Secure Distributed Data

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 33

SECURE DISTRIBUTED DATA

STORAGE IN CLOUD COMPUTING


Contents to be covered…

 INTRODUCTION

 CLOUD STORAGE: FROM LANs TO WANs

 TECHNOLOGIES FOR DATA SECURITY IN CLOUD COMPUTING

 OPEN QUESTIONS AND CHALLENGES


Introduction
 One of the core services provided by cloud computing is data storage.
 This poses new challenges in creating secure and reliable data storage and access
facilities over remote service providers in the cloud.
 The security of data storage is one of the necessary tasks to be addressed before the
blueprint for cloud computing is accepted.
 data security is the foundation of information security,a great quantity of efforts has
been made in the area of distributed storage security [13].
 However, this research in cloud computing security is still in its infancy [4].
 security aspects can be well-managed using existing techniques such as digital
signatures, encryption, firewalls, and/or the isolation of virtual environments ,and so
on [4].
 Another consideration is that the specific security requirements for cloud computing
have not been well-defined within the community.
 One concern is that the users do not want to reveal their data to the cloud service
provider.
 users are unsure about the integrity of the data they receive from the cloud.
CLOUD STORAGE: FROM LANs TO
WANs
 Moving From LANs to WANs
 Existing Commercial Cloud Services
 Vulnerabilities in Current Cloud Services
 Bridge the Missing Link
Moving From LANs to WANs
 distributed storage take the form of either storage area networks
(SANs) or network-attached storage (NAS) on the LAN level.
 SANs are constructed on top of block-addressed storage units
connected through dedicated high-speed networks.
 In contrast, NAS is implemented by attaching specialized file
servers to a TCP/IP network and providing a file-based interface
to client machine [6].
 For SANs and NAS, the distributed storage nodes are managed by
the same authority.
 The confidentiality and integrity of data are mostly achieved using
robust cryptographic schemes.
 security system would not be robust at cloud environment
 the confidentiality and the integrity of the data would be violated
when an adversary controls a node or the node administrator
becomes malicious.
Existing Commercial Cloud Services

 As shown in Figure 8.1, data storage services on the platform


of cloud computing are fundamentally provided by
applications/software based on the Internet.
 Amazon’s Web Service.
 Microsoft Windows Azure.
 Google App Engine (GAE).
Vulnerabilities in Current Cloud
Services
 Storage services that accept a large amount of data (.1
TB),service accept a smaller data amount (#50 GB) allow
the data to be uploaded or downloaded
 data integrity, the Azure Storage Service stores the uploaded
data MD5 checksum and email.
 Confidentiality can be achieved by adopting robust
encryption schemes.
 However, the integrity and repudiation issues are not handled
well on the current cloud service platform.
Bridge the Missing Link
 bridge the missing link based on digital signatures and
authentication coding schemes.
 there is a third authority certified (TAC) by the user and
provider and whether the user and provider are using the
secret key sharing technique (SKS).
 There are four solutions to bridge the missing link of data
integrity between the uploading and downloading
procedures.
TECHNOLOGIES FOR DATA SECURITY IN
CLOUD COMPUTING
 Database Outsourcing and Query Integrity Assurance.
 Data Integrity in Untrustworthy Storage.
 Web-Application-Based Security.
 Multimedia Data Security.
Database Outsourcing and Query
Integrity Assurance
 outsourcing model has the benefits of reducing the costs for
running DBMS independently and enabling enterprises to
concentrate on their main businesses [12].
 Figure 8.7 demonstrates the general architecture of a
database outsourcing environment.
 Let T denote the data to be outsourced. The data T are is
preprocessed, encrypted, and stored at the service provider.
For evaluating queries, a user rewrites a set of queries Q
against T to queries against the encrypted database.
 there are two security concerns in database outsourcing: data
privacy and query integrity.
Data Integrity in Untrustworthy Storage
 A PDP-Based Integrity Checking Protocol
 An Enhanced Data Possession Checking Protocol.
A PDP-Based Integrity Checking
Protocol
 Allows users to obtain a probabilistic proof from the storage
service providers.
 proof will be used as evidence that their data have been
stored there.
 advantages of this protocol is that the proof generated by the
storage service provider with small portion of the whole
dataset.
 the amount of the metadata that end users are required to
store is also small—that is, O(1).
 Figure 8.8 presents the flowcharts of the protocol for
provable data possession [28].
An Enhanced Data Possession
Checking Protocol.
 PDP-based protocol does not satisfy Requirement #2 with
100% probability. An enhanced protocol has been proposed
based on the idea of the DiffieHellman scheme.
 protocol satisfies all five requirements and is computationally
more efficient than the PDP-based protocol [27].
Web-Application-Based Security
 In cloud computing environments, resources are provided as a
service over the Internet in a dynamic, virtualized, and scalable
way.
 Web security plays a more important role than ever.
 The types of attack can be categorized in
 Authentication,
 Authorization,
 Client-Side Attacks,
 Command Execution,
 Information Disclosure,
 and Logical Attacks [31].
Multimedia Data Security Storage
 Protection from Unauthorized Replication.
 Protection from Unauthorized Replacement
 Protection from Unauthorized Pre-fetching.
OPEN QUESTIONS AND CHALLENGES
 Concerns at Different Levels
 Technical and Nontechnical Challenges
Concerns at Different Levels
Technical and Nontechnical Challenges

You might also like