SlideShare a Scribd company logo
Access Control and Encryption in Cloud EnvironmentsJames WernickeNew Mexico TechDepartment of Computer Science & EngineeringA Designated Center of Academic Excellence in Information Assurance by the National Security Agency
TerminologyAccess control:A system which enables an authority to control access to areas and resources in a given physical facility or computer-based information systemEncryption:The process of transforming information (“plaintext”) using an algorithm (“cipher”) to make it unreadable to anyone except those possessing special knowledge (“key”).Cloud:Computing system where shared resources, software, and information are provided to computers and other devices on demand like the electricity grid.A Designated Center of Academic Excellence in Information Assurance by the National Security Agency- 2 -
MotivationOrganizations no longer need to control the computing infrastructure that supports them. They just need a place to store, access, and manipulate their data.The usual cryptographic methods are limiting, inflexible, and don’t scale well.Access management has always been done internally.Research related to this semester’s projectsA Designated Center of Academic Excellence in Information Assurance by the National Security Agency- 3 -
ScenariosOutsourcing computations on sensitive dataQuerying large sets of encrypted dataElectronic votingSearch engine privacyTrend analysis on personal informationA Designated Center of Academic Excellence in Information Assurance by the National Security Agency- 4 -
Boolean CircuitsA series of additions and multiplicationsAny computation can be expressed as a series of Boolean circuits.Sooo…Computations are just series of additions and multiplications.A Designated Center of Academic Excellence in Information Assurance by the National Security Agency- 5 -
HomomorphismAddition and multiplication operations can be performed before or after a function is applied with the same results.f(a+b) = f(a) + f(b)f(ab) = f(a) * f(b)What does this mean for encryption?Operations on ciphertext produce a result which, when deciphered, produces the same result as the same operations on the plaintextA Designated Center of Academic Excellence in Information Assurance by the National Security Agency- 6 -
DES/AES EncryptionNot homomorphic at allEncrypt P to get C, multiply C by 2, decrypt 2C, get some gibberishA Designated Center of Academic Excellence in Information Assurance by the National Security Agency- 7 -
RSA EncryptionMultiplicatively homomorphicEncrypt P to get C, multiply C by 2, decrypt 2C, get 2PThis isn’t really helpful unless we just want to do a bunch of multiplicationsA Designated Center of Academic Excellence in Information Assurance by the National Security Agency- 8 -
Gentry’s Homomorphic EncryptionFully homomorphicEncrypt P to get C, do an arbitrary number of additions and multiplications on C to get C′, decrypt C′, get P′Awesome… in theoryA Designated Center of Academic Excellence in Information Assurance by the National Security Agency- 9 -
LimitationsEncrypted Google search takes one trillion times longerNumber of multiplications needs to be fixed when public key is generatedNeed to know what to compute before encryptingA Designated Center of Academic Excellence in Information Assurance by the National Security Agency- 10 -
Access ControlAttribute-based managementTraditionally, server authenticates userData now distributed across many serversMore servers
More chance of compromiseA Designated Center of Academic Excellence in Information Assurance by the National Security Agency- 11 -
Ciphertext-Policy Attribute-Based Encryption (CP-ABE)Access policy associated with ciphertextPrivate keys associated with attributesSo why is this good?Encryptor enforces access policy, not server
Data can be decrypted by more than one userCollusion resistanceA Designated Center of Academic Excellence in Information Assurance by the National Security Agency- 12 -
ConclusionsMore research into fully homomorphic encryption could revolutionize the way cloud services are utilized for sensitive data.CP-ABE can provide a new approach to managing access control on untrusted servers.A Designated Center of Academic Excellence in Information Assurance by the National Security Agency- 13 -

More Related Content

What's hot (19)

PDF
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...
IRJET Journal
 
PPTX
Tees an efficient search scheme over
Kumar Dlk
 
DOCX
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Fuzzy keyword search over
IEEEMEMTECHSTUDENTPROJECTS
 
PDF
A lightweight secure scheme for detecting provenance forgery and packet drop ...
Pvrtechnologies Nellore
 
PDF
Hybrid Security Network for Cloud Information Centre (HSNIC)
Peace Asukwo
 
PDF
Threat Modeling of Cloud based Implementation of Homomorphic Encryption
ijcisjournal
 
PDF
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
IRJET Journal
 
PDF
Search on encrypted data
SELASI OCANSEY
 
PDF
AN EFFICIENT FILE HIERARCHY ATTRIBUTE-BASED ENCRYPTION SCHEME IN CLOUD COMPUT...
Nexgen Technology
 
PDF
A SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHY
csandit
 
DOCX
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT A privacy leakage upper bound constra...
IEEEGLOBALSOFTTECHNOLOGIES
 
PDF
IRJET- Study and Performance Evaluation of Different Symmetric Key Crypto...
IRJET Journal
 
DOCX
privacy preserving multi keyword ranked search over encrypted cloud data
swathi78
 
PPTX
Privacy preserving multi-keyword ranked search over encrypted cloud data
IGEEKS TECHNOLOGIES
 
PDF
IRJET- Secure File Storage on Cloud using Cryptography
IRJET Journal
 
PDF
Enabling efficient multi keyword ranked
Sakthi Sundaram
 
PDF
Improving Data Storage Security in Cloud using Hadoop
IJERA Editor
 
PPTX
Fog computing
SaikiranK15
 
PDF
Enhanced Efficient & Secure Steganography Algorithm with Low Distortion
IRJET Journal
 
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...
IRJET Journal
 
Tees an efficient search scheme over
Kumar Dlk
 
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Fuzzy keyword search over
IEEEMEMTECHSTUDENTPROJECTS
 
A lightweight secure scheme for detecting provenance forgery and packet drop ...
Pvrtechnologies Nellore
 
Hybrid Security Network for Cloud Information Centre (HSNIC)
Peace Asukwo
 
Threat Modeling of Cloud based Implementation of Homomorphic Encryption
ijcisjournal
 
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
IRJET Journal
 
Search on encrypted data
SELASI OCANSEY
 
AN EFFICIENT FILE HIERARCHY ATTRIBUTE-BASED ENCRYPTION SCHEME IN CLOUD COMPUT...
Nexgen Technology
 
A SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHY
csandit
 
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT A privacy leakage upper bound constra...
IEEEGLOBALSOFTTECHNOLOGIES
 
IRJET- Study and Performance Evaluation of Different Symmetric Key Crypto...
IRJET Journal
 
privacy preserving multi keyword ranked search over encrypted cloud data
swathi78
 
Privacy preserving multi-keyword ranked search over encrypted cloud data
IGEEKS TECHNOLOGIES
 
IRJET- Secure File Storage on Cloud using Cryptography
IRJET Journal
 
Enabling efficient multi keyword ranked
Sakthi Sundaram
 
Improving Data Storage Security in Cloud using Hadoop
IJERA Editor
 
Fog computing
SaikiranK15
 
Enhanced Efficient & Secure Steganography Algorithm with Low Distortion
IRJET Journal
 

Similar to Access Control & Encryption In Cloud Environments (20)

PPTX
Cyber security workshop talk.pptx
kamalakantas
 
PDF
CNIT 141: 1. Encryption
Sam Bowne
 
PDF
Homomorphic encryption algorithms and schemes for secure computations in the ...
MajedahAlkharji
 
PDF
CNIT 141: 1. Encryption
Sam Bowne
 
PDF
CNIT 141: 1. Encryption
Sam Bowne
 
PDF
CNIT 141: 1. Encryption
Sam Bowne
 
PPTX
Homomorphic Encryption: Unveiling secrets without exposing them
MuhammedYaseen39
 
DOCX
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
CloudTechnologies
 
PDF
Attribute-Based Encryption for Access of Secured Data in Cloud Storage
IJSRD
 
PDF
3.0 UNIT-3_Summary about total detail description.pdf
mishrarajimsec
 
PDF
Threat Modeling of Cloud based Implementation of Homomorphic Encryption
ijcisjournal2
 
PDF
262 265
Editor IJARCET
 
PDF
A Survey of the Homomorphic Encryption Approach for Data Security in Cloud Co...
Patel Dasharathbhai
 
PDF
KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUD
Naseem nisar
 
PDF
Cyber Threats Are Rising—Is Your Data Safe Without Encryption.pdf
Enterprise world
 
PPTX
Computer Introduction (Data Encryption)-Lecture05
Dr. Mazin Mohamed alkathiri
 
PDF
Ieeepro techno solutions 2014 ieee java project -key-aggregate cryptosystem...
hemanthbbc
 
PDF
Ieeepro techno solutions 2014 ieee dotnet project -key-aggregate cryptosyst...
ASAITHAMBIRAJAA
 
DOCX
Cryptography- "A Black Art"
Aditya Raina
 
PPTX
How to write secure code
Flaskdata.io
 
Cyber security workshop talk.pptx
kamalakantas
 
CNIT 141: 1. Encryption
Sam Bowne
 
Homomorphic encryption algorithms and schemes for secure computations in the ...
MajedahAlkharji
 
CNIT 141: 1. Encryption
Sam Bowne
 
CNIT 141: 1. Encryption
Sam Bowne
 
CNIT 141: 1. Encryption
Sam Bowne
 
Homomorphic Encryption: Unveiling secrets without exposing them
MuhammedYaseen39
 
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
CloudTechnologies
 
Attribute-Based Encryption for Access of Secured Data in Cloud Storage
IJSRD
 
3.0 UNIT-3_Summary about total detail description.pdf
mishrarajimsec
 
Threat Modeling of Cloud based Implementation of Homomorphic Encryption
ijcisjournal2
 
A Survey of the Homomorphic Encryption Approach for Data Security in Cloud Co...
Patel Dasharathbhai
 
KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUD
Naseem nisar
 
Cyber Threats Are Rising—Is Your Data Safe Without Encryption.pdf
Enterprise world
 
Computer Introduction (Data Encryption)-Lecture05
Dr. Mazin Mohamed alkathiri
 
Ieeepro techno solutions 2014 ieee java project -key-aggregate cryptosystem...
hemanthbbc
 
Ieeepro techno solutions 2014 ieee dotnet project -key-aggregate cryptosyst...
ASAITHAMBIRAJAA
 
Cryptography- "A Black Art"
Aditya Raina
 
How to write secure code
Flaskdata.io
 
Ad

Access Control & Encryption In Cloud Environments

  • 1. Access Control and Encryption in Cloud EnvironmentsJames WernickeNew Mexico TechDepartment of Computer Science & EngineeringA Designated Center of Academic Excellence in Information Assurance by the National Security Agency
  • 2. TerminologyAccess control:A system which enables an authority to control access to areas and resources in a given physical facility or computer-based information systemEncryption:The process of transforming information (“plaintext”) using an algorithm (“cipher”) to make it unreadable to anyone except those possessing special knowledge (“key”).Cloud:Computing system where shared resources, software, and information are provided to computers and other devices on demand like the electricity grid.A Designated Center of Academic Excellence in Information Assurance by the National Security Agency- 2 -
  • 3. MotivationOrganizations no longer need to control the computing infrastructure that supports them. They just need a place to store, access, and manipulate their data.The usual cryptographic methods are limiting, inflexible, and don’t scale well.Access management has always been done internally.Research related to this semester’s projectsA Designated Center of Academic Excellence in Information Assurance by the National Security Agency- 3 -
  • 4. ScenariosOutsourcing computations on sensitive dataQuerying large sets of encrypted dataElectronic votingSearch engine privacyTrend analysis on personal informationA Designated Center of Academic Excellence in Information Assurance by the National Security Agency- 4 -
  • 5. Boolean CircuitsA series of additions and multiplicationsAny computation can be expressed as a series of Boolean circuits.Sooo…Computations are just series of additions and multiplications.A Designated Center of Academic Excellence in Information Assurance by the National Security Agency- 5 -
  • 6. HomomorphismAddition and multiplication operations can be performed before or after a function is applied with the same results.f(a+b) = f(a) + f(b)f(ab) = f(a) * f(b)What does this mean for encryption?Operations on ciphertext produce a result which, when deciphered, produces the same result as the same operations on the plaintextA Designated Center of Academic Excellence in Information Assurance by the National Security Agency- 6 -
  • 7. DES/AES EncryptionNot homomorphic at allEncrypt P to get C, multiply C by 2, decrypt 2C, get some gibberishA Designated Center of Academic Excellence in Information Assurance by the National Security Agency- 7 -
  • 8. RSA EncryptionMultiplicatively homomorphicEncrypt P to get C, multiply C by 2, decrypt 2C, get 2PThis isn’t really helpful unless we just want to do a bunch of multiplicationsA Designated Center of Academic Excellence in Information Assurance by the National Security Agency- 8 -
  • 9. Gentry’s Homomorphic EncryptionFully homomorphicEncrypt P to get C, do an arbitrary number of additions and multiplications on C to get C′, decrypt C′, get P′Awesome… in theoryA Designated Center of Academic Excellence in Information Assurance by the National Security Agency- 9 -
  • 10. LimitationsEncrypted Google search takes one trillion times longerNumber of multiplications needs to be fixed when public key is generatedNeed to know what to compute before encryptingA Designated Center of Academic Excellence in Information Assurance by the National Security Agency- 10 -
  • 11. Access ControlAttribute-based managementTraditionally, server authenticates userData now distributed across many serversMore servers
  • 12. More chance of compromiseA Designated Center of Academic Excellence in Information Assurance by the National Security Agency- 11 -
  • 13. Ciphertext-Policy Attribute-Based Encryption (CP-ABE)Access policy associated with ciphertextPrivate keys associated with attributesSo why is this good?Encryptor enforces access policy, not server
  • 14. Data can be decrypted by more than one userCollusion resistanceA Designated Center of Academic Excellence in Information Assurance by the National Security Agency- 12 -
  • 15. ConclusionsMore research into fully homomorphic encryption could revolutionize the way cloud services are utilized for sensitive data.CP-ABE can provide a new approach to managing access control on untrusted servers.A Designated Center of Academic Excellence in Information Assurance by the National Security Agency- 13 -
  • 16. ReferencesHakala, David (2009-04-29). “The Top 10 Cloud Computing Trends”. Focus.com. Retrieved 2010-09-08.Danielson, Krissi (2008-03-26). “Distinguishing Cloud Computing from Utility Computing”. Ebizq.net. Retrieved 2010-09-08.Gentry, Craig (2009-05-31). “Fully Homomorphic Encryption Using Ideal Lattices”. STOC ‘09. Retrieved 2010-09-08.Prince, Brian (2009-06-25). “IBM Discovers Encryption Scheme That Could Improve Cloud Security, Spam Filtering”. eWeek.com. Retrieved 2010-09-08.“Practical Applications of Homomorphic Encryption Algorithms”. Stack Overflow. Retrieved 2010-09-08.Micciancio, Daniele (2010). “A First Glimpse At Cryptography’s Holy Grail”. Communications of the ACM. Retrieved 2010-09-08.Schneier, Bruce (2009-07-09). “Homomorphic Encryption Breakthrough”. Schneier on Security. Retrieved 2010-09-08.Cooney, Michael (2009-06-25). “IBM Touts Encryption Innovation”. Computerworld. Retrieved 2010-09-08.Martin, Luther (2009-07-24). “Gentry’s Homomorphic Encryption”. Voltage Security. Retrieved 2010-09-08.Ghalimi, Ismael (2009-10-11). “I Think There Is A World Market for Maybe Five Clouds”. IT Redux. Retrieved 2010-09-09.Bethencourt, John et al. “Ciphertext-Policy Attribute-Based Encryption”. Retrieved 2010-09-09.A Designated Center of Academic Excellence in Information Assurance by the National Security Agency- 14 -
  • 17. Questions?A Designated Center of Academic Excellence in Information Assurance by the National Security Agency- 15 -

Editor's Notes

  • #2: Good morning, everyone. Thanks for coming. My name is James Wernicke, and as part of my application for SFS, I’ll be giving a presentation today on access control and encryption in cloud environments.
  • #3: There are a few terms that we should be familiar with. When I talk about access control, I’m speaking about systems that control access specifically to data, networked resources, and physical locations. Encryption refers to the process of making information private between the sender and those authorized to view it. A cloud is a network of computers which, to the user, appear as one functional unit which is highly scalable for providing a number of services to many users simultaneously.
  • #4: There is a clear trend that organizations are shifting their IT resources to the cloud. We trust banks to keep our money secure while their customers come and go through their doors all day long. When we want our money, it’s available 24/7 through an ATM, debit card, or banking website. Likewise, datacenters are equipped to keep our data secure and make it available to us when we need it. However, there is still some room for improvement.Traditional cryptography doesn’t work that well in clouds. Sure, we can encrypt our data and store it on a public server, but as soon as we want to compute on that data, we have to download it to our local machine and decrypt it before we can do anything with it. This doesn’t work so well for large amounts of data.Traditional access management relies on firewalls, homogenous network environments, and system administrators to manage access control policies. In a cloud, firewalls are turned into swisscheese as users access their enterprise applications through the Internet from anywhere in the world on any device on any platform. Cloud users need a way to control access to their data that doesn’t require an in-house system administrator.
  • #5: Let’s say you have a bunch of classified data that needs to be processed. You want to use an unclassified compute cloud to do that processing without giving away the information within the encrypted data.You could also have a large encrypted database stored on a public server. Normally, you’d have to download the entire database and decrypt it to do any type of query on it. Instead, what if there was a way to do the query on the database server without revealing the information?It could also be used to collect and tally votes using encrypted data without knowing which votes are for who. Or imagine being able to do a search engine query without the search engine even knowing what you were searching for?
  • #6: All computing is based on boolean circuits. These are basically the mathematical building blocks for programs. So when we want to computer or manipulate data, we are basically just performing some set of additive and multiplicative operations, or boolean circuits.
  • #7: Homorphisms are a special type of function that has some interesting applications in cryptography. The unique property of homomorphisms is that the function can be applied before or after the additive or multiplicative operations are performed on the algebraic structures. What this means is that we can take ciphertext, perform some arbitrary number of operations on it, then decrypt the ciphertext and it would be the same as if we operated on the plaintext.
  • #8: With symmetric key encryption, there are no homomorphisms. If you could get 2P from 2C, there would certainly be some questions about the randomness, and the security, of your symmetric key encryption.
  • #9: RSA encryption is a partially homomorphic scheme, but only multiplicatively. Too bad we can’t really do anything interesting with this, though.
  • #10: In 2009, Craig Gentry announced a fully homomorphic encryption scheme using ideal lattices. This breakthrough allows complexcomputations to finally be performed on encrypted data and have the resulting ciphertext decrypted into something useful. But…
  • #11: Gentry’s scheme is not quite ready for primetime, though. For one, a program becomes exponentially more complex when converted into a series of additions and subtractions. Gentry himself said that the time to do a simple Google search is increased by a factor of one trillion. Another major issue is that his scheme requires that operations that will be done have to be known before encrypting the data. But still, his approach is still certainly an important breakthrough in cryptography.
  • #12: The other part of cloud security I want to talk about is access control. Encryption is great for keeping our data confidential, but we certainly don’t want anyone to get their hands on our data to decrypt at their leisure. We don’t always know the exact identities of everyone who should access data so it is desirable to be able to describe them in terms of descriptive attributes or credentials. This type of access control is typically enforced by a server that checks that a user present proper credentials before accessing data. The problem now is that our data is on the cloud, and we don’t necessarily have that much trust in the servers where our data is being stored. We would definitely sleep easier if we didn’t have to worry about them being compromised.
  • #13: CP-ABE addresses these issues. When a party encrypts a message, they specify an associated access structure. Each user’s private key is associated with a set of attributes. So what makes this so great? A message will only be able to be decrypted if the decryptor’s attributes satisfy the ciphertext’s access structure. This allows a user to not only maintain an access policy on an untrusted server, but also allow groups of users to access the data. Another important feature of this scheme is that two parties can’t combine their attributes, or collude, to access data that one couldn’t access on their own.
  • #14: So to recap, fully homomorphic encryption has the potential to change how cloud services are used. It just needs some more research. CP-ABE also can also improve cloud security by providing a more flexible way to manage access control in clouds.
  • #15: Here’s my references.
  • #16: Any questions?