IT@Intel Executive Summary Intel IT Data Anonymization Cloud Computing June 2012

Enhancing Cloud Security Using Data Anonymization Data Anonymization

Intel IT is exploring data anonymization—the process of obscuring published data to prevent

• Can enhance security of data

the identification of key information—in support of our vision of a hybrid cloud computing

stored in public clouds • Still allows for useful analytics and

reporting • Warrants further research,

including developing further use

model and our need to protect the privacy of our employees and customers. We believe data anonymization is a viable technique for enhancing the security of cloud computing.

Achieving Privacy Using Data Anonymization

cases, educating potential

Although we realize that a 100-percent secure cloud infrastructure is impossible. We are

enterprise cloud users about the

exploring the possibility of anonymizing data to augment our cloud security infrastructure.

potential benefits and pitfalls of

Data anonymization makes data worthless to others, while still allowing Intel IT to process

data anonymization, and

it in a useful way.

documenting existing open source

Several formal models of security can help improve data anonymization, including

data anonymization applications,

k-anonymity and l-diversity. • k-anonymity attempts to make each record indistinguishable from a defined number (k)

of other records. For example, consider a data set that contains two attributes: gender and birthday. The data set is k-anonymized if, for any record, k-1 other records have the same gender and birthday. In general, the higher the value of k, the more privacy is achieved. • l-diversity improves anonymization beyond what k-anonymity provides. The difference

between the two is that while k-anonymity requires each combination of quasiidentifiers to have k entries, l-diversity requires that there are l different sensitive values for each combination of quasi-identifiers. Other data anonymization techniques include adding fictitious records to the data, hashing, truncation, permutation, and value shifting, just to name a few.

Proof of Concept – Anonymizing Event Log Data We conducted a proof of concept (PoC), in which we used data anonymization to protect event logging data stored by a public cloud-based SaaS log management supplier. The PoC

was successful in demonstrating that data anonymization can work and that obscured data is still useful for analysis. We were able to perform both performance analysis and security analysis on the anonymized data. • During the security analysis testing, we didn’t detect any active probing of the monitoring VMs. However, we searched older logs

and found that there had been probes on the web server. This confirmed our theory that the approach we took in looking for security business intelligence events could detect real events. • Although the SaaS log management supplier we used during the PoC didn’t support number-crunching analytics, such as calculating

averages, we were able to pinpoint other performance issues. For example, we discovered that one web site performed two redirects before the user accessed the actual content, thereby increasing the access time. Although more research is necessary before it is ready for production use, data anonymization can ease some security concerns, allowing for simpler demilitarized zone and security provisioning and enabling more secure cloud computing. We plan to explore data anonymization further, including conducting a more extensive PoC, developing further use cases for data anonymization, educating potential enterprise cloud users about the potential benefits and pitfalls of data anonymization, and documenting existing open source data anonymization applications. You can find a full discussion of our work with data anonymization and the PoC at “Enhancing Cloud Security Using Data Anonymization.”

For more information on Intel IT best practices, visit www.intel.com/it.

This paper is for informational purposes only. THIS DOCUMENT IS PROVIDED “AS IS” WITH NO WARRANTIES WHATSOEVER, INCLUDING ANY WARRANTY OF MERCHANTABILITY, NONINFRINGEMENT, FITNESS FOR ANY PARTICULAR PURPOSE, OR ANY WARRANTY OTHERWISE ARISING OUT OF ANY PROPOSAL, SPECIFICATION OR SAMPLE. Intel disclaims all liability, including liability for infringement of any proprietary rights, relating to use of information in this specification. No license, express or implied, by estoppel or otherwise, to any intellectual property rights is granted herein. Intel and the Intel logo are trademarks of Intel Corporation in the U.S. and other countries. * Other names and brands may be claimed as the property of others. Copyright © 2012 Intel Corporation. All rights reserved. Printed in USA Please Recycle

Enhancing Cloud Security Using Data Anonymization - Media12

Data Anonymization. Cloud Computing. June 2012. Enhancing Cloud Security Using Data. Anonymization. Intel IT is exploring data anonymization—the process ...

100KB Sizes 2 Downloads 261 Views

Recommend Documents

Enhancing Cloud Security Using Data Anonymization - Media12
Data Anonymization. Cloud Computing. June 2012. Enhancing Cloud Security Using Data. Anonymization. Intel IT is exploring data anonymization—the process ...

Privacy-Enhancing k-Anonymization of Customer Data
from the original customer data to the final k-anonymous re- sults. 1. .... Another related area is privacy-preserving data mining, which also considers protection ...

Efficient k-Anonymization using Clustering Techniques
ferred to as micro-data. requirements of data. A recent approach addressing data privacy relies on the notion of k-anonymity [26, 30]. In this approach, data pri- vacy is guaranteed by ensuring .... types of attributes: publicly known attributes (i.e

Enhancing mobile search using web search log data
Enhancing Mobile Search Using Web Search Log Data ... for boosting the relevance of ranking on mobile search. .... However, due to the low coverage.

Journey to Cloud, Volume 2, Issue 1 - Media12
the storage media for the data. Journey to Cloud. 3. SCALE-OUT STORAGE. FIGURE 1. ..... on call 24x7, which could cause your OpEx costs to spiral out of ... ward way to handle high availability that you can ...... for Windows* and Android*.

Enhancing billing system efficiency with cloud computing
Adopt a cloud computing solution. Use Intel Xeon processor E7-8800/4800 product families to build an enhanced cloud computing platform that provides ...

Enhancing billing system efficiency with cloud computing
architecture-based billing system—including computing performance, ... with Intel Xeon process E7 family and cloud computing technology enables a reliable.

Journey to Cloud, Volume 2, Issue 1 - Media12
Vice President of Research and Development and Co-Founder. Zettaset ..... To develop applications with all these ..... by a Web application running on an Open-.

Virtual Cloud Security by Using Hypervisor- Based Technology - IJRIT
Hypervisor security is the process of ensuring the hypervisor, the software that enables virtualization, is secure ... The research methodology adopted towards achieving this goal, is based on software ..... critical data must not only be protected a

using cloud computing to implement a security overlay network pdf ...
using cloud computing to implement a security overlay network pdf. using cloud computing to implement a security overlay network pdf. Open. Extract. Open with.

Virtual Cloud Security by Using Hypervisor- Based Technology - IJRIT
Hypervisor security is the process of ensuring the hypervisor, the software that enables virtualization, is secure throughout its life cycle, including during .... In one scenario, an attacker can compromise one guest VM, which can then pass the infe

Why the Device Matters in a Cloud-centric World - Media12
In our experience, more capable and powerful devices can provide the following benefits, even when accessing cloud-based services: • Better overall user experience for maximum end-user productivity. • Enhanced support for the security and managea

Intel - Media12
Bossers & Cnossen looks to Intel®vPro™technology to boost services revenue ... evolves (e.g., toward cloud computing), it is becoming increasingly difficult for IT ... of our gross turnover comes from hardware sales, but these margins are starting

Measuring the Value of Information Security Investments - Media12
Network. Physical – Data center physical access controls, site security ... They range from malware to social .... information on social networking sites; this.

Utility-Based Anonymization Using Local Recoding
2Simon Fraser University, Canada, [email protected]. 3The Chinese University of Hong Kong, [email protected]. ABSTRACT. Privacy becomes a more and more serious concern in applications involving microdata. Recently, efficient anonymization has attrac

Enhancing Expert Finding Using Organizational ...
files are constructed from sources such as email or documents, and used as the basis for .... expert finding system that it has access to a large pool of experts.

Measuring the Value of Information Security Investments - Media12
IT Best Practices. Information ... combined these with internal best practices, both financial and .... awareness campaigns. To fully .... stop 10 percent of the remaining 70 percent of attacks .... information on social networking sites; this includ

Evolving Methods of Data Security in Cloud Computing - IJRIT
TPA makes task of client easy by verifying integrity of data stored on behalf of client. In cloud, there is support for data dynamics means clients can insert, delete or can update data so there should be security mechanism which ensure integrity for

Data Storage Security Model for Cloud Computing
CDO's signature for later verification. SearchWord .... cryptographic primitives such as digital signature which can be used to authenticate the CDO/CDU by CSP.

Enabling Data Storage Security in Cloud Computing for ... - wseas.us
important aspect of quality of service, Cloud. Computing inevitably poses ... also proposed distributed protocols [8]-[10] for ensuring storage .... Best practices for managing trust in private clouds ... information they're hosting on behalf of thei

Enabling Data Storage Security in Cloud Computing for ... - wseas.us
Cloud computing provides unlimited infrastructure to store and ... service, paying instead for what they use. ... Due to this redundancy the data can be easily modified by unauthorized users which .... for application purposes, the user interacts.

Data sharing in the Cloud using Ensuring ... - IJRIT
Sep 9, 2013 - where software objects that offer sensitive functions or hold sensitive data are responsible for protecting .... Log files should be reliable and tamper proof to avoid illegal insertion, deletion, and ..... attacker erase or tamper a re