 |
Workshop on Cryptography and Security in Clouds
(March 15-16, 2011, Zurich)
Abstracts
The abstracts are also available in PDF
form: abstracts.pdf.
Virtual Security: Data Leakage in Third-Party Clouds and VM Reset Vulnerabilities
Thomas Ristenpart (University of Wisconsin, Madison, USA)
In this talk we'll cover new security issues that arise in the use of
virtualization. First we'll look at third-party cloud computing
services such as Amazon's EC2 and Microsoft Azure. We'll see how
so-called placement vulnerabilities allow an attacker to arrange for
a malicious virtual machine (VM) to be assigned to the same physical
server as a target victim's VM. From there, the attacking VM can
mount side channel attacks. We'll report on initial work on
cache-based side channels that can measure the victim's
computational load to, for example, infer the kinds of web traffic
received by a web server running on the victim's VM.
Next I'll present recent work on showing a new class of
vulnerabilities, termed VM reset vulnerabilities, that arise due to
reuse of VM snapshots. A snapshot is the saved state of a VM, which
can include caches, memory, persistent storage, etc. A reset
vulnerability occurs when resuming two or more times from the same VM
snapshot exposes security bugs. I'll report on our discovery of
several reset vulnerabilities in modern browsers used within
commonly-used VM managers. These vulnerabilities exploit weaknesses in
cryptographic protocols when confronted with reused randomness. I'll
then explore potential solutions.
This talk will cover joint work with Stevan Savage, Hovav Shacham,
Eran Tromer, and Scott Yilek
A Small Latte or a PetaCycle? You Decide. The Economics of Cloud Computing and What This Means for Security
Radu Sion (Stony Brook University, USA)
In this talk we explore the economics of technology outsourcing in
general and cloud computing in particular. We identify cost trade-offs
and postulate the key principles of outsourcing that define when cloud
deployment is appropriate and why. We also briefly touch on several
main cyber-security aspects that impact the appeal of clouds. We
outline and investigate some of the main research challenges on
optimizing for these trade-offs. If you come to this talk you are also
very likely to find out exactly how many US dollars you need to spend
to break your favorite cipher or send one of your bits over the
network.
The Cloud was tipsy and ate my files!
Giuseppe Ateniese (Johns Hopkins University, USA)
Our entire digital life will be stored on remote storage servers such
as Amazon S3, Microsoft Azure, Google, MobileMe, etc. Our emails,
pictures, calendars, documents, music/video playlists, and generic
files will be readily available, anytime and anywhere.
In this talk, we will answer the following question: How can we check
whether the entire content of our digital life is actually intact and
accessible, even though we have no local copy of it?
Writing on Wind and Water: Storage Security in the Cloud
Ari Juels (RSA, The Security Division of EMC, USA)
The Cloud abstracts away infrastructural complexity for the benefit of
tenants. But to tenants' detriment, it can also abstract away
essential security information. In this talk, I'll discuss several
protocols that remotely test cloud storage integrity and robustness
without a reliance on detailed infrastructural knowledge or trust in
cloud providers. Tenants or auditors can execute these protocols to:
(1) Verify the integrity of files without downloading them; (2)
Distribute files across cloud providers and verify their intactness
with periodic, inexpensive checks (in a cloud analog to RAID); and (3)
Test whether files are resilient to drive crashes.
Joint work with Kevin Bowers, Marten van Dijk, Burt Kaliski, Alina Oprea, and Ron Rivest.
Using TPMs to Tame Uncertainty in the Cloud
Rodrigo Rodrigues (Max Planck Institute for Software Systems, Germany)
Despite the benefits of cloud computing, its users face a significant
downside: they must yield control of their data to the cloud provider,
and therefore need to blindly trust it to correctly manage a large,
complex infrastructure prone to issues such as accidental or
intentional data loss or disclosure. In this talk I will present
Excalibur, a system that enables cloud providers to build services
that give customers more assurances regarding the set of nodes allowed
to manipulate their data, e.g., by restricting the software
configuration they are allowed to run. Excalibur leverages commodity
trusted computing hardware (TPMs) to provide the abstraction of
policy-sealed data, where data is encrypted in a way that is
associated with a given policy, and can only be retrieved by cloud
nodes that obey that policy. In implementing this abstraction,
Excalibur addresses several challenges that arise from using TPMs in
the context of cloud computing.
This is joint work with Nuno Santos, Krishna Gummadi (MPI-SWS) and
Stefan Saroiu (MSR).
Towards Multi-Layer Autonomic Isolation of Cloud Computing and Networking Resources
Aurélien Wailly, Marc Lacoste, Hervé Debar (Orange Labs and Télécom Sud Paris, France)
Despite its many foreseen benefits, the main barrier to adoption of
cloud computing remains security. Vulnerabilities introduced by
virtualization of computing resources, and unclear effectiveness of
traditional security architectures in fully virtualized networks raise
many security challenges. The most critical issue remains resource
sharing in a multi-tenant environment, which creates new attack
vectors. The question is thus how to guarantee strong resource
isolation, both on the computing and networking side. System and
network complexity make manual security maintenance impossible by
human administrators. Computing and networking isolation over
virtualized environments should thus be achieved and automated.
Unfortunately, current solutions fail to achieve that goal: hugely
fragmented, they tackle the problem only from one side and at a given
layer, thus without end-to-end guarantees. Moreover, they remain
difficult to administer. A new integrated and more flexible approach
is therefore needed.
This paper describes a unified autonomic management framework for IaaS
resource isolation, at different layers, and from both computing and
networking perspectives. A nested architecture is proposed to
orchestrate multiple autonomic security loops, both over views and
layers, resulting in very flexible self-managed cloud resource
isolation. A first design for the corresponding framework is also
specified for a simple IaaS infrastructure.
Security Considerations for Virtual Platform Provisioning
Mudassar Aslam, Christian Gehrmann (Swedish Institute of Computer Science)
The concept of virtualization is not new but leveraging virtualization
in different modes and at different layers has revolutionized its
usage scenarios. Virtualization can be applied at application layer to
create sandbox environment, operating system layer to virtualize
shared system resources (e.g. memory, CPU), at platform level or in
any other useful possible hybrid scheme. When virtualization is
applied at platform level, the resulting virtualized platform can run
multiple virtual machines as if they were physically separated real
machines. Provisioning virtualized platforms in this way is often also
referred to as Platform as a Service (PaaS) in the cloud computing
terminology. Different business models, like datacenters or
telecommunication providers and operators, can get business benefits
by using platform virtualization due to the possibility of increased
resource utilization and reduced upfront infrastructure setup
expenditures. This opportunity comes together with new security
issues. An organization that runs services in form of virtual machine
images on an offered platform needs security guarantees. In short, it
wants evidence that the platforms it utilizes are trustworthy and that
sensitive information is protected. Even if this sounds natural and
straight forward, few attempts have been made to analyze in details
what these expectations means from a security technology perspective
in a realistic deployment scenario. In this paper we present a
telecommunication virtualized platform provisioning scenario with two
major stakeholders, the operator who utilizes virtualized
telecommunication platform resources and the service provider, who
offers such resources to operators. We make threats analysis for this
scenario and derive major security requirements from the different
stakeholders’ perspectives. Through investigating a particular virtual
machine provisioning use case, we take the first steps towards a
better understanding of the major security obstacles with respect to
platform service offerings. The last couple of years we have seen
increased activities around security for clouds regarding different
usage and business models. We contribute to this important area
through a thorough security analysis of a concrete deployment
scenario. Finally, we use the security requirements derived through
the analysis to make a comparison with contemporary related research
and to identify future research challenges in the area.
Mobile Trusted Virtual Domains
Ahmad Sadeghi (TU Darmstadt, Germany)
TBA
Technical Challenges of Forensic Investigations in Cloud Computing Environments
Dominik Birk (Ruhr-Universität Bochum, Germany)
Cloud Computing is arguably one of the most discussed information
technology topics in recent times. It presents many promising
technological and economical opportunities. However, many customers
remain reluctant to move their business IT infrastructure completely
to “the Cloud“. One of the main concerns of customers is Cloud
security and the threat of the unknown. Cloud Service Providers (CSP)
encourage this perception by not letting their customers see what is
behind their “virtual curtain“. A seldomly discussed, but in this
regard highly relevant open issue is the ability to perform digital
investigations. This continues to fuel insecurity on the sides of both
providers and customers. In Cloud Forensics, the lack of physical
access to servers constitutes a completely new and disruptive
challenge for investigators. Due to the decentralized nature of data
processing in the Cloud, traditional approaches to evidence collection
and recovery are no longer practical. This paper focuses on the
technical aspects of digital forensics in distributed Cloud
environments. We contribute by assessing whether it is possible for
the customer of Cloud Computing services to perform a traditional
digital investigation from a technical standpoint. Furthermore we
discuss possible new methodologies helping customers to perform such
investigations and discuss future issues.
Self-Managed Services Conceptual Model in Trustworthy Clouds' Infrastructure
Imad M. Abbadi (Oxford University Computing Laboratory, UK)
Current clouds infrastructure do not provide the full potential of
automated self-managed services. Cloud infrastructure management are
supported by clouds’ internal employees and contractors
(e.g. enterprise architects, system and security administrators). Such
manual management process that require human intervention is not
adequate considering the cloud promising future as an Internet scale
critical infrastructure. This paper is concerned about exploring and
analyzing automated self-managed services for cloud’s virtual
resources. We propose a conceptual model of self-managed services
interdependencies and identify static and dynamic factors affecting
their automated actions in the context of cloud computing. Next, we
identify the challenges involved in providing secure and reliable
self-managed services. We have just started the work in this area as
part of EU funded Trusted cloud (TCloud) project.
Predicate Encryption for Private and Searchable Remote Storage
Giuseppe Persiano (Università di Salerno, Italy)
In this talk we will survey the state of the art in Predicate
Encryption with special focus on Hidden Vector Encryption schemes and
show its applicability to Private and Searchable Remote Storage. Our
thesis is that Predicate Encryption offers solid Cryptographic
foundations for Remote Storage but several issues remain to be
addressed before we can deploy usable and private remote storage.
Side Channels in Cloud Services: The Case of Deduplication in Cloud Storage
Benny Pinkas (Bar Ilan University, Israel)
The talk will discuss deduplication, a form of compression in which
duplicate copies of files are replaced by links to a single
copy. Deduplication is known to reduce the space and bandwidth
requirements of Cloud storage services by more than 90%, and is most
effective when applied across multiple users.
We study the privacy implications of cross-user deduplication. We
demonstrate how deduplication can be used as a side channel which
reveals information about the contents of files of other users, as a
covert channel by which malicious software can communicate with its
control center, or as a method to retrieve files about which you have
only partial information.
Due to the high savings offered by cross-user deduplication, cloud
storage providers are unlikely to stop using this technology. We
therefore propose mechanisms that enable cross-user deduplication
while ensuring meaningful privacy guarantees.
Byzantine Fault Tolerance for the Cloud
Hans P. Reiser (University of Lisboa, Portugal and University of Passau, Germany)
CloudFIT is an ongoing project that designs an architecture for
intrusiontolerant applications that can be deployed dynamically in the
cloud. This position paper presents an outline of the architecture
that is being developed in the project, and discusses the implications
of the deployment in the cloud. We explore to what extent existing BFT
algorithms can be used for increasing security and availability in the
proposed architecture and what issues still need to be resolved in the
future.
Integrity and Consistency for Untrusted Services
Christian Cachin (IBM Research - Zurich, Switzerland)
A group of mutually trusting clients outsources an arbitrary
computation service to a remote provider, which they do not fully
trust and that may be subject to attacks. The clients do not
communicate with each other and would like to verify the integrity of
the stored data, the correctness of the remote computation process,
and the consistency of the provider’s responses.
We present a novel protocol that guarantees atomic operations to all
clients when the provider is correct and fork-linearizable semantics
when it is faulty; this means that all clients which observe each
other’s operations are consistent, in the sense that their own
operations, plus those operations whose effects they see, have
occurred atomically in same sequence. This protocol generalizes
previous approaches that provided such guarantees only for outsourced
storage services.
Verifiable Computation with Two or More Clouds
Ran Canetti, Ben Riva, Guy Rothblum (Tel Aviv University, Israel and Princeton University, USA)
The current move to Cloud Computing raises the need for verifiable
delegation of computations, where a weak client delegates his
computation to a powerful cloud, while maintaining the ability to
verify that the result is correct. Although there are prior solutions
to this problem, none of them is yet both general and practical for
real-world use.
We propose to extend the model as follows. Instead of using one cloud,
the client uses two or more different clouds to perform his
computation. The client can verify the correct result of the
computation, as long as at least one of the clouds is honest. We
believe that such extension suits the world of cloud computing where
cloud providers have incentives not to collude, and the client is free
to use any set of clouds he wants.
Our results are twofold. First, we show two protocols in this model:
-
A computationally sound verifiable computation for any efficiently
computable function, with logarithmically many rounds, based on any
collision-resistant hash family.
-
A 1-round (2-messages) unconditionally sound verifiable computation
for any function computable in log-space uniform N C.
Second, we show that our first protocol works for essentially any
sequential program, and we present an implementation of the protocol,
called QUIN, for Windows executables. We describe its architecture and
experiment with several parameters on live clouds.
Twin Clouds: An Architecture for Secure Cloud Computing
Sven Bugiel, Stefan Nürnberger, Ahmad Sadeghi, Thomas Schneider (TU Darmstadt and Ruhr-Universität Bochum, Germany)
Cloud computing promises a more cost effective enabling technology to
outsource storage and computations. Existing approaches for secure
outsourcing of data and arbitrary computations are either based on a
single tamper-proof hardware, or based on recently proposed fully
homomorphic encryption. The hardware based solutions are not
scaleable, and fully homomorphic encryption is currently only of
theoretical interest and very inefficient.
In this paper we propose an architecture for secure outsourcing of
data and arbitrary computations to an untrusted commodity cloud. In
our approach, the user communicates with a trusted cloud (either a
private cloud or built from multiple secure hardware modules) which
encrypts and verifies the data stored and operations performed in the
untrusted commodity cloud. We split the computations such that the
trusted cloud is mostly used for security-critical operations in the
less time-critical setup phase, whereas queries to the outsourced data
are processed in parallel by the fast commodity cloud on encrypted
data.
Secure Outsourced Computation in a Multi-tenant Cloud
Seny Kamara, Mariana Raykova (Microsoft Research and Columbia University, USA)
We present a general-purpose protocol that enables a client to delegate the
computation of any function to a cluster of n machines in such a way that no
adversary that corrupts at most n - 1 machines can recover any information
about the client's input or output. The protocol makes black-box use of
multi-party computation (MPC) and secret sharing and inherits the security
properties of the underlying MPC protocol (i.e., passive vs. adaptive security
and security in the presence of a semi-honest vs. malicious adversary).
Using this protocol, a client can securely delegate any computation to a
multi-tenant cloud so long as the adversary is not co-located on at least one
machine in the cloud. Alternatively, a client can use our protocol to
securely delegate its computation to multiple multi-tenant clouds so
long as the adversary is not co-located on at least one machine in one
of the clouds.
Amortized Sublinear Secure Multi Party Computation
Dov Gordon, Jonathan Katz, Vladimir Kolesnikov, Tal Malkin, Mariana Raykova, Yevgeniy Vahlis (Columbia University, University of Maryland, and Bell Labs)
We study the problem of secure two-party and multi-party computation
in a setting where some of the participating parties hold very large
inputs. Such settings increasingly appear when participants wish to
securely query a database server, a typical situation in cloud related
applications. Classic results in secure computation require work that
grows linearly with the size of the input, while insecure versions of
the same computation might require access to only a small number of
database entries.
We present new secure MPC protocols that, in an amortized analysis,
have only polylogarithmic overhead when compared with the work done in
an insecure computation of the functionality. Our first protocol is
generically constructed from any Oblivious RAM scheme and any secure
computation protocol. The second protocol is optimized for secure
two-party computation, and is based directly on basic cryptographic
primitive
Computation on Randomized Data
Florian Kerschbaum and Kiayias Aggelos (SAP Research Karlsruhe, Germany and University of Athens, Greece)
Cryptographic tools, such as secure computation or homomorphic
encryption, are very computationally expensive. This makes their use
for confidentiality protection of client’s data against an untrusted
service provider uneconomical in most applications of cloud
computing. In this paper we present techniques for randomizing data
using light-weight operations and then securely outsourcing the
computation to a server. We discuss how to formally assess the
security of our approach and present linear programming as a case
study.
Private and Perennial Distributed Computation
Shlomi Dolev, Juan Garay, Niv Gilboa, Vladimir Kolesnikov (Ben-Gurion University, Israel, AT&T Labs Research, USA, and Bell Labs, USA)
In this paper we consider the problem of n agents (servers) wishing to
perform a given computation on behalf of a user, on common inputs and
in a privacy preserving manner, in the sense that even if the entire
memory contents of some of them are exposed, no information is
revealed about the state of the computation, and where there is no a
priori bound on the number of inputs. The problem has received ample
attention recently in several domains, including cloud computing as
well as swarm computing and Unmanned Aerial Vehicles (UAV) that
collaborate in a common mission, and schemes have been proposed that
achieve this notion of privacy for arbitrary computations, at the
expense of one round of communication per input among the n agents.
In this work we show how to avoid communication altogether during the
course of the computation, with the trade-off of computing a smaller
class of functions, namely, those carried out by finite-state
automata. Our scheme, which is based on a novel combination of
secret-sharing techniques and the Krohn-Rhodes decomposition of finite
state automata, achieves the above goal in an
information-theoretically secure manner, and, furthermore, does not
require randomness during its execution.
|
 |