SlideShare a Scribd company logo
PaaSword: A Holistic Data Privacy and Security
by Design Framework for Cloud Services
Yiannis Verginadis, Antonis Michalas, Panagiotis Gouvas,
Gunther Schiefer, Gerald Hubsch, Iraklis Paraskakis
CLOSER 2015, Lisbon, May 21, 2015
Information Management Unit / ICCS of NTUA www.imu.iccs.gr
Agenda
 Introduction
 Data Security Challenges in the Cloud
 PaaSword Framework
 Conclusions
Information Management Unit / ICCS of NTUA www.imu.iccs.gr
Introduction
 Many users have started relying on cloud services without realizing it
 Many companies have remained cautious due to security concerns
 Applications and storage volumes often reside next to potentially hostile
virtual environments, leaving sensitive information at risk to theft,
unauthorized exposure or malicious manipulation
 Governmental regulation presents an additional concern of significant
legal and financial consequences if data confidentiality is breached
Focused interest Experimentation Near ubiquitous use
CloudAdoption
Information Management Unit / ICCS of NTUA www.imu.iccs.gr
Related Work
 Commonly used access control models (Ferrari 2010) are:
 Mandatory Access Control (MAC)
 Discretionary Access Control (DAC)
 Role-Based Access Control (RBAC)
 Extending these models:
 location-aware access control (LAAC) - there is a clear lack of
supporting additional pertinent contextual information (Cleeff et
al.,2010)
 context-aware access control (CAAC) – with shortcomings like:

lack of support for dynamically generated context (Covington et al., 2001)

lack of fine-grained data access control (Kayes et al., 2013)
Information Management Unit / ICCS of NTUA www.imu.iccs.gr
Related Work (contd.)
 Regarding the policy management there is lack of proper separation
of concerns (Kourtesis and Paraskakis, 2012)
 The policy definition and policy enforcement are entangled in the
implementation of a single software component, leading to the lack of

portability

explicit representation of policy relationships
 Regarding the data distribution and encryption algorithms...
 Gentry (2009), introduced the first fully homomorphic encryption
scheme that enables semantically secure outsourcing to the cloud

but presents severe performance issues
 In CryptDB (Popa et al., 2011), the concept of onions was used

with the main drawback the lack of security guarantees to the client
Information Management Unit / ICCS of NTUA www.imu.iccs.gr
Agenda
 Introduction
 Data Security Challenges in the Cloud
 PaaSword Framework
 Conclusions
Information Management Unit / ICCS of NTUA www.imu.iccs.gr
Security Challenges in the Cloud
 Top four threats identified (CSA, 2013) are:
 data leakage
 data loss
 account hijacking
 insecure APIs
 The most critical part of a modern cloud application is the data
persistency layer and the database itself
 The OWASP foundation has categorized the database-related
attacks as the most critical ones
 SQL injections represents 17% of all security breaches examined
 These attacks were responsible for 83% of the total records stolen,
from 2005 to 2011
Information Management Unit / ICCS of NTUA www.imu.iccs.gr
Security Challenges in the Cloud (contd.)
 Most of the security fences that are configured in a corporate
environment target the fortification of the so-called network
perimeter
 e.g. routers, hosts and virtual machines
 IDS and IPS try to cope with database-takeover security aspects,
but the risk of database compromise is greater than ever, as:
 automated exploitation tools (e.g. SQLMap) are widely spread
 IPS and IDS evasion techniques have become extremely sophisticated
 Internal adversaries or even unknown vulnerabilities of software
platforms widely adopted in the cloud may provide malicious access
to sensitive data
 e.g. Heartbleed flaw - constituted a serious fault in the OpenSSL
cryptography library, which remained unnoticed for more than two years
and affected over 60% of Web servers worldwide
Information Management Unit / ICCS of NTUA www.imu.iccs.gr
Security Challenges in the Cloud (contd.)
 Regarding the post-exploitation phase things are even worse in the
case where a symmetric encryption algorithm has been employed
 cracking toolkits that utilize GPU processing power (e.g. oclHashcat) are able to
crack ciphers using brute-force techniques with an attack rate of 162 billion
attempts per second
 The application developer is the one responsible for both
 sanitizing all HTTP-input parameters
 reassuring that compromised data will be useless
 Nevertheless, the mere utilization of an IaaS or PaaS provider, may
by itself spawn a multitude of inherent vulnerabilities
 that cannot be tackled effectively as they typically exceed the
responsibilities of an application developer
Information Management Unit / ICCS of NTUA www.imu.iccs.gr
Agenda
 Introduction
 Data Security Challenges in the Cloud
 PaaSword Framework
 Conclusions
Information Management Unit / ICCS of NTUA www.imu.iccs.gr
Threat Model
 We assume a semi-honest adversarial model for the cloud provider
(Paladi et al., 2014; Santos et al., 2009)
 a malicious cloud provider correctly follows the protocol specification
but can intercept all messages and may attempt to use them in order to
learn information that otherwise should remain private
 For the rest of the participants we consider the threat model (Santos
et al., 2009) that assumes that privileged access rights can be used
by a remote adversary, ADV, to leak confidential information
 e.g. a corrupted system administrator, can obtain remote access to any
host maintained by the provider.
 the adversary cannot access the volatile memory of any guest virtual
machine (VM) residing on the compute hosts of the provider
Information Management Unit / ICCS of NTUA www.imu.iccs.gr
Context-aware Access Model
 We envision a XACML-based context-aware access model,
 which is needed by the developers in order to annotate the Data Access
Objects of their applications
Information Management Unit / ICCS of NTUA www.imu.iccs.gr
Facets of the Context-Aware Access Model
Facets
IP
Address
(Local)
Time
Location Device
Type
Data
Connection
Type
etc…
Patterns
Frequency Usual
Duration
Usual
Dates
Usual
Hours
Previously
Accessed
Data
Sensitive / Non Sensitive Data
Role
Information Management Unit / ICCS of NTUA www.imu.iccs.gr
Policies Access, Governance and Enforcement
 A middleware that will provide:
 a transparent key usage for efficient authentication purposes,
 annotation capabilities in the form of a tool (IDE plugin) for allowing
developers to declaratively create the minimum amount of rule-set that
is needed for security enforcement purposes
 dynamically interpret the DAO annotations into policy enforcement
rules
 the governance and quality control of the annotations and their
respective policy rules
 the formulation and implementation of the overall policy enforcement
business logic
Information Management Unit / ICCS of NTUA www.imu.iccs.gr
 Devise an appropriate
vocabulary of concepts and
decide how they are
interrelated
 Populate the framework with
appropriate instances to give
rise to DAOs
 Formalise these concepts and
their interrelations – gives rise
to the ontology framework
Ontology for Access Policies
Information Management Unit / ICCS of NTUA www.imu.iccs.gr
Secure Storage
 We propose a design for a cryptographic cloud storage that will be
based on a symmetric searchable encryption (SSE) scheme similar
to (Kamara and Lauter, 2010)
 We plan to extend the previous work Cumulus4j (Huber et al., 2013)
and MimoSecco (Gabel and Hubsch, 2014)) that hides relations
between different data values of a data row
Information Management Unit / ICCS of NTUA www.imu.iccs.gr
PaaSword High-level View
Information Management Unit / ICCS of NTUA www.imu.iccs.gr
Conceptual Architecture
Information Management Unit / ICCS of NTUA www.imu.iccs.gr
Agenda
 Introduction
 Data Security Challenges in the Cloud
 PaaSword Framework
 Conclusions
Information Management Unit / ICCS of NTUA www.imu.iccs.gr
Conclusions & Next Steps
 Future work involves the implementation of the proposed framework
 This solution will be validated through 5 pilots:
 Encrypted persistency as a service in a PaaS provider
 Intergovernmental secure document and personal data exchange
 Secure sensors data fusion and analytics
 Protection of personal data in a multi-tenant CRM
 Protection of sensible enterprise information in multi-tenant ERP
Thank you for listening!
Acknowledgements:
This work is related to the PaaSword project and
has received funding from the European
Union’s Horizon 2020 research and
innovation programme under grant

More Related Content

PDF
PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...
PPTX
Research proposal on Computing Security and Reliability - Phdassistance.com
PDF
A Survey of Cloud Computing Security Issues and Consequences
DOCX
Information flow control for secure cloud computing
PDF
Research proposal on Computing Security and Reliability - Phdassistance.com
PDF
Secure modelling schema of distributed information access management in cloud...
PDF
Never Compromise Your Mission: 5 Ways to Strengthen Data and Network Security...
PDF
Secure modelling schema of distributed information access management in cloud...
PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...
Research proposal on Computing Security and Reliability - Phdassistance.com
A Survey of Cloud Computing Security Issues and Consequences
Information flow control for secure cloud computing
Research proposal on Computing Security and Reliability - Phdassistance.com
Secure modelling schema of distributed information access management in cloud...
Never Compromise Your Mission: 5 Ways to Strengthen Data and Network Security...
Secure modelling schema of distributed information access management in cloud...

What's hot (19)

PDF
Iaetsd secure data storage against attacks in cloud
PDF
Cloud technology to ensure the protection of fundamental methods and use of i...
PDF
Hans Bos
PDF
Design and implement a new cloud security method based on multi clouds on ope...
PPTX
Cloud Security using NIST guidelines
PDF
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
PPTX
Cloud Security using NIST guidelines
PDF
Proposed Model for Enhancing Data Storage Security in Cloud Computing Systems
PPTX
Cloud Security for U.S. Military Agencies
PDF
Ijirsm ashok-kumar-h-problems-and-solutions-infrastructure-as-service-securit...
PPTX
Security Architecture and Design - CISSP
PDF
IRJET- Design and Analytical Study of Id Based Pixel Secured Cloud Enablem...
PDF
(Pdf) yury chemerkin _i-society-2013 proceedings
PDF
Investigative analysis of security issues and challenges in cloud computing a...
PDF
Analysis of classical encryption techniques in cloud computing
PDF
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...
PDF
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
PDF
Blueprint for Cyber Security Zone Modeling
PPTX
CYBERSECURITY MESH - DIGITAL TRUST FRAMEWORK
Iaetsd secure data storage against attacks in cloud
Cloud technology to ensure the protection of fundamental methods and use of i...
Hans Bos
Design and implement a new cloud security method based on multi clouds on ope...
Cloud Security using NIST guidelines
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
Cloud Security using NIST guidelines
Proposed Model for Enhancing Data Storage Security in Cloud Computing Systems
Cloud Security for U.S. Military Agencies
Ijirsm ashok-kumar-h-problems-and-solutions-infrastructure-as-service-securit...
Security Architecture and Design - CISSP
IRJET- Design and Analytical Study of Id Based Pixel Secured Cloud Enablem...
(Pdf) yury chemerkin _i-society-2013 proceedings
Investigative analysis of security issues and challenges in cloud computing a...
Analysis of classical encryption techniques in cloud computing
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Blueprint for Cyber Security Zone Modeling
CYBERSECURITY MESH - DIGITAL TRUST FRAMEWORK
Ad

Viewers also liked (20)

PPTX
Keeping up with the Revolution in IT Security
PPT
Keynote Address at 2013 CloudCon: A day in the life of the SMB by Michael To...
PPT
Winning the war against data- Strategies to beat your arch nemesis: files - G...
PDF
Enterprise 2.0: What it is and why it matters
PDF
SMB Security Opportunity –Use and Plans for Solutions and Profile of "Securit...
PPTX
Building a database security program
PPT
Box.net overview
PPTX
Security Essentials for the SMB IT Network (on a Shoestring Budget!) - Adam W...
PDF
Advanced IT and Cyber Security for Your Business
PPTX
The next generation of IT security
PDF
Robbery Prevention for Small Businesses
PDF
Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...
PDF
Security Guide For Small Business
PDF
Challenges Of Global Data Collection
PPTX
5 Step Data Security Plan for Small Businesses
PPTX
Big data security challenges and recommendations!
PPTX
Small business data security
PDF
Big Data Security with Hadoop
PPTX
Big data security
PPTX
Infrastructure API Lightning Talk by Jeremy Pollard of box.com
Keeping up with the Revolution in IT Security
Keynote Address at 2013 CloudCon: A day in the life of the SMB by Michael To...
Winning the war against data- Strategies to beat your arch nemesis: files - G...
Enterprise 2.0: What it is and why it matters
SMB Security Opportunity –Use and Plans for Solutions and Profile of "Securit...
Building a database security program
Box.net overview
Security Essentials for the SMB IT Network (on a Shoestring Budget!) - Adam W...
Advanced IT and Cyber Security for Your Business
The next generation of IT security
Robbery Prevention for Small Businesses
Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...
Security Guide For Small Business
Challenges Of Global Data Collection
5 Step Data Security Plan for Small Businesses
Big data security challenges and recommendations!
Small business data security
Big Data Security with Hadoop
Big data security
Infrastructure API Lightning Talk by Jeremy Pollard of box.com
Ad

Similar to PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud Services (20)

PDF
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
PDF
No More Dark Clouds: A Privacy Preserving Framework for the Cloud
PDF
Project 3
PDF
Secure modelling schema of distributed information access management in cloud...
PDF
Secure modelling schema of distributed information
DOCX
AbstractCloud computing technology has become the new fron.docx
PDF
SECURE CLOUD ARCHITECTURE
PDF
B018211016
PDF
A Survey on Context Security Policies in the Cloud
PDF
EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...
PPTX
Cloud computing
PDF
MIST Effective Masquerade Attack Detection in the Cloud
PDF
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
PDF
Evaluation Of The Data Security Methods In Cloud Computing Environments
DOC
Cloud security
PDF
IRJET - Multimedia Security on Cloud Computing using Cryptography
PDF
Mitigating the Integrity Issues in Cloud Computing Utilizing Cryptography Alg...
PDF
Reliable security in cloud computing environment 2-3-4-5-6
PDF
Threat Modeling of Cloud based Implementation of Homomorphic Encryption
DOC
Security Issues in Cloud Computing by rahul abhishek
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
No More Dark Clouds: A Privacy Preserving Framework for the Cloud
Project 3
Secure modelling schema of distributed information access management in cloud...
Secure modelling schema of distributed information
AbstractCloud computing technology has become the new fron.docx
SECURE CLOUD ARCHITECTURE
B018211016
A Survey on Context Security Policies in the Cloud
EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...
Cloud computing
MIST Effective Masquerade Attack Detection in the Cloud
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
Evaluation Of The Data Security Methods In Cloud Computing Environments
Cloud security
IRJET - Multimedia Security on Cloud Computing using Cryptography
Mitigating the Integrity Issues in Cloud Computing Utilizing Cryptography Alg...
Reliable security in cloud computing environment 2-3-4-5-6
Threat Modeling of Cloud based Implementation of Homomorphic Encryption
Security Issues in Cloud Computing by rahul abhishek

Recently uploaded (20)

PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
GamePlan Trading System Review: Professional Trader's Honest Take
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
KodekX | Application Modernization Development
PDF
Advanced Soft Computing BINUS July 2025.pdf
PDF
Machine learning based COVID-19 study performance prediction
PDF
Approach and Philosophy of On baking technology
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
solutions_manual_-_materials___processing_in_manufacturing__demargo_.pdf
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PPTX
Cloud computing and distributed systems.
PDF
Empathic Computing: Creating Shared Understanding
PDF
Advanced IT Governance
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
[발표본] 너의 과제는 클라우드에 있어_KTDS_김동현_20250524.pdf
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
Per capita expenditure prediction using model stacking based on satellite ima...
GamePlan Trading System Review: Professional Trader's Honest Take
Advanced methodologies resolving dimensionality complications for autism neur...
KodekX | Application Modernization Development
Advanced Soft Computing BINUS July 2025.pdf
Machine learning based COVID-19 study performance prediction
Approach and Philosophy of On baking technology
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
solutions_manual_-_materials___processing_in_manufacturing__demargo_.pdf
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Cloud computing and distributed systems.
Empathic Computing: Creating Shared Understanding
Advanced IT Governance
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
[발표본] 너의 과제는 클라우드에 있어_KTDS_김동현_20250524.pdf
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Understanding_Digital_Forensics_Presentation.pptx
The Rise and Fall of 3GPP – Time for a Sabbatical?
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Diabetes mellitus diagnosis method based random forest with bat algorithm

PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud Services

  • 1. PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud Services Yiannis Verginadis, Antonis Michalas, Panagiotis Gouvas, Gunther Schiefer, Gerald Hubsch, Iraklis Paraskakis CLOSER 2015, Lisbon, May 21, 2015
  • 2. Information Management Unit / ICCS of NTUA www.imu.iccs.gr Agenda  Introduction  Data Security Challenges in the Cloud  PaaSword Framework  Conclusions
  • 3. Information Management Unit / ICCS of NTUA www.imu.iccs.gr Introduction  Many users have started relying on cloud services without realizing it  Many companies have remained cautious due to security concerns  Applications and storage volumes often reside next to potentially hostile virtual environments, leaving sensitive information at risk to theft, unauthorized exposure or malicious manipulation  Governmental regulation presents an additional concern of significant legal and financial consequences if data confidentiality is breached Focused interest Experimentation Near ubiquitous use CloudAdoption
  • 4. Information Management Unit / ICCS of NTUA www.imu.iccs.gr Related Work  Commonly used access control models (Ferrari 2010) are:  Mandatory Access Control (MAC)  Discretionary Access Control (DAC)  Role-Based Access Control (RBAC)  Extending these models:  location-aware access control (LAAC) - there is a clear lack of supporting additional pertinent contextual information (Cleeff et al.,2010)  context-aware access control (CAAC) – with shortcomings like:  lack of support for dynamically generated context (Covington et al., 2001)  lack of fine-grained data access control (Kayes et al., 2013)
  • 5. Information Management Unit / ICCS of NTUA www.imu.iccs.gr Related Work (contd.)  Regarding the policy management there is lack of proper separation of concerns (Kourtesis and Paraskakis, 2012)  The policy definition and policy enforcement are entangled in the implementation of a single software component, leading to the lack of  portability  explicit representation of policy relationships  Regarding the data distribution and encryption algorithms...  Gentry (2009), introduced the first fully homomorphic encryption scheme that enables semantically secure outsourcing to the cloud  but presents severe performance issues  In CryptDB (Popa et al., 2011), the concept of onions was used  with the main drawback the lack of security guarantees to the client
  • 6. Information Management Unit / ICCS of NTUA www.imu.iccs.gr Agenda  Introduction  Data Security Challenges in the Cloud  PaaSword Framework  Conclusions
  • 7. Information Management Unit / ICCS of NTUA www.imu.iccs.gr Security Challenges in the Cloud  Top four threats identified (CSA, 2013) are:  data leakage  data loss  account hijacking  insecure APIs  The most critical part of a modern cloud application is the data persistency layer and the database itself  The OWASP foundation has categorized the database-related attacks as the most critical ones  SQL injections represents 17% of all security breaches examined  These attacks were responsible for 83% of the total records stolen, from 2005 to 2011
  • 8. Information Management Unit / ICCS of NTUA www.imu.iccs.gr Security Challenges in the Cloud (contd.)  Most of the security fences that are configured in a corporate environment target the fortification of the so-called network perimeter  e.g. routers, hosts and virtual machines  IDS and IPS try to cope with database-takeover security aspects, but the risk of database compromise is greater than ever, as:  automated exploitation tools (e.g. SQLMap) are widely spread  IPS and IDS evasion techniques have become extremely sophisticated  Internal adversaries or even unknown vulnerabilities of software platforms widely adopted in the cloud may provide malicious access to sensitive data  e.g. Heartbleed flaw - constituted a serious fault in the OpenSSL cryptography library, which remained unnoticed for more than two years and affected over 60% of Web servers worldwide
  • 9. Information Management Unit / ICCS of NTUA www.imu.iccs.gr Security Challenges in the Cloud (contd.)  Regarding the post-exploitation phase things are even worse in the case where a symmetric encryption algorithm has been employed  cracking toolkits that utilize GPU processing power (e.g. oclHashcat) are able to crack ciphers using brute-force techniques with an attack rate of 162 billion attempts per second  The application developer is the one responsible for both  sanitizing all HTTP-input parameters  reassuring that compromised data will be useless  Nevertheless, the mere utilization of an IaaS or PaaS provider, may by itself spawn a multitude of inherent vulnerabilities  that cannot be tackled effectively as they typically exceed the responsibilities of an application developer
  • 10. Information Management Unit / ICCS of NTUA www.imu.iccs.gr Agenda  Introduction  Data Security Challenges in the Cloud  PaaSword Framework  Conclusions
  • 11. Information Management Unit / ICCS of NTUA www.imu.iccs.gr Threat Model  We assume a semi-honest adversarial model for the cloud provider (Paladi et al., 2014; Santos et al., 2009)  a malicious cloud provider correctly follows the protocol specification but can intercept all messages and may attempt to use them in order to learn information that otherwise should remain private  For the rest of the participants we consider the threat model (Santos et al., 2009) that assumes that privileged access rights can be used by a remote adversary, ADV, to leak confidential information  e.g. a corrupted system administrator, can obtain remote access to any host maintained by the provider.  the adversary cannot access the volatile memory of any guest virtual machine (VM) residing on the compute hosts of the provider
  • 12. Information Management Unit / ICCS of NTUA www.imu.iccs.gr Context-aware Access Model  We envision a XACML-based context-aware access model,  which is needed by the developers in order to annotate the Data Access Objects of their applications
  • 13. Information Management Unit / ICCS of NTUA www.imu.iccs.gr Facets of the Context-Aware Access Model Facets IP Address (Local) Time Location Device Type Data Connection Type etc… Patterns Frequency Usual Duration Usual Dates Usual Hours Previously Accessed Data Sensitive / Non Sensitive Data Role
  • 14. Information Management Unit / ICCS of NTUA www.imu.iccs.gr Policies Access, Governance and Enforcement  A middleware that will provide:  a transparent key usage for efficient authentication purposes,  annotation capabilities in the form of a tool (IDE plugin) for allowing developers to declaratively create the minimum amount of rule-set that is needed for security enforcement purposes  dynamically interpret the DAO annotations into policy enforcement rules  the governance and quality control of the annotations and their respective policy rules  the formulation and implementation of the overall policy enforcement business logic
  • 15. Information Management Unit / ICCS of NTUA www.imu.iccs.gr  Devise an appropriate vocabulary of concepts and decide how they are interrelated  Populate the framework with appropriate instances to give rise to DAOs  Formalise these concepts and their interrelations – gives rise to the ontology framework Ontology for Access Policies
  • 16. Information Management Unit / ICCS of NTUA www.imu.iccs.gr Secure Storage  We propose a design for a cryptographic cloud storage that will be based on a symmetric searchable encryption (SSE) scheme similar to (Kamara and Lauter, 2010)  We plan to extend the previous work Cumulus4j (Huber et al., 2013) and MimoSecco (Gabel and Hubsch, 2014)) that hides relations between different data values of a data row
  • 17. Information Management Unit / ICCS of NTUA www.imu.iccs.gr PaaSword High-level View
  • 18. Information Management Unit / ICCS of NTUA www.imu.iccs.gr Conceptual Architecture
  • 19. Information Management Unit / ICCS of NTUA www.imu.iccs.gr Agenda  Introduction  Data Security Challenges in the Cloud  PaaSword Framework  Conclusions
  • 20. Information Management Unit / ICCS of NTUA www.imu.iccs.gr Conclusions & Next Steps  Future work involves the implementation of the proposed framework  This solution will be validated through 5 pilots:  Encrypted persistency as a service in a PaaS provider  Intergovernmental secure document and personal data exchange  Secure sensors data fusion and analytics  Protection of personal data in a multi-tenant CRM  Protection of sensible enterprise information in multi-tenant ERP
  • 21. Thank you for listening! Acknowledgements: This work is related to the PaaSword project and has received funding from the European Union’s Horizon 2020 research and innovation programme under grant