningFragmentation, Encryption, and Dispersion, an intermediary report”,ITEA2-CAP WP3 Intermediary Report, June 2015.

Katarzyna KAPUSTA Telecom ParisTech [email protected] protection by means of fragmentation FOSAD 2016September 1, 2016 25 / 26

Page 26: Data protection by means of fragmentation FOSAD 2016

FUTURE WORKS

Questions?

Katarzyna KAPUSTA Telecom ParisTech [email protected] protection by means of fragmentation FOSAD 2016September 1, 2016 26 / 26