SlideShare a Scribd company logo
September 2018
Miguel Pardal
INESC-ID
miguel.pardal@tecnico.ulisboa.pt
WP1: Secure Communication
Outline
• Objectives and summary
• Secure communication solutions
• Achievements
WP1 — 2018-09 » 2
WP1 — objectives and summary
• Provide middleware services to improve the
privacy and security of cloud communications in
the SafeCloud platform
• Protect data when downloading (and uploading)
from the cloud
• Provide same properties as secure channels:
confidentiality, integrity, authenticity
• But assuming more powerful adversaries that may break
some assumptions that make existing channels secure
WP1 — 2018-09 » 3
Standard secure channel
• The most adopted protocol is SSL/TLS
• HTTPS = HTTP overTLS
WP1 — 2018-09 » 4
How can aTLS channel become insecure
1. A vulnerability appears in one component
2. An old vulnerability in one of the components is
not fixed
3.There is an unknown (0-day) vulnerability in one of
the components
4.There is a vulnerability that seems to be
impossible to exploit, but that can be exploited by a
strong adversary, e.g., a nation state
WP1 — 2018-09 » 5
Specific threats
• Weak cryptographic components
• DES, RC4, MD5, SHA-1
• Service identification
• Well-known ports are vulnerable to port scanning and
fingerprinting
• Route attacks
• Man-in-the-middle attacks
• Attacker intercepts communication
• Route hijacking
• Traffic may be deviated and then eavesdropped
WP1 — 2018-09 » 6
Summary of security requirements
• For the attacker to break the confidentiality,
privacy or integrity of a secure channel, he must:
(i) find a vulnerability in the channel
(ii) gain access to the endpoint machines
(iii) intercept communication path
WP1 — 2018-09 » 7
SafeCloud solutions
Secure Communication
WP1 — 2018-09 » 8
Middleware requirements
• Two forms of communication:
• Machine-to-cloud and
• Cloud-to-cloud
• Unicast communication between two endpoints
• Endpoints: clients, machines in clouds
• We do not envisage the need to protect data privacy in multicast,
anycast or broadcast communications
• Connection-oriented
• Similar to protocols likeTLS overTCP
• Implemented at application layer of the OSI model
• Difficult to deploy mechanisms at lower layers in the Internet
WP1 — 2018-09 » 9
SafeCloud platform components
WP1 — 2018-09 » 10
Secure Communication Solutions
• SC1: vulnerability-tolerant channels
• vtTLS
• Multiple cryptographic layers
• SC2: protected channels
• sKnock
• Port knocking
• SC3: route-aware channels
• Premium (Machete + Darshana)
• Multi-path and route monitoring
WP1 — 2018-09 » 11
Core insight
• Make secure channels more robust by
leveraging diversity in multiple ways:
• SC1
• Cipher suites
• Protocol implementations
• SC2
• Access controls
• SC3
• Communication paths
• Route monitoring techniques
WP1 — 2018-09 » 12
SC1: vulnerability-tolerant channels
WP1 — 2018-09 » 13
Combine several cryptographic suites
SC2: protected channels
WP1 — 2018-09 » 14
Add multiple layers of access control
SC3: route-aware channels
WP1 — 2018-09 » 15
Use multiple paths, monitor geo-bounds
Addressing security requirements
with SafeCloud communication solutions
Attacker must:
SC1:
vulnerability-
tolerant channels
SC2:
protected
channels
SC3:
route-aware
channels
(i) find a vulnerability in
the channel
(ii) gain access to the
endpoint machines
(iii) intercept
communication flow
SC – Secure Communication
solution
Solutions can be composed
• Example: SC1 + SC2
= vulnerability-tolerant channels + protected channels
= vtTLS + sKnock
= vulnerability-tolerant, multiple protection channel
WP1 — 2018-09 » 17
Server is protected by a firewall
WP1 — 2018-09 » 18
Client can open the firewall with an
authenticated packet
WP1 — 2018-09 » 19
Add first layer of protection
WP1 — 2018-09 » 20
Add additional layer of protection
WP1 — 2018-09 » 21
Client and server exchange data securely
WP1 — 2018-09 » 22
SafeCloudWP1
achievements
Scientific,Technological, Exploitation
WP1 — 2018-09 » 23
All tasks completed
• T1.1 — Communication architecture [M1-M6]
• T1.2 —Vulnerability-tolerant channels [M1-30]
• T1.3 — Protected service provisioning [M1-30]
• T1.4 — Route monitoring [M1-30]
• T1.5 — Multi-path communication [M1-30]
WP1 — 2018-09 » 24
All deliverables completed
• D1.1 — Private communication middleware
architecture [M6; IN-ID]
• D1.2 — First version of the private communication
middleware components [M18; IN-ID]
• D1.3 — Final version of the private communication
middleware [M30; IN-ID]
WP1 — 2018-09 » 25
Scientific work
• Graduations
• 5 students at INESC-ID
• 10 students atTUM
• Publications
• 4 conference papers
• 2 workshop papers
• Credit to the students for all their great work!
WP1 — 2018-09 » 26
• SC1: vulnerability-tolerant channels
• vtTLS evaluation
• Evaluated: handshake, data transfer overhead
• SC2: protected channels
• sKnock
• Evaluated: latency, scalability
• SC3: route-aware channels
• Premium (Machete + Darshana)
• Evaluated: best number of multiple paths, multi-homing
• Evaluated: thresholds, false positives, false negatives
Testing and Evaluation
WP1 — 2018-09 » 27
• github.com/safecloud-project/vtTLS
• github.com/safecloud-project/sKnock
• github.com/safecloud-project/Premium
Contributions to open-source community
WP1 — 2018-09 » 28
Conclusion
WP1 — 2018-09 » 29
Conclusion
• SafeCloud made secure channels more robust by
leveraging diversity in multiple ways
• Solutions can be combined
• Better security:
• Between endpoints and clouds
• Between people and the services they use
• Both for personal and corporate data
WP1 — 2018-09 » 30
Thank you!
WP 1: Secure Communication

More Related Content

PPT
Chapter 6 Presentation
PPT
Lesson 3- Remote Access
PDF
Interoute VDC: Education from the cloud
PPTX
The Trend of Cloud Security Global ID.pptx
PDF
CDE Marketplace: SQR Systems
PPTX
20230324143255_E6. IOT Device Management REVIEWED.pptx
PDF
Virtual private networks
PPTX
WP4 - Deployment of "smart" services toolkit
Chapter 6 Presentation
Lesson 3- Remote Access
Interoute VDC: Education from the cloud
The Trend of Cloud Security Global ID.pptx
CDE Marketplace: SQR Systems
20230324143255_E6. IOT Device Management REVIEWED.pptx
Virtual private networks
WP4 - Deployment of "smart" services toolkit

Similar to SafeCloud Secure Communication solutions (WP1 overview) (20)

PDF
Chris Purrington's talk from CLOUDSEC 2016 "Defense in depth: practical steps...
PDF
CLOUD STEGANOGRAPHY- A REVIEW
PPT
01_Introduction to Data Comm - Copy - Copy.ppt
PDF
SecureCloud Project
PPTX
Chapter 6 - Mobile Application Development.pptx
PDF
Standardized Service Layering for IoT in oneM2M
PPTX
SESAR Project Awards - Best in class Nomination for Pj14.01.04
PDF
Various Security Issues and their Remedies in Cloud Computing
PPTX
BT Cloud Enterprise Service Store - Rob Rowlingson
PDF
Challenges with Cloud Security by Ken Y Chan
PDF
Outsourcing small cell deployment - How process automation tools can enable ...
PPTX
UNIT TWO PART TWO THE EMERGING TECHNOLOGY
PPTX
3 keys to Digital transformation
PPT
Basic networking
PPTX
Connectivité temps réel et bi-directionnelle ​ pour solutions IOT
PPTX
Investigation, Design and Implementation of a Secure
PDF
SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...
PPTX
Advanced computer network
PPTX
Cloud computing
PPT
12-cloud-security.ppt
Chris Purrington's talk from CLOUDSEC 2016 "Defense in depth: practical steps...
CLOUD STEGANOGRAPHY- A REVIEW
01_Introduction to Data Comm - Copy - Copy.ppt
SecureCloud Project
Chapter 6 - Mobile Application Development.pptx
Standardized Service Layering for IoT in oneM2M
SESAR Project Awards - Best in class Nomination for Pj14.01.04
Various Security Issues and their Remedies in Cloud Computing
BT Cloud Enterprise Service Store - Rob Rowlingson
Challenges with Cloud Security by Ken Y Chan
Outsourcing small cell deployment - How process automation tools can enable ...
UNIT TWO PART TWO THE EMERGING TECHNOLOGY
3 keys to Digital transformation
Basic networking
Connectivité temps réel et bi-directionnelle ​ pour solutions IOT
Investigation, Design and Implementation of a Secure
SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...
Advanced computer network
Cloud computing
12-cloud-security.ppt
Ad

More from Miguel Pardal (20)

PDF
Master Beginners Workshop - Feb 2023
PDF
Master Beginners Workshop - September 2019
PDF
Master Beginners' Workshop September 2018
PDF
IoT Middleware for Precision Agriculture: workforce monitoring in olive fields
PDF
Rastreabilidade na Internet das (muitas) Coisas
PDF
Vulnerability-tolerant Transport Layer Security
PDF
Master Beginners
PDF
Arranque Seguro de Redes 6LoWPAN para prevenir Ataques Vampiro na Internet da...
PDF
Precision Agriculture with Sensors and Technologies from the Internet of Things
PDF
Smart Places INForum16 presentation
PPTX
Eclipse workshop presentation (March 2016)
PDF
LaTeX workshop (NEB)
PDF
Thesis for beginners 2015-10
PDF
LaTeX workshop (JEQ)
PDF
Thesis for beginners
PDF
Scalable and secure RFID data discovery
PDF
Breve introdução à investigação
PDF
Eclipse workshop presentation
PDF
BEST Lisboa 2013 - The Internet of Things class
PDF
Expressive RFID data access policies for the Pharmaceuticals supply chain
Master Beginners Workshop - Feb 2023
Master Beginners Workshop - September 2019
Master Beginners' Workshop September 2018
IoT Middleware for Precision Agriculture: workforce monitoring in olive fields
Rastreabilidade na Internet das (muitas) Coisas
Vulnerability-tolerant Transport Layer Security
Master Beginners
Arranque Seguro de Redes 6LoWPAN para prevenir Ataques Vampiro na Internet da...
Precision Agriculture with Sensors and Technologies from the Internet of Things
Smart Places INForum16 presentation
Eclipse workshop presentation (March 2016)
LaTeX workshop (NEB)
Thesis for beginners 2015-10
LaTeX workshop (JEQ)
Thesis for beginners
Scalable and secure RFID data discovery
Breve introdução à investigação
Eclipse workshop presentation
BEST Lisboa 2013 - The Internet of Things class
Expressive RFID data access policies for the Pharmaceuticals supply chain
Ad

Recently uploaded (20)

PDF
Unveiling a 36 billion solar mass black hole at the centre of the Cosmic Hors...
PPTX
Protein & Amino Acid Structures Levels of protein structure (primary, seconda...
PDF
Phytochemical Investigation of Miliusa longipes.pdf
PPTX
Taita Taveta Laboratory Technician Workshop Presentation.pptx
PPTX
Introduction to Cardiovascular system_structure and functions-1
PPTX
DRUG THERAPY FOR SHOCK gjjjgfhhhhh.pptx.
PPTX
neck nodes and dissection types and lymph nodes levels
PPT
POSITIONING IN OPERATION THEATRE ROOM.ppt
PPTX
Classification Systems_TAXONOMY_SCIENCE8.pptx
PDF
bbec55_b34400a7914c42429908233dbd381773.pdf
PPTX
The KM-GBF monitoring framework – status & key messages.pptx
PPT
The World of Physical Science, • Labs: Safety Simulation, Measurement Practice
PDF
Placing the Near-Earth Object Impact Probability in Context
PDF
Formation of Supersonic Turbulence in the Primordial Star-forming Cloud
PPTX
BIOMOLECULES PPT........................
PPTX
ognitive-behavioral therapy, mindfulness-based approaches, coping skills trai...
PPTX
Comparative Structure of Integument in Vertebrates.pptx
PPTX
2. Earth - The Living Planet earth and life
PPTX
GEN. BIO 1 - CELL TYPES & CELL MODIFICATIONS
PPTX
7. General Toxicologyfor clinical phrmacy.pptx
Unveiling a 36 billion solar mass black hole at the centre of the Cosmic Hors...
Protein & Amino Acid Structures Levels of protein structure (primary, seconda...
Phytochemical Investigation of Miliusa longipes.pdf
Taita Taveta Laboratory Technician Workshop Presentation.pptx
Introduction to Cardiovascular system_structure and functions-1
DRUG THERAPY FOR SHOCK gjjjgfhhhhh.pptx.
neck nodes and dissection types and lymph nodes levels
POSITIONING IN OPERATION THEATRE ROOM.ppt
Classification Systems_TAXONOMY_SCIENCE8.pptx
bbec55_b34400a7914c42429908233dbd381773.pdf
The KM-GBF monitoring framework – status & key messages.pptx
The World of Physical Science, • Labs: Safety Simulation, Measurement Practice
Placing the Near-Earth Object Impact Probability in Context
Formation of Supersonic Turbulence in the Primordial Star-forming Cloud
BIOMOLECULES PPT........................
ognitive-behavioral therapy, mindfulness-based approaches, coping skills trai...
Comparative Structure of Integument in Vertebrates.pptx
2. Earth - The Living Planet earth and life
GEN. BIO 1 - CELL TYPES & CELL MODIFICATIONS
7. General Toxicologyfor clinical phrmacy.pptx

SafeCloud Secure Communication solutions (WP1 overview)

  • 2. Outline • Objectives and summary • Secure communication solutions • Achievements WP1 — 2018-09 » 2
  • 3. WP1 — objectives and summary • Provide middleware services to improve the privacy and security of cloud communications in the SafeCloud platform • Protect data when downloading (and uploading) from the cloud • Provide same properties as secure channels: confidentiality, integrity, authenticity • But assuming more powerful adversaries that may break some assumptions that make existing channels secure WP1 — 2018-09 » 3
  • 4. Standard secure channel • The most adopted protocol is SSL/TLS • HTTPS = HTTP overTLS WP1 — 2018-09 » 4
  • 5. How can aTLS channel become insecure 1. A vulnerability appears in one component 2. An old vulnerability in one of the components is not fixed 3.There is an unknown (0-day) vulnerability in one of the components 4.There is a vulnerability that seems to be impossible to exploit, but that can be exploited by a strong adversary, e.g., a nation state WP1 — 2018-09 » 5
  • 6. Specific threats • Weak cryptographic components • DES, RC4, MD5, SHA-1 • Service identification • Well-known ports are vulnerable to port scanning and fingerprinting • Route attacks • Man-in-the-middle attacks • Attacker intercepts communication • Route hijacking • Traffic may be deviated and then eavesdropped WP1 — 2018-09 » 6
  • 7. Summary of security requirements • For the attacker to break the confidentiality, privacy or integrity of a secure channel, he must: (i) find a vulnerability in the channel (ii) gain access to the endpoint machines (iii) intercept communication path WP1 — 2018-09 » 7
  • 9. Middleware requirements • Two forms of communication: • Machine-to-cloud and • Cloud-to-cloud • Unicast communication between two endpoints • Endpoints: clients, machines in clouds • We do not envisage the need to protect data privacy in multicast, anycast or broadcast communications • Connection-oriented • Similar to protocols likeTLS overTCP • Implemented at application layer of the OSI model • Difficult to deploy mechanisms at lower layers in the Internet WP1 — 2018-09 » 9
  • 11. Secure Communication Solutions • SC1: vulnerability-tolerant channels • vtTLS • Multiple cryptographic layers • SC2: protected channels • sKnock • Port knocking • SC3: route-aware channels • Premium (Machete + Darshana) • Multi-path and route monitoring WP1 — 2018-09 » 11
  • 12. Core insight • Make secure channels more robust by leveraging diversity in multiple ways: • SC1 • Cipher suites • Protocol implementations • SC2 • Access controls • SC3 • Communication paths • Route monitoring techniques WP1 — 2018-09 » 12
  • 13. SC1: vulnerability-tolerant channels WP1 — 2018-09 » 13 Combine several cryptographic suites
  • 14. SC2: protected channels WP1 — 2018-09 » 14 Add multiple layers of access control
  • 15. SC3: route-aware channels WP1 — 2018-09 » 15 Use multiple paths, monitor geo-bounds
  • 16. Addressing security requirements with SafeCloud communication solutions Attacker must: SC1: vulnerability- tolerant channels SC2: protected channels SC3: route-aware channels (i) find a vulnerability in the channel (ii) gain access to the endpoint machines (iii) intercept communication flow SC – Secure Communication solution
  • 17. Solutions can be composed • Example: SC1 + SC2 = vulnerability-tolerant channels + protected channels = vtTLS + sKnock = vulnerability-tolerant, multiple protection channel WP1 — 2018-09 » 17
  • 18. Server is protected by a firewall WP1 — 2018-09 » 18
  • 19. Client can open the firewall with an authenticated packet WP1 — 2018-09 » 19
  • 20. Add first layer of protection WP1 — 2018-09 » 20
  • 21. Add additional layer of protection WP1 — 2018-09 » 21
  • 22. Client and server exchange data securely WP1 — 2018-09 » 22
  • 24. All tasks completed • T1.1 — Communication architecture [M1-M6] • T1.2 —Vulnerability-tolerant channels [M1-30] • T1.3 — Protected service provisioning [M1-30] • T1.4 — Route monitoring [M1-30] • T1.5 — Multi-path communication [M1-30] WP1 — 2018-09 » 24
  • 25. All deliverables completed • D1.1 — Private communication middleware architecture [M6; IN-ID] • D1.2 — First version of the private communication middleware components [M18; IN-ID] • D1.3 — Final version of the private communication middleware [M30; IN-ID] WP1 — 2018-09 » 25
  • 26. Scientific work • Graduations • 5 students at INESC-ID • 10 students atTUM • Publications • 4 conference papers • 2 workshop papers • Credit to the students for all their great work! WP1 — 2018-09 » 26
  • 27. • SC1: vulnerability-tolerant channels • vtTLS evaluation • Evaluated: handshake, data transfer overhead • SC2: protected channels • sKnock • Evaluated: latency, scalability • SC3: route-aware channels • Premium (Machete + Darshana) • Evaluated: best number of multiple paths, multi-homing • Evaluated: thresholds, false positives, false negatives Testing and Evaluation WP1 — 2018-09 » 27
  • 28. • github.com/safecloud-project/vtTLS • github.com/safecloud-project/sKnock • github.com/safecloud-project/Premium Contributions to open-source community WP1 — 2018-09 » 28
  • 30. Conclusion • SafeCloud made secure channels more robust by leveraging diversity in multiple ways • Solutions can be combined • Better security: • Between endpoints and clouds • Between people and the services they use • Both for personal and corporate data WP1 — 2018-09 » 30
  • 31. Thank you! WP 1: Secure Communication