SlideShare ist ein Scribd-Unternehmen logo
1 von 26
Providing Proofs of Past Data
              Possession in Cloud Forensics
              Shams Zawoad, Ragib Hasan
              SECuRE and Trustworthy computing (SECRET) Lab
              University of Alabama at Birmingham




secret.cis.uab.edu                                            1/23/2013
Problem Statement : A Motivating Story



        Bob
                                                     XYZ Corporation


                                                  Did Bob
                                                  have this
                                                  file?


               Cloud VM/Storage                       Investigator




secret.cis.uab.edu                1/23/2013   1
What is Digital Forensics and Cloud Forensics?

  Digital Forensics

               Incident                       Examination
             Identification
              Identification   Collection       Organization    Presentation
               Evidence
             Identification                     Analysis




  Cloud Forensics
      • Applying digital forensics procedures in cloud.
      • A subset of Network forensics [Ruan et al.]


secret.cis.uab.edu                          1/23/2013       2
Cloud Forensics vs Traditional Digital Forensics
              Traditional                  Cloud
    • Physical access to        • No physical access
      computing resources

    • No need to depend on      • Need to depend on CSP
      third party

    • Single user system        • Multi-tenant system

    • Tools are available       • No proven available tool

secret.cis.uab.edu             1/23/2013   3
What is Past Data Possession?




     If a file ‘F’ was possessed by a user ‘U’, then Past Data
     Possession states that

                     U possessed F at a given past time




secret.cis.uab.edu                        1/23/2013   4
Why Is It Challenging to Provide the Past Data
  Possession?

                     Reduced Control over Clouds
               Access Control          Access Control         Access Control
                          Multi-tenancy
                     Application         Application              Application
                        Data    Chain of Custody
                                          Data                       Data
                        OS                   OS                      OS
                                    Presentation
                      Servers              Servers                 Servers
                      Network             Network                  Network

                       SaaS                PaaS                      IaaS

                          Customers have control
                          Customers do not have control

secret.cis.uab.edu                                1/23/2013   5
In the Threat Model, Bob, Investigator, and the Cloud
  can be Malicious


                             User can delete records or present fake records



                             Investigator can plant invalid evidence



                             CSP can provide false past data possession
                             or deny hosting any evidence

                     Every body can collude with each other


secret.cis.uab.edu                              1/23/2013   6
Hence, The Possible Attacks can be:

     Denial of possession

            False presence

                     Evidence contamination
                         Repudiation by CSP

                            Repudiation by User
                                Privacy Violation


secret.cis.uab.edu                       1/23/2013   7
What Can be the Solution?

     Proposing Proof of Past Data Possession (PPDP)

     • PPDP attests that a User U possessed a File F at a
       given past time.

     • An Auditor can use PPDP to check the Past Data
       Possession.

     • File can be deleted but PPDP can still preserve the
       proof of data possession.


secret.cis.uab.edu                  1/23/2013   8
PPDP Provides:

   Integrity

   I1: Adversaries cannot remove any evidence.
   I2: Adversaries cannot plant any invalid evidence.
   I3: Adversaries cannot change any existing evidence.
   I4: CSP cannot deny hosting any evidence.
   I5: CSP cannot repudiate any previously published proof.



secret.cis.uab.edu              1/23/2013   9
PPDP Provides:

  Confidentiality

  C1: From the proof adversaries cannot recover the
  original file.

 C2: From the proof adversaries cannot learn about the
 version history of file.




secret.cis.uab.edu             1/23/2013   10
Components of PPDP

                     File       • Private, stored in Cloud



          Proof of File     P   • Private, Stored in Cloud


        Accumulator             • Private, Stored in Cloud


           Signed
                                • Public, Available through RSS
Accumulator, PPDP




secret.cis.uab.edu                    1/23/2013   11
Proof of Past Data Possession (PPDP)



   User               CSP




                       Proof Storage


secret.cis.uab.edu             1/23/2013   12
Bloom Filter as an Accumulator

   A probabilistic data structure to check whether an
   element is a member of a set or not.

        • Stores the membership information in a bit array
        • Space efficient representation.
        • Performance of element insertion and membership
          checking is good.
        • False positive probability is not zero.

  Is used in Google Chrome to maintain Black-list of
  malicious URLs.

secret.cis.uab.edu                 1/23/2013   13
Verification of Past Data Possession
                                  PPDPu = <H(DSu), SPkc(DSu)>



                     No   Signature
           Rejects
                           Valid?

                                Yes                      Document
                            DSu


                     No
          Rejects          Exists?                      Bit positions

                          Yes

                          Accepts
secret.cis.uab.edu                     1/23/2013   14
How to Identify the Generation Time of Evidence?

   Investigator/ Auditor can query in two ways:

                 • A time range of evidence generation.

                 • Exact date of evidence generation.




secret.cis.uab.edu                     1/23/2013   15
Security Analysis w.r.t. Collusion Model


                                                CUI

                                                ¬CUI



                                                C¬UI

                                                CU¬I

secret.cis.uab.edu             1/23/2013   16
Security Analysis w.r.t. Collusion Model


                                                C¬U ¬ I

                                                ¬CU ¬ I



                                                ¬C¬UI



                                                ¬C¬U¬I



secret.cis.uab.edu             1/23/2013   17
Security Analysis


       Non repudiation by CSP : Proof is signed

       Preservation of user’s privacy: One-way Hashing

       Non repudiation by User: Advanced version of
       PPDP, each evidence is signed




secret.cis.uab.edu               1/23/2013   18
Proof-of-Concept Implementation

     FTP Server on Amazon EC2 Micro Instance.

     Client Machine: Intel Core-i5-24305 CPU
     @ 2.40 GHz processor and 8GB RAM.

    Bloom filter : 0.01 % False Positive Probability for
    1000 elements.

    RSA (1024 bit) and SHA 1 (160 bit)



secret.cis.uab.edu               1/23/2013   19
Evaluation of Our Prototype
     % Overhead associated with time needed to insert the PPDP




secret.cis.uab.edu                  1/23/2013   20
Evaluation of Our Prototype
     Average time required to find true negative match




secret.cis.uab.edu                    1/23/2013   21
Evaluation of Our Prototype
     Average time required to find a true positive match




secret.cis.uab.edu                    1/23/2013   22
Applications of PPDP


      CSP can preserve the proof without storing the
      data itself.

      Storage overhead for CSP but can earn money by
      Forensic-as-service.

     Make the Cloud more Auditable which in turn makes
     Cloud more Regulatory Compliant.



secret.cis.uab.edu               1/23/2013   23
Conclusion

• Introduced the notion of a Proof of Past Data
  Possession (PPDP) in the context of digital forensics.

• Proposed an efficient and secured cryptographic
  scheme for creating a PPDP.

• Evaluated the proposed PPDP scheme using a
  commercial cloud vendor.

 Future work : Implement the scheme in private
 cloud, later collaborate with a commercial CSP.
secret.cis.uab.edu             1/23/2013   24
Thank You
                       Q&A




secret.cis.uab.edu               1/23/2013

Weitere ähnliche Inhalte

Andere mochten auch

IoT: Security & Privacy at IGNITE 2015
IoT: Security & Privacy at IGNITE 2015IoT: Security & Privacy at IGNITE 2015
IoT: Security & Privacy at IGNITE 2015HildebrandTech
 
(130928) #fitalk cloud storage forensics - dropbox
(130928) #fitalk   cloud storage forensics - dropbox(130928) #fitalk   cloud storage forensics - dropbox
(130928) #fitalk cloud storage forensics - dropboxINSIGHT FORENSIC
 
Cloud Computing : Security and Forensics
Cloud Computing : Security and ForensicsCloud Computing : Security and Forensics
Cloud Computing : Security and ForensicsGovind Maheswaran
 
Big data and cyber security legal risks and challenges
Big data and cyber security legal risks and challengesBig data and cyber security legal risks and challenges
Big data and cyber security legal risks and challengesKapil Mehrotra
 
IoT Security and Privacy Considerations
IoT Security and Privacy ConsiderationsIoT Security and Privacy Considerations
IoT Security and Privacy ConsiderationsKenny Huang Ph.D.
 
Privacy, Drones, and IoT
Privacy, Drones, and IoTPrivacy, Drones, and IoT
Privacy, Drones, and IoTLAURA VIVET
 
IoT - the Next Wave of DDoS Threat Landscape
IoT - the Next Wave of DDoS Threat LandscapeIoT - the Next Wave of DDoS Threat Landscape
IoT - the Next Wave of DDoS Threat LandscapeAPNIC
 
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...ClicTest
 
The 5 elements of IoT security
The 5 elements of IoT securityThe 5 elements of IoT security
The 5 elements of IoT securityJulien Vermillard
 
IoT and Blockchain Convergence
IoT and Blockchain ConvergenceIoT and Blockchain Convergence
IoT and Blockchain ConvergenceAhmed Banafa
 
IOT Security - ICCT College of Engineering
IOT Security - ICCT College of EngineeringIOT Security - ICCT College of Engineering
IOT Security - ICCT College of EngineeringPotato
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challengesDheeraj Negi
 
Top ten big data security and privacy challenges
Top ten big data security and privacy challengesTop ten big data security and privacy challenges
Top ten big data security and privacy challengesBee_Ware
 

Andere mochten auch (15)

IoT: Security & Privacy at IGNITE 2015
IoT: Security & Privacy at IGNITE 2015IoT: Security & Privacy at IGNITE 2015
IoT: Security & Privacy at IGNITE 2015
 
(130928) #fitalk cloud storage forensics - dropbox
(130928) #fitalk   cloud storage forensics - dropbox(130928) #fitalk   cloud storage forensics - dropbox
(130928) #fitalk cloud storage forensics - dropbox
 
Cloud Computing : Security and Forensics
Cloud Computing : Security and ForensicsCloud Computing : Security and Forensics
Cloud Computing : Security and Forensics
 
Big data and cyber security legal risks and challenges
Big data and cyber security legal risks and challengesBig data and cyber security legal risks and challenges
Big data and cyber security legal risks and challenges
 
IoT Security and Privacy Considerations
IoT Security and Privacy ConsiderationsIoT Security and Privacy Considerations
IoT Security and Privacy Considerations
 
Privacy, Drones, and IoT
Privacy, Drones, and IoTPrivacy, Drones, and IoT
Privacy, Drones, and IoT
 
IoT - the Next Wave of DDoS Threat Landscape
IoT - the Next Wave of DDoS Threat LandscapeIoT - the Next Wave of DDoS Threat Landscape
IoT - the Next Wave of DDoS Threat Landscape
 
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
 
The 5 elements of IoT security
The 5 elements of IoT securityThe 5 elements of IoT security
The 5 elements of IoT security
 
Overview of IoT and Security issues
Overview of IoT and Security issuesOverview of IoT and Security issues
Overview of IoT and Security issues
 
IoT security (Internet of Things)
IoT security (Internet of Things)IoT security (Internet of Things)
IoT security (Internet of Things)
 
IoT and Blockchain Convergence
IoT and Blockchain ConvergenceIoT and Blockchain Convergence
IoT and Blockchain Convergence
 
IOT Security - ICCT College of Engineering
IOT Security - ICCT College of EngineeringIOT Security - ICCT College of Engineering
IOT Security - ICCT College of Engineering
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
 
Top ten big data security and privacy challenges
Top ten big data security and privacy challengesTop ten big data security and privacy challenges
Top ten big data security and privacy challenges
 

Ähnlich wie Providing Proofs of Past Data Possession in Cloud Forensics

Hybrid Cloud Approach with Security and Data Deduplication
Hybrid Cloud Approach with Security and Data DeduplicationHybrid Cloud Approach with Security and Data Deduplication
Hybrid Cloud Approach with Security and Data Deduplicationijtsrd
 
Doc A hybrid cloud approach for secure authorized deduplication
 Doc A hybrid cloud approach for secure authorized deduplication Doc A hybrid cloud approach for secure authorized deduplication
Doc A hybrid cloud approach for secure authorized deduplicationShakas Technologie
 
Efficient technique for privacy preserving publishing of set valued data on c...
Efficient technique for privacy preserving publishing of set valued data on c...Efficient technique for privacy preserving publishing of set valued data on c...
Efficient technique for privacy preserving publishing of set valued data on c...ElavarasaN GanesaN
 
A hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplicationA hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplicationPvrtechnologies Nellore
 
Improved Data Integrity Protection Regenerating-Coding Based Cloud Storage
Improved Data Integrity Protection Regenerating-Coding Based Cloud StorageImproved Data Integrity Protection Regenerating-Coding Based Cloud Storage
Improved Data Integrity Protection Regenerating-Coding Based Cloud StorageIJSRD
 
Improved Data Integrity Protection Regenerating-Coding Based Cloud Storage
Improved Data Integrity Protection Regenerating-Coding Based Cloud StorageImproved Data Integrity Protection Regenerating-Coding Based Cloud Storage
Improved Data Integrity Protection Regenerating-Coding Based Cloud StorageIJSRD
 
Security and Privacy in Cloud Computing - a High-level view
Security and Privacy in Cloud Computing - a High-level viewSecurity and Privacy in Cloud Computing - a High-level view
Security and Privacy in Cloud Computing - a High-level viewragibhasan
 
A hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplicationA hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplicationTmks Infotech
 
A Hybrid Cloud Approach for Secure Authorized Deduplication
A Hybrid Cloud Approach for Secure Authorized DeduplicationA Hybrid Cloud Approach for Secure Authorized Deduplication
A Hybrid Cloud Approach for Secure Authorized Deduplication1crore projects
 
A Hybrid Cloud Approach for Secure Authorized Deduplication
A Hybrid Cloud Approach for Secure Authorized DeduplicationA Hybrid Cloud Approach for Secure Authorized Deduplication
A Hybrid Cloud Approach for Secure Authorized DeduplicationSWAMI06
 
Cyber object types and controls.pdf
Cyber object types and controls.pdfCyber object types and controls.pdf
Cyber object types and controls.pdfRobert Kloots
 
Efficient and Empiric Keyword Search Using Cloud
Efficient and Empiric Keyword Search Using CloudEfficient and Empiric Keyword Search Using Cloud
Efficient and Empiric Keyword Search Using CloudIRJET Journal
 
Secure Auditing and Deduplicating Data on Cloud
Secure Auditing and Deduplicating Data on CloudSecure Auditing and Deduplicating Data on Cloud
Secure Auditing and Deduplicating Data on CloudIJMTST Journal
 
Simultaneously Supporting Privacy and Auditing in Cloud Computing Systems
Simultaneously Supporting Privacy and Auditing in Cloud Computing SystemsSimultaneously Supporting Privacy and Auditing in Cloud Computing Systems
Simultaneously Supporting Privacy and Auditing in Cloud Computing SystemsTyrone Grandison
 
Ijarcet vol-2-issue-3-951-956
Ijarcet vol-2-issue-3-951-956Ijarcet vol-2-issue-3-951-956
Ijarcet vol-2-issue-3-951-956Editor IJARCET
 
(SEC313) Security & Compliance at the Petabyte Scale
(SEC313) Security & Compliance at the Petabyte Scale(SEC313) Security & Compliance at the Petabyte Scale
(SEC313) Security & Compliance at the Petabyte ScaleAmazon Web Services
 
a hybrid cloud approach for secure authorized
a hybrid cloud approach for secure authorizeda hybrid cloud approach for secure authorized
a hybrid cloud approach for secure authorizedlogicsystemsprojects
 
Ieeepro techno solutions 2014 ieee java project - a hybrid cloud approach f...
Ieeepro techno solutions   2014 ieee java project - a hybrid cloud approach f...Ieeepro techno solutions   2014 ieee java project - a hybrid cloud approach f...
Ieeepro techno solutions 2014 ieee java project - a hybrid cloud approach f...hemanthbbc
 

Ähnlich wie Providing Proofs of Past Data Possession in Cloud Forensics (20)

Hybrid Cloud Approach with Security and Data Deduplication
Hybrid Cloud Approach with Security and Data DeduplicationHybrid Cloud Approach with Security and Data Deduplication
Hybrid Cloud Approach with Security and Data Deduplication
 
Doc A hybrid cloud approach for secure authorized deduplication
 Doc A hybrid cloud approach for secure authorized deduplication Doc A hybrid cloud approach for secure authorized deduplication
Doc A hybrid cloud approach for secure authorized deduplication
 
Efficient technique for privacy preserving publishing of set valued data on c...
Efficient technique for privacy preserving publishing of set valued data on c...Efficient technique for privacy preserving publishing of set valued data on c...
Efficient technique for privacy preserving publishing of set valued data on c...
 
A hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplicationA hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplication
 
Improved Data Integrity Protection Regenerating-Coding Based Cloud Storage
Improved Data Integrity Protection Regenerating-Coding Based Cloud StorageImproved Data Integrity Protection Regenerating-Coding Based Cloud Storage
Improved Data Integrity Protection Regenerating-Coding Based Cloud Storage
 
Improved Data Integrity Protection Regenerating-Coding Based Cloud Storage
Improved Data Integrity Protection Regenerating-Coding Based Cloud StorageImproved Data Integrity Protection Regenerating-Coding Based Cloud Storage
Improved Data Integrity Protection Regenerating-Coding Based Cloud Storage
 
Security and Privacy in Cloud Computing - a High-level view
Security and Privacy in Cloud Computing - a High-level viewSecurity and Privacy in Cloud Computing - a High-level view
Security and Privacy in Cloud Computing - a High-level view
 
A hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplicationA hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplication
 
A Hybrid Cloud Approach for Secure Authorized Deduplication
A Hybrid Cloud Approach for Secure Authorized DeduplicationA Hybrid Cloud Approach for Secure Authorized Deduplication
A Hybrid Cloud Approach for Secure Authorized Deduplication
 
A Hybrid Cloud Approach for Secure Authorized Deduplication
A Hybrid Cloud Approach for Secure Authorized DeduplicationA Hybrid Cloud Approach for Secure Authorized Deduplication
A Hybrid Cloud Approach for Secure Authorized Deduplication
 
Cyber object types and controls.pdf
Cyber object types and controls.pdfCyber object types and controls.pdf
Cyber object types and controls.pdf
 
Efficient and Empiric Keyword Search Using Cloud
Efficient and Empiric Keyword Search Using CloudEfficient and Empiric Keyword Search Using Cloud
Efficient and Empiric Keyword Search Using Cloud
 
Secure Auditing and Deduplicating Data on Cloud
Secure Auditing and Deduplicating Data on CloudSecure Auditing and Deduplicating Data on Cloud
Secure Auditing and Deduplicating Data on Cloud
 
project 11
project 11project 11
project 11
 
Simultaneously Supporting Privacy and Auditing in Cloud Computing Systems
Simultaneously Supporting Privacy and Auditing in Cloud Computing SystemsSimultaneously Supporting Privacy and Auditing in Cloud Computing Systems
Simultaneously Supporting Privacy and Auditing in Cloud Computing Systems
 
Ijarcet vol-2-issue-3-951-956
Ijarcet vol-2-issue-3-951-956Ijarcet vol-2-issue-3-951-956
Ijarcet vol-2-issue-3-951-956
 
(SEC313) Security & Compliance at the Petabyte Scale
(SEC313) Security & Compliance at the Petabyte Scale(SEC313) Security & Compliance at the Petabyte Scale
(SEC313) Security & Compliance at the Petabyte Scale
 
a hybrid cloud approach for secure authorized
a hybrid cloud approach for secure authorizeda hybrid cloud approach for secure authorized
a hybrid cloud approach for secure authorized
 
H1803035056
H1803035056H1803035056
H1803035056
 
Ieeepro techno solutions 2014 ieee java project - a hybrid cloud approach f...
Ieeepro techno solutions   2014 ieee java project - a hybrid cloud approach f...Ieeepro techno solutions   2014 ieee java project - a hybrid cloud approach f...
Ieeepro techno solutions 2014 ieee java project - a hybrid cloud approach f...
 

Kürzlich hochgeladen

Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 

Kürzlich hochgeladen (20)

Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 

Providing Proofs of Past Data Possession in Cloud Forensics

  • 1. Providing Proofs of Past Data Possession in Cloud Forensics Shams Zawoad, Ragib Hasan SECuRE and Trustworthy computing (SECRET) Lab University of Alabama at Birmingham secret.cis.uab.edu 1/23/2013
  • 2. Problem Statement : A Motivating Story Bob XYZ Corporation Did Bob have this file? Cloud VM/Storage Investigator secret.cis.uab.edu 1/23/2013 1
  • 3. What is Digital Forensics and Cloud Forensics? Digital Forensics Incident Examination Identification Identification Collection Organization Presentation Evidence Identification Analysis Cloud Forensics • Applying digital forensics procedures in cloud. • A subset of Network forensics [Ruan et al.] secret.cis.uab.edu 1/23/2013 2
  • 4. Cloud Forensics vs Traditional Digital Forensics Traditional Cloud • Physical access to • No physical access computing resources • No need to depend on • Need to depend on CSP third party • Single user system • Multi-tenant system • Tools are available • No proven available tool secret.cis.uab.edu 1/23/2013 3
  • 5. What is Past Data Possession? If a file ‘F’ was possessed by a user ‘U’, then Past Data Possession states that U possessed F at a given past time secret.cis.uab.edu 1/23/2013 4
  • 6. Why Is It Challenging to Provide the Past Data Possession? Reduced Control over Clouds Access Control Access Control Access Control Multi-tenancy Application Application Application Data Chain of Custody Data Data OS OS OS Presentation Servers Servers Servers Network Network Network SaaS PaaS IaaS Customers have control Customers do not have control secret.cis.uab.edu 1/23/2013 5
  • 7. In the Threat Model, Bob, Investigator, and the Cloud can be Malicious User can delete records or present fake records Investigator can plant invalid evidence CSP can provide false past data possession or deny hosting any evidence Every body can collude with each other secret.cis.uab.edu 1/23/2013 6
  • 8. Hence, The Possible Attacks can be: Denial of possession False presence Evidence contamination Repudiation by CSP Repudiation by User Privacy Violation secret.cis.uab.edu 1/23/2013 7
  • 9. What Can be the Solution? Proposing Proof of Past Data Possession (PPDP) • PPDP attests that a User U possessed a File F at a given past time. • An Auditor can use PPDP to check the Past Data Possession. • File can be deleted but PPDP can still preserve the proof of data possession. secret.cis.uab.edu 1/23/2013 8
  • 10. PPDP Provides: Integrity I1: Adversaries cannot remove any evidence. I2: Adversaries cannot plant any invalid evidence. I3: Adversaries cannot change any existing evidence. I4: CSP cannot deny hosting any evidence. I5: CSP cannot repudiate any previously published proof. secret.cis.uab.edu 1/23/2013 9
  • 11. PPDP Provides: Confidentiality C1: From the proof adversaries cannot recover the original file. C2: From the proof adversaries cannot learn about the version history of file. secret.cis.uab.edu 1/23/2013 10
  • 12. Components of PPDP File • Private, stored in Cloud Proof of File P • Private, Stored in Cloud Accumulator • Private, Stored in Cloud Signed • Public, Available through RSS Accumulator, PPDP secret.cis.uab.edu 1/23/2013 11
  • 13. Proof of Past Data Possession (PPDP) User CSP Proof Storage secret.cis.uab.edu 1/23/2013 12
  • 14. Bloom Filter as an Accumulator A probabilistic data structure to check whether an element is a member of a set or not. • Stores the membership information in a bit array • Space efficient representation. • Performance of element insertion and membership checking is good. • False positive probability is not zero. Is used in Google Chrome to maintain Black-list of malicious URLs. secret.cis.uab.edu 1/23/2013 13
  • 15. Verification of Past Data Possession PPDPu = <H(DSu), SPkc(DSu)> No Signature Rejects Valid? Yes Document DSu No Rejects Exists? Bit positions Yes Accepts secret.cis.uab.edu 1/23/2013 14
  • 16. How to Identify the Generation Time of Evidence? Investigator/ Auditor can query in two ways: • A time range of evidence generation. • Exact date of evidence generation. secret.cis.uab.edu 1/23/2013 15
  • 17. Security Analysis w.r.t. Collusion Model CUI ¬CUI C¬UI CU¬I secret.cis.uab.edu 1/23/2013 16
  • 18. Security Analysis w.r.t. Collusion Model C¬U ¬ I ¬CU ¬ I ¬C¬UI ¬C¬U¬I secret.cis.uab.edu 1/23/2013 17
  • 19. Security Analysis Non repudiation by CSP : Proof is signed Preservation of user’s privacy: One-way Hashing Non repudiation by User: Advanced version of PPDP, each evidence is signed secret.cis.uab.edu 1/23/2013 18
  • 20. Proof-of-Concept Implementation FTP Server on Amazon EC2 Micro Instance. Client Machine: Intel Core-i5-24305 CPU @ 2.40 GHz processor and 8GB RAM. Bloom filter : 0.01 % False Positive Probability for 1000 elements. RSA (1024 bit) and SHA 1 (160 bit) secret.cis.uab.edu 1/23/2013 19
  • 21. Evaluation of Our Prototype % Overhead associated with time needed to insert the PPDP secret.cis.uab.edu 1/23/2013 20
  • 22. Evaluation of Our Prototype Average time required to find true negative match secret.cis.uab.edu 1/23/2013 21
  • 23. Evaluation of Our Prototype Average time required to find a true positive match secret.cis.uab.edu 1/23/2013 22
  • 24. Applications of PPDP CSP can preserve the proof without storing the data itself. Storage overhead for CSP but can earn money by Forensic-as-service. Make the Cloud more Auditable which in turn makes Cloud more Regulatory Compliant. secret.cis.uab.edu 1/23/2013 23
  • 25. Conclusion • Introduced the notion of a Proof of Past Data Possession (PPDP) in the context of digital forensics. • Proposed an efficient and secured cryptographic scheme for creating a PPDP. • Evaluated the proposed PPDP scheme using a commercial cloud vendor. Future work : Implement the scheme in private cloud, later collaborate with a commercial CSP. secret.cis.uab.edu 1/23/2013 24
  • 26. Thank You Q&A secret.cis.uab.edu 1/23/2013

Hinweis der Redaktion

  1. A user can delete file from her cloud storage. Later, if an investigator found other evidence of her deleted file she denies to have the file . A colluding investigator can also delete file before presenting it to courtIf an investigator is not trust- worthy, he can plant a false evidence. A user can also present a fake file, which can make her free from the accusation. User and investigator can modify the evidence to prove their claim. An otherwise honest CSP can deny hosting a file or can deny a published PPDP after-the-fact. As data are co-mingled in the cloud, a malicious user can claim that s the CSP published the proof of past data possession publicly on the web, any malicious person can …