Conference PaperPDF Available

PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud Services

Authors:

Abstract and Figures

The valuable transformation of organizations that adopt cloud computing is indisputably accompanied by a number of security threats that should be considered. In this paper, we outline significant security challenges presented when migrating to a cloud environment and propose PaaSword – a novel holistic, data privacy and security by design, framework that aspires to alleviate them. The envisaged framework intends to maximize and fortify the trust of individual, professional and corporate users to cloud services. Specifically, PaaSword involves a context-aware security model, the necessary policies enforcement and governance mechanisms along with a physical distribution, encryption and query middleware, aimed at facilitating the implementation of secure and transparent cloud-based applications.
Content may be subject to copyright.
PaaSword: A Holistic Data Privacy and Security by Design Framework
for Cloud Services
Yiannis Verginadis1, Antonis Michalas2, Panagiotis Gouvas3, Gunther Schiefer4, Gerald H¨
ubsch5,
Iraklis Paraskakis6
1Institute of Communications and Computer Systems, National Technical University of Athens, Athens, Greece
2Security Lab, Swedish Institute of Computer Science, Stockholm, Sweden
3Ubitech Ltd., Athens, Greece
4Karlsruhe Institute of Technology, Karlsruhe, Germany
5CAS Software AG, Karlsruhe, Germany
6South East European Research Centre, Thessaloniki, Greece
jverg@mail.ntua.gr, antonis@sics.se, pgouvas@ubitech.eu, gunther.schiefer@kit.edu, gerald.huebsch@cas.de,
iparaskakis@seerc.org
Keywords: Data privacy, Security by design, Context-aware security, Symmetric searchable encryption, cloud computing
Abstract: The valuable transformation of organizations that adopt cloud computing is indisputably accompanied by a
number of security threats that should be considered. In this paper, we outline significant security challenges
presented when migrating to a cloud environment and propose PaaSword – a novel holistic, data privacy and
security by design, framework that aspires to alleviate them. The envisaged framework intends to maximize
and fortify the trust of individual, professional and corporate users to cloud services. Specifically, PaaSword
involves a context-aware security model, the necessary policies enforcement and governance mechanisms
along with a physical distribution, encryption and query middleware, aimed at facilitating the implementation
of secure and transparent cloud-based applications.
1 INTRODUCTION
Until recently, large-scale computing was available
exclusively to large organizations with an abundance
of in-house expertise. Cloud computing has changed
that to the point where any user with even basic tech-
nical skills can obtain access to vast computing re-
sources at low cost. In the technology adoption life-
cycle, cloud computing has now moved from an early
adopters stage to an early majority, where we typi-
cally see exponential number of deployments (Santos
et al., 2009). Throughout the past few years, many
users have started relying on cloud services without
realizing it. Major web mail providers utilize cloud
technology; tablets and smartphones often default to
automatically uploading user photos to cloud storage
and social networks; finally, several prominent CRM
vendors offer their services using the cloud. In other
words, the adoption of cloud computing has moved
from focused interest to widely spread intensive ex-
perimentation and is now rapidly approaching a phase
of near ubiquitous use.
Enterprises increasingly recognize the compelling
economic and operational benefits of cloud comput-
ing (Micro, 2010). Virtualizing and pooling IT re-
sources in the cloud enables organisations to realize
significant cost savings and accelerates deployment of
new applications, simultaneously transforming busi-
ness and government at an unprecedented pace (CSA,
2013). However, those valuable business benefits can-
not be unlocked without addressing new data security
challenges posed by cloud computing.
Despite the benefits of cloud computing, many
companies have remained cautious due to security
concerns. Applications and storage volumes often re-
side next to potentially hostile virtual environments,
leaving sensitive information at risk to theft, unau-
thorized exposure or malicious manipulation. Gov-
ernmental regulation regarding data privacy and lo-
cation presents an additional concern of significant
legal and financial consequences if data confiden-
tiality is breached, or if cloud providers move regu-
lated data across national borders (Paladi and Micha-
las, 2014). The contribution of this position paper
is two-fold. First, we present a list of core security
requirements and challenges that must be considered
when migrating to a cloud environment. These se-
curity requirements were derived based on our expe-
rience with migrating existing applications to a pri-
vate Infrastructure-as-a-Service (IaaS) cloud (Micha-
las et al., 2014). We extend this guide by discussing
important attack vector characteristics for cloud envi-
ronments that will pave the way for providing tighter
security when building cloud services. Second, in or-
der to tackle the critical cloud security challenges we
present PaaSword, an envisaged framework that will
maximize and fortify the trust of individual, profes-
sional and corporate users to cloud services and appli-
cations. PaaSword achieves that by providing storage
protection mechanisms, which improves confidential-
ity and integrity protection of users’ data in the cloud
while it does not affect the data access functionality.
The rest of this paper is organized as follows. In
Section 2, we further elaborate on the main data se-
curity challenges in cloud-enabled services and appli-
cations. In Section 3, we introduce a holistic, data
privacy and security by design, framework enhanced
by sophisticated context-aware access models and ro-
bust policy enforcement and governance mechanisms,
aimed at facilitating the implementation of secure and
transparent cloud-based applications. In Section 4,
we briefly discuss relevant work while in Section 5,
we conclude the paper by presenting the next steps
for the implementation and evaluation of the proposed
framework.
2 DATA SECURITY
CHALLENGES IN THE CLOUD
According to the Cloud Security Alliance (Alliance,
2013), several top security identified threats refer
to information disclosure and repudiation, rendering
data security as realised through data protection, pri-
vacy, confidentiality, and integrity as top priorities.
More precisely, the top four threats identified are:
data leakage, data loss, account hijacking and inse-
cure APIs. The externalized aspect of outsourcing
can make it harder to maintain data integrity and pri-
vacy (IBM, 2011) and organizations should include
mechanisms to mitigate security risks introduced by
virtualization. Especially when they deal with sen-
sitive data, such as health records, the protection of
stored information comes as a top priority. There-
fore, data security can be seen as the foundation upon
which the entire transition to a cloud architecture
should be based. Multiple risks must be addressed
in order for an organization to guarantee the safety of
users’ records. One of the most important aspects is
security of sensitive information. To this end, the de-
ployment must ensure that all sensitive data is stored
in encrypted form. Complementary to this, proper key
management must ensure that encryption keys are not
revealed to malicious users.
Based on this, it becomes evident that the most
critical part of a modern cloud application is the
data persistency layer and the database itself. As
all sensitive information (including user credentials,
credit card info, personal data, corporate data, etc.)
are stored in these architectural parts, the database-
takeover is the ultimate goal for every adversary.
The Open Web Application Security Project1
foundation has categorized the database-related at-
tacks (SQL injection) as the most critical ones. The
importance of this attack vector is also reflected
by respective incident reports. According to the
Web Hacking Incidents Database 2, SQL injections
represents 17% of all security breaches examined.
These injections were responsible for 83% of the to-
tal records stolen, in successful hacking-related data
breaches from 2005 to 2011. The criticality of the per-
sistency layer is therefore evident. Most of the secu-
rity fences that are configured in a corporate environ-
ment target the fortification of the so-called network
perimeter (e.g. routers, hosts and virtual machines).
Although existing intrusion detection systems (IDS)
and intrusion prevention systems (IPS), try to cope
with database-takeover security aspects (like Snort),
the fact that, on the one side, automated exploitation
tools (e.g. SQLMap) are widely spread, and, on the
other side, IPS and IDS evasion techniques have be-
come extremely sophisticated, denote that the risk of
database compromise is greatest than ever. More-
over, by using mechanisms that rely on Web Appli-
cation Firewalls (WAF) an organization can prevent
various types of attacks but it is inadequate to protect
against todays sophisticated SQL Injection and DoS
attacks (Michalas et al., 2010). Additionally, inter-
nal adversaries in terms of cloud vendors or even un-
known vulnerabilities of software platforms and secu-
rity components widely adopted in cloud-based devel-
opment may provide malicious access to personal and
sensitive data. A recent example was the Heartbleed
flaw3that constituted a serious fault in the OpenSSL
cryptography library, which remained unnoticed for
more than two years and affected over 60% of Web
servers worldwide. Additionally, regarding the post-
1https://www.owasp.org/
2http://projects.webappsec.org/w/page/13246995/Web-
Hacking-Incident-Database
3http://www.infosecurity-
magazine.com/news/heartbleed-101/
exploitation phase, things are even worse in the case
where a symmetric encryption algorithm has been
employed to protect the application data. The already
available cracking toolkits that utilize GPU process-
ing power (e.g. oclHashcat) are able to crack ciphers
using brute-force techniques with an attack rate of
162 billion attempts per second.
While most of the attack vectors are exposed
in any Software-as-a-Service application by the sys-
tem administrators misconfigurations, the database
takeover and the post-exploitation of acquired data is
under the sole responsibility of the application devel-
oper. The application developer is the one responsi-
ble both for sanitizing all HTTP-input parameters that
could be used as attack vectors, and for reassuring that
compromised data will be useless under the existing
brute-forcing and reversing techniques. Nevertheless,
even if the application developer follows strict guide-
lines, the mere utilization of an IaaS provider in or-
der to host a Virtual Machine, or for a Platform-as-
a-Service (PaaS) provider in order to develop a cloud
application, may by itself spawn a multitude of in-
herent vulnerabilities. These vulnerabilities cannot
be tackled effectively as they typically exceed the re-
sponsibilities of an application developer.
3 ENVISIONED FRAMEWORK
In this section, we present PaaSword, a framework
that will allow cloud services to maintain a fully dis-
tributed and encrypted data persistence layer in order
to foster data protection, integrity and confidential-
ity in the presence of malicious adversaries. To this
end, we describe the need for a context-aware security
model which will serve as the basis of a fine-grained
access control scheme, one which allows the per-user
management of access rights. In addition to that, we
describe a physical distribution, encryption and query
middleware that will be based on a searchable encryp-
tion (SE) scheme which will allow legitimate users to
directly search on encrypted data, thus ensuring the
confidentiality and integrity of stored data.
3.1 Context-aware Access Model
We envision a XACML-based4context-aware access
model, which is needed by the developers in order
to annotate the Data Access Objects of their appli-
cations. This context model should conceptualize the
aspects, which must be considered during the selec-
tion of a data-access policy. These aspects may be any
4OASIS eXtensible Access Control Markup Language
(XACML). https://www.oasis-open.org/
kind of information which is machine-parsable (Dey,
2001); indicatively they may include the user’s IP ad-
dress and location, the type of device that she is us-
ing in order to interact with the application as well
as her position in the company. These aspects can
be interpreted in different ways during the security
policy enforcement. In particular, the context aware
access model determines which data is accessible un-
der which circumstances by an already-authenticated
user.
Access control models are responsible for decid-
ing if a user has the right to execute a certain operation
on a specific object. Objects can be a server, an ap-
plication, an entire database or even a single field in
a table row. The user is considered as the active el-
ement and is called subject. A permission associates
an object with an operation (e.g. read, write etc.). Ac-
cess control models provide a list of permissions that
each subject has on certain objects.
Commonly used access control models are the
Mandatory Access Control (MAC), the Discretionary
Access Control (DAC) and the Role-Based Access
Control (RBAC) (Ferrari, 2010). In our approach, the
process of granting/denying access will be based on
dynamically changing parameters, thus our proposed
model relies on a DAC model with groups. The con-
text parameters are unique for every single user, so for
granting access it is necessary to consider all infor-
mation associated with a single user. Furthermore, an
RBAC model would be inappropriate since for every
change of a context parameter the role of each subject
has to be changed.
To implement the dynamic change of context pa-
rameters in a static access control model, we will use
the, so-called, context switches. Depending on the
current context, a permission can be granted or de-
nied (switched). This could switch dynamically with
every change of the context. Context switches are re-
sponsible for managing operational permissions and
object permissions. An operational permission gives
the right to a subject to perform a specific operation
while an object permission gives the right to perform
an operation on a specific object.
3.2 Policies Access and Enforcement
Another important aspect of our proposed framework
is a middleware that will encapsulate capabilities for
maintaining the access policies model, for annotat-
ing and managing data access object annotations, for
controlling their validity, for dynamically interpreting
them into policy enforcement rules and for enforc-
ing them. This envisaged middleware will provide:
(a) a transparent key usage for efficient authentication
purposes, related to authenticating the origin of the
incoming access requests; (b) annotation capabilities
in the form of a tool (can also involve an IDE plug-
in) for allowing developers to declaratively create the
minimum amount of rule-set that is needed for secu-
rity enforcement purposes; (c) the dynamic interpre-
tation of the data access object annotations into pol-
icy enforcement rules; (d) the governance and quality
control of the annotations and their respective policy
rules; and (e) the formulation and implementation of
the overall policy enforcement business logic.
In terms of this middleware, we also consider the
reuse and proper extension of technologies for de-
veloping an appropriate key management mechanism.
This mechanism is necessary for the authentication of
different parties that will be involved in the encryp-
tion and decryption of data. We aim at constituting
the key-usage, transparent to the application usage.
This involves the key propagation upon authentica-
tion of the user, directly to the security enforcement
middleware. For efficiency, we will employ a hybrid
encryption capitalizing upon the utilization of two dif-
ferent encryption functions. The inner layer will be
encrypted with an algorithm that uses a symmetric
encryption key K, while the outer layer will use an
asymmetric encryption in order to encrypt the sym-
metric key K. Symmetric encryption allows more ef-
ficient schemes but privacy concerns are raised due to
the fact that the involved parties must exchange the
secret key. However, combining both techniques help
to optimize the efficiency of the underlying protocols
without sacrificing security. To this end, PaaSword
will rely on both symmetric and asymmetric encryp-
tion in order to securely distribute Kbetween legiti-
mate users.
Additionally, we will also employ methods and
mechanisms for governance and validity control of
the data object annotations. More specifically, we
will focus on the application of an ontology-driven
governance approach for: i) the basic management of
data object annotations (i.e. storage, retrieval, dele-
tion, etc.), ii) validity checking of the data object an-
notations (e.g. rejecting any contradicting annotations
made by the developer) and iii) dependency tracking
among data objects annotations.
Another critical aspect of this middleware is the
annotations interpretation mechanism. Such a mech-
anism will be used for dynamically generating access
control policies, during application runtime, based on
the interpretation of data object annotations. Such a
mechanism will implement the essential decoupling
between the access decisions and the points of use
(i.e. Policy Enforcement Points (PEP) of the XACML
specification). This interpretation is based on an
XACML compliant context model and it can augment
the offered functionality of any PaaS provider, with
a security-as-a-service layer. To do so, we will use
the OASIS XACML as it supports and encourages
the separation of the access decision from the point
of use.
PEP
Policy Enforcement Point
1. Access Request
PDP
Policy Decision Point
PAP
Policy Access Point
Obligation Service
8. Obligations
PIP
Policy Information Point
4. Attribute Query
6. Attribute
Subject Resource Environment
5a. Subject Attributes 5c. Environment Attributes
5b. Resource
Attributes
7. Response
2. Request
Figure 1: High level view of XACML Components
3.3 Threat Model, Secure Storage &
Query Middleware
In this sub-section, we provide a high level descrip-
tion of the protocol that will be used to effectively
protect the stored data from malicious adversaries.
To this end, we first describe the threat model under
which a cloud application will be considered secure.
Threat Model: Similar to existing works in the
area (Paladi et al., 2014; Santos et al., 2009), we
assume a semi-honest cloud provider. In the semi-
honest adversarial model, a malicious cloud provider
correctly follows the protocol specification. However,
she can intercept all messages and may attempt to
use them in order to learn information that otherwise
should remain private. Semi-honest adversaries are
also called honest-but-curious.
Furthermore, for the rest of the participants in
the protocol we share the threat model with (Santos
et al., 2009), which is based on the Dolev-Yao adver-
sarial model (Dolev and Yao, 1983) and further as-
sumes that privileged access rights can be used by a
remote adversary ADV to leak confidential informa-
tion. The adversary, e.g. a corrupted system admin-
istrator, can obtain remote access to any host main-
tained by the provider. However, the adversary can-
not access the volatile memory of any guest virtual
machine (VM) residing on the compute hosts of the
provider. This property is based on the closed-box
execution environment for guest VMs, as outlined in
Terra (Garfinkel et al., 2003) and further developed
in (Zhang et al., 2011).
Secure Storage: A basic tenet of PaaSword is that
sensitive data stored on untrusted servers must be al-
ways encrypted. This effectively reduces the privacy
and security risks since it relies on the semantic se-
curity of the underlying cryptosystem, rendering the
system relatively immune to internal and external at-
tacks. Having this in mind, we propose a forward-
looking design for a cryptographic cloud storage that
will be based on a symmetric searchable encryption
(SSE) scheme similar to the one proposed in (Ka-
mara and Lauter, 2010). We plan to extend the pre-
vious work Cumulus4j (Huber et al., 2013) and Mi-
moSecco (Gabel and H¨
ubsch, 2014) in which an SSE
scheme was presented and it was based on the IND-
ICP security notion (B¨
osch et al., 2014) that hides re-
lations between different data values of a data row and
creates the base for secure database outsourcing.
An SSE scheme allows a user to search in en-
crypted data without learning any information about
the plaintext data. Let D B ={m1,...,mn}be a set
of nmessages (w.l.o.g DB can be considered as a
database). For each miD B we extract a set of key-
words which can later be used for executing queries.
This set of keywords is denoted as W={w1,...,wn}.
For each wiWwe calculate H(wi), where H(·)is
a cryptographically secure hash function under a se-
cret key K0. Then, we encrypt the elements of DB
with a secret key K00 6=K0. By doing this, we create a
searchable encrypted index Iwhere each index entry,
points to an encrypted list of rows that have a cer-
tain keyword. The client can use a trapdoor function
to search the index and determine whether a specific
keyword is contained in the index.
While the above-mentioned scheme is imple-
mented in previous works (Huber et al., 2013; Gabel
and H¨
ubsch, 2014) it has a limitation that we tend
to cover in our proposed framework. More precisely,
the current scheme follows a single write/single read
(S/S) architecture, which makes it unrealistic for our
cloud scenario. To overcome this limitation, we plan
to build an SSE that will support multi write/multi
read (M/M) meaning that a group of users based on
access rights will be able to both read and write on
the encrypted data. To this end, PaaSword will in-
volve a key distribution algorithm that will extend S/S
architecture to M/M. Additionally, a user revocation
function will be implemented in order to exclude a
user, which either acts maliciously or has no longer
access rights. This is a crucial and challenging pro-
cedure, if we consider that many of the existing SSE
schemes (B¨
osch et al., 2014) do not support user re-
vocation and thus are susceptible to many attacks.
Query Middleware: In order to successfully sup-
port the SSE scheme described above, we aim to de-
velop a persistency layer, called Virtual Database VB
(Figure 2), and will be the intermediary that secures
client data before it gets uploaded to the cloud. Addi-
tionally, this layer will be responsible for processing
user queries. In our framework, the VB plays the role
of a trusted third party. Consider, for example, the
scenario where a user wants to search for a certain
data in PaaSword secured databases. To do so, she
will generate a query (q) containing a set of keywords
that she is interested in and will send the request to the
VB. Upon reception, the VB extracts the keywords
from q calculates their hash values and queries the
databases where the keywords wiare stored. If the
queries are successful and the keywords exist in one
of the tables, the VB will obtain the row from the main
table that contains the encrypted original data. Upon
reception, the VB will reply to the users request by
sending the acquired data.
3.4 Conceptual Architecture
The PaaSword compliant cloud applications that will
be developed will inherit a fully physical distributed
and totally encrypted data persistence layer, which
will be able to determine on an ad-hoc basis whether
an incoming data querying and processing request
should be granted access to the target data during ap-
plication runtime. The transformation process of a
traditional application utilizing the PaaSword frame-
work and the way the transformed application secures
and protects the users’ sensitive data is presented in
Figure 2, which at the same time reveals high level
architectural details of the framework.
In this framework, we consider applications that
adopt and respect the Model-View-Controller (MVC)
development pattern (Krasner and Pope, 1988). As
seen in Figure 2 (step 1) the application developer
imports an existing or creates a new MVC-based ap-
plication in her favorite integrated development en-
vironment (IDE) for which an IDE-specific plug-in
will be provided. During the second step of this pro-
cess the application developer creates annotations at
the DAO of the Controller referring to sensitive data
that should be protected, according to the XACML-
based model and defines the physical distribution, en-
cryption and access rights scheme for each data ob-
ject. In the third step, the DAO annotations will be
checked for their validity and compiled with the over-
all application code. This will allow the transforma-
tion of the application’s controller that has been en-
hanced with XACML-based DAO annotations, lead-
ing to the implementation of a PaaSword secure ap-
plication. In the fourth step, the persistence layer
of the application will be physically distributed and
encrypted at the schema and instance level accord-
ing to the incorporated DAO annotations, impos-
ing the schema and driving query handling capabil-
ities of the VB that augments the actual data persis-
tence layer of the application. At application run-
time (step 5), each query and processing request of
the end-user is forwarded by the enhanced controller
to the query handling mechanism that is responsible
for the database proxy queries synthesis and aposyn-
thesis. In step 6 and before the submission of the en-
hanced query to the VB, the query handling mecha-
nism consults the policy enforcement mechanism to
determine whether the incoming request should be
granted or not. Upon policies enforcement and access
permission, the query handling mechanism submits
(step 7) the enhanced query to the augmented per-
sistence layer (virtual database). The database proxy
that is aware of the physical distribution scheme of
the actual application database realizes the distributed
query to the physically distributed and encrypted parts
of the actual application database (step 8). Next, the
federation of the respective encrypted data from the
distributed parts of the database takes place (step 9).
The federated data synthesis and ad-hoc decryption
utilizing the key of the end-user that is transparently
to the application, propagated to the query handling
mechanism (step 10). Last, the query handling mech-
anism delivers the decrypted data to the application
controller that forwards them to the end-user through
the “view” component of the application.
According to the conceptual view (Figure 2), each
end-user is equipped with a Hardware Security Mod-
ule, such as USB stick or a smart-phone with digital
rights management module, which contains a digital
certificate (e.g. X.509). Part of the certificate includes
keys that can be exported by the PaaS/IaaS provider.
These keys upon export and verification will be trans-
parently handed over to the query middleware which
will be responsible for interacting with the VB, en-
crypting and decrypting the targeted data.
4 RELATED WORK
In an attempt to reinforce the security of remote ser-
vice accesses, researchers introduced the concept of
location-aware access control (LAAC), which allows
a system to grant, or deny, access to users based on
their physical location. LAAC models typically ex-
tend the three basic access control models DAC, MAC
and RBAC (Decker, 2011). Even though LAAC pro-
tocols have been studied extensively (Cleeff et al.,
2010), there is a clear lack of schemes that determine
user access not only on the basis of the users physi-
cal location and credentials, but also on the additional
pertinent contextual information.
The work reported in (Covington et al., 2001) was
the first to introduce the notion of context-aware ac-
cess control (CAAC), motivated by applications for
intelligent homes. More precisely, the authors intro-
duced a set of services which are enabled based on
the location of objects or subjects. The main draw-
back of the proposed model is the fact that it does
not support dynamically generated context, whilst it
fails to address important requirements such as multi-
granularity of position. Other existing CAAC mod-
els are predominantly based on RBAC (Kayes et al.,
2013) and typically target a specific domain (Costa-
bello et al., 2012).These models, however, have not
been designed to provide fine-grained data access
control, e.g. by providing the ability to specify dif-
ferent access rules for different rows of a database.
Regarding the policy management, as shown by
a recent survey of methods in contemporary open
source registry and repository systems (Kourtesis and
Paraskakis, 2012), a major weakness is the lack of
proper separation of concerns. The policy definition
and policy enforcement are entangled in the imple-
mentation of a single software component – the pol-
icy checker. The rules that a policy comprises are typ-
ically encoded in an imperative manner, as part of the
same code that checks for potential policy violations.
This has a number of negative repercussions among
which is the lack of portability and the lack of explicit
representation of policy relationships.
The data distribution and encryption algorithms
are also important aspects towards trusted cloud ser-
vices and applications. In (Gentry, 2009), C. Gen-
try presented the first fully homomorphic encryption
scheme that enables semantically secure outsourcing
to the cloud. The cloud provider operates blindly on
the encrypted data and yields the correct, encrypted
result. Nevertheless, its practicality is in question as
the latest implementations are still orders of magni-
tude slower than just downloading all encrypted data,
decrypting, processing and encrypting it locally and
finally uploading it again. In another interesting ap-
proach (Popa et al., 2011), the concept of onions is
used. Onions are managed monolithically by a proxy,
acting as an adapter between the user and the storage
back-end. Each attribute in a relational table is ini-
tially asymmetrically encrypted. If certain queries for
an attribute are issued, layers of the onion are peeled
off, resulting in another, less secure onion. CryptDB
Figure 2: PaaSword Framework Conceptual Architecture
uses a novel scheme for order preserving encryption
that leaks no information about the data besides or-
der and thus allows sorting encrypted data securely.
The main drawback of CryptDB is the lack of secu-
rity guarantees to the client. More precisely, the only
guarantee is that an untrusted server will learn only
the information that is necessary to process the query.
This may cause every attribute to be reduced to the
plain text in the worst case. Also, peeling off layers
cannot be reversed, so a single query is sufficient to
lower the security forever.
5 CONCLUSIONS
In this position paper, we proposed the PaaSword
framework that can be exposed as a service at the
level of PaaS. This framework can tackle the identi-
fied cloud security requirements and challenges that
should be considered in order to enhance data protec-
tion, integrity and confidentiality in the presence of
malicious adversaries. The envisaged PaaSword goes
beyond the state-of-the-art and allows cloud services
to maintain a fully distributed and encrypted data per-
sistence layer. Our framework involves a context-
aware security model, the necessary policies enforce-
ment mechanism along with a physical distribution,
encryption and query middleware.
Future work involves the design and implementa-
tion of the proposed framework into a fully functional
solution which will be validated through the follow-
ing five pilots in various industrial contexts: i) En-
crypted persistency as a service in a PaaS provider, ii)
Intergovernmental secure document and personal data
exchange, iii) Secure sensors data fusion and analyt-
ics, iv) Protection of personal data in a multi-tenant
CRM, v) Protection of sensible enterprise information
in multi-tenant ERP. These pilots will allow us to test
PaaSword and validate its added value in a variety of
heterogeneous cases.
Finally, an area that will benefit from PaaS-
word framework is the so called participatory sens-
ing (Michalas and Komninos, 2014). The evolution of
this field is driven by the introduction of sensors into
mobile devices. The openness of such systems and
the richness of user data they entail raise significant
concerns for their storage and processing. Protocol
designers by having PaaSword framework in hands
will be able to incorporate secure cloud computing
techniques in order to facilitate the storage and pro-
cessing of the vast amount of collected data.
ACKNOWLEDGEMENTS
The research leading to these results has re-
ceived funding from the European Union’s Hori-
zon 2020 research and innovation programme under
grant agreement No 644814, the PaaSword project
(www.paasword.eu) within the ICT Programme ICT-
07-2014: Advanced Cloud Infrastructures and Ser-
vices.
REFERENCES
Alliance, C. S. (2013). The notorious nine – cloud comput-
ing top threats in 2013.
B¨
osch, C., Hartel, P., Jonker, W., and Peter, A. (2014).
A survey of provably secure searchable encryption.
ACM Comput. Surv., 47(2):18:1–18:51.
Cleeff, A. v., Pieters, W., and Wieringa, R. (2010). Benefits
of location-based access control: A literature study. In
Proceedings of the 2010 IEEE/ACM Int’L Conference
on Green Computing and Communications & Int’L
Conference on Cyber, Physical and Social Computing,
GREENCOM-CPSCOM ’10, pages 739–746, Wash-
ington, DC, USA. IEEE Computer Society.
Costabello, L., Villata, S., and Gandon, F. (2012). Context-
aware access control for rdf graph stores. In Raedt,
L. D., Bessire, C., Dubois, D., Doherty, P., Frasconi,
P., Heintz, F., and Lucas, P. J. F., editors, ECAI, vol-
ume 242 of Frontiers in Artificial Intelligence and Ap-
plications, pages 282–287. IOS Press.
Covington, M. J., Long, W., Srinivasan, S., Dev, A. K.,
Ahamad, M., and Abowd, G. D. (2001). Securing
context-aware applications using environment roles.
In Proceedings of the Sixth ACM Symposium on Ac-
cess Control Models and Technologies, SACMAT ’01,
pages 10–20, New York, NY, USA. ACM.
Decker, M. (2011). Modelling of location-aware access
control rules. In Handbook of Research on Mobility
and Computing: Evolving Technologies and Ubiqui-
tous Impacts, pages 912–929. IGI Global.
Dey, A. K. (2001). Understanding and using context. Per-
sonal Ubiquitous Comput., 5(1):4–7.
Dolev, D. and Yao, A. C. (1983). On the security of pub-
lic key protocols. Information Theory, IEEE Transac-
tions, 29(2):198–208.
Ferrari, E. (2010). Access Control in Data Management
Systems. Morgan and Claypool Publishers.
Gabel, M. and H ¨
ubsch, G. (2014). Secure database out-
sourcing to the cloud using the mimosecco middle-
ware. In Krcmar, H., Reussner, R., and Rumpe, B.,
editors, Trusted Cloud Computing, pages 187–202.
Springer International Publishing.
Garfinkel, T., Pfaff, B., Chow, J., Rosenblum, M., and
Boneh, D. (2003). Terra: A virtual machine-based
platform for trusted computing. In ACM SIGOPS Op-
erating Systems Review, volume 37, pages 193–206.
Gentry, C. (2009). A Fully Homomorphic Encryp-
tion Scheme. PhD thesis, Stanford, CA, USA.
AAI3382729.
Huber, M., Gabel, M., Schulze, M., and Bieber, A. (2013).
Cumulus4j: A provably secure database abstraction
layer. In Cuzzocrea, A., Kittl, C., Simos, D. E.,
Weippl, E., Xu, L., Cuzzocrea, A., Kittl, C., Simos,
D. E., Weippl, E., and Xu, L., editors, CD-ARES
Workshops, volume 8128 of Lecture Notes in Com-
puter Science, pages 180–193. Springer.
IBM (2011). Security and high availability in cloud comput-
ing environments. Technical report, IBM SmartCloud
Enterprise, East Lansing, Michigan.
Kamara, S. and Lauter, K. (2010). Cryptographic cloud
storage. In Sion, R., Curtmola, R., Dietrich, S., Ki-
ayias, A., Miret, J., Sako, K., and Seb, F., editors,
Financial Cryptography and Data Security, volume
6054 of Lecture Notes in Computer Science, pages
136–149. Springer Berlin Heidelberg.
Kayes, A. S. M., Han, J., and Colman, A. (2013).
An ontology-based approach to context-aware access
control for software services. In Lin, X., Manolopou-
los, Y., Srivastava, D., and Huang, G., editors, WISE
(1), volume 8180 of Lecture Notes in Computer Sci-
ence, pages 410–420. Springer.
Kourtesis, D. and Paraskakis, I. (2012). A registry and
repository system supporting cloud application plat-
form governance. In Proceedings of the 2011 In-
ternational Conference on Service-Oriented Comput-
ing, ICSOC’11, pages 255–256, Berlin, Heidelberg.
Springer-Verlag.
Krasner, G. E. and Pope, S. T. (1988). A cookbook for using
the model-view controller user interface paradigm in
smalltalk-80. J. Object Oriented Program., 1(3):26–
49.
Michalas, A. and Komninos, N. (2014). The lord of
the sense: A privacy preserving reputation system
for participatory sensing applications. In Computers
and Communication (ISCC), 2014 IEEE Symposium,
pages 1–6. IEEE.
Michalas, A., Komninos, N., Prasad, N. R., and Oleshchuk,
V. A. (2010). New client puzzle approach for dos re-
sistance in ad hoc networks. In Information Theory
and Information Security (ICITIS), 2010 IEEE Inter-
national Conference, pages 568–573. IEEE.
Michalas, A., Paladi, N., and Gehrmann, C. (2014). Secu-
rity aspects of e-health systems migration to the cloud.
In e-Health Networking, Applications and Services
(Healthcom), 2014 IEEE 16th International Confer-
ence on, pages 212–218. IEEE.
Micro, T. (2010). The need for cloud computing security.
In A Trend Micro White Paper.
Paladi, N. and Michalas, A. (2014). “One of our hosts in
another country”: Challenges of data geolocation in
cloud storage. In Wireless Communications, Vehicular
Technology, Information Theory and Aerospace Elec-
tronic Systems (VITAE), 2014 4th International Con-
ference on, pages 1–6.
Paladi, N., Michalas, A., and Gehrmann, C. (2014). Do-
main based storage protection with secure access con-
trol for the cloud. In Proceedings of the 2014 Inter-
national Workshop on Security in Cloud Computing,
ASIACCS ’14, New York, NY, USA. ACM.
Popa, R. A., Redfield, C. M. S., Zeldovich, N., and Balakr-
ishnan, H. (2011). Cryptdb: Protecting confidentiality
with encrypted query processing. In Proceedings of
the Twenty-Third ACM Symposium on Operating Sys-
tems Principles, SOSP ’11, pages 85–100, New York,
NY, USA. ACM.
Santos, N., Gummadi, K. P., and Rodrigues, R. (2009). To-
wards trusted cloud computing. In Proceedings of the
2009 Conference on Hot Topics in Cloud Computing,
HotCloud’09, Berkeley, CA, USA. USENIX.
Zhang, F., Chen, J., Chen, H., and Zang, B. (2011). Cloud-
visor: retrofitting protection of virtual machines in
multi-tenant cloud with nested virtualization. In Pro-
ceedings of the Twenty-Third ACM Symposium on Op-
erating Systems Principles, pages 203–216. ACM.
... In authentication attacks, attackers prove themselves to be legitimate. Weak passwords [104] and registration process can be harmful for authentication. Strong authentication is necessary for strict privacy. ...
Article
Full-text available
The emergence of cloud computing has changed perception of all regarding software delivery, development models and infrastructure. Cloud computing has a potential of providing elastic, easily manageable, powerful and cost-effective solutions. The rapid transition to cloud computing has fueled concerns on the security issues. The migration of the user's data and applications in a shared environment of a cloud, where there is a collocation of several users increases security related concerns. Several research efforts have been made in evaluating challenges related to security faced by the cloud computing environments, a number of solutions of such problems have also been proposed. Integrated security solutions should be devised to deal with the increasing security risks. In this paper, a detailed cloud computing survey, key services and concepts are being presented. This paper attempts to evaluate various security threats to cloud computing and a number of security solutions have also been discussed. Furthermore, a brief view of the cloud security regulatory bodies and compliance have also been presented. Despite the research efforts in cloud security field, there are still some open research problems and challenges which are discussed in this paper.
... However promising, their scheme is static and as a result can only have very limited applications in real-life scenarios. Moreover, authors do not provide a revocation mechanisma problem of paramount importance in cloud-based services [11,18]. ...
Chapter
Full-text available
Secure cloud storage is considered as one of the most important issues that both businesses and end-users take into account before moving their private data to the cloud. Lately, we have seen some interesting approaches that are based either on the promising concept of Symmetric Searchable Encryption (SSE) or on the well-studied field of Attribute-Based Encryption (ABE). In this paper, we propose a hybrid encryption scheme that combines both SSE and ABE by utilizing the advantages of both these techniques. In contrast to many approaches, we design a revocation mechanism that is completely separated from the ABE scheme and solely based on the functionality offered by SGX.
... As a result, researchers do not only focus on securing the communication link between a client and a server, but they also try to solve residue problems from the past, when the security of network protocols were not as high a priority. Furthermore, with the advancements of Internet and database technology, users' privacy [24], [28], [34], [16], [6], [7] is considered as of paramount importance while privacy-related attacks have increased [36], [15], [37], [18]. Key industrial players are invested in reducing such risks by implementing concrete security strategies including activities such as penetration testing, vulnerability assessment and risk assessment [35], [29]. ...
Thesis
Full-text available
There are currently a large number of pen-testing companies focusing on finding novel ways to bypass the security of several communication protocols. HTTP Strict Transport Security (HSTS) is a web security mechanism that enforces the use of TLS in certain websites. Both HSTS and TLS are considered important protocols that together provide certain guarantees to users regarding the security of their online communication. In 2017, a security team in a BlackHat convention managed to bypass the HSTS security mechanism within a Firefox browser. By doing so, hackers were able to conduct a protocol downgrade and finally bypass TLS. The presented attack required a lot of work from the attacker’s side in order to be implemented correctly. In addition to that, an attacker was able to remove the HSTS policies successfully only under a specific setup that was based on ideal conditions. The attack can therefore not be considered realistic. Moreover, after the release of the latest update, it has become even harder to repeat this attack. More precisely, performing the same attack has been proved to be unstable while the required time for a successful launch is not only higher but unpredictable as well. In this study, we intend to bypass current security measures in Firefox in order to successfully remove HSTS and perform a protocol downgrade. To do so, we are building an attack tool that is based on old attacking techniques and works in an automated way. Additionally, the presented tool can successfully launch the attack even in the latest versions of Firefox, where the old attacking tools fail. Above all, our tool manages to automate the timing, and effectively control the efficiency of the process to bypass HSTS. Once accomplished, it can be installed on a Raspberry Pi device and will allow individuals to perform a Man-in-the-Middle-Attack successfully. The attack is planned in such a way so that the intruder can gather credentials of legitimate users trying to authenticate themselves on different websites that are running authentication forms via SSL/TLS whether HSTS is enabled or not. With the development of this tool, we hope that security teams will look deeper into the actual process during the attack, preventing automation tools like this from succeeding, and release a new enhanced security approach as it is clear that current security measures are not adequate. . . .
... History stealing techniques alone are not enough to identify individual users. However, combining such techniques with the group membership information stored in social networks can lead to several privacy-related attacks Michalas and Yigzaw, 2015;Dowsley, Michalas, and Nagel, 2016;Verginadis et al., 2015. Furthermore, one of the key findings of that study was that a wide range of social networks supports group memberships which can potentially be misused by corrupted users to perform similar attacks. ...
Technical Report
Full-text available
by Eugene Kwaku FRIMPONG With the current surge in the use of Social Network sites, users' private information shared online while using these sites have become a very important and expensive commodity that large and small organizations alike go all out in their attempts to get. None more so than Cambridge Analytica. Cambridge Analytica was a British political firm that combined data mining, data brokerage and data analysis with strategic communication to provide electoral consultation to its clients. This project discusses and analyses the respective roles played by Facebook and Cambridge An-alytica in the data breach scandal dubbed The Cambridge Analytica Files. We study and discuss the make-up of social networks and dive into the privacy threats that are associated with these sites while paying particular attention to Facebook and the underlying privacy controls. Additionally, we developed two test applications with main aim to imitate the "thisisyourdigitallife" application that was developed and used by Cambridge Analytica to harvest the personal information of millions of American Facebook users. iii
Chapter
Computing remotely also brings with it the most sensitive and significant aspect of data security. Data being resident on server and infrastructure that are opaque to users bring with it the huge advantage of ridding users of all the infrastructure operational liabilities. But this also means the data owned by users navigates through routes either unknown or no control territory. This glaringly brings security of data on cloud with high vulnerability. This paper explores dimensionally various such vulnerabilities, and related strategies to circumvent them does involve a sensitive disection of modern technology in today’s world of computing. An insights through various levels of infrastructure, application, data and network architecture gives this research enough evidence that complexities involved in solutioning the security problems of cloud computing is nevertheless a path most discussed and debated. Further much attention is needed to all the vulnerabilities discussed and solutioning them comprehensively.
Article
In earlier banking systems, the data owners were unable to access or update their financial information. Nowadays, user financial information is stored in Cloud storage instead of traditional storage, but security risks are high in financial sectors. Sometimes, Cloud services providers and public auditors modify the user sensitive attribute values. Hence, the decentralized storage system is required for providing better security and integrity of user sensitive attribute values. Blockchain is a decentralized technology for providing tamper-proof storage for sensitive attribute values. Hence, the account holder information is segregated as sensitive and non-sensitive attributes. Before storing into off-chain mode of blocks, the sensitive attributes are grouped into ‘n' number of groups and encrypted by separate group key. The non-encrypted, non-sensitive attributes are stored in cloud storage. The access information is stored in the on-chain mode of the block for easy monitoring. Hence, the security and integrity of sensitive information are preserved.
Article
It is generally conceded that, due to security and privacy concerns, enterprises and users are reluctant to embrace the cloud computing paradigm and hence benefit from the cost reductions and the increased flexibility or business agility that this paradigm brings about. These concerns stem mainly from the significantly-expanded attack surfaces that result from the heterogeneous nature of cloud services and the dynamicity inherent in cloud environments. In order to alleviate these concerns, effective and flexible access control approaches are required to consider the contextual parameters that characterise data access requests in the cloud. In this respect, this work presents PaaSword: a novel holistic access control framework-essentially a PaaS offering-that extends the popular XACML standard with semantic reasoning capabilities that support the federation of effective context-aware access control policies and their infusion into cloud applications with minimal manual intervention and effort. To determine the performance of our solution, a comparative evaluation test is presented and discussed, against a well-known reference implementation of the XACML standard, namely the open source WSO2 Balana engine.
Conference Paper
Full-text available
Secure cloud storage is considered one of the most important issues that both businesses and end-users are considering before moving their private data to the cloud. Lately, we have seen some interesting approaches that are based either on the promising concept of Symmetric Searchable Encryption (SSE) or on the well-studied field of Attribute-Based Encryption (ABE). In the first case, researchers are trying to design protocols where users' data will be protected from both internal and external attacks without paying the necessary attention to the problem of user revocation. On the other hand, in the second case existing approaches address the problem of revocation. However, the overall efficiency of these systems is compromised since the proposed protocols are solely based on ABE schemes and the size of the produced ciphertexts and the time required to decrypt grows with the complexity of the access formula. In this paper, we propose a protocol that combines both SSE and ABE in a way that the main advantages of each scheme are used. The proposed protocol allows users to directly search over encrypted data by using an SSE scheme while the corresponding symmetric key that is needed for the decryption is protected via a Ciphertext-Policy Attribute-Based Encryption scheme.
Article
Full-text available
Electronic devices we use on a daily basis collect sensitive information without preserving user's privacy. In this paper, we propose the lord of the sense (LotS), a privacy-preserving reputation system for participatory sensing applications. Our system maintains the privacy and anonymity of information with the use of cryptographic techniques and combines voting approaches to support users' reputation. Furthermore, LotS maintains accountability by tracing back a misbehaving user while maintaining k-anonymity. A detailed security analysis is presented with the current advantages and disadvantages of our system.
Article
Full-text available
In modern communication environments, the ability to provide access control to information resources and software services in a context-aware manner is crucial. By leveraging the dynamically changing context information, we can achieve context-specific control over access to such resources and services, better satisfying the security and privacy requirements of the stakeholders. Existing access control approaches are highly domain-specific and they control access to services depending on the specific types of context information (e.g., location and time). One of the key limitations of the existing approaches is the lack of systematic capture and use of context information in making context-aware access control decisions. Therefore, new access control approaches are required for such dynamic and context-aware environments. Existing approaches define context as the state/situation of the entities. To achieve context-aware access control, in this paper we not only consider the states of the entities but also consider the states of the relationships between entities. We introduce a generic framework OntCAAC (Ontology-based Context-Aware Access Control), that adopts semantic technologies in modelling dynamic contexts and corresponding access control policies. It includes a context model specific to access control, capturing the relevant context information. The context model also incorporates the ability to infer high-level implicit context information according to operator-defined rules. Using the context model, the policy model of the OntCAAC framework provides support for specifying and enforcing context-aware access control policies. We have developed a prototype implementation of the framework and have demonstrated its use in making context-aware access control decisions through two case studies from different domains. Experimental results show the feasibility of our approach and quantify the performance overhead of providing context-aware access control for software services.
Conference Paper
Full-text available
Electronic devices we use on a daily basis collect sensitive information without preserving user's privacy. In this paper, we propose the lord of the sense (LotS), a privacy pre-serving reputation system for participatory sensing applications. Our system maintains the privacy and anonymity of information with the use of cryptographic techniques and combines voting approaches to support users' reputation. Furthermore, LotS maintains accountability by tracing back a misbehaving user while maintaining k-anonymity. A detailed security analysis is presented with the current advantages and disadvantages of our system.
Conference Paper
Full-text available
As adoption of e-health solutions advances, new computing paradigms - such as cloud computing - bring the potential to improve efficiency in managing medical health records and help reduce costs. However, these opportunities introduce new security risks which can not be ignored. Based on our experience with deploying part of the Swedish electronic health records management system in an infrastructure cloud, we make an overview of major requirements that must be considered when migrating e-health systems to the cloud. Furthermore, we describe in-depth a new attack vector inherent to cloud deployments and present a novel data confidentiality and integrity protection mechanism for infrastructure clouds. This contribution aims to encourage exchange of best practices and lessons learned in migrating public e-health systems to the cloud.
Conference Paper
Full-text available
Physical location of data in cloud storage is an increasingly urgent problem. In a short time, it has evolved from the concern of a few regulated businesses to an important consideration for many cloud storage users. One of the characteristics of cloud storage is fluid transfer of data both within and among the data centres of a cloud provider. However, this has weakened the guarantees with respect to control over data replicas, protection of data in transit and physical location of data. This paper addresses the lack of reliable solutions for data placement control in cloud storage systems. We analyse the currently available solutions and identify their shortcomings. Furthermore, we describe a high-level architecture for a trusted, geolocation-based mechanism for data placement control in distributed cloud storage systems, which are the basis of an on-going work to define the detailed protocol and a prototype of such a solution. This mechanism aims to provide granular control over the capabilities of tenants to access data placed on geographically dispersed storage units comprising the cloud storage.
Chapter
Cloud Computing is a technology with vast impact on IT systems. Costs can be significantly reduced through on-demand purchase of CPU time, memory and storage. The main reason to avoid cloud technology is security. If data is outsourced to the cloud, control of the data is lost. This leads to a lack of trust in cloud services. Most cloud providers secure their systems only against external adversaries by using secure login mechanisms and secure end-to-end encrypted connections. Internal adversaries, however, remain a big threat in this scenario. Especially when using mobile devices as clients, usable security with a low performance impact remains a real challenge. In this paper, we present a cloud-storage technique for relational databases that is suitable for mobile devices. MimoSecco uses an innovative encryption scheme and hard-to-clone secure hardware to guarantee security. Relational databases are fragmented, encrypted and transferred to different servers. These measures make it infeasible for an adversary to extract the original data. The MimoSecco middleware acts as a proxy between the application and the untrusted cloud storage and transparently transforms SQL queries. We show the integration of the secure database proxy and the secure hardware tokens in a use case.
Article
Access control in the domain of information system security refers to the process of deciding whether a particular request made by a user to perform a particular operation on a particular object under the control of the system should be allowed or denied. For example, the access control component of a file server might have to decide whether user "Alice" is allowed to perform the operation "delete" on the object "document.txt". For traditional access control this decision is based on the evaluation of the identity of the user and attributes of the object. The novel idea of location-aware access control is also to consider the user's current location which is determined by a location system like GPS. The main purpose of this article is to present several approaches for the modeling of location-aware access control rules. We consider generic as well as application-specific access control models that can be found in literature.
Article
The evolution of modern computing systems has lead to the emergence of Cloud computing. Cloud computing facilitates on-demand establishment of dynamic, large scale, flexible, and highly scalable computing infrastructures. However, as with any other emerging technology, security underpins widespread adoption of Cloud computing. This paper presents the state-of-the-art about Cloud computing along with its different deployment models. The authors also describe various security challenges that can affect an organization’s decision to adopt Cloud computing. Finally, the authors list recommendations to mitigate with these challenges. Such review of state-of-the-art about Cloud computing security can serve as a useful barometer for an organization to make an informed decision about Cloud computing adoption.
Article
We survey the notion of provably secure searchable encryption (SE) by giving a complete and comprehensive overview of the two main SE techniques: searchable symmetric encryption (SSE) and public key encryption with keyword search (PEKS). Since the pioneering work of Song, Wagner, and Perrig (IEEE S&P '00), the field of provably secure SE has expanded to the point where we felt that taking stock would provide benefit to the community. The survey has been written primarily for the nonspecialist who has a basic information security background. Thus, we sacrifice full details and proofs of individual constructions in favor of an overview of the underlying key techniques. We categorize and compare the different SE schemes in terms of their security, efficiency, and functionality. For the experienced researcher, we point out connections between the many approaches to SE and identify open research problems. Two major conclusions can be drawn from our work. While the so-called IND-CKA2 security notion becomes prevalent in the literature and efficient (sublinear) SE schemes meeting this notion exist in the symmetric setting, achieving this strong form of security efficiently in the asymmetric setting remains an open problem. We observe that in multirecipient SE schemes, regardless of their efficiency drawbacks, there is a noticeable lack of query expressiveness that hinders deployment in practice.
Conference Paper
Cloud computing is a blossoming and rapidly evolving model, with new features and capabilities being announced regularly. Security of cloud-based applications and data is one of the key concerns of cloud customers. Secure software and secure software life cycle management are fundamental to the protection of cloud services. The information security of cloud systems rest on the classical principles of confidentiality, availability, and integrity, but applied to distributed, virtualized, and dynamic architectures. This paper presents an analysis of data security issues in a cloud environment. Solution exist for a few. Analysis of these solutions can be used to determine the lacunae in the data security issues.