www.paasword.eu
A Data Privacy and Security by Design
Platform‐as‐a‐Service Framework
Dr. Panagiotis Gouvas - R&D Director - Ubitech Ltd
Dr. Yiannis Verginadis -Senior Researcher - ICCS
SecureCloud 2016 - May 24, 2016, Dublin
Agenda
Motivation
Goals
PaaSword in a Nutshell
Use Cases
Ongoing work
PaaSword28/06/2016 2
Motivation
The cloud paradigm has definitely prevailed
Most applications are delivered following the SaaS model
Many developers rely on PaaS offerings for scalability
Nearly all underlying resources (DBs, Queues etc) are outsourced
at the IaaS level
Attack vectors have increased
‘Raw data’ are the modern hacker’s holy grail
The responsibility for the protection of data has shifted to the
developer
PaaSword28/06/2016 3
Motivation
PaaSword28/06/2016 4
Motivation
PaaSword28/06/2016 5
http://www.informationisbeautiful.net/visuaPaliazSawtoirodns/worlds-biggest-data-breaches-hacks/
Goals of PaaSword Framework
To create a security-by-design framework which will allow developers
to engineer secure applications
To leverage the security and trust of data that reside on outsourced
infrastructure
To facilitate context-aware access to encrypted and (even) physically
distributed datasets stored in outsourced infrastructure
To prove the applicability, usability, effectiveness and value of our
framework in real-life Cloud infrastructures, services and applications
PaaSword28/06/2016 6
PaaSword in a Nutshell
PaaSword28/06/2016 7
PaaSword Walkthrough
PaaSword28/06/2016 8
Two types of
Annotations:
1) Encryption &
Distribution
2) Policy
Enforcement
Concept of Secure Proxy
PaaSword28/06/2016 9
Client Cloud DB
Proxy Cloud DBClient
Common (insecure) scenario Desired (secure) scenario in PaaSword
Virtual Database Architecture
PaaSword28/06/2016 10
Data Index2Index1
SQL
SQLDatabase
Proxy
(trusted)
SQL
Cloud
(untrusted)
User / Application
Data
(not encrypted)
Data (encrypted)
What’s New
PaaSword28/06/2016 11
ID Name Surname City Day of Birth
1 Paul Anderson Athens 01.01.1979
2 Howard Miller Karlsruhe 02.02.1974
3 Henry Cooper Berlin 03.03.1980
4 Henry Jones Thessaloniki 04.04.1985
ID Encrypted Data
1 Enc(Paul,Anderson,Athens,01.01.1979)
2 Enc(Howard,Miller,Karlsruhe,02.02.1974)
3 Enc(Henry,Cooper,Berlin,03.03.1980)
4 Enc(Henry,Jones,Thessaloniki,04.04.1985)
Data
Keyword-Name IDs
Enc(Paul) Enc(1)
Enc(Howard) Enc(2)
Enc(Henry) Enc(3,4)
Index1
Keyword-Surname IDs
Enc(Anderson) Enc(1)
Enc(Miller) Enc(2)
Enc(Cooper) Enc(3)
Enc(Jones) Enc(4)
Index2
Original
Keyword Encryption
• AES (deterministic)
• Support for most query types
(excl. LIKE)
Index Distribution
• Index for same data type can be stored at different
servers
Distribution based on Privacy Constraints
• Minimize exposure of sensitive information by careful distribution
What about Key Creation/Sharing
Policies?
12
Overview Of Policies
13
Policy /Characteristic Where is the TED taking
place?
TED Key Generation TED Key Usage & Sharing
Policy
Modification of target
schema
SQL support
P1 In the PaaS container Generated once during
bootstrapping (in a Tenant
Trusted Zone) and stored
in-memory by the
application
It is recovered by the
memory on demand per
each query execution
No Modification Yes
P2 In the PaaS container One key is generated per
Tenant (in a Tenant
Trusted Zone) and a pair of
user_key container_key is
generated out of this
tenant_key
It is recomposed by the
combination of a user_key
and a container_key per
each query_execution
No Modification Yes
P3 Outside the container in a
Tenant Trusted Zone
Generated once in a
Tenant Trusted Zone
E/D Key is used only in the
Tenant Trusted Zone
No Modification No
P4 In the PaaS container Generated once during
bootstrapping (in a Tenant
Trusted Zone) and stored
in-memory by the
application
It is recovered by the
memory on demand per
each query execution
Modifications required No
P5 In the PaaS container One key is generated per
Tenant (in a Tenant
Trusted Zone) and a pair of
user_key container_key is
generated out of this
tenant_key
It is recomposed by the
combination of a user_key
and a container_key per
each query_execution
Modifications required No
Comparative Analysis
14
Final Key Management Requirements
Avoid running a service at the Tenant (T) that provides the Tenant
Key (TK) to the Proxy (P). Tenant administrator is offline.
Avoid giving TK to the Cloud Application (A) or the User (U)
Ensure Access Control cannot be bypassed
One key per tenant
As simple as possible
Recoverability
PaaSword28/06/2016 15
Implemented Policy
PaaSword28/06/2016 18
TKui
User
Encrypted
with TK
Cloud DB
Application
Access
Control
…
TKa1
TKa2
TKa3
DB-Proxy
TK =
TKui 
TKai 
TKpi .
…
TKp1
TKp2
TKp3
TKui
TKai
TKui
Admin
Access
Semantic Authorization
PaaSword will deliver an XACML 3.0 compliant Auth
Engine with the ability to
harmonize the attribute creation process through the usage
of the extensible Context Model
decouple the level of granularity of attributes that are used
to define policies with the attributes that characterize
‘subjects’, ‘objects’ and the ‘environment’
to provide design-time conflict resolution for provided
policies
PaaSword28/06/2016 24
Semantic Authorization Engine
PaaSword28/06/2016 25
Use Cases
PaaSword Framework will be evaluated on 5 different Use
Cases
Secure Sensors Analytics for IoT applications
Cloud-based Multi-tenant CRM software
Encrypted Persistency included in PaaS/SaaS Services
Multi-tenant ERP Environments
Platform for Cross-border Document Exchange
PaaSword28/06/2016 26
Challenges
Functional Transparency: Developer should not implement
security policies. S/he should only use them
Comprehensive annotation framework: Proper annotations
should be created for encryption/decryption and policy access
Flexible Policy Management: Context-driven policies for
accessing the stored information
Efficient Virtualization of RDBMS: realizing the appropriate query
synthesis and aposynthesis capabilities
Flexible Key Management: mechanisms making the key usage
transparent to the cloud-based applications and services
Extensibility: the framework should be extensible even during
runtime
PaaSword28/06/2016 27
Consortium
• Industrial Partner• Scientific Partner
28PaaSword
Interested in… ?
Getting access to early results?
Shaping and expanding PaaSword?
Networking with leading companies & research
institutes?
Collaborating with us and the PaaSword Community?
Join the Cloud Security Industrial Focus Group!
Register at:
https://www.paasword.eu/register/
29PaaSword
PaaSword28/06/2016 30
Questions?
Visit us:
www.paasword.euAcknowledgements:
This project has received funding from the
European Union’s Horizon 2020 research and
innovation programme under grant
agreement No 644814.

A Data Privacy and Security by Design Platform‐as‐a‐Service Framework

  • 1.
    www.paasword.eu A Data Privacyand Security by Design Platform‐as‐a‐Service Framework Dr. Panagiotis Gouvas - R&D Director - Ubitech Ltd Dr. Yiannis Verginadis -Senior Researcher - ICCS SecureCloud 2016 - May 24, 2016, Dublin
  • 2.
    Agenda Motivation Goals PaaSword in aNutshell Use Cases Ongoing work PaaSword28/06/2016 2
  • 3.
    Motivation The cloud paradigmhas definitely prevailed Most applications are delivered following the SaaS model Many developers rely on PaaS offerings for scalability Nearly all underlying resources (DBs, Queues etc) are outsourced at the IaaS level Attack vectors have increased ‘Raw data’ are the modern hacker’s holy grail The responsibility for the protection of data has shifted to the developer PaaSword28/06/2016 3
  • 4.
  • 5.
  • 6.
    Goals of PaaSwordFramework To create a security-by-design framework which will allow developers to engineer secure applications To leverage the security and trust of data that reside on outsourced infrastructure To facilitate context-aware access to encrypted and (even) physically distributed datasets stored in outsourced infrastructure To prove the applicability, usability, effectiveness and value of our framework in real-life Cloud infrastructures, services and applications PaaSword28/06/2016 6
  • 7.
    PaaSword in aNutshell PaaSword28/06/2016 7
  • 8.
    PaaSword Walkthrough PaaSword28/06/2016 8 Twotypes of Annotations: 1) Encryption & Distribution 2) Policy Enforcement
  • 9.
    Concept of SecureProxy PaaSword28/06/2016 9 Client Cloud DB Proxy Cloud DBClient Common (insecure) scenario Desired (secure) scenario in PaaSword
  • 10.
    Virtual Database Architecture PaaSword28/06/201610 Data Index2Index1 SQL SQLDatabase Proxy (trusted) SQL Cloud (untrusted) User / Application Data (not encrypted) Data (encrypted)
  • 11.
    What’s New PaaSword28/06/2016 11 IDName Surname City Day of Birth 1 Paul Anderson Athens 01.01.1979 2 Howard Miller Karlsruhe 02.02.1974 3 Henry Cooper Berlin 03.03.1980 4 Henry Jones Thessaloniki 04.04.1985 ID Encrypted Data 1 Enc(Paul,Anderson,Athens,01.01.1979) 2 Enc(Howard,Miller,Karlsruhe,02.02.1974) 3 Enc(Henry,Cooper,Berlin,03.03.1980) 4 Enc(Henry,Jones,Thessaloniki,04.04.1985) Data Keyword-Name IDs Enc(Paul) Enc(1) Enc(Howard) Enc(2) Enc(Henry) Enc(3,4) Index1 Keyword-Surname IDs Enc(Anderson) Enc(1) Enc(Miller) Enc(2) Enc(Cooper) Enc(3) Enc(Jones) Enc(4) Index2 Original Keyword Encryption • AES (deterministic) • Support for most query types (excl. LIKE) Index Distribution • Index for same data type can be stored at different servers Distribution based on Privacy Constraints • Minimize exposure of sensitive information by careful distribution
  • 12.
    What about KeyCreation/Sharing Policies? 12
  • 13.
    Overview Of Policies 13 Policy/Characteristic Where is the TED taking place? TED Key Generation TED Key Usage & Sharing Policy Modification of target schema SQL support P1 In the PaaS container Generated once during bootstrapping (in a Tenant Trusted Zone) and stored in-memory by the application It is recovered by the memory on demand per each query execution No Modification Yes P2 In the PaaS container One key is generated per Tenant (in a Tenant Trusted Zone) and a pair of user_key container_key is generated out of this tenant_key It is recomposed by the combination of a user_key and a container_key per each query_execution No Modification Yes P3 Outside the container in a Tenant Trusted Zone Generated once in a Tenant Trusted Zone E/D Key is used only in the Tenant Trusted Zone No Modification No P4 In the PaaS container Generated once during bootstrapping (in a Tenant Trusted Zone) and stored in-memory by the application It is recovered by the memory on demand per each query execution Modifications required No P5 In the PaaS container One key is generated per Tenant (in a Tenant Trusted Zone) and a pair of user_key container_key is generated out of this tenant_key It is recomposed by the combination of a user_key and a container_key per each query_execution Modifications required No
  • 14.
  • 15.
    Final Key ManagementRequirements Avoid running a service at the Tenant (T) that provides the Tenant Key (TK) to the Proxy (P). Tenant administrator is offline. Avoid giving TK to the Cloud Application (A) or the User (U) Ensure Access Control cannot be bypassed One key per tenant As simple as possible Recoverability PaaSword28/06/2016 15
  • 16.
    Implemented Policy PaaSword28/06/2016 18 TKui User Encrypted withTK Cloud DB Application Access Control … TKa1 TKa2 TKa3 DB-Proxy TK = TKui  TKai  TKpi . … TKp1 TKp2 TKp3 TKui TKai TKui Admin Access
  • 17.
    Semantic Authorization PaaSword willdeliver an XACML 3.0 compliant Auth Engine with the ability to harmonize the attribute creation process through the usage of the extensible Context Model decouple the level of granularity of attributes that are used to define policies with the attributes that characterize ‘subjects’, ‘objects’ and the ‘environment’ to provide design-time conflict resolution for provided policies PaaSword28/06/2016 24
  • 18.
  • 19.
    Use Cases PaaSword Frameworkwill be evaluated on 5 different Use Cases Secure Sensors Analytics for IoT applications Cloud-based Multi-tenant CRM software Encrypted Persistency included in PaaS/SaaS Services Multi-tenant ERP Environments Platform for Cross-border Document Exchange PaaSword28/06/2016 26
  • 20.
    Challenges Functional Transparency: Developershould not implement security policies. S/he should only use them Comprehensive annotation framework: Proper annotations should be created for encryption/decryption and policy access Flexible Policy Management: Context-driven policies for accessing the stored information Efficient Virtualization of RDBMS: realizing the appropriate query synthesis and aposynthesis capabilities Flexible Key Management: mechanisms making the key usage transparent to the cloud-based applications and services Extensibility: the framework should be extensible even during runtime PaaSword28/06/2016 27
  • 21.
    Consortium • Industrial Partner•Scientific Partner 28PaaSword
  • 22.
    Interested in… ? Gettingaccess to early results? Shaping and expanding PaaSword? Networking with leading companies & research institutes? Collaborating with us and the PaaSword Community? Join the Cloud Security Industrial Focus Group! Register at: https://www.paasword.eu/register/ 29PaaSword
  • 23.
    PaaSword28/06/2016 30 Questions? Visit us: www.paasword.euAcknowledgements: Thisproject has received funding from the European Union’s Horizon 2020 research and innovation programme under grant agreement No 644814.