data security and privacy in the cloudscs.iik.ntnu.no/slides/foresti-oslo2017.pdf · dipartimento...

48
Data Security and Privacy in the Cloud Sara Foresti Dipartimento di Informatica Università degli Studi di Milano [email protected] Secure Cloud Services and Storage Workshop 2017 September 10, 2017 – Oslo, Norway c SPDP Lab 1/32

Upload: others

Post on 18-Oct-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Data Security and Privacy in the Cloudscs.iik.ntnu.no/slides/foresti-oslo2017.pdf · Dipartimento di Informatica Università degli Studi di Milano sara.foresti@unimi.it Secure Cloud

Data Security and Privacy in the Cloud

Sara Foresti

Dipartimento di Informatica

Università degli Studi di [email protected]

Secure Cloud Services and Storage Workshop 2017September 10, 2017 – Oslo, Norway

c©SPDP Lab 1/32

Page 2: Data Security and Privacy in the Cloudscs.iik.ntnu.no/slides/foresti-oslo2017.pdf · Dipartimento di Informatica Università degli Studi di Milano sara.foresti@unimi.it Secure Cloud

Cloud computing

• The Cloud allows users and organizations to rely on external

providers for storing, processing, and accessing their data

+++ high configurability and economy of scale

+++ data and services are always available

+++ scalable infrastructure for applications

• Users lose control over their own data

−−− new security and privacy problems

• Need solutions to protect data and to securely process them

in the cloud

c©SPDP Lab 2/32

Page 3: Data Security and Privacy in the Cloudscs.iik.ntnu.no/slides/foresti-oslo2017.pdf · Dipartimento di Informatica Università degli Studi di Milano sara.foresti@unimi.it Secure Cloud

Cloud computing: Today

Cloud Service Providers (CSPs) apply security measures in the

services they offer but these measures protect only the perimeter and

storage against outsiders

data owner cloud data owner cloud

functionality implies full trust in the CSP that has full access to the data

protection but limited functionality since the CSP cannot access data

c©SPDP Lab 3/32

Page 4: Data Security and Privacy in the Cloudscs.iik.ntnu.no/slides/foresti-oslo2017.pdf · Dipartimento di Informatica Università degli Studi di Milano sara.foresti@unimi.it Secure Cloud

Cloud computing: Today

Cloud Service Providers (CSPs) apply security measures in the

services they offer but these measures protect only the perimeter and

storage against outsiders

functionality

data owner cloud data owner cloud

• functionality

implies full trust in the CSP that has full access to the data (e.g., Google

protection but limited functionality since the CSP cannot access data

c©SPDP Lab 3/32

Page 5: Data Security and Privacy in the Cloudscs.iik.ntnu.no/slides/foresti-oslo2017.pdf · Dipartimento di Informatica Università degli Studi di Milano sara.foresti@unimi.it Secure Cloud

Cloud computing: Today

Cloud Service Providers (CSPs) apply security measures in the

services they offer but these measures protect only the perimeter and

storage against outsiders

functionality but no protection(key is with the CSP)

data owner cloud data owner cloud

• functionality implies full trust in the CSP that has full access to the

data (e.g., Google Cloud Storage, iCloud)

protection but limited functionality since the CSP cannot access data

c©SPDP Lab 3/32

Page 6: Data Security and Privacy in the Cloudscs.iik.ntnu.no/slides/foresti-oslo2017.pdf · Dipartimento di Informatica Università degli Studi di Milano sara.foresti@unimi.it Secure Cloud

Cloud computing: Today

Cloud Service Providers (CSPs) apply security measures in the

services they offer but these measures protect only the perimeter and

storage against outsiders

functionality but no protection(key is with the CSP)

protection

data owner cloud data owner cloud

• functionality implies full trust in the CSP that has full access to the

data (e.g., Google Cloud Storage, iCloud)

• protection

but limited functionality since the CSP cannot access data (e.g., Boxcr

c©SPDP Lab 3/32

Page 7: Data Security and Privacy in the Cloudscs.iik.ntnu.no/slides/foresti-oslo2017.pdf · Dipartimento di Informatica Università degli Studi di Milano sara.foresti@unimi.it Secure Cloud

Cloud computing: Today

Cloud Service Providers (CSPs) apply security measures in the

services they offer but these measures protect only the perimeter and

storage against outsiders

functionality but no protection(key is with the CSP)

protection but limited functionality(you cannot access data as you like)

data owner cloud data owner cloud

• functionality implies full trust in the CSP that has full access to the

data (e.g., Google Cloud Storage, iCloud)

• protection but limited functionality since the CSP cannot access

data (e.g., Boxcryptor, SpiderOak)

c©SPDP Lab 3/32

Page 8: Data Security and Privacy in the Cloudscs.iik.ntnu.no/slides/foresti-oslo2017.pdf · Dipartimento di Informatica Università degli Studi di Milano sara.foresti@unimi.it Secure Cloud

Cloud computing: ESCUDO-CLOUD’s vision

Solutions that provide protection guarantees giving the data owners

both: full control over their data and cloud functionality over them

data owner cloud

client-side trust boundary: only the behavior of the client should be considered

=⇒ techniques and implementations supporting direct processing

of encrypted data in the cloud

H2020 project “Enforceable Security in the Cloud to Uphold Data Ownership” (ESCUDO-CLOUD).

c©SPDP Lab 4/32

Page 9: Data Security and Privacy in the Cloudscs.iik.ntnu.no/slides/foresti-oslo2017.pdf · Dipartimento di Informatica Università degli Studi di Milano sara.foresti@unimi.it Secure Cloud

Cloud computing: ESCUDO-CLOUD’s vision

Solutions that provide protection guarantees giving the data owners

both: full control over their data and cloud functionality over them

• client-side trust boundary: only the behavior of the client should

be considered trusted

=⇒ techniques and implementations supporting direct processing

of encrypted data in the cloud

H2020 project “Enforceable Security in the Cloud to Uphold Data Ownership” (ESCUDO-CLOUD).

c©SPDP Lab 4/32

Page 10: Data Security and Privacy in the Cloudscs.iik.ntnu.no/slides/foresti-oslo2017.pdf · Dipartimento di Informatica Università degli Studi di Milano sara.foresti@unimi.it Secure Cloud

Some challenges in data protection

• Protection of and fine-grained access to outsourced data

◦ confidentiality (and integrity) of data at rest

◦ fine-grained retrieval and query execution

• Selective information sharing

◦ access control on resources in the cloud

• Confidentiality of data access

◦ privacy of users’ actions (access and pattern confidentiality)

• Integrity

◦ integrity of stored data and query results

P. Samarati, S. De Capitani di Vimercati, “Cloud Security: Issues and Concerns,” in Encyclopedia on Cloud Computing,

S. Murugesan, I. Bojanova (eds.), Wiley, 2016.

c©SPDP Lab 5/32

Page 11: Data Security and Privacy in the Cloudscs.iik.ntnu.no/slides/foresti-oslo2017.pdf · Dipartimento di Informatica Università degli Studi di Milano sara.foresti@unimi.it Secure Cloud

Some challenges in data protection

• Protection of and fine-grained access to outsourced data

◦ confidentiality (and integrity) of data at rest

◦ fine-grained retrieval and query execution

• Selective information sharing

◦ access control on resources in the cloud

• Confidentiality of data access

◦ privacy of users’ actions (access and pattern confidentiality)

• Integrity

◦ integrity of stored data and query results

P. Samarati, S. De Capitani di Vimercati, “Cloud Security: Issues and Concerns,” in Encyclopedia on Cloud Computing,

S. Murugesan, I. Bojanova (eds.), Wiley, 2016.

c©SPDP Lab 5/32

Page 12: Data Security and Privacy in the Cloudscs.iik.ntnu.no/slides/foresti-oslo2017.pdf · Dipartimento di Informatica Università degli Studi di Milano sara.foresti@unimi.it Secure Cloud

Selective Information Sharing

S. De Capitani di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, P. Samarati, “Encryption Policies for Regulating Access to

Outsourced Data,” in ACM Transactions on Database Systems (TODS), vol. 35, n. 2, April 2010, pp. 12:1-12:46.

Page 13: Data Security and Privacy in the Cloudscs.iik.ntnu.no/slides/foresti-oslo2017.pdf · Dipartimento di Informatica Università degli Studi di Milano sara.foresti@unimi.it Secure Cloud

Selective information sharing

• Different users might need to enjoy different views on the

outsourced data

• Enforcement of the access control policy requires the data owner

to mediate access requests

=⇒ impractical (if not inapplicable)

• Authorization enforcement may not be delegated to the provider

=⇒ data owner should remain in control

c©SPDP Lab 7/32

Page 14: Data Security and Privacy in the Cloudscs.iik.ntnu.no/slides/foresti-oslo2017.pdf · Dipartimento di Informatica Università degli Studi di Milano sara.foresti@unimi.it Secure Cloud

Selective information sharing: Approaches – 1

• Attribute-based encryption (ABE): allow derivation of a key only by

users who hold certain attributes (based on asymmetric

cryptography)

c©SPDP Lab 8/32

Page 15: Data Security and Privacy in the Cloudscs.iik.ntnu.no/slides/foresti-oslo2017.pdf · Dipartimento di Informatica Università degli Studi di Milano sara.foresti@unimi.it Secure Cloud

Selective information sharing: Approaches – 2

• Selective (policy-based) encryption: the authorization policy

defined by the data owner is translated into an equivalent

encryption policy

◦ users will be able to access only the resources for which they havethe key

c©SPDP Lab 9/32

Page 16: Data Security and Privacy in the Cloudscs.iik.ntnu.no/slides/foresti-oslo2017.pdf · Dipartimento di Informatica Università degli Studi di Milano sara.foresti@unimi.it Secure Cloud

Selective encryption – 1

• Selective encryption: different keys are used to encrypt different

data and users can know (or can derive) the keys of the data they

can access

◦ data themselves need to directly enforce access control

◦ authorization to access a resource translated intoknowledge of the key with which the resource is encrypted

r1 r2 r3 r4 r5

A 1 1 0 0 0

B 1 1 1 0 0C 1 1 1 0 0

D 0 1 1 1 1

E 0 0 0 1 1

A knows the keys of r1, r2

B knows the keys of r1, r2, r3

C knows the keys of r1, r2, r3

D knows the keys of r2, r3, r4, r5

E knows the keys of r3, r5

c©SPDP Lab 10/32

Page 17: Data Security and Privacy in the Cloudscs.iik.ntnu.no/slides/foresti-oslo2017.pdf · Dipartimento di Informatica Università degli Studi di Milano sara.foresti@unimi.it Secure Cloud

Selective encryption – 2

Requirements:

• one version of data (no replication)

• one key per user

Basic idea:

• key derivation method: via public tokens a user can derive all keys

of the resources she is allowed to access

r1 r2 r3 r4 r5

A 1 1 0 0 0B 1 1 1 0 0

C 1 1 1 0 0

D 0 1 1 1 1E 0 0 0 1 1

A kA k1 r1

B kB k2 r2

C kC k3 r3

D kD k4 r4

E kE k5 r5

c©SPDP Lab 11/32

Page 18: Data Security and Privacy in the Cloudscs.iik.ntnu.no/slides/foresti-oslo2017.pdf · Dipartimento di Informatica Università degli Studi di Milano sara.foresti@unimi.it Secure Cloud

Selective encryption – 3

Exploit ACLs to minimize number of keys and tokens

• Keys:

◦ one key per user

◦ an additional key for each non-singleton ACL

• Resources are encrypted with the key of their ACLs

• Tokens allow users to derive the keys of the ACLs to which they

belong

A v1 [A] v7 [ABC] r1

B v2 [B] v10 [BC]

C v3 [C] v9 [ABCD] r2

D v4 [D] v8 [BCD] r3

E v5 [E] v6 [DE] r4 , r5

c©SPDP Lab 12/32

Page 19: Data Security and Privacy in the Cloudscs.iik.ntnu.no/slides/foresti-oslo2017.pdf · Dipartimento di Informatica Università degli Studi di Milano sara.foresti@unimi.it Secure Cloud

Policy updates

• When authorizations dynamically change, the data owner needs

to:

◦ download the resource from the provider

◦ create a new key for the resource

◦ decrypt the resource with the old key

◦ re-encrypt the resource with the new key

◦ upload the resource to the provider and communicate the public

catalog updates

=⇒ inefficient

• Possible solution: over-encryption

c©SPDP Lab 13/32

Page 20: Data Security and Privacy in the Cloudscs.iik.ntnu.no/slides/foresti-oslo2017.pdf · Dipartimento di Informatica Università degli Studi di Milano sara.foresti@unimi.it Secure Cloud

Over-encryption – 1

• Resources are encrypted twice

◦ by the owner, with a key shared with the users and unknown to theprovider (Base Encryption Layer - BEL level)

◦ by the provider, with a key shared with authorized users

(Surface Encryption Layer - SEL level)

• To access a resource a user must know both the corresponding

BEL and SEL keys

• Grant and revoke operations may require

◦ the addition of new tokens at the BEL level

◦ the re-encryption of resources at the SEL level to guarantee theenforcement of policy updates

c©SPDP Lab 14/32

Page 21: Data Security and Privacy in the Cloudscs.iik.ntnu.no/slides/foresti-oslo2017.pdf · Dipartimento di Informatica Università degli Studi di Milano sara.foresti@unimi.it Secure Cloud

Over-encryption – 2

Provider’s view User’s view

open locked sel_locked bel_locked

• Each layer is depicted as a fence

◦ discontinuous, if the key is known

◦ continuous, if the key is not known (protection cannot be passed)

c©SPDP Lab 15/32

Page 22: Data Security and Privacy in the Cloudscs.iik.ntnu.no/slides/foresti-oslo2017.pdf · Dipartimento di Informatica Università degli Studi di Milano sara.foresti@unimi.it Secure Cloud

Over-encryption – 3

• Revoke

to protect resources for which the revokee has the BEL key

EXAMPLE

r3 is encrypted with a key known to B, C, D at BEL

r3 is not encrypted at SEL

revoke B access to r3:

over-encrypt r3, using a key at SEL known to C, D only

user B view

c©SPDP Lab 16/32

Page 23: Data Security and Privacy in the Cloudscs.iik.ntnu.no/slides/foresti-oslo2017.pdf · Dipartimento di Informatica Università degli Studi di Milano sara.foresti@unimi.it Secure Cloud

Over-encryption – 3

• Revoke

to protect resources for which the revokee has the BEL key

EXAMPLE

r3 is encrypted with a key known to B, C, D at BEL

r3 is not encrypted at SEL

revoke B access to r3:

◦ over-encrypt r3, using a key at SEL known to C, D only

user B view

c©SPDP Lab 16/32

Page 24: Data Security and Privacy in the Cloudscs.iik.ntnu.no/slides/foresti-oslo2017.pdf · Dipartimento di Informatica Università degli Studi di Milano sara.foresti@unimi.it Secure Cloud

Over-encryption – 4

• Grant

if a BEL key protects multiple resources and access is to be

granted only to a subset of them, there is the need to protect at

SEL level the resources on which access is not being granted

EXAMPLE

r4, r5 are encrypted with the same key known to D, E at BEL

r4, r5 are not encrypted at SEL

grant C access to r4

add a token at BEL enabling C to derive the key of r4

over-encrypt r5, using a key at SEL known to D, E only

user C viewc©SPDP Lab 17/32

Page 25: Data Security and Privacy in the Cloudscs.iik.ntnu.no/slides/foresti-oslo2017.pdf · Dipartimento di Informatica Università degli Studi di Milano sara.foresti@unimi.it Secure Cloud

Over-encryption – 4

• Grant

if a BEL key protects multiple resources and access is to be

granted only to a subset of them, there is the need to protect at

SEL level the resources on which access is not being granted

EXAMPLE

r4, r5 are encrypted with the same key known to D, E at BEL

r4, r5 are not encrypted at SEL

grant C access to r4

◦ add a token at BEL enabling C to derive the key of r4

over-encrypt r5, using a key at SEL known to D, E only

user C viewc©SPDP Lab 17/32

Page 26: Data Security and Privacy in the Cloudscs.iik.ntnu.no/slides/foresti-oslo2017.pdf · Dipartimento di Informatica Università degli Studi di Milano sara.foresti@unimi.it Secure Cloud

Over-encryption – 4

• Grant

if a BEL key protects multiple resources and access is to be

granted only to a subset of them, there is the need to protect at

SEL level the resources on which access is not being granted

EXAMPLE

r4, r5 are encrypted with the same key known to D, E at BEL

r4, r5 are not encrypted at SEL

grant C access to r4

◦ add a token at BEL enabling C to derive the key of r4

◦ over-encrypt r5, using a key at SEL known to D, E only

user C viewc©SPDP Lab 17/32

Page 27: Data Security and Privacy in the Cloudscs.iik.ntnu.no/slides/foresti-oslo2017.pdf · Dipartimento di Informatica Università degli Studi di Milano sara.foresti@unimi.it Secure Cloud

Mix&Slice for Policy Revocation

E. Bacis, S. De Capitani di Vimercati, S. Foresti, S. Paraboschi, M. Rosa, P. Samarati, “Mix&Slice: Efficient Access Revocation

in the Cloud,” in Proc. of the 23rd ACM Conference on Computer and Communications Security (CCS 2016), Vienna, Austria,

October 2016.

c©SPDP Lab 18/32

Page 28: Data Security and Privacy in the Cloudscs.iik.ntnu.no/slides/foresti-oslo2017.pdf · Dipartimento di Informatica Università degli Studi di Milano sara.foresti@unimi.it Secure Cloud

Mix&Slice

• Over-encryption requires support by the server (i.e., the server

implements more than simple get/put methods)

• Alternative solution to enforce revoke operations: Mix&Slice

• Use different rounds of encryption to provide complete mixing of

the resource

=⇒ unavailability of a small portion of the encrypted resource prevents

its (even partial) reconstruction

• Slice the resource into fragments and, every time a user is revoked

access to the resource, re-encrypt a randomly chosen fragment

=⇒ lack of a fragment prevents resource decryption

c©SPDP Lab 19/32

Page 29: Data Security and Privacy in the Cloudscs.iik.ntnu.no/slides/foresti-oslo2017.pdf · Dipartimento di Informatica Università degli Studi di Milano sara.foresti@unimi.it Secure Cloud

Resource organization

• Block: sequence of bits input to a block cipher

Block: AES uses block of 128 bits

Mini-block: sequence of bits in a block

Mini-block: it is our atomic unit of protection

Mini-block: mini-blocks of 32 bits imply a cost of

Mini-block: 232 for brute-force attacks

Macro-block: sequence of blocks

Macro-block: mixing operates at the level of macro-block

Macro-block: a macro-block of 1KB includes 8 blocks

c©SPDP Lab 20/32

Page 30: Data Security and Privacy in the Cloudscs.iik.ntnu.no/slides/foresti-oslo2017.pdf · Dipartimento di Informatica Università degli Studi di Milano sara.foresti@unimi.it Secure Cloud

Resource organization

• Block: sequence of bits input to a block cipher

Block: AES uses block of 128 bits

• Mini-block: sequence of bits in a block

Mini-block: it is our atomic unit of protection

Mini-block: mini-blocks of 32 bits imply a cost of

Mini-block: 232 for brute-force attacks

Macro-block: sequence of blocks

Macro-block: mixing operates at the level of macro-block

Macro-block: a macro-block of 1KB includes 8 blocks

c©SPDP Lab 20/32

Page 31: Data Security and Privacy in the Cloudscs.iik.ntnu.no/slides/foresti-oslo2017.pdf · Dipartimento di Informatica Università degli Studi di Milano sara.foresti@unimi.it Secure Cloud

Resource organization

• Block: sequence of bits input to a block cipher

Block: AES uses block of 128 bits

• Mini-block: sequence of bits in a block

Mini-block: it is our atomic unit of protection

Mini-block: mini-blocks of 32 bits imply a cost of

Mini-block: 232 for brute-force attacks

• Macro-block: sequence of blocks

Macro-block: mixing operates at the level of macro-block

Macro-block: a macro-block of 1KB includes 8 blocks

c©SPDP Lab 20/32

Page 32: Data Security and Privacy in the Cloudscs.iik.ntnu.no/slides/foresti-oslo2017.pdf · Dipartimento di Informatica Università degli Studi di Milano sara.foresti@unimi.it Secure Cloud

Mixing – 1

• When encryption is applied to a block, all the mini-blocks are

mixed

+++ absence of a mini-block in a block from the result prevents

reconstruction of the block

−−− does not prevent the reconstruction of other blocks in the resource

c©SPDP Lab 21/32

Page 33: Data Security and Privacy in the Cloudscs.iik.ntnu.no/slides/foresti-oslo2017.pdf · Dipartimento di Informatica Università degli Studi di Milano sara.foresti@unimi.it Secure Cloud

Mixing – 2

• Extend mixing to a macro-block

◦ iteratively apply block encryption

◦ at iteration i, each block has a mini-block for each encrypted block

obtained at iteration i− 1 (at distance 2i)

◦ x rounds mix 4x mini-blocks

E

E

E

E

E

E

E

E

0 0 0 0[0] [1] [2] [3]

0 0 0 0[4] [5] [6] [7]

0 0 0 0[8] [9] [10] [11]

0 0 0 0[12] [13] [14] [15]

1 1 1 1[8] [9] [10] [11]

1 1 1 1[4] [5] [6] [7]

1 1 1 1[0] [1] [2] [3]

1 1 1 1[12] [13] [14] [15]

2 2 2 2[0] [1] [2] [3]

2 2 2 2[4] [5] [6] [7]

2 2 2 2[8] [9] [10] [11] [12] [13] [14] [15]

2 2 22

c©SPDP Lab 22/32

Page 34: Data Security and Privacy in the Cloudscs.iik.ntnu.no/slides/foresti-oslo2017.pdf · Dipartimento di Informatica Università degli Studi di Milano sara.foresti@unimi.it Secure Cloud

Slicing – 1

• To be mixed, large resources require large macro-blocks

−−− many rounds of encryption

−−− considerable computation and data transfer overhead

• Large resources are split in different macro-blocks for encryption

• Absence of a mini-block for each macro-block prevents the (even

partial) reconstruction of the resource

c©SPDP Lab 23/32

Page 35: Data Security and Privacy in the Cloudscs.iik.ntnu.no/slides/foresti-oslo2017.pdf · Dipartimento di Informatica Università degli Studi di Milano sara.foresti@unimi.it Secure Cloud

Slicing – 2

• Slice resources in fragments having a mini-block for each

macro-block (the ones in the same position)

◦ absence of a fragment prevents reconstruction of the resource

c©SPDP Lab 24/32

Page 36: Data Security and Privacy in the Cloudscs.iik.ntnu.no/slides/foresti-oslo2017.pdf · Dipartimento di Informatica Università degli Studi di Milano sara.foresti@unimi.it Secure Cloud

Revoke

To revoke user u access to a resource r

1. randomly select a fragment Fi of r and download it

2. decrypt Fi

3. generate a new key kl that u does not know and cannot derive

4. re-encrypt Fi with the new key kl

5. upload the encrypted fragment

fragment

macroblock

F2

0F5

0F7

0F8

0F1

0F3

0F6

0F9

0F11

0F12

0F14

0F15

0F0

0F13

0F4

0F10

0

c©SPDP Lab 25/32

Page 37: Data Security and Privacy in the Cloudscs.iik.ntnu.no/slides/foresti-oslo2017.pdf · Dipartimento di Informatica Università degli Studi di Milano sara.foresti@unimi.it Secure Cloud

Revoke

To revoke user u access to a resource r

1. randomly select a fragment Fi of r and download it

2. decrypt Fi

3. generate a new key kl that u does not know and cannot derive

4. re-encrypt Fi with the new key kl

5. upload the encrypted fragment

key

fragment

macroblock

k 0

k 1

F10

1

F2

0F5

0F7

0F8

0F1

0F3

0F6

0F9

0F11

0F12

0F14

0F15

0F0

0F13

0F4

0

c©SPDP Lab 25/32

Page 38: Data Security and Privacy in the Cloudscs.iik.ntnu.no/slides/foresti-oslo2017.pdf · Dipartimento di Informatica Università degli Studi di Milano sara.foresti@unimi.it Secure Cloud

Revoke

To revoke user u access to a resource r

1. randomly select a fragment Fi of r and download it

2. decrypt Fi

3. generate a new key kl that u does not know and cannot derive

4. re-encrypt Fi with the new key kl

5. upload the encrypted fragment

key

fragment

macroblock

k 0

k 1

k 2

F4

2

F10

1

F2

0F5

0F7

0F8

0F1

0F3

0F6

0F9

0F11

0F12

0F14

0F15

0F0

0F13

0

c©SPDP Lab 25/32

Page 39: Data Security and Privacy in the Cloudscs.iik.ntnu.no/slides/foresti-oslo2017.pdf · Dipartimento di Informatica Università degli Studi di Milano sara.foresti@unimi.it Secure Cloud

Revoke

To revoke user u access to a resource r

1. randomly select a fragment Fi of r and download it

2. decrypt Fi

3. generate a new key kl that u does not know and cannot derive

4. re-encrypt Fi with the new key kl

5. upload the encrypted fragment

key

fragment

macroblock

k 0

k 1

k 2

k 3

F4

2

F10

3

F2

0F5

0F7

0F8

0F1

0F3

0F6

0F9

0F11

0F12

0F14

0F15

0F0

0F13

0

c©SPDP Lab 25/32

Page 40: Data Security and Privacy in the Cloudscs.iik.ntnu.no/slides/foresti-oslo2017.pdf · Dipartimento di Informatica Università degli Studi di Milano sara.foresti@unimi.it Secure Cloud

Effectiveness of the approach

• A revoked user does not know the encryption key of at least one

fragment

◦ necessary a brute force attack to reconstruct the fragment (and the

resource)

◦ 2msize attempts, with msize the number of bits in a mini-block

• A user can locally store floc of the f fragments of a resource

• Probability to be able to reconstruct the resource after fmiss

fragments have been re-encrypted: P = (floc/f )fmiss

◦ proportional to the number of locally stored fragments

◦ decreases exponentially with the number of policy updates

c©SPDP Lab 26/32

Page 41: Data Security and Privacy in the Cloudscs.iik.ntnu.no/slides/foresti-oslo2017.pdf · Dipartimento di Informatica Università degli Studi di Milano sara.foresti@unimi.it Secure Cloud

Applying Selective Encryption and

Over-encryption in OpenStack Swift

E. Bacis, S. De Capitani di Vimercati, S. Foresti, S. Paraboschi, M. Rosa, P. Samarati, “Access Control Management for

Secure Cloud Storage,” in Proc. of SecureComm 2016, Guangzhou, China, October 10-12, 2016.

Page 42: Data Security and Privacy in the Cloudscs.iik.ntnu.no/slides/foresti-oslo2017.pdf · Dipartimento di Informatica Università degli Studi di Milano sara.foresti@unimi.it Secure Cloud

Policy-based encryption in OpenStack Swift – 1

• Swift module: an object storage service allowing users to store

and access data in the form of objects

• Swift enforces access control associating an Access Control List

(ACL) with each container

• Policy-based encryption:

◦ associates a DEK (Data Encryption Key) with each container, usedto encrypt objects in the container

◦ associates a MEK (Master Encryption Key) and an asymmetricencryption key pair with each user

◦ stores a KEK (Key Encryption Key) for each user authorized for a

container, enabling her to derive the container DEK from her privateor master key

c©SPDP Lab 28/32

Page 43: Data Security and Privacy in the Cloudscs.iik.ntnu.no/slides/foresti-oslo2017.pdf · Dipartimento di Informatica Università degli Studi di Milano sara.foresti@unimi.it Secure Cloud

Policy-based encryption in OpenStack Swift – 2

Alice generates a container X1 and grants Beth and Carla access to it

c©SPDP Lab 29/32

Page 44: Data Security and Privacy in the Cloudscs.iik.ntnu.no/slides/foresti-oslo2017.pdf · Dipartimento di Informatica Università degli Studi di Milano sara.foresti@unimi.it Secure Cloud

Policy changes: Grant

User u grants to user uj access to a container C

• User uj is added to the ACL of container C

• User u computes a new KEK for uj, which allows uj to derive the

DEK of container C

Alice grants to David access to container X1

c©SPDP Lab 30/32

Page 45: Data Security and Privacy in the Cloudscs.iik.ntnu.no/slides/foresti-oslo2017.pdf · Dipartimento di Informatica Università degli Studi di Milano sara.foresti@unimi.it Secure Cloud

Policy changes: Grant

User u grants to user uj access to a container C

• User uj is added to the ACL of container C

• User u computes a new KEK for uj, which allows uj to derive the

DEK of container C

Alice grants to David access to container X1

c©SPDP Lab 30/32

Page 46: Data Security and Privacy in the Cloudscs.iik.ntnu.no/slides/foresti-oslo2017.pdf · Dipartimento di Informatica Università degli Studi di Milano sara.foresti@unimi.it Secure Cloud

Policy changes: Revoke with Over-encryption

User u revokes access to container C from user uj

• User u removes uj from the ACL of container C

• User u asks the storing server to over-encrypt the objects in

container C with a SEL key that only non-revoked users can derive

Alice revokes from Carla access to container X1

c©SPDP Lab 31/32

Page 47: Data Security and Privacy in the Cloudscs.iik.ntnu.no/slides/foresti-oslo2017.pdf · Dipartimento di Informatica Università degli Studi di Milano sara.foresti@unimi.it Secure Cloud

Policy changes: Revoke with Over-encryption

User u revokes access to container C from user uj

• User u removes uj from the ACL of container C

• User u asks the storing server to over-encrypt the objects in

container C with a SEL key that only non-revoked users can derive

Alice revokes from Carla access to container X1

c©SPDP Lab 31/32

Page 48: Data Security and Privacy in the Cloudscs.iik.ntnu.no/slides/foresti-oslo2017.pdf · Dipartimento di Informatica Università degli Studi di Milano sara.foresti@unimi.it Secure Cloud

Conclusions and future directions

Solutions based on policy-based encryption

• enable users to regulate access to their resources

• guarantee that resources self-enforce access restrictions

• support efficient policy updates through over-encryption and

mix&slice approaches

• can be integrated with current cloud technology

Open issues include:

• support for write authorizations

• combine with techniques for efficient query evaluation

• address collusion

• . . .

c©SPDP Lab 32/32