香港中文大学:《CMSC5719 Seminar》课程教学资源(讲义)Lecture 01 A Secure Overlay Cloud Storage System with Access Control and Assured Deletion

FADE:A Secure Overlay Cloud Storage System with Access Control and Assured Deletion Patrick P.C.Lee 1
1 FADE: A Secure Overlay Cloud Storage System with Access Control and Assured Deletion Patrick P. C. Lee

Cloud Storage is Emerging >Cloud storage is now an emerging business model for data outsourcing 天 Individual users Jungle Disk等i Dropbox Enterprises 厚w口 Mobile devices NASDAQ 君治治 SmugMug己 amazon webservices" 888 百面o 2
2 Cloud Storage is Emerging Cloud storage is now an emerging business model for data outsourcing Mobile devices Individual users Enterprises

Case Studies >Smugmug:hosting terabytes of photos since 2006 Savings:USD 500K per year as in 2006 More savings are expected with more photos >NASDAQ:hosting historical market data since 2008 More clients are found on: http://aws.amazon.com/solutions/case-studies/ References: .http://don.blogs.smugmug.com/2006/11/10/amazon-s3-show-me-the-money/ 3 .http://www.infoq.com/articles/nasdaq-case-study-air-and-s3?
3 Case Studies Smugmug: hosting terabytes of photos since 2006 • Savings: USD 500K per year as in 2006 • More savings are expected with more photos NASDAQ: hosting historical market data since 2008 More clients are found on: http://aws.amazon.com/solutions/case-studies/ References: •http://don.blogs.smugmug.com/2006/11/10/amazon-s3-show-me-the-money/ •http://www.infoq.com/articles/nasdaq-case-study-air-and-s3?

Implications of Cloud Storage >Cloud storage will be a cost-saving business solution: Save cost for unused storage Save technical support for data backups Save electric power and maintenance costs for data centers >Yet,as a cloud client,how do we provide security guarantees for our outsourced data? 4
4 Implications of Cloud Storage Cloud storage will be a cost-saving business solution: • Save cost for unused storage • Save technical support for data backups • Save electric power and maintenance costs for data centers Yet, as a cloud client, how do we provide security guarantees for our outsourced data?

Security Challenges >Can we protect outsourced data from improperly accessed? Unauthorized users must not access our data We don't want cloud providers to mine our data for their marketing purposes We need access control: Only authorized parties can access outsourced data 5
5 Security Challenges Can we protect outsourced data from improperly accessed? • Unauthorized users must not access our data • We don’t want cloud providers to mine our data for their marketing purposes We need access control: • Only authorized parties can access outsourced data

Security Challenges Can we reliably remove data from cloud? We don't want backups to exist after pre-defined time e.g.,to avoid future exposure due to data breach or error management of operators If an employee quits,we want to remove his/her data e.g.,to avoid legal liability >Cloud makes backup copies.We don't know if all backup copies are reliably removed. We need assured deletion: Data becomes inaccessible upon requests of deletion 6
6 Security Challenges Can we reliably remove data from cloud? • We don’t want backups to exist after pre-defined time • e.g., to avoid future exposure due to data breach or error management of operators • If an employee quits, we want to remove his/her data • e.g., to avoid legal liability Cloud makes backup copies. We don’t know if all backup copies are reliably removed. We need assured deletion: • Data becomes inaccessible upon requests of deletion

Previous Work >Cryptographic protection on outsourced data storage [Ateniese et al.,SecureComm'08;Wang et al.,CCSW09] Require new protocol support on the cloud infrastructure >Security solutions compatible with existing cloud (e.g.,Cumulus,JungleDisk) [Yun et al.,CCSW09;Vrable et al.,ToS'09] No guarantees of reliable deletion of data 7
7 Previous Work Cryptographic protection on outsourced data storage [Ateniese et al., SecureComm’08; Wang et al., CCSW’09] • Require new protocol support on the cloud infrastructure Security solutions compatible with existing cloud (e.g., Cumulus, JungleDisk) [Yun et al., CCSW’09; Vrable et al., ToS’09] • No guarantees of reliable deletion of data

Previous Work Perlman's Ephemerizer INDSso7 目目…目⑧ A file is encrypted with a data key expiration date The data key is further encrypted with a time-based control key The control key is deleted when expiration time is reached The control key is maintained by a separate key manager (aka Ephemerizer) Weaknesses: Target only time-based assured deletion No fine-grained control of different file access policies ·No implementation 8
8 Previous Work Perlman’s Ephemerizer [NDSS’07] • A file is encrypted with a data key • The data key is further encrypted with a time-based control key • The control key is deleted when expiration time is reached • The control key is maintained by a separate key manager (aka Ephemerizer) Weaknesses: • Target only time-based assured deletion • No fine-grained control of different file access policies • No implementation expiration date … …

Previous Work >Vanish [USENIX'09] Divide the data key into many key shares Store key shares in nodes of a deployed P2P network Nodes remove key shares that reside in cache for 8 hours >Weaknesses: Time-based,no fine-grained control 9
9 Previous Work Vanish [USENIX’09] • Divide the data key into many key shares • Store key shares in nodes of a deployed P2P network • Nodes remove key shares that reside in cache for 8 hours Weaknesses: • Time-based, no fine-grained control

Our Work FADE:a secure overlay cloud storage system with file assured deletion >Design feature of FADE: work atop today's cloud as an overlay >Security features of FADE: Data confidentiality and integrity Fine-grained access control:files are accessible only when authorized Fine-grained file assured deletion:files are permanently inaccessible and unrecoverable based on policies Yang Tang,Patrick P.C.Lee,John C.S.Lui,Radia Perlman, "Secure Overlay Cloud Storage with File Assured Deletion",SecureComm 2010. 10
10 Our Work Design feature of FADE: • work atop today’s cloud as an overlay Security features of FADE: • Data confidentiality and integrity • Fine-grained access control: files are accessible only when authorized • Fine-grained file assured deletion: files are permanently inaccessible and unrecoverable based on policies FADE: a secure overlay cloud storage system with file assured deletion Yang Tang, Patrick P. C. Lee, John C. S. Lui, Radia Perlman, “Secure Overlay Cloud Storage with File Assured Deletion”, SecureComm 2010
按次数下载不扣除下载券;
注册用户24小时内重复下载只扣除一次;
顺序:VIP每日次数-->可用次数-->下载券;
- 香港中文大学:《CMSC5719 Seminar》课程教学资源(讲义)Lecture 08 An introduction to expander graphs(EXPANDER GRAPHS AND THEIR APPLICATIONS).pdf
- 香港中文大学:《Theory of Computational Complexity》课程教学资源(讲义)Lecture 12 A glimpse of computational complexity.docx
- 香港中文大学:《Theory of Computational Complexity》课程教学资源(讲义)Lecture 11 Information theoretical argument.docx
- 香港中文大学:《Theory of Computational Complexity》课程教学资源(讲义)Lecture 10 Circuit Complexity 2.docx
- 香港中文大学:《Theory of Computational Complexity》课程教学资源(讲义)Lecture 9 Circuit Complexity.docx
- 香港中文大学:《Theory of Computational Complexity》课程教学资源(讲义)Lecture 7 Decision Tree Complexity and Fourier analysis.docx
- 香港中文大学:《Theory of Computational Complexity》课程教学资源(讲义)Lecture 6 Formula complexity II.docx
- 香港中文大学:《Theory of Computational Complexity》课程教学资源(讲义)Lecture 5 Formula complexity I.docx
- 香港中文大学:《Theory of Computational Complexity》课程教学资源(讲义)Lecture 4 Multiparty Communication Complexity.docx
- 香港中文大学:《Theory of Computational Complexity》课程教学资源(讲义)Lecture 3 Communication complexity.docx
- 香港中文大学:《Theory of Computational Complexity》课程教学资源(讲义)Lecture 2 More samples.docx
- 香港中文大学:《Theory of Computational Complexity》课程教学资源(讲义)Lecture 1 Samples of possibility and impossibility results in algorithm designing.docx
- 香港中文大学:《Design and Analysis of Algorithms》课程教学资源(辅导课件)tutorial 09.pptx
- 香港中文大学:《Design and Analysis of Algorithms》课程教学资源(辅导课件)tutorial 08.pptx
- 香港中文大学:《Design and Analysis of Algorithms》课程教学资源(辅导课件)tutorial 06.pptx
- 香港中文大学:《Design and Analysis of Algorithms》课程教学资源(辅导课件)tutorial 05.pptx
- 香港中文大学:《Design and Analysis of Algorithms》课程教学资源(辅导课件)tutorial 04.pptx
- 香港中文大学:《Design and Analysis of Algorithms》课程教学资源(辅导课件)tutorial 03.pptx
- 香港中文大学:《Design and Analysis of Algorithms》课程教学资源(辅导课件)tutorial 02.pptx
- 香港中文大学:《Design and Analysis of Algorithms》课程教学资源(辅导课件)tutorial 12.pptx
- 香港中文大学:《CMSC5719 Seminar》课程教学资源(讲义)Lecture 02 Game theory in computer science.pptx
- 香港中文大学:《CMSC5719 Seminar》课程教学资源(讲义)Lecture 03 Controlling Salinity in a Potable Water Supply System Using a Constraint Programming Approach.pdf
- 香港中文大学:《CMSC5719 Seminar》课程教学资源(讲义)Lecture 04 CRYPTOGRAPHY.pptx
- 香港中文大学:《CMSC5719 Seminar》课程教学资源(讲义)Lecture 05 Fault-Tolerant Computing.ppt
- 香港中文大学:《CMSC5719 Seminar》课程教学资源(讲义)Lecture 06 3D computer vision techniques.ppt
- 香港中文大学:《CMSC5719 Seminar》课程教学资源(讲义)Lecture 07-1 Research and Applications of Virtual Medicine Part I Introduction to Medical Visualization.pdf
- 香港中文大学:《CMSC5719 Seminar》课程教学资源(讲义)Lecture 07-2 Research and Applications of Virtual Medicine Part II Virtual Reality Based Surgical Simulations.pdf
- 香港中文大学:《CMSC5719 Seminar》课程教学资源(讲义)Lecture 11 Design of Microfluidics-Based Biochips.pdf
- 香港中文大学:《CMSC5719 Seminar》课程教学资源(讲义)Lecture 10 An Introduction to Bioinformatics and its application in Protein-DNA/Protein Interactions Research and Drug Discovery.pptx
- 香港中文大学:《CMSC5719 Seminar》课程教学资源(讲义)Lecture 12 Introduction to Computational Photography.ppt
- Minimal Cover-Automata for Finite Languages.pdf
- 香港中文大学:《Topics in Theoretical Computer Science》课程教学资源(PPT课件讲稿)Lecture 7 Stable matching.Gale-Shapley algorithm.pptx
- 《农业信息技术概论》课程教学资源(教学大纲).pdf
- 《仿真与虚拟农业》课程教学资源(实验指导).pdf
- 天津农学院:《微机原理与汇编语言程序设计》课程教学资源(实验指导书).pdf
- 《3S技术导论》课程教学资源(实验指导).pdf
- 《3S技术导论》课程教学资源(讲义).pdf
- 《仿真与虚拟农业》课程教学资源(教学大纲).pdf
- 软件设计师考试同步辅导(第4版)第2章 程序设计语言基础.pdf
- 安徽理工大学:《算法设计与分析 Algorithm Design and Analysis》课程教学资源(PPT课件讲稿)第1章 导引与基本数据结构论(任课老师:郭娟、方欢).ppt