Topics in applied cryptography: Cloud & More
Advanced cryptography: Cloud & More
This course is listed in Aachen Campus as Advanced cryptography: cloud & more, in Bonn Basis as MA-INF 3311 - Topics in Applied Cryptography: Cloud & More.
Responsible
Prof. Dr. Joachim von zur Gathen
Lecture
Time & Place
- Tuesday 1330-1500, b-it Rheinsaal.
- Wednesday 1330-1500, b-it Rheinsaal.
- Tutorial: Tuesday 1515-1645, b-it Rheinsaal.
First meeting: Tuesday, 29 October 2013.
All times subject to agreement in class.
Exam
Pre-exam meeting: 10 March 2014, 1100, b-it 1.25.
Exam: 12 March 2014, between 1000 and 1300, b-it bitmax.
Post-exam meeting: 18 March 2014, 1430-1530, b-it 1.25.
Second exam (repetitions only): 14 April 2014, between 1400 and 1700, b-it 1.25.
Post-exam meeting 2: probably 30 April 2014, 1330-1400, b-it 1.25.
Notes
The screen notes (PDF) contain all handwritten stuff (last updated 05 February 2014, 15:45).
Exercises
- Exercise 1 (PDF, last updated 31 October 2013, 20:27).
- Exercise 2 (PDF, last updated 08 November 2013, 14:53).
- Exercise 3 (PDF, last updated 15 November 2013, 14:08).
- Exercise 4 (PDF, last updated 21 November 2013, 11:08).
- Exercise 5 (PDF, last updated 27 November 2013, 16:46).
- Exercise 6 (PDF, last updated 06 December 2013, 12:06).
- Exercise 7 (PDF, last updated 12 December 2013, 10:55).
- Exercise 8 (PDF, last updated 08 January 2014, 15:54).
- Exercise 9 (PDF, last updated 17 January 2014, 14:12).
- Exercise 10 (PDF, last updated 27 January 2014, 12:42).
- Exercise 11 (PDF, last updated 29 January 2014, 10:52).
Prerequisites
Basic knowledge in cryptography is required.
Contents
Cloud computing is emerging as an almost omnipresent feature on the Internet for a few years now. Providers, like amazon.com, google and others, offer computing facilities, networks and more in a very flexible way and not even expensive. From a commercial point of view it's a win-win for all: providers need computing and network resources for peak situations, but at most times only 10% of these resources are used. Their customers can use these facilities in a flexible way and so may be prepared for huge traffic without having to set up all the physical hardware stuff on their own. Also they need not to maintain software and care for security questions which frees a lot of man power for their very business.
On the other side of the medal we have to face serious privacy concerns. Transport and storage of sensitive data are two solvable issues. Computations with sensitive data in the cloud are a challenge.
The course will try to cover the present design of cloud computing and mostly the related security issues and solutions.
Literature
- BSI: Security Recommendations for Cloud Computing Providers. (German page, but the paper is available in English.)
- Google Ideas & Arbor Networks: Digital Attack Map.
- Deutsche Telekom. Sicherheitstacho.
- A Google computing center. Streetview. All their locations.
- Raluca Ada Popa, Frank H. Li & Nickolai Zeldovich (2013). An Ideal-Security Protocol for Order-Preserving Encoding. ePrint 2013/129.
Structure
- Cloud computing & cloud security
- Why?
- Cheap.
- Fast. (A mobile device may not be able to...)
- Large memory.
- Flexible.
- Scalable.
- Why not?
- Privacy protection.
- Legal obligations, eg. protection against confiscation of medical documents.
- What is available?
- Store stuff "in the cloud", eg. contacts, communication, pictures, blogs, ...
- Compute "in the cloud", eg. image processing, ...
- Definitions?
- Why?
- Security recommendations (see BSI)
- Introduction
- Cloud Computing basics
- Security management by the provider
- Security architecture
- Data centre security
- Server security
- Network security
- Application and platform security
- Data security
- Encryption and key management
- ID and rights management
- Control options for users
- Monitoring and security incident management
- Business continuity management
- Portability and interoperability
- Security testing and Audit
- Requirements of personnel
- Drawing up agreements
- Transparency
- Service level agreements (SLA)
- Data protection and compliance
- Data protection
- Compliance
- Security questions
- Attack scenario(s).
- Security notions for (public-key) signatures and encryption schemes.
- Passive and active attackers.
- External, internal and insider attackers.
- Multi-party scenario: honest, semi-honest, malicious.
- Confidentiality, integrity & authenticity from/to the cloud.
- SSL/TLS.
- Key exchange.
- Authentication and PKI.
- Symmetric encryption.
- Message authentication codes.
- IPsec.
- SSL/TLS.
- Confidentiality, integrity & authenticity during storage.
- Public key encryption, hybrid encryption.
- Confidentiality, integrity & authenticity during computations.
- Virtualization and separation/isolation.
- Enforcement.
- Verification.
- Sealed cloud.
- Verifiable computation.
- Interactive proofs & zero-knowledge.
- PCP.
- "Muggles" proofs.
- Trusted computing modules (TCM), Trusted platform modules (TPM).
- Physically unclonable functions (PUF).
- Confidential computation.
- Multi-party computations.
- Fully homomorphic encryption.
- Assisted confidential computation.
- Spalka: confidential storage with fast but restricted searching. Indepently, see Popa, Li & Zeldovich (2013).
- Virtualization and separation/isolation.
- Attack scenario(s).
Allocation
4+2 SWS.
- Master in Media Informatics: Computer and Communication Technology.
8 ECTS credits.
Optionally, 3+2 SWS, 6 ECTS credits. On request a breakpoint at about 3/4 of the teaching time will be defined, and only the course material up to that point will be relevant for their exams and grades. - Master in Computer Science at University of Bonn: MA-INF 3311.
9 CP.
Students have to register this course with POS/BASIS. - Recommendation for diploma students of University of Bonn - Computer Science: A or A1, respectively.
Mailinglist
We will put each member on the mailing list . You can also subscribe yourself. The list is intented for all participants of the course as a platform for discussions around the topic. Furthermore, announcements regarding the course are made here.