interoperable cloud encryption and access control to ... · • cloud data management interface...

50
Developing Interoperable Cloud Encryption and Access Control December 20, 2016

Upload: others

Post on 27-Sep-2020

7 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Interoperable Cloud Encryption and Access Control to ... · • Cloud Data Management Interface website • CDMI Specification v1.1.1 • Whitepaper: towards a CDMI healthcare profile

Developing Interoperable Cloud Encryption and Access Control

December 20, 2016

Page 2: Interoperable Cloud Encryption and Access Control to ... · • Cloud Data Management Interface website • CDMI Specification v1.1.1 • Whitepaper: towards a CDMI healthcare profile

SNIA Legal Notice

The material contained in this presentation is copyrighted by the SNIA unless otherwise noted.

Member companies and individual members may use this material in presentations and literature under the following conditions:

Any slide or slides used must be reproduced in their entirety without modification

The SNIA must be acknowledged as the source of any material used in the body of any document containing material from these presentations.

This presentation is a project of the SNIA.

Neither the author nor the presenter is an attorney and nothing in this presentation is intended to be, or should be construed as legal advice or an opinion of counsel. If you need legal advice or a legal opinion please contact your attorney.

The information presented herein represents the author's personal opinion and current understanding of the relevant issues involved. The author, the presenter, and the SNIA do not assume any responsibility or liability for damages arising out of any reliance on or use of this information.

NO WARRANTIES, EXPRESS OR IMPLIED. USE AT YOUR OWN RISK.

2

Page 3: Interoperable Cloud Encryption and Access Control to ... · • Cloud Data Management Interface website • CDMI Specification v1.1.1 • Whitepaper: towards a CDMI healthcare profile

Today’s Presenters

3

Peter van LiesdonkPhilips

Mark CarlsonChair SNIA

Technical Council Toshiba

David SlikCo-Chair, SNIA

Cloud TWGNetApp

Page 4: Interoperable Cloud Encryption and Access Control to ... · • Cloud Data Management Interface website • CDMI Specification v1.1.1 • Whitepaper: towards a CDMI healthcare profile

Presentation Slides

4

Today’s Presentation Slides Available at:www.snia.org/interoperable_cloud

Page 5: Interoperable Cloud Encryption and Access Control to ... · • Cloud Data Management Interface website • CDMI Specification v1.1.1 • Whitepaper: towards a CDMI healthcare profile

CDMI:Interoperable Cloud Encryption and Access Control to Secure Healthcare RecordsPeter van LiesdonkPhilips ResearchNovember 1, 2016

Page 6: Interoperable Cloud Encryption and Access Control to ... · • Cloud Data Management Interface website • CDMI Specification v1.1.1 • Whitepaper: towards a CDMI healthcare profile

About Philips Research…

Philips Research6

1918Medical

X-ray tube

1919‘Ideezet’

radio tube1926

Pentode

1939Rotary heads

1963Compact Cassette

1932Sodium

street lamps

1971World's first home VCR

1976NiMH

battery

1981Compact

Disc

1966Local

oxidation

1995UHP & low

Mercury TL/CFL

2002Blu-ray

2008Lumiramic

2004Ambilight

TV

1996High

resolution MR

2003Multi-slice

CT

1992Flat detectorfor cathlabs

20063D

displays

2010Lumea

2010Fall

Detector

2011iCT Scan

2011Digital

Pathology

2010LumiMotion

2011Airfloss

2011FreeStreet

2012BlueTouchPain Relief

2012Hue

2013 AlluraClarity

Page 7: Interoperable Cloud Encryption and Access Control to ... · • Cloud Data Management Interface website • CDMI Specification v1.1.1 • Whitepaper: towards a CDMI healthcare profile

Continuum of Care

Philips Research7

Page 8: Interoperable Cloud Encryption and Access Control to ... · • Cloud Data Management Interface website • CDMI Specification v1.1.1 • Whitepaper: towards a CDMI healthcare profile

HealthSuite Digital Platform

Philips Research8

Integrated patient and consumer dataOpen APIs supporting Philips and 3rd party application development

Cloud-based HealthSuite DigitalPlatform

3rd party applications Philips applications

Multiple Philips & 3rd party devices & applications contributing to a rich data set

15PB+ imagingstudies in our

imaging informatics solutions across 1200+ hospitals

2+ million ICU stays

in our eICUsolutions

6+ million patients

supported at home

190+ million patients a year

monitored though our

patient monitors

Illustrative

Hundreds of thousands

of consumers on ActiveLink®

Page 9: Interoperable Cloud Encryption and Access Control to ... · • Cloud Data Management Interface website • CDMI Specification v1.1.1 • Whitepaper: towards a CDMI healthcare profile

Problem Statement

Philips Research9

Privacy / consent regulations

Sharing of records over

administrative borders

Keep access control with owner of data

EHR system

EHR system

Moving medical records to other countries and hospitals using cloud technologies

Store datain cloud

environments

Page 10: Interoperable Cloud Encryption and Access Control to ... · • Cloud Data Management Interface website • CDMI Specification v1.1.1 • Whitepaper: towards a CDMI healthcare profile

Basic Idea

Philips Research10

EHR system

EHR system

1. Move encrypted record to foreign hospital2. Call back to data owner for permission,

and to obtain decryption keys(comparison: Digital Rights Management)

Page 11: Interoperable Cloud Encryption and Access Control to ... · • Cloud Data Management Interface website • CDMI Specification v1.1.1 • Whitepaper: towards a CDMI healthcare profile

Goals

• Storage of data in semi-trusted cloud storage

• Interoperability of medical records; backwards compatibility

• Encryption where possible

• Centralized key management / id management

• Support for consent policies

• Auditing and access control performed by data owner

• Possibility for Break-the-glass procedures

Philips Research11

Page 12: Interoperable Cloud Encryption and Access Control to ... · • Cloud Data Management Interface website • CDMI Specification v1.1.1 • Whitepaper: towards a CDMI healthcare profile

Cloud Data Management Interface (CDMI)

Cloud object storage protocol, ISO/IEC 17826:2016Maintained by the Storage Networking Industry Association (SNIA)Part of Cloud Storage Initiative

CDMI defines RESTful HTTP operations for assessing the capabilities of the cloud storage system, allocating and accessing containers and objects, managing users and groups, implementing access control, attaching metadata, making arbitrary queries, using persistent queues, specifying retention intervals and holds for compliance purposes, using a logging facility, billing, moving data between cloud systems, and exporting data via other protocols such as iSCSI and NFS. Transport security is obtained via TLS.

Compare proprietary protocols:

• S3 (Amazon)• SWIFT (Openstack)

Page 13: Interoperable Cloud Encryption and Access Control to ... · • Cloud Data Management Interface website • CDMI Specification v1.1.1 • Whitepaper: towards a CDMI healthcare profile

Work within SNIA Cloud TWG

1. CDMI Encrypted Object Extension

Makes a cloud object storage server “encryption-aware”

- Server can do in-place encryption and decryption- Alternatively, client can do encryption and/or decryption- Key management provided by external Key Management Service- Completely transparent and compatible with regular CDMI

2. CDMI Delegated Access Control extension

Gives control of access decisions back to data owner

- Can be implemented by either client or server- Can be used to deliver cryptographic keys- Generic: can be used with any HTTP-based storage protocol

Philips Research13

Page 14: Interoperable Cloud Encryption and Access Control to ... · • Cloud Data Management Interface website • CDMI Specification v1.1.1 • Whitepaper: towards a CDMI healthcare profile

Responsibilities

Philips Research14

Hospital B(requesting)

Cloud A(France)

Cloud B(U.S.A.)

Hospital A(responsible)

EHRFrance

EHR service Acdmi.ehr-a.fr

(object storage)

EHRU.S.

EHR service Bcdmi.ehr-b.us

(object storage)

Remote hospital client B

(CDMI client)

Requestor M.D.(person)

Key Managementkmip.kms.com(KMIP server)

Hospital controller Acdmi.hos-a.fr(CDMI server)

Identity Managementidm.hos-a.fr(IDM server)

HospitalAdministration(CDMI client)

Patient(person)

Hospital client A(CDMI client)

M.D.(person)

Remotehospital controller B

cdmi.hos-b.us(CDMI server)

CDMIIHE-IUA / OAuthKMIPUser interaction

Key VaultPatient

Responsible for cloud storageof encrypted recordsCreation of medical record

on hospital computer

Digitalization of patient consent

Request of medical recordon hospital computer

Responsible for policy enforcement and auditing

Secure place to store cryptographic keys (optional)

Responsible for local replication of encrypted

records (optional)

Stateless gatewayresponsible for

encryption/decryption

Stateless gatewayresponsible for

encryption/decryptionSign a consent

Page 15: Interoperable Cloud Encryption and Access Control to ... · • Cloud Data Management Interface website • CDMI Specification v1.1.1 • Whitepaper: towards a CDMI healthcare profile

Creation/storage of consent profile

Philips Research15

Hospital B(requesting)

Cloud A(France)

Cloud B(U.S.A.)

Hospital A(responsible)

EHRFrance

EHR service Acdmi.ehr-a.fr

(object storage)

EHRU.S.

EHR service Bcdmi.ehr-b.us

(object storage)

Remote hospital client B

(CDMI client)

Requestor M.D.(person)

Key Managementkmip.kms.com(KMIP server)

Hospital controller Acdmi.hos-a.fr(CDMI server)

Identity Managementidm.hos-a.fr(IDM server)

HospitalAdministration(CDMI client)

Patient(person)

Hospital client A(CDMI client)

M.D.(person)

Remotehospital controller B

cdmi.hos-b.us(CDMI server)

CDMIIHE-IUA / OAuthKMIPUser interaction

Key VaultPatient

1. Sign a consent

4. In-place encryption

5. Key storage

6. Storage of encrypted

consent profile

7. Forget consent

profile & keys

3.Upload consent profile

(HTTP PUT) 2.Digitalize

consent profile in XACML policy

Page 16: Interoperable Cloud Encryption and Access Control to ... · • Cloud Data Management Interface website • CDMI Specification v1.1.1 • Whitepaper: towards a CDMI healthcare profile

Creation/storage of medical record

Philips Research16

Hospital B(requesting)

Cloud A(France)

Cloud B(U.S.A.)

Hospital A(responsible)

EHRFrance

EHR service Acdmi.ehr-a.fr

(object storage)

EHRU.S.

EHR service Bcdmi.ehr-b.us

(object storage)

Remote hospital client B

(CDMI client)

Requestor M.D.(person)

Key Managementkmip.kms.com(KMIP server)

Hospital controller Acdmi.hos-a.fr(CDMI server)

Identity Managementidm.hos-a.fr(IDM server)

HospitalAdministration(CDMI client)

Patient(person)

Hospital client A(CDMI client)

M.D.(person)

Remotehospital controller B

cdmi.hos-b.us(CDMI server)

CDMIIHE-IUA / OAuthKMIPUser interaction

Key VaultPatient

1. Create a medical record on hospital PC

2.Upload medical record

(HTTP PUT)

3. In-place encryption

4. Key storage

5. Storage of encrypted

medical record

6. Forget medical record

& keys

(can be asynchronous to consent profile)

Page 17: Interoperable Cloud Encryption and Access Control to ... · • Cloud Data Management Interface website • CDMI Specification v1.1.1 • Whitepaper: towards a CDMI healthcare profile

Local request of medical record

Philips Research17

Hospital B(requesting)

Cloud A(France)

Cloud B(U.S.A.)

Hospital A(responsible)

EHRFrance

EHR service Acdmi.ehr-a.fr

(object storage)

EHRU.S.

EHR service Bcdmi.ehr-b.us

(object storage)

Remote hospital client B

(CDMI client)

Requestor M.D.(person)

Key Managementkmip.kms.com(KMIP server)

Hospital controller Acdmi.hos-a.fr(CDMI server)

Identity Managementidm.hos-a.fr(IDM server)

HospitalAdministration(CDMI client)

Patient(person)

Hospital client A(CDMI client)

M.D.(person)

Remotehospital controller B

cdmi.hos-b.us(CDMI server)

CDMIIHE-IUA / OAuthKMIPUser interaction

Key VaultPatient

1. Request a medical record on hospital PC

2. Attempt to download

medical record(HTTP GET)

3. Download encrypted consent profile & encrypted medical record

4. Decrypt consent profile

5. Submit consent profile

to IDM

6. Make access control decision

+ audit trail

7. Obtain record decryption key from key vault

8. In-place decryption of

medical record

9. Response with medical

record

10. Clear caches

Page 18: Interoperable Cloud Encryption and Access Control to ... · • Cloud Data Management Interface website • CDMI Specification v1.1.1 • Whitepaper: towards a CDMI healthcare profile

Remote access of medical record

Philips Research18

Hospital B(requesting)

Cloud A(France)

Cloud B(U.S.A.)

Hospital A(responsible)

EHRFrance

EHR service Acdmi.ehr-a.fr

(object storage)

EHRU.S.

EHR service Bcdmi.ehr-b.us

(object storage)

Remote hospital client B

(CDMI client)

Requestor M.D.(person)

Key Managementkmip.kms.com(KMIP server)

Hospital controller Acdmi.hos-a.fr(CDMI server)

Identity Managementidm.hos-a.fr(IDM server)

HospitalAdministration(CDMI client)

Patient(person)

Hospital client A(CDMI client)

M.D.(person)

Remotehospital controller B

cdmi.hos-b.us(CDMI server)

CDMIIHE-IUA / OAuthKMIPUser interaction

Key VaultPatient

2. Request a medical record on hospital PC

3. Attempt to download

medical record(HTTP GET)

4. Download encrypted medical record

From EHR

5. Parse DAC information,

Incl. certificate for Hospital A

6. Send DAC request incl. authorization

claims (in secure tunnel)

7. Download and decryption of

consent profile8. Submit claims +

consent profile to IDM

9. Make access control decision(auto/manual), decide license,

+ audit

10. Obtain record decryption key from key vault

11. Send DAC responseincl. access control decision,

object decryption key and usage license

(in secure tunnel)

12. In-place decryption

13. Response with medical

record

14. Forget all

1. Federate encrypted medical record

14. Forget all

Page 19: Interoperable Cloud Encryption and Access Control to ... · • Cloud Data Management Interface website • CDMI Specification v1.1.1 • Whitepaper: towards a CDMI healthcare profile

Encryption technology

Encryption is built on top of state-of-the-art JSON Object Signing and Encryption

• Object Encryption– Authenticated content encryption via AES-GCM– Either symmetric or asymmetric key-wrapping

(AESKW, RSA-OAEP, or ECDH-ES)

• Object Authentication– Message Authentication code (HMAC), or– Digital signatures (RSA or ECDSA)

• Delegated Access Control– Provides negotiated encrypted tunnel using the above primitives– Mutual authentication via X.509 certificates

Alternative mode: compatibility with e.g. CMS or IHE-DEN

Philips Research19

Page 20: Interoperable Cloud Encryption and Access Control to ... · • Cloud Data Management Interface website • CDMI Specification v1.1.1 • Whitepaper: towards a CDMI healthcare profile

References

• Cloud Data Management Interface website

• CDMI Specification v1.1.1

• Whitepaper: towards a CDMI healthcare profile

• Draft CDMI Extensions– Delegated Access Control Extension v1.1f – Encrypted Object Extension v1.1f

• JSON Object Signing and Encryption (JOSE)– JSON Web Signature (RFC 7515)– JSON Web Encryption (RFC 7516)– JSON Web Algorithms (RFC 7518)

Philips Research20

Page 21: Interoperable Cloud Encryption and Access Control to ... · • Cloud Data Management Interface website • CDMI Specification v1.1.1 • Whitepaper: towards a CDMI healthcare profile

Glossary

CDMI Cloud Data Management Interface (specification)

CMS Cryptographic Message Syntax (specification)

DAC Delegated Access Control

EHR Electronic Health Record

HTTP Hypertext Transfer Protocol (specification)

IDM Identity Management

IHE IHE – Integrating the Healthcare Enterprise (organization)

IHE-DEN IHE Data Encryption (specification)

IHE-IUA IHE User Internet Authentication (specification)

JOSE JSON Object Signing and Encryption (specification)

JSON JavaScript Object Notation (specification)

KMIP Key Management Interoperability Protocol (specification)

OAuth Open standard for authorization (specification)

SNIA Storage Networking Industry Association (organization)

XACML Extensible Access Control Mark-up Language (specification)

Philips Research21

Page 22: Interoperable Cloud Encryption and Access Control to ... · • Cloud Data Management Interface website • CDMI Specification v1.1.1 • Whitepaper: towards a CDMI healthcare profile
Page 23: Interoperable Cloud Encryption and Access Control to ... · • Cloud Data Management Interface website • CDMI Specification v1.1.1 • Whitepaper: towards a CDMI healthcare profile

Using Cloud Encryption, Signing and Delegated Access ControlDavid Slik, Technical DirectorCapacity Storage

NetApp, Inc.

© 2015 NetApp, Inc. All rights reserved. NetApp Confidential – Limited Use 23

Page 24: Interoperable Cloud Encryption and Access Control to ... · • Cloud Data Management Interface website • CDMI Specification v1.1.1 • Whitepaper: towards a CDMI healthcare profile

Encryption and Delegated Access Control

§ What if you want to use the cloud, but don’t trust the cloud?§ Here’s what needs to be standardized in order to enable security and

interoperability:

§ Encryption - Protection against unauthorized disclosure§ Format: CMS (Cryptographic Message Syntax) & JWE (JSON Web

Encryption)§ Key Management (KMIP)

§ Signatures - Protection against unauthorized alteration§ Format: CMS (Cryptographic Message Syntax) & JWS (JSON Web

Signatures)

§ Delegated Access Control - Protects against unauthorized access§ The focus of this standardization effort§ Provides an interoperable message exchange for access control & key

disclosure § Works with CDMI & other cloud storage protocols

© 2015 NetApp, Inc. All rights reserved. NetApp Confidential – Limited Use 24

Page 25: Interoperable Cloud Encryption and Access Control to ... · • Cloud Data Management Interface website • CDMI Specification v1.1.1 • Whitepaper: towards a CDMI healthcare profile

Encryption, Signing and Delegated Access ControlScenario 1 – Completely Untrusted Cloud

© 2015 NetApp, Inc. All rights reserved. NetApp Confidential – Limited Use 25

Modified Cloud Client

🔒

Register

🔑

Encrypted &

SignedObject

Key Server

Step 1Object Encryption, Signing and Key

Registration

Page 26: Interoperable Cloud Encryption and Access Control to ... · • Cloud Data Management Interface website • CDMI Specification v1.1.1 • Whitepaper: towards a CDMI healthcare profile

Encryption, Signing and Delegated Access ControlScenario 1 – Completely Untrusted Cloud

© 2015 NetApp, Inc. All rights reserved. NetApp Confidential – Limited Use 26

Modified Cloud Client

Untrusted CloudProvider

🔒

Encrypted &

Signed Object

AdministrativeBoundary

Key Server🔑

Step 2Store to Cloud

Standard HTTPS PUT

Page 27: Interoperable Cloud Encryption and Access Control to ... · • Cloud Data Management Interface website • CDMI Specification v1.1.1 • Whitepaper: towards a CDMI healthcare profile

Encryption, Signing and Delegated Access ControlScenario 1 – Completely Untrusted Cloud

© 2015 NetApp, Inc. All rights reserved. NetApp Confidential – Limited Use 27

Untrusted CloudProvider

🔒

Encrypted &

Signed Object

Key Server🔑

Modified CloudClient

HTTPS GET

🔒

Encrypted &

Signed Object

Step 3Retrieve from Cloud

AdministrativeBoundary

AdministrativeBoundary

Modified Cloud Client

Page 28: Interoperable Cloud Encryption and Access Control to ... · • Cloud Data Management Interface website • CDMI Specification v1.1.1 • Whitepaper: towards a CDMI healthcare profile

Encryption, Signing and Delegated Access ControlScenario 1 – Completely Untrusted Cloud

© 2015 NetApp, Inc. All rights reserved. NetApp Confidential – Limited Use 28

Key Server

Access Control Provider🔑

Modified CloudClient

Delegated Access Control Request

🔒

Encrypted &

Signed Object

Step 4Request Access

📜 Client Credentials

AdministrativeBoundary

AdministrativeBoundary

Modified Cloud Client

Untrusted CloudProvider

Page 29: Interoperable Cloud Encryption and Access Control to ... · • Cloud Data Management Interface website • CDMI Specification v1.1.1 • Whitepaper: towards a CDMI healthcare profile

Encryption, Signing and Delegated Access ControlScenario 1 – Completely Untrusted Cloud

© 2015 NetApp, Inc. All rights reserved. NetApp Confidential – Limited Use 29

Key Server

Access Control Provider🔑

Modified CloudClient

🔒

Encrypted &

Signed Object

Step 5Access Control

Decision

🔑

📜Key Retriev

al

AdministrativeBoundary

AdministrativeBoundary

Modified Cloud Client

Untrusted CloudProvider

Page 30: Interoperable Cloud Encryption and Access Control to ... · • Cloud Data Management Interface website • CDMI Specification v1.1.1 • Whitepaper: towards a CDMI healthcare profile

Encryption, Signing and Delegated Access ControlScenario 1 – Completely Untrusted Cloud

© 2015 NetApp, Inc. All rights reserved. NetApp Confidential – Limited Use 30

Key Server

Access Control Provider🔑

Modified CloudClient

🔒

Encrypted &

Signed Object

Step 6Access Granted

🔑 Decryption Key

Decrypted &

Verified Object

AdministrativeBoundary

AdministrativeBoundary

Modified Cloud Client

Untrusted CloudProvider

Delegated Access Control Response

Page 31: Interoperable Cloud Encryption and Access Control to ... · • Cloud Data Management Interface website • CDMI Specification v1.1.1 • Whitepaper: towards a CDMI healthcare profile

Encryption, Signing and Delegated Access ControlScenario 1 – Completely Untrusted Cloud

© 2015 NetApp, Inc. All rights reserved. NetApp Confidential – Limited Use 31

Scenario 1 Demonstration

Page 32: Interoperable Cloud Encryption and Access Control to ... · • Cloud Data Management Interface website • CDMI Specification v1.1.1 • Whitepaper: towards a CDMI healthcare profile

Encryption, Signing and Delegated Access ControlScenario 2 – Trusted Edge Cloud for Access

© 2015 NetApp, Inc. All rights reserved. NetApp Confidential – Limited Use 32

Modified Cloud Client

🔒

Register

🔑

Encrypted &

SignedObject

Key Server

Step 1Object Encryption, Signing and Key

Registration

Page 33: Interoperable Cloud Encryption and Access Control to ... · • Cloud Data Management Interface website • CDMI Specification v1.1.1 • Whitepaper: towards a CDMI healthcare profile

Encryption, Signing and Delegated Access ControlScenario 2 – Trusted Edge Cloud for Access

© 2015 NetApp, Inc. All rights reserved. NetApp Confidential – Limited Use 33

Modified Cloud Client

Untrusted CloudProvider

Standard HTTPS PUT

🔒

Encrypted &

Signed Object

AdministrativeBoundary

Key Server🔑

Step 2Store to Cloud

Page 34: Interoperable Cloud Encryption and Access Control to ... · • Cloud Data Management Interface website • CDMI Specification v1.1.1 • Whitepaper: towards a CDMI healthcare profile

Encryption, Signing and Delegated Access ControlScenario 2 – Trusted Edge Cloud for Access

© 2015 NetApp, Inc. All rights reserved. NetApp Confidential – Limited Use 34

Untrusted CloudProvider

🔒

Encrypted &

Signed Object

Key Server🔑

Federation

Step 3Federate to Edge

Cloud

AdministrativeBoundary

Trusted Edge Cloud

🔒

Encrypted &

Signed Object

Modified Cloud Client

Page 35: Interoperable Cloud Encryption and Access Control to ... · • Cloud Data Management Interface website • CDMI Specification v1.1.1 • Whitepaper: towards a CDMI healthcare profile

Encryption, Signing and Delegated Access ControlScenario 2 – Trusted Edge Cloud for Access

© 2015 NetApp, Inc. All rights reserved. NetApp Confidential – Limited Use 35

Key Server🔑

Unmodified

CloudClient

Step 4Retrieve from Cloud

AdministrativeBoundary

AdministrativeBoundary

Trusted Edge Cloud

🔒

Encrypted &

Signed Object

Modified Cloud Client

Untrusted CloudProvider

StandardHTTPS

GET

Page 36: Interoperable Cloud Encryption and Access Control to ... · • Cloud Data Management Interface website • CDMI Specification v1.1.1 • Whitepaper: towards a CDMI healthcare profile

Encryption, Signing and Delegated Access ControlScenario 2 – Trusted Edge Cloud for Access

© 2015 NetApp, Inc. All rights reserved. NetApp Confidential – Limited Use 36

Key Server

Access Control Provider🔑

Unmodified

CloudClient

Step 5Request Access

AdministrativeBoundary

AdministrativeBoundary

Trusted Edge Cloud

🔒

Encrypted &

Signed Object

Delegated Access Control Request

📜 Client + Edge Cloud Credentials

Modified Cloud Client

Untrusted CloudProvider

Page 37: Interoperable Cloud Encryption and Access Control to ... · • Cloud Data Management Interface website • CDMI Specification v1.1.1 • Whitepaper: towards a CDMI healthcare profile

Encryption, Signing and Delegated Access ControlScenario 2 – Trusted Edge Cloud for Access

© 2015 NetApp, Inc. All rights reserved. NetApp Confidential – Limited Use 37

Key Server

Access Control Provider🔑

Step 6Access Control

Decision

🔑

📜Key Retriev

al

AdministrativeBoundary

AdministrativeBoundary

Unmodified

CloudClient

Trusted Edge Cloud

🔒

Encrypted &

Signed Object

Modified Cloud Client

Untrusted CloudProvider

Page 38: Interoperable Cloud Encryption and Access Control to ... · • Cloud Data Management Interface website • CDMI Specification v1.1.1 • Whitepaper: towards a CDMI healthcare profile

Encryption, Signing and Delegated Access ControlScenario 2 – Trusted Edge Cloud for Access

© 2015 NetApp, Inc. All rights reserved. NetApp Confidential – Limited Use 38

Key Server

Access Control Provider🔑

Unmodified

CloudClient

Step 7Request Access

AdministrativeBoundary

AdministrativeBoundary

Trusted Edge Cloud

🔒

Encrypted &

Signed Object

🔑 Decryption Key

Decrypted &

Verified Object

Modified Cloud Client

Untrusted CloudProvider

Delegated Access Control Response

Page 39: Interoperable Cloud Encryption and Access Control to ... · • Cloud Data Management Interface website • CDMI Specification v1.1.1 • Whitepaper: towards a CDMI healthcare profile

Encryption, Signing and Delegated Access ControlScenario 2 – Trusted Edge Cloud for Access

© 2015 NetApp, Inc. All rights reserved. NetApp Confidential – Limited Use 39

Key Server

Access Control Provider🔑

Unmodified

CloudClient

StandardHTTPS

GET

AdministrativeBoundary

AdministrativeBoundary

Trusted Edge Cloud

🔒

Encrypted &

Signed Object

Decrypted &

Verified Object

Step 8Data Delivered

Decrypted &

Verified Object

Modified Cloud Client

Untrusted CloudProvider

Page 40: Interoperable Cloud Encryption and Access Control to ... · • Cloud Data Management Interface website • CDMI Specification v1.1.1 • Whitepaper: towards a CDMI healthcare profile

Encryption, Signing and Delegated Access ControlScenario 2 – Trusted Edge Cloud

© 2015 NetApp, Inc. All rights reserved. NetApp Confidential – Limited Use 40

Scenario 2 Demonstration

Page 41: Interoperable Cloud Encryption and Access Control to ... · • Cloud Data Management Interface website • CDMI Specification v1.1.1 • Whitepaper: towards a CDMI healthcare profile

Encryption, Signing and Delegated Access ControlScenario 3 – Trusted Edge Cloud for Encryption

© 2015 NetApp, Inc. All rights reserved. NetApp Confidential – Limited Use 41

Unmodified

Cloud Client

Object

Key Server

Step 1Object Store

Trusted Edge Cloud

Unencrypted

Object

StandardHTTPS

PUT

Page 42: Interoperable Cloud Encryption and Access Control to ... · • Cloud Data Management Interface website • CDMI Specification v1.1.1 • Whitepaper: towards a CDMI healthcare profile

Encryption, Signing and Delegated Access ControlScenario 3 – Trusted Edge Cloud for Encryption

© 2015 NetApp, Inc. All rights reserved. NetApp Confidential – Limited Use 42

Unmodified

Cloud Client

Key Server

Trusted Edge Cloud

Unencrypted

Object

🔑

Step 2Create and Register

Key

Register

🔑

Page 43: Interoperable Cloud Encryption and Access Control to ... · • Cloud Data Management Interface website • CDMI Specification v1.1.1 • Whitepaper: towards a CDMI healthcare profile

Encryption, Signing and Delegated Access ControlScenario 3 – Trusted Edge Cloud for Encryption

© 2015 NetApp, Inc. All rights reserved. NetApp Confidential – Limited Use 43

Unmodified

Cloud Client

Key Server

Step 3Encrypt Object

Server side

Trusted Edge Cloud

Unencrypted

Object

🔑

StandardHTTPS

PUT

Page 44: Interoperable Cloud Encryption and Access Control to ... · • Cloud Data Management Interface website • CDMI Specification v1.1.1 • Whitepaper: towards a CDMI healthcare profile

Encryption, Signing and Delegated Access ControlScenario 3 – Trusted Edge Cloud for Encryption

© 2015 NetApp, Inc. All rights reserved. NetApp Confidential – Limited Use 44

Unmodified

Cloud Client

Key Server

Step 4DAC

Request/Responseto obtain key

Trusted Edge Cloud

Unencrypted

Object

DAC Respo

nse

🔑

🔑

Access Control Provider

StandardHTTPS

PUT

Page 45: Interoperable Cloud Encryption and Access Control to ... · • Cloud Data Management Interface website • CDMI Specification v1.1.1 • Whitepaper: towards a CDMI healthcare profile

Encryption, Signing and Delegated Access ControlScenario 3 – Trusted Edge Cloud for Encryption

© 2015 NetApp, Inc. All rights reserved. NetApp Confidential – Limited Use 45

Unmodified

Cloud Client

Key Server

Step 5Encrypt Object

Server side

Trusted Edge Cloud

Unencrypted

Object

🔒

Encrypted &

Signed Object

🔑

Access Control Provider

StandardHTTPS

PUT

Page 46: Interoperable Cloud Encryption and Access Control to ... · • Cloud Data Management Interface website • CDMI Specification v1.1.1 • Whitepaper: towards a CDMI healthcare profile

Encryption, Signing and Delegated Access ControlScenario 3 – Trusted Edge Cloud for Encryption

© 2015 NetApp, Inc. All rights reserved. NetApp Confidential – Limited Use 46

Unmodified

Cloud Client

Untrusted CloudProvider

🔒

Encrypted &

Signed Object

AdministrativeBoundary

Key Server🔑

Step 6Federate to Cloud

Trusted Edge Cloud

🔒

Encrypted &

Signed Object

StandardHTTPS

PUT

Access Control Provider

Page 47: Interoperable Cloud Encryption and Access Control to ... · • Cloud Data Management Interface website • CDMI Specification v1.1.1 • Whitepaper: towards a CDMI healthcare profile

Encryption, Signing and Delegated Access ControlScenario 3 – Trusted Edge Cloud for Encryption

© 2015 NetApp, Inc. All rights reserved. NetApp Confidential – Limited Use 47

Unmodified

Cloud Client

Untrusted CloudProvider

🔒

Encrypted &

Signed Object

AdministrativeBoundary

Key Server🔑

Access

Same as Scenario 1(Modified client)

Steps 3 through 6

or

Same as Scenario 2(Unmodified client)Steps 3 through 8

Trusted Edge Cloud

Trusted Edge Cloud

Access Control Provider

Page 48: Interoperable Cloud Encryption and Access Control to ... · • Cloud Data Management Interface website • CDMI Specification v1.1.1 • Whitepaper: towards a CDMI healthcare profile

Encryption, Signing and Delegated Access ControlScenario 3 – Trusted Edge Cloud for Encryption

© 2015 NetApp, Inc. All rights reserved. NetApp Confidential – Limited Use 48

Scenario 3 Demonstration

Page 49: Interoperable Cloud Encryption and Access Control to ... · • Cloud Data Management Interface website • CDMI Specification v1.1.1 • Whitepaper: towards a CDMI healthcare profile

Encryption and Delegated Access Control

§ Questions and Discussion

§ Links to resources§ CDMI Encrypted Object Extension§ CDMI Delegated Access Control Extension

http://www.snia.org/tech_activities/publicreview/cdmi

§ CDMI Reference Implementation

https://github.com/SNIA/CDMI

© 2015 NetApp, Inc. All rights reserved. NetApp Confidential – Limited Use 49

Page 50: Interoperable Cloud Encryption and Access Control to ... · • Cloud Data Management Interface website • CDMI Specification v1.1.1 • Whitepaper: towards a CDMI healthcare profile

After This Webcast

This Webcast and a copy of the slides will be on the SNIA Cloud Storage website and available on-demand

http://www.snia.org/forum/csi/knowledge/webcastsA PDF of these slides at www.snia.org/interoperable_cloudA Q&A from this webcast, including answers to questions we couldn't get to today, will be on the SNIACloud blog

http://www.sniacloud.com/Follow us on Twitter @SNIACloud, @macsun