SlideShare ist ein Scribd-Unternehmen logo
1 von 16
Downloaden Sie, um offline zu lesen
www.paasword.eu
No More Dark Clouds With PaaSword – An
Innovative Security By Design Framework
Cloud Forward Conference
Oct 18-20, 2016 – Madrid, Spain
Cloud Paradigm Shift
The cloud paradigm has definitely prevailed
Most application are delivered following the SaaS model
Many developers rely on PaaS offerings for scalablity
Nearly all underlying resources (DBs, Queues etc) are
outsourced at the IaaS level
Attack vectors have increased
‘Raw data’ are the modern hacker’s holy grail
The responsibility for the protection of data has
shifted to the developer
PaaSword24/10/2016 2
60% of attacks target the
database
PaaSword24/10/2016 3
Data leaks
PaaSword24/10/2016 4
Motivation – Security as an Enterprise
Requirement
Enterprises identify security concerns and data privacy as the most
significant barriers of Cloud adoption;
In addition:
Compliance (e.g., legal, regulatory, industry-standard compliance)
Cultural resistance
Encryption and key management as top priority requirements [3] &
[4]
PaaSword24/10/2016 5
[3] P. Institute, “2015 Global Encryption & Key,” Thales, 2015.
[4] CipherCloud, “Global cloud data security report - The
authority on how to protect data in the cloud,” CipherCloud, 2015.
How shall we lower the
barriers?
Security concerns
Protect confidential information
Control access
Trust cloud provider
Secure Cloud Applications
Data privacy
Secure storage
Encryption
Trustable Key Management
Control Access to data
PaaSword
24/10/2016
6
PaaSword
Problem Areas Targeted
Insufficient security and trust of cloud
infrastructures and services
Cloud application developers have difficulties
specifying appropriate level of security
Appropriate context-aware access control
mechanisms for cloud applications
Ensure protection, privacy and integrity of data
stored in the cloud
Prove applicability, usability, effectiveness and
value of secure cloud platforms
PaaSword24/10/2016 7
PaaSword Platform
PaaSword24/10/2016 8
PaaSword Features
A security-by-design framework
which will allow developers to engineer
secure applications
Leverage the security and trust of
data that reside on outsourced
infrastructure
Facilitate context-aware access to
encrypted and (even) physically
distributed datasets stored in the
cloud
Prove applicability, usability,
effectiveness and value of our
framework in real-life Cloud
infrastructures, services and
applications29/06/2016 9
PaaSProvider
PaaSword API
DBwith
Indexersonencrypteddata
QueriesusingSearchable
Trusted IaaSProvider
Adversary
User
Developer
PublishesApplication
Encryption Scheme
usingPaaSword API
encrypteddata
PaaSword
Major Assets developed so far…
A JAVA annotation library that can be used during development
in order to annotate database models (using JPA)
These annotations are translated during runtime to privacy constraints
that drive the fragmentation of the database
A virtual-database proxy that is able to handle any SQL query
by translating it in the proper format based on the fragmentation
scheme
An XACML-compliant authorization engine that is able to
perform reasoning prior to attribute-evaluation
An integrated IDE environment where developers can submit
and control their PaaSword-enabled applications
PaaSword24/10/2016 10
Integration of Eclipse CHE
IDE
PaaSword24/10/2016 11
Native Integration with
OpenStack
PaaSword24/10/2016 12
Asset: Virtual Database Architecture
PaaSword24/10/2016 13
Data Index2Index1
SQL
SQLDatabase
Proxy
(trusted)
SQL
Cloud
(untrusted)
User / Application
Data
(not encrypted)
Data (encrypted)
Model-driven Expression
editing
PaaSword24/10/2016 14
Interested in… ?
Getting access to early results?
Shaping and expanding PaaSword?
Networking with leading companies & research
institutes?
Collaborating with us and the PaaSword Community?
Join the Cloud Security Industrial Focus Group!
Register at:
https://www.paasword.eu/register/
19PaaSword
PaaSword24/10/2016 20
Join our Industrial Focus Group
Today!
Visit us:
www.paasword.
eu
Acknowledgements:
This project has received funding from
the European Union’s Horizon 2020
research and innovation programme
under grant agreement No 644814.

Weitere ähnliche Inhalte

Was ist angesagt?

01 milan roadshow keynote
01 milan roadshow keynote01 milan roadshow keynote
01 milan roadshow keynotemlraviol
 
Launching a Highly-regulated Startup in the Public Cloud
Launching a Highly-regulated Startup in the Public CloudLaunching a Highly-regulated Startup in the Public Cloud
Launching a Highly-regulated Startup in the Public CloudPoornaprajna Udupi
 
8 major facts you must know before you buying a casb
8 major facts you must know before you buying a casb8 major facts you must know before you buying a casb
8 major facts you must know before you buying a casbciphercloud1
 
Elastic Security Solution Brief
Elastic Security Solution BriefElastic Security Solution Brief
Elastic Security Solution BriefJoseph DeFever
 
Maintaining Trust & Control of your Data in the Cloud
Maintaining Trust & Control of your Data in the CloudMaintaining Trust & Control of your Data in the Cloud
Maintaining Trust & Control of your Data in the CloudAmazon Web Services
 
Vault 1.4 integrated storage overview
Vault 1.4 integrated storage overviewVault 1.4 integrated storage overview
Vault 1.4 integrated storage overviewMitchell Pronschinske
 
Simplify security with Trend Micro's Managed Rules
Simplify security with Trend Micro's Managed RulesSimplify security with Trend Micro's Managed Rules
Simplify security with Trend Micro's Managed RulesAmazon Web Services
 
MariaDB Vorstellung
MariaDB VorstellungMariaDB Vorstellung
MariaDB VorstellungMariaDB plc
 
Scaling towards a thousand micro services
Scaling towards a thousand micro servicesScaling towards a thousand micro services
Scaling towards a thousand micro servicesDiego Berrueta
 
Cloud vs Desktop: What it means for Document Management - Accounting Business...
Cloud vs Desktop: What it means for Document Management - Accounting Business...Cloud vs Desktop: What it means for Document Management - Accounting Business...
Cloud vs Desktop: What it means for Document Management - Accounting Business...John Woodbridge
 
The Future of CASBs - A Cloud Security Force Awakens
The Future of CASBs - A Cloud Security Force AwakensThe Future of CASBs - A Cloud Security Force Awakens
The Future of CASBs - A Cloud Security Force AwakensBitglass
 
Eskm & bloombase integration data security oct 16
Eskm & bloombase integration   data security oct 16Eskm & bloombase integration   data security oct 16
Eskm & bloombase integration data security oct 16Bloombase
 
Webinar Express: What is a CASB?
Webinar Express: What is a CASB?Webinar Express: What is a CASB?
Webinar Express: What is a CASB?Bitglass
 
Secure Infrastructure for the Mobile Legion
Secure Infrastructure for the Mobile LegionSecure Infrastructure for the Mobile Legion
Secure Infrastructure for the Mobile LegionRaphael Reitzig
 
Bloombase StoreSafe Intelligent Storage Firewall secures sensitive informatio...
Bloombase StoreSafe Intelligent Storage Firewall secures sensitive informatio...Bloombase StoreSafe Intelligent Storage Firewall secures sensitive informatio...
Bloombase StoreSafe Intelligent Storage Firewall secures sensitive informatio...Bloombase
 
Azure security and Compliance
Azure security and ComplianceAzure security and Compliance
Azure security and ComplianceKarina Matos
 
Under IaaS, the client is offered a virtual hardware resource
Under IaaS, the client is offered a virtual hardware resource Under IaaS, the client is offered a virtual hardware resource
Under IaaS, the client is offered a virtual hardware resource thomasmperez
 

Was ist angesagt? (20)

01 milan roadshow keynote
01 milan roadshow keynote01 milan roadshow keynote
01 milan roadshow keynote
 
Launching a Highly-regulated Startup in the Public Cloud
Launching a Highly-regulated Startup in the Public CloudLaunching a Highly-regulated Startup in the Public Cloud
Launching a Highly-regulated Startup in the Public Cloud
 
8 major facts you must know before you buying a casb
8 major facts you must know before you buying a casb8 major facts you must know before you buying a casb
8 major facts you must know before you buying a casb
 
Elastic Security Solution Brief
Elastic Security Solution BriefElastic Security Solution Brief
Elastic Security Solution Brief
 
Maintaining Trust & Control of your Data in the Cloud
Maintaining Trust & Control of your Data in the CloudMaintaining Trust & Control of your Data in the Cloud
Maintaining Trust & Control of your Data in the Cloud
 
Vault 1.4 integrated storage overview
Vault 1.4 integrated storage overviewVault 1.4 integrated storage overview
Vault 1.4 integrated storage overview
 
Oas un llamado a la accion
Oas   un llamado a la accionOas   un llamado a la accion
Oas un llamado a la accion
 
Simplify security with Trend Micro's Managed Rules
Simplify security with Trend Micro's Managed RulesSimplify security with Trend Micro's Managed Rules
Simplify security with Trend Micro's Managed Rules
 
MariaDB Vorstellung
MariaDB VorstellungMariaDB Vorstellung
MariaDB Vorstellung
 
Scaling towards a thousand micro services
Scaling towards a thousand micro servicesScaling towards a thousand micro services
Scaling towards a thousand micro services
 
Safari cloud
Safari cloudSafari cloud
Safari cloud
 
Cloud vs Desktop: What it means for Document Management - Accounting Business...
Cloud vs Desktop: What it means for Document Management - Accounting Business...Cloud vs Desktop: What it means for Document Management - Accounting Business...
Cloud vs Desktop: What it means for Document Management - Accounting Business...
 
The Future of CASBs - A Cloud Security Force Awakens
The Future of CASBs - A Cloud Security Force AwakensThe Future of CASBs - A Cloud Security Force Awakens
The Future of CASBs - A Cloud Security Force Awakens
 
Helix Brochure
Helix BrochureHelix Brochure
Helix Brochure
 
Eskm & bloombase integration data security oct 16
Eskm & bloombase integration   data security oct 16Eskm & bloombase integration   data security oct 16
Eskm & bloombase integration data security oct 16
 
Webinar Express: What is a CASB?
Webinar Express: What is a CASB?Webinar Express: What is a CASB?
Webinar Express: What is a CASB?
 
Secure Infrastructure for the Mobile Legion
Secure Infrastructure for the Mobile LegionSecure Infrastructure for the Mobile Legion
Secure Infrastructure for the Mobile Legion
 
Bloombase StoreSafe Intelligent Storage Firewall secures sensitive informatio...
Bloombase StoreSafe Intelligent Storage Firewall secures sensitive informatio...Bloombase StoreSafe Intelligent Storage Firewall secures sensitive informatio...
Bloombase StoreSafe Intelligent Storage Firewall secures sensitive informatio...
 
Azure security and Compliance
Azure security and ComplianceAzure security and Compliance
Azure security and Compliance
 
Under IaaS, the client is offered a virtual hardware resource
Under IaaS, the client is offered a virtual hardware resource Under IaaS, the client is offered a virtual hardware resource
Under IaaS, the client is offered a virtual hardware resource
 

Andere mochten auch

Andere mochten auch (20)

Presentation esl part 1 and tech part 1
Presentation   esl part 1 and tech part 1Presentation   esl part 1 and tech part 1
Presentation esl part 1 and tech part 1
 
mamtalq
mamtalqmamtalq
mamtalq
 
Word Cloud | LBSA Marketing Fall 2015
Word Cloud | LBSA Marketing Fall 2015Word Cloud | LBSA Marketing Fall 2015
Word Cloud | LBSA Marketing Fall 2015
 
Portfolio
PortfolioPortfolio
Portfolio
 
Segovia Timeless Elegance Collection
Segovia Timeless Elegance CollectionSegovia Timeless Elegance Collection
Segovia Timeless Elegance Collection
 
Revathy pp da 1
Revathy pp da 1Revathy pp da 1
Revathy pp da 1
 
PassiveVoiceChart
PassiveVoiceChartPassiveVoiceChart
PassiveVoiceChart
 
Portfolio
PortfolioPortfolio
Portfolio
 
Social Media & Metrics (Digital Marketing Today)
Social Media & Metrics (Digital Marketing Today)Social Media & Metrics (Digital Marketing Today)
Social Media & Metrics (Digital Marketing Today)
 
TRC Summer Research Award_Final Report
TRC Summer Research Award_Final ReportTRC Summer Research Award_Final Report
TRC Summer Research Award_Final Report
 
DePauwThesis
DePauwThesisDePauwThesis
DePauwThesis
 
Kapanowski FINAL_Lean Assessment
Kapanowski FINAL_Lean AssessmentKapanowski FINAL_Lean Assessment
Kapanowski FINAL_Lean Assessment
 
Mvc 130330091359-phpapp01
Mvc 130330091359-phpapp01Mvc 130330091359-phpapp01
Mvc 130330091359-phpapp01
 
Concerto di primavera
Concerto di primaveraConcerto di primavera
Concerto di primavera
 
No More Dark Clouds: A Privacy Preserving Framework for the Cloud
No More Dark Clouds: A Privacy Preserving Framework for the CloudNo More Dark Clouds: A Privacy Preserving Framework for the Cloud
No More Dark Clouds: A Privacy Preserving Framework for the Cloud
 
Nano tubes Modern Technology
Nano tubes Modern TechnologyNano tubes Modern Technology
Nano tubes Modern Technology
 
Portfolio
PortfolioPortfolio
Portfolio
 
Soudip sinha roy
Soudip sinha roySoudip sinha roy
Soudip sinha roy
 
Goa Country
Goa CountryGoa Country
Goa Country
 
UKRAINE CRISIS TIMELINE - updated 28 Aug 2014
UKRAINE CRISIS TIMELINE - updated 28 Aug 2014UKRAINE CRISIS TIMELINE - updated 28 Aug 2014
UKRAINE CRISIS TIMELINE - updated 28 Aug 2014
 

Ähnlich wie No More Dark Clouds With PaaSword - An Innovative Security By Design Framework

Service Models
Service ModelsService Models
Service ModelsAllwyn24
 
Oracle Cloud Computing Strategy
Oracle Cloud Computing StrategyOracle Cloud Computing Strategy
Oracle Cloud Computing StrategyRex Wang
 
Cloud Computing Presentation
Cloud Computing PresentationCloud Computing Presentation
Cloud Computing PresentationJReifman
 
CWIN17 India / Insights platform architecture v1 0 virtual - subhadeep dutta
CWIN17 India / Insights platform architecture v1 0   virtual - subhadeep duttaCWIN17 India / Insights platform architecture v1 0   virtual - subhadeep dutta
CWIN17 India / Insights platform architecture v1 0 virtual - subhadeep duttaCapgemini
 
Cloud computing-course-description-and-syllabus-spring2014
Cloud computing-course-description-and-syllabus-spring2014Cloud computing-course-description-and-syllabus-spring2014
Cloud computing-course-description-and-syllabus-spring2014hajlaoui jaleleddine
 
PaaSword's main idea, technical architecture and scientific challenges
PaaSword's main idea, technical architecture and scientific challenges PaaSword's main idea, technical architecture and scientific challenges
PaaSword's main idea, technical architecture and scientific challenges PaaSword EU Project
 
A clear strategy for moving your enterprise to the cloud
A clear strategy for moving your enterprise to the cloudA clear strategy for moving your enterprise to the cloud
A clear strategy for moving your enterprise to the cloudWSO2
 
Private, Managed, Public - All Things WSO2 Cloud
Private, Managed, Public - All Things WSO2 CloudPrivate, Managed, Public - All Things WSO2 Cloud
Private, Managed, Public - All Things WSO2 CloudWSO2
 
SeedStack : new application patterns, presented at OW2con'19, June 12-13, Paris.
SeedStack : new application patterns, presented at OW2con'19, June 12-13, Paris.SeedStack : new application patterns, presented at OW2con'19, June 12-13, Paris.
SeedStack : new application patterns, presented at OW2con'19, June 12-13, Paris.OW2
 
Moving Your Enterprise to the Cloud
Moving Your Enterprise to the CloudMoving Your Enterprise to the Cloud
Moving Your Enterprise to the CloudImesh Gunaratne
 
Choosing a PaaS for the Enterprise
Choosing a PaaS for the EnterpriseChoosing a PaaS for the Enterprise
Choosing a PaaS for the EnterpriseCloud Elements
 
2024 February 28 - NYC - Meetup Unlocking Financial Data with Real-Time Pipel...
2024 February 28 - NYC - Meetup Unlocking Financial Data with Real-Time Pipel...2024 February 28 - NYC - Meetup Unlocking Financial Data with Real-Time Pipel...
2024 February 28 - NYC - Meetup Unlocking Financial Data with Real-Time Pipel...Timothy Spann
 
Xanadu Big Data Platform Technology Introduction
Xanadu Big Data Platform Technology IntroductionXanadu Big Data Platform Technology Introduction
Xanadu Big Data Platform Technology IntroductionAlex G. Lee, Ph.D. Esq. CLP
 
CloudPassage Best Practices for Automatic Security Scaling
CloudPassage Best Practices for Automatic Security ScalingCloudPassage Best Practices for Automatic Security Scaling
CloudPassage Best Practices for Automatic Security ScalingAmazon Web Services
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud ComputingBugRaptors
 

Ähnlich wie No More Dark Clouds With PaaSword - An Innovative Security By Design Framework (20)

Cloud Security Alliance's GRC Stack Overview
Cloud Security Alliance's GRC Stack OverviewCloud Security Alliance's GRC Stack Overview
Cloud Security Alliance's GRC Stack Overview
 
Service Models
Service ModelsService Models
Service Models
 
Oracle Cloud Computing Strategy
Oracle Cloud Computing StrategyOracle Cloud Computing Strategy
Oracle Cloud Computing Strategy
 
Cloud Computing Presentation
Cloud Computing PresentationCloud Computing Presentation
Cloud Computing Presentation
 
Losing Control to the Cloud
Losing Control to the CloudLosing Control to the Cloud
Losing Control to the Cloud
 
CWIN17 India / Insights platform architecture v1 0 virtual - subhadeep dutta
CWIN17 India / Insights platform architecture v1 0   virtual - subhadeep duttaCWIN17 India / Insights platform architecture v1 0   virtual - subhadeep dutta
CWIN17 India / Insights platform architecture v1 0 virtual - subhadeep dutta
 
Cloud computing-course-description-and-syllabus-spring2014
Cloud computing-course-description-and-syllabus-spring2014Cloud computing-course-description-and-syllabus-spring2014
Cloud computing-course-description-and-syllabus-spring2014
 
PaaSword's main idea, technical architecture and scientific challenges
PaaSword's main idea, technical architecture and scientific challenges PaaSword's main idea, technical architecture and scientific challenges
PaaSword's main idea, technical architecture and scientific challenges
 
A clear strategy for moving your enterprise to the cloud
A clear strategy for moving your enterprise to the cloudA clear strategy for moving your enterprise to the cloud
A clear strategy for moving your enterprise to the cloud
 
Practical Guide to Platform-as-a-Service
Practical Guide to Platform-as-a-Service Practical Guide to Platform-as-a-Service
Practical Guide to Platform-as-a-Service
 
Private, Managed, Public - All Things WSO2 Cloud
Private, Managed, Public - All Things WSO2 CloudPrivate, Managed, Public - All Things WSO2 Cloud
Private, Managed, Public - All Things WSO2 Cloud
 
UNIT III - ppt.pptx
UNIT III - ppt.pptxUNIT III - ppt.pptx
UNIT III - ppt.pptx
 
SeedStack : new application patterns, presented at OW2con'19, June 12-13, Paris.
SeedStack : new application patterns, presented at OW2con'19, June 12-13, Paris.SeedStack : new application patterns, presented at OW2con'19, June 12-13, Paris.
SeedStack : new application patterns, presented at OW2con'19, June 12-13, Paris.
 
Moving Your Enterprise to the Cloud
Moving Your Enterprise to the CloudMoving Your Enterprise to the Cloud
Moving Your Enterprise to the Cloud
 
Choosing a PaaS for the Enterprise
Choosing a PaaS for the EnterpriseChoosing a PaaS for the Enterprise
Choosing a PaaS for the Enterprise
 
2024 February 28 - NYC - Meetup Unlocking Financial Data with Real-Time Pipel...
2024 February 28 - NYC - Meetup Unlocking Financial Data with Real-Time Pipel...2024 February 28 - NYC - Meetup Unlocking Financial Data with Real-Time Pipel...
2024 February 28 - NYC - Meetup Unlocking Financial Data with Real-Time Pipel...
 
Xanadu Big Data Platform Technology Introduction
Xanadu Big Data Platform Technology IntroductionXanadu Big Data Platform Technology Introduction
Xanadu Big Data Platform Technology Introduction
 
CloudPassage Best Practices for Automatic Security Scaling
CloudPassage Best Practices for Automatic Security ScalingCloudPassage Best Practices for Automatic Security Scaling
CloudPassage Best Practices for Automatic Security Scaling
 
PaaSword-Business Cases
PaaSword-Business CasesPaaSword-Business Cases
PaaSword-Business Cases
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 

Mehr von PaaSword EU Project

PaaSword - Distributed Searchable Encryption Engine
PaaSword - Distributed Searchable Encryption EnginePaaSword - Distributed Searchable Encryption Engine
PaaSword - Distributed Searchable Encryption EnginePaaSword EU Project
 
PaaSword - Context-aware Access Control
PaaSword - Context-aware Access ControlPaaSword - Context-aware Access Control
PaaSword - Context-aware Access ControlPaaSword EU Project
 
Towards Trusted eHealth Services in the Cloud
Towards Trusted eHealth Services in the CloudTowards Trusted eHealth Services in the Cloud
Towards Trusted eHealth Services in the CloudPaaSword EU Project
 
A Survey on Context Security Policies in the Cloud
A Survey on Context Security Policies in the CloudA Survey on Context Security Policies in the Cloud
A Survey on Context Security Policies in the CloudPaaSword EU Project
 
Towards Efficient and Secure Data Storage in Multi-Tenant Cloud-Based CRM Sol...
Towards Efficient and Secure Data Storage in Multi-Tenant Cloud-Based CRM Sol...Towards Efficient and Secure Data Storage in Multi-Tenant Cloud-Based CRM Sol...
Towards Efficient and Secure Data Storage in Multi-Tenant Cloud-Based CRM Sol...PaaSword EU Project
 
PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...
PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...
PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...PaaSword EU Project
 

Mehr von PaaSword EU Project (8)

PaaSword - Distributed Searchable Encryption Engine
PaaSword - Distributed Searchable Encryption EnginePaaSword - Distributed Searchable Encryption Engine
PaaSword - Distributed Searchable Encryption Engine
 
PaaSword - Technology Baseline
PaaSword - Technology BaselinePaaSword - Technology Baseline
PaaSword - Technology Baseline
 
PaaSword - Context-aware Access Control
PaaSword - Context-aware Access ControlPaaSword - Context-aware Access Control
PaaSword - Context-aware Access Control
 
Daten unter Kontrolle
Daten unter KontrolleDaten unter Kontrolle
Daten unter Kontrolle
 
Towards Trusted eHealth Services in the Cloud
Towards Trusted eHealth Services in the CloudTowards Trusted eHealth Services in the Cloud
Towards Trusted eHealth Services in the Cloud
 
A Survey on Context Security Policies in the Cloud
A Survey on Context Security Policies in the CloudA Survey on Context Security Policies in the Cloud
A Survey on Context Security Policies in the Cloud
 
Towards Efficient and Secure Data Storage in Multi-Tenant Cloud-Based CRM Sol...
Towards Efficient and Secure Data Storage in Multi-Tenant Cloud-Based CRM Sol...Towards Efficient and Secure Data Storage in Multi-Tenant Cloud-Based CRM Sol...
Towards Efficient and Secure Data Storage in Multi-Tenant Cloud-Based CRM Sol...
 
PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...
PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...
PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...
 

Kürzlich hochgeladen

Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Exploring ChatGPT Prompt Hacks To Maximally Optimise Your Queries
Exploring ChatGPT Prompt Hacks To Maximally Optimise Your QueriesExploring ChatGPT Prompt Hacks To Maximally Optimise Your Queries
Exploring ChatGPT Prompt Hacks To Maximally Optimise Your QueriesSanjay Willie
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Fact vs. Fiction: Autodetecting Hallucinations in LLMs
Fact vs. Fiction: Autodetecting Hallucinations in LLMsFact vs. Fiction: Autodetecting Hallucinations in LLMs
Fact vs. Fiction: Autodetecting Hallucinations in LLMsZilliz
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 

Kürzlich hochgeladen (20)

Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Exploring ChatGPT Prompt Hacks To Maximally Optimise Your Queries
Exploring ChatGPT Prompt Hacks To Maximally Optimise Your QueriesExploring ChatGPT Prompt Hacks To Maximally Optimise Your Queries
Exploring ChatGPT Prompt Hacks To Maximally Optimise Your Queries
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Fact vs. Fiction: Autodetecting Hallucinations in LLMs
Fact vs. Fiction: Autodetecting Hallucinations in LLMsFact vs. Fiction: Autodetecting Hallucinations in LLMs
Fact vs. Fiction: Autodetecting Hallucinations in LLMs
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 

No More Dark Clouds With PaaSword - An Innovative Security By Design Framework

  • 1. www.paasword.eu No More Dark Clouds With PaaSword – An Innovative Security By Design Framework Cloud Forward Conference Oct 18-20, 2016 – Madrid, Spain
  • 2. Cloud Paradigm Shift The cloud paradigm has definitely prevailed Most application are delivered following the SaaS model Many developers rely on PaaS offerings for scalablity Nearly all underlying resources (DBs, Queues etc) are outsourced at the IaaS level Attack vectors have increased ‘Raw data’ are the modern hacker’s holy grail The responsibility for the protection of data has shifted to the developer PaaSword24/10/2016 2
  • 3. 60% of attacks target the database PaaSword24/10/2016 3
  • 5. Motivation – Security as an Enterprise Requirement Enterprises identify security concerns and data privacy as the most significant barriers of Cloud adoption; In addition: Compliance (e.g., legal, regulatory, industry-standard compliance) Cultural resistance Encryption and key management as top priority requirements [3] & [4] PaaSword24/10/2016 5 [3] P. Institute, “2015 Global Encryption & Key,” Thales, 2015. [4] CipherCloud, “Global cloud data security report - The authority on how to protect data in the cloud,” CipherCloud, 2015.
  • 6. How shall we lower the barriers? Security concerns Protect confidential information Control access Trust cloud provider Secure Cloud Applications Data privacy Secure storage Encryption Trustable Key Management Control Access to data PaaSword 24/10/2016 6 PaaSword
  • 7. Problem Areas Targeted Insufficient security and trust of cloud infrastructures and services Cloud application developers have difficulties specifying appropriate level of security Appropriate context-aware access control mechanisms for cloud applications Ensure protection, privacy and integrity of data stored in the cloud Prove applicability, usability, effectiveness and value of secure cloud platforms PaaSword24/10/2016 7
  • 9. PaaSword Features A security-by-design framework which will allow developers to engineer secure applications Leverage the security and trust of data that reside on outsourced infrastructure Facilitate context-aware access to encrypted and (even) physically distributed datasets stored in the cloud Prove applicability, usability, effectiveness and value of our framework in real-life Cloud infrastructures, services and applications29/06/2016 9 PaaSProvider PaaSword API DBwith Indexersonencrypteddata QueriesusingSearchable Trusted IaaSProvider Adversary User Developer PublishesApplication Encryption Scheme usingPaaSword API encrypteddata PaaSword
  • 10. Major Assets developed so far… A JAVA annotation library that can be used during development in order to annotate database models (using JPA) These annotations are translated during runtime to privacy constraints that drive the fragmentation of the database A virtual-database proxy that is able to handle any SQL query by translating it in the proper format based on the fragmentation scheme An XACML-compliant authorization engine that is able to perform reasoning prior to attribute-evaluation An integrated IDE environment where developers can submit and control their PaaSword-enabled applications PaaSword24/10/2016 10
  • 11. Integration of Eclipse CHE IDE PaaSword24/10/2016 11
  • 13. Asset: Virtual Database Architecture PaaSword24/10/2016 13 Data Index2Index1 SQL SQLDatabase Proxy (trusted) SQL Cloud (untrusted) User / Application Data (not encrypted) Data (encrypted)
  • 15. Interested in… ? Getting access to early results? Shaping and expanding PaaSword? Networking with leading companies & research institutes? Collaborating with us and the PaaSword Community? Join the Cloud Security Industrial Focus Group! Register at: https://www.paasword.eu/register/ 19PaaSword
  • 16. PaaSword24/10/2016 20 Join our Industrial Focus Group Today! Visit us: www.paasword. eu Acknowledgements: This project has received funding from the European Union’s Horizon 2020 research and innovation programme under grant agreement No 644814.