110 likes | 128 Views
Cloud Computing. Transforms the way IT is consumed and managed, bringing costs down Service delivery (NIST 2011) SaaS (Software) PaaS (Platform) IaaS (Infrastructure) “ If you have an application exposed to the Internet that will allow people to make money, it will be probed. ”
E N D
Cloud Computing • Transforms the way IT is consumed and managed, bringing costs down • Service delivery (NIST 2011) • SaaS (Software) • PaaS (Platform) • IaaS (Infrastructure) • “If you have an application exposed to the Internet that will allow people to make money, it will be probed.” • - Dave Cullinane, Former CISO, eBay.
Security issues in clouds • Cloud Security Alliance • Data breach • Data loss • Malicious insiders • Shared technology vulnerabilities • … • NIST • Audit and compliance (e.g. cross border) • Response to a breach • …
Data breach Some example attacks from academic Crypto literature • Some example attacks from academic Crypto literature
Cryptographic solutions: a glimpse • Password security • Attribute based encryption • Fully homomorphic encryption • Searchable encryption • Format preserving encryption • Functional encryption • …
Password Security (Age-old) Password security problem
Searchable encryption • Secure search over encrypted data • Adaptive/Non-adaptive multi/single user, variable/constant # rounds …
Fully homomorphic encryption • Enc(m1) * Enc(m2) = Enc(m1*m2) • Enc(m1) + Enc(m2) = Enc(m1+m2) • Extremely powerful primitive • Allows working on encrypted data without revealing the plain data
Format Preserving Encryption • Picture source: Voltage.com
Attribute based encryption • Encryption based on policies • Decryption can be done when some specific attributes are satisfied OR AND 2 of 3 IT dept. OR sales manager exec. level >= 5 marketing Figure source: Brent Waters’ slides hire date < 2002
Thank you For more information, please contact Dr. SomitraSanadhya somitra@iiitd.ac.in Cryptology Research Group, IIIT Delhi http://crypto.iiitd.edu.in/