SlideShare une entreprise Scribd logo
1  sur  15
Access Control and Encryption in Cloud Environments James Wernicke New Mexico Tech Department of Computer Science & Engineering A Designated Center of Academic Excellence in Information Assurance by the National Security Agency
Terminology Access control: A system which enables an authority to control access to areas and resources in a given physical facility or computer-based information system Encryption: The process of transforming information (“plaintext”) using an algorithm (“cipher”) to make it unreadable to anyone except those possessing special knowledge (“key”). Cloud: Computing system where shared resources, software, and information are provided to computers and other devices on demand like the electricity grid. A Designated Center of Academic Excellence in Information Assurance by the National Security Agency - 2 -
Motivation Organizations no longer need to control the computing infrastructure that supports them. They just need a place to store, access, and manipulate their data. The usual cryptographic methods are limiting, inflexible, and don’t scale well. Access management has always been done internally. Research related to this semester’s projects A Designated Center of Academic Excellence in Information Assurance by the National Security Agency - 3 -
Scenarios Outsourcing computations on sensitive data Querying large sets of encrypted data Electronic voting Search engine privacy Trend analysis on personal information A Designated Center of Academic Excellence in Information Assurance by the National Security Agency - 4 -
Boolean Circuits A series of additions and multiplications Any computation can be expressed as a series of Boolean circuits. Sooo… ,[object Object],A Designated Center of Academic Excellence in Information Assurance by the National Security Agency - 5 -
Homomorphism Addition and multiplication operations can be performed before or after a function is applied with the same results. f(a+b) = f(a) + f(b) f(ab) = f(a) * f(b) What does this mean for encryption? ,[object Object],A Designated Center of Academic Excellence in Information Assurance by the National Security Agency - 6 -
DES/AES Encryption Not homomorphic at all Encrypt P to get C, multiply C by 2, decrypt 2C, get some gibberish A Designated Center of Academic Excellence in Information Assurance by the National Security Agency - 7 -
RSA Encryption Multiplicatively homomorphic Encrypt P to get C, multiply C by 2, decrypt 2C, get 2P ,[object Object],A Designated Center of Academic Excellence in Information Assurance by the National Security Agency - 8 -
Gentry’s Homomorphic Encryption Fully homomorphic Encrypt P to get C, do an arbitrary number of additions and multiplications on C to get C′, decrypt C′, get P′ Awesome… in theory A Designated Center of Academic Excellence in Information Assurance by the National Security Agency - 9 -
Limitations Encrypted Google search takes one trillion times longer Number of multiplications needs to be fixed when public key is generated ,[object Object],A Designated Center of Academic Excellence in Information Assurance by the National Security Agency - 10 -
Access Control Attribute-based management Traditionally, server authenticates user Data now distributed across many servers ,[object Object]
More chance of compromiseA Designated Center of Academic Excellence in Information Assurance by the National Security Agency - 11 -
Ciphertext-Policy Attribute-Based Encryption (CP-ABE) Access policy associated with ciphertext Private keys associated with attributes So why is this good? ,[object Object]
Data can be decrypted by more than one userCollusion resistance A Designated Center of Academic Excellence in Information Assurance by the National Security Agency - 12 -
Conclusions More research into fully homomorphic encryption could revolutionize the way cloud services are utilized for sensitive data. CP-ABE can provide a new approach to managing access control on untrusted servers. A Designated Center of Academic Excellence in Information Assurance by the National Security Agency - 13 -

Contenu connexe

Tendances

A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...IRJET Journal
 
Tees an efficient search scheme over
Tees an efficient search scheme overTees an efficient search scheme over
Tees an efficient search scheme overKumar Dlk
 
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Fuzzy keyword search over
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Fuzzy keyword search overIEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Fuzzy keyword search over
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Fuzzy keyword search overIEEEMEMTECHSTUDENTPROJECTS
 
A lightweight secure scheme for detecting provenance forgery and packet drop ...
A lightweight secure scheme for detecting provenance forgery and packet drop ...A lightweight secure scheme for detecting provenance forgery and packet drop ...
A lightweight secure scheme for detecting provenance forgery and packet drop ...Pvrtechnologies Nellore
 
Hybrid Security Network for Cloud Information Centre (HSNIC)
Hybrid Security Network for Cloud Information Centre (HSNIC)Hybrid Security Network for Cloud Information Centre (HSNIC)
Hybrid Security Network for Cloud Information Centre (HSNIC)Peace Asukwo
 
Threat Modeling of Cloud based Implementation of Homomorphic Encryption
Threat Modeling of Cloud based Implementation of Homomorphic EncryptionThreat Modeling of Cloud based Implementation of Homomorphic Encryption
Threat Modeling of Cloud based Implementation of Homomorphic Encryptionijcisjournal
 
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A SurveyTowards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A SurveyIRJET Journal
 
Search on encrypted data
Search on encrypted dataSearch on encrypted data
Search on encrypted dataSELASI OCANSEY
 
AN EFFICIENT FILE HIERARCHY ATTRIBUTE-BASED ENCRYPTION SCHEME IN CLOUD COMPUT...
AN EFFICIENT FILE HIERARCHY ATTRIBUTE-BASED ENCRYPTION SCHEME IN CLOUD COMPUT...AN EFFICIENT FILE HIERARCHY ATTRIBUTE-BASED ENCRYPTION SCHEME IN CLOUD COMPUT...
AN EFFICIENT FILE HIERARCHY ATTRIBUTE-BASED ENCRYPTION SCHEME IN CLOUD COMPUT...Nexgen Technology
 
A SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHY
A SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHYA SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHY
A SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHYcsandit
 
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT A privacy leakage upper bound constra...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT A privacy leakage upper bound constra...DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT A privacy leakage upper bound constra...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT A privacy leakage upper bound constra...IEEEGLOBALSOFTTECHNOLOGIES
 
IRJET- Study and Performance Evaluation of Different Symmetric Key Crypto...
IRJET-  	  Study and Performance Evaluation of Different Symmetric Key Crypto...IRJET-  	  Study and Performance Evaluation of Different Symmetric Key Crypto...
IRJET- Study and Performance Evaluation of Different Symmetric Key Crypto...IRJET Journal
 
privacy preserving multi keyword ranked search over encrypted cloud data
privacy preserving multi keyword ranked search over encrypted cloud dataprivacy preserving multi keyword ranked search over encrypted cloud data
privacy preserving multi keyword ranked search over encrypted cloud dataswathi78
 
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataPrivacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataIGEEKS TECHNOLOGIES
 
IRJET- Secure File Storage on Cloud using Cryptography
IRJET-  	  Secure File Storage on Cloud using CryptographyIRJET-  	  Secure File Storage on Cloud using Cryptography
IRJET- Secure File Storage on Cloud using CryptographyIRJET Journal
 
Enabling efficient multi keyword ranked
Enabling efficient multi keyword rankedEnabling efficient multi keyword ranked
Enabling efficient multi keyword rankedSakthi Sundaram
 
Improving Data Storage Security in Cloud using Hadoop
Improving Data Storage Security in Cloud using HadoopImproving Data Storage Security in Cloud using Hadoop
Improving Data Storage Security in Cloud using HadoopIJERA Editor
 
Enhanced Efficient & Secure Steganography Algorithm with Low Distortion
Enhanced Efficient & Secure Steganography Algorithm with Low DistortionEnhanced Efficient & Secure Steganography Algorithm with Low Distortion
Enhanced Efficient & Secure Steganography Algorithm with Low DistortionIRJET Journal
 

Tendances (19)

A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...
 
Tees an efficient search scheme over
Tees an efficient search scheme overTees an efficient search scheme over
Tees an efficient search scheme over
 
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Fuzzy keyword search over
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Fuzzy keyword search overIEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Fuzzy keyword search over
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Fuzzy keyword search over
 
A lightweight secure scheme for detecting provenance forgery and packet drop ...
A lightweight secure scheme for detecting provenance forgery and packet drop ...A lightweight secure scheme for detecting provenance forgery and packet drop ...
A lightweight secure scheme for detecting provenance forgery and packet drop ...
 
Hybrid Security Network for Cloud Information Centre (HSNIC)
Hybrid Security Network for Cloud Information Centre (HSNIC)Hybrid Security Network for Cloud Information Centre (HSNIC)
Hybrid Security Network for Cloud Information Centre (HSNIC)
 
Threat Modeling of Cloud based Implementation of Homomorphic Encryption
Threat Modeling of Cloud based Implementation of Homomorphic EncryptionThreat Modeling of Cloud based Implementation of Homomorphic Encryption
Threat Modeling of Cloud based Implementation of Homomorphic Encryption
 
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A SurveyTowards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
 
Search on encrypted data
Search on encrypted dataSearch on encrypted data
Search on encrypted data
 
AN EFFICIENT FILE HIERARCHY ATTRIBUTE-BASED ENCRYPTION SCHEME IN CLOUD COMPUT...
AN EFFICIENT FILE HIERARCHY ATTRIBUTE-BASED ENCRYPTION SCHEME IN CLOUD COMPUT...AN EFFICIENT FILE HIERARCHY ATTRIBUTE-BASED ENCRYPTION SCHEME IN CLOUD COMPUT...
AN EFFICIENT FILE HIERARCHY ATTRIBUTE-BASED ENCRYPTION SCHEME IN CLOUD COMPUT...
 
A SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHY
A SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHYA SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHY
A SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHY
 
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT A privacy leakage upper bound constra...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT A privacy leakage upper bound constra...DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT A privacy leakage upper bound constra...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT A privacy leakage upper bound constra...
 
IRJET- Study and Performance Evaluation of Different Symmetric Key Crypto...
IRJET-  	  Study and Performance Evaluation of Different Symmetric Key Crypto...IRJET-  	  Study and Performance Evaluation of Different Symmetric Key Crypto...
IRJET- Study and Performance Evaluation of Different Symmetric Key Crypto...
 
privacy preserving multi keyword ranked search over encrypted cloud data
privacy preserving multi keyword ranked search over encrypted cloud dataprivacy preserving multi keyword ranked search over encrypted cloud data
privacy preserving multi keyword ranked search over encrypted cloud data
 
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataPrivacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud data
 
IRJET- Secure File Storage on Cloud using Cryptography
IRJET-  	  Secure File Storage on Cloud using CryptographyIRJET-  	  Secure File Storage on Cloud using Cryptography
IRJET- Secure File Storage on Cloud using Cryptography
 
Enabling efficient multi keyword ranked
Enabling efficient multi keyword rankedEnabling efficient multi keyword ranked
Enabling efficient multi keyword ranked
 
Improving Data Storage Security in Cloud using Hadoop
Improving Data Storage Security in Cloud using HadoopImproving Data Storage Security in Cloud using Hadoop
Improving Data Storage Security in Cloud using Hadoop
 
Fog computing
Fog computingFog computing
Fog computing
 
Enhanced Efficient & Secure Steganography Algorithm with Low Distortion
Enhanced Efficient & Secure Steganography Algorithm with Low DistortionEnhanced Efficient & Secure Steganography Algorithm with Low Distortion
Enhanced Efficient & Secure Steganography Algorithm with Low Distortion
 

Similaire à Access Control & Encryption In Cloud Environments

Iaetsd enhancement of performance and security in bigdata processing
Iaetsd enhancement of performance and security in bigdata processingIaetsd enhancement of performance and security in bigdata processing
Iaetsd enhancement of performance and security in bigdata processingIaetsd Iaetsd
 
IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
 IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
IRJET - Efficient and Verifiable Queries over Encrypted Data in CloudIRJET Journal
 
3 ijece 1 ed iqbal qc
3 ijece 1 ed iqbal qc3 ijece 1 ed iqbal qc
3 ijece 1 ed iqbal qcIAESIJEECS
 
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataPrivacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataIGEEKS TECHNOLOGIES
 
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...IJSRD
 
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...dbpublications
 
Applications of RSA and AES256 in End-to-End encryption using Diffie- Hellman...
Applications of RSA and AES256 in End-to-End encryption using Diffie- Hellman...Applications of RSA and AES256 in End-to-End encryption using Diffie- Hellman...
Applications of RSA and AES256 in End-to-End encryption using Diffie- Hellman...IRJET Journal
 
K nearest neighbor classification over semantically secure encrypted relation...
K nearest neighbor classification over semantically secure encrypted relation...K nearest neighbor classification over semantically secure encrypted relation...
K nearest neighbor classification over semantically secure encrypted relation...ieeepondy
 
Prevention of Cheating Message based on Block Cipher using Digital Envelope
Prevention of Cheating Message based on Block Cipher using Digital EnvelopePrevention of Cheating Message based on Block Cipher using Digital Envelope
Prevention of Cheating Message based on Block Cipher using Digital Envelopeiosrjce
 
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud ComputingDistributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud ComputingAIRCC Publishing Corporation
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGAIRCC Publishing Corporation
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGijcsit
 
Privacy and Integrity Preserving in Cloud Storage Devices
Privacy and Integrity Preserving in Cloud Storage DevicesPrivacy and Integrity Preserving in Cloud Storage Devices
Privacy and Integrity Preserving in Cloud Storage DevicesIOSR Journals
 
M.Phil Computer Science Cloud Computing Projects
M.Phil Computer Science Cloud Computing ProjectsM.Phil Computer Science Cloud Computing Projects
M.Phil Computer Science Cloud Computing ProjectsVijay Karan
 
M.Phil Computer Science Cloud Computing Projects
M.Phil Computer Science Cloud Computing ProjectsM.Phil Computer Science Cloud Computing Projects
M.Phil Computer Science Cloud Computing ProjectsVijay Karan
 
IRJET- Secure Data Deduplication and Auditing for Cloud Data Storage
IRJET-  	  Secure Data Deduplication and Auditing for Cloud Data StorageIRJET-  	  Secure Data Deduplication and Auditing for Cloud Data Storage
IRJET- Secure Data Deduplication and Auditing for Cloud Data StorageIRJET Journal
 
Mitigating the Integrity Issues in Cloud Computing Utilizing Cryptography Alg...
Mitigating the Integrity Issues in Cloud Computing Utilizing Cryptography Alg...Mitigating the Integrity Issues in Cloud Computing Utilizing Cryptography Alg...
Mitigating the Integrity Issues in Cloud Computing Utilizing Cryptography Alg...AJASTJournal
 
A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...
A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...
A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...IJSRED
 

Similaire à Access Control & Encryption In Cloud Environments (20)

Iaetsd enhancement of performance and security in bigdata processing
Iaetsd enhancement of performance and security in bigdata processingIaetsd enhancement of performance and security in bigdata processing
Iaetsd enhancement of performance and security in bigdata processing
 
C017421624
C017421624C017421624
C017421624
 
IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
 IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
 
3 ijece 1 ed iqbal qc
3 ijece 1 ed iqbal qc3 ijece 1 ed iqbal qc
3 ijece 1 ed iqbal qc
 
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataPrivacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud data
 
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
 
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
 
Applications of RSA and AES256 in End-to-End encryption using Diffie- Hellman...
Applications of RSA and AES256 in End-to-End encryption using Diffie- Hellman...Applications of RSA and AES256 in End-to-End encryption using Diffie- Hellman...
Applications of RSA and AES256 in End-to-End encryption using Diffie- Hellman...
 
K nearest neighbor classification over semantically secure encrypted relation...
K nearest neighbor classification over semantically secure encrypted relation...K nearest neighbor classification over semantically secure encrypted relation...
K nearest neighbor classification over semantically secure encrypted relation...
 
J017667582
J017667582J017667582
J017667582
 
Prevention of Cheating Message based on Block Cipher using Digital Envelope
Prevention of Cheating Message based on Block Cipher using Digital EnvelopePrevention of Cheating Message based on Block Cipher using Digital Envelope
Prevention of Cheating Message based on Block Cipher using Digital Envelope
 
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud ComputingDistributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
 
Privacy and Integrity Preserving in Cloud Storage Devices
Privacy and Integrity Preserving in Cloud Storage DevicesPrivacy and Integrity Preserving in Cloud Storage Devices
Privacy and Integrity Preserving in Cloud Storage Devices
 
M.Phil Computer Science Cloud Computing Projects
M.Phil Computer Science Cloud Computing ProjectsM.Phil Computer Science Cloud Computing Projects
M.Phil Computer Science Cloud Computing Projects
 
M.Phil Computer Science Cloud Computing Projects
M.Phil Computer Science Cloud Computing ProjectsM.Phil Computer Science Cloud Computing Projects
M.Phil Computer Science Cloud Computing Projects
 
IRJET- Secure Data Deduplication and Auditing for Cloud Data Storage
IRJET-  	  Secure Data Deduplication and Auditing for Cloud Data StorageIRJET-  	  Secure Data Deduplication and Auditing for Cloud Data Storage
IRJET- Secure Data Deduplication and Auditing for Cloud Data Storage
 
Mitigating the Integrity Issues in Cloud Computing Utilizing Cryptography Alg...
Mitigating the Integrity Issues in Cloud Computing Utilizing Cryptography Alg...Mitigating the Integrity Issues in Cloud Computing Utilizing Cryptography Alg...
Mitigating the Integrity Issues in Cloud Computing Utilizing Cryptography Alg...
 
A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...
A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...
A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...
 

Access Control & Encryption In Cloud Environments

  • 1. Access Control and Encryption in Cloud Environments James Wernicke New Mexico Tech Department of Computer Science & Engineering A Designated Center of Academic Excellence in Information Assurance by the National Security Agency
  • 2. Terminology Access control: A system which enables an authority to control access to areas and resources in a given physical facility or computer-based information system Encryption: The process of transforming information (“plaintext”) using an algorithm (“cipher”) to make it unreadable to anyone except those possessing special knowledge (“key”). Cloud: Computing system where shared resources, software, and information are provided to computers and other devices on demand like the electricity grid. A Designated Center of Academic Excellence in Information Assurance by the National Security Agency - 2 -
  • 3. Motivation Organizations no longer need to control the computing infrastructure that supports them. They just need a place to store, access, and manipulate their data. The usual cryptographic methods are limiting, inflexible, and don’t scale well. Access management has always been done internally. Research related to this semester’s projects A Designated Center of Academic Excellence in Information Assurance by the National Security Agency - 3 -
  • 4. Scenarios Outsourcing computations on sensitive data Querying large sets of encrypted data Electronic voting Search engine privacy Trend analysis on personal information A Designated Center of Academic Excellence in Information Assurance by the National Security Agency - 4 -
  • 5.
  • 6.
  • 7. DES/AES Encryption Not homomorphic at all Encrypt P to get C, multiply C by 2, decrypt 2C, get some gibberish A Designated Center of Academic Excellence in Information Assurance by the National Security Agency - 7 -
  • 8.
  • 9. Gentry’s Homomorphic Encryption Fully homomorphic Encrypt P to get C, do an arbitrary number of additions and multiplications on C to get C′, decrypt C′, get P′ Awesome… in theory A Designated Center of Academic Excellence in Information Assurance by the National Security Agency - 9 -
  • 10.
  • 11.
  • 12. More chance of compromiseA Designated Center of Academic Excellence in Information Assurance by the National Security Agency - 11 -
  • 13.
  • 14. Data can be decrypted by more than one userCollusion resistance A Designated Center of Academic Excellence in Information Assurance by the National Security Agency - 12 -
  • 15. Conclusions More research into fully homomorphic encryption could revolutionize the way cloud services are utilized for sensitive data. CP-ABE can provide a new approach to managing access control on untrusted servers. A Designated Center of Academic Excellence in Information Assurance by the National Security Agency - 13 -
  • 16. References Hakala, David (2009-04-29). “The Top 10 Cloud Computing Trends”. Focus.com. Retrieved 2010-09-08. Danielson, Krissi (2008-03-26). “Distinguishing Cloud Computing from Utility Computing”. Ebizq.net. Retrieved 2010-09-08. Gentry, Craig (2009-05-31). “Fully Homomorphic Encryption Using Ideal Lattices”. STOC ‘09. Retrieved 2010-09-08. Prince, Brian (2009-06-25). “IBM Discovers Encryption Scheme That Could Improve Cloud Security, Spam Filtering”. eWeek.com. Retrieved 2010-09-08. “Practical Applications of Homomorphic Encryption Algorithms”. Stack Overflow. Retrieved 2010-09-08. Micciancio, Daniele (2010). “A First Glimpse At Cryptography’s Holy Grail”. Communications of the ACM. Retrieved 2010-09-08. Schneier, Bruce (2009-07-09). “Homomorphic Encryption Breakthrough”. Schneier on Security. Retrieved 2010-09-08. Cooney, Michael (2009-06-25). “IBM Touts Encryption Innovation”. Computerworld. Retrieved 2010-09-08. Martin, Luther (2009-07-24). “Gentry’s Homomorphic Encryption”. Voltage Security. Retrieved 2010-09-08. Ghalimi, Ismael (2009-10-11). “I Think There Is A World Market for Maybe Five Clouds”. IT Redux. Retrieved 2010-09-09. Bethencourt, John et al. “Ciphertext-Policy Attribute-Based Encryption”. Retrieved 2010-09-09. A Designated Center of Academic Excellence in Information Assurance by the National Security Agency - 14 -
  • 17. Questions? A Designated Center of Academic Excellence in Information Assurance by the National Security Agency - 15 -

Notes de l'éditeur

  1. Good morning, everyone. Thanks for coming. My name is James Wernicke, and as part of my application for SFS, I’ll be giving a presentation today on access control and encryption in cloud environments.
  2. There are a few terms that we should be familiar with. When I talk about access control, I’m speaking about systems that control access specifically to data, networked resources, and physical locations. Encryption refers to the process of making information private between the sender and those authorized to view it. A cloud is a network of computers which, to the user, appear as one functional unit which is highly scalable for providing a number of services to many users simultaneously.
  3. There is a clear trend that organizations are shifting their IT resources to the cloud. We trust banks to keep our money secure while their customers come and go through their doors all day long. When we want our money, it’s available 24/7 through an ATM, debit card, or banking website. Likewise, datacenters are equipped to keep our data secure and make it available to us when we need it. However, there is still some room for improvement.Traditional cryptography doesn’t work that well in clouds. Sure, we can encrypt our data and store it on a public server, but as soon as we want to compute on that data, we have to download it to our local machine and decrypt it before we can do anything with it. This doesn’t work so well for large amounts of data.Traditional access management relies on firewalls, homogenous network environments, and system administrators to manage access control policies. In a cloud, firewalls are turned into swisscheese as users access their enterprise applications through the Internet from anywhere in the world on any device on any platform. Cloud users need a way to control access to their data that doesn’t require an in-house system administrator.
  4. Let’s say you have a bunch of classified data that needs to be processed. You want to use an unclassified compute cloud to do that processing without giving away the information within the encrypted data.You could also have a large encrypted database stored on a public server. Normally, you’d have to download the entire database and decrypt it to do any type of query on it. Instead, what if there was a way to do the query on the database server without revealing the information?It could also be used to collect and tally votes using encrypted data without knowing which votes are for who. Or imagine being able to do a search engine query without the search engine even knowing what you were searching for?
  5. All computing is based on boolean circuits. These are basically the mathematical building blocks for programs. So when we want to computer or manipulate data, we are basically just performing some set of additive and multiplicative operations, or boolean circuits.
  6. Homorphisms are a special type of function that has some interesting applications in cryptography. The unique property of homomorphisms is that the function can be applied before or after the additive or multiplicative operations are performed on the algebraic structures. What this means is that we can take ciphertext, perform some arbitrary number of operations on it, then decrypt the ciphertext and it would be the same as if we operated on the plaintext.
  7. With symmetric key encryption, there are no homomorphisms. If you could get 2P from 2C, there would certainly be some questions about the randomness, and the security, of your symmetric key encryption.
  8. RSA encryption is a partially homomorphic scheme, but only multiplicatively. Too bad we can’t really do anything interesting with this, though.
  9. In 2009, Craig Gentry announced a fully homomorphic encryption scheme using ideal lattices. This breakthrough allows complexcomputations to finally be performed on encrypted data and have the resulting ciphertext decrypted into something useful. But…
  10. Gentry’s scheme is not quite ready for primetime, though. For one, a program becomes exponentially more complex when converted into a series of additions and subtractions. Gentry himself said that the time to do a simple Google search is increased by a factor of one trillion. Another major issue is that his scheme requires that operations that will be done have to be known before encrypting the data. But still, his approach is still certainly an important breakthrough in cryptography.
  11. The other part of cloud security I want to talk about is access control. Encryption is great for keeping our data confidential, but we certainly don’t want anyone to get their hands on our data to decrypt at their leisure. We don’t always know the exact identities of everyone who should access data so it is desirable to be able to describe them in terms of descriptive attributes or credentials. This type of access control is typically enforced by a server that checks that a user present proper credentials before accessing data. The problem now is that our data is on the cloud, and we don’t necessarily have that much trust in the servers where our data is being stored. We would definitely sleep easier if we didn’t have to worry about them being compromised.
  12. CP-ABE addresses these issues. When a party encrypts a message, they specify an associated access structure. Each user’s private key is associated with a set of attributes. So what makes this so great? A message will only be able to be decrypted if the decryptor’s attributes satisfy the ciphertext’s access structure. This allows a user to not only maintain an access policy on an untrusted server, but also allow groups of users to access the data. Another important feature of this scheme is that two parties can’t combine their attributes, or collude, to access data that one couldn’t access on their own.
  13. So to recap, fully homomorphic encryption has the potential to change how cloud services are used. It just needs some more research. CP-ABE also can also improve cloud security by providing a more flexible way to manage access control in clouds.
  14. Here’s my references.
  15. Any questions?