09.01.2013 Views

SESSION SECURITY AND ALLIED TECHNOLOGIES Chair(s) TBA

SESSION SECURITY AND ALLIED TECHNOLOGIES Chair(s) TBA

SESSION SECURITY AND ALLIED TECHNOLOGIES Chair(s) TBA

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

6 Int'l Conf. Security and Management | SAM'11 |<br />

are generated based on roles instead of individual users.<br />

However the authorization decisions now have to be made<br />

at OSDs instead of at the central metadata server. OSDs<br />

also have to store the entire role-based ACL for each object,<br />

which in additional introduces the possible access policy<br />

synchronization among OSDs issue.<br />

Other than capability-based access control, OSDs do not<br />

provide data confidentiality protection at rest. Insider and<br />

intrusion attacks incur high risks for sensitive data stored in<br />

the clear on OSDs. Most of the systems use network layer<br />

protocols to protect data in transit.<br />

5. User Centric Data Protection Systems<br />

In this section we examine two types of user centric<br />

storage systems.<br />

5.1 Cryptographic Storage System<br />

Symmetric encryption is used in many systems, such as<br />

SiRiUS[24], and CRUST [12]. SiRiUS provides file-level<br />

encryption. File owners are responsible for file encryption,<br />

key distribution and access policy specification. The key distribution<br />

of SiRiUS does not scale well as a file encryption<br />

key has to be wrapped to users’ public keys. Data integrity<br />

protection is provided by using hash trees.<br />

CRUST was designed to eliminate the key distribution<br />

and scalability issues of SiRiUS. CRUST used the Leighton-<br />

Micali key pre-distribution scheme [29]. However it requires<br />

each user to share a long-term key encryption key with every<br />

other user, which results in multiple key management issues.<br />

Miller et al [34] developed a scheme for data secrecy and<br />

integrity protection on NASD. They used a similar approach<br />

to SiRiUS, but the encryption is at the data block level. An<br />

encryption key is encrypted by each legitimate user’s public<br />

key and stored in a key object associated with the file on<br />

the metadata server.<br />

Wrapping the encryption key into users’ public keys<br />

creates a user access right revocation issue. There are three<br />

possible solutions: 1) simply remove the user from the key<br />

object (which wraps the encryption key in users’ public key<br />

for encryption key distribution); however the user may still<br />

cache the encryption key and be able to read the data; 2)<br />

immediately re-encrypt the file with a new encryption key<br />

and encrypt the new key with the public keys of those users<br />

who should still have access to the file, which is slower, but<br />

will ensure that the revoked user cannot access the file; 3)<br />

apply the second solution lazily (lazy revocation); although<br />

the revoked user continues to have access to the old data,<br />

this prevents his/her access to any new data that is encrypted<br />

with a different key. Integrity protection is achieved through<br />

a non-linear check-sum of the unencrypted data which is<br />

attached to the encrypted data.<br />

Kher [27] and Storer el al. [42] provide detailed surveys<br />

of other encryption file systems such as NCryptfs, Microsoft<br />

EFS, Plutus, Cepheus, etc.<br />

Recently, Attribute Based Encryption (ABE), a type of<br />

asymmetric key encryption, has been applied to address finegrained<br />

data access control and privacy protection. Introduced<br />

by Sahai and Waters in [38], ABE extended Identity<br />

Based Encryption (IBE) to design flexible and scalable<br />

access control systems. There are two kinds of ABE: keypolicy<br />

ABE (KP-ABE) [16] and ciphertext-policy ABE (CP-<br />

ABE) [5] [7]. KP-ABE is a per-key based access control. In<br />

KP-ABE, the ciphertext is associated with a set of attributes<br />

and the secret key is associated with the access policy. The<br />

encryptor defines the set of descriptive attributes necessary to<br />

decrypt the ciphertext. The trusted authority who generates<br />

user’s secret key defines the combination of attributes for<br />

which the secret key can be used. In CP-ABE, the idea is<br />

reversed: the ciphertext is associated with the access policy<br />

and the encrypting party determines the policy under which<br />

the data can be decrypted. The secret key is now associated<br />

with a set of attributes. Therefore CP-ABE is a per-message<br />

based access control. In order to address privacy of the<br />

access control policy, anonymous ABE was introduced and<br />

further improved by [36]. User accountability and illegal key<br />

sharing are addressed in [31].<br />

Secret sharing schemes provides data secrecy protection<br />

without encrypting the data. Lakshmanan, et al. [28] proposed<br />

a distributed store that uses secret sharing to provide<br />

confidentiality at rest. Secret share replication is used to<br />

improve performance and provide availability. A dissemination<br />

protocol is used by servers to propagate new data<br />

shares among replication servers. A share renewal protocol<br />

is used to periodically generate new shares for long-term<br />

confidentiality. The recoverability of secret sharing schemes<br />

is leveraged by POTSHARDS [41] to protect data over<br />

indefinitely long period of time. Approximate pointers in<br />

conjunction with secure distributed RAID techniques are<br />

used for availability and reliability. Other storage systems<br />

such as PASIS, CleverSafe and GridSharing also use secret<br />

sharing for data protection [42].<br />

5.2 Cloud-based Storage<br />

Cloud-based storage is gaining rapid interest. The uniqueness<br />

of cloud storage over traditional or object-based storage<br />

is its ability to leverage virtualization techniques to provide a<br />

storage service composed of thousands of networked storage<br />

devices, distributed file systems, and storage middleware.<br />

This enables on-demand service, capacity, and management<br />

to users anywhere via the Internet. There are many<br />

cloud storage service providers, such as IBM, Amazon<br />

(S3), Google (GFS), Microsoft (Azure), EMC (Atmos),<br />

open source CloudStore, HDFS, etc. However the common<br />

standards for cloud service are still in development.<br />

In most existing cloud storage systems, data in transit is<br />

protected through network layer security, such as SSL/TLS.<br />

User access control is provided through authentication and<br />

access control lists. Data privacy protection is not typically

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!