Enhancing Cloud SLA with Security: A secure, Searchable, and Practical Cloud Storage System

Subscribers:
344,000
Published on ● Video Link: https://www.youtube.com/watch?v=Yhr1fzitCL8



Duration: 1:00:55
245 views
4


Cloud technology is rapidly emerging and becoming popular. The cloud promises extensive storage resources, computation cycles, and high availability at a small cost, while allowing companies to focus on their business. However, current service level agreements (Windows Azure, Amazon, etc.), only guarantee availability and reimburse the client when the promise is not respected. These SLAs do not provide any security guarantee (confidentiality, integrity, freshness, consistency). Some of the data may be changed, read requests may return stale results, customer updates may become inconsistent, etc. As a result, customers with sensitive data will refuse to use the services of the cloud. In our work, we provide the security tools by which a cloud SLA can include security guarantees such as integrity, freshness, and write consistency. The client can prove that the cloud did not respect one of these requirements and obtain reimbursement, and the cloud can disprove false client accusations and avoid invalid charges. By making use of the security-enhanced SLA, we build the first end-to-end secure, searchable and practical cloud storage for enterprises. It guarantees data confidentiality, integrity, freshness and write-serializability, where the last two properties have not been fully achieved by previous work in secure file systems or storage. By offloading (in a verifiable way) as much of the workload as possible to the cloud, our system is scalable to a large number of users, groups, and users per group of an enterprise.




Other Videos By Microsoft Research


2016-09-072009 eScience: Computational Methods for Large Scale DNA Data Analysis
2016-09-072009 eScience: Tools for Scalable Genome Haplotying in the Windows Azure Cloud
2016-09-07Programmers and the Web: Understanding and Supporting DevelopersΓÇÖ Use of Online Resources
2016-09-07Economics Meets UI Design: Toll Bridge Pricing and P2P Backup Markets
2016-09-07Touch , Tabletop, and Tangible Blocks
2016-09-07Connected: The Surprising Power of Our Social Networks and How They Shape our Lives
2016-09-07Control Theory and Computing: An unconsummated union
2016-09-07Particle Packing Problems for Fun and Profit
2016-09-07Position-based Cryptography [1/2]
2016-09-07Improving diagramming software usability with automatic routing and placement tools
2016-09-07Enhancing Cloud SLA with Security: A secure, Searchable, and Practical Cloud Storage System
2016-09-07Contracting with Asymmetric Externalities
2016-09-07Elections and Strategic Voting: Condorcet and Borda
2016-09-07Building Systems That Enforce Measurable Security Goals
2016-09-07Conjunctive Grammars and Synchronized Alternating Pushdown Automata
2016-09-07Borrowing Brilliance: The Six Steps to Business Innovation by Building on the Ideas of Others
2016-09-07Automated reasoning in non-classical logics with the polarized inverse method
2016-09-07Where computer vision needs help from computer science
2016-09-07Parallel Programming with Chorus
2016-09-07Seeing Software
2016-09-07Efficient and Effective File Replication and Consistency Maintenance in P2P Systems



Tags:
microsoft research