presentation - ESORICS 2014

Report 2 Downloads 60 Views
StealthGuard: Proofs of Retrievability with Hidden Watchdogs Monir Azraoui, Kaoutar Elkhiyaoui, Refik Molva and Melek Önen ESORICS, Wrocław, Poland, September 7, 2014

Cloud Computing – Data Outsourcing §  Advantages Ø High availability Ø Multi-tenancy Ø Elasticity & Flexibility Ø Decreased Costs

§  Drawbacks Ø Loss of Control Ø Lack of Trust

Slide 2

Data Loss Examples in the Cloud 2009, the Sidekick data loss System failure Loss of contact list, messages, e-mails, photos, calendar entries

2009

2010

2011, Hotmail webmail service Service outage Loss of contact list and e-mails

2011

2012

2013

2011, Gmail Software update Loss of e-mails 2011, Amazon Web Services

2013, Data loss: 2nd Notorious Nine Top Threat in Cloud Computing

Server crash Loss of data

Slide 3

Data Retrievability in the Cloud §  Retrievability = Integrity + Availability

§  Challenges Ø Big data Ø No more physical possession of the data by the client Ø Limited resources at the client

Slide 4

Proofs of Retrievability: Related Work §  Deterministic solutions: [Deswarte et. al, Filho et. al, ..] Ø Verification of the entire data ⇒ costly

§  Probabilistic solutions: [Ateniese et. al., Juels et. al., Shacham et.al...] Ø  Homomorphic tag and random verification ⇒ Costly generation of tags Ø Randomly located sentinels ⇒ Limited number of verifications Ø Other techniques F Authenticated rank-based skip lists [Erway et al.] F Lagrangian interpolation [Krzywiecki et al.] F Polynomial commitment [Xu et al.] Slide 5

Proofs of Retrievability: StealthGuard E n c r y p t

w

Slide 6

Proofs of Retrievability: StealthGuard Watchdog Search Query (Privacy Preserving)

w1 w2 w3 w4 wn Yes/No Yes/No Yes/No Yes/No Yes/No Missing watchdog

Missing data split

Slide 7

StealthGuard: Setup phase S1

S2

Si

Sn

F= Split-level ECC

File-level permutation

Encryption

Watchdog creation and insertion

w1j w1v w2j w2v wij wiv wnj wnv

Slide 8

StealthGuard: Watchdog Search Fid, index i, nonce r ⇒ w w ⇒ PIR (X,Y)

Verifier Cloud

w

H(

1

1

,r)



Split i

1101001…

0

1

Slide 9

StealthGuard: Watchdog Search Fid, index i, nonce r ⇒ w w ⇒ PIR (X,Y)

Verifier Cloud

w PIR (X,Y)

Split i

… x

1 1 0 1

1 0 0 1

0 0 1 1

1 0 1 0

1 0 1 0

1 1 0 1

1 1 1 1

0 0 1 1

0 0 1 0

0 0 1 1

0 0 1 1

1 0 0 1

=

=

=

=

Resp 1

Resp 2

Resp j

Resp q

Slide 10

StealthGuard: Verification Cloud Resp 1

Resp 2

Resp j

Resp q

Verifier Response Unblinding

0

0

1

1

0011…

? = H(wdog, r)

True ⇒ Integrity

False ⇒ Corruption Slide 11

Security Analysis of StealthGuard §  Completeness §  Soundness

§ 

Ex: File of 4 GB of n=32768 splits, D=4552 blocks, ρ=5%, τ=60

⇒ γ = 1719 times

Slide 12

Performance Evaluation of StealthGuard § 

Scheme

Setup

Storage

Server

Verification

Comm.

Ateniese et al.

105 exp 106 mul

267 MB

103 PRP, 103 PRF 103 exp, 104 mul

104 exp 104 PRP

316 B

Juels and Kaliski

106 PRF

30 MB

N/A

104 PRP

33 MB

Shacham and Waters

107 PRF 109 mul

51 MB

104 mul

102 mul

3 KB

Xu et al.

105 mul 106 PRF

26 MB

102 exp 105 mul

104 mul 104 PRF

36 KB

StealthGuard

105 PRF 105 PRF

8 MB

105 mul

106 mul

50 MB

Slide 13

Summary and Future Work §  StealthGuard: a new POR scheme Ø Privacy-preserving watchdog search Ø Unbounded number of verifications Ø Generic security model for POR

§  Prototype and experimental validation §  Future Work: StealthGuard with dispute resolution

Slide 14

THANK YOU

References [ABC2007] Giuseppe Ateniese, Randal Burns, Reza Curtmola, Joseph Herring, Lea Kissner, Zachary Peterson, and Dawn Song. 2007. Provable data possession at untrusted stores. In Proceedings of the 14th ACM conference on Computer and communications security (CCS '07). ACM, New York, NY, USA, 598-609 [DQ2004] Yves Deswarte, Jean-Jacques Quisquater. Remote integrity checking. In Proc. of Conference on Integrity and Internal Control in Information Systems (IICIS’03), November 2003. [FB2006] Décio Luiz Gazzoni Filho and Paulo Sergio Licciardi Messeder Baretto. Demonstrating data possession and uncheatable data transfer. IACR ePrint archive, 2006. Report 2006/150 [JK2007] Ari Juels and Burton S. Kaliski, Jr.. 2007. Pors: proofs of retrievability for large files. In Proceedings of the 14th ACM conference on Computer and communications security (CCS '07). ACM, New York, NY, USA, 584-597 [SW2008] Hovav Shacham and Brent Waters. 2008. Compact Proofs of Retrievability. In Proceedings of the 14th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology (ASIACRYPT '08), Josef Pieprzyk (Ed.). Springer-Verlag, Berlin, Heidelberg, 90-107

Slide 16