A Step Toward Better Cloud Security: Searchable Encryption Posted by Abel Avram on Jan 14, 2010 http://www.infoq.com/news/2010/01/Cloud-Searchable-Encryption In a whitepaper entitled Cryptographic Cloud Storage (PDF), Seny Kamara and Kristin Lauter from the Microsoft Research Cryptography Group, propose a “virtual private storage service” offered by public clouds using new cryptographic techniques. Cloud computing has gained some traction lately and 2010 is considered to be the year of the cloud by some. While the benefits of using computing in the clouds are well known, its adoption is hindered by security concerns. Individuals may have no problem using an online storage service from a company that has a good security history track, but companies and governmental agencies are very reluctant to trust their data to the uncertainty of the public clouds. Kamara and Lauter propose a virtual private storage service which would satisfy the following requirements: confidentiality: the cloud storage provider does not learn any information about customer data integrity: any unauthorized modification of customer data by the cloud storage provider can be detected by the customer non-repudiation: any access to customer data is logged, while retaining the main benefits of a public storage service availability: customer data is accessible from any machine and at all times reliability: customer data is reliably backed up efficient retrieval: data retrieval times are comparable to a public cloud storage service data sharing: customers can share their data with trusted parties. Most of the requirements are obtained by encrypting the documents stored in the cloud, but encryption makes it very hard to search through such documents or to collaborate in real time editing. The Cryptographic Cloud Storage whitepaper proposes an architecture for a cryptographic storage service that would solve the security problems of “back-ups, archival, health record systems, secure data exchange and e-discovery”. The architecture is based on three components: Data Processor (DP) – processes data before sending it to the cloud Data Verifier (DV) – verifies data’s integrity Token Generator (TG) – generates tokens allowing the service provider to retrieve documents The consumer solution involves using a local application that has the three above mentioned components. Before uploading data to the cloud, Alice uses the data processor to encrypt and encode the documents along with their metadata (tags, time, size, etc.), then she sends them into the cloud. When she wants to download some documents, Alice uses the TG to generate a token and a decryption key. The token is sent to the storage provider to select the encrypted files to be downloaded. After that, the DV is invoked to verify the integrity of the data using a master key. The document is decrypted using the decryption key. Collaboration is done by Alice generating a new token plus a decryption key which are sent to Bob who uses them to retrieve documents from the cloud and to decrypt them. For the enterprise, the whitepaper proposes a similar approach: This solution proposes the introduction of an additional Credential Generator (CG) that generates tokens for any user involved in storing/retrieving documents into/from the cloud. The credential token establishes what rights one has over a specific document and it is used to manage access to documents. The rest of the process is similar to that for a consumer architecture. In order to prepare the data for the cloud, the data processor: begins by indexing it and encrypting it with a symmetric encryption scheme (e.g., AES) under a unique key. It then encrypts the index using a searchable encryption scheme and encrypts the unique key with an attribute-based encryption scheme under an appropriate policy. Finally, it encodes the encrypted data and index in such a way that the data verifier can later verify their integrity using a proof of storage. Microsoft Research Cryptography Group and other research organizations have developed techniques for searchable encryption but the main problem is they are unacceptably slow, tens of seconds for a single word search. More research and advances in the searchable cryptography field are necessary before this approach becomes a viable solution for a virtual private storage service. Security in the cloud - Encryption for the enterprise Published: 16:55, 06 March 12 http://www.computerworlduk.com/business-it-hub/management-briefing/3342481/security-incloud-encryption-for-enterprise/ Many experts are touting encryption technology as the solution – offering robust protection against the rising cybercrime threat, giving only authenticated users access to enterprise data, and securing data to satisfy compliance requirements. IT professionals have long since realised that traditional perimeter-based security controls are no longer adequate. What is required now is more effective, multi-layered encryption of data, both in motion and at rest. This is particularly important where enterprise data is being held in multi-tenant cloud computing environments, serving multiple businesses and users, with data being partitioned accordingly. John Kindervag, principal analyst at Forrester Research, says business and IT leaders alike are eager to adopt cloud computing to lower their IT costs, provide scale, and enable more flexibility. But cloud computing leads to unique data segregation issues, as providers adopt virtualisation technology to share their IT infrastructure across multiple user organisations. “However, many security professionals are uncomfortable with multi-tenancy — and for good reason. In a multi-tenant environment, data encryption holds the best hope of properly protecting commingled data,” says Kindervag. As well as protecting information in shared datacentre environments, encryption can also protect businesses that have a growing number of remote and mobile workers. “The advent of the extended enterprise and the ease of accessing corporate information anytime, anywhere, and on any device will create new pressures on security teams to encrypt data,” says Kindervag. Mobile devices are easy to lose or steal, he adds, but enterprise-level encryption is the best hope for securing data on these devices. Encryption options The sorts of encryption technologies that are starting to grow in popularity amongst securityconscious enterprises include endpoint encryption, full-disk and file-level encryption, database and storage encryption, and mobile device authentication. Whilst these technologies are not new, they are becoming more obviously useful as an increasing number of organisations move their IT operations into the cloud, whilst facing a growing hacker threat and more stringent compliance requirements. Reasonable levels of encryption already exist in today’s enterprises, with common technologies including email encryption, as well as endpoint encryption using firewalls, Transport Layer Security (TLS) or Secure Sockets Layer (SSL) VPNs. Many enterprises also use intrusion detection systems that have behaviour-blocking components, as these can monitor the way devices are being used to access the network, for example to detect rootkits (stealthy malware code). One example of a business that uses several types of encryption, on a daily basis, is Ashfords Solicitors. The law firm hosts cloud services for its clients, using its own datacentre hardware. Examples of these services include contract storage and management, deal room document management, and procurement tendering, all of which clients can access via their web browsers. Garry Mackay, head of commercial services at the practice, who also heads the IT team, says Ashfords has its own secure server at a third party datacentre provider (Telehouse in London), and its cloud uses SSL encryption and is HTTPS-accredited. HTTPS encrypts and decrypts web sessions, and user authentication is carried using digital certificates and alphanumeric passwords. This combination protects against eavesdropping and man-in-the-middle hacker attacks. Mackay adds, “All users have alphanumeric passwords which are changed every three months, documents are encrypted, and access to individual documents and folders is limited to authorised users only.” “Security is the biggest fear factor when it comes to the cloud,” says Mackay. His advice is to use secure access to cloud-based data, but also to encrypt individual documents, and Ashfords does this using a random number generator. However, he admits that the firm’s private cloud system complements its separate, internal IT system, which is far less open to the outside world. Only data that the clients need to access goes into the cloud, he says. Another big user of encryption is the University of Leeds, whose researchers use a file sharing service called Teamdrive, to share data and documents between different group members. The file sharing system encrypts all the relevant data on the endpoint computer before uploading it to a private cloud. Unlike Dropbox, which holds its customers’ data on servers in the public cloud (using Amazon’s cloud service), Teamdrive allows users to host the data on their own servers, says University of Leeds research fellow Dr. Anthony Beck. “The ability to use our own servers for shared cloud storage is fantastic. Essentially we have an unlimited storage capacity which we can easily share with colleagues throughout the world at any institution,” he says. Encryption on the rise Data encryption is fast growing in popularity, according to Forrester’s John Kindervag. “In the future, you will encrypt data — both in motion and at rest — by default. This data-centric approach to security is a much more effective way to keep up with determined cybercriminals. By encrypting, and thereby devaluing, your sensitive data, you can make cybercriminals bypass your networks and look for less robustly-protected targets.” He adds that security professionals have deployed a wide variety of cryptographic solutions in most modern networks, including the widespread encryption of hard drives on desktops and laptops, the encryption of emails containing sensitive information, and database encryption. Compliance requirements and privacy laws have given companies incentives to deploy more and more encryption, with database and network storage encryption on the rise “as sensitive data very often resides in enterprise databases”, Kindervag notes. In Forrester’s most recent security survey, around a third of respondents said they had adopted network storage encryption and/or database encryption. Full disk encryption (FDE) and file encryption are also popular choices. FDE encrypts the entire hard drive, whereas file-level encryption only encrypts the portion of the drive where sensitive information is stored. The adoption rates of these technologies are nearly equal; 38% of companies have chosen to implement FDE or desktop encryption, while 34% have implemented file-level encryption, says Kindervag. Hardware-based disk encryption generally has a lower performance impact on the backup server than software-based encryption, because the encryption activity is invisible to the operating system and the host computer’s CPU. It can also perform encryption after data is compressed and stored on disk or tape. “Encryption is one of the least costly risk mitigation tools available, and if aggressively deployed, will greatly reduce the number of data breaches due to lost or stolen equipment,” says Cal Braunstein, executive director of research at analyst firm Robert Frances Group. The latest innovation in full disk encryption is the self-encrypting drive (SED). This brand new hard disk technology performs the encryption in the hardware itself, securing all the data automatically, a process which is transparent to the user. “While there is still a need for encryption management software, self-encrypting drives promise improved cryptographic performance, thus eliminating one of the final barriers to adopting client encryption,” says Kindervag. According to Gartner, SEDs are ideal where significant volumes of sensitive data need to be held, because the hardware-based encryption method has little impact on the performance of the drive. In terms of security, erasing the encryption key makes all data on the disk inaccessible. But businesses choosing to use SEDs for encryption should also use third-party key management systems to ensure data can always be recovered, analysts warn. Encryption strategy In terms of developing an encryption strategy, Gartner security specialist Eric Ouellet advises businesses to “try to standardise on a single approach to encryption for the whole business, to enable consistency across the different systems in the business, which will help keep complexity to a minimum and reduce the cost of deployment and support.” But you don’t have to be a cryptographer to implement encryption. “A noteworthy inhibitor of encryption is an unfounded — and unhealthy — fear of cryptographic technologies. Too many security pros focus on the technology behind encryption, such as the encryption algorithms themselves,” says Kindervag. “There is a misconception that you need to be a mathematician or a cryptographer to properly deploy cryptographic solutions. In reality, good encryption is all about abstraction (defining groups of users, or data assets) and management.” Encryption has found its way into large parts of our technology systems and can be used by the non-technical. For example, e-mail encryption is an option for all enterprise grade e-mail systems; and today’s operating systems even come with endpoint encryption applications that will enable remote access to the client desktop or laptop. “The widespread use of SSL/TLS is a good example,” says Kindervag. “This cryptographic solution undergirds the Internet and our ecommerce systems, but the technical details are transparent to the individuals who deploy it.” “Other cryptographic solutions will evolve in a similar manner; sometime in the near future we will find that we encrypt almost all of our data and will be surprised when we find unencrypted data in our organisations,” he adds. Ultimately, good security is all about reducing the attack surface that is available to hackers and malicious users as they attempt to infiltrate the business. Encryption options such as FDE and file and database encryption can go a long way towards making the cloud more secure for doing business, and less attractive to cybercriminals. Comments - “IT professionals have long since realised that traditional perimeter-based security controls are no longer adequate.” - “All businesses and people that care about the security of their Data can easily fully protect themselves from hackers, phishers and fraudsters by signing-up for Cryptoexpress the only 100% secure and complete SaaS, HTML5, eMail, Data and GSM Voice and VOIP [SIP + IPv6] communications package with inbuilt Contacts and Calendar databases available. Cryptoexpress believes you are entitled to your privacy and confidentiality at all times and has been designed to ensure you are always fully protected by using very sophisticated one-time key encryption and which is extremely secure because Cryptoexpress does not have any recordings of it's clients passwords.”