SlideShare uma empresa Scribd logo
1 de 27
2 December 2012

Cloud Computing - Part II

1

8-SECURE DISTRIBUTED DATA
STORAGE IN CLOUD
COMPUTING
Cloud Computing
Principles and Paradigms

Presented by

Majid Hajibaba
2 December 2012

Cloud Computing - Part II

Introduction
• Data Storage
• Distributed Storage
• Considerations
• unique issues
• specific security requirements not been well-defined
• Concerns about data in cloud
• Privacy
• Integrity

Presented by Majid Hajibaba

2
2 December 2012

Cloud Computing - Part II

Cloud Storage
• Distributed Storage
• Types
• SAN
• NAS

• Reliability
• Security

• Integrity

• LAN
• same authority
• WAN
• different authorities

Presented by Majid Hajibaba

3
2 December 2012

Cloud Computing - Part II

Amazon’s Web Service

Presented by Majid Hajibaba

4
2 December 2012

Cloud Computing - Part II

Microsoft Windows Azure

Presented by Majid Hajibaba

5
2 December 2012

Cloud Computing - Part II

Google App Engine (GAE)

Presented by Majid Hajibaba

6
2 December 2012

Cloud Computing - Part II

Vulnerabilities
• Confidentiality
• Integrity
• Repudiation

• Missing link between download and upload
• Upload-to-Download Integrity
• Repudiation Between Users and Service Providers

Presented by Majid Hajibaba

7
2 December 2012

Cloud Computing - Part II

Solutions for missing link
• Third authority certified (TAC)
• Secret key sharing technique (SKS)
• Solutions
• Neither TAC nor SKS
• With SKS but without TAC
• With TAC but without SKS
• With Both TAC and SKS

Presented by Majid Hajibaba

8
2 December 2012

Cloud Computing - Part II

9

Neither TAC nor SKS
• Uploading Session
1. User: Sends data to service provider with MD5 checksum and
MD5 Signature by User (MSU).
2. Service Provider: Verifies the data with MD5 checksum, if it is
valid, the service provider sends back the MD5 and MD5
Signature by Provider (MSP) to user.
3. MSU is stored at the user side, and MSP is stored at the service
provider side.
• Downloading Session
1. User: Sends request to service provider with authentication
code.
2. Service Provider: Verifies the request identity, if it is valid, the
service provider sends back the data with MD5 checksum and
MD5 Signature by Provider (MSP) to user.
3. User verifies the data using the MD5 checksum.
Presented by Majid Hajibaba
2 December 2012

Cloud Computing - Part II

10

With SKS but without TAC
• Uploading Session
1. User: Sends data to service provider with MD checksum 5.
2. Service Provider: Verifies the data with MD5 checksum, if it is
valid, the service provider sends back the MD5 checksum.
3. The service provider and the user share the MD5 checksum with
SKS.

• Downloading Session
• User: Sends request to the service provider with authentication
code.
• Service Provider: Verifies the request identity, if it is valid, the
service provider sends back the data with MD5 checksum.
• User verifies the data through the MD5 checksum.

Presented by Majid Hajibaba
2 December 2012

Cloud Computing - Part II

11

With TAC but without SKS
• Uploading Session
1. User: Sends data to the service provider along with MD5
checksum and MD5 Signature by User (MSU).
2. Service Provider: Verifies the data with MD5 checksum, if it is
valid, the service provider sends back the MD5 checksum and
MD5 Signature by Provider (MSP) to the user.
3. MSU and MSP are sent to TAC.
• Downloading Session
1. User: Sends request to the service provider with authentication
code.
2. Service Provider: Verifies the request with identity, if it is valid,
the service provider sends back the data with MD5 checksum.
3. User verifies the data through the MD5 checksum.
Presented by Majid Hajibaba
2 December 2012

Cloud Computing - Part II

12

With Both TAC and SKS
• Uploading Session
1. User: Sends data to the service provider with MD5 checksum.
2. Service Provider: verifies the data with MD5 checksum.
3. Both the user and the service provider send MD5 checksum to
TAC.
4. TAC verifies the two MD5 checksum values. If they match, the
TAC distributes MD5 to the user and the service provider by
SKS.
• Downloading Session
1. User: Sends request to the service provider with authentication
code.
2. Service Provider: Verifies the request identity, if it is valid, the
service provider sends back the data with MD5 checksum.
3. User verifies the data through the MD5 checksum
Presented by Majid Hajibaba
2 December 2012

Cloud Computing - Part II

13

TECHNOLOGIES FOR DATA
SECURITY IN CLOUD COMPUTING
• Database Outsourcing and Query Integrity Assurance
• Data Integrity in Untrustworthy Storage

• Web-Application-Based Security
• Multimedia Data Security

Presented by Majid Hajibaba
2 December 2012

Cloud Computing - Part II

14

TECHNOLOGIES FOR DATA
SECURITY IN CLOUD COMPUTING
• Database Outsourcing and Query Integrity Assurance
• Data Integrity in Untrustworthy Storage

• Web-Application-Based Security
• Multimedia Data Security

Presented by Majid Hajibaba
2 December 2012

Cloud Computing - Part II

Database Outsourcing
• Security Concern
• Data privacy
• Hacigumus et al.
• Agrawal et al.

• Query integrity
• Correct and Complete
• Merkle hash tree

Presented by Majid Hajibaba

15
2 December 2012

Cloud Computing - Part II

16

TECHNOLOGIES FOR DATA
SECURITY IN CLOUD COMPUTING
• Database Outsourcing and Query Integrity Assurance
• Data Integrity in Untrustworthy Storage

• Web-Application-Based Security
• Multimedia Data Security

Presented by Majid Hajibaba
2 December 2012

Cloud Computing - Part II

17

Data Integrity in Untrustworthy
Storage
• Remote data storage possession checking protocol

• Requirements
1. Partial copy of the data
2. Robust protocol
3. High communication overhead
4. Computationally efficient
5. Unlimited verification

• Technologies
• A PDP-Based Integrity Checking Protocol
• An Enhanced Data Possession Checking Protocol

Presented by Majid Hajibaba
2 December 2012

Cloud Computing - Part II

18

A PDP-Based Integrity Checking
Protocol

Presented by Majid Hajibaba
2 December 2012

Cloud Computing - Part II

19

A PDP-Based Integrity Checking
Protocol

Presented by Majid Hajibaba
2 December 2012

Cloud Computing - Part II

20

An Enhanced Data Possession
Checking Protocol
• Enhance PDP-based protocol
• Satisfy Requirement #2 with 100% probability
• Computationally more efficient
• Verification time has been shortened

• Trade-offs between
• the computation times required by the prover
• the storage required at the verifier

Presented by Majid Hajibaba
2 December 2012

Cloud Computing - Part II

21

TECHNOLOGIES FOR DATA
SECURITY IN CLOUD COMPUTING
• Database Outsourcing and Query Integrity Assurance
• Data Integrity in Untrustworthy Storage

• Web-Application-Based Security
• Multimedia Data Security

Presented by Majid Hajibaba
2 December 2012

Cloud Computing - Part II

22

Web-Application-Based Security
• Web attack techniques
• Authentication
• Brute force, Insufficient Authentication, Weak password recovery

• Authorization
• Insufficient Authorization, Session attacks

• Client-Side Attacks
• Content Spoofing, XSS, CSRF

• Command Execution
• Like code injection or denial of service via buffer overflow

• Information Disclosure
• Path Traversal

• Logical Attacks
• DoS attack
Presented by Majid Hajibaba
2 December 2012

Cloud Computing - Part II

23

TECHNOLOGIES FOR DATA
SECURITY IN CLOUD COMPUTING
• Database Outsourcing and Query Integrity Assurance
• Data Integrity in Untrustworthy Storage

• Web-Application-Based Security
• Multimedia Data Security

Presented by Majid Hajibaba
2 December 2012

Cloud Computing - Part II

Multimedia Data Security
• Protection from Unauthorized Replication
• Advantage
• improve system performance

• Disadvantage
• contents copyright
• waste of replication cost

• extra control overheads

• Protection from Unauthorized Replacement
• Limited storage capacity
• Remove stored content to make space

• Protection from Unauthorized Pre-fetching
• Just pre-fetch necessary content
Presented by Majid Hajibaba

24
2 December 2012

Cloud Computing - Part II

25

Concerns at Different Levels
• The cloud infrastructure providers (back-end)
• The cloud service providers
• The cloud consumers (front-end)
• Application developer
• End user

Presented by Majid Hajibaba
2 December 2012

Cloud Computing - Part II

Challenges
• Technical
• Open security profiling
• Remote control
• Security compliance with standards
• Certificates
• Non-Technical
• User’s fear of losing control

Presented by Majid Hajibaba

26
2 December 2012

Cloud Computing - Part II

END
Secure Distributed Data Storage In Cloud Computing
27

Mais conteúdo relacionado

Mais procurados

Unit 2 Virtualization Part I.pptx
Unit 2 Virtualization Part I.pptxUnit 2 Virtualization Part I.pptx
Unit 2 Virtualization Part I.pptxNayanrai14
 
Virtualization and cloud computing
Virtualization and cloud computingVirtualization and cloud computing
Virtualization and cloud computingDeep Gupta
 
Cloud Computing Principles and Paradigms: 9 aneka-integration of private and ...
Cloud Computing Principles and Paradigms: 9 aneka-integration of private and ...Cloud Computing Principles and Paradigms: 9 aneka-integration of private and ...
Cloud Computing Principles and Paradigms: 9 aneka-integration of private and ...Majid Hajibaba
 
Cloud federation.pptx
Cloud federation.pptxCloud federation.pptx
Cloud federation.pptxYbhh
 
Cloud Computing Principles and Paradigms: 6 on the management of virtual mach...
Cloud Computing Principles and Paradigms: 6 on the management of virtual mach...Cloud Computing Principles and Paradigms: 6 on the management of virtual mach...
Cloud Computing Principles and Paradigms: 6 on the management of virtual mach...Majid Hajibaba
 
Cloud Computing Principles and Paradigms: 7 enhancing cloud computing environ...
Cloud Computing Principles and Paradigms: 7 enhancing cloud computing environ...Cloud Computing Principles and Paradigms: 7 enhancing cloud computing environ...
Cloud Computing Principles and Paradigms: 7 enhancing cloud computing environ...Majid Hajibaba
 
Module 5-cloud computing-SECURITY IN THE CLOUD
Module 5-cloud computing-SECURITY IN THE CLOUDModule 5-cloud computing-SECURITY IN THE CLOUD
Module 5-cloud computing-SECURITY IN THE CLOUDSweta Kumari Barnwal
 
Cloud Security, Standards and Applications
Cloud Security, Standards and ApplicationsCloud Security, Standards and Applications
Cloud Security, Standards and ApplicationsDr. Sunil Kr. Pandey
 
Virtual Machine provisioning and migration services
Virtual Machine provisioning and migration servicesVirtual Machine provisioning and migration services
Virtual Machine provisioning and migration servicesANUSUYA T K
 
Storage Virtualization
Storage VirtualizationStorage Virtualization
Storage VirtualizationMehul Jariwala
 
Migration into a Cloud
Migration into a CloudMigration into a Cloud
Migration into a CloudDivya S
 
Cloud Computing - An Introduction
Cloud Computing - An IntroductionCloud Computing - An Introduction
Cloud Computing - An IntroductionRavindra Dastikop
 
Data center virtualization
Data center virtualizationData center virtualization
Data center virtualizationmazin Salih
 

Mais procurados (20)

Unit 2 Virtualization Part I.pptx
Unit 2 Virtualization Part I.pptxUnit 2 Virtualization Part I.pptx
Unit 2 Virtualization Part I.pptx
 
Virtualization and cloud computing
Virtualization and cloud computingVirtualization and cloud computing
Virtualization and cloud computing
 
Cloud Computing Principles and Paradigms: 9 aneka-integration of private and ...
Cloud Computing Principles and Paradigms: 9 aneka-integration of private and ...Cloud Computing Principles and Paradigms: 9 aneka-integration of private and ...
Cloud Computing Principles and Paradigms: 9 aneka-integration of private and ...
 
Google App Engine
Google App EngineGoogle App Engine
Google App Engine
 
Cloud federation.pptx
Cloud federation.pptxCloud federation.pptx
Cloud federation.pptx
 
Cloud Computing Principles and Paradigms: 6 on the management of virtual mach...
Cloud Computing Principles and Paradigms: 6 on the management of virtual mach...Cloud Computing Principles and Paradigms: 6 on the management of virtual mach...
Cloud Computing Principles and Paradigms: 6 on the management of virtual mach...
 
Cloud Computing Principles and Paradigms: 7 enhancing cloud computing environ...
Cloud Computing Principles and Paradigms: 7 enhancing cloud computing environ...Cloud Computing Principles and Paradigms: 7 enhancing cloud computing environ...
Cloud Computing Principles and Paradigms: 7 enhancing cloud computing environ...
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Module 5-cloud computing-SECURITY IN THE CLOUD
Module 5-cloud computing-SECURITY IN THE CLOUDModule 5-cloud computing-SECURITY IN THE CLOUD
Module 5-cloud computing-SECURITY IN THE CLOUD
 
Cloud Security, Standards and Applications
Cloud Security, Standards and ApplicationsCloud Security, Standards and Applications
Cloud Security, Standards and Applications
 
Virtual Machine provisioning and migration services
Virtual Machine provisioning and migration servicesVirtual Machine provisioning and migration services
Virtual Machine provisioning and migration services
 
Storage Virtualization
Storage VirtualizationStorage Virtualization
Storage Virtualization
 
Basics of Cloud Computing
Basics of Cloud ComputingBasics of Cloud Computing
Basics of Cloud Computing
 
Cloud computing presentation(ppt)
Cloud  computing presentation(ppt)Cloud  computing presentation(ppt)
Cloud computing presentation(ppt)
 
Migration into a Cloud
Migration into a CloudMigration into a Cloud
Migration into a Cloud
 
Public cloud
Public cloudPublic cloud
Public cloud
 
Cloud Computing - An Introduction
Cloud Computing - An IntroductionCloud Computing - An Introduction
Cloud Computing - An Introduction
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Virtualization- Cloud Computing
Virtualization- Cloud ComputingVirtualization- Cloud Computing
Virtualization- Cloud Computing
 
Data center virtualization
Data center virtualizationData center virtualization
Data center virtualization
 

Destaque

Cloud Computing Principles and Paradigms: 3 enriching the integration as a se...
Cloud Computing Principles and Paradigms: 3 enriching the integration as a se...Cloud Computing Principles and Paradigms: 3 enriching the integration as a se...
Cloud Computing Principles and Paradigms: 3 enriching the integration as a se...Majid Hajibaba
 
Cloud Computing Principles and Paradigms: 10 comet cloud-an autonomic cloud e...
Cloud Computing Principles and Paradigms: 10 comet cloud-an autonomic cloud e...Cloud Computing Principles and Paradigms: 10 comet cloud-an autonomic cloud e...
Cloud Computing Principles and Paradigms: 10 comet cloud-an autonomic cloud e...Majid Hajibaba
 
Cloud Computing Principles and Paradigms: 11 t-systems cloud-based solutions ...
Cloud Computing Principles and Paradigms: 11 t-systems cloud-based solutions ...Cloud Computing Principles and Paradigms: 11 t-systems cloud-based solutions ...
Cloud Computing Principles and Paradigms: 11 t-systems cloud-based solutions ...Majid Hajibaba
 
Cloud Computing Principles and Paradigms: 2 migration into a cloud
Cloud Computing Principles and Paradigms: 2 migration into a cloudCloud Computing Principles and Paradigms: 2 migration into a cloud
Cloud Computing Principles and Paradigms: 2 migration into a cloudMajid Hajibaba
 
cloud computing, Principle and Paradigms: 1 introdution
cloud computing, Principle and Paradigms: 1 introdutioncloud computing, Principle and Paradigms: 1 introdution
cloud computing, Principle and Paradigms: 1 introdutionMajid Hajibaba
 
Best Practices for Architecting in the Cloud - Jeff Barr
Best Practices for Architecting in the Cloud - Jeff BarrBest Practices for Architecting in the Cloud - Jeff Barr
Best Practices for Architecting in the Cloud - Jeff BarrAmazon Web Services
 
building_private_cloud_with_oss_for_scientific_environments-libre
building_private_cloud_with_oss_for_scientific_environments-librebuilding_private_cloud_with_oss_for_scientific_environments-libre
building_private_cloud_with_oss_for_scientific_environments-libreVijayabalan Open to Explore
 
Legal issues in cloud computing
Legal issues in cloud computingLegal issues in cloud computing
Legal issues in cloud computingmovinghats
 
Presentation on Cloud Mashups
Presentation on Cloud MashupsPresentation on Cloud Mashups
Presentation on Cloud MashupsMichael Heydt
 
AWS Webcast - Best Practices in Architecting for the Cloud
AWS Webcast - Best Practices in Architecting for the CloudAWS Webcast - Best Practices in Architecting for the Cloud
AWS Webcast - Best Practices in Architecting for the CloudAmazon Web Services
 
High performance computing
High performance computingHigh performance computing
High performance computingGuy Tel-Zur
 
UMF Cloud Pilot: architecturing an IaaS offer for higher education
UMF Cloud Pilot: architecturing an IaaS offer for higher educationUMF Cloud Pilot: architecturing an IaaS offer for higher education
UMF Cloud Pilot: architecturing an IaaS offer for higher educationAndy Powell
 
Checklist for Competent Cloud Security Management
Checklist for Competent Cloud Security ManagementChecklist for Competent Cloud Security Management
Checklist for Competent Cloud Security ManagementCloud Credential Council
 
Battelle AoA Evaluation Report on Military Mesh Network Products
Battelle AoA Evaluation Report on Military Mesh Network Products Battelle AoA Evaluation Report on Military Mesh Network Products
Battelle AoA Evaluation Report on Military Mesh Network Products MeshDynamics
 
Storm (Distribute Stream Processing System)
Storm (Distribute Stream Processing System)Storm (Distribute Stream Processing System)
Storm (Distribute Stream Processing System)Majid Hajibaba
 
Cloud computing & service level agreements
Cloud computing & service level agreementsCloud computing & service level agreements
Cloud computing & service level agreementsCade Zvavanjanja
 

Destaque (20)

Cloud Computing Principles and Paradigms: 3 enriching the integration as a se...
Cloud Computing Principles and Paradigms: 3 enriching the integration as a se...Cloud Computing Principles and Paradigms: 3 enriching the integration as a se...
Cloud Computing Principles and Paradigms: 3 enriching the integration as a se...
 
Cloud Computing Principles and Paradigms: 10 comet cloud-an autonomic cloud e...
Cloud Computing Principles and Paradigms: 10 comet cloud-an autonomic cloud e...Cloud Computing Principles and Paradigms: 10 comet cloud-an autonomic cloud e...
Cloud Computing Principles and Paradigms: 10 comet cloud-an autonomic cloud e...
 
Cloud Computing Principles and Paradigms: 11 t-systems cloud-based solutions ...
Cloud Computing Principles and Paradigms: 11 t-systems cloud-based solutions ...Cloud Computing Principles and Paradigms: 11 t-systems cloud-based solutions ...
Cloud Computing Principles and Paradigms: 11 t-systems cloud-based solutions ...
 
Cloud Computing Principles and Paradigms: 2 migration into a cloud
Cloud Computing Principles and Paradigms: 2 migration into a cloudCloud Computing Principles and Paradigms: 2 migration into a cloud
Cloud Computing Principles and Paradigms: 2 migration into a cloud
 
cloud computing, Principle and Paradigms: 1 introdution
cloud computing, Principle and Paradigms: 1 introdutioncloud computing, Principle and Paradigms: 1 introdution
cloud computing, Principle and Paradigms: 1 introdution
 
Cloud Mashup
Cloud MashupCloud Mashup
Cloud Mashup
 
Best Practices for Architecting in the Cloud - Jeff Barr
Best Practices for Architecting in the Cloud - Jeff BarrBest Practices for Architecting in the Cloud - Jeff Barr
Best Practices for Architecting in the Cloud - Jeff Barr
 
building_private_cloud_with_oss_for_scientific_environments-libre
building_private_cloud_with_oss_for_scientific_environments-librebuilding_private_cloud_with_oss_for_scientific_environments-libre
building_private_cloud_with_oss_for_scientific_environments-libre
 
Legal issues in cloud computing
Legal issues in cloud computingLegal issues in cloud computing
Legal issues in cloud computing
 
Presentation on Cloud Mashups
Presentation on Cloud MashupsPresentation on Cloud Mashups
Presentation on Cloud Mashups
 
Cloud Computing paradigm
Cloud Computing paradigmCloud Computing paradigm
Cloud Computing paradigm
 
AWS Webcast - Best Practices in Architecting for the Cloud
AWS Webcast - Best Practices in Architecting for the CloudAWS Webcast - Best Practices in Architecting for the Cloud
AWS Webcast - Best Practices in Architecting for the Cloud
 
High performance computing
High performance computingHigh performance computing
High performance computing
 
UMF Cloud Pilot: architecturing an IaaS offer for higher education
UMF Cloud Pilot: architecturing an IaaS offer for higher educationUMF Cloud Pilot: architecturing an IaaS offer for higher education
UMF Cloud Pilot: architecturing an IaaS offer for higher education
 
The Lean Lifecycle in the Cloud
The Lean Lifecycle in the CloudThe Lean Lifecycle in the Cloud
The Lean Lifecycle in the Cloud
 
Checklist for Competent Cloud Security Management
Checklist for Competent Cloud Security ManagementChecklist for Competent Cloud Security Management
Checklist for Competent Cloud Security Management
 
Kafka
KafkaKafka
Kafka
 
Battelle AoA Evaluation Report on Military Mesh Network Products
Battelle AoA Evaluation Report on Military Mesh Network Products Battelle AoA Evaluation Report on Military Mesh Network Products
Battelle AoA Evaluation Report on Military Mesh Network Products
 
Storm (Distribute Stream Processing System)
Storm (Distribute Stream Processing System)Storm (Distribute Stream Processing System)
Storm (Distribute Stream Processing System)
 
Cloud computing & service level agreements
Cloud computing & service level agreementsCloud computing & service level agreements
Cloud computing & service level agreements
 

Semelhante a 8 secure distributed data storage in cloud computing

Data Storage in Cloud computing
Data Storage in Cloud computingData Storage in Cloud computing
Data Storage in Cloud computingANUSUYA T K
 
Webinar: Compliance and Data Protection in the Big Data Age: MongoDB Security...
Webinar: Compliance and Data Protection in the Big Data Age: MongoDB Security...Webinar: Compliance and Data Protection in the Big Data Age: MongoDB Security...
Webinar: Compliance and Data Protection in the Big Data Age: MongoDB Security...MongoDB
 
1-160730050929.pptx dynamic hash table info
1-160730050929.pptx dynamic hash table info1-160730050929.pptx dynamic hash table info
1-160730050929.pptx dynamic hash table infoMdjunaidAli3
 
Mongo db 2.6_security_architecture
Mongo db 2.6_security_architectureMongo db 2.6_security_architecture
Mongo db 2.6_security_architectureMat Keep
 
gkkCloudtechnologyassociate(cta)day 2
gkkCloudtechnologyassociate(cta)day 2gkkCloudtechnologyassociate(cta)day 2
gkkCloudtechnologyassociate(cta)day 2Anne Starr
 
MongoDB.local Sydney: The Changing Face of Data Privacy & Ethics, and How Mon...
MongoDB.local Sydney: The Changing Face of Data Privacy & Ethics, and How Mon...MongoDB.local Sydney: The Changing Face of Data Privacy & Ethics, and How Mon...
MongoDB.local Sydney: The Changing Face of Data Privacy & Ethics, and How Mon...MongoDB
 
SACON - Beyond corp (Arnab Chattopadhayay)
SACON - Beyond corp (Arnab Chattopadhayay)SACON - Beyond corp (Arnab Chattopadhayay)
SACON - Beyond corp (Arnab Chattopadhayay)Priyanka Aash
 
Digital Ethics and Privacy in a GDPR World
Digital Ethics and Privacy in a GDPR WorldDigital Ethics and Privacy in a GDPR World
Digital Ethics and Privacy in a GDPR WorldMongoDB
 
Faster, Simpler, Better - MongoDB to the rescue
Faster, Simpler, Better - MongoDB to the rescue Faster, Simpler, Better - MongoDB to the rescue
Faster, Simpler, Better - MongoDB to the rescue MongoDB
 
MongoDB .local London 2019: New Encryption Capabilities in MongoDB 4.2: A Dee...
MongoDB .local London 2019: New Encryption Capabilities in MongoDB 4.2: A Dee...MongoDB .local London 2019: New Encryption Capabilities in MongoDB 4.2: A Dee...
MongoDB .local London 2019: New Encryption Capabilities in MongoDB 4.2: A Dee...MongoDB
 
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...IRJET Journal
 
Guide to security patterns for cloud systems and data security in aws and azure
Guide to security patterns for cloud systems and data security in aws and azureGuide to security patterns for cloud systems and data security in aws and azure
Guide to security patterns for cloud systems and data security in aws and azureAbdul Khan
 
dtechnClouologyassociatepart2
dtechnClouologyassociatepart2dtechnClouologyassociatepart2
dtechnClouologyassociatepart2Anne Starr
 
IRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm
IRJET- Secure Data Deduplication for Cloud Server using HMAC AlgorithmIRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm
IRJET- Secure Data Deduplication for Cloud Server using HMAC AlgorithmIRJET Journal
 
Cloud security issues and concerns
Cloud security   issues and concernsCloud security   issues and concerns
Cloud security issues and concernsMrinal Baowaly
 
Lecture27 cc-security2
Lecture27 cc-security2Lecture27 cc-security2
Lecture27 cc-security2Ankit Gupta
 
AppGate: Achieving Compliance in the Cloud
AppGate: Achieving Compliance in the CloudAppGate: Achieving Compliance in the Cloud
AppGate: Achieving Compliance in the CloudCryptzone
 

Semelhante a 8 secure distributed data storage in cloud computing (20)

Data Storage in Cloud computing
Data Storage in Cloud computingData Storage in Cloud computing
Data Storage in Cloud computing
 
Cc chap-8
Cc chap-8Cc chap-8
Cc chap-8
 
Webinar: Compliance and Data Protection in the Big Data Age: MongoDB Security...
Webinar: Compliance and Data Protection in the Big Data Age: MongoDB Security...Webinar: Compliance and Data Protection in the Big Data Age: MongoDB Security...
Webinar: Compliance and Data Protection in the Big Data Age: MongoDB Security...
 
1-160730050929.pptx dynamic hash table info
1-160730050929.pptx dynamic hash table info1-160730050929.pptx dynamic hash table info
1-160730050929.pptx dynamic hash table info
 
LDSS for mobile cloud
LDSS for mobile cloud  LDSS for mobile cloud
LDSS for mobile cloud
 
Mongo db 2.6_security_architecture
Mongo db 2.6_security_architectureMongo db 2.6_security_architecture
Mongo db 2.6_security_architecture
 
gkkCloudtechnologyassociate(cta)day 2
gkkCloudtechnologyassociate(cta)day 2gkkCloudtechnologyassociate(cta)day 2
gkkCloudtechnologyassociate(cta)day 2
 
MongoDB.local Sydney: The Changing Face of Data Privacy & Ethics, and How Mon...
MongoDB.local Sydney: The Changing Face of Data Privacy & Ethics, and How Mon...MongoDB.local Sydney: The Changing Face of Data Privacy & Ethics, and How Mon...
MongoDB.local Sydney: The Changing Face of Data Privacy & Ethics, and How Mon...
 
SACON - Beyond corp (Arnab Chattopadhayay)
SACON - Beyond corp (Arnab Chattopadhayay)SACON - Beyond corp (Arnab Chattopadhayay)
SACON - Beyond corp (Arnab Chattopadhayay)
 
Digital Ethics and Privacy in a GDPR World
Digital Ethics and Privacy in a GDPR WorldDigital Ethics and Privacy in a GDPR World
Digital Ethics and Privacy in a GDPR World
 
Faster, Simpler, Better - MongoDB to the rescue
Faster, Simpler, Better - MongoDB to the rescue Faster, Simpler, Better - MongoDB to the rescue
Faster, Simpler, Better - MongoDB to the rescue
 
MongoDB .local London 2019: New Encryption Capabilities in MongoDB 4.2: A Dee...
MongoDB .local London 2019: New Encryption Capabilities in MongoDB 4.2: A Dee...MongoDB .local London 2019: New Encryption Capabilities in MongoDB 4.2: A Dee...
MongoDB .local London 2019: New Encryption Capabilities in MongoDB 4.2: A Dee...
 
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...
 
Guide to security patterns for cloud systems and data security in aws and azure
Guide to security patterns for cloud systems and data security in aws and azureGuide to security patterns for cloud systems and data security in aws and azure
Guide to security patterns for cloud systems and data security in aws and azure
 
dtechnClouologyassociatepart2
dtechnClouologyassociatepart2dtechnClouologyassociatepart2
dtechnClouologyassociatepart2
 
Ppt 1
Ppt 1Ppt 1
Ppt 1
 
IRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm
IRJET- Secure Data Deduplication for Cloud Server using HMAC AlgorithmIRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm
IRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm
 
Cloud security issues and concerns
Cloud security   issues and concernsCloud security   issues and concerns
Cloud security issues and concerns
 
Lecture27 cc-security2
Lecture27 cc-security2Lecture27 cc-security2
Lecture27 cc-security2
 
AppGate: Achieving Compliance in the Cloud
AppGate: Achieving Compliance in the CloudAppGate: Achieving Compliance in the Cloud
AppGate: Achieving Compliance in the Cloud
 

Último

Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 

Último (20)

Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 

8 secure distributed data storage in cloud computing

  • 1. 2 December 2012 Cloud Computing - Part II 1 8-SECURE DISTRIBUTED DATA STORAGE IN CLOUD COMPUTING Cloud Computing Principles and Paradigms Presented by Majid Hajibaba
  • 2. 2 December 2012 Cloud Computing - Part II Introduction • Data Storage • Distributed Storage • Considerations • unique issues • specific security requirements not been well-defined • Concerns about data in cloud • Privacy • Integrity Presented by Majid Hajibaba 2
  • 3. 2 December 2012 Cloud Computing - Part II Cloud Storage • Distributed Storage • Types • SAN • NAS • Reliability • Security • Integrity • LAN • same authority • WAN • different authorities Presented by Majid Hajibaba 3
  • 4. 2 December 2012 Cloud Computing - Part II Amazon’s Web Service Presented by Majid Hajibaba 4
  • 5. 2 December 2012 Cloud Computing - Part II Microsoft Windows Azure Presented by Majid Hajibaba 5
  • 6. 2 December 2012 Cloud Computing - Part II Google App Engine (GAE) Presented by Majid Hajibaba 6
  • 7. 2 December 2012 Cloud Computing - Part II Vulnerabilities • Confidentiality • Integrity • Repudiation • Missing link between download and upload • Upload-to-Download Integrity • Repudiation Between Users and Service Providers Presented by Majid Hajibaba 7
  • 8. 2 December 2012 Cloud Computing - Part II Solutions for missing link • Third authority certified (TAC) • Secret key sharing technique (SKS) • Solutions • Neither TAC nor SKS • With SKS but without TAC • With TAC but without SKS • With Both TAC and SKS Presented by Majid Hajibaba 8
  • 9. 2 December 2012 Cloud Computing - Part II 9 Neither TAC nor SKS • Uploading Session 1. User: Sends data to service provider with MD5 checksum and MD5 Signature by User (MSU). 2. Service Provider: Verifies the data with MD5 checksum, if it is valid, the service provider sends back the MD5 and MD5 Signature by Provider (MSP) to user. 3. MSU is stored at the user side, and MSP is stored at the service provider side. • Downloading Session 1. User: Sends request to service provider with authentication code. 2. Service Provider: Verifies the request identity, if it is valid, the service provider sends back the data with MD5 checksum and MD5 Signature by Provider (MSP) to user. 3. User verifies the data using the MD5 checksum. Presented by Majid Hajibaba
  • 10. 2 December 2012 Cloud Computing - Part II 10 With SKS but without TAC • Uploading Session 1. User: Sends data to service provider with MD checksum 5. 2. Service Provider: Verifies the data with MD5 checksum, if it is valid, the service provider sends back the MD5 checksum. 3. The service provider and the user share the MD5 checksum with SKS. • Downloading Session • User: Sends request to the service provider with authentication code. • Service Provider: Verifies the request identity, if it is valid, the service provider sends back the data with MD5 checksum. • User verifies the data through the MD5 checksum. Presented by Majid Hajibaba
  • 11. 2 December 2012 Cloud Computing - Part II 11 With TAC but without SKS • Uploading Session 1. User: Sends data to the service provider along with MD5 checksum and MD5 Signature by User (MSU). 2. Service Provider: Verifies the data with MD5 checksum, if it is valid, the service provider sends back the MD5 checksum and MD5 Signature by Provider (MSP) to the user. 3. MSU and MSP are sent to TAC. • Downloading Session 1. User: Sends request to the service provider with authentication code. 2. Service Provider: Verifies the request with identity, if it is valid, the service provider sends back the data with MD5 checksum. 3. User verifies the data through the MD5 checksum. Presented by Majid Hajibaba
  • 12. 2 December 2012 Cloud Computing - Part II 12 With Both TAC and SKS • Uploading Session 1. User: Sends data to the service provider with MD5 checksum. 2. Service Provider: verifies the data with MD5 checksum. 3. Both the user and the service provider send MD5 checksum to TAC. 4. TAC verifies the two MD5 checksum values. If they match, the TAC distributes MD5 to the user and the service provider by SKS. • Downloading Session 1. User: Sends request to the service provider with authentication code. 2. Service Provider: Verifies the request identity, if it is valid, the service provider sends back the data with MD5 checksum. 3. User verifies the data through the MD5 checksum Presented by Majid Hajibaba
  • 13. 2 December 2012 Cloud Computing - Part II 13 TECHNOLOGIES FOR DATA SECURITY IN CLOUD COMPUTING • Database Outsourcing and Query Integrity Assurance • Data Integrity in Untrustworthy Storage • Web-Application-Based Security • Multimedia Data Security Presented by Majid Hajibaba
  • 14. 2 December 2012 Cloud Computing - Part II 14 TECHNOLOGIES FOR DATA SECURITY IN CLOUD COMPUTING • Database Outsourcing and Query Integrity Assurance • Data Integrity in Untrustworthy Storage • Web-Application-Based Security • Multimedia Data Security Presented by Majid Hajibaba
  • 15. 2 December 2012 Cloud Computing - Part II Database Outsourcing • Security Concern • Data privacy • Hacigumus et al. • Agrawal et al. • Query integrity • Correct and Complete • Merkle hash tree Presented by Majid Hajibaba 15
  • 16. 2 December 2012 Cloud Computing - Part II 16 TECHNOLOGIES FOR DATA SECURITY IN CLOUD COMPUTING • Database Outsourcing and Query Integrity Assurance • Data Integrity in Untrustworthy Storage • Web-Application-Based Security • Multimedia Data Security Presented by Majid Hajibaba
  • 17. 2 December 2012 Cloud Computing - Part II 17 Data Integrity in Untrustworthy Storage • Remote data storage possession checking protocol • Requirements 1. Partial copy of the data 2. Robust protocol 3. High communication overhead 4. Computationally efficient 5. Unlimited verification • Technologies • A PDP-Based Integrity Checking Protocol • An Enhanced Data Possession Checking Protocol Presented by Majid Hajibaba
  • 18. 2 December 2012 Cloud Computing - Part II 18 A PDP-Based Integrity Checking Protocol Presented by Majid Hajibaba
  • 19. 2 December 2012 Cloud Computing - Part II 19 A PDP-Based Integrity Checking Protocol Presented by Majid Hajibaba
  • 20. 2 December 2012 Cloud Computing - Part II 20 An Enhanced Data Possession Checking Protocol • Enhance PDP-based protocol • Satisfy Requirement #2 with 100% probability • Computationally more efficient • Verification time has been shortened • Trade-offs between • the computation times required by the prover • the storage required at the verifier Presented by Majid Hajibaba
  • 21. 2 December 2012 Cloud Computing - Part II 21 TECHNOLOGIES FOR DATA SECURITY IN CLOUD COMPUTING • Database Outsourcing and Query Integrity Assurance • Data Integrity in Untrustworthy Storage • Web-Application-Based Security • Multimedia Data Security Presented by Majid Hajibaba
  • 22. 2 December 2012 Cloud Computing - Part II 22 Web-Application-Based Security • Web attack techniques • Authentication • Brute force, Insufficient Authentication, Weak password recovery • Authorization • Insufficient Authorization, Session attacks • Client-Side Attacks • Content Spoofing, XSS, CSRF • Command Execution • Like code injection or denial of service via buffer overflow • Information Disclosure • Path Traversal • Logical Attacks • DoS attack Presented by Majid Hajibaba
  • 23. 2 December 2012 Cloud Computing - Part II 23 TECHNOLOGIES FOR DATA SECURITY IN CLOUD COMPUTING • Database Outsourcing and Query Integrity Assurance • Data Integrity in Untrustworthy Storage • Web-Application-Based Security • Multimedia Data Security Presented by Majid Hajibaba
  • 24. 2 December 2012 Cloud Computing - Part II Multimedia Data Security • Protection from Unauthorized Replication • Advantage • improve system performance • Disadvantage • contents copyright • waste of replication cost • extra control overheads • Protection from Unauthorized Replacement • Limited storage capacity • Remove stored content to make space • Protection from Unauthorized Pre-fetching • Just pre-fetch necessary content Presented by Majid Hajibaba 24
  • 25. 2 December 2012 Cloud Computing - Part II 25 Concerns at Different Levels • The cloud infrastructure providers (back-end) • The cloud service providers • The cloud consumers (front-end) • Application developer • End user Presented by Majid Hajibaba
  • 26. 2 December 2012 Cloud Computing - Part II Challenges • Technical • Open security profiling • Remote control • Security compliance with standards • Certificates • Non-Technical • User’s fear of losing control Presented by Majid Hajibaba 26
  • 27. 2 December 2012 Cloud Computing - Part II END Secure Distributed Data Storage In Cloud Computing 27

Notas do Editor

  1. One of the core services provided by cloud computing is data storage. This poses new challenges in creating secure and reliable data storage and access facilities over remote service providers in the cloud.The benefits of network-based applications have led to the transition from server-attached storage to distributed storage.One consideration is that the unique issues associated with cloud computing security have not been recognized.Another consideration is that the specific security requirements for cloud computing have not been well-defined within the community.There are at least two concerns when using the cloud. One concern is that the users do not want to reveal their data to the cloud service provider. Forexample, the data could be sensitive information like medical records. Another concern is that the users are unsure about the integrity of the data theyreceive from the cloud. Therefore, within the cloud, more than conventional security mechanisms will be required for data security.
  2. Most designs of distributed storage take the form of either storage area networks (SANs) or network-attached storage (NAS) on the LAN levelFor SANs and NAS, the distributed storage nodes are managed by the same authority.The reliability of such systems is often achieved by redundancy, and the storage security is highly dependent on the security of the system against theattacks and intrusion from outsiders. The confidentiality and integrity of data are mostly achieved using robust cryptographic schemes.----------------------------------In WANnetworks under different authorities.the activity of the medium owner is not controllable to the data owner.In normal network-based applications, user authentication, data confidentiality, and data integrity can be solved through IPSec proxy using encryption and digital signature.
  3. The user creates a manifest and signature file, e-mails the manifest file, and ships the storage device attached with signature file. When Amazon receives these two files, it will validate the two files, copy the data into the storage device, ship it back, and e-mail to the user with the status including the MD5 checksum of the data. Amazon claims that the maximum security is obtained via SSL endpoints.Storage services that accept a large amount of data (>1 TB) normally adopt strategies that help make the shipment more convenient, just as the Amazon AWS does.
  4. To use Windows Azure Storage service, a user needs to create a storage account, which can be obtained from the Windows Azure portal web interface. After creating an account, the user will receive a 256-bit secret key. Each time when the user wants to send the data to or fetch the data from the cloud, the user has to use his secret key to create a HMAC SHA256 signature for each individual request for identification. Then the user uses his signature to authenticate request at server. The signature is passed with each request to authenticate the user requests by verifying the HMAC signature.smaller data amount (<50 GB) allow the data to be uploaded or downloaded via the Internet, just as the Azure Storage Service does.
  5. Figure 8.5 is one of the secure services, called Google Secure Data Connector (SDC), based on GAE [9]. The SDC constructs an encrypted connection between the data source and Google Apps. As long as the data source is in the Google Apps domain to the Google tunnel protocol servers, when the user wants to get the data, he/she will first send an authorized data requests to Google Apps, which forwards the request to the tunnel server. The tunnel servers validate the request identity. If the identity is valid, the tunnel protocol allows the SDC to set up a connection, authenticate, and encrypt the data that flows across the Internet. At the same time, the SDC uses resource rules to validate whether a user is authorized to access a specified resource. When the request is valid, the SDC performs a network request. The server validates the signed request, checks the credentials, and returns the data if the user is authorized.
  6. from the perspective of cloud storage services, data integrity depends on the security of operations while in storage in addition to the security of the uploading and downloading sessions.Uploading and downloading is provided by sending MD5 checksum.-------------------Confidentiality can be achieved by adopting robust encryption schemes. However, the integrity and repudiation issues are not handled well on the current cloud service platform.One-way SSL session only guarantees one-way integrity.------------------------There is no mechanism for the user or service provider to check whether the record has been modified in the cloud storage.
  7. four solutions to bridge the missing link of data integrity between the uploading and downloading procedures.
  8. Once the uploading operation finished, both sides agreed on the integrity of the uploaded data, and each side owns the MD5 checksum and MD5 signature generated by the opposite site.--------------------------------------------When disputation happens, the user or the service provider can check the MD5 checksum and the signature of MD5 checksum generated by the opposite side to prove its innocence.
  9. both sides agree on the integrity of the uploaded data, and they share the agreed MD5 checksum, which is used when disputation happens.When disputation happens, the user or the service provider can take the shared MD5 together, recover it, and prove his/her innocence
  10. On finishing the uploading phase, both sides agree on the integrity of the uploaded data, and TAC owns their agreed MD5 signature.When disputation happens, the user or the service provider can prove his innocence by presenting the MSU and MSP stored at the TAC.
  11. Both sides agree on the integrity of the uploaded data and share the same MD5 checksum by SKS, and the TAC own their agreed MD5 signaturesWhen disputation happens, the user or the service provider can prove their innocence by checking the shared MD5 checksum together. If the disputation cannot be resolved, they can seek further help from the TAC for the MD5 checksum.
  12. unique requirements for cloud computing data security from a few different perspectives.--------------------------------------1-Storing data into and fetching data from devices and machines behind a cloud are essentially a novel form of database outsourcing.2-One of the main challenges that prevent end users from adopting cloud storage services is the fear of losing data or data corruption. It is critical to relieve the users’ fear by providing technologies that enable users to check the integrity of their data. Section 8.3.2 presents two approaches that allow users to detect whether the data has been touched by unauthorized people.3-Once the dataset is stored remotely, a Web browser is one of the most convenient approaches that end users can use to access their data on remote services. In the era of cloud computing, Web security plays a more important role than ever.4-With the development of high-speed network technologies and large bandwidth connections, more and more multimedia data are being stored and shared in cyber space. The security requirements for video, audio, pictures, or images are different from other applications.
  13. Storing data into and fetching data from devices and machines behind a cloud are essentially a novel form of database outsourcing.
  14. For data privacy protection there is a method to execute SQL queries over encrypted databases. This method is to process as much of a query as possible by the service providers, without having to decrypt the data. Decryption and the remainder of the query processing are performed at the client side.Another method proposed an order-preserving encryption scheme for numeric values that allows any comparison operation to be directly applied on encrypted data. Their technique is able to handle updates, and new values can be added without requiring changes in the encryption of other values.----------------------------------------------------When a client receives a query result from the service provider, it wants to be assured that the result is both correct and complete, where correct means that the result must originate in the owner’s data and not has been tampered with, and complete means that the result includes all records satisfying the query.In some methods, the network and CPU overhead on the client side can be prohibitively high for some types of queries. In some extreme cases, the overhead could be as high as processing these queries locally.
  15. One of the main challenges that prevent end users from adopting cloud storage services is the fear of losing data or data corruption. It is critical to relieve the users’ fear by providing technologies that enable users to check the integrity of their data. Section 8.3.2 presents two approaches that allow users to detect whether the data has been touched by unauthorized people.
  16. This section introduces two technologies to enable data owners to verify the data integrity while the files are stored in the remote untrustworthy storage services.---------------that the verifier could be either the data owner or a trusted third party, and the prover could be the storage service provider or storage medium owner or system administrator.---------------A remote data storage possession checking protocol has to satisfy the following five requirements:It should not be a pre-requirement that the verifier has to possess a complete copy of the data to be checked. And in practice, it does not make sense for a verifier to keep a duplicated copy of the content to be verified. As long as it serves the purpose well, storing a more concise contents digest of the data at the verifier should be enough.The protocol has to be very robust considering the untrustworthy prover. A malicious prover is motivated to hide the violation of data integrity. The protocol should be robust enough that such a prover ought to fail in convincing the verifier.The amount of information exchanged during the verification operation should not lead to high communication overhead. The protocol should be computationally efficient.It ought to be possible to run the verification an unlimited number of times
  17. A protocol based on the provable data procession (PDP) technology.One of the advantages of this protocol is that the proof could be generated by the storage service provider by accessing only a small portion of the whole dataset.-------------------------------The data owner, the client in the figure, executes the protocol to verify that a dataset is stored in an outsourced storage machine as a collection of n blocks. Before uploading the data into the remote storage, the data owner pre-processes the dataset and a piece of metadata is generated. The metadata are stored at the data owner’s side, and the dataset will be transmitted to the storage server. The cloud storage service stores the dataset and sends the data to the user in responding to queries from the data owner in the future.
  18. During the time that data are stored in the cloud, the data owner can generate a “challenge” and send it to the service provider to ensure that the storage server has stored the dataset. The data owner requests that the storage server generate a metadata based on the stored data and then send it back. Using the previously stored local metadata, the owner verifies the response.Hence, the PDP scheme probabilistically guarantees the data integrity. It is mandatory to access the whole dataset if a deterministic guarantee is required by the user.
  19. PDP-based protocol does not satisfy Requirement #2 with 100% probability.It is claimed that this protocol satisfies all five requirements and is computationally more efficient than the PDP-based protocol The verification time has been shortened at the setup stage by taking advantage of the trade-offs between the computation times required by the prover and the storage required at the verifier.
  20. Once the dataset is stored remotely, a Web browser is one of the most convenient approaches that end users can use to access their data on remote services. In the era of cloud computing, Web security plays a more important role than ever.
  21. The Web site server Is the first gate that guards the vast cloud resources.Authentication is the process of verifying a claim that a subject made to act on behalf of a given principal.Authorization is used to verify if an authenticated subject can perform a certain operation.Client-Side Attacks lure victims to click a link in a malicious Web page and then leverage the trust relationship expectations of the victim for the real Web siteCommand Execution attacks exploit server-side vulnerabilities to execute remote commands on the Web site.Information Disclosure attacks acquire sensitive information about a web site revealed by developer comments, error messages, or well-know file name conventions.Logical Attacks involve the exploitation of a Web application’s logic flow.
  22. With the development of high-speed network technologies and large bandwidth connections, more and more multimedia data are being stored and shared in cyber space. The security requirements for video, audio, pictures, or images are different from other applications.
  23. Although the replication can improve the system performance, the unauthorized replication causes some problems such as contents copyright, waste of replication cost, and extra control overheads.As the storage capacity is limited, a replacement process must be carried out when the capacity exceeds its limit.The Pre-fetching is widely deployed in Multimedia Storage Network Systems between server databases and end users’ storage disks.
  24. From the perspective of cloud consumers, normally who are the data owners, the concerns are essentially raised from the loss of control when the data are in a cloud.From the perspective of the cloud service providers, the main concern with regard to protecting users’ data is the transfer of data from devices and servers within the control of the users to its own devices and subsequently to those of the cloud infrastructure, where the data is stored.The infrastructure provider knows that a single point of failure in its infrastructure security mechanisms would allow hackers.How are the data stored in its physical devices protected?How does the cloud infrastructure manage the backup of data, and the destruction of outdated data, at its site?How can the cloud infrastructure control access to its physical devices and the images stored on those devices?
  25. Open security profiling of services that is available to end users and verifiable automatically. Service providers need to disclose in detail the levels of specific security properties rather than providing blanket assurances of “secure” services.The cloud service/infrastructure providers are required to enable end users to remotely control their virtual working platforms in the cloud and monitor others’ access to their data. This includes the capability of finegrained accessing controls on their own data, no matter where the data files are stored and processed. In addition, it is ideal to possess the capability of restricting any unauthorized third parties from manipulating users’ data, including the cloud service provider, as well as cloud infrastructure providers.Security compliance with existing standards could be useful to enhance cloud security. There must be consistency between the security requirements and/or policies of service consumers and the security assurances of cloud providers.It is mandatory for the providers to ensure that software is as secure as they claim. These assurances may include certification of the security of the systems in question. A certificate—issued after rigorous testing according to agreed criteria (e.g., ISO/IEC 15408)—can ensure the degree of reliability of software in different configurations and environments as claimed by the cloud providers.