jyh-haw yeh dept. of computer science boise state university

14
Jyh-haw Yeh Dept. of Computer Science Boise State University

Upload: elewa

Post on 19-Jan-2016

35 views

Category:

Documents


3 download

DESCRIPTION

A PASS Scheme in Clouding Computing - Protecting Data Privacy by Authentication and Secret Sharing. Jyh-haw Yeh Dept. of Computer Science Boise State University. Cloud Computing Introduction. Cloud provides services – software,, platform, Infrastructure. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Jyh-haw Yeh Dept. of Computer Science Boise State University

Jyh-haw YehDept. of Computer Science

Boise State University

Page 2: Jyh-haw Yeh Dept. of Computer Science Boise State University

Cloud provides services – software,, platform, Infrastructure.

Clients are charged by per-use basis. Capital Expenditure (CapExp) ->

Operational Expenditure (OpExp) Multi-tenancy: better resource utilization Reliability: redundant sites Security: better protection from outside

attacks. Security: big ? from malicious cloud

employees.

Page 3: Jyh-haw Yeh Dept. of Computer Science Boise State University

Protecting clients’ data privacy from cloud employee.

Perfect solution: fully homomophic encryption algorithm (FHEA). No practical algorithm available.

Without FHEA, 100% data privacy may not be possible.

Page 4: Jyh-haw Yeh Dept. of Computer Science Boise State University

Protect data Privacy by Authentication and Secret Sharing (PASS).

Objective: minimize the risk of leaking private data.

Approach: ◦ Encrypt data by a key shared with the client.◦ Do not store the key anywhere in the cloud.◦ Use secret sharing to authenticate users and

recover the shared key.

Page 5: Jyh-haw Yeh Dept. of Computer Science Boise State University

5 security components:◦ Public key cryptosystem (PKC): published by cloud.◦ Key agreement (KA): agree on a shared key and

two secret shares at registration.◦ Key management (KM): keep a profile for each

client.◦ Authentication(AUTH):

client’s counter <-> server’s counter; Computed hashed key from client’s request <->

stored hashed key◦ Access control (ACL): second defense for a time

frame that the secret key is in use for processing a query.

Page 6: Jyh-haw Yeh Dept. of Computer Science Boise State University

Design guideline:◦ Ensure secret isolation (secret compartment).◦ Security with a higher priority than efficiency.◦ Choose a design choice that would benefit

multiple security components.

Page 7: Jyh-haw Yeh Dept. of Computer Science Boise State University

PASS chooses ECC over RSA. ECC: a curve is chosen over

a prime p. A base point G with an order n. Cloud provider publishes the ECC domain

parameter <p, a, b, G, n>. Each cloud entity (server, clients) sets up

his own public-private key pair.◦ Server: public , private , where ◦ Client i: public , private , where

baxxy 32

sD sd GdD ss iD id GdD ii

Page 8: Jyh-haw Yeh Dept. of Computer Science Boise State University

Each client i and the cloud server s agree on a data encryption key and two secret shares (known to the client) and (known to the server).

The secret shares are used to recover the encryption key.

ik

iSS iCS

Page 9: Jyh-haw Yeh Dept. of Computer Science Boise State University

Encryption key agreement:◦ Client i chooses a random number and then

sends to the server s◦ Server s chooses a random number and

then sends to the client i ◦ Both compute a point ◦ Agree on an encryption key : the x-

coordinate of

irGrR ii

srGrR ss

issii RrRrQ

ikiQ

Page 10: Jyh-haw Yeh Dept. of Computer Science Boise State University

Secret shares agreement:◦ Both computes a point and let be the

x-coordinate of the point ◦ Both construct a same poly◦ ◦ ◦ With both secret shares, the poly and then the

secret key can be recovered

ii DQ

axkxf i )(

a

))(,( 11 xfxSSi ))(,( 22 xfxCSi

Page 11: Jyh-haw Yeh Dept. of Computer Science Boise State University

The cloud keeps a profile for each client i

Hashed key and server request counter for authentication

Security label for access control

Client ID

Security Label

)( ikh iSS iD iSRC

iSRC

Page 12: Jyh-haw Yeh Dept. of Computer Science Boise State University

Client keeps his own request counter Client Server: Server decrypt and get both and Client authentication succeeds if both

◦ the stored hashed key matches the hashed key derived from secret shares

◦ The server and client request counters are matched

iCRC

)||( iiD CSCRCENCs

iCRC iCS

Page 13: Jyh-haw Yeh Dept. of Computer Science Boise State University

Security label: (security level, {categories}) Security level: secret, non-secret Each client i is a category All query servers/processes are in category

“query-system” {all } Security label to client i’s profile: (secret, {

})

iC

iC

iC

Page 14: Jyh-haw Yeh Dept. of Computer Science Boise State University

Step1 - 4 for initial client registration: key agreement and data encryption

Step 5-12 for a query processing Diagram in the following link shows these

steps. http://cs.boisestate.edu/~jhyeh/presentatio

n/pass_diagram.pdf