Cloud Data Protection for Masses

Post on 28-Apr-2015

355 views 2 download

description

IEEE paper

Transcript of Cloud Data Protection for Masses

CLOUD DATA PROTECTION FOR MASSES

D.Swathi09311A0566

Introduction

Cloud computing promises• lower costs• rapid scaling• easier maintenance• service availability

• Users want to maintain control of their data, but they also want to benefit from the rich services that application developers can provide using that data.

• User data protection while enabling rich computation is challenging.

Data Protection and Usability Properties

• Integrity• Privacy• Access transparency• Ease of Verification• Rich computation• Development and maintenance support

Data Protection as a Service

• In the realm of data protection ,encryption is often viewed as a kind of silver bullet.

• Two techniques

Full disk Encryption

Computing on Encrypted data

Key Principles

Definition: The data-protection-as-a-service cloud platform architecture dramatically reduces the per-application development effort required to offer data protection while still allowing rapid development and maintenance.

Principles:• Lightweight confinement of user data.• Clear audit trail for data access.• Verifiable platform-level support.

Design Space and A Sample Architecture

Contd. . .

• Secure Data Capsules as data protection units• Data Access Auditing Support• Verifiability of the Platform• Authorization for Debugging, Maintenance, and

Batch Access

Conclusion

• The cloud platform not only provides the hardware and software stack as in today’s cloud computing, but also dynamic data protection that protects users’ data while enabling rich computation over them.

• Data is protected at the platform level.

Future Challenges

• Can we standardize the technology across platforms, so switching between different providers is easy?

• How can we make migration for existing applications as easy as possible?

• How can we minimize the cost of application audits? What kind of audits are most important to build users’ confidence?

Contd. . .

• Can technologies such as Trusted Computing and code attestation be made scalable in the presence of constantly evolving software?

• How can we generalize the ideas here to other classes of applications?

Queries