Security and trust are still major challenges for companies in order to use the cloud. With today’s tools and concepts, businesses can reach a reasonable level of data and process security for sure (see 5 Steps for Protecting Cloud Data Security). But what will cloud security look like in the future? Researchers already prepare the next wave of security techniques. The main theme of research seems to be trust and how today’s trust issues with cloud computing and online business networks can be translated into enforcement technologies that guarantee desired levels of security. Encryption will play a central role, of course, but it will be much tighter integrated into business processes than today. Three examples of enforcement technologies show what future security architectures and mechanisms could look like.
Queries on Encrypted Databases
Usually, data encryption works like putting a letter into a sealed envelope: The data is safe, but cannot be used unless you take it out of the envelope. This property leads to a problem when outsourcing databases: If you do not trust the cloud provider, your database needs to be encrypted. This is fine for small data sets, since you can just load the data into your local memory or disk, decrypt the data, and use it. But this is not practical for larger databases since data transfers would need too long, and performing searches on encrypted databases is not possible – at least with traditional techniques. This is where security research changes the game: Search on encrypted data does work. It iscomplex, but promising.
Computer scientists have developed algorithms that encrypt data and transform queries in a way that searches can be executed without the need to decrypt any data. The results are still encrypted, but can be decrypted on the client’s site. Database administrators can access neither the data nor the query results. Researchers developed different encryption schemes with specific properties (random, deterministic, order-preserving, homomorph etc.) to support different types of queries at the maximum level of security possible. SAP researchers work on prototypes for SAP’s in-memory database SAP HANA to enable a secure database-as-a-service, taking care of optimal encryption schemes and algorithms that balance security and performance.
Multi-Party Secure Computing
Companies have always operated in networks, and close collaboration led to more efficient benchmarks, supply chains, service and maintenance processes, to name a few. The more data is shared, the better the optimization. But there is a challenge: Companies are reluctant to share data, especially when it could lead to unfair advantages for partners, suppliers or customers (for example by sharing cost schemes, utilization etc.).
Back in the 1980s, researchers have already developed concepts on how input data can be kept secret in a multi-party optimization. The basic idea of the privacy-preserving computing is to encrypt the input data and perform all computations on the encrypted data in a way that the results do not reveal any private input. These ideas can lead to a new dimension of collaborative supply chain efficiency, since it allows to perform calculations over a cloud platform, especially when neither the cloud provider nor the participating entities can be trusted, and no trusted third party can be relied on. But the old concepts of privacy-preserving multi-party computing need improvements from a theoretical and practical point of view. They were only available for a small number of optimization problems, and they were too slow for large data sets from real-world business problems.
All of the presented research areas help to overcome trust issues in the cloud. They all focus on specific trust assumptions and application scenarios, but will cover more and more use cases in the future. Security is often seen as a non-functional requirement to software systems. With the mentioned research, this notion will definitely change. Security is becoming an enabling technology for the cloud to unfold its full potential. This will only happen when protection needs of businesses and end users are respected, be it in retail, manufacturing or any other industry.