Editor's note: this interview is
by Katherina Eleftheriou, IBM Research-Zurich media relations.
Connected “things” – everything from hospital beds, train tracks, cars, buildings and
more – are generating massive amounts of data that can be analyzed to provide
quick, actionable insights. But before this can happen, the data needs to be
collected in the cloud where advanced algorithms can detect patterns to predict,
for example, when the hospital bed will be available or when the train tracks
will require repairs.
The
security of this data is of the utmost importance, which is why many
organizations are so focused on building trust and security into the cloud.
Last
June, the European Union’s Horizon2020 program
granted €6.4M euros to a consortium called TREDISEC
to improve cryptographic protocols and system security mechanisms for the
cloud. IBM’s
research lab in Zurich is one of the TREDISEC partners. I recently sat down with
several of the scientists on the project, including Alessandro
Sorniotti, Angelo
De Caro, Anil Kurmus
and Matthias
Neugschwandtner, to discuss the upcoming challenges of this ambitious
open source project and it’s impact on security and efficiency in tomorrow’s
cloud.
Q.
Please give us an overview of the project.
Alessandro
Sorniotti (AS): The scope of the
project is security in cloud, with a focus on outsourcing. We are taking a
holistic approach, which we hope will allow us to study the problem in its
entirety and discover security gaps that are currently hidden.
For example, if you take a single problem like “I
don’t trust the cloud provider, therefore I need to encrypt my data” or “I
would like to use the storage system as efficiently as possible, so I will compress
and deduplicate data and I do it with the best and fastest algorithms.” Both of
these singular problems are solvable and have been solved. But if you combine
them together, the problem becomes exponentially more difficult because it
becomes the proverbial blanket that doesn’t cover everything.
When we wrote the proposal, we tried to be bold and consider all of the aspects: to build a system that needs to be used by multiple users who do not trust one another; to allow for data outsourcing; and be encrypted to use the storage system in an efficient way.
When we wrote the proposal, we tried to be bold and consider all of the aspects: to build a system that needs to be used by multiple users who do not trust one another; to allow for data outsourcing; and be encrypted to use the storage system in an efficient way.
Sorniotti keeps clouds secure. |
Anil
Kurmus (AK): It depends on the
security model, and it depends on the degree of access you give the
users.
If the interface with the server is rather
restrictive, maintaining control is fairly easy. But if you want to give a wider
degree of access, for example, access to the bare metal server like IBM
Softlayer offers, where you outsource not only storage but also computation,
the problem becomes harder. It’s like giving the keys of your house to a
curious stranger and then trusting them to stay in the kitchen all day.
Q.
What is the aim of this project considering it’s a European open-source project?
AK:
We want to develop the mechanisms and
the protocols, and then see if they can be applied to proprietary as well as
open-source solutions. We also want to help make any system multi-tenant ready
so it can accept requests from different users without any fear of
compromise.
(click to enlarge) |
At the end of the day the system is as strong as
its weakest link, so the problem must be analysed and understood from both
standpoints.
Q.
So what’s the first demonstration where this could work? Do you have a
milestone in mind to test this in a data-center with a client?
Matthias
Neugschwandtner (MN): We’re
working with a good set of use case partners, including cloud service providers
from both Greece and Spain where we will test some of our work. This should
give us a good platform for testing and improving.
At this point we are making good progress and will have more to report in the coming months.
At this point we are making good progress and will have more to report in the coming months.
Follow
updates on the project @TREDISECproject.
The
project has received funding from the European Commission under the Information
and Communication Technologies (ICT) theme of the Horizon 2020 framework
programme (H2020-ICT-2014-1). The project started in April 2015, coordinated by
Atos with partners NEC Europe (United Kingdom), ETH Zurich (Switzerland), IBM Research (Switzerland),
Eurecom (France), Arsys (Spain), GRNET (Greece), SAP (Germany) and Morpho
(France).
More information about the project is available at www.tredisec.eu.
More information about the project is available at www.tredisec.eu.
No comments:
Post a Comment