SlideShare a Scribd company logo
1 of 20
Download to read offline
Securing Search Data in the Cloud
Sameer Maggon
Measured Search
Harry Ochiai
Hitachi Solutions
New York Enterprise Cloud Meetup
Jan 25, 2017
2
Agenda
• About the Speakers
• About Measured Search & Hitachi Solutions
• What is Apache Solr?
• Where is Apache Solr used?
• How Search Data is stored
• Data Security Challenge in the Cloud
• Protecting Confidential Search Data
• Challenges of Encrypted Search Index
• Encryption Solution
• Demo
• Q&A
© Hitachi Solutions America, Ltd. and Measured Search, Inc. 2017, All rights reserved.
3
About the Speakers
Harry Ochiai
• Senior Business Development Manager of Hitachi Solutions
• Worked on networking, cyber security, and storage
• Focus on cloud encryption solutions since 2013
• New Yorker
Sameer Maggon
• Founder / Technologist at Measured Search
• Been working in Open Source Search since 2001 (Lucene/Solr/Elastic)
• USC Engineering Alumni
• Works and Lives in Los Angeles, CA
© Hitachi Solutions America, Ltd. and Measured Search, Inc. 2017, All rights reserved.
4
About Hitachi Solutions
Global IT Solutions Company
• A Hitachi Company
• Japan(HQ), North America, Europe, China, India and Southeast Asia
• 12,000 Employees
Leading security solution provider in Japan
• Innovator and leading provider of encryption technology for over 20 years
• HIBUN: 40% market share in the endpoint encryption segment in Japan
• Launched new security solution Credeon globally in 2013
© Hitachi Solutions America, Ltd. and Measured Search, Inc. 2017, All rights reserved.
5
About Measured Search
Measured Search® enables companies to elevate the experience of Search
based applications faster and with more confidence.
Managed Services &
Support
SearchStax®
Platform as a Service
On-Demand
Expertise & Consulting
© Hitachi Solutions America, Ltd. and Measured Search, Inc. 2017, All rights reserved.
6
by Measured SearchSearchStax®
SearchStax®
Solr Cloud Manager
SearchStax®
Pulse
SearchStax®
Analytics
Comprehensive Solr Monitoring &
Alerting with service level reporting
to proactively manage your clusters.
Realtime feedback & user
insights to help optimize
your Search Experience
Easiest way to run & manage
Solr in the cloud - saves time,
money and reduces risk.
© Hitachi Solutions America, Ltd. and Measured Search, Inc. 2017, All rights reserved.
7
What is Apache Solr?
Solr is the popular, blazing-fast, open source
enterprise search platform built on Apache
Lucene™
© Hitachi Solutions America, Ltd. and Measured Search, Inc. 2017, All rights reserved.
8
Where is Apache Solr used?
Government
eCommerce
Education
Life Sciences
Entertainment
Healthcare
Financial Services
High Tech
© Hitachi Solutions America, Ltd. and Measured Search, Inc. 2017, All rights reserved.
9
Where is Apache Solr used?
finding
tickets
finding job
finding restaurant/services
Enterprise
Search
Media
Search
Retail
Customer
Search
Fraud
Analytics
Publishing
RecruitingTravelResearch
Business
Intelligence
© Hitachi Solutions America, Ltd. and Measured Search, Inc. 2017, All rights reserved.
10
Search Index
Search platforms maintains internal indices of terms and properties of each
indexed document in plaintext.
Plain Search Index Encrypted Search Index
© Hitachi Solutions America, Ltd. and Measured Search, Inc. 2017, All rights reserved.
11
Data Security Challenges in the Cloud
Solr / Search Cluster
Backups
Threats
Managed Service Provider (MSP)
Rogue EmployeeManaged Service Provider Rogue Employee Hacker Accidental Data Access
© Hitachi Solutions America, Ltd. and Measured Search, Inc. 2017, All rights reserved.
12
Challenges of Encrypted Search Index
Challenges
• To search through encrypted data, data must be decrypted
• Decryption slows down the process
• Encryption limits usability
Goals
• Maintain encrypted state without sacrificing security level
• Encrypt using your own key
• Maintain search performance and usability
• Protect against unauthorized users and rogue system administrators
• Regulatory compliance
Solution
• Searchable Encryption technology
© Hitachi Solutions America, Ltd. and Measured Search, Inc. 2017, All rights reserved.
13
Protecting Confidential Search Data
Solr/Lucene
text Key
word
result
value
Solr/Lucene
text Key
word
result
File System
Encryption
value
Solr/Lucene
text Key
word
result
value
Simple
Encryption
Solr/Lucene
text Key
word
result
value
Searchable
Encryption
text Key
word
result
value
Searchable
Encryption
Storage Storage Storage Storage Storage
Client
Server
App
Server
OS
No Encryption OS Encryption
Simple Encryption
with Solr Plugin
Client-Side Searchable
Encryption
Searchable Encryption
with Solr Plugin
Low Security High Security
No Security Decryption at storage layer
X Difficult to separate key
Decrypt first and match
X Very slow
X plaintextin memory
Match first and decrypt
O Key separation
O High Performance(1)
O Semantically Secure(2)
X plaintextin memory
Client Client Client Client Client
Decryption at client-side
O Key separation
O High Performance(1)
O Semantically Secure(2)
O no plaintexton server
Solr/Lucene
(1) Use of Symmetric Key
(2) Probabilistic Encryption Scheme
© Hitachi Solutions America, Ltd. and Measured Search, Inc. 2017, All rights reserved.
14
Search Encryption 101
Searchable Encryption is an encryption technology for searching data in an
encrypted state.
• Fully Homomorphic Encryption
• Homomorphic Encryption
• Functional Encryption
• Hitachi Searchable Encryption
Practical
CKA
CPA
Tokenization
103 10610010-3
Hitachi
Searchable
Encryption
Functional
Encryption
Homomorphic
Encryption
Fully Homomorphic
Encryption
Security
Performance (Search / sec)
EncryptedPlain
CKA: Chosen Keyword Attack
CPA: Chosen Phrase Attack
© Hitachi Solutions America, Ltd. and Measured Search, Inc. 2017, All rights reserved.
15
Search Encryption 101
Encryption Schemes
• Deterministic
• Constant value
• Vulnerable to statistical attacks
• Probabilistic
• Random value
• Semantically secure
Encryption Key Exchange
• Symmetric
• Asymmetric / PKI
© Hitachi Solutions America, Ltd. and Measured Search, Inc. 2017, All rights reserved.
16
Solution: Searchable Encryption with Solr Plugin
Hitachi Credeon Secure Full-Text Search
• Searchable Encryption plugin for Apache Solr and Elasticsearch
• Deterministic Encryption Scheme
• 128 bit randomization
• AES 256, FIPS 140-2
• Symmetric Key
• Real-time search (15%+ overhead)
• Key Management System, Java KeyStore
© Hitachi Solutions America, Ltd. and Measured Search, Inc. 2017, All rights reserved.
17
Solution: Client Side Searchable Encryption
Credeon Secure Document Solution for SharePoint Online
• Client-side encryption for search index and data
• Searchable encryption on Solr
• Search Engine and Key Management are independent of Microsoft
Search Server
SharePoint Server
Key Management
Server
Search Engine
SharePoint Online
Client PC
1. Get a key
2. Index the file contents
and encrypt index
4. Upload encrypted
file
4. Upload encrypted
index
3. Encrypt file
© Hitachi Solutions America, Ltd. and Measured Search, Inc. 2017, All rights reserved.
18
Demo: Securing Solr Search in the Cloud
SearchStax with Credeon
© Hitachi Solutions America, Ltd. and Measured Search, Inc. 2017, All rights reserved.
19
Q&A
© Hitachi Solutions America, Ltd. and Measured Search, Inc. 2017, All rights reserved.
20
Contact Info
Sameer Maggon
@maggon
sameer@measuredsearch.com
https://www.measuredsearch.com
Harry Ochiai
@credeon
hochiai@hitachi-solutions.com
https://psg.hitachi-solutions.com/credeon/overview
© Hitachi Solutions America, Ltd. and Measured Search, Inc. 2017, All rights reserved.

More Related Content

What's hot

API Security - Everything You Need to Know To Protect Your APIs
API Security - Everything You Need to Know To Protect Your APIsAPI Security - Everything You Need to Know To Protect Your APIs
API Security - Everything You Need to Know To Protect Your APIs
AaronLieberman5
 
Kerberos Authentication Protocol
Kerberos Authentication ProtocolKerberos Authentication Protocol
Kerberos Authentication Protocol
Bibek Subedi
 

What's hot (20)

これからのネイティブアプリにおけるOpenID Connectの活用
これからのネイティブアプリにおけるOpenID Connectの活用これからのネイティブアプリにおけるOpenID Connectの活用
これからのネイティブアプリにおけるOpenID Connectの活用
 
MarkdownをBacklogのwikiに変換するPWA
MarkdownをBacklogのwikiに変換するPWAMarkdownをBacklogのwikiに変換するPWA
MarkdownをBacklogのwikiに変換するPWA
 
Azure AD B2CにIdPを色々と繋いでみる
Azure AD B2CにIdPを色々と繋いでみるAzure AD B2CにIdPを色々と繋いでみる
Azure AD B2CにIdPを色々と繋いでみる
 
OpenID Connect のビジネスチャンス
OpenID Connect のビジネスチャンスOpenID Connect のビジネスチャンス
OpenID Connect のビジネスチャンス
 
API Security Best Practices & Guidelines
API Security Best Practices & GuidelinesAPI Security Best Practices & Guidelines
API Security Best Practices & Guidelines
 
ZOZOTOWNのアーキテクトという役割を紹介します
ZOZOTOWNのアーキテクトという役割を紹介しますZOZOTOWNのアーキテクトという役割を紹介します
ZOZOTOWNのアーキテクトという役割を紹介します
 
KeycloakでFAPIに対応した高セキュリティなAPIを公開する
KeycloakでFAPIに対応した高セキュリティなAPIを公開するKeycloakでFAPIに対応した高セキュリティなAPIを公開する
KeycloakでFAPIに対応した高セキュリティなAPIを公開する
 
WEBINAR: OWASP API Security Top 10
WEBINAR: OWASP API Security Top 10WEBINAR: OWASP API Security Top 10
WEBINAR: OWASP API Security Top 10
 
認証の課題とID連携の実装 〜ハンズオン〜
認証の課題とID連携の実装 〜ハンズオン〜認証の課題とID連携の実装 〜ハンズオン〜
認証の課題とID連携の実装 〜ハンズオン〜
 
Image and text Encryption using RSA algorithm in java
Image and text Encryption using RSA algorithm in java  Image and text Encryption using RSA algorithm in java
Image and text Encryption using RSA algorithm in java
 
ASP.NET Core 2.x Identityについて
ASP.NET Core 2.x IdentityについてASP.NET Core 2.x Identityについて
ASP.NET Core 2.x Identityについて
 
THE STATE OF OPENTELEMETRY, DOTAN HOROVITS, Logz.io
THE STATE OF OPENTELEMETRY, DOTAN HOROVITS, Logz.ioTHE STATE OF OPENTELEMETRY, DOTAN HOROVITS, Logz.io
THE STATE OF OPENTELEMETRY, DOTAN HOROVITS, Logz.io
 
俺が考えた最強のID連携デザインパターン
俺が考えた最強のID連携デザインパターン俺が考えた最強のID連携デザインパターン
俺が考えた最強のID連携デザインパターン
 
電子署名(PKI)ハンズオン資料 V1.00
電子署名(PKI)ハンズオン資料 V1.00電子署名(PKI)ハンズオン資料 V1.00
電子署名(PKI)ハンズオン資料 V1.00
 
RSA NetWitness Log Decoder
RSA NetWitness Log DecoderRSA NetWitness Log Decoder
RSA NetWitness Log Decoder
 
API Security - Everything You Need to Know To Protect Your APIs
API Security - Everything You Need to Know To Protect Your APIsAPI Security - Everything You Need to Know To Protect Your APIs
API Security - Everything You Need to Know To Protect Your APIs
 
MariaDBとMroongaで作る全言語対応超高速全文検索システム
MariaDBとMroongaで作る全言語対応超高速全文検索システムMariaDBとMroongaで作る全言語対応超高速全文検索システム
MariaDBとMroongaで作る全言語対応超高速全文検索システム
 
Implementing OAuth
Implementing OAuthImplementing OAuth
Implementing OAuth
 
Azure AD による Web API の 保護
Azure AD による Web API の 保護 Azure AD による Web API の 保護
Azure AD による Web API の 保護
 
Kerberos Authentication Protocol
Kerberos Authentication ProtocolKerberos Authentication Protocol
Kerberos Authentication Protocol
 

Similar to Securing Solr Search Data in the Cloud

Similar to Securing Solr Search Data in the Cloud (20)

CEPTES Product Deck
CEPTES Product Deck CEPTES Product Deck
CEPTES Product Deck
 
GraphTalk Helsinki - Introduction to Graphs and Neo4j
GraphTalk Helsinki - Introduction to Graphs and Neo4jGraphTalk Helsinki - Introduction to Graphs and Neo4j
GraphTalk Helsinki - Introduction to Graphs and Neo4j
 
Frank Bien Opening Keynote - Join 2016
Frank Bien Opening Keynote - Join 2016Frank Bien Opening Keynote - Join 2016
Frank Bien Opening Keynote - Join 2016
 
Frank Bien Opening Keynote - Join 2016
Frank Bien Opening Keynote - Join 2016Frank Bien Opening Keynote - Join 2016
Frank Bien Opening Keynote - Join 2016
 
Scalable Search Analytics
Scalable Search AnalyticsScalable Search Analytics
Scalable Search Analytics
 
Hadoop and Manufacturing
Hadoop and ManufacturingHadoop and Manufacturing
Hadoop and Manufacturing
 
Rethink Analytics with an Enterprise Data Hub
Rethink Analytics with an Enterprise Data HubRethink Analytics with an Enterprise Data Hub
Rethink Analytics with an Enterprise Data Hub
 
Building a data driven search application with LucidWorks SiLK
Building a data driven search application with LucidWorks SiLKBuilding a data driven search application with LucidWorks SiLK
Building a data driven search application with LucidWorks SiLK
 
Hr and performance analytics
Hr and performance analyticsHr and performance analytics
Hr and performance analytics
 
SharePointlandia 2013: SharePoint and Compliance
SharePointlandia 2013: SharePoint and ComplianceSharePointlandia 2013: SharePoint and Compliance
SharePointlandia 2013: SharePoint and Compliance
 
Building a Data Driven Culture and AI Revolution With Gregory Little | Curren...
Building a Data Driven Culture and AI Revolution With Gregory Little | Curren...Building a Data Driven Culture and AI Revolution With Gregory Little | Curren...
Building a Data Driven Culture and AI Revolution With Gregory Little | Curren...
 
Data Privacy & Governance in the Age of Big Data: Deploy a De-Identified Data...
Data Privacy & Governance in the Age of Big Data: Deploy a De-Identified Data...Data Privacy & Governance in the Age of Big Data: Deploy a De-Identified Data...
Data Privacy & Governance in the Age of Big Data: Deploy a De-Identified Data...
 
Unlocking New Insights with Information Discovery
Unlocking New Insights with Information DiscoveryUnlocking New Insights with Information Discovery
Unlocking New Insights with Information Discovery
 
Amundsen: From discovering to security data
Amundsen: From discovering to security dataAmundsen: From discovering to security data
Amundsen: From discovering to security data
 
(SEC402) Enterprise Cloud Security via DevSecOps 2.0
(SEC402) Enterprise Cloud Security via DevSecOps 2.0(SEC402) Enterprise Cloud Security via DevSecOps 2.0
(SEC402) Enterprise Cloud Security via DevSecOps 2.0
 
Developing an Effective Search Strategy for Office 365 and Hybrid Deployments
Developing an Effective Search Strategy for Office 365 and Hybrid DeploymentsDeveloping an Effective Search Strategy for Office 365 and Hybrid Deployments
Developing an Effective Search Strategy for Office 365 and Hybrid Deployments
 
Discovery, Risk, and Insight in a Metadata-Driven World Webinar
Discovery, Risk, and Insight in a Metadata-Driven World WebinarDiscovery, Risk, and Insight in a Metadata-Driven World Webinar
Discovery, Risk, and Insight in a Metadata-Driven World Webinar
 
Chatbots: Automated Conversational Model using Machine Learning
Chatbots: Automated Conversational Model using Machine LearningChatbots: Automated Conversational Model using Machine Learning
Chatbots: Automated Conversational Model using Machine Learning
 
Student information analytics
Student information analyticsStudent information analytics
Student information analytics
 
2016 Cybersecurity Analytics State of the Union
2016 Cybersecurity Analytics State of the Union2016 Cybersecurity Analytics State of the Union
2016 Cybersecurity Analytics State of the Union
 

More from Sameer Maggon

Building great mobile search with Productsy and CloudSearch
Building great mobile search with Productsy and CloudSearchBuilding great mobile search with Productsy and CloudSearch
Building great mobile search with Productsy and CloudSearch
Sameer Maggon
 

More from Sameer Maggon (7)

SolrCloud-Best Practices for Sitecore. Design, build, and devops considerations
SolrCloud-Best Practices for Sitecore. Design, build, and devops considerationsSolrCloud-Best Practices for Sitecore. Design, build, and devops considerations
SolrCloud-Best Practices for Sitecore. Design, build, and devops considerations
 
World Class Solr Power - in 30 minutes
World Class Solr Power - in 30 minutesWorld Class Solr Power - in 30 minutes
World Class Solr Power - in 30 minutes
 
Future of enterprise apps is open source and cloud computing
Future of enterprise apps is open source and cloud computingFuture of enterprise apps is open source and cloud computing
Future of enterprise apps is open source and cloud computing
 
Behind the Scenes of Multi-Cloud Solr-as-a-Service
Behind the Scenes of Multi-Cloud Solr-as-a-ServiceBehind the Scenes of Multi-Cloud Solr-as-a-Service
Behind the Scenes of Multi-Cloud Solr-as-a-Service
 
Making search better by tracking & utilizing user search behavior
Making search better by tracking & utilizing user search behaviorMaking search better by tracking & utilizing user search behavior
Making search better by tracking & utilizing user search behavior
 
Building great mobile search with Productsy and CloudSearch
Building great mobile search with Productsy and CloudSearchBuilding great mobile search with Productsy and CloudSearch
Building great mobile search with Productsy and CloudSearch
 
Local Search using Solr at YP.com
Local Search using Solr at YP.comLocal Search using Solr at YP.com
Local Search using Solr at YP.com
 

Recently uploaded

%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
masabamasaba
 
The title is not connected to what is inside
The title is not connected to what is insideThe title is not connected to what is inside
The title is not connected to what is inside
shinachiaurasa2
 

Recently uploaded (20)

Chinsurah Escorts ☎️8617697112 Starting From 5K to 15K High Profile Escorts ...
Chinsurah Escorts ☎️8617697112  Starting From 5K to 15K High Profile Escorts ...Chinsurah Escorts ☎️8617697112  Starting From 5K to 15K High Profile Escorts ...
Chinsurah Escorts ☎️8617697112 Starting From 5K to 15K High Profile Escorts ...
 
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
 
10 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 202410 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 2024
 
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
AI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplateAI & Machine Learning Presentation Template
AI & Machine Learning Presentation Template
 
SHRMPro HRMS Software Solutions Presentation
SHRMPro HRMS Software Solutions PresentationSHRMPro HRMS Software Solutions Presentation
SHRMPro HRMS Software Solutions Presentation
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
 
VTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnVTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learn
 
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
 
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
 
%+27788225528 love spells in Vancouver Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Vancouver Psychic Readings, Attraction spells,Br...%+27788225528 love spells in Vancouver Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Vancouver Psychic Readings, Attraction spells,Br...
 
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park %in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
 
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
 
Architecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the pastArchitecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the past
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
 
The Top App Development Trends Shaping the Industry in 2024-25 .pdf
The Top App Development Trends Shaping the Industry in 2024-25 .pdfThe Top App Development Trends Shaping the Industry in 2024-25 .pdf
The Top App Development Trends Shaping the Industry in 2024-25 .pdf
 
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
 
The title is not connected to what is inside
The title is not connected to what is insideThe title is not connected to what is inside
The title is not connected to what is inside
 
%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand
 

Securing Solr Search Data in the Cloud

  • 1. Securing Search Data in the Cloud Sameer Maggon Measured Search Harry Ochiai Hitachi Solutions New York Enterprise Cloud Meetup Jan 25, 2017
  • 2. 2 Agenda • About the Speakers • About Measured Search & Hitachi Solutions • What is Apache Solr? • Where is Apache Solr used? • How Search Data is stored • Data Security Challenge in the Cloud • Protecting Confidential Search Data • Challenges of Encrypted Search Index • Encryption Solution • Demo • Q&A © Hitachi Solutions America, Ltd. and Measured Search, Inc. 2017, All rights reserved.
  • 3. 3 About the Speakers Harry Ochiai • Senior Business Development Manager of Hitachi Solutions • Worked on networking, cyber security, and storage • Focus on cloud encryption solutions since 2013 • New Yorker Sameer Maggon • Founder / Technologist at Measured Search • Been working in Open Source Search since 2001 (Lucene/Solr/Elastic) • USC Engineering Alumni • Works and Lives in Los Angeles, CA © Hitachi Solutions America, Ltd. and Measured Search, Inc. 2017, All rights reserved.
  • 4. 4 About Hitachi Solutions Global IT Solutions Company • A Hitachi Company • Japan(HQ), North America, Europe, China, India and Southeast Asia • 12,000 Employees Leading security solution provider in Japan • Innovator and leading provider of encryption technology for over 20 years • HIBUN: 40% market share in the endpoint encryption segment in Japan • Launched new security solution Credeon globally in 2013 © Hitachi Solutions America, Ltd. and Measured Search, Inc. 2017, All rights reserved.
  • 5. 5 About Measured Search Measured Search® enables companies to elevate the experience of Search based applications faster and with more confidence. Managed Services & Support SearchStax® Platform as a Service On-Demand Expertise & Consulting © Hitachi Solutions America, Ltd. and Measured Search, Inc. 2017, All rights reserved.
  • 6. 6 by Measured SearchSearchStax® SearchStax® Solr Cloud Manager SearchStax® Pulse SearchStax® Analytics Comprehensive Solr Monitoring & Alerting with service level reporting to proactively manage your clusters. Realtime feedback & user insights to help optimize your Search Experience Easiest way to run & manage Solr in the cloud - saves time, money and reduces risk. © Hitachi Solutions America, Ltd. and Measured Search, Inc. 2017, All rights reserved.
  • 7. 7 What is Apache Solr? Solr is the popular, blazing-fast, open source enterprise search platform built on Apache Lucene™ © Hitachi Solutions America, Ltd. and Measured Search, Inc. 2017, All rights reserved.
  • 8. 8 Where is Apache Solr used? Government eCommerce Education Life Sciences Entertainment Healthcare Financial Services High Tech © Hitachi Solutions America, Ltd. and Measured Search, Inc. 2017, All rights reserved.
  • 9. 9 Where is Apache Solr used? finding tickets finding job finding restaurant/services Enterprise Search Media Search Retail Customer Search Fraud Analytics Publishing RecruitingTravelResearch Business Intelligence © Hitachi Solutions America, Ltd. and Measured Search, Inc. 2017, All rights reserved.
  • 10. 10 Search Index Search platforms maintains internal indices of terms and properties of each indexed document in plaintext. Plain Search Index Encrypted Search Index © Hitachi Solutions America, Ltd. and Measured Search, Inc. 2017, All rights reserved.
  • 11. 11 Data Security Challenges in the Cloud Solr / Search Cluster Backups Threats Managed Service Provider (MSP) Rogue EmployeeManaged Service Provider Rogue Employee Hacker Accidental Data Access © Hitachi Solutions America, Ltd. and Measured Search, Inc. 2017, All rights reserved.
  • 12. 12 Challenges of Encrypted Search Index Challenges • To search through encrypted data, data must be decrypted • Decryption slows down the process • Encryption limits usability Goals • Maintain encrypted state without sacrificing security level • Encrypt using your own key • Maintain search performance and usability • Protect against unauthorized users and rogue system administrators • Regulatory compliance Solution • Searchable Encryption technology © Hitachi Solutions America, Ltd. and Measured Search, Inc. 2017, All rights reserved.
  • 13. 13 Protecting Confidential Search Data Solr/Lucene text Key word result value Solr/Lucene text Key word result File System Encryption value Solr/Lucene text Key word result value Simple Encryption Solr/Lucene text Key word result value Searchable Encryption text Key word result value Searchable Encryption Storage Storage Storage Storage Storage Client Server App Server OS No Encryption OS Encryption Simple Encryption with Solr Plugin Client-Side Searchable Encryption Searchable Encryption with Solr Plugin Low Security High Security No Security Decryption at storage layer X Difficult to separate key Decrypt first and match X Very slow X plaintextin memory Match first and decrypt O Key separation O High Performance(1) O Semantically Secure(2) X plaintextin memory Client Client Client Client Client Decryption at client-side O Key separation O High Performance(1) O Semantically Secure(2) O no plaintexton server Solr/Lucene (1) Use of Symmetric Key (2) Probabilistic Encryption Scheme © Hitachi Solutions America, Ltd. and Measured Search, Inc. 2017, All rights reserved.
  • 14. 14 Search Encryption 101 Searchable Encryption is an encryption technology for searching data in an encrypted state. • Fully Homomorphic Encryption • Homomorphic Encryption • Functional Encryption • Hitachi Searchable Encryption Practical CKA CPA Tokenization 103 10610010-3 Hitachi Searchable Encryption Functional Encryption Homomorphic Encryption Fully Homomorphic Encryption Security Performance (Search / sec) EncryptedPlain CKA: Chosen Keyword Attack CPA: Chosen Phrase Attack © Hitachi Solutions America, Ltd. and Measured Search, Inc. 2017, All rights reserved.
  • 15. 15 Search Encryption 101 Encryption Schemes • Deterministic • Constant value • Vulnerable to statistical attacks • Probabilistic • Random value • Semantically secure Encryption Key Exchange • Symmetric • Asymmetric / PKI © Hitachi Solutions America, Ltd. and Measured Search, Inc. 2017, All rights reserved.
  • 16. 16 Solution: Searchable Encryption with Solr Plugin Hitachi Credeon Secure Full-Text Search • Searchable Encryption plugin for Apache Solr and Elasticsearch • Deterministic Encryption Scheme • 128 bit randomization • AES 256, FIPS 140-2 • Symmetric Key • Real-time search (15%+ overhead) • Key Management System, Java KeyStore © Hitachi Solutions America, Ltd. and Measured Search, Inc. 2017, All rights reserved.
  • 17. 17 Solution: Client Side Searchable Encryption Credeon Secure Document Solution for SharePoint Online • Client-side encryption for search index and data • Searchable encryption on Solr • Search Engine and Key Management are independent of Microsoft Search Server SharePoint Server Key Management Server Search Engine SharePoint Online Client PC 1. Get a key 2. Index the file contents and encrypt index 4. Upload encrypted file 4. Upload encrypted index 3. Encrypt file © Hitachi Solutions America, Ltd. and Measured Search, Inc. 2017, All rights reserved.
  • 18. 18 Demo: Securing Solr Search in the Cloud SearchStax with Credeon © Hitachi Solutions America, Ltd. and Measured Search, Inc. 2017, All rights reserved.
  • 19. 19 Q&A © Hitachi Solutions America, Ltd. and Measured Search, Inc. 2017, All rights reserved.
  • 20. 20 Contact Info Sameer Maggon @maggon sameer@measuredsearch.com https://www.measuredsearch.com Harry Ochiai @credeon hochiai@hitachi-solutions.com https://psg.hitachi-solutions.com/credeon/overview © Hitachi Solutions America, Ltd. and Measured Search, Inc. 2017, All rights reserved.