SlideShare a Scribd company logo
1 of 20
Download to read offline
Securing Search Data in the Cloud
Sameer Maggon
Measured Search
Harry Ochiai
Hitachi Solutions
New York Enterprise Cloud Meetup
Jan 25, 2017
2
Agenda
• About the Speakers
• About Measured Search & Hitachi Solutions
• What is Apache Solr?
• Where is Apache Solr used?
• How Search Data is stored
• Data Security Challenge in the Cloud
• Protecting Confidential Search Data
• Challenges of Encrypted Search Index
• Encryption Solution
• Demo
• Q&A
© Hitachi Solutions America, Ltd. and Measured Search, Inc. 2017, All rights reserved.
3
About the Speakers
Harry Ochiai
• Senior Business Development Manager of Hitachi Solutions
• Worked on networking, cyber security, and storage
• Focus on cloud encryption solutions since 2013
• New Yorker
Sameer Maggon
• Founder / Technologist at Measured Search
• Been working in Open Source Search since 2001 (Lucene/Solr/Elastic)
• USC Engineering Alumni
• Works and Lives in Los Angeles, CA
© Hitachi Solutions America, Ltd. and Measured Search, Inc. 2017, All rights reserved.
4
About Hitachi Solutions
Global IT Solutions Company
• A Hitachi Company
• Japan(HQ), North America, Europe, China, India and Southeast Asia
• 12,000 Employees
Leading security solution provider in Japan
• Innovator and leading provider of encryption technology for over 20 years
• HIBUN: 40% market share in the endpoint encryption segment in Japan
• Launched new security solution Credeon globally in 2013
© Hitachi Solutions America, Ltd. and Measured Search, Inc. 2017, All rights reserved.
5
About Measured Search
Measured Search® enables companies to elevate the experience of Search
based applications faster and with more confidence.
Managed Services &
Support
SearchStax®
Platform as a Service
On-Demand
Expertise & Consulting
© Hitachi Solutions America, Ltd. and Measured Search, Inc. 2017, All rights reserved.
6
by Measured SearchSearchStax®
SearchStax®
Solr Cloud Manager
SearchStax®
Pulse
SearchStax®
Analytics
Comprehensive Solr Monitoring &
Alerting with service level reporting
to proactively manage your clusters.
Realtime feedback & user
insights to help optimize
your Search Experience
Easiest way to run & manage
Solr in the cloud - saves time,
money and reduces risk.
© Hitachi Solutions America, Ltd. and Measured Search, Inc. 2017, All rights reserved.
7
What is Apache Solr?
Solr is the popular, blazing-fast, open source
enterprise search platform built on Apache
Lucene™
© Hitachi Solutions America, Ltd. and Measured Search, Inc. 2017, All rights reserved.
8
Where is Apache Solr used?
Government
eCommerce
Education
Life Sciences
Entertainment
Healthcare
Financial Services
High Tech
© Hitachi Solutions America, Ltd. and Measured Search, Inc. 2017, All rights reserved.
9
Where is Apache Solr used?
finding
tickets
finding job
finding restaurant/services
Enterprise
Search
Media
Search
Retail
Customer
Search
Fraud
Analytics
Publishing
RecruitingTravelResearch
Business
Intelligence
© Hitachi Solutions America, Ltd. and Measured Search, Inc. 2017, All rights reserved.
10
Search Index
Search platforms maintains internal indices of terms and properties of each
indexed document in plaintext.
Plain Search Index Encrypted Search Index
© Hitachi Solutions America, Ltd. and Measured Search, Inc. 2017, All rights reserved.
11
Data Security Challenges in the Cloud
Solr / Search Cluster
Backups
Threats
Managed Service Provider (MSP)
Rogue EmployeeManaged Service Provider Rogue Employee Hacker Accidental Data Access
© Hitachi Solutions America, Ltd. and Measured Search, Inc. 2017, All rights reserved.
12
Challenges of Encrypted Search Index
Challenges
• To search through encrypted data, data must be decrypted
• Decryption slows down the process
• Encryption limits usability
Goals
• Maintain encrypted state without sacrificing security level
• Encrypt using your own key
• Maintain search performance and usability
• Protect against unauthorized users and rogue system administrators
• Regulatory compliance
Solution
• Searchable Encryption technology
© Hitachi Solutions America, Ltd. and Measured Search, Inc. 2017, All rights reserved.
13
Protecting Confidential Search Data
Solr/Lucene
text Key
word
result
value
Solr/Lucene
text Key
word
result
File System
Encryption
value
Solr/Lucene
text Key
word
result
value
Simple
Encryption
Solr/Lucene
text Key
word
result
value
Searchable
Encryption
text Key
word
result
value
Searchable
Encryption
Storage Storage Storage Storage Storage
Client
Server
App
Server
OS
No Encryption OS Encryption
Simple Encryption
with Solr Plugin
Client-Side Searchable
Encryption
Searchable Encryption
with Solr Plugin
Low Security High Security
No Security Decryption at storage layer
X Difficult to separate key
Decrypt first and match
X Very slow
X plaintextin memory
Match first and decrypt
O Key separation
O High Performance(1)
O Semantically Secure(2)
X plaintextin memory
Client Client Client Client Client
Decryption at client-side
O Key separation
O High Performance(1)
O Semantically Secure(2)
O no plaintexton server
Solr/Lucene
(1) Use of Symmetric Key
(2) Probabilistic Encryption Scheme
© Hitachi Solutions America, Ltd. and Measured Search, Inc. 2017, All rights reserved.
14
Search Encryption 101
Searchable Encryption is an encryption technology for searching data in an
encrypted state.
• Fully Homomorphic Encryption
• Homomorphic Encryption
• Functional Encryption
• Hitachi Searchable Encryption
Practical
CKA
CPA
Tokenization
103 10610010-3
Hitachi
Searchable
Encryption
Functional
Encryption
Homomorphic
Encryption
Fully Homomorphic
Encryption
Security
Performance (Search / sec)
EncryptedPlain
CKA: Chosen Keyword Attack
CPA: Chosen Phrase Attack
© Hitachi Solutions America, Ltd. and Measured Search, Inc. 2017, All rights reserved.
15
Search Encryption 101
Encryption Schemes
• Deterministic
• Constant value
• Vulnerable to statistical attacks
• Probabilistic
• Random value
• Semantically secure
Encryption Key Exchange
• Symmetric
• Asymmetric / PKI
© Hitachi Solutions America, Ltd. and Measured Search, Inc. 2017, All rights reserved.
16
Solution: Searchable Encryption with Solr Plugin
Hitachi Credeon Secure Full-Text Search
• Searchable Encryption plugin for Apache Solr and Elasticsearch
• Deterministic Encryption Scheme
• 128 bit randomization
• AES 256, FIPS 140-2
• Symmetric Key
• Real-time search (15%+ overhead)
• Key Management System, Java KeyStore
© Hitachi Solutions America, Ltd. and Measured Search, Inc. 2017, All rights reserved.
17
Solution: Client Side Searchable Encryption
Credeon Secure Document Solution for SharePoint Online
• Client-side encryption for search index and data
• Searchable encryption on Solr
• Search Engine and Key Management are independent of Microsoft
Search Server
SharePoint Server
Key Management
Server
Search Engine
SharePoint Online
Client PC
1. Get a key
2. Index the file contents
and encrypt index
4. Upload encrypted
file
4. Upload encrypted
index
3. Encrypt file
© Hitachi Solutions America, Ltd. and Measured Search, Inc. 2017, All rights reserved.
18
Demo: Securing Solr Search in the Cloud
SearchStax with Credeon
© Hitachi Solutions America, Ltd. and Measured Search, Inc. 2017, All rights reserved.
19
Q&A
© Hitachi Solutions America, Ltd. and Measured Search, Inc. 2017, All rights reserved.
20
Contact Info
Sameer Maggon
@maggon
sameer@measuredsearch.com
https://www.measuredsearch.com
Harry Ochiai
@credeon
hochiai@hitachi-solutions.com
https://psg.hitachi-solutions.com/credeon/overview
© Hitachi Solutions America, Ltd. and Measured Search, Inc. 2017, All rights reserved.

More Related Content

What's hot

Azure ADとLINE連携により実現する学校や企業における次世代ID/メッセージ基盤
Azure ADとLINE連携により実現する学校や企業における次世代ID/メッセージ基盤Azure ADとLINE連携により実現する学校や企業における次世代ID/メッセージ基盤
Azure ADとLINE連携により実現する学校や企業における次世代ID/メッセージ基盤Naohiro Fujie
 
次世代 IDaaS のポイントは本人確認 NIST と、サプライチェーンセキュリティと、みなしご ID - OpenID Summit 2020
次世代 IDaaS のポイントは本人確認 NIST と、サプライチェーンセキュリティと、みなしご ID  - OpenID Summit 2020次世代 IDaaS のポイントは本人確認 NIST と、サプライチェーンセキュリティと、みなしご ID  - OpenID Summit 2020
次世代 IDaaS のポイントは本人確認 NIST と、サプライチェーンセキュリティと、みなしご ID - OpenID Summit 2020OpenID Foundation Japan
 
え!?データがオンプレにあるけどPower BI で BI したいの?
え!?データがオンプレにあるけどPower BI で BI したいの?え!?データがオンプレにあるけどPower BI で BI したいの?
え!?データがオンプレにあるけどPower BI で BI したいの?Yugo Shimizu
 
Tech Summit 2018 Azure Data Factory 入門ハンズオン
Tech Summit 2018 Azure Data Factory 入門ハンズオンTech Summit 2018 Azure Data Factory 入門ハンズオン
Tech Summit 2018 Azure Data Factory 入門ハンズオン康平 秋山
 
Sql serverインデックスの断片化と再構築の必要性について
Sql serverインデックスの断片化と再構築の必要性についてSql serverインデックスの断片化と再構築の必要性について
Sql serverインデックスの断片化と再構築の必要性について貴仁 大和屋
 
Power BI をアプリに埋め込みたい? ならば Power BI Embedded だ!
Power BI をアプリに埋め込みたい? ならば Power BI Embedded だ!Power BI をアプリに埋め込みたい? ならば Power BI Embedded だ!
Power BI をアプリに埋め込みたい? ならば Power BI Embedded だ!Teruchika Yamada
 
運用視点でのAWSサポート利用Tips
運用視点でのAWSサポート利用Tips運用視点でのAWSサポート利用Tips
運用視点でのAWSサポート利用TipsNoritaka Sekiyama
 
Microsoft Azure Data Factory Data Flow Scenarios
Microsoft Azure Data Factory Data Flow ScenariosMicrosoft Azure Data Factory Data Flow Scenarios
Microsoft Azure Data Factory Data Flow ScenariosMark Kromer
 
AWS 기반 지속 가능한 데이터 분석 플랫폼 구축하기 - 소성운, 지그재그 :: AWS Summit Seoul 2019
AWS 기반 지속 가능한 데이터 분석 플랫폼 구축하기 - 소성운, 지그재그 :: AWS Summit Seoul 2019AWS 기반 지속 가능한 데이터 분석 플랫폼 구축하기 - 소성운, 지그재그 :: AWS Summit Seoul 2019
AWS 기반 지속 가능한 데이터 분석 플랫폼 구축하기 - 소성운, 지그재그 :: AWS Summit Seoul 2019Amazon Web Services Korea
 
AWS Black Belt Tech シリーズ 2015 - Amazon Kinesis
AWS Black Belt Tech シリーズ 2015 - Amazon KinesisAWS Black Belt Tech シリーズ 2015 - Amazon Kinesis
AWS Black Belt Tech シリーズ 2015 - Amazon KinesisAmazon Web Services Japan
 
Vector Search using OpenAI in Azure Cognitive Search.pptx
Vector Search using OpenAI in Azure Cognitive Search.pptxVector Search using OpenAI in Azure Cognitive Search.pptx
Vector Search using OpenAI in Azure Cognitive Search.pptxUdaiappa Ramachandran
 
ハイブリッド時代のID基盤構成の基礎
ハイブリッド時代のID基盤構成の基礎ハイブリッド時代のID基盤構成の基礎
ハイブリッド時代のID基盤構成の基礎Naohiro Fujie
 
Amazon Pinpoint × グロースハック活用事例集
Amazon Pinpoint × グロースハック活用事例集Amazon Pinpoint × グロースハック活用事例集
Amazon Pinpoint × グロースハック活用事例集Amazon Web Services Japan
 
20180328 AWS Black Belt Online Seminar Amazon Kinesis Video Streams
20180328 AWS Black Belt Online Seminar Amazon Kinesis Video Streams20180328 AWS Black Belt Online Seminar Amazon Kinesis Video Streams
20180328 AWS Black Belt Online Seminar Amazon Kinesis Video StreamsAmazon Web Services Japan
 
AWS 9월 웨비나 | AWS 데이터베이스 마이그레이션 서비스 활용하기
AWS 9월 웨비나 | AWS 데이터베이스 마이그레이션 서비스 활용하기AWS 9월 웨비나 | AWS 데이터베이스 마이그레이션 서비스 활용하기
AWS 9월 웨비나 | AWS 데이터베이스 마이그레이션 서비스 활용하기Amazon Web Services Korea
 
Part 0: 製造リファレンス・アーキテクチャとは?(製造リファレンス・アーキテクチャ勉強会)
Part 0: 製造リファレンス・アーキテクチャとは?(製造リファレンス・アーキテクチャ勉強会)Part 0: 製造リファレンス・アーキテクチャとは?(製造リファレンス・アーキテクチャ勉強会)
Part 0: 製造リファレンス・アーキテクチャとは?(製造リファレンス・アーキテクチャ勉強会)Takeshi Fukuhara
 
アンケートを即可視化!~MS Forms ⇒ MS Flow ⇒ Power BI~
アンケートを即可視化!~MS Forms ⇒ MS Flow ⇒ Power BI~アンケートを即可視化!~MS Forms ⇒ MS Flow ⇒ Power BI~
アンケートを即可視化!~MS Forms ⇒ MS Flow ⇒ Power BI~Yugo Shimizu
 
AWS 기반 데이터 레이크(Datalake) 구축 및 분석 - 김민성 (AWS 솔루션즈아키텍트) : 8월 온라인 세미나
AWS 기반 데이터 레이크(Datalake) 구축 및 분석 - 김민성 (AWS 솔루션즈아키텍트) : 8월 온라인 세미나AWS 기반 데이터 레이크(Datalake) 구축 및 분석 - 김민성 (AWS 솔루션즈아키텍트) : 8월 온라인 세미나
AWS 기반 데이터 레이크(Datalake) 구축 및 분석 - 김민성 (AWS 솔루션즈아키텍트) : 8월 온라인 세미나Amazon Web Services Korea
 
A How-to Guide to OAuth & API Security
A How-to Guide to OAuth & API SecurityA How-to Guide to OAuth & API Security
A How-to Guide to OAuth & API SecurityCA API Management
 
アサヒのデータ活用基盤を支えるデータ仮想化技術
アサヒのデータ活用基盤を支えるデータ仮想化技術アサヒのデータ活用基盤を支えるデータ仮想化技術
アサヒのデータ活用基盤を支えるデータ仮想化技術Denodo
 

What's hot (20)

Azure ADとLINE連携により実現する学校や企業における次世代ID/メッセージ基盤
Azure ADとLINE連携により実現する学校や企業における次世代ID/メッセージ基盤Azure ADとLINE連携により実現する学校や企業における次世代ID/メッセージ基盤
Azure ADとLINE連携により実現する学校や企業における次世代ID/メッセージ基盤
 
次世代 IDaaS のポイントは本人確認 NIST と、サプライチェーンセキュリティと、みなしご ID - OpenID Summit 2020
次世代 IDaaS のポイントは本人確認 NIST と、サプライチェーンセキュリティと、みなしご ID  - OpenID Summit 2020次世代 IDaaS のポイントは本人確認 NIST と、サプライチェーンセキュリティと、みなしご ID  - OpenID Summit 2020
次世代 IDaaS のポイントは本人確認 NIST と、サプライチェーンセキュリティと、みなしご ID - OpenID Summit 2020
 
え!?データがオンプレにあるけどPower BI で BI したいの?
え!?データがオンプレにあるけどPower BI で BI したいの?え!?データがオンプレにあるけどPower BI で BI したいの?
え!?データがオンプレにあるけどPower BI で BI したいの?
 
Tech Summit 2018 Azure Data Factory 入門ハンズオン
Tech Summit 2018 Azure Data Factory 入門ハンズオンTech Summit 2018 Azure Data Factory 入門ハンズオン
Tech Summit 2018 Azure Data Factory 入門ハンズオン
 
Sql serverインデックスの断片化と再構築の必要性について
Sql serverインデックスの断片化と再構築の必要性についてSql serverインデックスの断片化と再構築の必要性について
Sql serverインデックスの断片化と再構築の必要性について
 
Power BI をアプリに埋め込みたい? ならば Power BI Embedded だ!
Power BI をアプリに埋め込みたい? ならば Power BI Embedded だ!Power BI をアプリに埋め込みたい? ならば Power BI Embedded だ!
Power BI をアプリに埋め込みたい? ならば Power BI Embedded だ!
 
運用視点でのAWSサポート利用Tips
運用視点でのAWSサポート利用Tips運用視点でのAWSサポート利用Tips
運用視点でのAWSサポート利用Tips
 
Microsoft Azure Data Factory Data Flow Scenarios
Microsoft Azure Data Factory Data Flow ScenariosMicrosoft Azure Data Factory Data Flow Scenarios
Microsoft Azure Data Factory Data Flow Scenarios
 
AWS 기반 지속 가능한 데이터 분석 플랫폼 구축하기 - 소성운, 지그재그 :: AWS Summit Seoul 2019
AWS 기반 지속 가능한 데이터 분석 플랫폼 구축하기 - 소성운, 지그재그 :: AWS Summit Seoul 2019AWS 기반 지속 가능한 데이터 분석 플랫폼 구축하기 - 소성운, 지그재그 :: AWS Summit Seoul 2019
AWS 기반 지속 가능한 데이터 분석 플랫폼 구축하기 - 소성운, 지그재그 :: AWS Summit Seoul 2019
 
AWS Black Belt Tech シリーズ 2015 - Amazon Kinesis
AWS Black Belt Tech シリーズ 2015 - Amazon KinesisAWS Black Belt Tech シリーズ 2015 - Amazon Kinesis
AWS Black Belt Tech シリーズ 2015 - Amazon Kinesis
 
Vector Search using OpenAI in Azure Cognitive Search.pptx
Vector Search using OpenAI in Azure Cognitive Search.pptxVector Search using OpenAI in Azure Cognitive Search.pptx
Vector Search using OpenAI in Azure Cognitive Search.pptx
 
ハイブリッド時代のID基盤構成の基礎
ハイブリッド時代のID基盤構成の基礎ハイブリッド時代のID基盤構成の基礎
ハイブリッド時代のID基盤構成の基礎
 
Amazon Pinpoint × グロースハック活用事例集
Amazon Pinpoint × グロースハック活用事例集Amazon Pinpoint × グロースハック活用事例集
Amazon Pinpoint × グロースハック活用事例集
 
20180328 AWS Black Belt Online Seminar Amazon Kinesis Video Streams
20180328 AWS Black Belt Online Seminar Amazon Kinesis Video Streams20180328 AWS Black Belt Online Seminar Amazon Kinesis Video Streams
20180328 AWS Black Belt Online Seminar Amazon Kinesis Video Streams
 
AWS 9월 웨비나 | AWS 데이터베이스 마이그레이션 서비스 활용하기
AWS 9월 웨비나 | AWS 데이터베이스 마이그레이션 서비스 활용하기AWS 9월 웨비나 | AWS 데이터베이스 마이그레이션 서비스 활용하기
AWS 9월 웨비나 | AWS 데이터베이스 마이그레이션 서비스 활용하기
 
Part 0: 製造リファレンス・アーキテクチャとは?(製造リファレンス・アーキテクチャ勉強会)
Part 0: 製造リファレンス・アーキテクチャとは?(製造リファレンス・アーキテクチャ勉強会)Part 0: 製造リファレンス・アーキテクチャとは?(製造リファレンス・アーキテクチャ勉強会)
Part 0: 製造リファレンス・アーキテクチャとは?(製造リファレンス・アーキテクチャ勉強会)
 
アンケートを即可視化!~MS Forms ⇒ MS Flow ⇒ Power BI~
アンケートを即可視化!~MS Forms ⇒ MS Flow ⇒ Power BI~アンケートを即可視化!~MS Forms ⇒ MS Flow ⇒ Power BI~
アンケートを即可視化!~MS Forms ⇒ MS Flow ⇒ Power BI~
 
AWS 기반 데이터 레이크(Datalake) 구축 및 분석 - 김민성 (AWS 솔루션즈아키텍트) : 8월 온라인 세미나
AWS 기반 데이터 레이크(Datalake) 구축 및 분석 - 김민성 (AWS 솔루션즈아키텍트) : 8월 온라인 세미나AWS 기반 데이터 레이크(Datalake) 구축 및 분석 - 김민성 (AWS 솔루션즈아키텍트) : 8월 온라인 세미나
AWS 기반 데이터 레이크(Datalake) 구축 및 분석 - 김민성 (AWS 솔루션즈아키텍트) : 8월 온라인 세미나
 
A How-to Guide to OAuth & API Security
A How-to Guide to OAuth & API SecurityA How-to Guide to OAuth & API Security
A How-to Guide to OAuth & API Security
 
アサヒのデータ活用基盤を支えるデータ仮想化技術
アサヒのデータ活用基盤を支えるデータ仮想化技術アサヒのデータ活用基盤を支えるデータ仮想化技術
アサヒのデータ活用基盤を支えるデータ仮想化技術
 

Similar to Securing Solr Search Data in the Cloud

GraphTalk Helsinki - Introduction to Graphs and Neo4j
GraphTalk Helsinki - Introduction to Graphs and Neo4jGraphTalk Helsinki - Introduction to Graphs and Neo4j
GraphTalk Helsinki - Introduction to Graphs and Neo4jNeo4j
 
Frank Bien Opening Keynote - Join 2016
Frank Bien Opening Keynote - Join 2016Frank Bien Opening Keynote - Join 2016
Frank Bien Opening Keynote - Join 2016Looker
 
Frank Bien Opening Keynote - Join 2016
Frank Bien Opening Keynote - Join 2016Frank Bien Opening Keynote - Join 2016
Frank Bien Opening Keynote - Join 2016Looker
 
Hadoop and Manufacturing
Hadoop and ManufacturingHadoop and Manufacturing
Hadoop and ManufacturingCloudera, Inc.
 
Rethink Analytics with an Enterprise Data Hub
Rethink Analytics with an Enterprise Data HubRethink Analytics with an Enterprise Data Hub
Rethink Analytics with an Enterprise Data HubCloudera, Inc.
 
Building a data driven search application with LucidWorks SiLK
Building a data driven search application with LucidWorks SiLKBuilding a data driven search application with LucidWorks SiLK
Building a data driven search application with LucidWorks SiLKLucidworks (Archived)
 
SharePointlandia 2013: SharePoint and Compliance
SharePointlandia 2013: SharePoint and ComplianceSharePointlandia 2013: SharePoint and Compliance
SharePointlandia 2013: SharePoint and ComplianceMatthew R. Barrett
 
Building a Data Driven Culture and AI Revolution With Gregory Little | Curren...
Building a Data Driven Culture and AI Revolution With Gregory Little | Curren...Building a Data Driven Culture and AI Revolution With Gregory Little | Curren...
Building a Data Driven Culture and AI Revolution With Gregory Little | Curren...HostedbyConfluent
 
Data Privacy & Governance in the Age of Big Data: Deploy a De-Identified Data...
Data Privacy & Governance in the Age of Big Data: Deploy a De-Identified Data...Data Privacy & Governance in the Age of Big Data: Deploy a De-Identified Data...
Data Privacy & Governance in the Age of Big Data: Deploy a De-Identified Data...Amazon Web Services
 
Unlocking New Insights with Information Discovery
Unlocking New Insights with Information DiscoveryUnlocking New Insights with Information Discovery
Unlocking New Insights with Information DiscoveryAlithya
 
Amundsen: From discovering to security data
Amundsen: From discovering to security dataAmundsen: From discovering to security data
Amundsen: From discovering to security datamarkgrover
 
(SEC402) Enterprise Cloud Security via DevSecOps 2.0
(SEC402) Enterprise Cloud Security via DevSecOps 2.0(SEC402) Enterprise Cloud Security via DevSecOps 2.0
(SEC402) Enterprise Cloud Security via DevSecOps 2.0Amazon Web Services
 
Developing an Effective Search Strategy for Office 365 and Hybrid Deployments
Developing an Effective Search Strategy for Office 365 and Hybrid DeploymentsDeveloping an Effective Search Strategy for Office 365 and Hybrid Deployments
Developing an Effective Search Strategy for Office 365 and Hybrid DeploymentsNetwoven Inc.
 
Discovery, Risk, and Insight in a Metadata-Driven World Webinar
Discovery, Risk, and Insight in a Metadata-Driven World WebinarDiscovery, Risk, and Insight in a Metadata-Driven World Webinar
Discovery, Risk, and Insight in a Metadata-Driven World WebinarConcept Searching, Inc
 
2016 Cybersecurity Analytics State of the Union
2016 Cybersecurity Analytics State of the Union2016 Cybersecurity Analytics State of the Union
2016 Cybersecurity Analytics State of the UnionCloudera, Inc.
 

Similar to Securing Solr Search Data in the Cloud (20)

CEPTES Product Deck
CEPTES Product Deck CEPTES Product Deck
CEPTES Product Deck
 
GraphTalk Helsinki - Introduction to Graphs and Neo4j
GraphTalk Helsinki - Introduction to Graphs and Neo4jGraphTalk Helsinki - Introduction to Graphs and Neo4j
GraphTalk Helsinki - Introduction to Graphs and Neo4j
 
Frank Bien Opening Keynote - Join 2016
Frank Bien Opening Keynote - Join 2016Frank Bien Opening Keynote - Join 2016
Frank Bien Opening Keynote - Join 2016
 
Frank Bien Opening Keynote - Join 2016
Frank Bien Opening Keynote - Join 2016Frank Bien Opening Keynote - Join 2016
Frank Bien Opening Keynote - Join 2016
 
Scalable Search Analytics
Scalable Search AnalyticsScalable Search Analytics
Scalable Search Analytics
 
Hadoop and Manufacturing
Hadoop and ManufacturingHadoop and Manufacturing
Hadoop and Manufacturing
 
Rethink Analytics with an Enterprise Data Hub
Rethink Analytics with an Enterprise Data HubRethink Analytics with an Enterprise Data Hub
Rethink Analytics with an Enterprise Data Hub
 
Building a data driven search application with LucidWorks SiLK
Building a data driven search application with LucidWorks SiLKBuilding a data driven search application with LucidWorks SiLK
Building a data driven search application with LucidWorks SiLK
 
Hr and performance analytics
Hr and performance analyticsHr and performance analytics
Hr and performance analytics
 
SharePointlandia 2013: SharePoint and Compliance
SharePointlandia 2013: SharePoint and ComplianceSharePointlandia 2013: SharePoint and Compliance
SharePointlandia 2013: SharePoint and Compliance
 
Building a Data Driven Culture and AI Revolution With Gregory Little | Curren...
Building a Data Driven Culture and AI Revolution With Gregory Little | Curren...Building a Data Driven Culture and AI Revolution With Gregory Little | Curren...
Building a Data Driven Culture and AI Revolution With Gregory Little | Curren...
 
Data Privacy & Governance in the Age of Big Data: Deploy a De-Identified Data...
Data Privacy & Governance in the Age of Big Data: Deploy a De-Identified Data...Data Privacy & Governance in the Age of Big Data: Deploy a De-Identified Data...
Data Privacy & Governance in the Age of Big Data: Deploy a De-Identified Data...
 
Unlocking New Insights with Information Discovery
Unlocking New Insights with Information DiscoveryUnlocking New Insights with Information Discovery
Unlocking New Insights with Information Discovery
 
Amundsen: From discovering to security data
Amundsen: From discovering to security dataAmundsen: From discovering to security data
Amundsen: From discovering to security data
 
(SEC402) Enterprise Cloud Security via DevSecOps 2.0
(SEC402) Enterprise Cloud Security via DevSecOps 2.0(SEC402) Enterprise Cloud Security via DevSecOps 2.0
(SEC402) Enterprise Cloud Security via DevSecOps 2.0
 
Developing an Effective Search Strategy for Office 365 and Hybrid Deployments
Developing an Effective Search Strategy for Office 365 and Hybrid DeploymentsDeveloping an Effective Search Strategy for Office 365 and Hybrid Deployments
Developing an Effective Search Strategy for Office 365 and Hybrid Deployments
 
Discovery, Risk, and Insight in a Metadata-Driven World Webinar
Discovery, Risk, and Insight in a Metadata-Driven World WebinarDiscovery, Risk, and Insight in a Metadata-Driven World Webinar
Discovery, Risk, and Insight in a Metadata-Driven World Webinar
 
Chatbots: Automated Conversational Model using Machine Learning
Chatbots: Automated Conversational Model using Machine LearningChatbots: Automated Conversational Model using Machine Learning
Chatbots: Automated Conversational Model using Machine Learning
 
Student information analytics
Student information analyticsStudent information analytics
Student information analytics
 
2016 Cybersecurity Analytics State of the Union
2016 Cybersecurity Analytics State of the Union2016 Cybersecurity Analytics State of the Union
2016 Cybersecurity Analytics State of the Union
 

More from Sameer Maggon

SolrCloud-Best Practices for Sitecore. Design, build, and devops considerations
SolrCloud-Best Practices for Sitecore. Design, build, and devops considerationsSolrCloud-Best Practices for Sitecore. Design, build, and devops considerations
SolrCloud-Best Practices for Sitecore. Design, build, and devops considerationsSameer Maggon
 
World Class Solr Power - in 30 minutes
World Class Solr Power - in 30 minutesWorld Class Solr Power - in 30 minutes
World Class Solr Power - in 30 minutesSameer Maggon
 
Future of enterprise apps is open source and cloud computing
Future of enterprise apps is open source and cloud computingFuture of enterprise apps is open source and cloud computing
Future of enterprise apps is open source and cloud computingSameer Maggon
 
Behind the Scenes of Multi-Cloud Solr-as-a-Service
Behind the Scenes of Multi-Cloud Solr-as-a-ServiceBehind the Scenes of Multi-Cloud Solr-as-a-Service
Behind the Scenes of Multi-Cloud Solr-as-a-ServiceSameer Maggon
 
Making search better by tracking & utilizing user search behavior
Making search better by tracking & utilizing user search behaviorMaking search better by tracking & utilizing user search behavior
Making search better by tracking & utilizing user search behaviorSameer Maggon
 
Building great mobile search with Productsy and CloudSearch
Building great mobile search with Productsy and CloudSearchBuilding great mobile search with Productsy and CloudSearch
Building great mobile search with Productsy and CloudSearchSameer Maggon
 
Local Search using Solr at YP.com
Local Search using Solr at YP.comLocal Search using Solr at YP.com
Local Search using Solr at YP.comSameer Maggon
 

More from Sameer Maggon (7)

SolrCloud-Best Practices for Sitecore. Design, build, and devops considerations
SolrCloud-Best Practices for Sitecore. Design, build, and devops considerationsSolrCloud-Best Practices for Sitecore. Design, build, and devops considerations
SolrCloud-Best Practices for Sitecore. Design, build, and devops considerations
 
World Class Solr Power - in 30 minutes
World Class Solr Power - in 30 minutesWorld Class Solr Power - in 30 minutes
World Class Solr Power - in 30 minutes
 
Future of enterprise apps is open source and cloud computing
Future of enterprise apps is open source and cloud computingFuture of enterprise apps is open source and cloud computing
Future of enterprise apps is open source and cloud computing
 
Behind the Scenes of Multi-Cloud Solr-as-a-Service
Behind the Scenes of Multi-Cloud Solr-as-a-ServiceBehind the Scenes of Multi-Cloud Solr-as-a-Service
Behind the Scenes of Multi-Cloud Solr-as-a-Service
 
Making search better by tracking & utilizing user search behavior
Making search better by tracking & utilizing user search behaviorMaking search better by tracking & utilizing user search behavior
Making search better by tracking & utilizing user search behavior
 
Building great mobile search with Productsy and CloudSearch
Building great mobile search with Productsy and CloudSearchBuilding great mobile search with Productsy and CloudSearch
Building great mobile search with Productsy and CloudSearch
 
Local Search using Solr at YP.com
Local Search using Solr at YP.comLocal Search using Solr at YP.com
Local Search using Solr at YP.com
 

Recently uploaded

%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...masabamasaba
 
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyviewmasabamasaba
 
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...WSO2
 
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrainmasabamasaba
 
%in Soweto+277-882-255-28 abortion pills for sale in soweto
%in Soweto+277-882-255-28 abortion pills for sale in soweto%in Soweto+277-882-255-28 abortion pills for sale in soweto
%in Soweto+277-882-255-28 abortion pills for sale in sowetomasabamasaba
 
%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrandmasabamasaba
 
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...SelfMade bd
 
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...masabamasaba
 
Architecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the pastArchitecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the pastPapp Krisztián
 
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesVictorSzoltysek
 
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...masabamasaba
 
The title is not connected to what is inside
The title is not connected to what is insideThe title is not connected to what is inside
The title is not connected to what is insideshinachiaurasa2
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsJhone kinadey
 
AI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplateAI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplatePresentation.STUDIO
 
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...Shane Coughlan
 
WSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go PlatformlessWSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go PlatformlessWSO2
 
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...masabamasaba
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️Delhi Call girls
 
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park %in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park masabamasaba
 

Recently uploaded (20)

%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
 
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
 
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
 
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
 
%in Soweto+277-882-255-28 abortion pills for sale in soweto
%in Soweto+277-882-255-28 abortion pills for sale in soweto%in Soweto+277-882-255-28 abortion pills for sale in soweto
%in Soweto+277-882-255-28 abortion pills for sale in soweto
 
%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand
 
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
 
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
 
Architecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the pastArchitecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the past
 
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
 
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
 
The title is not connected to what is inside
The title is not connected to what is insideThe title is not connected to what is inside
The title is not connected to what is inside
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
AI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplateAI & Machine Learning Presentation Template
AI & Machine Learning Presentation Template
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
 
WSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go PlatformlessWSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go Platformless
 
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park %in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
 

Securing Solr Search Data in the Cloud

  • 1. Securing Search Data in the Cloud Sameer Maggon Measured Search Harry Ochiai Hitachi Solutions New York Enterprise Cloud Meetup Jan 25, 2017
  • 2. 2 Agenda • About the Speakers • About Measured Search & Hitachi Solutions • What is Apache Solr? • Where is Apache Solr used? • How Search Data is stored • Data Security Challenge in the Cloud • Protecting Confidential Search Data • Challenges of Encrypted Search Index • Encryption Solution • Demo • Q&A © Hitachi Solutions America, Ltd. and Measured Search, Inc. 2017, All rights reserved.
  • 3. 3 About the Speakers Harry Ochiai • Senior Business Development Manager of Hitachi Solutions • Worked on networking, cyber security, and storage • Focus on cloud encryption solutions since 2013 • New Yorker Sameer Maggon • Founder / Technologist at Measured Search • Been working in Open Source Search since 2001 (Lucene/Solr/Elastic) • USC Engineering Alumni • Works and Lives in Los Angeles, CA © Hitachi Solutions America, Ltd. and Measured Search, Inc. 2017, All rights reserved.
  • 4. 4 About Hitachi Solutions Global IT Solutions Company • A Hitachi Company • Japan(HQ), North America, Europe, China, India and Southeast Asia • 12,000 Employees Leading security solution provider in Japan • Innovator and leading provider of encryption technology for over 20 years • HIBUN: 40% market share in the endpoint encryption segment in Japan • Launched new security solution Credeon globally in 2013 © Hitachi Solutions America, Ltd. and Measured Search, Inc. 2017, All rights reserved.
  • 5. 5 About Measured Search Measured Search® enables companies to elevate the experience of Search based applications faster and with more confidence. Managed Services & Support SearchStax® Platform as a Service On-Demand Expertise & Consulting © Hitachi Solutions America, Ltd. and Measured Search, Inc. 2017, All rights reserved.
  • 6. 6 by Measured SearchSearchStax® SearchStax® Solr Cloud Manager SearchStax® Pulse SearchStax® Analytics Comprehensive Solr Monitoring & Alerting with service level reporting to proactively manage your clusters. Realtime feedback & user insights to help optimize your Search Experience Easiest way to run & manage Solr in the cloud - saves time, money and reduces risk. © Hitachi Solutions America, Ltd. and Measured Search, Inc. 2017, All rights reserved.
  • 7. 7 What is Apache Solr? Solr is the popular, blazing-fast, open source enterprise search platform built on Apache Lucene™ © Hitachi Solutions America, Ltd. and Measured Search, Inc. 2017, All rights reserved.
  • 8. 8 Where is Apache Solr used? Government eCommerce Education Life Sciences Entertainment Healthcare Financial Services High Tech © Hitachi Solutions America, Ltd. and Measured Search, Inc. 2017, All rights reserved.
  • 9. 9 Where is Apache Solr used? finding tickets finding job finding restaurant/services Enterprise Search Media Search Retail Customer Search Fraud Analytics Publishing RecruitingTravelResearch Business Intelligence © Hitachi Solutions America, Ltd. and Measured Search, Inc. 2017, All rights reserved.
  • 10. 10 Search Index Search platforms maintains internal indices of terms and properties of each indexed document in plaintext. Plain Search Index Encrypted Search Index © Hitachi Solutions America, Ltd. and Measured Search, Inc. 2017, All rights reserved.
  • 11. 11 Data Security Challenges in the Cloud Solr / Search Cluster Backups Threats Managed Service Provider (MSP) Rogue EmployeeManaged Service Provider Rogue Employee Hacker Accidental Data Access © Hitachi Solutions America, Ltd. and Measured Search, Inc. 2017, All rights reserved.
  • 12. 12 Challenges of Encrypted Search Index Challenges • To search through encrypted data, data must be decrypted • Decryption slows down the process • Encryption limits usability Goals • Maintain encrypted state without sacrificing security level • Encrypt using your own key • Maintain search performance and usability • Protect against unauthorized users and rogue system administrators • Regulatory compliance Solution • Searchable Encryption technology © Hitachi Solutions America, Ltd. and Measured Search, Inc. 2017, All rights reserved.
  • 13. 13 Protecting Confidential Search Data Solr/Lucene text Key word result value Solr/Lucene text Key word result File System Encryption value Solr/Lucene text Key word result value Simple Encryption Solr/Lucene text Key word result value Searchable Encryption text Key word result value Searchable Encryption Storage Storage Storage Storage Storage Client Server App Server OS No Encryption OS Encryption Simple Encryption with Solr Plugin Client-Side Searchable Encryption Searchable Encryption with Solr Plugin Low Security High Security No Security Decryption at storage layer X Difficult to separate key Decrypt first and match X Very slow X plaintextin memory Match first and decrypt O Key separation O High Performance(1) O Semantically Secure(2) X plaintextin memory Client Client Client Client Client Decryption at client-side O Key separation O High Performance(1) O Semantically Secure(2) O no plaintexton server Solr/Lucene (1) Use of Symmetric Key (2) Probabilistic Encryption Scheme © Hitachi Solutions America, Ltd. and Measured Search, Inc. 2017, All rights reserved.
  • 14. 14 Search Encryption 101 Searchable Encryption is an encryption technology for searching data in an encrypted state. • Fully Homomorphic Encryption • Homomorphic Encryption • Functional Encryption • Hitachi Searchable Encryption Practical CKA CPA Tokenization 103 10610010-3 Hitachi Searchable Encryption Functional Encryption Homomorphic Encryption Fully Homomorphic Encryption Security Performance (Search / sec) EncryptedPlain CKA: Chosen Keyword Attack CPA: Chosen Phrase Attack © Hitachi Solutions America, Ltd. and Measured Search, Inc. 2017, All rights reserved.
  • 15. 15 Search Encryption 101 Encryption Schemes • Deterministic • Constant value • Vulnerable to statistical attacks • Probabilistic • Random value • Semantically secure Encryption Key Exchange • Symmetric • Asymmetric / PKI © Hitachi Solutions America, Ltd. and Measured Search, Inc. 2017, All rights reserved.
  • 16. 16 Solution: Searchable Encryption with Solr Plugin Hitachi Credeon Secure Full-Text Search • Searchable Encryption plugin for Apache Solr and Elasticsearch • Deterministic Encryption Scheme • 128 bit randomization • AES 256, FIPS 140-2 • Symmetric Key • Real-time search (15%+ overhead) • Key Management System, Java KeyStore © Hitachi Solutions America, Ltd. and Measured Search, Inc. 2017, All rights reserved.
  • 17. 17 Solution: Client Side Searchable Encryption Credeon Secure Document Solution for SharePoint Online • Client-side encryption for search index and data • Searchable encryption on Solr • Search Engine and Key Management are independent of Microsoft Search Server SharePoint Server Key Management Server Search Engine SharePoint Online Client PC 1. Get a key 2. Index the file contents and encrypt index 4. Upload encrypted file 4. Upload encrypted index 3. Encrypt file © Hitachi Solutions America, Ltd. and Measured Search, Inc. 2017, All rights reserved.
  • 18. 18 Demo: Securing Solr Search in the Cloud SearchStax with Credeon © Hitachi Solutions America, Ltd. and Measured Search, Inc. 2017, All rights reserved.
  • 19. 19 Q&A © Hitachi Solutions America, Ltd. and Measured Search, Inc. 2017, All rights reserved.
  • 20. 20 Contact Info Sameer Maggon @maggon sameer@measuredsearch.com https://www.measuredsearch.com Harry Ochiai @credeon hochiai@hitachi-solutions.com https://psg.hitachi-solutions.com/credeon/overview © Hitachi Solutions America, Ltd. and Measured Search, Inc. 2017, All rights reserved.