Data Security and Privacy Protection Data Security PDF
Data Security and Privacy Protection Data Security PDF
net/publication/329705635
Data Security and Privacy Protection Data Security and Privacy Protection in
Public Cloud
CITATIONS READS
0 2,382
1 author:
Yue Shi
University of Southern California
4 PUBLICATIONS 140 CITATIONS
SEE PROFILE
All content following this page was uploaded by Yue Shi on 20 February 2019.
Abstract—This paper discusses about the challenges, same physical machine could be shared by multiple tenants
advantages and shortcomings of existing solutions in data with virtualization, adversary would be able to monitor the
security and privacy in public cloud computing. As in cloud physical machine behavior to obtain valuable data from other
computing, oceans of data will be stored. Data stored in public tenants [10], and also the cloud providers themselves are
cloud would face both outside attacks and inside attacks since unreliable, they might accidentally or intentionally mod-ify or
public cloud provider themselves are untrusted. Conventional leak the data stored to adversaries.
encryption could be used for storage, however most data in cloud
needs further computation. Decryption before computation will In terms of the particularities of data security in cloud
cause large overheads for data operation and lots of computing enviroment, many researches have been done. This
inconvenience. Thus, efficient methods to protect data security as paper focuses on the protection of the data confidentiali-ty in
well as privacy for large amount of data in cloud are necessary. different phases of data life cycle. The paper is organized as
follows.
In the paper, different mechanisms to protect data security
and privacy in public cloud are discussed. A data security and In Section II, the cloud architecture and possible attacks in
privacy enabled multi-cloud architecture is proposed. different points are discussed. In Section III, data security con-
cern and possible attackes during various stages of data life
cycle in cloud environment will be discussed. In section IV, V
and VI, various protection methods of data confidentiality,
Keywords— Cloud computing, data confidentiality, data availability, integrity and privacy against different kinds of
privacy, data integrity. attackes will be discussed in details, problems and ad-vantages
of these different techniques are compared. A new cloud data
I. INTRODUCTION security and privacy enabled architecture and confidentiality
ranking system are propsed in section VII..
Cloud computing has become an emerging technique due to
its on demand service and scalablity features. Most usage of .
cloud today is in data storage and big data or computation-
intensive applications. Thus data security and privacy has
become the chief concern, especially for business level data. II. CLOUD ARCHITECTURE AND SECURITY ISSUES
Data security mainly includes data confidentiality, availa-bility In public cloud environment, threats come from both the
and integrity. Data privacy is to prevent identification of data outsider and insider attack. Fig.1 shows the cloud architecture
stored in cloud. According to [3], data security and privacy and attacks. The outsider attacks by malicious codes, DDoS
issues in cloud exist during the data life cycle from generation, attack, network eavesdropping etc. There are three layers in
transfer, use, share, storage, archival until destruction. cloud computing platform. In the infrastructure layer, each
Traditional methods for data security usually rely on data physical machine has multiple virtual machines (VMs)
encryption and access control. Data encryption with AES or installed. The platform layer provides the platform for
other encryption methods would prevent valuable infor-mation customers. Customers could have their own applications or
leakage although the adversary gets hold of the data. However softwares and configurations installed. And the software layer
it has efficiency issue when dealing with oceans of data in provides the software stacks by the cloud providers.
cloud environment due to large encryption and de-cryption For the client side, a customer could either be a legal user
overhead in storage and computation. or an attacker pretending as legal users. Network
Access control is to prevent unauthorized users to access eavesdroppers could also sit in between to perform man in the
data. However, in cloud computing, users do not have physi- middle attacks. Firewalls or Intrusion Detection Systems (IDS)
cal control over the machines they store data on, and also the could be installed to protect the entire cloud environment.
Application 1 Application i
Firewall/Intrus Attacker
of user 1 of user j
ion Detection
System
DDoS/
Attacker Malicious
codes Platform as a
Authentication Service
VM VM VM VM VM VM VM VM VM
User j
Infrastructure
User 1
Physical as a Service
Eavesdropper
machine
Table 1. summarizes the possible attacks and Virtual Users. Virtual machine segregation
Machine
solutions. The next few paragraphs discuss about virtual machine storing
data would be
possible attacks at different points and protection compromised
methods in detail.
DDoS Users and Cloud Virtual machine migration,
providers, Virtual Private Cloud
Cloud 1
VM VM Cloud 2
VM
Local VM
VM VM VM
VM Database and VM
Policies VM VM
VM VM VM
VM
VM VM
VM
End User
VM VM
VM
VM VM VM
VM VM
VM
VM VM
VM VM VM
VM
Common API VM VM
VM
VM VM
VM
VM VM VM
VM VM
VM
VM VM
VM VM Application i VM
VM
of user j
VM VM
Physical VM
machine
Physical
machine
Within each cloud, a hierarchical organization of machine for unclassified data, it could be stored directly to a single
instances is applied. According to [1], based on Bayesian cloud platform without encryption. In Table 3, different
probabilistic access from bottom to top layer machines, data in protection mechanisms over secrete data are summarized.
the highest level has the highest confidentiality.
TABLE 3
Here, a PaaS cloud model is considered. As shown in the PROTECTION OF SECRET DATA WITH DIFFERENT OPERATIONS
figure, data could be sent to multiple layers of machine
Operations Representative Possible Protection methods
instances across different cloud providers. The cloud applications
environment itself would apply trusted cloud computing
discussed above. No operations Backup service, Multiple storage [16]
e.g. dropbox
It’s known that there is not a system which could be fully
trustworthy. Tradeoff exists among cost, efficiency and
security. For top secret level, it is better to store locally, and
Basic Database CryptDB [17] VIII. CONCLUSIONS AND FUTURE WORK
Operations
A. Conclusions
Advanced Machine learning Additively homomorphic This paper focuses on the data storage and computation
Analytics encryption[28], security and privacy. Different methods are compared, problems
Cripsis [32] and advantages with the existing methods are discussed. A
hierarchical multi-cloud architecture with a common
preprocessing API and local database to deal with anonymization,
authentication, processing data with different operations and
In this architecture, the local user side is considered as secret level is proposed.
trusted party, the interaction between user and cloud, and the B. Future work
multiple cloud providers themselves are all untrusted.
In terms of different secret level and operations needed, a The proposed architecture could provide various security
common preprocessing API is defined for anonymization, methods according to the data type and usage to reduce the
authentication, processing data with different operations and complexity by calling a common API. However, there are
secret level etc. The input to the common API is data to be sent, some problems with this design to be solved:
secret level and computation difficulty. Upon receiving a request
a). The call to the common API would be intensive, thus
from user, the common API would further call the functions in
caching and scalable procedures are needed.
libraries to perform the correspond operations. It would refer to
and update local database. For example, if an input is (data, secret, b). Although most storage and computation are done in
no operations). The common API would further call the data remote cloud, the preprocessing and certain data related
splitting and distribution library and also update the local information need to be stored and maintained locally.
database to store the file chunk location information.
c). Since algorithms over encrypted data are applied,
customer-oriented algorithms need to be developed. Users
B. Security Evaluation need have a good knowledge of encrypted data.
For different cloud providers, its ranking and cost are d). A fully functional benchmark for the system need to be
different. Also for different methods, the overall performance designed, implemented and evaluated with quantitative and
including time complexity T, cost C, security S and privacy P qualitative performance metrics.
level are different. In order to evaluate a method with the
overall performance, a weighted linear ranking is proposed as
follows:
Pr= a1× T+a2× C +a3× S +a4× P (2)
REFERENCES
where ai is adjustable weight. The time complexity needs to be
evaluated per algorithm base. The cost could be measured
through the billing system of cloud providers. For data [1] G. Ateniese, M. Steiner, and G. Tsudik ,“ Cloud-Trust - a Security
Assessment Model for Infrastructure as a Service (IaaS) Clouds,” IEEE
security and privacy in cloud, it is kind of overlapping.
Trans. on Cloud Computing,2015.
Because if encryption is used, as long as the data is
confidential, the sensitive information will not be disclosed. In [2] Ning Cao, Cong Wang, Ming Li, Kui Ren, Wenjing Lou , “Privacy-
Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data”,
addition, the data mining attacks would be mitigated. Thus, IEEE Transactions on Parallel and Distributed Systems, vol . 25, issue.
here only data security is considered. 1, 2014.
Data security includes data availability, integrity and [3] D. Chen, and Hong Zhao, "Data Security and Privacy Protection Issues
in Cloud Computing," IEEE International Conf. Computer Science and
confidentiality. Data availability would be compromised in Electronics Engineering (ICCSEE), pp. 647-651, March. 2012.
two main categories in cloud. First is the cloud architecture
reliability, i.e. the regular maintenance and failure of machine [4] Dev, H., Sen, T., Basak, M. , Ali, M.E. “An Approach to Protect the
Privacy of Cloud Data from Data Mining Based Attacks”, High
instances. The other comes from attacks talked above. Performance Computing, Networking, Storage and Analysis , pp. 1106 –
1115, 2012.
For data confidentiality, there are three layers of
confidentiality in the proposed architecture. In order to [5] X. Huang, X. Du, “Efficiently secure data privacy on hybrid cloud”,
IEEE International Conference on Communications, pp. 1936-1940,
recover data, one needs to bypass the authentication of a cloud
2013.
platform. Inside the cloud platform, hierarchical access to data
is required. The encrypted information disclosed is partial. [6] K. Hwang and D. Li, “ Trusted Cloud Computing with Secure
Resources and Data Coloring”, IEEE Internet Computing, Vol.14, Sept.
Thus, the non-confidentiality Level Probability of Accessing 2010.
one of the cloud service * Hierarchically Access Probability
[7] Ming Li; Shucheng Yu; Kui Ren; Wenjing Lou; Hou, Y.T, “Toward
that the original information contained in the virtual machine. privacy-assured and searchable cloud data storage services”, IEEE
Network, vol. 27, issue. 4, pp.56-62, 2013.
[8] Yang Pan; Gui Xiaolin; An Jian; Yao Jing; Lin Jiancai; Tian Feng , “A Communication Vehicular Technology, Information Theory and
retrievable data perturbation method used in privacy-preserving in cloud Aerospace and Electronic Systems Technology (Wireless VITAE) 2011
computing”, China Communications, vol. 11, issue 8, pp. 73-84, 2014. 2nd International Conference on. IEEE, 2011, pp. 1–5.
[9] Paul, M. , Collberg, C. , Bambauer, D, “A Possible Solution for Privacy [22] C. Gentry, “Computing arbitrary functions of encrypted data,”
Preserving Cloud Data Storage”, 2015 IEEE International Conference Commun.ACM, vol. 53, no. 3, pp. 97–105, Mar. 2010.
on Cloud Engineering, pp. 397-403, 2015.
[23] R. A. Popa, C. M. S. Redfield, N. Zeldovich, and H. Balakrishnan,
[10] Raghuwanshi, D.S. , Rajagopalan, M.R, “MS2: Practical data privacy “Cryptdb: Protecting confidentiality with encrypted query processing,”
and security framework for data at rest in cloud”, World Congress on in Proceedings of the Twenty-Third ACM Symposium on Operating
Computer Applications and Information Systems, pp. 1-8, 2014. Systems Principles, ser. SOSP ’11. New York, NY, USA: ACM, 2011,
pp. 85–100.
[11] Zahir Tari, Xun Yi, Uthpala S. Premarathne, Peter Bertok, and Ibrahim
Khalil, "Security and Privacy in Cloud Computing: Vision, Trends and [24] D. Stehle and R. Steinfeld, “Faster fully homomorphic
Chanllenges," IEEE Trans. on Cloud Computing, vol.2 ,issue.2, 2015, encryption,”Cryptology ePrint Archive, Report 2010/299, 2010,
pp 30-38. http://eprint.iacr.org/.
[12] Boyang Wang; Baochun Li; Hui Li, “ Oruta: privacy-preserving public [25] L. Xiao, O. Bastani, and I.-L. Yen, “An efficient homomorphic
auditing for shared data in the cloud”, IEEE Transactions on Cloud encryption protocol for multi-user systems.” IACR Cryptology ePrint
Computing, vol.2, issue. 1, pp. 43-56, 2014. Archive, vol. 2012, p. 193, 2012, informal publication.
[13] K. Yang and X. Jia, "An Efficient and Secure Dynamic Auditing [26] Cong Wang, Qian Wang, Kui Ren, and Wenjing Lou, "Ensuring Data
Protocol for Data Storage in Cloud Computing," IEEE Trans. Parallel Storage Security in Cloud Computing," in Proceedings of the 17th
and Distributed Systems, vol. 24, Issue. 9, pp. 1717-1726, Sep 2013 International Workshop on Quality of Service.2009:1-9.
[14] Xuyun Zhang; Wanchun Dou; Jian Pei; Nepal, S.; Chi Yang; Chang Liu; [27] Stephen Tu, M. Frans Kaashoek Samuel Madden Nickolai Zeldovich,
Jinjun Chen , “Proximity-Aware Local-Recoding Anonymization with “Processing Analytical Queries over Encrypted Data”, Proceedings of
MapReduce for Scalable Big Data Privacy Preservation in Cloud”, IEEE the VLDB Endowment, Vol. 6, No. 5, 2013.
Transactions on Computers, vol.64, issue.8, pp. 2293-2307, 2015.
[28] Raphael Bost, Raluca Ada Popa, Stephen Tu, Shafi Goldwasser,
[15] Z. Zhou, H. Zhang, X. Du, P. Li, X. Yu, “Prometheus: Privacy-aware “Machine Learning Classification over Encrypted Data”, NDSS ’15,
data retrieval on hybrid cloud” IEEE INFOCOM, pp. 2643 – 2651, 2013 Internet Society, 2015.
[16] Alexandru Butoi, Nicolae Tomai, “Secret sharing scheme for data [27] Ayantika Chatterjee and Indranil Sengupta , “Translating Algorithms to
confidentiality preserving in a public-private hybrid cloud storage handle Fully Homomorphic Encrypted Data on the Cloud”. IEEE
approach”, 2014 IEEE/ACM 7th International Conference on Utility and Transactions on Cloud Computing, 2015.
Cloud Computing
[28] Nuno Santos, Krishna P. Gummadi, Rodrigo Rodrigues
[17] Sascha Fahl, Marian Harbach, Thomas Muders, Matthew Smith, ,”Towards Trusted Cloud Computing” , ACM Conference on Hot topics
“Confidentiality as a Service –Usable Security for the Cloud”, 2012 in cloud computing, 2009.
IEEE 11th International Conference on Trust, Security and Privacy in
Computing and Communications. [29] Christian Huebner, “Trusted Cloud computing with Intel TXT: The
challenge”, https://www.mirantis.com/blog/trusted-cloud-intel-txt-
[18] Huiqi Xu, Shuimin Guo and Keke Chen, ”Building Confidential and security-compliance/
Efficient Query Services in the Cloud with RASP Data Perturbation”,
IEEE Transactions on Knowledge and Data Engineering, vol. 26, no. 2, [30] MeenaS, Esther Daniel , Dr. NA. Vasanthi , “Surveyon Various Data
2014. Integrity Attacks in Cloud Environment and the Solutions”, 2013
International Conference on Circuits, Power and Computing
[19] Y. Kajiura, A. Kanai, S. Tanimoto, and H. Sato, “A filedistribution Technologies, 2013.
approach to achieve high availability and confidentiality for data storage
on multi-cloud,” in Computer Software and Applications Conference [31] Tetali, Sai Deep, et al. "MrCrypt: static analysis for secure cloud
Workshops (COMPSACW) 2013 IEEE 37th Annual. IEEE, 2013, pp. computations." ACM Sigplan Notices 48.10 (2013): 271-286.
212–217. [32] Stephen, Julian James, Savvas Savvides, Russell Seidel, and Patrick
Eugster. "Practical Confidentiality Preserving Big Data Analysis." In
[20] A. Shamir, "How to share a secret",Communications of the ACM, HotCloud. 2014.
22(11), 1979, pp.612-613.
[21] M. G. Jaatun, A. A. Nyre, S. Alapnes, and G. Zhao, “Afarewell to trust:
An approach to confidentiality control in the cloud,” in Wireless