SlideShare uma empresa Scribd logo
1 de 40
Data Security Essentials 
for Cloud Computing 
Anirban Mukherjee 
amukherjee@verisign.com 
Java One 2013 
JavaOne 2013 
08-May-2013 
Manish Maheshwari 
mmaheshwari@verisign.com
Speakers 
Manish 
Software Architect, Verisign 
Anirban 
Software Architect, Verisign 
Verisign Public 2
Agenda 
• Data Security Considerations for the Cloud 
• Basic Cryptographic Concepts and Applications 
• 1-way hashes and digests 
• Secure Credential Storage 
• Symmetric Key Cryptography 
• Data Confidentiality – in storage and in transit 
• Asymmetric Key Cryptography 
• Authentication and Secure Communications 
• Recent Trends in Cloud Security 
• HSMs for Safe Key Storage 
• Encryption Gateways into the Cloud 
Verisign Public 3
Data Security Considerations 
for the Cloud 
Verisign Public 4
Cloud Data Security: Context 
• Data Security is crucial for Enterprises 
• Data Protection is vital for Reputation 
• Concerns on Data Security are a deterrent to broader 
adoption of Cloud Computing 
• Data moves out of Enterprise boundaries 
• Trust on Cloud providers 
• Shared infrastructure 
• Yet benefits of Cloud Computing are compelling 
• Need for comprehensive and non-intrusive data security 
Verisign Public 5
Top Cloud Data Security Issues: Gartner 
• Breach notification and data residency 
• Data management at rest 
• Data protection in motion 
• Encryption key management 
• Access controls 
• Long-term resiliency of the encryption system 
Verisign Public 6
Cloud Data Security: Who is responsible ? 
“Encryption of sensitive data is generally a good security practice, 
and AWS encourages users to encrypt their sensitive data before it 
is uploaded to Amazon S3.” 
– Amazon Web Services: Overview of Security Processes 
• Who is responsible for the overall security ? 
• Different levels of providers 
• Shared infrastructure can make extent of breach higher 
• APIs allow many admin functions to be carried out 
• Malicious entities can look for weaknesses in the API 
• Can gain broad access to shared infrastructure 
Verisign Public 7
Cloud Data Security: Encryption Layers 
• Different Layers of Encryption 
• Block Storage / Disks 
• File and API 
• Databases 
• Applications 
Applications 
Databases 
File, API 
Disks 
• Higher-level encryption can protect better but is harder 
• Key question: Who has the key ? They have access 
• Only Disks encrypted by provider 
• Provider can see disk content 
• Files and APIs encrypted by provider 
• Provider can see API flows and file content 
• … and so on 
Verisign Public 8
Cloud Data Security: Broad Concerns 
• Is server based encryption sufficient ? 
• Encryption Gateways on the client/enterprise side 
• How secure are the encryption keys ? 
• Stored in the Cloud - Secured VM, HSM 
• Stored by Client/enterprise (Encryption Gateways) 
Verisign Public 9
Cryptographic Concepts and 
Applications 
Verisign Public 10
Basic Conceptual Terms (1/2) 
• Cryptography Provisions 
• Authentication, Confidentiality, Non Repudiation, Integrity 
• Deals with making communications and storage secure 
• Encryption/Decryption 
• Encryption: clear-text message to cipher-text 
• Decryption: cipher-text back to clear-text 
• Types of encryption algorithms 
• Symmetric Key 
• Asymmetric Key 
Verisign Public 11
Basic Conceptual Terms (2/2) 
• 1-way Hash functions 
• Also known as a message digest or fingerprint functions 
• Data Integrity 
• Digital Signatures 
• Uses Public-key/Asymmetric Cryptography and 1-way hashes 
• Data Origin Authentication and Data Integrity Assurance 
• Digital Certificates and Public Key Infrastructure 
• Digitally Signed Public Keys 
• Infrastructure for the Web of Trust 
• Key Security 
• Secure storage of secret keys 
Verisign Public 12
1-way Hashes: Overview 
• Message digest or fingerprint 
• Variable-length input string 
converted into a short fixed-length 
binary sequence 
• Easy to compute 
• Infeasible to reverse 
• Infeasible to craft collisions 
Note: MD5 is not considered secure today. 
Only for illustration. 
Verisign Public 13
1-way Hashes: Uses 
• Used for storage of 
credentials like passwords 
• 1-way encryption 
• Not feasible to compute 
password from the hash 
• Not feasible to compute other 
passwords producing same hash 
• Also used in 
• Digital Signatures 
• File integrity checks 
Verisign Public 14
1-way Hashes: Details 
• Algorithms 
• MD5 (128 bits), SHA-1(160 bits), SHA-256 (256 bits), SHA-512 
(512 bits) 
• Attacks 
• Pre-computed dictionary attacks/ Rainbow attacks 
• Hash Collision 
• Mitigation 
• Use random salts 
• Use stronger versions e.g. SHA-256 upwards 
• 2-Factor authentication 
Verisign Public 15
1-way Hashes: Upshot for Cloud 
• If your cloud provider is able to send you your password 
for Forgot Password, … 
• Apps hosted by you on provider’s infra should use 1- 
way hashes with salt for storing passwords in the 
database 
Verisign Public 16
Symmetric Crypto: Overview 
Secret Key 
Plaintext Ciphertext Plaintext 
Encryption 
Decryption 
• Same key is used for encryption and decryption 
• Parties need a mechanism to exchange the shared 
key securely 
• Key must be secret and safely stored 
Verisign Public 17
Symmetric Crypto: Uses 
• Basis for Data Confidentiality 
• Vital for secure storage and secure transmission 
• Prevents attackers from being able to make sense of disk data or 
network packets they illegitimately accessed 
• Symmetric key ciphers are efficient 
• Relatively inexpensive to produce a strong key 
• Smaller keys for the same level of protection 
• Comparatively inexpensive encryption/decryption 
Verisign Public 18
Symmetric Crypto: Details 
• Algorithms 
• 3DES, AES-x (x=128,192,256), RC4 
• Attacks 
• Cryptanalysis 
• Key compromise 
• Mitigation 
• Rotate/Rollover keys every N years 
• Secure Key Storage 
• Restricted filesystem/VM, HSM 
Verisign Public 19
Symmetric Crypto: Upshot for Cloud 
• Secure way to store uploaded data, sensitive personal 
information in databases, VM images, emails etc. 
• To infrastructure provider and SaaS provider 
• What is encrypted and using what mechanism? 
• How and where are secret keys stored ? Are they rotated ? 
• Is there a way that only I can use the secret key without the 
provider having access to it ? 
• For apps hosted by you 
• Are you encrypting sensitive data stored in databases, Text 
Search indexes etc. 
• How secure is your secret key ? 
Verisign Public 20
Comparable Crypto Strengths 
• Smaller Keys are more 
efficient 
• Faster generation 
• Faster encrypt/decrypt 
• Smaller encrypted output 
• Longer keys have higher 
crypto strength 
• For same algorithm 
• Symmetric Keys are 
stronger for same size 
Verisign Public 21
Asymmetric Crypto: Overview 
Public Key Private Key 
Plaintext Ciphertext Plaintext 
Encryption Decryption 
• Public Key is well-known and published to all 
• Private Key is secret and must be stored safely by owner 
• Encrypt with one Key, Decrypt with another Key 
• Infeasible to compute Private Key from Public Key 
Verisign Public 22
Asymmetric Crypto: Overview 
• Key generation, encryption/decryption are expensive 
compared to symmetric keys 
• Used to encrypt small amounts of data, mostly for authentication 
• Rarely used for encryption of regular data which is voluminous 
• Private key must be securely stored similar to symmetric 
keys 
Verisign Public 23
Asymmetric Crypto: Uses 
• Secure Communications 
• Data origin authentication 
• No interception/diversion aka Man-in-the-middle 
• Symmetric Key exchange during session establishment 
• SSL, PGP, SSH 
• Mechanisms 
• Digital Signatures 
• Digital Certificates 
Verisign Public 24
Digital Signatures: Overview 
• Builds on Hashing and Asymmetric Crypto 
• Actual data remains in plaintext but signature is attached 
• Data origin authentication, Data integrity assurance 
Verisign Public 25
Digital Signatures: Details 
• Algorithms 
• RSA/SHA-x, DSA, ECDSA (Elliptic Curve) 
• Applications 
• PGP Signed Email, SSL Certificate Signatures, DNSSEC 
• Attacks 
• Signature forgery by exploiting weak hash functions 
• Private key compromise 
• Mitigation 
• Strong hashes and strong encryption, Secure private key storage 
Verisign Public 26
Digital Certificates: Signatures + Chain of Trust 
• Builds on Digital Signatures and PKI 
• Certificate is a "Digitally Signed Public Key" 
• Chain of Trust with Certificate Authorities 
• DNSSEC also has Chain of Trust but no certs 
Verisign Public 27
Digital Certificates: Details 
• Certificate is public and valid for a 
time interval (typically years) 
• Certifies that Public Key identifies 
Subject 
• DNS hostname, Email address etc. 
• Affixed with CA signature 
• Verifier configures Trust Anchor 
• a node in the Chain of Trust 
• root always trusted 
• Root CA is ultimate authority 
• Self-signed certificate trusted by clients 
Verisign Public 28
Digital Certificates: Details 
• Attacks 
• Private key compromise (anywhere in Trust Chain) 
• Fraudulent yet cryptographically valid certs 
• Digital Signature forgery typically via Hash collisions 
• Mitigation 
• Use reputed CAs 
• Strong encryption and hash functions 
• Secure Key Storage 
• Certificate Revocation 
Verisign Public 29
Asymmetric Crypto: Upshot for Cloud 
• To Cloud Providers 
• Are they using valid non-expired SSL certificates and strong 
encryption ? 
• Server certs and client certs (if applicable) 
• Are their domains DNSSEC enabled ? 
• Protection against DNS Cache Poisoning Attacks 
• Do they renew certificates and roll over DNSSEC keys ? 
• For your hosted apps 
• Is HTTPS used for all confidential exchanges ? 
• Are signed emails used especially for input emails that trigger 
workflow actions ? 
• Is certificate-based client authentication implemented properly ? 
Verisign Public 30
Recent Trends in Cloud Data 
Security 
Verisign Public 31
Hardware Security Modules 
• Secure and tamper-resistant storage for high-value keys 
• Traditionally used for CAs, DNSSEC signers 
• Now being considered for more uses in the Cloud 
• Very difficult to access/steal keys from the device 
• Various FIPS levels 
• May Respond to tamper attempts 
• Highly secure ones can self-destruct keys 
• Often JCE KeyStore provider is supplied by vendor 
• Can use JCE KeyStore abstraction directly from Java apps 
• If not, need to use a JCE PKCS#11 Provider 
• Uses JNI to invoke the native PKCS#11 API libraries 
Verisign Public 32
Hardware Security Modules 
• Key stays within the HSM 
• Cryptographic operations 
occur within the hardware 
• signing 
• encryption/decryption 
• Cryptographic black box 
• input data goes in 
• cryptographically 
transformed data comes out 
Storage 
Creation 
Destruction 
Usage Distribution 
Verisign Public 33
Cloud Encryption Gateways 
SaaS 
PaaS 
IaaS 
Encryption 
Gateway 
SaaS forms 
PaaS API 
Cloud DB 
JDBC 
• Intercept and transform sensitive data before it goes out 
• Replace it with a random token or strongly encrypted value 
• Must be of same size and type, else things will break 
• Do reverse operation for data coming back into premises 
• Real-time crypto operation on every request/response 
Verisign Public 34
Cloud Encryption Gateways 
• Enterprise owns encryption key or token vault 
• Data stored in Cloud provider’s datastores is mangled 
• Data stores include databases, Text Search indexes 
• Sensitive data not compromised 
• Field-based operation 
• Can specify the sensitive fields 
• Only those will be transformed 
• Cloud platform aware 
• Gateway needs to do transformations specific to the SaaS, PaaS 
involved in the interaction 
• Not platform-agnostic 
Verisign Public 35
Cloud Encryption Gateways – Format Preservation 
• Format preserving encryption 
• Usually encryption produces longer ciphertext than plain-text 
• logical data type may change too 
• e.g. 1234567812345670 (16 digit number) -> 
lqRcvPnCqUJc3p4nSUjLZw==, (24 char base64 encoded string) 
• Size and datatype mismatch in transformation will break things 
• Database column type and length 
• Application data types and length 
• Ciphertext is in same format (type and length) as input plaintext 
• Input: 10 digit numeric id, Output: a different 10 digit numeric id 
• Input: 30 character address, Output: 30 character mangled string 
Verisign Public 36
Cloud Encryption Gateways – Function Preservation 
• Function preserving encryption 
• Just format preservation may not be sufficient 
• What about 
• Wildcard matches 
• Sort orders 
• Need encryption/tokenization that is order-preserving 
• More generally function-preserving 
• Claims of such encryption have been made 
• Possibility of reduced encryption strength 
• Not yet clear if strength is within acceptable limits 
Verisign Public 37
Conclusion 
• Many pieces to the Cloud Data Security puzzle 
• Innovative solutions are emerging based on well-proven 
building blocks 
• Comprehensive approaches involving all parties are 
the need 
• News of breaches causes discomfort 
• It may take a while before comfort levels are reached 
Verisign Public 38
References 
• NIST Special Publication 800-57 Recommendation for 
KeyManagement – Part 1: General (Revision 3) 
• MD5 considered harmful today: Creating a Rogue CA 
Certificate 
• Six security issues to tackle before encrypting cloud data 
• http://www.computerweekly.com/news/2240180087/Six-security-issues- 
to-tackle-before-encrypting-cloud-data 
• An Illustrated Guide to Cryptographic Hashes 
• http://www.unixwiz.net/techtips/iguide-crypto-hashes.html 
Verisign Public 39
Thank You 
© 2013 VeriSign, Inc. All rights reserved. VERISIGN and other trademarks, service marks, and 
designs are registered or unregistered trademarks of VeriSign, Inc. and its subsidiaries in the United 
States and in foreign countries. All other trademarks are property of their respective owners.

Mais conteúdo relacionado

Mais procurados

Data storage security in cloud computing
Data storage security in cloud computingData storage security in cloud computing
Data storage security in cloud computingSonali Jain
 
Security Issues of Cloud Computing
Security Issues of Cloud ComputingSecurity Issues of Cloud Computing
Security Issues of Cloud ComputingFalgun Rathod
 
Data Integrity proofs in cloud storage
Data Integrity proofs in cloud storageData Integrity proofs in cloud storage
Data Integrity proofs in cloud storageSameer Mohd
 
security Issues of cloud computing
security Issues of cloud computingsecurity Issues of cloud computing
security Issues of cloud computingprachupanchal
 
Evaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing EnvironmentsEvaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing Environmentsijfcstjournal
 
Attaining data security in cloud computing
Attaining data security in cloud computingAttaining data security in cloud computing
Attaining data security in cloud computingGopinath Muthusamy
 
Cloud Security - Emerging Facets and Frontiers
Cloud Security - Emerging Facets and FrontiersCloud Security - Emerging Facets and Frontiers
Cloud Security - Emerging Facets and FrontiersGokul Alex
 
Cyber Security and Cloud Computing
Cyber Security and Cloud ComputingCyber Security and Cloud Computing
Cyber Security and Cloud ComputingKeet Sugathadasa
 
Security in cloud computing
Security in cloud computingSecurity in cloud computing
Security in cloud computingveena venugopal
 
cloud computing encrypted
cloud computing encryptedcloud computing encrypted
cloud computing encryptedDevanandPatil6
 
Cloud computing security from single to multiple
Cloud computing security from single to multipleCloud computing security from single to multiple
Cloud computing security from single to multipleKiran Kumar
 
Security on Cloud Computing
Security on Cloud Computing Security on Cloud Computing
Security on Cloud Computing Reza Pahlava
 

Mais procurados (20)

Data storage security in cloud computing
Data storage security in cloud computingData storage security in cloud computing
Data storage security in cloud computing
 
Security Issues of Cloud Computing
Security Issues of Cloud ComputingSecurity Issues of Cloud Computing
Security Issues of Cloud Computing
 
Data Integrity proofs in cloud storage
Data Integrity proofs in cloud storageData Integrity proofs in cloud storage
Data Integrity proofs in cloud storage
 
security Issues of cloud computing
security Issues of cloud computingsecurity Issues of cloud computing
security Issues of cloud computing
 
Cloud security (domain11 14)
Cloud security (domain11 14)Cloud security (domain11 14)
Cloud security (domain11 14)
 
Evaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing EnvironmentsEvaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing Environments
 
Cloud security
Cloud securityCloud security
Cloud security
 
Attaining data security in cloud computing
Attaining data security in cloud computingAttaining data security in cloud computing
Attaining data security in cloud computing
 
Cloud Security - Emerging Facets and Frontiers
Cloud Security - Emerging Facets and FrontiersCloud Security - Emerging Facets and Frontiers
Cloud Security - Emerging Facets and Frontiers
 
Cloud Encryption
Cloud EncryptionCloud Encryption
Cloud Encryption
 
Cyber Security and Cloud Computing
Cyber Security and Cloud ComputingCyber Security and Cloud Computing
Cyber Security and Cloud Computing
 
Data security using rsa
Data security using rsaData security using rsa
Data security using rsa
 
Cloud security
Cloud securityCloud security
Cloud security
 
Security in cloud computing
Security in cloud computingSecurity in cloud computing
Security in cloud computing
 
cloud computing encrypted
cloud computing encryptedcloud computing encrypted
cloud computing encrypted
 
Cloud computing security from single to multiple
Cloud computing security from single to multipleCloud computing security from single to multiple
Cloud computing security from single to multiple
 
Security in cloud computing
Security in cloud computingSecurity in cloud computing
Security in cloud computing
 
Cloud computing security
Cloud computing securityCloud computing security
Cloud computing security
 
Cloud complete
Cloud completeCloud complete
Cloud complete
 
Security on Cloud Computing
Security on Cloud Computing Security on Cloud Computing
Security on Cloud Computing
 

Destaque

Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computingPrince Chandu
 
Cloud Computing Security Issues in Infrastructure as a Service”
Cloud Computing Security Issues in Infrastructure as a Service”Cloud Computing Security Issues in Infrastructure as a Service”
Cloud Computing Security Issues in Infrastructure as a Service”Vivek Maurya
 
Cloud computing security
Cloud computing security Cloud computing security
Cloud computing security Teja Babu
 
Security of Cloud Computing Applications in Smart Cities
Security of Cloud Computing Applications in Smart CitiesSecurity of Cloud Computing Applications in Smart Cities
Security of Cloud Computing Applications in Smart CitiesCharles Mok
 
Presentation on cloud computing security issues using HADOOP and HDFS ARCHITE...
Presentation on cloud computing security issues using HADOOP and HDFS ARCHITE...Presentation on cloud computing security issues using HADOOP and HDFS ARCHITE...
Presentation on cloud computing security issues using HADOOP and HDFS ARCHITE...Pushpa
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challengesDheeraj Negi
 

Destaque (6)

Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computing
 
Cloud Computing Security Issues in Infrastructure as a Service”
Cloud Computing Security Issues in Infrastructure as a Service”Cloud Computing Security Issues in Infrastructure as a Service”
Cloud Computing Security Issues in Infrastructure as a Service”
 
Cloud computing security
Cloud computing security Cloud computing security
Cloud computing security
 
Security of Cloud Computing Applications in Smart Cities
Security of Cloud Computing Applications in Smart CitiesSecurity of Cloud Computing Applications in Smart Cities
Security of Cloud Computing Applications in Smart Cities
 
Presentation on cloud computing security issues using HADOOP and HDFS ARCHITE...
Presentation on cloud computing security issues using HADOOP and HDFS ARCHITE...Presentation on cloud computing security issues using HADOOP and HDFS ARCHITE...
Presentation on cloud computing security issues using HADOOP and HDFS ARCHITE...
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
 

Semelhante a Data Security Essentials for Cloud Computing - JavaOne 2013

Data Security Essentials - JavaOne 2013
Data Security Essentials - JavaOne 2013Data Security Essentials - JavaOne 2013
Data Security Essentials - JavaOne 2013javagroup2006
 
Protecting Sensitive Data (and be PCI Compliant too!)
Protecting Sensitive Data (and be PCI Compliant too!)Protecting Sensitive Data (and be PCI Compliant too!)
Protecting Sensitive Data (and be PCI Compliant too!)Security Innovation
 
Track 5 session 2 - st dev con 2016 - security iot best practices
Track 5   session 2 - st dev con 2016 - security iot best practicesTrack 5   session 2 - st dev con 2016 - security iot best practices
Track 5 session 2 - st dev con 2016 - security iot best practicesST_World
 
Encryption in the enterprise
Encryption in the enterpriseEncryption in the enterprise
Encryption in the enterpriseBozhidar Bozhanov
 
MongoDB .local London 2019: New Encryption Capabilities in MongoDB 4.2: A Dee...
MongoDB .local London 2019: New Encryption Capabilities in MongoDB 4.2: A Dee...MongoDB .local London 2019: New Encryption Capabilities in MongoDB 4.2: A Dee...
MongoDB .local London 2019: New Encryption Capabilities in MongoDB 4.2: A Dee...MongoDB
 
Data Security for Project Managers
Data Security for Project ManagersData Security for Project Managers
Data Security for Project ManagersJoseph Wojowski
 
Encryption techniques
Encryption techniquesEncryption techniques
Encryption techniquesMohitManna
 
Key Concepts for Protecting the Privacy of IBM i Data
Key Concepts for Protecting the Privacy of IBM i DataKey Concepts for Protecting the Privacy of IBM i Data
Key Concepts for Protecting the Privacy of IBM i DataPrecisely
 
Application security meetup - cloud security best practices 24062021
Application security meetup - cloud security best practices 24062021Application security meetup - cloud security best practices 24062021
Application security meetup - cloud security best practices 24062021lior mazor
 
Project Rhino: Enhancing Data Protection for Hadoop
Project Rhino: Enhancing Data Protection for HadoopProject Rhino: Enhancing Data Protection for Hadoop
Project Rhino: Enhancing Data Protection for HadoopCloudera, Inc.
 
Public Digital Identity as a Service
Public Digital Identity as a ServicePublic Digital Identity as a Service
Public Digital Identity as a ServicePT Datacomm Diangraha
 
Entrepreneurship & Commerce in IT - 11 - Security & Encryption
Entrepreneurship & Commerce in IT - 11 - Security & EncryptionEntrepreneurship & Commerce in IT - 11 - Security & Encryption
Entrepreneurship & Commerce in IT - 11 - Security & EncryptionSachintha Gunasena
 
Protecting Your Data with Encryption
Protecting Your Data with EncryptionProtecting Your Data with Encryption
Protecting Your Data with EncryptionEd Leighton-Dick
 
Data Protection in Transit and at Rest
Data Protection in Transit and at RestData Protection in Transit and at Rest
Data Protection in Transit and at RestAmazon Web Services
 
CompTIASecPLUS-Part6 - UnlimitedEdited.pptx
CompTIASecPLUS-Part6 -  UnlimitedEdited.pptxCompTIASecPLUS-Part6 -  UnlimitedEdited.pptx
CompTIASecPLUS-Part6 - UnlimitedEdited.pptxmohedkhadar60
 
Security 101: Protecting Data with Encryption, Tokenization & Anonymization
Security 101: Protecting Data with Encryption, Tokenization & AnonymizationSecurity 101: Protecting Data with Encryption, Tokenization & Anonymization
Security 101: Protecting Data with Encryption, Tokenization & AnonymizationPrecisely
 
The Future of Data Management - the Enterprise Data Hub
The Future of Data Management - the Enterprise Data HubThe Future of Data Management - the Enterprise Data Hub
The Future of Data Management - the Enterprise Data HubDataWorks Summit
 
The Future of Hadoop Security - Hadoop Summit 2014
The Future of Hadoop Security - Hadoop Summit 2014The Future of Hadoop Security - Hadoop Summit 2014
The Future of Hadoop Security - Hadoop Summit 2014Cloudera, Inc.
 

Semelhante a Data Security Essentials for Cloud Computing - JavaOne 2013 (20)

Data Security Essentials - JavaOne 2013
Data Security Essentials - JavaOne 2013Data Security Essentials - JavaOne 2013
Data Security Essentials - JavaOne 2013
 
Protecting Sensitive Data (and be PCI Compliant too!)
Protecting Sensitive Data (and be PCI Compliant too!)Protecting Sensitive Data (and be PCI Compliant too!)
Protecting Sensitive Data (and be PCI Compliant too!)
 
Track 5 session 2 - st dev con 2016 - security iot best practices
Track 5   session 2 - st dev con 2016 - security iot best practicesTrack 5   session 2 - st dev con 2016 - security iot best practices
Track 5 session 2 - st dev con 2016 - security iot best practices
 
Encryption in the enterprise
Encryption in the enterpriseEncryption in the enterprise
Encryption in the enterprise
 
MongoDB .local London 2019: New Encryption Capabilities in MongoDB 4.2: A Dee...
MongoDB .local London 2019: New Encryption Capabilities in MongoDB 4.2: A Dee...MongoDB .local London 2019: New Encryption Capabilities in MongoDB 4.2: A Dee...
MongoDB .local London 2019: New Encryption Capabilities in MongoDB 4.2: A Dee...
 
Data Security for Project Managers
Data Security for Project ManagersData Security for Project Managers
Data Security for Project Managers
 
Encryption techniques
Encryption techniquesEncryption techniques
Encryption techniques
 
Wireless LAN Security Fundamentals #AirheadsConf Italy
Wireless LAN Security Fundamentals #AirheadsConf ItalyWireless LAN Security Fundamentals #AirheadsConf Italy
Wireless LAN Security Fundamentals #AirheadsConf Italy
 
Key Concepts for Protecting the Privacy of IBM i Data
Key Concepts for Protecting the Privacy of IBM i DataKey Concepts for Protecting the Privacy of IBM i Data
Key Concepts for Protecting the Privacy of IBM i Data
 
Application security meetup - cloud security best practices 24062021
Application security meetup - cloud security best practices 24062021Application security meetup - cloud security best practices 24062021
Application security meetup - cloud security best practices 24062021
 
Project Rhino: Enhancing Data Protection for Hadoop
Project Rhino: Enhancing Data Protection for HadoopProject Rhino: Enhancing Data Protection for Hadoop
Project Rhino: Enhancing Data Protection for Hadoop
 
Public Digital Identity as a Service
Public Digital Identity as a ServicePublic Digital Identity as a Service
Public Digital Identity as a Service
 
Entrepreneurship & Commerce in IT - 11 - Security & Encryption
Entrepreneurship & Commerce in IT - 11 - Security & EncryptionEntrepreneurship & Commerce in IT - 11 - Security & Encryption
Entrepreneurship & Commerce in IT - 11 - Security & Encryption
 
Protecting Your Data with Encryption
Protecting Your Data with EncryptionProtecting Your Data with Encryption
Protecting Your Data with Encryption
 
Security in e commerce
Security in e commerceSecurity in e commerce
Security in e commerce
 
Data Protection in Transit and at Rest
Data Protection in Transit and at RestData Protection in Transit and at Rest
Data Protection in Transit and at Rest
 
CompTIASecPLUS-Part6 - UnlimitedEdited.pptx
CompTIASecPLUS-Part6 -  UnlimitedEdited.pptxCompTIASecPLUS-Part6 -  UnlimitedEdited.pptx
CompTIASecPLUS-Part6 - UnlimitedEdited.pptx
 
Security 101: Protecting Data with Encryption, Tokenization & Anonymization
Security 101: Protecting Data with Encryption, Tokenization & AnonymizationSecurity 101: Protecting Data with Encryption, Tokenization & Anonymization
Security 101: Protecting Data with Encryption, Tokenization & Anonymization
 
The Future of Data Management - the Enterprise Data Hub
The Future of Data Management - the Enterprise Data HubThe Future of Data Management - the Enterprise Data Hub
The Future of Data Management - the Enterprise Data Hub
 
The Future of Hadoop Security - Hadoop Summit 2014
The Future of Hadoop Security - Hadoop Summit 2014The Future of Hadoop Security - Hadoop Summit 2014
The Future of Hadoop Security - Hadoop Summit 2014
 

Último

CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️anilsa9823
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about usDynamic Netsoft
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...harshavardhanraghave
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfkalichargn70th171
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...gurkirankumar98700
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerThousandEyes
 
Test Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and BackendTest Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and BackendArshad QA
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providermohitmore19
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AIABDERRAOUF MEHENNI
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Modelsaagamshah0812
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxComplianceQuest1
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...panagenda
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️Delhi Call girls
 

Último (20)

CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about us
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
 
Test Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and BackendTest Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and Backend
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 

Data Security Essentials for Cloud Computing - JavaOne 2013

  • 1. Data Security Essentials for Cloud Computing Anirban Mukherjee amukherjee@verisign.com Java One 2013 JavaOne 2013 08-May-2013 Manish Maheshwari mmaheshwari@verisign.com
  • 2. Speakers Manish Software Architect, Verisign Anirban Software Architect, Verisign Verisign Public 2
  • 3. Agenda • Data Security Considerations for the Cloud • Basic Cryptographic Concepts and Applications • 1-way hashes and digests • Secure Credential Storage • Symmetric Key Cryptography • Data Confidentiality – in storage and in transit • Asymmetric Key Cryptography • Authentication and Secure Communications • Recent Trends in Cloud Security • HSMs for Safe Key Storage • Encryption Gateways into the Cloud Verisign Public 3
  • 4. Data Security Considerations for the Cloud Verisign Public 4
  • 5. Cloud Data Security: Context • Data Security is crucial for Enterprises • Data Protection is vital for Reputation • Concerns on Data Security are a deterrent to broader adoption of Cloud Computing • Data moves out of Enterprise boundaries • Trust on Cloud providers • Shared infrastructure • Yet benefits of Cloud Computing are compelling • Need for comprehensive and non-intrusive data security Verisign Public 5
  • 6. Top Cloud Data Security Issues: Gartner • Breach notification and data residency • Data management at rest • Data protection in motion • Encryption key management • Access controls • Long-term resiliency of the encryption system Verisign Public 6
  • 7. Cloud Data Security: Who is responsible ? “Encryption of sensitive data is generally a good security practice, and AWS encourages users to encrypt their sensitive data before it is uploaded to Amazon S3.” – Amazon Web Services: Overview of Security Processes • Who is responsible for the overall security ? • Different levels of providers • Shared infrastructure can make extent of breach higher • APIs allow many admin functions to be carried out • Malicious entities can look for weaknesses in the API • Can gain broad access to shared infrastructure Verisign Public 7
  • 8. Cloud Data Security: Encryption Layers • Different Layers of Encryption • Block Storage / Disks • File and API • Databases • Applications Applications Databases File, API Disks • Higher-level encryption can protect better but is harder • Key question: Who has the key ? They have access • Only Disks encrypted by provider • Provider can see disk content • Files and APIs encrypted by provider • Provider can see API flows and file content • … and so on Verisign Public 8
  • 9. Cloud Data Security: Broad Concerns • Is server based encryption sufficient ? • Encryption Gateways on the client/enterprise side • How secure are the encryption keys ? • Stored in the Cloud - Secured VM, HSM • Stored by Client/enterprise (Encryption Gateways) Verisign Public 9
  • 10. Cryptographic Concepts and Applications Verisign Public 10
  • 11. Basic Conceptual Terms (1/2) • Cryptography Provisions • Authentication, Confidentiality, Non Repudiation, Integrity • Deals with making communications and storage secure • Encryption/Decryption • Encryption: clear-text message to cipher-text • Decryption: cipher-text back to clear-text • Types of encryption algorithms • Symmetric Key • Asymmetric Key Verisign Public 11
  • 12. Basic Conceptual Terms (2/2) • 1-way Hash functions • Also known as a message digest or fingerprint functions • Data Integrity • Digital Signatures • Uses Public-key/Asymmetric Cryptography and 1-way hashes • Data Origin Authentication and Data Integrity Assurance • Digital Certificates and Public Key Infrastructure • Digitally Signed Public Keys • Infrastructure for the Web of Trust • Key Security • Secure storage of secret keys Verisign Public 12
  • 13. 1-way Hashes: Overview • Message digest or fingerprint • Variable-length input string converted into a short fixed-length binary sequence • Easy to compute • Infeasible to reverse • Infeasible to craft collisions Note: MD5 is not considered secure today. Only for illustration. Verisign Public 13
  • 14. 1-way Hashes: Uses • Used for storage of credentials like passwords • 1-way encryption • Not feasible to compute password from the hash • Not feasible to compute other passwords producing same hash • Also used in • Digital Signatures • File integrity checks Verisign Public 14
  • 15. 1-way Hashes: Details • Algorithms • MD5 (128 bits), SHA-1(160 bits), SHA-256 (256 bits), SHA-512 (512 bits) • Attacks • Pre-computed dictionary attacks/ Rainbow attacks • Hash Collision • Mitigation • Use random salts • Use stronger versions e.g. SHA-256 upwards • 2-Factor authentication Verisign Public 15
  • 16. 1-way Hashes: Upshot for Cloud • If your cloud provider is able to send you your password for Forgot Password, … • Apps hosted by you on provider’s infra should use 1- way hashes with salt for storing passwords in the database Verisign Public 16
  • 17. Symmetric Crypto: Overview Secret Key Plaintext Ciphertext Plaintext Encryption Decryption • Same key is used for encryption and decryption • Parties need a mechanism to exchange the shared key securely • Key must be secret and safely stored Verisign Public 17
  • 18. Symmetric Crypto: Uses • Basis for Data Confidentiality • Vital for secure storage and secure transmission • Prevents attackers from being able to make sense of disk data or network packets they illegitimately accessed • Symmetric key ciphers are efficient • Relatively inexpensive to produce a strong key • Smaller keys for the same level of protection • Comparatively inexpensive encryption/decryption Verisign Public 18
  • 19. Symmetric Crypto: Details • Algorithms • 3DES, AES-x (x=128,192,256), RC4 • Attacks • Cryptanalysis • Key compromise • Mitigation • Rotate/Rollover keys every N years • Secure Key Storage • Restricted filesystem/VM, HSM Verisign Public 19
  • 20. Symmetric Crypto: Upshot for Cloud • Secure way to store uploaded data, sensitive personal information in databases, VM images, emails etc. • To infrastructure provider and SaaS provider • What is encrypted and using what mechanism? • How and where are secret keys stored ? Are they rotated ? • Is there a way that only I can use the secret key without the provider having access to it ? • For apps hosted by you • Are you encrypting sensitive data stored in databases, Text Search indexes etc. • How secure is your secret key ? Verisign Public 20
  • 21. Comparable Crypto Strengths • Smaller Keys are more efficient • Faster generation • Faster encrypt/decrypt • Smaller encrypted output • Longer keys have higher crypto strength • For same algorithm • Symmetric Keys are stronger for same size Verisign Public 21
  • 22. Asymmetric Crypto: Overview Public Key Private Key Plaintext Ciphertext Plaintext Encryption Decryption • Public Key is well-known and published to all • Private Key is secret and must be stored safely by owner • Encrypt with one Key, Decrypt with another Key • Infeasible to compute Private Key from Public Key Verisign Public 22
  • 23. Asymmetric Crypto: Overview • Key generation, encryption/decryption are expensive compared to symmetric keys • Used to encrypt small amounts of data, mostly for authentication • Rarely used for encryption of regular data which is voluminous • Private key must be securely stored similar to symmetric keys Verisign Public 23
  • 24. Asymmetric Crypto: Uses • Secure Communications • Data origin authentication • No interception/diversion aka Man-in-the-middle • Symmetric Key exchange during session establishment • SSL, PGP, SSH • Mechanisms • Digital Signatures • Digital Certificates Verisign Public 24
  • 25. Digital Signatures: Overview • Builds on Hashing and Asymmetric Crypto • Actual data remains in plaintext but signature is attached • Data origin authentication, Data integrity assurance Verisign Public 25
  • 26. Digital Signatures: Details • Algorithms • RSA/SHA-x, DSA, ECDSA (Elliptic Curve) • Applications • PGP Signed Email, SSL Certificate Signatures, DNSSEC • Attacks • Signature forgery by exploiting weak hash functions • Private key compromise • Mitigation • Strong hashes and strong encryption, Secure private key storage Verisign Public 26
  • 27. Digital Certificates: Signatures + Chain of Trust • Builds on Digital Signatures and PKI • Certificate is a "Digitally Signed Public Key" • Chain of Trust with Certificate Authorities • DNSSEC also has Chain of Trust but no certs Verisign Public 27
  • 28. Digital Certificates: Details • Certificate is public and valid for a time interval (typically years) • Certifies that Public Key identifies Subject • DNS hostname, Email address etc. • Affixed with CA signature • Verifier configures Trust Anchor • a node in the Chain of Trust • root always trusted • Root CA is ultimate authority • Self-signed certificate trusted by clients Verisign Public 28
  • 29. Digital Certificates: Details • Attacks • Private key compromise (anywhere in Trust Chain) • Fraudulent yet cryptographically valid certs • Digital Signature forgery typically via Hash collisions • Mitigation • Use reputed CAs • Strong encryption and hash functions • Secure Key Storage • Certificate Revocation Verisign Public 29
  • 30. Asymmetric Crypto: Upshot for Cloud • To Cloud Providers • Are they using valid non-expired SSL certificates and strong encryption ? • Server certs and client certs (if applicable) • Are their domains DNSSEC enabled ? • Protection against DNS Cache Poisoning Attacks • Do they renew certificates and roll over DNSSEC keys ? • For your hosted apps • Is HTTPS used for all confidential exchanges ? • Are signed emails used especially for input emails that trigger workflow actions ? • Is certificate-based client authentication implemented properly ? Verisign Public 30
  • 31. Recent Trends in Cloud Data Security Verisign Public 31
  • 32. Hardware Security Modules • Secure and tamper-resistant storage for high-value keys • Traditionally used for CAs, DNSSEC signers • Now being considered for more uses in the Cloud • Very difficult to access/steal keys from the device • Various FIPS levels • May Respond to tamper attempts • Highly secure ones can self-destruct keys • Often JCE KeyStore provider is supplied by vendor • Can use JCE KeyStore abstraction directly from Java apps • If not, need to use a JCE PKCS#11 Provider • Uses JNI to invoke the native PKCS#11 API libraries Verisign Public 32
  • 33. Hardware Security Modules • Key stays within the HSM • Cryptographic operations occur within the hardware • signing • encryption/decryption • Cryptographic black box • input data goes in • cryptographically transformed data comes out Storage Creation Destruction Usage Distribution Verisign Public 33
  • 34. Cloud Encryption Gateways SaaS PaaS IaaS Encryption Gateway SaaS forms PaaS API Cloud DB JDBC • Intercept and transform sensitive data before it goes out • Replace it with a random token or strongly encrypted value • Must be of same size and type, else things will break • Do reverse operation for data coming back into premises • Real-time crypto operation on every request/response Verisign Public 34
  • 35. Cloud Encryption Gateways • Enterprise owns encryption key or token vault • Data stored in Cloud provider’s datastores is mangled • Data stores include databases, Text Search indexes • Sensitive data not compromised • Field-based operation • Can specify the sensitive fields • Only those will be transformed • Cloud platform aware • Gateway needs to do transformations specific to the SaaS, PaaS involved in the interaction • Not platform-agnostic Verisign Public 35
  • 36. Cloud Encryption Gateways – Format Preservation • Format preserving encryption • Usually encryption produces longer ciphertext than plain-text • logical data type may change too • e.g. 1234567812345670 (16 digit number) -> lqRcvPnCqUJc3p4nSUjLZw==, (24 char base64 encoded string) • Size and datatype mismatch in transformation will break things • Database column type and length • Application data types and length • Ciphertext is in same format (type and length) as input plaintext • Input: 10 digit numeric id, Output: a different 10 digit numeric id • Input: 30 character address, Output: 30 character mangled string Verisign Public 36
  • 37. Cloud Encryption Gateways – Function Preservation • Function preserving encryption • Just format preservation may not be sufficient • What about • Wildcard matches • Sort orders • Need encryption/tokenization that is order-preserving • More generally function-preserving • Claims of such encryption have been made • Possibility of reduced encryption strength • Not yet clear if strength is within acceptable limits Verisign Public 37
  • 38. Conclusion • Many pieces to the Cloud Data Security puzzle • Innovative solutions are emerging based on well-proven building blocks • Comprehensive approaches involving all parties are the need • News of breaches causes discomfort • It may take a while before comfort levels are reached Verisign Public 38
  • 39. References • NIST Special Publication 800-57 Recommendation for KeyManagement – Part 1: General (Revision 3) • MD5 considered harmful today: Creating a Rogue CA Certificate • Six security issues to tackle before encrypting cloud data • http://www.computerweekly.com/news/2240180087/Six-security-issues- to-tackle-before-encrypting-cloud-data • An Illustrated Guide to Cryptographic Hashes • http://www.unixwiz.net/techtips/iguide-crypto-hashes.html Verisign Public 39
  • 40. Thank You © 2013 VeriSign, Inc. All rights reserved. VERISIGN and other trademarks, service marks, and designs are registered or unregistered trademarks of VeriSign, Inc. and its subsidiaries in the United States and in foreign countries. All other trademarks are property of their respective owners.