SlideShare ist ein Scribd-Unternehmen logo
1 von 17
Downloaden Sie, um offline zu lesen
PRISMACLOUD
Cloud Security and Privacy by Design
Horizon 2020 programme; duration 2/2015-7/2018
—
6th International Conference on eDemocracy
Citizen rights in the world of the new computing paradigms
Thomas L¨anger
thomas.laenger@unil.ch
Swiss Cybersecurity Advisory & Research Group
Universit´e de Lausanne
10 Dec 2015 – 16:15-17:15
Thomas L¨anger (Universit´e de Lausanne) PRISMACLOUD 10 Dec 2015 – 16:15-17:15 1 / 17
Talk outline
Present H2020 project PRISMACLOUD (2.2015 - 8.2018)
(Abbr.: Privacy and Security Maintaining Services in the Cloud)
Current cloud computing models
Cloud market and cloud providers
Governance in cloud computing
More organisational and technical risks
PRISMACLOUD approach and portfolio
...on 17 slides
Thomas L¨anger (Universit´e de Lausanne) PRISMACLOUD 10 Dec 2015 – 16:15-17:15 2 / 17
Definition of cloud computing
Widely accepted definition by the NIST (Special Publication
SP800-145, 7 pages; emph. by me):
Cloud computing is a model for enabling ubiquitous,
convenient, on-demand network access to a shared
pool of configurable computing resources (e.g.,
networks, servers, storage, applications, and services) that
can be rapidly provisioned and released with minimal
management effort or service provider interaction.
This cloud model is composed of five essential
characteristics, three service models, and four deployment
models.
Thomas L¨anger (Universit´e de Lausanne) PRISMACLOUD 10 Dec 2015 – 16:15-17:15 3 / 17
Definition of cloud computing
Widely accepted definition by the NIST (Special Publication
SP800-145, 7 pages; emph. by me):
Cloud computing is a model for enabling ubiquitous,
convenient, on-demand network access to a shared
pool of configurable computing resources (e.g.,
networks, servers, storage, applications, and services) that
can be rapidly provisioned and released with minimal
management effort or service provider interaction.
This cloud model is composed of five essential
characteristics, three service models, and four deployment
models.
Sounds like an end-user paradise. But is it really true?
Thomas L¨anger (Universit´e de Lausanne) PRISMACLOUD 10 Dec 2015 – 16:15-17:15 4 / 17
This cloud model is composed of...
five essential characteristics:
On-demand self-service, Broad network access
Resource pooling, Rapid elasticity, Measured service
three service models:
Software as a service (SaaS), Platform as a service (PaaS)
Infrastructure as a service (IaaS), + data storage-, hardware-,
function-, big data-, security-, management- as a service
four deployment models:
Private cloud, Community cloud
Public cloud, Hybrid cloud (all SP800-145)
Thomas L¨anger (Universit´e de Lausanne) PRISMACLOUD 10 Dec 2015 – 16:15-17:15 5 / 17
”Servicification” - transform a product into a
service
We witness now the servicification or tertiarisation of the ICT
sector:
The ICT products are enrolled to a greater extent to cloud
providers, instead as to end-users;
end users only need to provide an access platform (e.g. a thin
client with a web browser) and an online connection;
The cloud providers generate the additional value of the services
and sell the services to the end-users;
the cloud providers get access to valuable data and metadata;
cloud providers control access to the data.
Thomas L¨anger (Universit´e de Lausanne) PRISMACLOUD 10 Dec 2015 – 16:15-17:15 6 / 17
Cloud market: A few figures
Management consulter Accenture sees 46% of the IT spending for
’cloud-related platforms and applications’ by 2016
A Cloud Computing Forecast Summary for 2013 - 2017 from IDC, Gartner and
KPMG; online: www. prweb. com/ releases/ 2013/ 11/ prweb11341594. htm , citing
a study by Accenture (2013)
The cloud computing market is by 2015 estimated to be in the region
of USD 150 billion, and will probably grow by the year 2018 to
around USD 200 billion
Transparency Market Research: Cloud Computing Services Market - Global
Industry Size, Share, Trends, Analysis And Forecasts 2012 - 2018, online: www.
transparencymarketresearch. com/ cloud-computing-services-market. html
”Amazon Web Services is a $5 billion business and still growing fast”
Amazon quaterly earnings report Q1/2015 phx. corporate-ir. net/ phoenix.
zhtml? c= 97664& p= irol-newsArticle& ID= 20395989
Thomas L¨anger (Universit´e de Lausanne) PRISMACLOUD 10 Dec 2015 – 16:15-17:15 7 / 17
The clouds: who provides them?
The cloud service providers are well known from their past in IT:
Amazon Web Services (biggest retailer, biggest cloud provider)
Google-YouTube-Android: (bought 181 companies 2001-2015)
Microsoft-Azure-Skype,
Facebook (bought 53 companies 2005-2015) etc. etc.
Some of them also want to ’get a grip’ on the data or at least on
the meta-data. Most public clouds reserve themselves access to
who communicates with whom,
and when, and where from (all these are metadata);
establish detailed profiles of millions of individuals and dragnet
or mine them for valuable information,
identify potential ’targets’ for marketing
Thomas L¨anger (Universit´e de Lausanne) PRISMACLOUD 10 Dec 2015 – 16:15-17:15 8 / 17
Governance
For sensitive data, like data in critical infrastructures, or private
personal data (e.g. health data), European legislation does not
only reserve ultimate control of the data to its owner (which is
in the case of the health case the patient), but also requires data
confidentiality for extended periods of time (like 80 years into
the future).
On the other hands, companies move data between jurisdictions
and such prevent the enforcement of legal rights. Big corporations
use loop-holes in legal systems and influence policy processes by
extensive lobbying.
Thomas L¨anger (Universit´e de Lausanne) PRISMACLOUD 10 Dec 2015 – 16:15-17:15 9 / 17
More pending risks in cloud computing
As the cloud metaphor already indicates, you put your data into
some opaque thing somewhere on the internet. But that’s just
what you wanted to do: Give the data to somebody else for taking
care of it. This is may be quite practical, and save you some money
in the first place (see the advantages listed in NIST definition), but
leads to a series of information risks:
Policy and organisational risks
lack of control, lack of information on processing
loss of governance (data moved to another legislation)
vendor lock in
Technical risks
diverse data protection risks
isolation failure
data loss, abuse, malicious outsider and insider etc.
Thomas L¨anger (Universit´e de Lausanne) PRISMACLOUD 10 Dec 2015 – 16:15-17:15 10 / 17
Horizon 2020 project PRISMACLOUD approach
A 3.5 year project with the goal to enable end-to-end security for
cloud users, and to provide tools to reinstate governance to end
users with the best technical means – by cryptography
Provide 10 cryptographic functions to support end user goals in
cloud computing from the following 4 fields:
Protection of data at rest
More privacy of end users
Authentication of stored and processed data
Certification of virtual infrastructures
Make cryptography available, usable and economically relevant
for clouds – and build it into systems by design
Evaluate its capabilities in real-life scenarios
Put a focus on usability, policy, and standardisation
Thomas L¨anger (Universit´e de Lausanne) PRISMACLOUD 10 Dec 2015 – 16:15-17:15 11 / 17
Example: Secure cloud storage ”by default”
Provide a storage service as most users would expect:
the data remains strongly confidential
the data is readily available on demand
the data may easily be shared with others
the data can easily be transferred to another provider when the
user wants to
Solution: use a cryptographic storage network
use an information dispersal algorithm with a threshold scheme
(Shamir secret sharing, e.g. 3 out of 5)
”keyless encryption” under non-collusion assumption
capable of long term security (substitution of shares to counter
collusion threat)
implicit backup
change of provider: (take a provider’s share out of the set,
generate a new share for the new provider)
Thomas L¨anger (Universit´e de Lausanne) PRISMACLOUD 10 Dec 2015 – 16:15-17:15 12 / 17
Services enabled by PRISMACLOUD crypto tools
(Part I)
Data storage in the cloud
Secure cloud storage ”by default”
enabled by: Cryptographic storage network
Moving a legacy application to the cloud
enabled by: Data security for database applications
User privacy protection
Non-identifiable and untrackable use of a cloud service
Minimal exposure of personal data during authentication
enabled by: Anonymous credentials and Group signatures
Thomas L¨anger (Universit´e de Lausanne) PRISMACLOUD 10 Dec 2015 – 16:15-17:15 13 / 17
Services enabled by PRISMACLOUD crypto tools
(Part II)
Authentication of stored and processed data
Black out information from electronically signed documents
Allow someone to modify your electronically signed documents
enabled by: Malleable signtures
Controlling the correctness of delegated computations
enabled by: Verifiable computation
Certification of virtualised infrastructures:
Certification of virtualised infrastructures
Thomas L¨anger (Universit´e de Lausanne) PRISMACLOUD 10 Dec 2015 – 16:15-17:15 14 / 17
H2020 Project PrismaCloud
Call: H2020-ICT-2014-1
Acronym: PRISMACLOUD
Type of Action: RIA
Number: 644962
Partners: 16
Duration: 42 months
Start Date: 2015-02-01
Estimated Project Cost: 8.5MAC
Requested EU Contrib.: 8MAC
Coordinator: Austrian Institute
of Technology GmbH
www.prismacloud.eu
Thomas L¨anger (Universit´e de Lausanne) PRISMACLOUD 10 Dec 2015 – 16:15-17:15 15 / 17
Thomas L¨anger (Universit´e de Lausanne) PRISMACLOUD 10 Dec 2015 – 16:15-17:15 16 / 17
About: Thomas L¨anger
Hi, I’m post-doc researcher at the Swiss Cybersecurity Advisory
& Research Group of the Institute of Information Systems, Faculty
of Business and Economics, University of Lausanne.
Currently active in H2020 Project ”PrismaCloud” 1 Feb 2015
+ 42 month; 16 Partners, Project cost approx. 8.5MAC ”Develop
next-generation cryptographically secured services for the cloud.”
My tasks: cloud computing (cc) security design patterns; cc
standardisation; end user impact analysis of cc.
Thomas L¨anger (Universit´e de Lausanne) PRISMACLOUD 10 Dec 2015 – 16:15-17:15 17 / 17

Weitere ähnliche Inhalte

Was ist angesagt?

SD WAN Overview | What is SD WAN | Benefits of SD WAN
SD WAN Overview | What is SD WAN | Benefits of SD WAN SD WAN Overview | What is SD WAN | Benefits of SD WAN
SD WAN Overview | What is SD WAN | Benefits of SD WAN
Ashutosh Kaushik
 

Was ist angesagt? (20)

Azure storage
Azure storageAzure storage
Azure storage
 
Web application security part 01
Web application security part 01Web application security part 01
Web application security part 01
 
Secure shell ppt
Secure shell pptSecure shell ppt
Secure shell ppt
 
Sessions in php
Sessions in php Sessions in php
Sessions in php
 
Web Application Firewall
Web Application FirewallWeb Application Firewall
Web Application Firewall
 
SD WAN Overview | What is SD WAN | Benefits of SD WAN
SD WAN Overview | What is SD WAN | Benefits of SD WAN SD WAN Overview | What is SD WAN | Benefits of SD WAN
SD WAN Overview | What is SD WAN | Benefits of SD WAN
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application Security
 
Cloud security Presentation
Cloud security PresentationCloud security Presentation
Cloud security Presentation
 
Azure Network Security Groups (NSG)
Azure Network Security Groups (NSG)Azure Network Security Groups (NSG)
Azure Network Security Groups (NSG)
 
Public vs private vs hybrid cloud what is best for your business-
Public vs private vs hybrid cloud  what is best for your business-Public vs private vs hybrid cloud  what is best for your business-
Public vs private vs hybrid cloud what is best for your business-
 
Cloud computing saas
Cloud computing   saasCloud computing   saas
Cloud computing saas
 
Hybrid Cloud and Its Implementation
Hybrid Cloud and Its ImplementationHybrid Cloud and Its Implementation
Hybrid Cloud and Its Implementation
 
Basics of Denial of Service Attacks
Basics of Denial of Service AttacksBasics of Denial of Service Attacks
Basics of Denial of Service Attacks
 
What is SASE
What is SASEWhat is SASE
What is SASE
 
DevSecOps in the Cloud from the Lens of a Well-Architected Framework.pptx
DevSecOps in the Cloud from the Lens of a  Well-Architected Framework.pptxDevSecOps in the Cloud from the Lens of a  Well-Architected Framework.pptx
DevSecOps in the Cloud from the Lens of a Well-Architected Framework.pptx
 
Content Delivery Networks (CDN)
Content Delivery Networks (CDN)Content Delivery Networks (CDN)
Content Delivery Networks (CDN)
 
Azure DDoS Protection Standard
Azure DDoS Protection StandardAzure DDoS Protection Standard
Azure DDoS Protection Standard
 
Microsoft Azure
Microsoft AzureMicrosoft Azure
Microsoft Azure
 
Web application attacks
Web application attacksWeb application attacks
Web application attacks
 
IoT Cloud Overview
IoT Cloud OverviewIoT Cloud Overview
IoT Cloud Overview
 

Ähnlich wie PRISMACLOUD Cloud Security and Privacy by Design

Secure One Time Password OTP Generation for user Authentication in Cloud Envi...
Secure One Time Password OTP Generation for user Authentication in Cloud Envi...Secure One Time Password OTP Generation for user Authentication in Cloud Envi...
Secure One Time Password OTP Generation for user Authentication in Cloud Envi...
ijtsrd
 
Iirdem a novel approach for enhancing security in multi cloud environment
Iirdem a novel approach for enhancing security in multi  cloud environmentIirdem a novel approach for enhancing security in multi  cloud environment
Iirdem a novel approach for enhancing security in multi cloud environment
Iaetsd Iaetsd
 

Ähnlich wie PRISMACLOUD Cloud Security and Privacy by Design (20)

Privacy and security in the cloud Challenges and solutions for our future inf...
Privacy and security in the cloud Challenges and solutions for our future inf...Privacy and security in the cloud Challenges and solutions for our future inf...
Privacy and security in the cloud Challenges and solutions for our future inf...
 
Challenges of IP protection in era of cloud computing
Challenges of IP protection in era of cloud computingChallenges of IP protection in era of cloud computing
Challenges of IP protection in era of cloud computing
 
SECURE DATA TRANSFER BASED ON CLOUD COMPUTING
SECURE DATA TRANSFER BASED ON CLOUD COMPUTINGSECURE DATA TRANSFER BASED ON CLOUD COMPUTING
SECURE DATA TRANSFER BASED ON CLOUD COMPUTING
 
Cloud Forensics: Drawbacks in Current Methodologies and Proposed Solution
Cloud Forensics: Drawbacks in Current Methodologies and Proposed SolutionCloud Forensics: Drawbacks in Current Methodologies and Proposed Solution
Cloud Forensics: Drawbacks in Current Methodologies and Proposed Solution
 
No More Dark Clouds: A Privacy Preserving Framework for the Cloud
No More Dark Clouds: A Privacy Preserving Framework for the CloudNo More Dark Clouds: A Privacy Preserving Framework for the Cloud
No More Dark Clouds: A Privacy Preserving Framework for the Cloud
 
Secure One Time Password OTP Generation for user Authentication in Cloud Envi...
Secure One Time Password OTP Generation for user Authentication in Cloud Envi...Secure One Time Password OTP Generation for user Authentication in Cloud Envi...
Secure One Time Password OTP Generation for user Authentication in Cloud Envi...
 
Tech equity - Cloud presentation
Tech equity - Cloud presentationTech equity - Cloud presentation
Tech equity - Cloud presentation
 
B1802041217
B1802041217B1802041217
B1802041217
 
Encryption Algorithms for Cloud
Encryption Algorithms for CloudEncryption Algorithms for Cloud
Encryption Algorithms for Cloud
 
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET-  	  Improving Data Spillage in Multi-Cloud Capacity AdministrationIRJET-  	  Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
 
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET- Improving Data Spillage in Multi-Cloud Capacity AdministrationIRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
 
PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...
PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...
PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...
 
"Engineering implications of the cloud when applied to the Media" - Mesclado'...
"Engineering implications of the cloud when applied to the Media" - Mesclado'..."Engineering implications of the cloud when applied to the Media" - Mesclado'...
"Engineering implications of the cloud when applied to the Media" - Mesclado'...
 
Project 3
Project 3Project 3
Project 3
 
Design and implement a new cloud security method based on multi clouds on ope...
Design and implement a new cloud security method based on multi clouds on ope...Design and implement a new cloud security method based on multi clouds on ope...
Design and implement a new cloud security method based on multi clouds on ope...
 
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
 
Iirdem a novel approach for enhancing security in multi cloud environment
Iirdem a novel approach for enhancing security in multi  cloud environmentIirdem a novel approach for enhancing security in multi  cloud environment
Iirdem a novel approach for enhancing security in multi cloud environment
 
Bni cloud presentation
Bni cloud presentationBni cloud presentation
Bni cloud presentation
 
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
A Trusted TPA Model, to Improve Security & Reliability for Cloud StorageA Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
 
Cloud intrusion detection System
Cloud intrusion detection SystemCloud intrusion detection System
Cloud intrusion detection System
 

Kürzlich hochgeladen

Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
soniya singh
 
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
ellan12
 
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
soniya singh
 
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
soniya singh
 
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Call Girls In Delhi Whatsup 9873940964 Enjoy Unlimited Pleasure
 
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
imonikaupta
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
Diya Sharma
 
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Chandigarh Call girls 9053900678 Call girls in Chandigarh
 

Kürzlich hochgeladen (20)

Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirt
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
 
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
 
Al Barsha Night Partner +0567686026 Call Girls Dubai
Al Barsha Night Partner +0567686026 Call Girls  DubaiAl Barsha Night Partner +0567686026 Call Girls  Dubai
Al Barsha Night Partner +0567686026 Call Girls Dubai
 
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
 
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
 
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
 
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
 
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
Russian Call Girls in %(+971524965298  )#  Call Girls in DubaiRussian Call Girls in %(+971524965298  )#  Call Girls in Dubai
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
 
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
 
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
 
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
 
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
 
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
 
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirt
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
 
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
 

PRISMACLOUD Cloud Security and Privacy by Design

  • 1. PRISMACLOUD Cloud Security and Privacy by Design Horizon 2020 programme; duration 2/2015-7/2018 — 6th International Conference on eDemocracy Citizen rights in the world of the new computing paradigms Thomas L¨anger thomas.laenger@unil.ch Swiss Cybersecurity Advisory & Research Group Universit´e de Lausanne 10 Dec 2015 – 16:15-17:15 Thomas L¨anger (Universit´e de Lausanne) PRISMACLOUD 10 Dec 2015 – 16:15-17:15 1 / 17
  • 2. Talk outline Present H2020 project PRISMACLOUD (2.2015 - 8.2018) (Abbr.: Privacy and Security Maintaining Services in the Cloud) Current cloud computing models Cloud market and cloud providers Governance in cloud computing More organisational and technical risks PRISMACLOUD approach and portfolio ...on 17 slides Thomas L¨anger (Universit´e de Lausanne) PRISMACLOUD 10 Dec 2015 – 16:15-17:15 2 / 17
  • 3. Definition of cloud computing Widely accepted definition by the NIST (Special Publication SP800-145, 7 pages; emph. by me): Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. This cloud model is composed of five essential characteristics, three service models, and four deployment models. Thomas L¨anger (Universit´e de Lausanne) PRISMACLOUD 10 Dec 2015 – 16:15-17:15 3 / 17
  • 4. Definition of cloud computing Widely accepted definition by the NIST (Special Publication SP800-145, 7 pages; emph. by me): Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. This cloud model is composed of five essential characteristics, three service models, and four deployment models. Sounds like an end-user paradise. But is it really true? Thomas L¨anger (Universit´e de Lausanne) PRISMACLOUD 10 Dec 2015 – 16:15-17:15 4 / 17
  • 5. This cloud model is composed of... five essential characteristics: On-demand self-service, Broad network access Resource pooling, Rapid elasticity, Measured service three service models: Software as a service (SaaS), Platform as a service (PaaS) Infrastructure as a service (IaaS), + data storage-, hardware-, function-, big data-, security-, management- as a service four deployment models: Private cloud, Community cloud Public cloud, Hybrid cloud (all SP800-145) Thomas L¨anger (Universit´e de Lausanne) PRISMACLOUD 10 Dec 2015 – 16:15-17:15 5 / 17
  • 6. ”Servicification” - transform a product into a service We witness now the servicification or tertiarisation of the ICT sector: The ICT products are enrolled to a greater extent to cloud providers, instead as to end-users; end users only need to provide an access platform (e.g. a thin client with a web browser) and an online connection; The cloud providers generate the additional value of the services and sell the services to the end-users; the cloud providers get access to valuable data and metadata; cloud providers control access to the data. Thomas L¨anger (Universit´e de Lausanne) PRISMACLOUD 10 Dec 2015 – 16:15-17:15 6 / 17
  • 7. Cloud market: A few figures Management consulter Accenture sees 46% of the IT spending for ’cloud-related platforms and applications’ by 2016 A Cloud Computing Forecast Summary for 2013 - 2017 from IDC, Gartner and KPMG; online: www. prweb. com/ releases/ 2013/ 11/ prweb11341594. htm , citing a study by Accenture (2013) The cloud computing market is by 2015 estimated to be in the region of USD 150 billion, and will probably grow by the year 2018 to around USD 200 billion Transparency Market Research: Cloud Computing Services Market - Global Industry Size, Share, Trends, Analysis And Forecasts 2012 - 2018, online: www. transparencymarketresearch. com/ cloud-computing-services-market. html ”Amazon Web Services is a $5 billion business and still growing fast” Amazon quaterly earnings report Q1/2015 phx. corporate-ir. net/ phoenix. zhtml? c= 97664& p= irol-newsArticle& ID= 20395989 Thomas L¨anger (Universit´e de Lausanne) PRISMACLOUD 10 Dec 2015 – 16:15-17:15 7 / 17
  • 8. The clouds: who provides them? The cloud service providers are well known from their past in IT: Amazon Web Services (biggest retailer, biggest cloud provider) Google-YouTube-Android: (bought 181 companies 2001-2015) Microsoft-Azure-Skype, Facebook (bought 53 companies 2005-2015) etc. etc. Some of them also want to ’get a grip’ on the data or at least on the meta-data. Most public clouds reserve themselves access to who communicates with whom, and when, and where from (all these are metadata); establish detailed profiles of millions of individuals and dragnet or mine them for valuable information, identify potential ’targets’ for marketing Thomas L¨anger (Universit´e de Lausanne) PRISMACLOUD 10 Dec 2015 – 16:15-17:15 8 / 17
  • 9. Governance For sensitive data, like data in critical infrastructures, or private personal data (e.g. health data), European legislation does not only reserve ultimate control of the data to its owner (which is in the case of the health case the patient), but also requires data confidentiality for extended periods of time (like 80 years into the future). On the other hands, companies move data between jurisdictions and such prevent the enforcement of legal rights. Big corporations use loop-holes in legal systems and influence policy processes by extensive lobbying. Thomas L¨anger (Universit´e de Lausanne) PRISMACLOUD 10 Dec 2015 – 16:15-17:15 9 / 17
  • 10. More pending risks in cloud computing As the cloud metaphor already indicates, you put your data into some opaque thing somewhere on the internet. But that’s just what you wanted to do: Give the data to somebody else for taking care of it. This is may be quite practical, and save you some money in the first place (see the advantages listed in NIST definition), but leads to a series of information risks: Policy and organisational risks lack of control, lack of information on processing loss of governance (data moved to another legislation) vendor lock in Technical risks diverse data protection risks isolation failure data loss, abuse, malicious outsider and insider etc. Thomas L¨anger (Universit´e de Lausanne) PRISMACLOUD 10 Dec 2015 – 16:15-17:15 10 / 17
  • 11. Horizon 2020 project PRISMACLOUD approach A 3.5 year project with the goal to enable end-to-end security for cloud users, and to provide tools to reinstate governance to end users with the best technical means – by cryptography Provide 10 cryptographic functions to support end user goals in cloud computing from the following 4 fields: Protection of data at rest More privacy of end users Authentication of stored and processed data Certification of virtual infrastructures Make cryptography available, usable and economically relevant for clouds – and build it into systems by design Evaluate its capabilities in real-life scenarios Put a focus on usability, policy, and standardisation Thomas L¨anger (Universit´e de Lausanne) PRISMACLOUD 10 Dec 2015 – 16:15-17:15 11 / 17
  • 12. Example: Secure cloud storage ”by default” Provide a storage service as most users would expect: the data remains strongly confidential the data is readily available on demand the data may easily be shared with others the data can easily be transferred to another provider when the user wants to Solution: use a cryptographic storage network use an information dispersal algorithm with a threshold scheme (Shamir secret sharing, e.g. 3 out of 5) ”keyless encryption” under non-collusion assumption capable of long term security (substitution of shares to counter collusion threat) implicit backup change of provider: (take a provider’s share out of the set, generate a new share for the new provider) Thomas L¨anger (Universit´e de Lausanne) PRISMACLOUD 10 Dec 2015 – 16:15-17:15 12 / 17
  • 13. Services enabled by PRISMACLOUD crypto tools (Part I) Data storage in the cloud Secure cloud storage ”by default” enabled by: Cryptographic storage network Moving a legacy application to the cloud enabled by: Data security for database applications User privacy protection Non-identifiable and untrackable use of a cloud service Minimal exposure of personal data during authentication enabled by: Anonymous credentials and Group signatures Thomas L¨anger (Universit´e de Lausanne) PRISMACLOUD 10 Dec 2015 – 16:15-17:15 13 / 17
  • 14. Services enabled by PRISMACLOUD crypto tools (Part II) Authentication of stored and processed data Black out information from electronically signed documents Allow someone to modify your electronically signed documents enabled by: Malleable signtures Controlling the correctness of delegated computations enabled by: Verifiable computation Certification of virtualised infrastructures: Certification of virtualised infrastructures Thomas L¨anger (Universit´e de Lausanne) PRISMACLOUD 10 Dec 2015 – 16:15-17:15 14 / 17
  • 15. H2020 Project PrismaCloud Call: H2020-ICT-2014-1 Acronym: PRISMACLOUD Type of Action: RIA Number: 644962 Partners: 16 Duration: 42 months Start Date: 2015-02-01 Estimated Project Cost: 8.5MAC Requested EU Contrib.: 8MAC Coordinator: Austrian Institute of Technology GmbH www.prismacloud.eu Thomas L¨anger (Universit´e de Lausanne) PRISMACLOUD 10 Dec 2015 – 16:15-17:15 15 / 17
  • 16. Thomas L¨anger (Universit´e de Lausanne) PRISMACLOUD 10 Dec 2015 – 16:15-17:15 16 / 17
  • 17. About: Thomas L¨anger Hi, I’m post-doc researcher at the Swiss Cybersecurity Advisory & Research Group of the Institute of Information Systems, Faculty of Business and Economics, University of Lausanne. Currently active in H2020 Project ”PrismaCloud” 1 Feb 2015 + 42 month; 16 Partners, Project cost approx. 8.5MAC ”Develop next-generation cryptographically secured services for the cloud.” My tasks: cloud computing (cc) security design patterns; cc standardisation; end user impact analysis of cc. Thomas L¨anger (Universit´e de Lausanne) PRISMACLOUD 10 Dec 2015 – 16:15-17:15 17 / 17