Encryption-Based Solution For Data Sovereignty in Federated Clouds
Encryption-Based Solution For Data Sovereignty in Federated Clouds
Encryption-Based Solution For Data Sovereignty in Federated Clouds
Consumer
Federation middleware
Represents the
front-end of the
cloud federation
Figure 1. A generic federation middleware for clouds can be schematically viewed as composed of two
different abstraction layers: one providing communication capabilities, the other offering orchestration
means.
This component hides the federation’s complexity, ware can replicate and/or move data between differ-
so from the consumers’ perspective, the service ap- ent cloud services and datacenters, possibly located
pears to be running on a single cloud platform. An in different countries.
integration layer enforces the interoperability among These activities can take place without the
heterogeneous cloud platforms. An orchestration data owner’s knowledge or informed consent. For
layer, built on top of the integration layer, harmoniz- example, in the case of private clouds, the data
es the different management strategies and models owner must have given consent by specifying geo-
of the federated clouds. graphical, legislative, and data location constraints
in the service-level agreement (SLA), whereas in a
Challenges public cloud, such a requirement might not be pres-
In addition to the interoperability issues, a federated ent in the SLA. In both cases, the federated cloud
cloud service faces security and legal challenges. service providers (CSPs) might not even be able
Cloud consumers’ concerns about the lack of con- to determine the “split” data’s exact location. This
trol over the outsourced data and computational could potentially result in organizations breaching
activities, and about data being stored in multiple the exacting privacy and other regulations in the ju-
disparate datacenters located in different countries, risdiction in which they operate. More specifically,
are exacerbated in a federated cloud environment, consumer data is managed by a CSP regulated un-
where, to maximize efficient resource utilization, der a legal framework that might be inconsistent or
automated software within the federation middle- conflict with that of the data owner, and data can be
J a n u a r y/ F e b r u a r y 2 0 1 6 I EEE Clo u d Co m p u t i n g 13
Cloud and the Law
accessed by users from countries with privacy rules the recent high-profile incident involving Edward
that are inconsistent (or conflict) with those of the Snowden.
data owner. When using a cloud federation, consumers
Therefore, establishing data sovereignty3 (that don’t know the data’s exact location (for example,
is, controlling and verifying the data’s geoloca- which datacenter in which country the data will
tion) is of pivotal importance when (federated) be stored). In fact, the cloud federation’s front end
cloud services are used to store sensitive data to is represented by a broker service that receives a
ensure that data stored in the cloud won’t be avail- consumer’s request and decides how to allocate
able to anyone in a location with a conflicting the hardware commodity, based on predefined se-
legal framework (for example, data about the US lection algorithms7 without the consumer or data
transport-critical infrastructure shouldn’t be stored owner’s involvement. Moreover, the data owner
or made available to anyone located outside the can share access to outsourced data with other
country, particularly in US Office of Foreign Assets consumers, as long as they have Internet connec-
tivity, even if they’re located in a dif-
ferent geographic location. These are
serious issues when handling sensitive
data,8 such as healthcare data, bio-
Restrictions on data storage and medical datasets, or financial informa-
access can also differ among states tion. Access to this data is generally
governed by various legal restrictions,
within the same country, or between such as the Health Insurance Porta-
countries. bility and Accountability Act (HIPAA)
and Control Objectives for Informa-
tion and Related Technology (COBIT).
For example, the European Union
(EU) Data Protection Directive states
Control [OFAC] sanctioned countries).4 Ensuring that any personal data generated within the EU
data sovereignty can be part of the SLA manage- is subject to European law and data can only be
ment system. Existing research on this topic has shared with a third party if the owner is notified.9
two general focus areas: However, the data can’t leave the EU unless the
third party is located in a country that provides an
• imposing geolocation and legislation awareness adequate level of protection, for example, coun-
policies when locating data within the cloud in- tries that participate in the Safe Harbor program
frastructure,5 and (www.export.gov/safeharbor).
• verifying the compliance of SLA policies when As noted elsewhere, “It is a near impossible
storing data in a cloud infrastructure.6 task to fully harmonise privacy and data protec-
tion regimes due to the different judicial and legal
In the first case, data can’t be moved around systems internationally. There are countries that
the cloud infrastructure, and the CSP can’t apply do not have any mandatory data retention or data
its internal strategies to improve storage and re- protection requirements.”10 In other words, restric-
trieval efficiency. In the second case, there’s no as- tions on data storage and access can also differ
surance that the data has been duplicated and the among states within the same country, or between
copies moved to other locations, hence violating countries. Within the EU, countries such as France
SLA policies. In both cases, the data owner must and Denmark have broad restrictions, but coun-
trust the CSP to be doing the right thing; however, tries such as Italy and Germany have limited or no
such blind trust makes the data stored in the cloud restrictions for certain types of data.11 CSPs with
vulnerable because of the possibility of a mali- an international presence will have to comply with
cious or corrupt insider/CSP. This is evidenced in a myriad of regulatory obligations, both domes-
J a n u a r y/ F e b r u a r y 2 0 1 6 I EEE Clo u d Co m p u t i n g 15
Cloud and the Law
Encrypted data
Decryption key
Geolock
Geolocation encryption key
requirement Decryption
algorithm
User 3’s
geolocation
User 3’s data
consumer
Figure 2. An encryption-based solution for data sovereignty in federated clouds can include an encryption stage done by the
data owners, and decryption stages done by data consumers that have retrieved the encrypted data from different clouds than
the one of the data owner.
J a n u a r y/ F e b r u a r y 2 0 1 6 I EEE Clo u d Co m p u t i n g 17