cloudedup - secure de-duplication with encrypted data for cloud storage

19
CLOUDEDUP: SECURE DEDUPLICATION WITH ENCRYPTED DATA FOR CLOUD STORAGE sagar UDAY KUMAR keerthi kumar KEMPAIAH HONNAPPA Date(month/year): 06/2014 Organizations: Eurecom and SecludIT Mr. Pasquale Puzio Ph.D., student SecludIT and EURECOM Mr. Sergio Loureiro Ph.D., CEO and Co-Founder, SecludIT Prof. Refik Molva Ph.D., Head of Department, Communications & Computer Security, Prof. Melek Önen Ph.D., Research Engineer, Communications & Computer Security, Supervisors: 1

Upload: sagar-uday-kumar

Post on 11-Jan-2015

97 views

Category:

Technology


3 download

DESCRIPTION

This presentation is on Prototype Implementation and Evaluation for research paper titled "Secure De-duplication with encrypted data for cloud storage" by Eurecom and SecludIT. http://www.eurecom.fr/en/publication/4110/detail/cloudedup-secure-deduplication-with-encrypted-data-for-cloud-storage

TRANSCRIPT

Page 1: ClouDedup - Secure De-duplication with encrypted data for cloud storage

1

CLOUDEDUP: SECURE DEDUPLICATION WITH ENCRYPTED DATA FOR CLOUD STORAGE

sagar UDAY KUMARkeerthi kumar KEMPAIAH HONNAPPA

Date(month/year): 06/2014Organizations: Eurecom and SecludIT

Mr. Pasquale PuzioPh.D., studentSecludIT and EURECOM

Mr. Sergio Loureiro Ph.D.,CEO and Co-Founder,SecludIT

Prof. Refik Molva Ph.D.,Head of Department,Communications & Computer Security, EURECOM

Prof. Melek Önen Ph.D.,Research Engineer,Communications & Computer Security, EURECOM

Supervisors:

Page 2: ClouDedup - Secure De-duplication with encrypted data for cloud storage

2

Deduplication

Page 3: ClouDedup - Secure De-duplication with encrypted data for cloud storage

3

Encryption

CIPHER TEXT

1

CIPHER TEXT

2

Page 4: ClouDedup - Secure De-duplication with encrypted data for cloud storage

4

Convergent Encryption

CIPHER TEXT

CIPHER TEXT

Hash(Plain Text)

Hash(Plain Text)

Page 5: ClouDedup - Secure De-duplication with encrypted data for cloud storage

5

Drawback & Solution

Suffer from weakness: Confirmation Of A File Attack Learn-The-Remaining-Information Attack

Solution ClouDedup - by Eurecom & SecludIT: Cross user – Block Level Deduplication Additional Encryption by Server

Symmetric (AES 256) & key known only by server MetaDataManager

management of keys Deduplication

Page 6: ClouDedup - Secure De-duplication with encrypted data for cloud storage

6

High level view of ClouDedup

Page 7: ClouDedup - Secure De-duplication with encrypted data for cloud storage

7

Detailed Architecture of ClouDedup

Page 8: ClouDedup - Secure De-duplication with encrypted data for cloud storage

A B C D E

B

(B)H(B|(H(A)) ((H(B)))Store first key locally =H(A)

Signature of Block Encrypted Block Encrypted key

Client

((B))(H(B|(H(A))) (((H(B))))

User Id

File Id

Gateway

k

kg

MetadataManager (MM)

F:FileId {user: userId, name : File1}

FB:FileId [BlockId(A), BlockId(B), BlockId(C)..]

B:BlockId(B) {Storage container, count: 1}

L:FileId: BlockId(A): BlockId(B):

{(((H(B))))}

S:FileId:BlockId(B) [(H(B|(H(A)))]

((B))

= private key of = H(B)

Upload Phase - Instance

Page 9: ClouDedup - Secure De-duplication with encrypted data for cloud storage

9 ClientGateway

MM

Cloud Storage Provider

Request (fileId,UserId) forward

request (fileId,UserId)

User Authorization and Download requests for{Block1Id,Block2Id....}Return Data Blocks {Block1,Block2....}

{Block1,Block2....}, signatures, keys

After Signature verification -Decrypted ({Block1,Block2....}, signatures, keys)

Download Request

Decryption, Re-Build file

Download Phase - Instance

Page 10: ClouDedup - Secure De-duplication with encrypted data for cloud storage

10

Performance Evaluation - Setup

Client and GW @ VM – Eurecom

S3server and MM @ VM – Amazon EC2

Upload/Download/Delete – Data sets

Same experiment is repeated for 10 times

Save Log files

Page 11: ClouDedup - Secure De-duplication with encrypted data for cloud storage

11

ClouDedup: Time consumption at Client

uplo

ad -

split

uplo

ad -

Encr

yptio

n

uplo

ad -

Comm

unicat

ion

Downl

oad

- Com

mun

icat

ion

Downl

oad

- Dec

rypt

ion

Downl

oad

- Re

Build

File

Delet

e - C

omm

unicat

ion

0.297751.836974

63.9095 68.5815

1.395450.21357

32.47381

Activitywise Time consumption in seconds (15 MB file)

Total time : upload(66.044), download(70.19), delete (32.473)

Page 12: ClouDedup - Secure De-duplication with encrypted data for cloud storage

12

Performance of ClouDedup with Other Service providers – Upload

Page 13: ClouDedup - Secure De-duplication with encrypted data for cloud storage

13

Bottleneck

Detailed analysis revealed us the delay was mainly at two areas.

At MetaDataManager (MM) – (upload -33.3501 seconds for 15 MB File)

- MM has to upload/download/delete blocks to/from the Cloud.

At Proxy

- Delay because of the data transfer time.

- Client to Proxy – (upload -13.2349 seconds for 15 MB File)

- Proxy to MM – (upload - 16.8265 seconds for 15 MB File)

- Transfer of larger HTTPS requests.

- GW and MM process request when entire request body is received

Page 14: ClouDedup - Secure De-duplication with encrypted data for cloud storage

14

Potential Solution : Data Chunking

Page 15: ClouDedup - Secure De-duplication with encrypted data for cloud storage

15

Cross platform Application skeleton

Page 16: ClouDedup - Secure De-duplication with encrypted data for cloud storage

16

ClouDedup windows shell Extension

Page 17: ClouDedup - Secure De-duplication with encrypted data for cloud storage

17

ClouDedup FileSystem Watcher

Page 18: ClouDedup - Secure De-duplication with encrypted data for cloud storage

18

Conclusion

Implementation : ClouDedup prototype from scratch

Performance Evaluation of ClouDedup Comparison of ClouDedup Performance

with other service providers Bottleneck analysis - delay in proxy & MM

by waiting for the entire file to be received GUI skeleton for user ease ClouDedup Windows Shell Extension

Page 19: ClouDedup - Secure De-duplication with encrypted data for cloud storage

19

Thank you