TOP
Suche auf der Schloss Dagstuhl Webseite
Sie suchen nach Informationen auf den Webseiten der einzelnen Seminare? - Dann:
Nicht fündig geworden? - Einige unserer Dienste laufen auf separaten Webseiten mit jeweils eigener Suche. Bitte beachten Sie folgende Liste:
Schloss Dagstuhl - LZI - Logo
Schloss Dagstuhl Services
Seminare
Innerhalb dieser Seite:
Externe Seiten:
  • DOOR (zum Registrieren eines Dagstuhl Aufenthaltes)
  • DOSA (zum Beantragen künftiger Dagstuhl Seminare oder Dagstuhl Perspektiven Workshops)
Publishing
Innerhalb dieser Seite:
Externe Seiten:
dblp
Innerhalb dieser Seite:
Externe Seiten:
  • die Informatik-Bibliographiedatenbank dblp


Dagstuhl-Seminar 11491

Secure Computing in the Cloud

( 04. Dec – 09. Dec, 2011 )

(zum Vergrößern in der Bildmitte klicken)

Permalink
Bitte benutzen Sie folgende Kurz-Url zum Verlinken dieser Seite: https://www.dagstuhl.de/11491

Organisatoren

Kontakt



Programm


Summary

Cloud computing offers IT resources, including storage, networking, and computing platforms, on an on-demand and pay-as-you-go basis. The high usability of today's cloud computing platforms makes this rapidly emerging paradigm very attractive for customers who want to instantly and easily provide web-services that are highly available and scalable to the current demands. In the most flexible and general cloud computing model ("Infrastructure as-a Service", IaaS), customers are able to run entire Virtual Machines (VMs) inside the Cloud. VM images function as templates from which a virtually unlimited number of VM instances can be instantiated.


Problem Description

Due to virtualisation, limited physical resources are made available for masses. The sharing of these resources and the complex configuration and maintenance of the needed infrastructure is accompanied by security threats. According to the Cloud Security Alliance (CSA), the major inhibitor of a widespread adaptation of cloud computing is the protection of data, as data is no longer under the physical control of the owner (in this case the cloud customer). The cloud provider has access to data stored on disks and data transferred through the cloud network. The fact, that the physical hardware of the cloud is shared with other customers, potentially with adversaries, further stresses the need to protect data in order to thwart the lack of physical control over the own data. Moreover, the outsourced computations must be entrusted to the cloud service provider and face the risk of

  • Sloppy/Lazy provider:A provider that makes mistakes or simplifies computations. The sloppy and lazy provider might compromise the integrity of the result of computations. Verification of results would be a countermeasure here, for example by executing the computations on multiple, independent clouds.
  • Greedy provider:A provider which reduces security in order to save money. Greedy providers are willing to violate policies for economic reasons, thereby exposing the data to insider or outsider threats.
  • Malicious Tenant:A cloud customer (tenant) who is deliberately exploits security vulnerabilities to gain access to data or intellectual insight of processes and computations.

The CSA recommends the use of encryption to protect data in transit and data at rest. However, cryptography in the cloud faces two problems:

  1. cryptographic keys in a running VM instance are susceptible to run-time attacks like web server exploits, and
  2. key provisioning to a VM is not feasible when we assume the cloud provider has access to data and VM images stored on disk.

Seminar Topics

The participants of this seminar were mainly concerned with the privacy of computation or data with respect to the cloud provider. From concrete examples like doctor-patient-confidentiality while processing genomic data at a third party, to generic solutions that hide computations that are done at the cloud provider from the cloud provider itself. Additionally, means to verify the result of an outsourced computation with significantly less computational effort than performing the calculation itself. And last, but not least, even outlooks to ad-hoc clouds that are formed by mobile devices on-demand.


Teilnehmer
  • N. Asokan (NOKIA Research Center - Helsinki, FI) [dblp]
  • Maxime Augier (EPFL - Lausanne, CH)
  • Amir Herzberg (Bar-Ilan University - Ramat Gan, IL) [dblp]
  • Yuval Ishai (Technion - Haifa, IL) [dblp]
  • Ari Juels (RSA Laboratories - Cambridge, US) [dblp]
  • Seny Kamara (Microsoft Corporation - Redmond, US) [dblp]
  • Stefan Katzenbeisser (TU Darmstadt, DE) [dblp]
  • Florian Kerschbaum (TU Dresden, DE) [dblp]
  • Thilo Mie (KIT - Karlsruher Institut für Technologie, DE)
  • Stefan Nürnberger (TU Darmstadt, DE) [dblp]
  • Claudio Orlandi (Bar-Ilan University - Ramat Gan, IL) [dblp]
  • Marc-Oliver Pahl (TU München, DE) [dblp]
  • Alain Patey (Morpho, SAFRAN Group, FR)
  • Benny Pinkas (Bar-Ilan University - Ramat Gan, IL) [dblp]
  • Ben Riva (Tel Aviv University, IL)
  • Ahmad-Reza Sadeghi (TU Darmstadt, DE) [dblp]
  • Nigel P. Smart (University of Bristol, GB) [dblp]
  • Francois-Xavier Standaert (University of Louvain, BE) [dblp]
  • Eran Tromer (Tel Aviv University, IL) [dblp]