By: Anam Zahid, MS(IT)-13 [NUST201260763MSEECS60012F] Supervisor: Dr Awais Shibli

32
By: Anam Zahid, MS(IT)-13 [NUST201260763MSEECS60012F] Supervisor: Dr Awais Shibli Secure Sharding in Federated Clouds

description

Secure Sharding in Federated Clouds. By: Anam Zahid, MS(IT)-13 [NUST201260763MSEECS60012F] Supervisor: Dr Awais Shibli. Agenda. Introduction Industrial Motivation Literature Review Problem Statement Proposed Architecture Tools and Technologies Timeline References. NoSQL Database. - PowerPoint PPT Presentation

Transcript of By: Anam Zahid, MS(IT)-13 [NUST201260763MSEECS60012F] Supervisor: Dr Awais Shibli

Page 1: By: Anam Zahid, MS(IT)-13 [NUST201260763MSEECS60012F] Supervisor: Dr Awais Shibli

By: Anam Zahid, MS(IT)-13[NUST201260763MSEECS60012F]

Supervisor: Dr Awais Shibli

Secure Sharding in Federated

Clouds

Page 2: By: Anam Zahid, MS(IT)-13 [NUST201260763MSEECS60012F] Supervisor: Dr Awais Shibli

Agenda• Introduction• Industrial Motivation• Literature Review• Problem Statement• Proposed Architecture• Tools and Technologies• Timeline• References

2

Page 3: By: Anam Zahid, MS(IT)-13 [NUST201260763MSEECS60012F] Supervisor: Dr Awais Shibli

NoSQL Database

• Open source• Flexible Data model• High Scalability and Performance• Handles Large volumes of unstructured

data• Best suitable for Cloud• Integrated Caching

3

Page 4: By: Anam Zahid, MS(IT)-13 [NUST201260763MSEECS60012F] Supervisor: Dr Awais Shibli

Types of NoSQL Databases

4

Page 5: By: Anam Zahid, MS(IT)-13 [NUST201260763MSEECS60012F] Supervisor: Dr Awais Shibli

Sharding

• Horizontal Scalability

• Can be based on Various parameters (Chunk size, data Relevance, key ranges etc)

5

Page 6: By: Anam Zahid, MS(IT)-13 [NUST201260763MSEECS60012F] Supervisor: Dr Awais Shibli

ShardingTwo basic operations

– Chunk Splitting

– Chunk Migration

6

Page 7: By: Anam Zahid, MS(IT)-13 [NUST201260763MSEECS60012F] Supervisor: Dr Awais Shibli

Cloud Computing

7

Essential Characteristics

Service Models

Deployment Models

Software as a Service

Platform as a Service

Infrastructure as a Service

Public Private Hybrid Community

Broad Network Access

Rapid Elasticity

On-Demand Self Service

Resource Pooling

Measured Service

Page 8: By: Anam Zahid, MS(IT)-13 [NUST201260763MSEECS60012F] Supervisor: Dr Awais Shibli

Cloud Security Threats

8

Data Breaches

Data Loss

Account Hijacking

Insecure APIs

Denial of Services

Malicious Insider

Abuse of Cloud Services

Insufficient Due Diligence

Shared Technology Issues

Page 9: By: Anam Zahid, MS(IT)-13 [NUST201260763MSEECS60012F] Supervisor: Dr Awais Shibli

Cloud Database Issues

9

Cloud Database

Availability

Performance

Security &

PrivacyConsistency

Fault Tolerance

Scalability

Inter-operability

Simplified Queries

Page 10: By: Anam Zahid, MS(IT)-13 [NUST201260763MSEECS60012F] Supervisor: Dr Awais Shibli

Cloud Federation

Cloud service providers collaborate dynamically to share their virtual infrastructure for

Load Balancing

Prevention from Vendor

Lock-ins

Prevention from Power Outages &

Failures

Capacity Manageme

nt

Efficient use of Surplus Resources

Scaling Data to other

CSPs

10

Page 11: By: Anam Zahid, MS(IT)-13 [NUST201260763MSEECS60012F] Supervisor: Dr Awais Shibli

Industrial Motivation

11

Reference: http://www.darkreading.com/database/does-nosql-mean-no-security/232400214

“We think the lack of security around NoSQL is going to take a toll on Organizations” Amichai Shulman, Co-

founder & CTO of Imperva

Page 12: By: Anam Zahid, MS(IT)-13 [NUST201260763MSEECS60012F] Supervisor: Dr Awais Shibli

Industrial Motivation (cont.)

12

Reference: http://www.darkreading.com/database/does-nosql-mean-no-security/232400214

“Instead of SQL injection you have JavaScript or JSON injection” Alex Rothacker, manager of Application

Security Inc.'s research division, Team SHATTER

Rothacker suggests that because of the dependence on the perimeter to secure these databases, organizations

strongly consider encryption whenever possible

Page 13: By: Anam Zahid, MS(IT)-13 [NUST201260763MSEECS60012F] Supervisor: Dr Awais Shibli

zNcrypt for MongoDB

Reference: MongoDB, Gazzang, "Securing Data in MongoDB with Gazzang and 10Gen," 10 July 2012. [Online]. Available: http://www.mongodb.com/presentations/securing-data-mongodb-gazzang. [Accessed 19 November 2013].

13

Page 14: By: Anam Zahid, MS(IT)-13 [NUST201260763MSEECS60012F] Supervisor: Dr Awais Shibli

Literature Review

14

Page 15: By: Anam Zahid, MS(IT)-13 [NUST201260763MSEECS60012F] Supervisor: Dr Awais Shibli

MetaStorage

Bermbach, David, Markus Klems, Stefan Tai, and Michael Menzel. "Metastorage: A federated cloud storage system to manage consistency-latency tradeoffs." In Cloud Computing (CLOUD), 2011 IEEE International Conference on, pp. 452-459. IEEE, 2011.

15

Page 16: By: Anam Zahid, MS(IT)-13 [NUST201260763MSEECS60012F] Supervisor: Dr Awais Shibli

16

MetaStorage

Pros• Security maintained through role

based user management• Increased availability because of

multiple storage providers• Low latency due to data

replication

Cons• No communication security (e.g

SSL, TLS) or security of data at rest (e.g encryption) etc

• Additional overhead due to data processing layer

• Consistency issues due to different cloud storage services

• No scalability limitations

Bermbach, David, Markus Klems, Stefan Tai, and Michael Menzel. "Metastorage: A federated cloud storage system to manage consistency-latency tradeoffs." In Cloud Computing (CLOUD), 2011 IEEE International Conference on, pp. 452-459. IEEE, 2011.

Page 17: By: Anam Zahid, MS(IT)-13 [NUST201260763MSEECS60012F] Supervisor: Dr Awais Shibli

RACS

Abu-Libdeh, Hussam, Lonnie Princehouse, and Hakim Weatherspoon. "RACS: a case for cloud storage diversity." In Proceedings of the 1st ACM symposium on Cloud computing, pp. 229-240. ACM, 2010.

17

Page 18: By: Anam Zahid, MS(IT)-13 [NUST201260763MSEECS60012F] Supervisor: Dr Awais Shibli

18

RACS

Pros• Each RACS proxy maintains user

authentication information and credentials for each repository

• Use redundancy through fragmentation for high availability

• Read synchronizations using zookeeper

Cons• No communication as well as

data at rest security• High latency due to mutual

consistency• Data loss when RACS proxy

crashes

Abu-Libdeh, Hussam, Lonnie Princehouse, and Hakim Weatherspoon. "RACS: a case for cloud storage diversity." In Proceedings of the 1st ACM symposium on Cloud computing, pp. 229-240. ACM, 2010.

Page 19: By: Anam Zahid, MS(IT)-13 [NUST201260763MSEECS60012F] Supervisor: Dr Awais Shibli

Management of Symmetric Cryptographic Keys in

cloud

Fakhar, F.; Shibli, M.A., "Management of Symmetric Cryptographic Keys in cloud based environment," Advanced Communication Technology (ICACT), 2013 15th International Conference on , vol., no., pp.39,44, 27-30 Jan. 2013

19

Page 20: By: Anam Zahid, MS(IT)-13 [NUST201260763MSEECS60012F] Supervisor: Dr Awais Shibli

20

Management of Symmetric Cryptographic Keys in cloud

Pros• Distributed Key generation on

client side• Privacy maintained through

client’s key component contribution in key regeneration.

• Recoverable key components except for client side component

Cons• Communication overhead when

key to decrypt data is needed in cloud

• Key combiner on client terminal

Fakhar, F.; Shibli, M.A., "Management of Symmetric Cryptographic Keys in cloud based environment," Advanced Communication Technology (ICACT), 2013 15th International Conference on , vol., no., pp.39,44, 27-30 Jan. 2013

Page 21: By: Anam Zahid, MS(IT)-13 [NUST201260763MSEECS60012F] Supervisor: Dr Awais Shibli

21

Summary

So, besides providing high availability and throughput because of data fragmentation, there is a need for

• strong client authentication and authorization mechanisms

• Security of data during transmission (e.g. through TLS, SSL, IPSec etc)

• Data-at-rest security (e.g. hashing, encryption etc)

Page 22: By: Anam Zahid, MS(IT)-13 [NUST201260763MSEECS60012F] Supervisor: Dr Awais Shibli

22

Our MotivationAccording to Microsoft’s Framework For data

Governance

Source: http://www.microsoft.com/privacy/datagovernance.aspx

Page 23: By: Anam Zahid, MS(IT)-13 [NUST201260763MSEECS60012F] Supervisor: Dr Awais Shibli

23

Our motivationCompliance Organizations rules and

policies:

Page 24: By: Anam Zahid, MS(IT)-13 [NUST201260763MSEECS60012F] Supervisor: Dr Awais Shibli

Fine Grained Access Control for Database

Management Systems

Masood, R.; Shibli, M.A., “Fine Grained Access Control for Database Management Systems," MS Thesis, SEECS NUST, (2013).

24

Page 25: By: Anam Zahid, MS(IT)-13 [NUST201260763MSEECS60012F] Supervisor: Dr Awais Shibli

Problem Statement

25

In order to avoid the prevalent problem of data breaches in distributed cloud environment, there is a need to provide effective access control and encryption to ensure the security of data residing on the domain of various cloud providers.

Page 26: By: Anam Zahid, MS(IT)-13 [NUST201260763MSEECS60012F] Supervisor: Dr Awais Shibli

26

Proposed Architecture

Our Domain

Page 27: By: Anam Zahid, MS(IT)-13 [NUST201260763MSEECS60012F] Supervisor: Dr Awais Shibli

Proposed Architecture

27

For Distributed Data “PUT” request

9

Authentication

Fine Grained Access Control

Client Application

Key Distribution

Store

Encryption/Decryption

Engine

Query Router

HCS

P Config

.Serve

r

NoSQL Databas

e Server

NoSQL Databas

e Server

NoSQL Databas

e Server

FCSP Encryption/Decryption

EngineQuery Router

Config.

Server

NoSQL Databas

e Server

NoSQL Databas

e Server

NoSQL Databas

e Server

1

23

45

6

7 7

78

10

11 11

12

Page 28: By: Anam Zahid, MS(IT)-13 [NUST201260763MSEECS60012F] Supervisor: Dr Awais Shibli

Contribution

In our proposed system, data security would be ensured by:

• Client side Authentication• Embedded Fine grained authorization• Selective field Encryption of data chunks • Distribution of data across several service

providers

28

Page 29: By: Anam Zahid, MS(IT)-13 [NUST201260763MSEECS60012F] Supervisor: Dr Awais Shibli

Tools and Technologies

• MongoDB• C++ (MS Visual Studio)• Open Stack• XACML

29

Page 30: By: Anam Zahid, MS(IT)-13 [NUST201260763MSEECS60012F] Supervisor: Dr Awais Shibli

Proposed Timeline# Milestone Duration

1 Preliminary Literature Review Done

2 Implementation

2.1 Sharding in NoSQL database 3 weeks

2.2 Encryption and Decryption Module + KDS

1 month & 3 weeks

2.3 Fine grained access control Module 1 month

2.4 Cloud federation establishment and tag aware sharding implementation

1 month

2.5 Integration of all modules 2-3 weeks

3 Testing and Evaluation 1 month

4 Final Documentation 1 month

30

Page 31: By: Anam Zahid, MS(IT)-13 [NUST201260763MSEECS60012F] Supervisor: Dr Awais Shibli

References[1] Fox, Armando, Rean Griffith, A. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, and I. Stoica. "Above the clouds: A Berkeley

view of cloud computing." Dept. Electrical Eng. and Comput. Sciences, University of California, Berkeley, Rep. UCB/EECS 28 (2009).[2] Arora, Indu, and Anu Gupta. "Cloud Databases: A Paradigm Shift in Databases." International J. of Computer Science Issues 9, no. 4 (2012):

77-83.[3] https://downloads.cloudsecurityalliance.org/initiatives/top_threats/The_Notorious_Nine_Cloud_Computing_Top_Threats_in_2013.pdf

[4] Mell, Peter, and Timothy Grance. "The NIST definition of cloud computing (draft)." NIST special publication 800, no. 145 (2011): 7. [5] MongoDB, Gazzang, "Securing Data in MongoDB with Gazzang and 10Gen," 10 July 2012. [Online]. Available:

http://www.mongodb.com/presentations/securing-data-mongodb-gazzang. [Accessed 19 November 2013].[6] http://www.forbes.com/sites/benkepes/2013/11/04/was-garantia-is-now-redisdb-either-way-nosql-is-hot/[7] http://www.darkreading.com/database/does-nosql-mean-no-security/232400214[8] Bermbach, David, Markus Klems, Stefan Tai, and Michael Menzel. "Metastorage: A federated cloud storage system to manage

consistency-latency tradeoffs." In Cloud Computing (CLOUD), 2011 IEEE International Conference on, pp. 452-459. IEEE, 2011.[9] Abu-Libdeh, Hussam, Lonnie Princehouse, and Hakim Weatherspoon. "RACS: a case for cloud storage diversity." In Proceedings of the

1st ACM symposium on Cloud computing, pp. 229-240. ACM, 2010.[10] Fakhar, F.; Shibli, M.A., "Management of Symmetric Cryptographic Keys in cloud based environment," Advanced Communication

Technology (ICACT), 2013 15th International Conference on , vol., no., pp.39,44, 27-30 Jan. 2013[11] Hashizume, Keiko, David G. Rosado, Eduardo Fernández-Medina, and Eduardo B. Fernandez. "An analysis of security issues for cloud

computing." Journal of Internet Services and Applications 4, no. 1 (2013): 1-13.[12] Chandra, Deka Ganesh, Ravi Prakash, and Swati Lamdharia. "A Study on Cloud Database." In Computational Intelligence and

Communication Networks (CICN), 2012 Fourth International Conference on, pp. 513-519. IEEE, 2012.[13] Subashini, S., and V. Kavitha. "A survey on security issues in service delivery models of cloud computing." Journal of Network and Computer

Applications 34, no. 1 (2011): 1-11.

31

Page 32: By: Anam Zahid, MS(IT)-13 [NUST201260763MSEECS60012F] Supervisor: Dr Awais Shibli

THANK YOU !!!!

32