SlideShare une entreprise Scribd logo
1  sur  20
Télécharger pour lire hors ligne
Securing Search Data in the Cloud
Sameer Maggon
Measured Search
Harry Ochiai
Hitachi Solutions
New York Enterprise Cloud Meetup
Jan 25, 2017
2
Agenda
• About the Speakers
• About Measured Search & Hitachi Solutions
• What is Apache Solr?
• Where is Apache Solr used?
• How Search Data is stored
• Data Security Challenge in the Cloud
• Protecting Confidential Search Data
• Challenges of Encrypted Search Index
• Encryption Solution
• Demo
• Q&A
© Hitachi Solutions America, Ltd. and Measured Search, Inc. 2017, All rights reserved.
3
About the Speakers
Harry Ochiai
• Senior Business Development Manager of Hitachi Solutions
• Worked on networking, cyber security, and storage
• Focus on cloud encryption solutions since 2013
• New Yorker
Sameer Maggon
• Founder / Technologist at Measured Search
• Been working in Open Source Search since 2001 (Lucene/Solr/Elastic)
• USC Engineering Alumni
• Works and Lives in Los Angeles, CA
© Hitachi Solutions America, Ltd. and Measured Search, Inc. 2017, All rights reserved.
4
About Hitachi Solutions
Global IT Solutions Company
• A Hitachi Company
• Japan(HQ), North America, Europe, China, India and Southeast Asia
• 12,000 Employees
Leading security solution provider in Japan
• Innovator and leading provider of encryption technology for over 20 years
• HIBUN: 40% market share in the endpoint encryption segment in Japan
• Launched new security solution Credeon globally in 2013
© Hitachi Solutions America, Ltd. and Measured Search, Inc. 2017, All rights reserved.
5
About Measured Search
Measured Search® enables companies to elevate the experience of Search
based applications faster and with more confidence.
Managed Services &
Support
SearchStax®
Platform as a Service
On-Demand
Expertise & Consulting
© Hitachi Solutions America, Ltd. and Measured Search, Inc. 2017, All rights reserved.
6
by Measured SearchSearchStax®
SearchStax®
Solr Cloud Manager
SearchStax®
Pulse
SearchStax®
Analytics
Comprehensive Solr Monitoring &
Alerting with service level reporting
to proactively manage your clusters.
Realtime feedback & user
insights to help optimize
your Search Experience
Easiest way to run & manage
Solr in the cloud - saves time,
money and reduces risk.
© Hitachi Solutions America, Ltd. and Measured Search, Inc. 2017, All rights reserved.
7
What is Apache Solr?
Solr is the popular, blazing-fast, open source
enterprise search platform built on Apache
Lucene™
© Hitachi Solutions America, Ltd. and Measured Search, Inc. 2017, All rights reserved.
8
Where is Apache Solr used?
Government
eCommerce
Education
Life Sciences
Entertainment
Healthcare
Financial Services
High Tech
© Hitachi Solutions America, Ltd. and Measured Search, Inc. 2017, All rights reserved.
9
Where is Apache Solr used?
finding
tickets
finding job
finding restaurant/services
Enterprise
Search
Media
Search
Retail
Customer
Search
Fraud
Analytics
Publishing
RecruitingTravelResearch
Business
Intelligence
© Hitachi Solutions America, Ltd. and Measured Search, Inc. 2017, All rights reserved.
10
Search Index
Search platforms maintains internal indices of terms and properties of each
indexed document in plaintext.
Plain Search Index Encrypted Search Index
© Hitachi Solutions America, Ltd. and Measured Search, Inc. 2017, All rights reserved.
11
Data Security Challenges in the Cloud
Solr / Search Cluster
Backups
Threats
Managed Service Provider (MSP)
Rogue EmployeeManaged Service Provider Rogue Employee Hacker Accidental Data Access
© Hitachi Solutions America, Ltd. and Measured Search, Inc. 2017, All rights reserved.
12
Challenges of Encrypted Search Index
Challenges
• To search through encrypted data, data must be decrypted
• Decryption slows down the process
• Encryption limits usability
Goals
• Maintain encrypted state without sacrificing security level
• Encrypt using your own key
• Maintain search performance and usability
• Protect against unauthorized users and rogue system administrators
• Regulatory compliance
Solution
• Searchable Encryption technology
© Hitachi Solutions America, Ltd. and Measured Search, Inc. 2017, All rights reserved.
13
Protecting Confidential Search Data
Solr/Lucene
text Key
word
result
value
Solr/Lucene
text Key
word
result
File System
Encryption
value
Solr/Lucene
text Key
word
result
value
Simple
Encryption
Solr/Lucene
text Key
word
result
value
Searchable
Encryption
text Key
word
result
value
Searchable
Encryption
Storage Storage Storage Storage Storage
Client
Server
App
Server
OS
No Encryption OS Encryption
Simple Encryption
with Solr Plugin
Client-Side Searchable
Encryption
Searchable Encryption
with Solr Plugin
Low Security High Security
No Security Decryption at storage layer
X Difficult to separate key
Decrypt first and match
X Very slow
X plaintextin memory
Match first and decrypt
O Key separation
O High Performance(1)
O Semantically Secure(2)
X plaintextin memory
Client Client Client Client Client
Decryption at client-side
O Key separation
O High Performance(1)
O Semantically Secure(2)
O no plaintexton server
Solr/Lucene
(1) Use of Symmetric Key
(2) Probabilistic Encryption Scheme
© Hitachi Solutions America, Ltd. and Measured Search, Inc. 2017, All rights reserved.
14
Search Encryption 101
Searchable Encryption is an encryption technology for searching data in an
encrypted state.
• Fully Homomorphic Encryption
• Homomorphic Encryption
• Functional Encryption
• Hitachi Searchable Encryption
Practical
CKA
CPA
Tokenization
103 10610010-3
Hitachi
Searchable
Encryption
Functional
Encryption
Homomorphic
Encryption
Fully Homomorphic
Encryption
Security
Performance (Search / sec)
EncryptedPlain
CKA: Chosen Keyword Attack
CPA: Chosen Phrase Attack
© Hitachi Solutions America, Ltd. and Measured Search, Inc. 2017, All rights reserved.
15
Search Encryption 101
Encryption Schemes
• Deterministic
• Constant value
• Vulnerable to statistical attacks
• Probabilistic
• Random value
• Semantically secure
Encryption Key Exchange
• Symmetric
• Asymmetric / PKI
© Hitachi Solutions America, Ltd. and Measured Search, Inc. 2017, All rights reserved.
16
Solution: Searchable Encryption with Solr Plugin
Hitachi Credeon Secure Full-Text Search
• Searchable Encryption plugin for Apache Solr and Elasticsearch
• Probabilistic Encryption Scheme
• 128 bit randomization
• AES 256, FIPS 140-2
• Symmetric Key
• Real-time search (15%+ overhead)
• Key Management System, Java KeyStore
© Hitachi Solutions America, Ltd. and Measured Search, Inc. 2017, All rights reserved.
17
Solution: Client Side Searchable Encryption
Credeon Secure Document Solution for SharePoint Online
• Client-side encryption for search index and data
• Searchable encryption on Solr
• Search Engine and Key Management are independent of Microsoft
Search Server
SharePoint Server
Key Management
Server
Search Engine
SharePoint Online
Client PC
1. Get a key
2. Index the file contents
and encrypt index
4. Upload encrypted
file
4. Upload encrypted
index
3. Encrypt file
© Hitachi Solutions America, Ltd. and Measured Search, Inc. 2017, All rights reserved.
18
Demo: Securing Solr Search in the Cloud
SearchStax with Credeon
© Hitachi Solutions America, Ltd. and Measured Search, Inc. 2017, All rights reserved.
19
Q&A
© Hitachi Solutions America, Ltd. and Measured Search, Inc. 2017, All rights reserved.
20
Contact Info
Sameer Maggon
@maggon
sameer@measuredsearch.com
https://www.measuredsearch.com
Harry Ochiai
@credeon
hochiai@hitachi-solutions.com
https://psg.hitachi-solutions.com/credeon/overview
© Hitachi Solutions America, Ltd. and Measured Search, Inc. 2017, All rights reserved.

Contenu connexe

Tendances

Big Data Business Wins: Real-time Inventory Tracking with Hadoop
Big Data Business Wins: Real-time Inventory Tracking with HadoopBig Data Business Wins: Real-time Inventory Tracking with Hadoop
Big Data Business Wins: Real-time Inventory Tracking with Hadoop
DataWorks Summit
 
Securing_Native_Big_Data_v1
Securing_Native_Big_Data_v1Securing_Native_Big_Data_v1
Securing_Native_Big_Data_v1
Steve Markey
 
Cloudera Fast Forward Labs: The Vision and the Challenge of Applied Machine L...
Cloudera Fast Forward Labs: The Vision and the Challenge of Applied Machine L...Cloudera Fast Forward Labs: The Vision and the Challenge of Applied Machine L...
Cloudera Fast Forward Labs: The Vision and the Challenge of Applied Machine L...
Cloudera, Inc.
 
Popularity of Online News Article
Popularity of Online News ArticlePopularity of Online News Article
Popularity of Online News Article
Sumit Saini
 

Tendances (17)

MapR lucidworks joint webinar
MapR lucidworks joint webinarMapR lucidworks joint webinar
MapR lucidworks joint webinar
 
Hadoop and Big Data Security
Hadoop and Big Data SecurityHadoop and Big Data Security
Hadoop and Big Data Security
 
Comment développer une stratégie Big Data dans le cloud public avec l'offre P...
Comment développer une stratégie Big Data dans le cloud public avec l'offre P...Comment développer une stratégie Big Data dans le cloud public avec l'offre P...
Comment développer une stratégie Big Data dans le cloud public avec l'offre P...
 
How Verizon Uses Disruptive Developments for Organized Progress
How Verizon Uses Disruptive Developments for Organized ProgressHow Verizon Uses Disruptive Developments for Organized Progress
How Verizon Uses Disruptive Developments for Organized Progress
 
Relying on Data for Strategic Decision-Making--Financial Services Experience
Relying on Data for Strategic Decision-Making--Financial Services ExperienceRelying on Data for Strategic Decision-Making--Financial Services Experience
Relying on Data for Strategic Decision-Making--Financial Services Experience
 
Big Data Business Wins: Real-time Inventory Tracking with Hadoop
Big Data Business Wins: Real-time Inventory Tracking with HadoopBig Data Business Wins: Real-time Inventory Tracking with Hadoop
Big Data Business Wins: Real-time Inventory Tracking with Hadoop
 
The 5 Biggest Data Myths in Telco: Exposed
The 5 Biggest Data Myths in Telco: ExposedThe 5 Biggest Data Myths in Telco: Exposed
The 5 Biggest Data Myths in Telco: Exposed
 
Securing_Native_Big_Data_v1
Securing_Native_Big_Data_v1Securing_Native_Big_Data_v1
Securing_Native_Big_Data_v1
 
Webinar - Fighting Bank Fraud with Real-time Graph Database
Webinar - Fighting Bank Fraud with Real-time Graph Database Webinar - Fighting Bank Fraud with Real-time Graph Database
Webinar - Fighting Bank Fraud with Real-time Graph Database
 
Cloudera Fast Forward Labs: The Vision and the Challenge of Applied Machine L...
Cloudera Fast Forward Labs: The Vision and the Challenge of Applied Machine L...Cloudera Fast Forward Labs: The Vision and the Challenge of Applied Machine L...
Cloudera Fast Forward Labs: The Vision and the Challenge of Applied Machine L...
 
The Enterprise Search Market in a Nutshell
The Enterprise Search Market in a NutshellThe Enterprise Search Market in a Nutshell
The Enterprise Search Market in a Nutshell
 
How Big Data Can Help Marketers Improve Customer Relationships
How Big Data Can Help Marketers Improve Customer RelationshipsHow Big Data Can Help Marketers Improve Customer Relationships
How Big Data Can Help Marketers Improve Customer Relationships
 
Building trust in your data lake. A fintech case study on automated data disc...
Building trust in your data lake. A fintech case study on automated data disc...Building trust in your data lake. A fintech case study on automated data disc...
Building trust in your data lake. A fintech case study on automated data disc...
 
Webinar | Real-time Analytics for Healthcare: How Amara Turned Big Data into ...
Webinar | Real-time Analytics for Healthcare: How Amara Turned Big Data into ...Webinar | Real-time Analytics for Healthcare: How Amara Turned Big Data into ...
Webinar | Real-time Analytics for Healthcare: How Amara Turned Big Data into ...
 
Wrangle 2016: Seeing Behaviors as Humans Do: Uncovering Hidden Patterns in Ti...
Wrangle 2016: Seeing Behaviors as Humans Do: Uncovering Hidden Patterns in Ti...Wrangle 2016: Seeing Behaviors as Humans Do: Uncovering Hidden Patterns in Ti...
Wrangle 2016: Seeing Behaviors as Humans Do: Uncovering Hidden Patterns in Ti...
 
Popularity of Online News Article
Popularity of Online News ArticlePopularity of Online News Article
Popularity of Online News Article
 
Cloudera training secure your cloudera cluster 7.10.18
Cloudera training secure your cloudera cluster 7.10.18Cloudera training secure your cloudera cluster 7.10.18
Cloudera training secure your cloudera cluster 7.10.18
 

Similaire à Securing Search Data in the Cloud

Similaire à Securing Search Data in the Cloud (20)

CEPTES Product Deck
CEPTES Product Deck CEPTES Product Deck
CEPTES Product Deck
 
GraphTalk Helsinki - Introduction to Graphs and Neo4j
GraphTalk Helsinki - Introduction to Graphs and Neo4jGraphTalk Helsinki - Introduction to Graphs and Neo4j
GraphTalk Helsinki - Introduction to Graphs and Neo4j
 
Frank Bien Opening Keynote - Join 2016
Frank Bien Opening Keynote - Join 2016Frank Bien Opening Keynote - Join 2016
Frank Bien Opening Keynote - Join 2016
 
Frank Bien Opening Keynote - Join 2016
Frank Bien Opening Keynote - Join 2016Frank Bien Opening Keynote - Join 2016
Frank Bien Opening Keynote - Join 2016
 
Scalable Search Analytics
Scalable Search AnalyticsScalable Search Analytics
Scalable Search Analytics
 
Hadoop and Manufacturing
Hadoop and ManufacturingHadoop and Manufacturing
Hadoop and Manufacturing
 
Rethink Analytics with an Enterprise Data Hub
Rethink Analytics with an Enterprise Data HubRethink Analytics with an Enterprise Data Hub
Rethink Analytics with an Enterprise Data Hub
 
Building a data driven search application with LucidWorks SiLK
Building a data driven search application with LucidWorks SiLKBuilding a data driven search application with LucidWorks SiLK
Building a data driven search application with LucidWorks SiLK
 
Hr and performance analytics
Hr and performance analyticsHr and performance analytics
Hr and performance analytics
 
SharePointlandia 2013: SharePoint and Compliance
SharePointlandia 2013: SharePoint and ComplianceSharePointlandia 2013: SharePoint and Compliance
SharePointlandia 2013: SharePoint and Compliance
 
Unlocking New Insights with Information Discovery
Unlocking New Insights with Information DiscoveryUnlocking New Insights with Information Discovery
Unlocking New Insights with Information Discovery
 
Data Privacy & Governance in the Age of Big Data: Deploy a De-Identified Data...
Data Privacy & Governance in the Age of Big Data: Deploy a De-Identified Data...Data Privacy & Governance in the Age of Big Data: Deploy a De-Identified Data...
Data Privacy & Governance in the Age of Big Data: Deploy a De-Identified Data...
 
Building a Data Driven Culture and AI Revolution With Gregory Little | Curren...
Building a Data Driven Culture and AI Revolution With Gregory Little | Curren...Building a Data Driven Culture and AI Revolution With Gregory Little | Curren...
Building a Data Driven Culture and AI Revolution With Gregory Little | Curren...
 
Amundsen: From discovering to security data
Amundsen: From discovering to security dataAmundsen: From discovering to security data
Amundsen: From discovering to security data
 
(SEC402) Enterprise Cloud Security via DevSecOps 2.0
(SEC402) Enterprise Cloud Security via DevSecOps 2.0(SEC402) Enterprise Cloud Security via DevSecOps 2.0
(SEC402) Enterprise Cloud Security via DevSecOps 2.0
 
Developing an Effective Search Strategy for Office 365 and Hybrid Deployments
Developing an Effective Search Strategy for Office 365 and Hybrid DeploymentsDeveloping an Effective Search Strategy for Office 365 and Hybrid Deployments
Developing an Effective Search Strategy for Office 365 and Hybrid Deployments
 
Chatbots: Automated Conversational Model using Machine Learning
Chatbots: Automated Conversational Model using Machine LearningChatbots: Automated Conversational Model using Machine Learning
Chatbots: Automated Conversational Model using Machine Learning
 
Discovery, Risk, and Insight in a Metadata-Driven World Webinar
Discovery, Risk, and Insight in a Metadata-Driven World WebinarDiscovery, Risk, and Insight in a Metadata-Driven World Webinar
Discovery, Risk, and Insight in a Metadata-Driven World Webinar
 
2016 Cybersecurity Analytics State of the Union
2016 Cybersecurity Analytics State of the Union2016 Cybersecurity Analytics State of the Union
2016 Cybersecurity Analytics State of the Union
 
Student information analytics
Student information analyticsStudent information analytics
Student information analytics
 

Plus de SearchStax

Plus de SearchStax (6)

How do Solr and Azure Search compare?
How do Solr and Azure Search compare?How do Solr and Azure Search compare?
How do Solr and Azure Search compare?
 
Five Considerations When Migrating Your On-Premise Solr Infrastructure to Goo...
Five Considerations When Migrating Your On-Premise Solr Infrastructure to Goo...Five Considerations When Migrating Your On-Premise Solr Infrastructure to Goo...
Five Considerations When Migrating Your On-Premise Solr Infrastructure to Goo...
 
Customer Webinar: Scaling and Optimizing a Large e-Commerce Drupal Solution
Customer Webinar: Scaling and Optimizing a Large e-Commerce Drupal SolutionCustomer Webinar: Scaling and Optimizing a Large e-Commerce Drupal Solution
Customer Webinar: Scaling and Optimizing a Large e-Commerce Drupal Solution
 
Solr CDCR (Cross Data Center Replication) in AWS
Solr CDCR (Cross Data Center Replication) in AWS Solr CDCR (Cross Data Center Replication) in AWS
Solr CDCR (Cross Data Center Replication) in AWS
 
Future of enterprise apps is open source and cloud computing
Future of enterprise apps is open source and cloud computingFuture of enterprise apps is open source and cloud computing
Future of enterprise apps is open source and cloud computing
 
Data-Driven Approach to Search Relevance
Data-Driven Approach to Search RelevanceData-Driven Approach to Search Relevance
Data-Driven Approach to Search Relevance
 

Dernier

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 

Dernier (20)

Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 

Securing Search Data in the Cloud

  • 1. Securing Search Data in the Cloud Sameer Maggon Measured Search Harry Ochiai Hitachi Solutions New York Enterprise Cloud Meetup Jan 25, 2017
  • 2. 2 Agenda • About the Speakers • About Measured Search & Hitachi Solutions • What is Apache Solr? • Where is Apache Solr used? • How Search Data is stored • Data Security Challenge in the Cloud • Protecting Confidential Search Data • Challenges of Encrypted Search Index • Encryption Solution • Demo • Q&A © Hitachi Solutions America, Ltd. and Measured Search, Inc. 2017, All rights reserved.
  • 3. 3 About the Speakers Harry Ochiai • Senior Business Development Manager of Hitachi Solutions • Worked on networking, cyber security, and storage • Focus on cloud encryption solutions since 2013 • New Yorker Sameer Maggon • Founder / Technologist at Measured Search • Been working in Open Source Search since 2001 (Lucene/Solr/Elastic) • USC Engineering Alumni • Works and Lives in Los Angeles, CA © Hitachi Solutions America, Ltd. and Measured Search, Inc. 2017, All rights reserved.
  • 4. 4 About Hitachi Solutions Global IT Solutions Company • A Hitachi Company • Japan(HQ), North America, Europe, China, India and Southeast Asia • 12,000 Employees Leading security solution provider in Japan • Innovator and leading provider of encryption technology for over 20 years • HIBUN: 40% market share in the endpoint encryption segment in Japan • Launched new security solution Credeon globally in 2013 © Hitachi Solutions America, Ltd. and Measured Search, Inc. 2017, All rights reserved.
  • 5. 5 About Measured Search Measured Search® enables companies to elevate the experience of Search based applications faster and with more confidence. Managed Services & Support SearchStax® Platform as a Service On-Demand Expertise & Consulting © Hitachi Solutions America, Ltd. and Measured Search, Inc. 2017, All rights reserved.
  • 6. 6 by Measured SearchSearchStax® SearchStax® Solr Cloud Manager SearchStax® Pulse SearchStax® Analytics Comprehensive Solr Monitoring & Alerting with service level reporting to proactively manage your clusters. Realtime feedback & user insights to help optimize your Search Experience Easiest way to run & manage Solr in the cloud - saves time, money and reduces risk. © Hitachi Solutions America, Ltd. and Measured Search, Inc. 2017, All rights reserved.
  • 7. 7 What is Apache Solr? Solr is the popular, blazing-fast, open source enterprise search platform built on Apache Lucene™ © Hitachi Solutions America, Ltd. and Measured Search, Inc. 2017, All rights reserved.
  • 8. 8 Where is Apache Solr used? Government eCommerce Education Life Sciences Entertainment Healthcare Financial Services High Tech © Hitachi Solutions America, Ltd. and Measured Search, Inc. 2017, All rights reserved.
  • 9. 9 Where is Apache Solr used? finding tickets finding job finding restaurant/services Enterprise Search Media Search Retail Customer Search Fraud Analytics Publishing RecruitingTravelResearch Business Intelligence © Hitachi Solutions America, Ltd. and Measured Search, Inc. 2017, All rights reserved.
  • 10. 10 Search Index Search platforms maintains internal indices of terms and properties of each indexed document in plaintext. Plain Search Index Encrypted Search Index © Hitachi Solutions America, Ltd. and Measured Search, Inc. 2017, All rights reserved.
  • 11. 11 Data Security Challenges in the Cloud Solr / Search Cluster Backups Threats Managed Service Provider (MSP) Rogue EmployeeManaged Service Provider Rogue Employee Hacker Accidental Data Access © Hitachi Solutions America, Ltd. and Measured Search, Inc. 2017, All rights reserved.
  • 12. 12 Challenges of Encrypted Search Index Challenges • To search through encrypted data, data must be decrypted • Decryption slows down the process • Encryption limits usability Goals • Maintain encrypted state without sacrificing security level • Encrypt using your own key • Maintain search performance and usability • Protect against unauthorized users and rogue system administrators • Regulatory compliance Solution • Searchable Encryption technology © Hitachi Solutions America, Ltd. and Measured Search, Inc. 2017, All rights reserved.
  • 13. 13 Protecting Confidential Search Data Solr/Lucene text Key word result value Solr/Lucene text Key word result File System Encryption value Solr/Lucene text Key word result value Simple Encryption Solr/Lucene text Key word result value Searchable Encryption text Key word result value Searchable Encryption Storage Storage Storage Storage Storage Client Server App Server OS No Encryption OS Encryption Simple Encryption with Solr Plugin Client-Side Searchable Encryption Searchable Encryption with Solr Plugin Low Security High Security No Security Decryption at storage layer X Difficult to separate key Decrypt first and match X Very slow X plaintextin memory Match first and decrypt O Key separation O High Performance(1) O Semantically Secure(2) X plaintextin memory Client Client Client Client Client Decryption at client-side O Key separation O High Performance(1) O Semantically Secure(2) O no plaintexton server Solr/Lucene (1) Use of Symmetric Key (2) Probabilistic Encryption Scheme © Hitachi Solutions America, Ltd. and Measured Search, Inc. 2017, All rights reserved.
  • 14. 14 Search Encryption 101 Searchable Encryption is an encryption technology for searching data in an encrypted state. • Fully Homomorphic Encryption • Homomorphic Encryption • Functional Encryption • Hitachi Searchable Encryption Practical CKA CPA Tokenization 103 10610010-3 Hitachi Searchable Encryption Functional Encryption Homomorphic Encryption Fully Homomorphic Encryption Security Performance (Search / sec) EncryptedPlain CKA: Chosen Keyword Attack CPA: Chosen Phrase Attack © Hitachi Solutions America, Ltd. and Measured Search, Inc. 2017, All rights reserved.
  • 15. 15 Search Encryption 101 Encryption Schemes • Deterministic • Constant value • Vulnerable to statistical attacks • Probabilistic • Random value • Semantically secure Encryption Key Exchange • Symmetric • Asymmetric / PKI © Hitachi Solutions America, Ltd. and Measured Search, Inc. 2017, All rights reserved.
  • 16. 16 Solution: Searchable Encryption with Solr Plugin Hitachi Credeon Secure Full-Text Search • Searchable Encryption plugin for Apache Solr and Elasticsearch • Probabilistic Encryption Scheme • 128 bit randomization • AES 256, FIPS 140-2 • Symmetric Key • Real-time search (15%+ overhead) • Key Management System, Java KeyStore © Hitachi Solutions America, Ltd. and Measured Search, Inc. 2017, All rights reserved.
  • 17. 17 Solution: Client Side Searchable Encryption Credeon Secure Document Solution for SharePoint Online • Client-side encryption for search index and data • Searchable encryption on Solr • Search Engine and Key Management are independent of Microsoft Search Server SharePoint Server Key Management Server Search Engine SharePoint Online Client PC 1. Get a key 2. Index the file contents and encrypt index 4. Upload encrypted file 4. Upload encrypted index 3. Encrypt file © Hitachi Solutions America, Ltd. and Measured Search, Inc. 2017, All rights reserved.
  • 18. 18 Demo: Securing Solr Search in the Cloud SearchStax with Credeon © Hitachi Solutions America, Ltd. and Measured Search, Inc. 2017, All rights reserved.
  • 19. 19 Q&A © Hitachi Solutions America, Ltd. and Measured Search, Inc. 2017, All rights reserved.
  • 20. 20 Contact Info Sameer Maggon @maggon sameer@measuredsearch.com https://www.measuredsearch.com Harry Ochiai @credeon hochiai@hitachi-solutions.com https://psg.hitachi-solutions.com/credeon/overview © Hitachi Solutions America, Ltd. and Measured Search, Inc. 2017, All rights reserved.