SlideShare a Scribd company logo
SECProv: Trustworthy and Efficient Provenance
Management in the Cloud
http://secret.cis.uab.edu
Authors: Shams Zawoad, Ragib Hasan, and Kamrul Islam
Presenter: Mahmud Hossain
Department of Computer and Information Sciences
University of Alabama at Birmingham
INFOCOM 2018
SECuRE and Trustworthy computing Lab
Department of CIS, UAB
http://secret.cis.uab.edu
Outline
 Background
 A generic provenance model
 Attacks on the provenance model
 A secure provenance scheme
 Implementation
 Experimental results
 Conclusion
2
3
Cloud Computing
Cloud
Services
SaaS
PaaSIaaS
4
Cloud Forensics
Malicious Cloud
Computing
Malicious Users
Malicious Service Providers
Dishonest Cloud Providers
Contraband
Documents
Services & Apps
False
Information
 Forensic investigation finding facts
 Evidence collection and preservation
 Evidence acquisition
5
Motivation
Trustworthy provenance management can make the cloud
more accountable
Research Problem: efficiently & securely manage provenance
records when cloud provider is dishonest
 CloProv – a generic block-based model to record provenance data
 SecProv - a secure data provenance scheme based on CloProv
 Use aggregate signature
 Hash-chain
 Proof-publishing
Contribution
6
CloProv: A generic, efficient provenance model
PBo1
eo
PRo1e0
0
Provenance Chain
PRo1e0
n1
PBo2
eo
PRo2e0
0
Provenance Chain
PRo2e0
n2 …"…" SPe0%
PBo1
e1
PRo1e1
0
Provenance Chain
PRo1e1
n3
PBo2
e1
PRo2e1
0
Provenance Chain
PRo2e1
n4 SPe1%…"…"
.".".""."
Provenance Block Chain
Block chain
Provenance Block (PB)
Provenance Chain
Entity Activity
Agent State
Provenance Record (PR)
Provenance Block Chain
System Provenance (SP)
Proof of System Provenance
Entity-1 Entity-2
Time
T1
T2
7
:document Di
a prov:Entity
prov:wasAttributedTo :Ui
prov:wasGeneratedBy:documentWriteActivity
prov:value Hash(Si)
:Ui
a foaf:Person, prov:Agent;
foaf:openid ”Unique ID of Ui”;
:documentWriteActivity
a prov:Activity;
prov:startedAtTime Ti xsd:dateTime;
wasAssociatedWith :Ui
:changeInfo
a prov:Entity
prov:value EncKi (CSi)
prov:wasDerivedFrom :document Di
:sessionKey
a prov:Entity
prov:value EncP KA (Ki)
Definition of a Provenance Record in SECProv
using W3C PROV Ontology
8
Possible attacks on CloProv model
 Key Assumption: Cloud provider can be dishonest and
collude with users to tamper with the provenance data
Integrity
Confidentiality
Provenance record and provenance chain
alteration
Provenance block and block chain
alteration
Repudiation
9
Possible attacks on CloProv model
 Key Assumption: Cloud provider can be dishonest and
collude with users to tamper with the provenance data
Integrity
Confidentiality
Data leakage through change history
Unauthorized access
Inference from published proof
How can we secure the CloProv model from various attacks?
10
SECProv: A Secure Data Provenance Scheme
based on CloProv
PRe0
0 PRe0
1 PRe0
n1
. . .
Provenance Chain:
Aggregate Signature σ
Provenance Block (PBo
eo)
Current Hash-Chain Value
Hash of Previous Block
Block Identity
Set of Provenance Records
 A secure data provenance scheme
for cloud-based, multi-user, shared
data storage systems.
 Use secure provenance chain and
aggregate signature schemes
11
Provenance Chain Construction in SECProv
PRε
0
0 PRε
0
1 PRε
0
n1. . .
Provenance Chain: Aggregate Signature σ
Provenance Block (PBε
0)
Current Hash-Chain ValueHash of Previous BlockBlock ID
Set of Provenance Records
 Prepare provenance record using the definition
Confidential data are encrypted using session key, session key is
encrypted with auditor’s public key.
 Generate Hash-chain:
HCi ← Hash(Pri | HCi−1), where i ≥ 1
 Generate aggregate signature from Hash-chain values
hi ← H(HCi)  σi ← hxj  σ←σ×σi, where i≥1 (i=0, σ ← σi)
Ensures authenticity, integrity, and chain of custody of provenance records
12
System Provenance Construction in SECProv
Provenance Block 1e
Provenance Block 2e
Provenance Block ne
.
.
.
1
1
0
1
1
0
0
0
1
1
0
1
Generate system provenance of an epoch using accumulator scheme
Bloom Filter (SPe)
Proof of System Provenance (PSPe) = <SPe,Tp,SigSKC(SPe,Tp)>
Ensures integrity and chain of custody of Provenance Blocks
13
Integrity Verification in SECProv
Block Verification
Provenance Block Chain
Verification
Provenance Record Chain
Verification
VerifyProof(PSPe,PKC)
//check the signature of
the published proof
IntegrityBloom (PBi,SPe)
//check the membership
of each block in the
published proof
14
Integrity Verification in SECProv
Block Verification
Provenance Block Chain
Verification
Provenance Record Chain
Verification
VerifyBlockChain (List of
provenance blocks, PKC )
//for each block run the
VerifyProof and
IntegrityBloom procedures
//BC value of each block
must equal to the hash of
its previous block.
15
Integrity Verification in SECProv
Block Verification
Provenance Block Chain
Verification
Provenance Record Chain
Verification
VerifyProvChain
(ProvenanceBlock, HPBprev,
σ, g2 ):
//verify the provenance
chain (aggregate
signature) of the block
Sj = {h0, . . . hn}, hi are
the provenance record,
where Uj is the actor.
hi ← H(HCi)
nuj = |Sj|
M = |U|
Vj is the public key of
user Uj.
16
 Provenance records
 Alteration
 Insertion
 Deletion
 Reordering
 Provenance block deletion, reordering
 Provenance switching
 Repudiation
 Privacy violation
SECProv Protects
Outline
 Background
 A generic provenance model
 Attacks on the provenance model
 A secure provenance scheme
 Implementation
 Experimental results
 Conclusion
17
18
SECProv Integration with OpenStack Swift
Provenance Gateway
System Provenance
Manager
Swift Storage
Provenance
Handler
Provenance
Database
SMThread
APIRequestHandler
Forward PUT/DELETE Request
SMThread
Message Queue
Epoch
Epoch
Blocks
19
Client
OpenStack
Swift
PrepProvRecord
Provenance
Gateway
Setup phase [keys]
PUT
GET
PRi, HCi-1
GenHashChain
Sign
HCi, σi
AppendtoProvChain
PUT
SECProv Workflow
20
SECProv+Swift on Amazon Cloud
Provenance
Database
API
Request
Handler
m4.large
52.90.251.154
System
Provenance
Manager
m1.medium
52.90.237.238
Swift
Storage
Amazon SQS
Message
Queue
Provenance
Handler
Performance Comparison with State-of-the-art
21
0 10000 20000 30000 40000 50000
File Size (KB)
0
5
10
15
20
25
30
35
%Overhead
Epoch 1 min
Epoch 2 min
Epoch 4 min
SProv
SECProv ~2%
Sprov[1] 5.7%
Overhead for uploading new files
100 500 1000 2000
No of Operations
0
20
40
60
80
100
120
RatioofStorageOverheadSProv/SECProv
Epoch 1 min
Epoch 2 min
Epoch 4 min
Storage overhead ratio
SECProv 10-110 Times
storage efficient
[1] Ragib Hasan, Radu Sion, Marianne Winslett, The Case of the Fake Picasso: Preventing
History Forgery with Secure Provenance, USENIX FAST, 2009
Conclusion
22
 A novel provenance model – CloProv to capture the
provenance of various entities in clouds.
 Threat model on CloProv considering the CSPs as malicious
and collusion between CSPs and malicious users.
 A novel secure data provenance scheme for cloud – SECProv
 Demonstrate the practical implementation and efficiency of
the proposed solution on OpenStack Swift storage.
23
Thank You
SECuRE and Trustworthy computing Lab
Department of CIS, UAB
http://secret.cis.uab.edu
Contact: ragib@uab.edu & szawoad42@gmail.com
secret.cis.uab.edu

More Related Content

Similar to Secprov: Trustworthy and Efficient Provenance Management in the Cloud

Data persistency (draco, cygnus, sth comet, quantum leap)
Data persistency (draco, cygnus, sth comet, quantum leap)Data persistency (draco, cygnus, sth comet, quantum leap)
Data persistency (draco, cygnus, sth comet, quantum leap)
Fernando Lopez Aguilar
 
G04433953
G04433953G04433953
G04433953
IOSR-JEN
 
Securing TodoMVC Using the Web Cryptography API
Securing TodoMVC Using the Web Cryptography APISecuring TodoMVC Using the Web Cryptography API
Securing TodoMVC Using the Web Cryptography API
Kevin Hakanson
 
Pentesting web applications
Pentesting web applicationsPentesting web applications
Pentesting web applications
Satish b
 
OpenStack APIs: Present and Future (Beta Talk)
OpenStack APIs: Present and Future (Beta Talk)OpenStack APIs: Present and Future (Beta Talk)
OpenStack APIs: Present and Future (Beta Talk)
Wade Minter
 
M phil-computer-science-cryptography-projects
M phil-computer-science-cryptography-projectsM phil-computer-science-cryptography-projects
M phil-computer-science-cryptography-projects
Vijay Karan
 
M phil-computer-science-secure-computing-projects
M phil-computer-science-secure-computing-projectsM phil-computer-science-secure-computing-projects
M phil-computer-science-secure-computing-projects
Vijay Karan
 
M phil-computer-science-secure-computing-projects
M phil-computer-science-secure-computing-projectsM phil-computer-science-secure-computing-projects
M phil-computer-science-secure-computing-projects
Vijay Karan
 
M phil-computer-science-secure-computing-projects
M phil-computer-science-secure-computing-projectsM phil-computer-science-secure-computing-projects
M phil-computer-science-secure-computing-projects
Vijay Karan
 
M.Phil Computer Science Secure Computing Projects
M.Phil Computer Science Secure Computing ProjectsM.Phil Computer Science Secure Computing Projects
M.Phil Computer Science Secure Computing Projects
Vijay Karan
 
A Decentralised Platform for Provenance Management of Machine Learning Softwa...
A Decentralised Platform for Provenance Management of Machine Learning Softwa...A Decentralised Platform for Provenance Management of Machine Learning Softwa...
A Decentralised Platform for Provenance Management of Machine Learning Softwa...
CREST
 
Final Phase 1.pptxgcjxdzgredhdjyrsjrxhthtxht
Final Phase 1.pptxgcjxdzgredhdjyrsjrxhthtxhtFinal Phase 1.pptxgcjxdzgredhdjyrsjrxhthtxht
Final Phase 1.pptxgcjxdzgredhdjyrsjrxhthtxht
Anup464706
 
M.E Computer Science Secure Computing Projects
M.E Computer Science Secure Computing ProjectsM.E Computer Science Secure Computing Projects
M.E Computer Science Secure Computing Projects
Vijay Karan
 
Secure Mashups
Secure MashupsSecure Mashups
Secure Mashups
kriszyp
 
An Overview of Bionimbus (March 2010)
An Overview of Bionimbus (March 2010)An Overview of Bionimbus (March 2010)
An Overview of Bionimbus (March 2010)
Robert Grossman
 
Demonstration of FASTEN Dependency Management tools on top of Maven, FASTEN v...
Demonstration of FASTEN Dependency Management tools on top of Maven, FASTEN v...Demonstration of FASTEN Dependency Management tools on top of Maven, FASTEN v...
Demonstration of FASTEN Dependency Management tools on top of Maven, FASTEN v...
Fasten Project
 
An Image Encryption using Chaotic Based Cryptosystem
An Image Encryption using Chaotic Based CryptosystemAn Image Encryption using Chaotic Based Cryptosystem
An Image Encryption using Chaotic Based Cryptosystem
xlyle
 
Mining SQL Injection and Cross Site Scripting Vulnerabilities using Hybrid Pr...
Mining SQL Injection and Cross Site Scripting Vulnerabilities using Hybrid Pr...Mining SQL Injection and Cross Site Scripting Vulnerabilities using Hybrid Pr...
Mining SQL Injection and Cross Site Scripting Vulnerabilities using Hybrid Pr...
Lionel Briand
 
E031102034039
E031102034039E031102034039
E031102034039
theijes
 
Secured Authorized Deduplication Based Hybrid Cloud
Secured Authorized Deduplication Based Hybrid CloudSecured Authorized Deduplication Based Hybrid Cloud
Secured Authorized Deduplication Based Hybrid Cloud
theijes
 

Similar to Secprov: Trustworthy and Efficient Provenance Management in the Cloud (20)

Data persistency (draco, cygnus, sth comet, quantum leap)
Data persistency (draco, cygnus, sth comet, quantum leap)Data persistency (draco, cygnus, sth comet, quantum leap)
Data persistency (draco, cygnus, sth comet, quantum leap)
 
G04433953
G04433953G04433953
G04433953
 
Securing TodoMVC Using the Web Cryptography API
Securing TodoMVC Using the Web Cryptography APISecuring TodoMVC Using the Web Cryptography API
Securing TodoMVC Using the Web Cryptography API
 
Pentesting web applications
Pentesting web applicationsPentesting web applications
Pentesting web applications
 
OpenStack APIs: Present and Future (Beta Talk)
OpenStack APIs: Present and Future (Beta Talk)OpenStack APIs: Present and Future (Beta Talk)
OpenStack APIs: Present and Future (Beta Talk)
 
M phil-computer-science-cryptography-projects
M phil-computer-science-cryptography-projectsM phil-computer-science-cryptography-projects
M phil-computer-science-cryptography-projects
 
M phil-computer-science-secure-computing-projects
M phil-computer-science-secure-computing-projectsM phil-computer-science-secure-computing-projects
M phil-computer-science-secure-computing-projects
 
M phil-computer-science-secure-computing-projects
M phil-computer-science-secure-computing-projectsM phil-computer-science-secure-computing-projects
M phil-computer-science-secure-computing-projects
 
M phil-computer-science-secure-computing-projects
M phil-computer-science-secure-computing-projectsM phil-computer-science-secure-computing-projects
M phil-computer-science-secure-computing-projects
 
M.Phil Computer Science Secure Computing Projects
M.Phil Computer Science Secure Computing ProjectsM.Phil Computer Science Secure Computing Projects
M.Phil Computer Science Secure Computing Projects
 
A Decentralised Platform for Provenance Management of Machine Learning Softwa...
A Decentralised Platform for Provenance Management of Machine Learning Softwa...A Decentralised Platform for Provenance Management of Machine Learning Softwa...
A Decentralised Platform for Provenance Management of Machine Learning Softwa...
 
Final Phase 1.pptxgcjxdzgredhdjyrsjrxhthtxht
Final Phase 1.pptxgcjxdzgredhdjyrsjrxhthtxhtFinal Phase 1.pptxgcjxdzgredhdjyrsjrxhthtxht
Final Phase 1.pptxgcjxdzgredhdjyrsjrxhthtxht
 
M.E Computer Science Secure Computing Projects
M.E Computer Science Secure Computing ProjectsM.E Computer Science Secure Computing Projects
M.E Computer Science Secure Computing Projects
 
Secure Mashups
Secure MashupsSecure Mashups
Secure Mashups
 
An Overview of Bionimbus (March 2010)
An Overview of Bionimbus (March 2010)An Overview of Bionimbus (March 2010)
An Overview of Bionimbus (March 2010)
 
Demonstration of FASTEN Dependency Management tools on top of Maven, FASTEN v...
Demonstration of FASTEN Dependency Management tools on top of Maven, FASTEN v...Demonstration of FASTEN Dependency Management tools on top of Maven, FASTEN v...
Demonstration of FASTEN Dependency Management tools on top of Maven, FASTEN v...
 
An Image Encryption using Chaotic Based Cryptosystem
An Image Encryption using Chaotic Based CryptosystemAn Image Encryption using Chaotic Based Cryptosystem
An Image Encryption using Chaotic Based Cryptosystem
 
Mining SQL Injection and Cross Site Scripting Vulnerabilities using Hybrid Pr...
Mining SQL Injection and Cross Site Scripting Vulnerabilities using Hybrid Pr...Mining SQL Injection and Cross Site Scripting Vulnerabilities using Hybrid Pr...
Mining SQL Injection and Cross Site Scripting Vulnerabilities using Hybrid Pr...
 
E031102034039
E031102034039E031102034039
E031102034039
 
Secured Authorized Deduplication Based Hybrid Cloud
Secured Authorized Deduplication Based Hybrid CloudSecured Authorized Deduplication Based Hybrid Cloud
Secured Authorized Deduplication Based Hybrid Cloud
 

More from Mahmud Hossain

Towards a Holistic Framework for Secure, Privacy-aware, and Trustworthy Inter...
Towards a Holistic Framework for Secure, Privacy-aware, and Trustworthy Inter...Towards a Holistic Framework for Secure, Privacy-aware, and Trustworthy Inter...
Towards a Holistic Framework for Secure, Privacy-aware, and Trustworthy Inter...
Mahmud Hossain
 
CACROS: A Context-Aware Cloud Content Roaming Service
CACROS: A Context-Aware Cloud Content Roaming ServiceCACROS: A Context-Aware Cloud Content Roaming Service
CACROS: A Context-Aware Cloud Content Roaming Service
Mahmud Hossain
 
Aura: An IoT based Cloud Infrastructure for Localized Mobile Computation Outs...
Aura: An IoT based Cloud Infrastructure for Localized Mobile Computation Outs...Aura: An IoT based Cloud Infrastructure for Localized Mobile Computation Outs...
Aura: An IoT based Cloud Infrastructure for Localized Mobile Computation Outs...
Mahmud Hossain
 
Trust-IoV: A Trustworthy Forensic Investigation Framework for the Internet of...
Trust-IoV: A Trustworthy Forensic Investigation Framework for the Internet of...Trust-IoV: A Trustworthy Forensic Investigation Framework for the Internet of...
Trust-IoV: A Trustworthy Forensic Investigation Framework for the Internet of...
Mahmud Hossain
 
SecuPAN: A Security Scheme to Mitigate Fragmentation-Based Network Attacks in...
SecuPAN: A Security Scheme to Mitigate Fragmentation-Based Network Attacks in...SecuPAN: A Security Scheme to Mitigate Fragmentation-Based Network Attacks in...
SecuPAN: A Security Scheme to Mitigate Fragmentation-Based Network Attacks in...
Mahmud Hossain
 
Rosaic: A Round-wise Fair Scheduling Approach for Mobile Clouds Based on Task...
Rosaic: A Round-wise Fair Scheduling Approach for Mobile Clouds Based on Task...Rosaic: A Round-wise Fair Scheduling Approach for Mobile Clouds Based on Task...
Rosaic: A Round-wise Fair Scheduling Approach for Mobile Clouds Based on Task...
Mahmud Hossain
 
Probe-IoT: A Public Digital Ledger Based Forensic Investigation Framework for...
Probe-IoT: A Public Digital Ledger Based Forensic Investigation Framework for...Probe-IoT: A Public Digital Ledger Based Forensic Investigation Framework for...
Probe-IoT: A Public Digital Ledger Based Forensic Investigation Framework for...
Mahmud Hossain
 
Jugo: A Generic Architecture for Composite Cloud as a Service Auth
Jugo: A Generic Architecture for Composite Cloud as a Service AuthJugo: A Generic Architecture for Composite Cloud as a Service Auth
Jugo: A Generic Architecture for Composite Cloud as a Service Auth
Mahmud Hossain
 
Towards an Analysis of Security Issues, Challenges, and Open Problems in the ...
Towards an Analysis of Security Issues, Challenges, and Open Problems in the ...Towards an Analysis of Security Issues, Challenges, and Open Problems in the ...
Towards an Analysis of Security Issues, Challenges, and Open Problems in the ...
Mahmud Hossain
 
IoTbed: A Generic Architecture for Testbed as a Service for Internet of Thing...
IoTbed: A Generic Architecture for Testbed as a Service for Internet of Thing...IoTbed: A Generic Architecture for Testbed as a Service for Internet of Thing...
IoTbed: A Generic Architecture for Testbed as a Service for Internet of Thing...
Mahmud Hossain
 
HSC-IoT: A Hardware and Software Co-Verification based Authentication Scheme ...
HSC-IoT: A Hardware and Software Co-Verification based Authentication Scheme ...HSC-IoT: A Hardware and Software Co-Verification based Authentication Scheme ...
HSC-IoT: A Hardware and Software Co-Verification based Authentication Scheme ...
Mahmud Hossain
 
BooT-IoT: A Privacy-Aware Authentication Scheme for Secure Bootstrapping of I...
BooT-IoT: A Privacy-Aware Authentication Scheme for Secure Bootstrapping of I...BooT-IoT: A Privacy-Aware Authentication Scheme for Secure Bootstrapping of I...
BooT-IoT: A Privacy-Aware Authentication Scheme for Secure Bootstrapping of I...
Mahmud Hossain
 

More from Mahmud Hossain (12)

Towards a Holistic Framework for Secure, Privacy-aware, and Trustworthy Inter...
Towards a Holistic Framework for Secure, Privacy-aware, and Trustworthy Inter...Towards a Holistic Framework for Secure, Privacy-aware, and Trustworthy Inter...
Towards a Holistic Framework for Secure, Privacy-aware, and Trustworthy Inter...
 
CACROS: A Context-Aware Cloud Content Roaming Service
CACROS: A Context-Aware Cloud Content Roaming ServiceCACROS: A Context-Aware Cloud Content Roaming Service
CACROS: A Context-Aware Cloud Content Roaming Service
 
Aura: An IoT based Cloud Infrastructure for Localized Mobile Computation Outs...
Aura: An IoT based Cloud Infrastructure for Localized Mobile Computation Outs...Aura: An IoT based Cloud Infrastructure for Localized Mobile Computation Outs...
Aura: An IoT based Cloud Infrastructure for Localized Mobile Computation Outs...
 
Trust-IoV: A Trustworthy Forensic Investigation Framework for the Internet of...
Trust-IoV: A Trustworthy Forensic Investigation Framework for the Internet of...Trust-IoV: A Trustworthy Forensic Investigation Framework for the Internet of...
Trust-IoV: A Trustworthy Forensic Investigation Framework for the Internet of...
 
SecuPAN: A Security Scheme to Mitigate Fragmentation-Based Network Attacks in...
SecuPAN: A Security Scheme to Mitigate Fragmentation-Based Network Attacks in...SecuPAN: A Security Scheme to Mitigate Fragmentation-Based Network Attacks in...
SecuPAN: A Security Scheme to Mitigate Fragmentation-Based Network Attacks in...
 
Rosaic: A Round-wise Fair Scheduling Approach for Mobile Clouds Based on Task...
Rosaic: A Round-wise Fair Scheduling Approach for Mobile Clouds Based on Task...Rosaic: A Round-wise Fair Scheduling Approach for Mobile Clouds Based on Task...
Rosaic: A Round-wise Fair Scheduling Approach for Mobile Clouds Based on Task...
 
Probe-IoT: A Public Digital Ledger Based Forensic Investigation Framework for...
Probe-IoT: A Public Digital Ledger Based Forensic Investigation Framework for...Probe-IoT: A Public Digital Ledger Based Forensic Investigation Framework for...
Probe-IoT: A Public Digital Ledger Based Forensic Investigation Framework for...
 
Jugo: A Generic Architecture for Composite Cloud as a Service Auth
Jugo: A Generic Architecture for Composite Cloud as a Service AuthJugo: A Generic Architecture for Composite Cloud as a Service Auth
Jugo: A Generic Architecture for Composite Cloud as a Service Auth
 
Towards an Analysis of Security Issues, Challenges, and Open Problems in the ...
Towards an Analysis of Security Issues, Challenges, and Open Problems in the ...Towards an Analysis of Security Issues, Challenges, and Open Problems in the ...
Towards an Analysis of Security Issues, Challenges, and Open Problems in the ...
 
IoTbed: A Generic Architecture for Testbed as a Service for Internet of Thing...
IoTbed: A Generic Architecture for Testbed as a Service for Internet of Thing...IoTbed: A Generic Architecture for Testbed as a Service for Internet of Thing...
IoTbed: A Generic Architecture for Testbed as a Service for Internet of Thing...
 
HSC-IoT: A Hardware and Software Co-Verification based Authentication Scheme ...
HSC-IoT: A Hardware and Software Co-Verification based Authentication Scheme ...HSC-IoT: A Hardware and Software Co-Verification based Authentication Scheme ...
HSC-IoT: A Hardware and Software Co-Verification based Authentication Scheme ...
 
BooT-IoT: A Privacy-Aware Authentication Scheme for Secure Bootstrapping of I...
BooT-IoT: A Privacy-Aware Authentication Scheme for Secure Bootstrapping of I...BooT-IoT: A Privacy-Aware Authentication Scheme for Secure Bootstrapping of I...
BooT-IoT: A Privacy-Aware Authentication Scheme for Secure Bootstrapping of I...
 

Recently uploaded

June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
Zilliz
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdfAI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
Techgropse Pvt.Ltd.
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
Wouter Lemaire
 

Recently uploaded (20)

June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdfAI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
 

Secprov: Trustworthy and Efficient Provenance Management in the Cloud

  • 1. SECProv: Trustworthy and Efficient Provenance Management in the Cloud http://secret.cis.uab.edu Authors: Shams Zawoad, Ragib Hasan, and Kamrul Islam Presenter: Mahmud Hossain Department of Computer and Information Sciences University of Alabama at Birmingham INFOCOM 2018 SECuRE and Trustworthy computing Lab Department of CIS, UAB http://secret.cis.uab.edu
  • 2. Outline  Background  A generic provenance model  Attacks on the provenance model  A secure provenance scheme  Implementation  Experimental results  Conclusion 2
  • 4. 4 Cloud Forensics Malicious Cloud Computing Malicious Users Malicious Service Providers Dishonest Cloud Providers Contraband Documents Services & Apps False Information  Forensic investigation finding facts  Evidence collection and preservation  Evidence acquisition
  • 5. 5 Motivation Trustworthy provenance management can make the cloud more accountable Research Problem: efficiently & securely manage provenance records when cloud provider is dishonest  CloProv – a generic block-based model to record provenance data  SecProv - a secure data provenance scheme based on CloProv  Use aggregate signature  Hash-chain  Proof-publishing Contribution
  • 6. 6 CloProv: A generic, efficient provenance model PBo1 eo PRo1e0 0 Provenance Chain PRo1e0 n1 PBo2 eo PRo2e0 0 Provenance Chain PRo2e0 n2 …"…" SPe0% PBo1 e1 PRo1e1 0 Provenance Chain PRo1e1 n3 PBo2 e1 PRo2e1 0 Provenance Chain PRo2e1 n4 SPe1%…"…" .".".""." Provenance Block Chain Block chain Provenance Block (PB) Provenance Chain Entity Activity Agent State Provenance Record (PR) Provenance Block Chain System Provenance (SP) Proof of System Provenance Entity-1 Entity-2 Time T1 T2
  • 7. 7 :document Di a prov:Entity prov:wasAttributedTo :Ui prov:wasGeneratedBy:documentWriteActivity prov:value Hash(Si) :Ui a foaf:Person, prov:Agent; foaf:openid ”Unique ID of Ui”; :documentWriteActivity a prov:Activity; prov:startedAtTime Ti xsd:dateTime; wasAssociatedWith :Ui :changeInfo a prov:Entity prov:value EncKi (CSi) prov:wasDerivedFrom :document Di :sessionKey a prov:Entity prov:value EncP KA (Ki) Definition of a Provenance Record in SECProv using W3C PROV Ontology
  • 8. 8 Possible attacks on CloProv model  Key Assumption: Cloud provider can be dishonest and collude with users to tamper with the provenance data Integrity Confidentiality Provenance record and provenance chain alteration Provenance block and block chain alteration Repudiation
  • 9. 9 Possible attacks on CloProv model  Key Assumption: Cloud provider can be dishonest and collude with users to tamper with the provenance data Integrity Confidentiality Data leakage through change history Unauthorized access Inference from published proof How can we secure the CloProv model from various attacks?
  • 10. 10 SECProv: A Secure Data Provenance Scheme based on CloProv PRe0 0 PRe0 1 PRe0 n1 . . . Provenance Chain: Aggregate Signature σ Provenance Block (PBo eo) Current Hash-Chain Value Hash of Previous Block Block Identity Set of Provenance Records  A secure data provenance scheme for cloud-based, multi-user, shared data storage systems.  Use secure provenance chain and aggregate signature schemes
  • 11. 11 Provenance Chain Construction in SECProv PRε 0 0 PRε 0 1 PRε 0 n1. . . Provenance Chain: Aggregate Signature σ Provenance Block (PBε 0) Current Hash-Chain ValueHash of Previous BlockBlock ID Set of Provenance Records  Prepare provenance record using the definition Confidential data are encrypted using session key, session key is encrypted with auditor’s public key.  Generate Hash-chain: HCi ← Hash(Pri | HCi−1), where i ≥ 1  Generate aggregate signature from Hash-chain values hi ← H(HCi)  σi ← hxj  σ←σ×σi, where i≥1 (i=0, σ ← σi) Ensures authenticity, integrity, and chain of custody of provenance records
  • 12. 12 System Provenance Construction in SECProv Provenance Block 1e Provenance Block 2e Provenance Block ne . . . 1 1 0 1 1 0 0 0 1 1 0 1 Generate system provenance of an epoch using accumulator scheme Bloom Filter (SPe) Proof of System Provenance (PSPe) = <SPe,Tp,SigSKC(SPe,Tp)> Ensures integrity and chain of custody of Provenance Blocks
  • 13. 13 Integrity Verification in SECProv Block Verification Provenance Block Chain Verification Provenance Record Chain Verification VerifyProof(PSPe,PKC) //check the signature of the published proof IntegrityBloom (PBi,SPe) //check the membership of each block in the published proof
  • 14. 14 Integrity Verification in SECProv Block Verification Provenance Block Chain Verification Provenance Record Chain Verification VerifyBlockChain (List of provenance blocks, PKC ) //for each block run the VerifyProof and IntegrityBloom procedures //BC value of each block must equal to the hash of its previous block.
  • 15. 15 Integrity Verification in SECProv Block Verification Provenance Block Chain Verification Provenance Record Chain Verification VerifyProvChain (ProvenanceBlock, HPBprev, σ, g2 ): //verify the provenance chain (aggregate signature) of the block Sj = {h0, . . . hn}, hi are the provenance record, where Uj is the actor. hi ← H(HCi) nuj = |Sj| M = |U| Vj is the public key of user Uj.
  • 16. 16  Provenance records  Alteration  Insertion  Deletion  Reordering  Provenance block deletion, reordering  Provenance switching  Repudiation  Privacy violation SECProv Protects
  • 17. Outline  Background  A generic provenance model  Attacks on the provenance model  A secure provenance scheme  Implementation  Experimental results  Conclusion 17
  • 18. 18 SECProv Integration with OpenStack Swift Provenance Gateway System Provenance Manager Swift Storage Provenance Handler Provenance Database SMThread APIRequestHandler Forward PUT/DELETE Request SMThread Message Queue Epoch Epoch Blocks
  • 19. 19 Client OpenStack Swift PrepProvRecord Provenance Gateway Setup phase [keys] PUT GET PRi, HCi-1 GenHashChain Sign HCi, σi AppendtoProvChain PUT SECProv Workflow
  • 20. 20 SECProv+Swift on Amazon Cloud Provenance Database API Request Handler m4.large 52.90.251.154 System Provenance Manager m1.medium 52.90.237.238 Swift Storage Amazon SQS Message Queue Provenance Handler
  • 21. Performance Comparison with State-of-the-art 21 0 10000 20000 30000 40000 50000 File Size (KB) 0 5 10 15 20 25 30 35 %Overhead Epoch 1 min Epoch 2 min Epoch 4 min SProv SECProv ~2% Sprov[1] 5.7% Overhead for uploading new files 100 500 1000 2000 No of Operations 0 20 40 60 80 100 120 RatioofStorageOverheadSProv/SECProv Epoch 1 min Epoch 2 min Epoch 4 min Storage overhead ratio SECProv 10-110 Times storage efficient [1] Ragib Hasan, Radu Sion, Marianne Winslett, The Case of the Fake Picasso: Preventing History Forgery with Secure Provenance, USENIX FAST, 2009
  • 22. Conclusion 22  A novel provenance model – CloProv to capture the provenance of various entities in clouds.  Threat model on CloProv considering the CSPs as malicious and collusion between CSPs and malicious users.  A novel secure data provenance scheme for cloud – SECProv  Demonstrate the practical implementation and efficiency of the proposed solution on OpenStack Swift storage.
  • 23. 23 Thank You SECuRE and Trustworthy computing Lab Department of CIS, UAB http://secret.cis.uab.edu Contact: ragib@uab.edu & szawoad42@gmail.com secret.cis.uab.edu