cloud privacy in a
play

Cloud Privacy in a PervasivE Monitoring t Landscape pt - PowerPoint PPT Presentation

44 pt Cloud Privacy in a PervasivE Monitoring t Landscape pt JOHN MATTSSON


  1. 44 pt Cloud Privacy in a PervasivE Monitoring t Landscape pt ΆΈΉΊΌΎΏΐΑΒΓΕΖΗΘΙΚΛΜΝΞΟΠΡΣΤΥΦΧΨΪΫΆΈΉΊΰαβγ JOHN MATTSSON δεζηθικλνξορςΣΤΥΦΧΨΩΪΫΌΎΏ ЁЂЃЄЅІЇЈЉЊЋЌЎЏАБВГДЕЖЗИЙКЛМНОПРСТУФХЦЧШЩ ЪЫЬЭЮЯАБВГДЕЖЗИЙКЛМНОПРСТУФХЦЧШЩЪЫ ЬЭЮЯЁЂЃЄЅІЇЈЉЊЋЌЎЏѢѢѲѲѴѴҐҐәǽ № STEFAN HÅKANSSSON ERICSSON RESEARCH Ericsson | 2014-09-11 | Page 1

  2. INTRODUCTION 44 pt • Ongoing transformation towards third-party cloud services for storing and managing information. t • This has many benefits (cost, flexibility, ease of use). pt • Data aggregated in global data centers are natural targets for pervasive surveillance. • Also active attacks, e.g. celebrity image theft. • The market potential for enterprise and government cloud services and web applications are held back ΆΈΉΊΌΎΏΐΑΒΓΕΖΗΘΙΚΛΜΝΞΟΠΡΣΤΥΦΧΨΪΫΆΈΉΊΰαβγ by privacy and security concerns. δεζηθικλνξορςΣΤΥΦΧΨΩΪΫΌΎΏ ЁЂЃЄЅІЇЈЉЊЋЌЎЏАБВГДЕЖЗИЙКЛМНОПРСТУФХЦЧШЩ ЪЫЬЭЮЯАБВГДЕЖЗИЙКЛМНОПРСТУФХЦЧШЩЪЫ ЬЭЮЯЁЂЃЄЅІЇЈЉЊЋЌЎЏѢѢѲѲѴѴҐҐәǽ № • Problematic with servers in other countries and vendors from other countries. Ericsson | 2014-09-11 | Page 2

  3. SECURITY MODEL 44 pt • WebCrypto uses so called host-based security where the security depends on the security of the host. t • This alone is not enough in a pervasive monitoring landscape pt • Need to protect against service provider, data breaches, and government demands. • Need to shield not just encryption keys, but also plaintext data from the hosting application. • Similar thoughts have been pursued in WebRTC, Isolated Media Streams, and Encrypted Media Extensions. ΆΈΉΊΌΎΏΐΑΒΓΕΖΗΘΙΚΛΜΝΞΟΠΡΣΤΥΦΧΨΪΫΆΈΉΊΰαβγ δεζηθικλνξορςΣΤΥΦΧΨΩΪΫΌΎΏ ЁЂЃЄЅІЇЈЉЊЋЌЎЏАБВГДЕЖЗИЙКЛМНОПРСТУФХЦЧШЩ ЪЫЬЭЮЯАБВГДЕЖЗИЙКЛМНОПРСТУФХЦЧШЩЪЫ ЬЭЮЯЁЂЃЄЅІЇЈЉЊЋЌЎЏѢѢѲѲѴѴҐҐәǽ № Browser Web Server Ericsson | 2014-09-11 | Page 3

  4. EXAMPLES 44 pt Cloud storage • There is currently no easy way to use cloud storage in a way that ensures privacy. t • Needed: Secure File Input / File Download where pt cleartext is not accessible by the web application / JavaScript runtime environment. HTML forms • Data entered in forms is available to the web ΆΈΉΊΌΎΏΐΑΒΓΕΖΗΘΙΚΛΜΝΞΟΠΡΣΤΥΦΧΨΪΫΆΈΉΊΰαβγ δεζηθικλνξορςΣΤΥΦΧΨΩΪΫΌΎΏ application in cleartext. ЁЂЃЄЅІЇЈЉЊЋЌЎЏАБВГДЕЖЗИЙКЛМНОПРСТУФХЦЧШЩ ЪЫЬЭЮЯАБВГДЕЖЗИЙКЛМНОПРСТУФХЦЧШЩЪЫ ЬЭЮЯЁЂЃЄЅІЇЈЉЊЋЌЎЏѢѢѲѲѴѴҐҐәǽ № • Needed: secure forms where the data is not accessible to the application in any other form than encrypted. • Example: Google Chrome extension End-to-End. Ericsson | 2014-09-11 | Page 4

  5. SUMMARY 44 pt • Sensitive data should be protected in such a way that the service provider cannot access keys nor cleartext. t • In this way, cleartext data is only accessible by the individual or enterprise that protected it in the first place, or someone pt selectively given authorization to access the data. • Protects data against service provider, data breaches, and government demands. ΆΈΉΊΌΎΏΐΑΒΓΕΖΗΘΙΚΛΜΝΞΟΠΡΣΤΥΦΧΨΪΫΆΈΉΊΰαβγ δεζηθικλνξορςΣΤΥΦΧΨΩΪΫΌΎΏ ЁЂЃЄЅІЇЈЉЊЋЌЎЏАБВГДЕЖЗИЙКЛМНОПРСТУФХЦЧШЩ ЪЫЬЭЮЯАБВГДЕЖЗИЙКЛМНОПРСТУФХЦЧШЩЪЫ ЬЭЮЯЁЂЃЄЅІЇЈЉЊЋЌЎЏѢѢѲѲѴѴҐҐәǽ № Ericsson | 2014-09-11 | Page 5

  6. REFERENCES 44 pt The presented paper: “Cloud Service Privacy in a Pervasive W3C, “WebRTC 1.0: Real-time Communication Between Browse Monitoring Landscape” http://www.w3.org/TR/webrtc/ http://www.w3.org/2012/webcrypto/webcrypto-next-workshop/ papers/webcrypto2014_submission_9.pdf IETF, “Real-Time Communication in WEB-browser t http://tools.ietf.org/wg/rtcweb/ TRINT - A W3C/IAB workshop on Strengthening the Internet Against Pervasive Monitoring W3C, “Media Capture and Streams” pt http://www.w3.org/TR/WebCryptoAPI/ http://www.w3.org/TR/mediacapture-streams/#isolated-media-streams Barnes et al. “Pervasive Attack: A Threat Model and Problem W3C, “Encrypted Media Extensions” Statement” http://www.w3.org/TR/encrypted-media/ http://tools.ietf.org/html/draft-barnes-pervasive-problem Google, “End-To-End” Cooper, Jennings, “The Trust-to-Trust Model of Cloud Services” https://code.google.com/p/end-to-end/ https://www.w3.org/2014/strint/papers/30.pdf ΆΈΉΊΌΎΏΐΑΒΓΕΖΗΘΙΚΛΜΝΞΟΠΡΣΤΥΦΧΨΪΫΆΈΉΊΰαβγ Halpin, “The W3C Web Cryptography API: Design and Issues”, 2014 δεζηθικλνξορςΣΤΥΦΧΨΩΪΫΌΎΏ ЁЂЃЄЅІЇЈЉЊЋЌЎЏАБВГДЕЖЗИЙКЛМНОПРСТУФХЦЧШЩ Farrell, Tschofenig, IETF RFC 7258, “Pervasive Monitoring Is an ЪЫЬЭЮЯАБВГДЕЖЗИЙКЛМНОПРСТУФХЦЧШЩЪЫ http://ws-rest.org/2014/sites/default/files/wsrest2014_submission_11.pdf ЬЭЮЯЁЂЃЄЅІЇЈЉЊЋЌЎЏѢѢѲѲѴѴҐҐәǽ № Attack” https://tools.ietf.org/html/rfc7258 W3C, “Web Cryptography API” http://www.w3.org/TR/WebCryptoAPI/ Ericsson | 2014-09-11 | Page 6

  7. 44 pt t pt ΆΈΉΊΌΎΏΐΑΒΓΕΖΗΘΙΚΛΜΝΞΟΠΡΣΤΥΦΧΨΪΫΆΈΉΊΰαβγ δεζηθικλνξορςΣΤΥΦΧΨΩΪΫΌΎΏ ЁЂЃЄЅІЇЈЉЊЋЌЎЏАБВГДЕЖЗИЙКЛМНОПРСТУФХЦЧШЩ ЪЫЬЭЮЯАБВГДЕЖЗИЙКЛМНОПРСТУФХЦЧШЩЪЫ ЬЭЮЯЁЂЃЄЅІЇЈЉЊЋЌЎЏѢѢѲѲѴѴҐҐәǽ № Ericsson | 2014-09-11 | Page 7

Recommend


More recommend