Outsourcing Data Storage Without Outsourcing Trust in Cloud Computing
Total Page:16
File Type:pdf, Size:1020Kb
Outsourcing Data Storage without Outsourcing Trust in Cloud Computing by Aiiad A. Albeshri Bachelor of Science (Computer Science), KAU, Saudi Arabia – 2002 Master of Information Technology (QUT) – 2007 Thesis submitted in accordance with the regulations for Degree of Doctor of Philosophy School of Electrical Engineering and Computer Science Science and Engineering Faculty Queensland University of Technology July 2013 Keywords Cloud Computing, Cloud Security, Cloud Storage, Cloud Storage Se- curity, Geographic Assurance, Data Replication, Trust in the Cloud i ii Abstract Cloud computing has emerged as a major ICT trend and has been acknowledged as a key theme of industry by prominent ICT organisations. This new paradigm delivers a large pool of virtual and dynamically scalable resources, including com- putational power, storage, hardware platforms and applications, to users via In- ternet technologies. Examples of these benefits include increases in flexibility and budgetary savings through minimisation of hardware and software investments. It would appear that cloud customers are enthusiastic about being allowed to store their data in the cloud but at the same time they want personal satis- faction and the comfort of checking for themselves (or through a trusted third party) that their data is protected. The main theme of this thesis is to allow the users of the cloud services to outsource their data without the need to trust the cloud provider. Specifically, cloud customers will be able to verify the confiden- tiality, integrity, availability, fairness (or mutual non-repudiation), data freshness, geographic assurance and replication of their data. The thesis first addresses the security requirements for cloud storage as iden- tified from the literature. Then it aims to design secure storage architecture for data storage in the cloud. Architecture for a new approach for geographic location assurance is introduced, which combines the proof-of-storage protocol (POS) and the distance-bounding protocol. This allows the client to check where their stored data is located, without relying on the word of the cloud provider. Moreover, this iii research addresses the problem of the computational overhead at the server side when utilising typical POS schemes. A proposed architecture has been introduced to solve this issue. Finally, this research proposes a proof of data file replication scheme. This scheme allows cloud customers to verify that their stored data is replicated over multiple and diverse locations. iv To my parents, my wife Asma, my daughters Aroub & Maria. v vi Contents Keywords i Abstract iii Table of Contents vii List of Figures xiii List of Tables xv Glossary xvii Declaration xix Previously Published Material xxi 1 Introduction 1 1.1 Motivation . .5 1.2 Research Objectives . .6 1.3 Research Questions . .7 1.4 Research Outcomes . .9 1.5 Research Significance . 10 1.6 Thesis Outline . 11 vii 2 Cryptographic Background 13 2.1 Cryptographic and Coding Primitives . 14 2.1.1 Encryption . 14 2.1.2 Encoding . 15 2.1.3 Error-correcting Code . 16 2.1.4 Digital Signatures and Message Authentication Codes . 17 2.1.5 Exponentiation . 19 2.1.6 Pairing . 20 2.2 Merkle Hash Tree and Hash Chain . 21 2.3 Summary . 24 3 Background 25 3.1 Cloud Computing . 26 3.1.1 Cloud Computing vs. Grid Computing . 26 3.1.2 Advantages of Cloud Computing . 27 3.1.3 Cloud Service Models . 29 3.1.4 Cloud Deployment Models . 32 3.1.5 Cloud Computing Concerns . 35 3.2 Data Storage in The Cloud . 37 3.3 Security Requirements for Data Storage in Cloud . 39 3.3.1 Processed Data . 40 3.3.2 Stored Data . 43 3.4 Commercial Cloud Storage Providers . 47 3.4.1 Examples of Storage Providers . 48 3.4.2 Analysis of Security Requirements . 48 3.5 Proof-of-Storage (POS) Schemes . 52 3.5.1 POS for Static Data . 55 viii 3.5.2 POS for Dynamic Data . 59 3.6 Summary . 64 4 Combining Proofs of Retrievability and Fairness 67 4.1 CloudProof Overview . 68 4.2 DPOR Overview . 71 4.3 Proposed Architecture . 75 4.4 Security Analysis . 83 4.5 Discussion................................ 86 4.6 Summary . 88 5 GeoProof: Proofs of Geographic Location for Cloud Computing Environment 89 5.1 Introduction . 90 5.2 Review of Location Assurance . 92 5.2.1 Distance-bounding protocols . 92 5.2.2 Geolocation schemes . 97 5.3 Proof-of-Storage (POS) . 100 5.4 Proposed GeoProof Architecture . 101 5.4.1 Setup phase . 102 5.4.2 GeoProof protocol . 104 5.4.3 Security analysis . 106 5.4.4 Hard disk latency . 109 5.4.5 LAN latency . 111 5.4.6 Internet latency . 113 5.5 GeoProof for Dynamic Data . 114 5.6 Discussion . 115 5.7 Summary . 116 ix 6 Enhanced GeoProof: Improved Geographic Assurance for Data in the Cloud 119 6.1 Introduction . 120 6.2 GeoProof Limitations . 121 6.3 Generic Structure of POS schemes . 123 6.4 Enhanced GeoProof . 125 6.4.1 Generic Enhanced GeoProof . 125 6.4.1.1 Structure of Enhanced GeoProof . 127 6.4.1.2 Security Analysis . 128 6.4.1.3 Performance Analysis . 129 6.4.2 Concrete enhanced GeoProof . 130 6.4.2.1 Example One . 130 6.4.2.2 Example Two . 135 6.5 Summary . 138 7 Proof of Geographic Separation 141 7.1 Introduction . 142 7.2 Background and Related Work . 143 7.3 Proof of Data File Replication . 145 7.3.1 Structure of Proof of Replication . 147 7.3.2 Analysis . 149 7.3.2.1 Assumptions . 149 7.3.2.2 Protocol Security . 151 7.3.2.3 Performance Analysis . 153 7.4 Conclusion . 153 8 Conclusion and Future Directions 155 8.1 Summary of Contributions . 156 x 8.2 Future Directions . 157 8.3 Concluding Remarks . 158 A Security Controls in the Cloud 159 Appendix-A 159 A.1 Overview . 159 A.1.1 Compliance . 160 A.1.2 Data Governance . 161 A.1.3 Facility Security . 162 A.1.4 Human Resources Security . 162 A.1.5 Information Security . 163 A.1.6 Legal . 164 A.1.7 Operations Management . 165 A.1.8 Risk Management . 166 A.1.9 Release Management . 166 A.1.10 Resiliency . 167 A.1.11 Security Architecture . 168 A.2 Security Controls with Technical Enforceability . 168 A.2.1 Identity and Access Management . 169 A.2.2 Auditing and Continuous Monitoring . 171 A.2.3 Security Policies and Policy Enforcement . 172 A.2.4 Data Security and Cryptography . 175 A.2.5 Network Security . 176 A.3 Cloud Commercial Offering . 176 A.3.1 Service Type Provided . 177 A.3.2 Security Controls provided . 177 xi Bibliography 183 xii List of Figures 2.1 Basic Encryption . 14 2.2 Merkle Hash Tree . 22 2.3 Hash Chain . 23 3.1 Cloud Computing . 27 3.2 Advantages of Cloud Computing . 28 3.3 NIST Visual model of cloud computing [36] ............. 30 3.4 Public Cloud . 32 3.5 Private Cloud . 34 3.6 Community Cloud . 34 3.7 Hybrid Cloud . 35 3.8 The top concerns and challenges within cloud environment [68] . 36 3.9 Security Requirements for Data Storage . 40 3.10 Generic Overview of proof-of-storage Scheme (POS) . 53 4.1 Get Phase in CloudProof . 70 4.2 Put Phase in CloudProof . 70 4.3 Default verification in DPOR [125] . 72 4.4 Dynamic Data Modification in DPOR [125] . ..