SlideShare a Scribd company logo
1 of 22
Securing Cloud
Elastic Key Management and
Homomorphic Encryption
Frankfurt:
The world largest internet node
Alexander W. Koehler
Dipl.Math. CISSP, CCSK
Elastic Key Management and
Homomorphic Encryption
• Agenda
– Scope and Expectations
– Specifications and Specifics
– Status
– Scope of Requirements
– Homomorphic Encryption
– How it works
– What it means to Go4Cloud
– Implementation Details
– Alternative Approaches
– Take Aways
– Credit Goes to
• Q & A
?
Scope and Expectations
– Controls
• „On-Premise“ controls are not suitable for „Cloud“
• Controls designed for Cloud outperform „On Premise“
– Elastic Key Management and Homomorphic
Encryption (EKM&HE) is the key enabling
technology for Cloud
• EKM&HE enables customers to Go4Cloud: TRUST!
– EKM&HE is a breakthrough in technology as well
as operational service
Specifications and Specifics
• Players:
– Customer CUS
– Cloud Service Provider CSP
– Security Services Provider SSP
– Authorities GOV
• Public Cloud (AWS)
• Data processing in the Cloud
• Elasticity
• Multi-Tenant
• C I A:
– A -> CSP
– I -> CSP and CUS
– C -> CUS
Cloud
CUS
SSP
GOV
CSP
Status
• Inhibitors of „Go4Cloud“:
– No. 1: Data Protection and
Compliance: 60%->75%
– No. 2: Information Security
49% -> 67%
• Source: Study PricewaterhouseCoopers, 03/2013:
„Cloud Computing – Evolution in the Cloud“
• Conclusion: Current cloud offers as well as
technologies are not yet there to create the main
prerequisite for Go4Cloud: Trust
Scope of Requirements
• CUS shall have unique control: Trust
• Highest level of data entities protection
– Encryption
• Keys
–Key Management
»Key protection
• Elasticity applicable to all components
Auguste Kerckhoffs, Nuth, Netherlands, 1835 – 1903
Homomorphic Encryption
• Definition:
Homomorphic Encryption is a form of encryption
which allow specific types of computations to be
carried out on ciphertext and generate an encrypted
result which, when decrypted, matches the result of
operations on the plaintext.
• Fully Homomorphic
• Partially Homomorphic
Encr (a) + Encr (b) = Encr (a+b)
Decr(Encr(a+b)) = a + b
Encr(a) * Encr(b) = Encr (a*b)
Decr(Encr(a*b)) = a*b
Homomorphic Encryption
• Data processing is done on ciphertext
– Data processing in the Cloud
• without presence of keys in plain in the Cloud
• Data stays under the control of the CUS
Homomorphic Encryption
• Homomorphic data encryption downside
– Requirements for processing power cannot be
fulfilled with currently available algorithms
• Bruce Schneier: “Performing a web
search with encrypted keywords – a
perfectly reasonable and simple
application of this algorithm – would
increase the amount of computing
time by about a trillion.”
Homomorphic Encryption
• Performance impact:
– Encryption
• of data
• of keys
• of Master Key
Performance Impact
High
Low
• Implementation: Homomorphic encryption of the
Master Key
• Master Key in the Cloud is encrypted
• At rest
• During operation
How it works - 1
Data Transfer
Unprotected:Protected: Encryption Key
• An application has done data processing and will
store the resulting data:
• A Virtual Appliance (PVA) is hooked between App
and Storage: every data block goes through the PVA
How it works - 2
Protected: Encryption Key
• The encryption key is split in 2 key halfs
• Master Key: per application or per project
• 2nd key half: generated for every data storage object
How it works - 3
• There are keys in the CUS Cloud environment
• Auguste Kerkhoffs‘ principle
• All keys are stored encryptedly
• Master Keys stay encrypted, incl. during processing
• 2nd key halfs are randomly generated keys per data
object
How it works - 4
• Homomorphic Split Key Encryption allows the
described proceeding
What it means to Go4Cloud
• Trust and Compliance
– Master Keys are under full control of the CUS
• Unlimited benefits of Cloud
– CUS is not obliged to build his own key
management infrastructure
– CUS is not obliged to acquire key management
appliances in data centers and manage them
– Neither impact on performance nor provisioning
• Deployable in minutes
What it means to Go4Cloud
• Resiliance
– Worst case: Breach into CUS VE
• Exposure of only the one data object in processing at a
certain moment of time
– The breach of a single object cannot lead to a
breach of the entire system
– This is a level of protection that even on-premise
encryption solutions cannot offer
• Technology breakthrough
Implementation Details
• Encryption of data
– AES 256-bit, CBC
– Encrypted Salt-Sector Initialization
Vector (ESSIV)
• Encryption of keys
– Homomorphic Key Management (HKM)
protocol : ElGamal k= 2048, SSL
Cloud
PVA
PVKM
SSP
CUS
AWS
CSP
• Porticor Virtual Key Management (PVKM)
service - Security Services Provider
• Porticor Virtual Appliance (PVA) – in CUS environment
• Invented, patented and software developed by Porticor Ltd., Hod
Hasharon, Israel and Campbell, USA
– Porticor® Virtual Private Data™ System
– www.porticor.com
Alternative Approaches
• Key management on-premise (PKI,…) or
Tokenizaton
– Requires additional infrastructures on-premise
• Key management in the Cloud
– Software only
• Low level of protection, no real benefit
– HSMs, provisioned by CUS
• No protection of data in processing
• Requires acquition of hardware in data center
– HSM as a service, provisioned by CSP
• No protection of data in processing
Take Aways
• Elastic Key Management and
Homomorphic Encryption (EKM&HE)
– The key prerequisite technology to
Go4Cloud: Trust
– Will unlock resistance of CUS to
Go4Cloud: Trust
– Does not cut into Cloud inherent
benefits
– Does not expose keys in plain during
processing
– Migrates Kerckhoff‘s principle in the
new world of Cloud
Perception
Scope
Scientific &
Design
Credit Goes to
• Gilad Parann-Nissany, Founder,
CEO
• Ariel Dan, Co-Founder, EVP
Sales and Marketing
• Prof. Reimer, ISSE, Teletrust
• Prof. Pohlmann, ISSE, Teletrust
Thanks for Your Attention
Alexander W. Koehler
Contact:
Website: www.ict5.com
Blog: www.ict5.de/aktuell
Email: awkoehler@ict5.com
Phone: +49 (69) 6607 6603
Scope of ICT Group
• Infosec infrastructures (Global 500)
• Trusted Computing – lead architects from piloting to
implementation (enterprise, public, military)
• Ultimate and highly cost effective infosec for endpoints and cloud
access (VSC)
• Information Rights Management
• Infosec for BYOApp, BYOD, Cloud and endpoints
• Certified infosec consulting on governance, cloud and cyber
• Cloud services (Box.com, Amazon Web Services Security Group
founding member)
• ICT Economic Impact Ltd., ICT Verwaltungsgesellschaft GmbH,
Go4Cloud Ltd. , www.ict5.eu

More Related Content

What's hot

Improving security for data migration in cloud computing using randomized enc...
Improving security for data migration in cloud computing using randomized enc...Improving security for data migration in cloud computing using randomized enc...
Improving security for data migration in cloud computing using randomized enc...IOSR Journals
 
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...IRJET Journal
 
Search on encrypted data
Search on encrypted dataSearch on encrypted data
Search on encrypted dataSELASI OCANSEY
 
Cloud computing and a new approach in data encryption technique
Cloud computing and a new approach in data encryption techniqueCloud computing and a new approach in data encryption technique
Cloud computing and a new approach in data encryption techniqueMahmuda Rahman
 
AN EFFICIENT FILE HIERARCHY ATTRIBUTE-BASED ENCRYPTION SCHEME IN CLOUD COMPUT...
AN EFFICIENT FILE HIERARCHY ATTRIBUTE-BASED ENCRYPTION SCHEME IN CLOUD COMPUT...AN EFFICIENT FILE HIERARCHY ATTRIBUTE-BASED ENCRYPTION SCHEME IN CLOUD COMPUT...
AN EFFICIENT FILE HIERARCHY ATTRIBUTE-BASED ENCRYPTION SCHEME IN CLOUD COMPUT...Nexgen Technology
 
Secry poster
Secry posterSecry poster
Secry posterALIN BABU
 
Improving Data Storage Security in Cloud using Hadoop
Improving Data Storage Security in Cloud using HadoopImproving Data Storage Security in Cloud using Hadoop
Improving Data Storage Security in Cloud using HadoopIJERA Editor
 
Secure cloud storage
Secure cloud storageSecure cloud storage
Secure cloud storageALIN BABU
 
An efficient file hierarchy attribute based encryption scheme in cloud computing
An efficient file hierarchy attribute based encryption scheme in cloud computingAn efficient file hierarchy attribute based encryption scheme in cloud computing
An efficient file hierarchy attribute based encryption scheme in cloud computingShakas Technologies
 
An efficient file hierarchy attribute based
An efficient file hierarchy attribute basedAn efficient file hierarchy attribute based
An efficient file hierarchy attribute basedcloudtechnologies42
 
SECURE AUDITING AND DEDUPLICATING DATA IN CLOUD
SECURE AUDITING AND DEDUPLICATING DATA IN CLOUDSECURE AUDITING AND DEDUPLICATING DATA IN CLOUD
SECURE AUDITING AND DEDUPLICATING DATA IN CLOUDNexgen Technology
 
Decipher openseminar (1)
Decipher openseminar (1)Decipher openseminar (1)
Decipher openseminar (1)Jae-Yun Kim
 
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...LeMeniz Infotech
 
A new hybrid text encryption approach over mobile ad hoc network
A new hybrid text encryption approach over mobile  ad hoc network A new hybrid text encryption approach over mobile  ad hoc network
A new hybrid text encryption approach over mobile ad hoc network IJECEIAES
 
Authentication on Cloud using Attribute Based Encryption
Authentication on Cloud using Attribute Based EncryptionAuthentication on Cloud using Attribute Based Encryption
Authentication on Cloud using Attribute Based EncryptionAnkit Raj
 
Audit free cloud storage via deniable attribute-based encryption
Audit free cloud storage via deniable attribute-based encryptionAudit free cloud storage via deniable attribute-based encryption
Audit free cloud storage via deniable attribute-based encryptionPvrtechnologies Nellore
 
Ieeepro techno solutions 2014 ieee java project - query services in cost ef...
Ieeepro techno solutions   2014 ieee java project - query services in cost ef...Ieeepro techno solutions   2014 ieee java project - query services in cost ef...
Ieeepro techno solutions 2014 ieee java project - query services in cost ef...hemanthbbc
 
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...IJSRD
 

What's hot (20)

Improving security for data migration in cloud computing using randomized enc...
Improving security for data migration in cloud computing using randomized enc...Improving security for data migration in cloud computing using randomized enc...
Improving security for data migration in cloud computing using randomized enc...
 
IJARCCE 20
IJARCCE 20IJARCCE 20
IJARCCE 20
 
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...
 
Search on encrypted data
Search on encrypted dataSearch on encrypted data
Search on encrypted data
 
Cloud computing and a new approach in data encryption technique
Cloud computing and a new approach in data encryption techniqueCloud computing and a new approach in data encryption technique
Cloud computing and a new approach in data encryption technique
 
AN EFFICIENT FILE HIERARCHY ATTRIBUTE-BASED ENCRYPTION SCHEME IN CLOUD COMPUT...
AN EFFICIENT FILE HIERARCHY ATTRIBUTE-BASED ENCRYPTION SCHEME IN CLOUD COMPUT...AN EFFICIENT FILE HIERARCHY ATTRIBUTE-BASED ENCRYPTION SCHEME IN CLOUD COMPUT...
AN EFFICIENT FILE HIERARCHY ATTRIBUTE-BASED ENCRYPTION SCHEME IN CLOUD COMPUT...
 
Secry poster
Secry posterSecry poster
Secry poster
 
Improving Data Storage Security in Cloud using Hadoop
Improving Data Storage Security in Cloud using HadoopImproving Data Storage Security in Cloud using Hadoop
Improving Data Storage Security in Cloud using Hadoop
 
Secure cloud storage
Secure cloud storageSecure cloud storage
Secure cloud storage
 
An efficient file hierarchy attribute based encryption scheme in cloud computing
An efficient file hierarchy attribute based encryption scheme in cloud computingAn efficient file hierarchy attribute based encryption scheme in cloud computing
An efficient file hierarchy attribute based encryption scheme in cloud computing
 
An efficient file hierarchy attribute based
An efficient file hierarchy attribute basedAn efficient file hierarchy attribute based
An efficient file hierarchy attribute based
 
Ijariie1196
Ijariie1196Ijariie1196
Ijariie1196
 
SECURE AUDITING AND DEDUPLICATING DATA IN CLOUD
SECURE AUDITING AND DEDUPLICATING DATA IN CLOUDSECURE AUDITING AND DEDUPLICATING DATA IN CLOUD
SECURE AUDITING AND DEDUPLICATING DATA IN CLOUD
 
Decipher openseminar (1)
Decipher openseminar (1)Decipher openseminar (1)
Decipher openseminar (1)
 
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
 
A new hybrid text encryption approach over mobile ad hoc network
A new hybrid text encryption approach over mobile  ad hoc network A new hybrid text encryption approach over mobile  ad hoc network
A new hybrid text encryption approach over mobile ad hoc network
 
Authentication on Cloud using Attribute Based Encryption
Authentication on Cloud using Attribute Based EncryptionAuthentication on Cloud using Attribute Based Encryption
Authentication on Cloud using Attribute Based Encryption
 
Audit free cloud storage via deniable attribute-based encryption
Audit free cloud storage via deniable attribute-based encryptionAudit free cloud storage via deniable attribute-based encryption
Audit free cloud storage via deniable attribute-based encryption
 
Ieeepro techno solutions 2014 ieee java project - query services in cost ef...
Ieeepro techno solutions   2014 ieee java project - query services in cost ef...Ieeepro techno solutions   2014 ieee java project - query services in cost ef...
Ieeepro techno solutions 2014 ieee java project - query services in cost ef...
 
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
 

Similar to Isse 2014 homomorphic encryption and porticor post event

MongoDB .local London 2019: New Encryption Capabilities in MongoDB 4.2: A Dee...
MongoDB .local London 2019: New Encryption Capabilities in MongoDB 4.2: A Dee...MongoDB .local London 2019: New Encryption Capabilities in MongoDB 4.2: A Dee...
MongoDB .local London 2019: New Encryption Capabilities in MongoDB 4.2: A Dee...MongoDB
 
How to write secure code
How to write secure codeHow to write secure code
How to write secure codeFlaskdata.io
 
Managing your secrets in a cloud environment
Managing your secrets in a cloud environmentManaging your secrets in a cloud environment
Managing your secrets in a cloud environmentTaswar Bhatti
 
How Cloud Computing will change how you and your team will run IT
How Cloud Computing will change how you and your team will run ITHow Cloud Computing will change how you and your team will run IT
How Cloud Computing will change how you and your team will run ITPeter HJ van Eijk
 
security Issues of cloud computing
security Issues of cloud computingsecurity Issues of cloud computing
security Issues of cloud computingprachupanchal
 
Cyber security workshop talk.pptx
Cyber security workshop talk.pptxCyber security workshop talk.pptx
Cyber security workshop talk.pptxkamalakantas
 
Using encryption with_aws
Using encryption with_awsUsing encryption with_aws
Using encryption with_awssaifam
 
Sullivan heartbleed-defcon22 2014
Sullivan heartbleed-defcon22 2014Sullivan heartbleed-defcon22 2014
Sullivan heartbleed-defcon22 2014Cloudflare
 
KMS at Okta - Intermediate Level
KMS at Okta - Intermediate LevelKMS at Okta - Intermediate Level
KMS at Okta - Intermediate LevelJon Todd
 
Understanding SQL Server 2016 Always Encrypted
Understanding SQL Server 2016 Always EncryptedUnderstanding SQL Server 2016 Always Encrypted
Understanding SQL Server 2016 Always EncryptedEd Leighton-Dick
 
Security research over Windows #defcon china
Security research over Windows #defcon chinaSecurity research over Windows #defcon china
Security research over Windows #defcon chinaPeter Hlavaty
 
Cloud technologies
Cloud technologiesCloud technologies
Cloud technologiesUma Rangaraj
 
DevOps Security: A New Paradigm
DevOps Security: A New ParadigmDevOps Security: A New Paradigm
DevOps Security: A New ParadigmTripwire
 
Deep Dive: AWS CloudHSM (Classic)
Deep Dive: AWS CloudHSM (Classic)Deep Dive: AWS CloudHSM (Classic)
Deep Dive: AWS CloudHSM (Classic)Amazon Web Services
 
MesosCon EU 2017 - Criteo - Operating Mesos-based Infrastructures
MesosCon EU 2017 - Criteo - Operating Mesos-based InfrastructuresMesosCon EU 2017 - Criteo - Operating Mesos-based Infrastructures
MesosCon EU 2017 - Criteo - Operating Mesos-based Infrastructurespierrecdn -
 
110307 cloud security requirements gourley
110307 cloud security requirements gourley110307 cloud security requirements gourley
110307 cloud security requirements gourleyGovCloud Network
 
A Throwaway Deck for Cloud Security Essentials 2.0 delivered at RSA 2016
A Throwaway Deck for Cloud Security Essentials 2.0 delivered at RSA 2016A Throwaway Deck for Cloud Security Essentials 2.0 delivered at RSA 2016
A Throwaway Deck for Cloud Security Essentials 2.0 delivered at RSA 2016Shannon Lietz
 

Similar to Isse 2014 homomorphic encryption and porticor post event (20)

Outsourced database
Outsourced databaseOutsourced database
Outsourced database
 
Outsourced database
Outsourced databaseOutsourced database
Outsourced database
 
MongoDB .local London 2019: New Encryption Capabilities in MongoDB 4.2: A Dee...
MongoDB .local London 2019: New Encryption Capabilities in MongoDB 4.2: A Dee...MongoDB .local London 2019: New Encryption Capabilities in MongoDB 4.2: A Dee...
MongoDB .local London 2019: New Encryption Capabilities in MongoDB 4.2: A Dee...
 
How to write secure code
How to write secure codeHow to write secure code
How to write secure code
 
Managing your secrets in a cloud environment
Managing your secrets in a cloud environmentManaging your secrets in a cloud environment
Managing your secrets in a cloud environment
 
How Cloud Computing will change how you and your team will run IT
How Cloud Computing will change how you and your team will run ITHow Cloud Computing will change how you and your team will run IT
How Cloud Computing will change how you and your team will run IT
 
security Issues of cloud computing
security Issues of cloud computingsecurity Issues of cloud computing
security Issues of cloud computing
 
Cyber security workshop talk.pptx
Cyber security workshop talk.pptxCyber security workshop talk.pptx
Cyber security workshop talk.pptx
 
Using encryption with_aws
Using encryption with_awsUsing encryption with_aws
Using encryption with_aws
 
Sullivan heartbleed-defcon22 2014
Sullivan heartbleed-defcon22 2014Sullivan heartbleed-defcon22 2014
Sullivan heartbleed-defcon22 2014
 
KMS at Okta - Intermediate Level
KMS at Okta - Intermediate LevelKMS at Okta - Intermediate Level
KMS at Okta - Intermediate Level
 
Understanding SQL Server 2016 Always Encrypted
Understanding SQL Server 2016 Always EncryptedUnderstanding SQL Server 2016 Always Encrypted
Understanding SQL Server 2016 Always Encrypted
 
Security research over Windows #defcon china
Security research over Windows #defcon chinaSecurity research over Windows #defcon china
Security research over Windows #defcon china
 
Cloud technologies
Cloud technologiesCloud technologies
Cloud technologies
 
4831586.ppt
4831586.ppt4831586.ppt
4831586.ppt
 
DevOps Security: A New Paradigm
DevOps Security: A New ParadigmDevOps Security: A New Paradigm
DevOps Security: A New Paradigm
 
Deep Dive: AWS CloudHSM (Classic)
Deep Dive: AWS CloudHSM (Classic)Deep Dive: AWS CloudHSM (Classic)
Deep Dive: AWS CloudHSM (Classic)
 
MesosCon EU 2017 - Criteo - Operating Mesos-based Infrastructures
MesosCon EU 2017 - Criteo - Operating Mesos-based InfrastructuresMesosCon EU 2017 - Criteo - Operating Mesos-based Infrastructures
MesosCon EU 2017 - Criteo - Operating Mesos-based Infrastructures
 
110307 cloud security requirements gourley
110307 cloud security requirements gourley110307 cloud security requirements gourley
110307 cloud security requirements gourley
 
A Throwaway Deck for Cloud Security Essentials 2.0 delivered at RSA 2016
A Throwaway Deck for Cloud Security Essentials 2.0 delivered at RSA 2016A Throwaway Deck for Cloud Security Essentials 2.0 delivered at RSA 2016
A Throwaway Deck for Cloud Security Essentials 2.0 delivered at RSA 2016
 

Recently uploaded

VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service PuneVIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service PuneCall girls in Ahmedabad High profile
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)Damian Radcliffe
 
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663Call Girls Mumbai
 
Russian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
Russian Call Girls Thane Swara 8617697112 Independent Escort Service ThaneRussian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
Russian Call Girls Thane Swara 8617697112 Independent Escort Service ThaneCall girls in Ahmedabad High profile
 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Roomgirls4nights
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一Fs
 
Call Girls in East Of Kailash 9711199171 Delhi Enjoy Call Girls With Our Escorts
Call Girls in East Of Kailash 9711199171 Delhi Enjoy Call Girls With Our EscortsCall Girls in East Of Kailash 9711199171 Delhi Enjoy Call Girls With Our Escorts
Call Girls in East Of Kailash 9711199171 Delhi Enjoy Call Girls With Our Escortsindian call girls near you
 
Denver Web Design brochure for public viewing
Denver Web Design brochure for public viewingDenver Web Design brochure for public viewing
Denver Web Design brochure for public viewingbigorange77
 
Gram Darshan PPT cyber rural in villages of india
Gram Darshan PPT cyber rural  in villages of indiaGram Darshan PPT cyber rural  in villages of india
Gram Darshan PPT cyber rural in villages of indiaimessage0108
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girladitipandeya
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts servicevipmodelshub1
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)Christopher H Felton
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Delhi Call girls
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsThierry TROUIN ☁
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024APNIC
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Roomishabajaj13
 

Recently uploaded (20)

VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service PuneVIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)
 
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
 
Russian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
Russian Call Girls Thane Swara 8617697112 Independent Escort Service ThaneRussian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
Russian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
 
Call Girls in East Of Kailash 9711199171 Delhi Enjoy Call Girls With Our Escorts
Call Girls in East Of Kailash 9711199171 Delhi Enjoy Call Girls With Our EscortsCall Girls in East Of Kailash 9711199171 Delhi Enjoy Call Girls With Our Escorts
Call Girls in East Of Kailash 9711199171 Delhi Enjoy Call Girls With Our Escorts
 
Denver Web Design brochure for public viewing
Denver Web Design brochure for public viewingDenver Web Design brochure for public viewing
Denver Web Design brochure for public viewing
 
Gram Darshan PPT cyber rural in villages of india
Gram Darshan PPT cyber rural  in villages of indiaGram Darshan PPT cyber rural  in villages of india
Gram Darshan PPT cyber rural in villages of india
 
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
 
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with Flows
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
 

Isse 2014 homomorphic encryption and porticor post event

  • 1. Securing Cloud Elastic Key Management and Homomorphic Encryption Frankfurt: The world largest internet node Alexander W. Koehler Dipl.Math. CISSP, CCSK
  • 2. Elastic Key Management and Homomorphic Encryption • Agenda – Scope and Expectations – Specifications and Specifics – Status – Scope of Requirements – Homomorphic Encryption – How it works – What it means to Go4Cloud – Implementation Details – Alternative Approaches – Take Aways – Credit Goes to • Q & A ?
  • 3. Scope and Expectations – Controls • „On-Premise“ controls are not suitable for „Cloud“ • Controls designed for Cloud outperform „On Premise“ – Elastic Key Management and Homomorphic Encryption (EKM&HE) is the key enabling technology for Cloud • EKM&HE enables customers to Go4Cloud: TRUST! – EKM&HE is a breakthrough in technology as well as operational service
  • 4. Specifications and Specifics • Players: – Customer CUS – Cloud Service Provider CSP – Security Services Provider SSP – Authorities GOV • Public Cloud (AWS) • Data processing in the Cloud • Elasticity • Multi-Tenant • C I A: – A -> CSP – I -> CSP and CUS – C -> CUS Cloud CUS SSP GOV CSP
  • 5. Status • Inhibitors of „Go4Cloud“: – No. 1: Data Protection and Compliance: 60%->75% – No. 2: Information Security 49% -> 67% • Source: Study PricewaterhouseCoopers, 03/2013: „Cloud Computing – Evolution in the Cloud“ • Conclusion: Current cloud offers as well as technologies are not yet there to create the main prerequisite for Go4Cloud: Trust
  • 6. Scope of Requirements • CUS shall have unique control: Trust • Highest level of data entities protection – Encryption • Keys –Key Management »Key protection • Elasticity applicable to all components Auguste Kerckhoffs, Nuth, Netherlands, 1835 – 1903
  • 7. Homomorphic Encryption • Definition: Homomorphic Encryption is a form of encryption which allow specific types of computations to be carried out on ciphertext and generate an encrypted result which, when decrypted, matches the result of operations on the plaintext. • Fully Homomorphic • Partially Homomorphic Encr (a) + Encr (b) = Encr (a+b) Decr(Encr(a+b)) = a + b Encr(a) * Encr(b) = Encr (a*b) Decr(Encr(a*b)) = a*b
  • 8. Homomorphic Encryption • Data processing is done on ciphertext – Data processing in the Cloud • without presence of keys in plain in the Cloud • Data stays under the control of the CUS
  • 9. Homomorphic Encryption • Homomorphic data encryption downside – Requirements for processing power cannot be fulfilled with currently available algorithms • Bruce Schneier: “Performing a web search with encrypted keywords – a perfectly reasonable and simple application of this algorithm – would increase the amount of computing time by about a trillion.”
  • 10. Homomorphic Encryption • Performance impact: – Encryption • of data • of keys • of Master Key Performance Impact High Low • Implementation: Homomorphic encryption of the Master Key • Master Key in the Cloud is encrypted • At rest • During operation
  • 11. How it works - 1 Data Transfer Unprotected:Protected: Encryption Key • An application has done data processing and will store the resulting data: • A Virtual Appliance (PVA) is hooked between App and Storage: every data block goes through the PVA
  • 12. How it works - 2 Protected: Encryption Key • The encryption key is split in 2 key halfs • Master Key: per application or per project • 2nd key half: generated for every data storage object
  • 13. How it works - 3 • There are keys in the CUS Cloud environment • Auguste Kerkhoffs‘ principle • All keys are stored encryptedly • Master Keys stay encrypted, incl. during processing • 2nd key halfs are randomly generated keys per data object
  • 14. How it works - 4 • Homomorphic Split Key Encryption allows the described proceeding
  • 15. What it means to Go4Cloud • Trust and Compliance – Master Keys are under full control of the CUS • Unlimited benefits of Cloud – CUS is not obliged to build his own key management infrastructure – CUS is not obliged to acquire key management appliances in data centers and manage them – Neither impact on performance nor provisioning • Deployable in minutes
  • 16. What it means to Go4Cloud • Resiliance – Worst case: Breach into CUS VE • Exposure of only the one data object in processing at a certain moment of time – The breach of a single object cannot lead to a breach of the entire system – This is a level of protection that even on-premise encryption solutions cannot offer • Technology breakthrough
  • 17. Implementation Details • Encryption of data – AES 256-bit, CBC – Encrypted Salt-Sector Initialization Vector (ESSIV) • Encryption of keys – Homomorphic Key Management (HKM) protocol : ElGamal k= 2048, SSL Cloud PVA PVKM SSP CUS AWS CSP • Porticor Virtual Key Management (PVKM) service - Security Services Provider • Porticor Virtual Appliance (PVA) – in CUS environment • Invented, patented and software developed by Porticor Ltd., Hod Hasharon, Israel and Campbell, USA – Porticor® Virtual Private Data™ System – www.porticor.com
  • 18. Alternative Approaches • Key management on-premise (PKI,…) or Tokenizaton – Requires additional infrastructures on-premise • Key management in the Cloud – Software only • Low level of protection, no real benefit – HSMs, provisioned by CUS • No protection of data in processing • Requires acquition of hardware in data center – HSM as a service, provisioned by CSP • No protection of data in processing
  • 19. Take Aways • Elastic Key Management and Homomorphic Encryption (EKM&HE) – The key prerequisite technology to Go4Cloud: Trust – Will unlock resistance of CUS to Go4Cloud: Trust – Does not cut into Cloud inherent benefits – Does not expose keys in plain during processing – Migrates Kerckhoff‘s principle in the new world of Cloud Perception Scope Scientific & Design
  • 20. Credit Goes to • Gilad Parann-Nissany, Founder, CEO • Ariel Dan, Co-Founder, EVP Sales and Marketing • Prof. Reimer, ISSE, Teletrust • Prof. Pohlmann, ISSE, Teletrust
  • 21. Thanks for Your Attention Alexander W. Koehler Contact: Website: www.ict5.com Blog: www.ict5.de/aktuell Email: awkoehler@ict5.com Phone: +49 (69) 6607 6603
  • 22. Scope of ICT Group • Infosec infrastructures (Global 500) • Trusted Computing – lead architects from piloting to implementation (enterprise, public, military) • Ultimate and highly cost effective infosec for endpoints and cloud access (VSC) • Information Rights Management • Infosec for BYOApp, BYOD, Cloud and endpoints • Certified infosec consulting on governance, cloud and cyber • Cloud services (Box.com, Amazon Web Services Security Group founding member) • ICT Economic Impact Ltd., ICT Verwaltungsgesellschaft GmbH, Go4Cloud Ltd. , www.ict5.eu