Skip to main content

2016 | OriginalPaper | Buchkapitel

Selected Cloud Security Patterns to Improve End User Security and Privacy in Public Clouds

verfasst von : Thomas Länger, Henrich C. Pöhls, Solange Ghernaouti

Erschienen in: Privacy Technologies and Policy

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Cloud computing has the potential to dramatically reduce the cost and complexity of provisioning information technology resources for end users. However, to make it secure and privacy-preserving for end users, additional technical safeguards must be added—the application of strong cryptography is such a safeguard. The Horizon 2020 project PRISMACLOUD surveys and advances several cryptographic protocols and primitives usable to cryptographically address common cloud security and privacy issues. The cryptographic functionality will entirely be encapsulated in five configurable tools, from which cloud services providing end-to-end security can be constructed. This approach relieves cloud service designers from dealing with the complex and error prone correct application of cryptographic functionality and shall spark the emergence of a multitude of privacy and security preserving cloud applications for the benefit of the end-users—who will no longer have to rely on contractual and legal instruments for ensuring, that privacy and security is enforced by cloud providers on their behalf. In order to support the privacy-by-design development of the tools, we developed several cloud security patterns for common critical situations in the cloud—in the three fields of data storage in the cloud, user privacy protection and data minimisation, and authentication of stored and processed data.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
The authors’ work is supported by the European Union Horizon 2020 research activity n\(\circ \) 644962 Prismacloud: “Privacy and security maintaining services in the cloud” [17]; duration 2/2015–7/2018; 16 partners; https://​www.​prismacloud.​eu.
 
2
It is now, that cloud providers have started to host their data centers in multiple locations world-wide, including Asia, South America, and countries of the European Union (see e.g. Amazon: http://​docs.​aws.​amazon.​com/​AWSEC2/​latest/​UserGuide/​using-regions-availability-zones.​html). Nevertheless, the headquarters and main installations of these businesses are certainly under U.S. American jurisdiction and it is at least possible that data, in whichever form and state of aggregation, might be consolidated with data residing in the U.S.A.
 
3
The other patterns can be studied in the public Prismacloud deliverable D2.2 “Domain independent generic security models”, available on the project web site www.​prismacloud.​eu.
 
4
The entire book, 1218 pages, can be downloaded as pdf from archive.​org/​details/​ APatternLanguage​.
 
6
ibid.
 
7
www.​munawarhafiz.​com/​securitypatternc​atalog/​index.​php. Munawar Hafiz is also author of several papers on security patterns, e.g. [15], which presents “4 design patterns that can aid the decision making process for the designers of privacy protecting systems”.
 
9
For a more detailed description of all cloud security patterns we want to direct the attention to Prismacloud deliverable D2.2 “Domain independent generic security models”, available on the project web site www.​prismacloud.​eu.
 
10
Whenever the signature mathematically still depends on some removed data, like in hash trees, they cryptographically do not offer a sophisticated level of privacy [3].
 
Literatur
1.
Zurück zum Zitat Alexander, C., Ishikawa, S., Silverstein, M.: A Pattern Language: Towns, Buildings, Construction. Oxford University Press, Oxford (1977) Alexander, C., Ishikawa, S., Silverstein, M.: A Pattern Language: Towns, Buildings, Construction. Oxford University Press, Oxford (1977)
4.
Zurück zum Zitat Buchmann, J., Demirel, D., Happe, A., Krenn, S., Lorünser, T., Traverso, G.: PRISMACLOUD D4.1: secret sharing protocols for various adversary models (2015). www.prismacloud.eu. H2020 project PRISMACLOUD deliverable Buchmann, J., Demirel, D., Happe, A., Krenn, S., Lorünser, T., Traverso, G.: PRISMACLOUD D4.1: secret sharing protocols for various adversary models (2015). www.​prismacloud.​eu. H2020 project PRISMACLOUD deliverable
6.
Zurück zum Zitat Danezis, G., Domingo-Ferrer, J., Hansen, M., Hoepman, J.H., Le Mtayer, D., Tirtea, R., Schiffner, S.: Privacy and data protection by design. Technical report, European Union Agency for Network and Information Security (ENISA) (2015) Danezis, G., Domingo-Ferrer, J., Hansen, M., Hoepman, J.H., Le Mtayer, D., Tirtea, R., Schiffner, S.: Privacy and data protection by design. Technical report, European Union Agency for Network and Information Security (ENISA) (2015)
7.
Zurück zum Zitat Doty, N., Gupta, M.: Privacy design patterns and anti-patterns. In: Workshop “A Turn for the Worse: Trustbusters for User Interfaces Workshop” at SOUPS 2013 Newcastle, UK (2013) Doty, N., Gupta, M.: Privacy design patterns and anti-patterns. In: Workshop “A Turn for the Worse: Trustbusters for User Interfaces Workshop” at SOUPS 2013 Newcastle, UK (2013)
14.
Zurück zum Zitat Gamma, E., Helm, R., Johnson, R., Vlissides, J.: Design Patterns: Elements of Reusable Object-Oriented Software. Addison-Wesley, Boston (1994). ISBN: 0-201-63361-2 Gamma, E., Helm, R., Johnson, R., Vlissides, J.: Design Patterns: Elements of Reusable Object-Oriented Software. Addison-Wesley, Boston (1994). ISBN: 0-201-63361-2
17.
Zurück zum Zitat Lorünser, T., et al.: Towards a new paradigm for privacy and security in cloud services. In: Cleary, F., Felici, M. (eds.) CSP Forum 2015. CCIS, vol. 530, pp. 14–25. Springer, Heidelberg (2015). doi:10.1007/978-3-319-25360-2_2 CrossRef Lorünser, T., et al.: Towards a new paradigm for privacy and security in cloud services. In: Cleary, F., Felici, M. (eds.) CSP Forum 2015. CCIS, vol. 530, pp. 14–25. Springer, Heidelberg (2015). doi:10.​1007/​978-3-319-25360-2_​2 CrossRef
18.
Zurück zum Zitat Lorünser, T., Slamanig, D., Länger, T., Pöhls, H.C.: PRISMACLOUD tools: a cryptographic toolbox for increasing security in cloud services. In: Proceedings of the International Conference on Availability, Reliability and Security (ARES 2016). IEEE (2016) (to be published Sept 2016) Lorünser, T., Slamanig, D., Länger, T., Pöhls, H.C.: PRISMACLOUD tools: a cryptographic toolbox for increasing security in cloud services. In: Proceedings of the International Conference on Availability, Reliability and Security (ARES 2016). IEEE (2016) (to be published Sept 2016)
19.
Zurück zum Zitat Miyazaki, K., Hanaoka, G., Imai, H.: Digitally signed document sanitizing scheme based on bilinear maps. In: Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2006, pp. 343–354. ACM, New York (2006). http://doi.acm.org/10.1145/1128817.1128868 Miyazaki, K., Hanaoka, G., Imai, H.: Digitally signed document sanitizing scheme based on bilinear maps. In: Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2006, pp. 343–354. ACM, New York (2006). http://​doi.​acm.​org/​10.​1145/​1128817.​1128868
21.
Zurück zum Zitat Pöhls, H.C., Höhne, F.: The role of data integrity in EU digital signature legislation — achieving statutory trust for sanitizable signature schemes. In: Meadows, C., Fernandez-Gago, C. (eds.) STM 2011. LNCS, vol. 7170, pp. 175–192. Springer, Heidelberg (2012)CrossRef Pöhls, H.C., Höhne, F.: The role of data integrity in EU digital signature legislation — achieving statutory trust for sanitizable signature schemes. In: Meadows, C., Fernandez-Gago, C. (eds.) STM 2011. LNCS, vol. 7170, pp. 175–192. Springer, Heidelberg (2012)CrossRef
22.
Zurück zum Zitat Pöhls, H.C., Samelin, K.: On updatable redactable signatures. In: Boureanu, I., Owesarski, P., Vaudenay, S. (eds.) ACNS 2014. LNCS, vol. 8479, pp. 457–475. Springer, Heidelberg (2014) Pöhls, H.C., Samelin, K.: On updatable redactable signatures. In: Boureanu, I., Owesarski, P., Vaudenay, S. (eds.) ACNS 2014. LNCS, vol. 8479, pp. 457–475. Springer, Heidelberg (2014)
25.
Zurück zum Zitat Schumacher, M., Fernandez-Buglioni, E., Hybertson, D., Buschmann, F., Sommerlad, P.: Security Patterns - Integrating Security and Systems Engineering. Wiley, West Sussex (2006) Schumacher, M., Fernandez-Buglioni, E., Hybertson, D., Buschmann, F., Sommerlad, P.: Security Patterns - Integrating Security and Systems Engineering. Wiley, West Sussex (2006)
29.
Metadaten
Titel
Selected Cloud Security Patterns to Improve End User Security and Privacy in Public Clouds
verfasst von
Thomas Länger
Henrich C. Pöhls
Solange Ghernaouti
Copyright-Jahr
2016
DOI
https://doi.org/10.1007/978-3-319-44760-5_8

Premium Partner