Tutorial Security Privacy Cloud
Tutorial Security Privacy Cloud
• Part I: Introduction
• Part II: Security and Privacy Issues in Cloud Computing
• Part III: Possible Solutions
3
Part I. Introduction
4
Cloud Computing Background
• Features
– Use of internet-based services to support business process
– Rent IT-services on a utility-like basis
• Attributes
– Rapid deployment
– Low startup costs/ capital investments
– Costs based on usage or subscription
– Multi-tenant sharing of services/ resources
• Essential characteristics
– On demand self-service
– Ubiquitous network access
– Location independent resource pooling
– Rapid elasticity
– Measured service
• “Cloud computing is a compilation of existing techniques and
technologies, packaged within a new infrastructure paradigm that
offers improved scalability, elasticity, business agility, faster startup
time, reduced management costs, and just-in-time availability of
resources”
• Delivery Models
– SaaS
– PaaS
– IaaS
• Deployment Models
– Private cloud
– Community cloud
– Public cloud
– Hybrid cloud
• We propose one more Model: Management
Models (trust and tenancy issues)
– Self-managed
– 3rd party managed (e.g. public clouds and VPC)
10
From [6] Cloud Security and Privacy by Mather and
If cloud computing is so great,
why isn’t everyone doing it?
11
Companies are still afraid to use
clouds
[Chow09ccsw]
12
Causes of Problems Associated
with Cloud Computing
• Confidentiality
– Fear of loss of control over data
• Will the sensitive data stored on a cloud remain
confidential?
• Will cloud compromises leak confidential client data
– Will the cloud provider itself be honest and
won’t peek into the data?
• Integrity
– How do I know that the cloud provider is doing
the computations correctly?
– How do I ensure that the cloud provider really
stored my data without tampering with it?
From [5] www.cs.jhu.edu/~ragib/sp10/cs412
17
Taxonomy of Fear (cont.)
• Availability
– Will critical systems go down at the client, if
the provider is attacked in a Denial of Service
attack?
– What happens if cloud provider goes out of
business?
– Would cloud scale well-enough?
– Often-voiced concern
• Although cloud providers argue their downtime
compares well with cloud user’s own data centers
18
Taxonomy of Fear (cont.)
19
Taxonomy of Fear (cont.)
20
Taxonomy of Fear (cont.)
22
Threat Model
• Basic components
– Attacker modeling
• Choose what attacker to consider
– insider vs. outsider?
– single vs. collaborator?
• Attacker motivation and capabilities
– Attacker goals
– Vulnerabilities / threats
23
What is the issue?
24
Attacker Capability: Malicious Insiders
• Atclient
–Learn passwords/authentication information
–Gain control of the VMs
• Atcloud provider
–Log client communication
–Can read unencrypted data
–Can possibly peek into VMs, or make copies of VMs
–Can monitor network communication, application
patterns
– Why?
• Gain information about client data
• Gain information on client behavior
• Sell the information or use itself
25
Attacker Capability: Outside attacker
• What?
– Listen to network traffic (passive)
– Insert malicious traffic (active)
– Probe cloud structure (active)
– Launch DoS
• Goal?
– Intrusion
– Network analysis
– Man in the middle
– Cartography
From [5] www.cs.jhu.edu/~ragib/sp10/cs412
26
Challenges for the attacker
27
Part II: Security and Privacy Issues
in Cloud Computing - Big Picture
• Infrastructure Security
• Data Security and Storage
• Identity and Access Management (IAM)
• Privacy
• And more…
• Network Level
• Host Level
• Application Level
29
The Network Level
• SaaS/PaaS
– Both the PaaS and SaaS platforms abstract and
hide the host OS from end users
– Host security responsibilities are transferred to
the CSP (Cloud Service Provider)
• You do not have to worry about protecting hosts
– However, as a customer, you still own the risk
of managing information hosted in the cloud
services.
33
From [6] Cloud Security and Privacy by Mather and
Case study: Amazon's EC2
infrastructure
• “Hey, You, Get Off of My Cloud: Exploring Information Leakage
in Third-Party Compute Clouds”
– Multiple VMs of different organizations with virtual
boundaries separating each VM can run within one physical
server
– "virtual machines" still have internet protocol, or IP,
addresses, visible to anyone within the cloud.
– VMs located on the same physical server tend to have IP
addresses that are close to each other and are assigned at
the same time
– An attacker can set up lots of his own virtual machines, look
at their IP addresses, and figure out which one shares the
same physical resources as an intended target
– Once the malicious virtual machine is placed on the same
server as its target, it is possible to carefully monitor how
access to resources fluctuates and thereby potentially glean
sensitive information about the victim
34
Local Host Security
• DoS
• EDoS(Economic Denial of Sustainability)
– An attack against the billing model that
underlies the cost of providing a service with
the goal of bankrupting the service itself.
• End user security
• Who is responsible for Web application security in
the cloud?
• SaaS/PaaS/IaaS application security
• Customer-deployed application security
From [6] Cloud Security and Privacy by Mather and
Kumaraswamy
37
Data Security and Storage
• Data remanence
– Inadvertent disclosure of sensitive information is
possible
• Data security mitigation?
– Do not place any sensitive data in a public cloud
– Encrypted data is placed into the cloud?
• Provider data and its security: storage
– To the extent that quantities of data from many
companies are centralized, this collection can become
an attractive target for criminals
– Moreover, the physical security of the data center and
the trustworthiness of system administrators take on
new importance.
From [6] Cloud Security and Privacy by Mather and
Kumaraswamy 40
Why IAM?
e.g., Suppose a hacker breaks into Cloud Provider A and steals data from Company X.
• Data breaches have a cascading effect
Assume that the compromised server also contained data from Companies Y and Z.
• Full •reliance
Who investigateson a third party to protect personal
this crime?
data?• Is it the Cloud Provider, even though Company X may fear that
the provider will try to absolve itself from responsibility?
• In-depth understanding
• Is it Company of
X and, if so, does it have the responsible
right data
to see other data on that server,
including logs that may show access to the data of Companies Y and Z?
stewardship
• Organizations can transfer liability, but not
accountability
• Risk assessment and mitigation throughout the
data life cycle is critical.
• Many new risks and unknowns
– The overall complexity of privacy protection in
the cloud represents a bigger challenge.
From [6] Cloud Security and Privacy by Mather and 51
Kumaraswamy
Part III. Possible Solutions
52
Security Issues in the Cloud
54
Minimize Lack of Trust:
Policy Language
• Consumers have specific security needs but don’t
have a say-so in how they are handled
– What the heck is the provider doing for me?
– Currently consumers cannot dictate their
requirements to the provider (SLAs are one-
sided)
• Standard language to convey one’s policies and
expectations
– Agreed upon and upheld by both parties
– Standard language for representing SLAs
– Can be used in a intra-cloud environment to
realize overarching security posture
Minimize Lack of Trust:
Policy Language (Cont.)
• Create policy language with the following
characteristics:
– Machine-understandable (or at least
processable),
– Easy to combine/merge and compare
– Examples of policy statements are, “requires
isolation between VMs”, “requires geographical
isolation between VMs”, “requires physical
separation between other communities/tenants
that are in the same industry,” etc.
– Need a validation tool to check that the policy
created in the standard language correctly
reflects the policy creator’s intentions (i.e. that
the policy language is semantically equivalent
to the user’s intentions).
56
Minimize Lack of Trust: Certification
• Certification
– Some form of reputable, independent,
comparable assessment and description of
security features and assurance
– Sarbanes-Oxley, DIACAP, DISTCAP, etc (are
they sufficient for a cloud environment?)
• Risk assessment
– Performed by certified third parties
– Provides consumers with additional assurance
Minimize Loss of Control
- MONITORING
- UTILIZING DIFFERENT CLOUDS
- ACCESS CONTROL
MANAGEMENT
- IDENTITY MANAGEMENT (IDM)
58
Minimize Loss of Control:
Monitoring
• Cloud consumer needs situational awareness for
critical applications
– When underlying components fail, what is the
effect of the failure to the mission logic
– What recovery measures can be taken (by
provider and consumer)
• Requires an application-specific run-time
monitoring and management tool for the
consumer
– The cloud consumer and cloud provider have
different views of the system
– Enable both the provider and tenants to
monitor the components in the cloud that are
under their control
Minimize Loss of Control:
Monitoring (Cont.)
– Provide mechanisms that enable the provider
to act on attacks he can handle.
• infrastructure remapping (create new or
move existing fault domains)
• shutting down offending components or
targets (and assisting tenants with porting if
necessary
• Repairs
– Provide mechanisms that enable the consumer
to act on attacks that he can handle
(application-level monitoring).
• RAdAC (Risk-adaptable Access Control)
• VM porting with remote attestation of target
physical host
• Provide ability to move the user’s
application to another cloud 60
Minimize Loss of Control:
Utilize Different Clouds
• The concept of ‘Don’t put all your eggs in one basket’
– Consumer may use services from different clouds through an
intra-cloud or multi-cloud architecture
– Propose a multi-cloud or intra-cloud architecture in which
consumers
• Spread the risk
• Increase redundancy (per-task or per-application)
• Increase chance of mission completion for critical applications
– Possible issues to consider:
• Policy incompatibility (combined, what is the overarching policy?)
• Data dependency between clouds
• Differing data semantics across clouds
• Knowing when to utilize the redundancy feature (monitoring
technology)
• Is it worth it to spread your sensitive data across multiple clouds?
– Redundancy could increase risk of exposure
Minimize Loss of Control:
Access Control
• Many possible layers of access control
– E.g. access to the cloud, access to servers, access to
services, access to databases (direct and queries via
web services), access to VMs, and access to objects
within a VM
– Depending on the deployment model used, some of
these will be controlled by the provider and others by
the consumer
• Regardless of deployment model, provider needs
to manage the user authentication and access
control procedures (to the cloud)
– Federated Identity Management: access control
management burden still lies with the provider
– Requires user to place a large amount of trust on the
provider in terms of security, management, and
maintenance of access control policies. This can be
burdensome when numerous users from different
organizations with different access control policies, are
involved
Minimize Loss of Control:
Access Control (Cont.)
• Consumer-managed access control
– Consumer retains decision-making process to
retain some control, requiring less trust of the
provider (i.e. PDP is in consumer’s domain)
– Requires the client and provider to have a pre-
existing trust relationship, as well as a pre-
negotiated standard way of describing
resources, users, and access decisions
between the cloud provider and consumer. It
also needs to be able to guarantee that the
provider will uphold the consumer-side’s
access decisions.
– Should be at least as secure as the traditional
access control model.
– Facebook and Google Apps do this to some
degree, but not enough control
63
– Applicability to privacy of patient health
Minimize Loss of Control:
Access Control
1. Authn request
3. Resource request (XACML Request) + SAML assertion IDP
2. SAML Assertion
PDP
. access requests
from all client 7. Send signed and encrypted ticket
for cloud
resource
ACM
. domains) on Domain A
(XACML
policies)
User on
Amazon Cloud
1. Name
2. E-mail
3. Password
4. Billing Address 1. Name
5. Shipping 2. Billing Address
Address 3. Credit Card
1. Name 6. Credit Card
2. E-mail
3. Password
4. Billing Address
5. Shipping
Address
6. Credit Card 1. Name
2. E-mail
3. Shipping
Address
1. Name
2. E-mail
3. Shipping
Address
Minimize Loss of Control: IDM
Identity in the Cloud
User on
Amazon Cloud
1. Name
2. Billing Address
3. Credit Card
1. Name
2. E-mail
3. Password
4. Billing Address
5. Shipping
Address
6. Credit Card
Minimize Loss of Control: IDM
Present IDMs
• IDM in traditional application-centric IDM model
– Each application keeps track of identifying information of
its users.
• Existing IDM Systems
– Microsoft Windows CardSpace [W. A. Alrodhan]
– OpenID [http://openid.net]
– PRIME [S. F. Hubner]
• IDM Wallet:
– Use of AB scheme to protect PII from untrusted
hosts.
• Anonymous Identification:
– Use of Zero-knowledge proofing for
authentication of an entity without disclosing its
identifier.
Minimize Loss of Control: IDM
Components of Active Bundle
(Approach – 1)
• Identity data: Data used during authentication,
getting service, using service (i.e. SSN, Date of
Birth).
• Disclosure policy: A set of rules for choosing
Identity data from a set of identities in IDM Wallet.
• Disclosure history: Used for logging and auditing
purposes.
• Negotiation policy: This is Anonymous
Identification, based on the Zero Knowledge
Proofing.
• Virtual Machine: Code for protecting data on
untrusted hosts. It enforces the disclosure policies.
Minimize Loss of Control: IDM
Anonymous Identification (Approach –
1)
Anonymous Identification
(Shamir's approach for Credit Cards)
• IdP provides Encrypted Identity Information to the
user and SP.
• SP and User interact
• Both run IdP's public function on the certain bits of
the Encrypted data.
• Both exchange results and agree if it matches.
Minimize Loss of Control: IDM
Usage Scenario (Approach – 1)
Minimize Loss of Control: IDM
Approach - 2
Token/Pseudonym
Identity Information in clear plain text
Active Bundle
Minimize Loss of Control: IDM
Motivation-Authentication Process
using PII
• Active Bundle
• Anonymous Identification
• Computing Predicates with encrypted data
• Multi-Party Computing
• Selective Disclosure
Proposed IDM:
Active Bundle
• Active Bundles—Operations
– Self-Integrity check
E.g., Uses a hash function
– Evaporation/ Filtering
Self-destroys (a part of) AB’s sensitive data
when threatened with a disclosure
– Apoptosis
Self-destructs AB’s completely
80
Proposed IDM:
Active Bundle Scheme
– Metadata:
• Access control policies
• Data integrity checks
• Dissemination policies
• Life duration
• ID of a trust server
• E(Name)
• ID of a security server
• E(E-mail) • App-dependent information
• E(Password)
• E(Shipping Address)
• …
• E(Billing Address)
•
•
E(Credit Card) – Sensitive Data:
…
• Identity
Information
• ...
– Virtual Machine
(algorithm):
• Interprets metadata
• Checks active bundle
integrity
• Enforces access and
* E( ) - Encrypted Information dissemination control
Proposed IDM:
Anonymous Identification
• Use of Zero-knowledge proofing for user authentication
without disclosing its identifier.
User on Amazon
Cloud ZKP Interactive Protocol
User Application
Active Bundle
Active Bundle Active
Creator Bundle (AB)
Directory
Facilitator
Trust Evaluation
Active Bundle Coordinator Agent (TEA)
Predicate Request*
• E-mail
• E(Name)
• Password
• E(Billing
• E(Name)
Address)
• E(Shipping
• E(Credit Card)
Address)
• E(Billing Address)
• E(Credit Card)
Predicate
Request
• E(Name)
• E(Billing
Address)
• E(Credit Card)
Key Management
Services
Predicate Reply*
• Name
• Billing Address
• Credit Card
Key Management
Services
*Age Verified
*Credit Card Verified
Proposed IDM:
Selective Disclosure
• User Policies in the Active Bundle dictate dissemination
Selective disclosure*
• E-mail • E(E-mail)
• Password • E(Name)
• E(Name) • E(Shipping
• E(Shipping Address)
Address)
• E(Billing Address)
• E(Credit Card)
Selective disclosure*
• E-mail • E-mail
• Password • E(Name)
• E(Name) • E(Shipping
• E(Shipping Address)
Address)
• E(Billing Address)
• E(Credit Card)
Selective disclosure*
• E-mail • E(Name)
• E(Name) • E(Shipping
• E(Shipping Address)
Address)
Selective disclosure
• E-mail • Name
• E(Name) • Shipping Address
• E(Shipping
Address)
Selective disclosure
• E-mail • Name
• E(Name) • Shipping Address
• E(Shipping
Address)
User on
Amazon Cloud
1. E-mail
2. Password
1. Name
2. Billing Address
3. Credit Card
1. Name
2. E-mail
3. Password
4. Billing Address
5. Shipping
Address
6. Credit Card 1. E-mail
1. Name
2. Shipping
Address
Proposed IDM:
Characteristics and Advantages
• Ability to use Identity data on untrusted hosts
• Self Integrity Check
95
Minimize Multi-tenancy